Skip to content
This repository was archived by the owner on Jul 1, 2022. It is now read-only.

Commit a8a8275

Browse files
committed
Draft edits for fingerprinting and final sections
1 parent 77659b2 commit a8a8275

File tree

1 file changed

+50
-49
lines changed

1 file changed

+50
-49
lines changed

README.md

Lines changed: 50 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ COALA IP's vision will be realized through three key efforts:
5151
to represent intellectual property rights on distributed ledgers (see [Introduction](#introduction));
5252
1. Defining a technology-specific, but ledger-agnostic, free and open messaging and communication
5353
protocol for intellectual property rights and licensing transactions (see [Implementing the
54-
RRM](#coala-ip-implementing-the-lcc-rrm-with-linked-data); and
54+
RRM](#coala-ip-implementing-the-lcc-rrm-with-linked-data)); and
5555
1. Building a community to define a minimally-viable set of data for the description of intellectual
5656
property rights and licensing agreements.
5757

@@ -743,53 +743,49 @@ content-addressed location on IPFS, etc.).
743743

744744
### Fingerprinting
745745

746-
Determining the originality and provenance of a physical object is challenging, but there are
747-
almost always subtle differences between an original physical object and copies. Digital files
748-
can be copied perfectly, down to the bit. Furthermore, it is difficult for a computer to determine
749-
that two files actually represent the same photograph or song if the files are different sizes or
750-
other subtle modifications have been made, while a human would have no difficulty making the
751-
connection.
746+
Determining the originality and provenance of a creation is challenging. This is true of physical
747+
creations, but even more so for digital creations which face the challenges of being perfectly
748+
copyable as well as easily modifiable. Although computers are good at determining perfect copies,
749+
they struggle if subtle modifications, such as compressing image quality or cropping an image, are
750+
made–even if a human would have no difficulties in making a connection.
752751

753-
The LCC takes these problems into account. In their "Ten Targets" document, they propose
754-
cross-standard identifiers that can, if needed, be *transformed* into alternative identifiers. This
755-
section discusses a similar idea: the existence of an arbitrarily complex vector that can be used
756-
to link all the alternative identifiers of a single work to a single identifier on a global
757-
rights registry.
752+
The LCC takes these problems into account. In their ["Ten Targets" document](#the-lccs-ten-targets),
753+
they propose cross-standard identifiers that can, if needed, be *transformed* into alternative
754+
identifiers. This section discusses a similar idea: the existence of an arbitrarily complex graph
755+
that can be used to link all the alternative identifiers of a single work to a single identifier on
756+
a global rights registry.
758757

759758
Any function that takes a digital asset as an input and yields a fixed-length value could
760759
potentially be used as a **fingerprinting function**. This could be as simple as a hash function
761760
that inspects the arrangement of bytes in a digital asset and returns a integer, but there are more
762761
elaborate versions:
763762

764763
- [Image-match](https://github.com/ascribe/image-match): An approximate image match algorithm
765-
implemented in Python.
766-
- [pHash](http://www.phash.org/): A hashing method using various features of a digital asset.
764+
implemented in Python;
765+
- [pHash](http://www.phash.org/): A hashing method using various features of a digital asset;
767766
- [dejavu](https://github.com/worldveil/dejavu): An audio fingerprinting and recognition algorithm
768-
implemented in Python.
769-
- TODO: List more libraries
770-
- Find popular ones that do fingerprinting for all kinds of media types
767+
implemented in Python;
768+
- And many more
771769

772770

773771
While a manifestation of a digital creation may initially only have a single fingerprint generated
774772
by an arbitrary hashing function, more elaborate fingerprinting schemes could later be used to help
775-
automatically identify other occurrences of the creation on the internet. Paired with linked data,
776-
fingerprinting schemes could allow the storage and tracking of all information about the use of a
777-
work in an arbitrarily complex graph. Copies, remixes, mash-ups, and modified versions of the work
778-
could be identified automatically as paths in the graph. Traversing these paths would reveal the
779-
original instance of the work, possibly identifying the creator and providing opportunities for
780-
compensation.
773+
automatically identify other occurrences of the creation on the internet. Paired with Linked Data,
774+
fingerprinting schemes would allow an arbitrarily complex graph to store and track all the
775+
information related to the use of a work: copies, remixes, mash-ups, and modified versions could all
776+
be identified automatically as paths in the graph. A traversal up a path would reveal the original
777+
instance of the work and possibly identify the creator as well as an opportunity for compensation.
781778

