Methods and systems for detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content

ABSTRACT

A method of detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content. In one embodiment, the method comprises providing an electronic system that allows auditors to register to audit the use of electronic media content, providing the auditors with information through the electronic system regarding a unique identifier that identifies one or more items of electronic media content, owners of electronic media content or other intellectual property or users who have subscribed to the use of electronic media content, obtaining information from auditors through the electronic system regarding unauthorized use of the electronic media content and verifying that the information received from auditors is complete.

FIELD OF THE DISCLOSURE

The present invention generally relates to method for detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content. More particularly, the present invention detects unauthorized use of electronic media content by allowing any registered user to collect and submit evidence of the unauthorized use, and correct misuse which prevents further unauthorized use of electronic media content and acts as a deterrent for those contemplating unauthorized use.

BACKGROUND

Unauthorized use of electronic media content, which includes signal theft or piracy, usually occurs when a business or individual uses the electronic media content without subscribing to the electronic media content provider, such as using an unauthorized receiver or a computer to access and steal the electronic media content. Unauthorized use of media or violation of terms of use is often accomplished when a customer, who at one time subscribed to a specific type of the service, uses the electronic media content for another unauthorized user. Others alter their receiver to continue to receive unauthorized electronic media content even after ending their subscription or use the electronic media content without lawful subscription or permit.

Using an electronic media content that exceeds viewers' licensing terms is also a prevalent form of unauthorized use of electronic media content. For instance, some businesses subscribe to electronic media content under personal or residential use but use the electronic media content commercially. Those businesses, entities or individuals unjustly benefit from the unauthorized use because they access, view, exhibit and/or transmit the media content to others without obtaining authorization from the content owner or paying the required licensing fees to the content provider. There are also individuals or businesses who applied to the use of an electronic media content for one particular license, location or device but actually use the electronic media content in multiple locations or devices without subscribing for that actual usage or license. This can happen when a subscriber uses a multi-receiver to receive the electronic media content at multiple locations; when the subscriber uses media mirroring device (i.e., Slingbox® or other place shifting devices or technology) to mirror the electronic media content and use the electronic media content at unauthorized location; or when the subscriber shares his media subscription account and/or password with others without authorization.

Electronic media content providers often cannot efficiently identify end users who illegally use their electronic media content because their system is incapable of detecting the unauthorized use (i.e., one way broadcasting system such as satellite TV, cable tv, terrestrial radio telephone, fiber optic) or because they do not have enough resources to hire sufficient auditors to investigate the unauthorized use. Even if their systems/methods have such functionality, the systems/methods still cannot differentiate whether the electronic media content is being used residentially or commercially. It is also expensive to hire private investigators, federal marshal, or auditors, often at hourly rate, and may take a long time for them to find out the individuals or businesses that exist throughout the country that are using electronic media content without authorization or to collect evidences of the unauthorized use. Other methods include using expensive and often inaccurate internet, GPS, or GIS predictive models or technology that does not positively identify unauthorized misuse but only tries to predict an increased possibility of unauthorized use of electronic media content for the content providers. Moreover, content providers are often concerned with the negative stigma, press, potential backlash and possibly legal consequences from trying to enforce their legal rights and prevent members of the public from unauthorized use of their electronic media content.

Accordingly, there exists a need for improved method which not only allows electronic media content providers and owners to detect, verify and correct unauthorized use of their electronic media content more efficiently, but also allows them to lawfully collect evidence of the unauthorized use, thereby protecting their interests and business model and preventing unauthorized use of electronic media content.

SUMMARY OF THE INVENTION

The present invention discloses a method for detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content which allows electronic media content providers or owners, and related parties and intermediaries to efficiently discover whether a user is licensed to use electronic media content or whether the user is using the electronic media content consistently with its licensing terms. The method further allows the electronic media content providers to collect evidence of the unauthorized use more expediently.

In one embodiment of the present invention, a method of detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content is provided. The method comprises (1) providing an electronic system that allows one or more auditors to register to audit the use of electronic media content; (2) providing the one or more auditors with information through the electronic system regarding a unique identifier that identifies one or more items of electronic media content, one or more owners of electronic media content or one or more users who have subscribed to use one or more items of electronic media content; (3) obtaining information from the one or more auditors through the electronic system regarding unauthorized use of one or more items of electronic media content and (4) verifying that the information received from the one or more auditors through the electronic system regarding the unauthorized use of one or more items of electronic media is complete.

In one aspect of at least one embodiment of the present disclosure, the electronic system used can be a website, an internet application, a computer software application, a mobile software application or other similar technology.

In another aspect of at least one embodiment of the present disclosure, the auditor can be any individual or business entity that has access to the electronic system including, but not limited to, mobile users who have installed the mobile application for the electronic system or users who have registered with the electronic system. The registration of the auditor may require the auditor to provide evidence that he or she is suitable to be an auditor. The electronic system can be any means of transmitting electronic information, including but not limited to, the internet, mobile/telephonic devices, satellite and radio communication.

In yet another aspect of at least one embodiment of the present disclosure, the electronic system obtains information regarding the location of one or more auditors based on IP address or GPS location of them and notifying the auditors within a specific geographic location of special watch events. For instance, if there is a special sporting event (i.e., Super Bowl®) and the event is being broadcasted on TV only at certain region, the electronic system will alert auditors in proximity to that region to pay attention to individual or business playing the special event on TV. In another example, and not by way of limitation, the system and method of the present invention would notify the auditor of local media contents (e.g., a specific sporting event, geographically restricted content, content that is not supposed to be viewed or accessed at a later or earlier time, or content that is sent to a particular person or business) that should or should not be displayed at that particular location in order to assist the auditor with determining whether a media content is being used without authorization.

In yet another aspect of at least one embodiment of the present disclosure, the electronic system provides auditors with a list of authorized users of the media content within the auditors' area. In yet another aspect of at least one embodiment of the present disclosure, the list is incorporated into a mobile application or software that the auditor can use to help determine unauthorized use of electronic media content.

In yet another aspect of at least one embodiment of the present disclosure, there can be numerous ways where auditors can verify whether an individual or business has the authorization to use the electronic media content. In yet another aspect of at least one embodiment of the present disclosure, the electronic system provides auditors with geographic locations or ranges of the electronic media content. In yet another aspect of at least one embodiment of the present disclosure, when the auditors see that an electronic media content is being used outside of its geographic locations or ranges, the auditors can immediately tell that the use of the electronic media content is likely unauthorized. In yet another aspect of at least one embodiment of the present disclosure, the auditors can then confirm their findings with the electronic system.

In yet another aspect of at least one embodiment of the present disclosure, the auditors identifies the source of electronic media content through unique identifier such as digital signature, digital fingerprint, watermark, pixilation, banner or any other identifying indicia embedded in the electronic media content. In yet another aspect of at least one embodiment of the present disclosure, once the source of an electronic media content is identified, the auditors can access the electronic system to verify whether the person or business using the electronic media content has the authorization or correct license to do so.

In yet another aspect of at least one embodiment of the present disclosure, if the auditors determine that an unauthorized use of electronic media content has occurred, the auditors can submit the evidence of the unauthorized use in various forms and means to the electronic system. For instance, in one aspect of at least one embodiment of the present invention, the auditors can take photos or videos of the unauthorized use and upload them to the electronic system through its website, web application, mobile application, or other similar technology. In yet another aspect of at least one embodiment of the present disclosure, the electronic system also allows the auditors to provide detail information regarding the unauthorized use, such as identity of individual or business using the electronic media content, or specific location and time of the unauthorized use. In yet another aspect of at least one embodiment of the present disclosure, if auditors do not provide this information, the electronic system may still be able to determine them based on the IP address or GPS location of the auditors and the time auditors accessed the electronic system or took the photos or videos.

In yet another aspect of at least one embodiment of the present disclosure, if graphical evidence is not available, the auditors can simply provide textual or voice description of the unauthorized use to the electronic system. In yet another aspect of at least one embodiment of the present disclosure, the electronic system may provide special forms for auditors to fill out such as forms asking auditors to provide specific date, time, location and description of the unauthorized use of electronic media content.

In yet another aspect of at least one embodiment of the present disclosure, when the electronic system receives the evidence from auditors, the electronic system can automatically compile the evidence into a legal document (i.e., affidavits or declaration of auditors). In yet another aspect of at least one embodiment of the present disclosure, the auditors can sign the generated legal document electronically if the jurisdiction allows digital signature, or the auditors can submit notarized copy of the legal document when required. In yet another aspect of at least one embodiment of the present disclosure, the electronic media content providers can then use the legal document against unauthorized electronic media content users. In yet another aspect of at least one embodiment of the present disclosure, if the identity or contact information of the unauthorized electronic media content users is known, the electronic system may also send message (i.e., text message, email, mail, etc.) to the unauthorized electronic media content users warning them of the unauthorized use and requesting them to pay the required licensing fee and/or penalty to avoid legal actions. In yet another aspect of at least one embodiment of the present disclosure, upon discovery of unauthorized use of a media content, a warning message is delivered or streamed with the media content to the individual using the media content requiring the individual to either cease the use of content and/or pay the necessary fees.