782-
As rights information becomes more transparent and users can easily license the rights they want
783-
to obtain, participants in the system would be incentivized to create more elaborate fingerprinting
784-
systems to further increase transparency.
779+
Based on this, as rights information becomes more transparent and rights easily licensable by users,
780+
participants in the system would be incentivized to create more elaborate fingerprinting systems to
781+
further increase transparency.
785782

786783

787784
### The Interledger Protocol
788785

789786
- TODO:
790787
- This section should briefly explain what Interledger and the Interledger Protocol is about and
791788
how COALA IP could potentially use it.
792-
- Same formalities as in all the sections before apply.
793789

794790

795791
## COALA IP: Remodeling the LCC RRM with Linked Data
@@ -1809,48 +1805,53 @@ We end up with the following:
18091805
![](media/lccrrmassertionexample2.png)
18101806

18111807

1812-
As changing any of the objects values of key would provoke a change in the object's IPLD hash, and
1813-
since changing data is not possible, we could also simply point the assertion to the object
1814-
itself. However, we'd probably lose valuable metadata and it would be difficult to find out
1815-
why an object was flagged by an asserter.
1808+
As a recommendation, we add that using IPLD with `Assertion`s is ideal, as it enforces the
1809+
immutability of an asserted object (as well as the assertion itself); with IPLD, objects cannot be
1810+
silently changed after-the-fact as any changes will cause their IPLD hashes to also change.
18161811

18171812

1818-
1819-
### The LCC RightsConflict `Entity`
1813+
### The RRM `RightsConflict` Entity
18201814

18211815
TODO:
1822-
- See other introductory sections of LCC models. Use same structure to describe the model
1816+
1817+
- See other introductory sections of LCC entities. Use same structure to describe the entity
18231818

18241819

18251820
#### Proposed Transformation
18261821

18271822
TODO:
1828-
- See other introductory sections of LCC models. Use same structure to do the transformation
1823+
1824+
- See other introductory sections of LCC entities. Use same structure to do the transformation
1825+
1826+
1827+
### User Extensions
1828+
1829+
TODO:
1830+
1831+
- Explain how users could extend the given entities with their own properties
18291832

18301833

18311834
## Future
18321835

1833-
This document outlined general guidelines on using the LCC Framework to define an RDF ontology for
1834-
managing digital rights on top of immutable data stores. As the goal is to implement an open
1835-
standard for rights management, there are a number of events that are to follow; they are outlined
1836-
here in sequential order:
1836+
This document has outlined general technologies and guidelines on using the LCC Framework as the
1837+
basis of an RDF ontology for managing digital rights with immutable data stores. As the goal is to
1838+
implement an open standard for rights management, a number of efforts are to follow:
18371839

1838-
- Define a working RDF schema based on this specification
1839-
- Include or build open source communities around it
1840-
- Using the RDF schema, implement this specification
1841-
- Identify a standards commite to send this to
1842-
- Take the RDF schema, take the proposed transformations here and put them in a format of a standard
1843-
proposal
1840+
- Define a production-ready RDF-compatible schema based on the proposed transformations (see
1841+
[`data-structure/`](data-structure/))
1842+
- Complete a reference implementation using the RDF-compatible schema (see
1843+
[implementations](IMPLEMENTATIONS.md))
1844+
- Include or build open source communities around COALA IP
1845+
- Identify a standards committee to work with
1846+
- Reformat the proposed transformations and their resulting schemata to that of a standard proposal
18441847

18451848

1846-
Thanks for reading!
1849+
Thank you for reading!
18471850

18481851
# Contributors
18491852

18501853
Contributors to this document, in alphabetical order:
18511854

18521855
- Tim Daubenschuetz: tim.daubenschuetz@gmail.com, tim@ascribe.io
18531856
- Greg McMullen: greg@ipdb.foundation, gmcmullen@gmail.com
1854-
- Brett Sun: brett@bigchaindb.com
1855-
1856-
1857+
- Brett Sun: qisheng.brett.sun@gmail.com, brett@bigchaindb.com

0 commit comments

Comments
 (0)