In yet another aspect of at least one embodiment of the present invention, the method further includes providing an incentive, payment or award to the auditor for correctly identifying and documenting unauthorized use of electronic media content.

In another aspect of at least one embodiment of the present disclosure, the electronic system tracks progress of the audits performed by the auditors and periodically reminds the auditors to complete tasks required by the auditing process.

In yet another aspect of at least one embodiment of the present invention, the method further includes the method described herein except that the user does not need to register or provide any identifying information.

Since the method of the present invention allows anyone in the public to be a potential auditor and compensates the auditor when an evidence of unauthorized use of electronic media content is properly received, the present invention greatly increases the efficiency and incentive of detecting and reporting unauthorized use of electronic media content. Thus, individual or business will also less likely to use electronic media content without authorization because of the high probability of getting detected. In addition, when the individual or business sees detail evidence of their wrongdoing, it will prompt them to pay the required licensing fees or to settle the case with the electronic media content providers. Thus, any unauthorized use of media content can be easily corrected and resolved.

These and other features, aspects and advantages of the present invention will become better understood with reference to the following drawings, description and claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a process flow diagram showing an exemplary embodiment of the present invention.

FIG. 2 is an exemplary embodiment of the present invention showing how the electronic system provides information to an auditor.

FIG. 3 is an exemplary embodiment of the present invention showing how the auditor can identify the source of a media content.

FIG. 4 is an exemplary embodiment of the present providing an incentive, payment or award to the auditor for correctly identifying unauthorized use of electronic media content.

FIG. 5 is an exemplary embodiment of the present invention showing how the list can be incorporated into web map.

FIG. 6 is a process flow diagram showing an exemplary embodiment of the unique identifier of the present invention.

FIG. 7 is a process flow diagram showing an exemplary embodiment of how the present invention can prevent unauthorized use of media content.

FIG. 8 is a process flow diagram showing how the notification system can assign auditor based on his or her location.

FIG. 9 is a process flow diagram showing how the notification system tracks and dispatches auditors based on their locations.

FIG. 10 is an exemplary embodiment of the present invention showing how the quality control team involves in auditing.

DETAILED DESCRIPTION OF THE INVENTION

The following description is not to be taken in a limiting sense, but is made merely for the purpose of illustrating the general principles of the invention, since the scope of the invention is best defined by the following claims. Various inventive features are described below that can each be used independently of one another or in combination with other features.

Broadly, embodiments of the present invention generally provide a method of detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content by providing an electronic system that allows one or more auditors to register to audit the use of electronic media content, providing the one or more auditors with information through the electronic system regarding a unique identifier that identifies one or more items of electronic media content, one or more owners of electronic media content or one or more users who have subscribed to use one or more items of electronic media content, obtaining information from the one or more auditors through the electronic system regarding unauthorized use of one or more items of electronic media content and verifying that the information received from the one or more auditors through the electronic system regarding the unauthorized use of one or more items of electronic media is complete. For the purposes of this disclosure, an auditor is any individual or entity that detects, verifies, prevents, corrects and/or resolves the unauthorized use of electronic media content. For purposes of the present disclosure, media content shall include content, in any form and type, that is or can be protected through law or otherwise. Examples of electronic media content include but are not limited to passwords, key codes, licenses shares, software, video, music, membership accounts, writings, and any other literary, musical, or artistic work presently available or created in the future that can be stored, access, download or transmit through any electronic device.

Referring to FIG. 1, a process flow diagram showing an exemplary embodiment of the present invention. In one aspect of at least one embodiment of the present invention, the method for detecting, verifying, preventing and correcting or resolving unauthorized use of electronic media content first collects subscriber information from electronic media content providers 101. In one aspect of at least one embodiment of the present invention, an electronic system is provided 102 that allows one or more auditors to register to audit the use of electronic media content 103. The auditors can be anyone in the public which also include, but not limited to, company employee, third party or independent contractor. The electronic system can be a website, an internet application, a computer software application, a mobile software application, other similar technology or any combination of them, where all of them can provide functions similar to each other. The electronic system allows any individual or business to register with the system and become an auditor. There are various ways that an individual can register with the electronic system. For instance, and not by way of limitation, the individual can be automatically registered when the individual installed the application or software provided by the electronic system (i.e., computer software, mobile device application, etc.) or the individual can register with the electronic system through the website provided by the electronic system. The registration may require the auditor to provide evidence that he or she is suitable to be an auditor to prevent people with criminal history or dishonest conduct from becoming auditors. In one aspect of at least one embodiment of the present invention, the registration requirement can be optional where everyone can have access to the electronic system.

The electronic system then provides the auditor with information through the electronic system regarding a unique identifier that identifies one or more items of electronic media content, one or more owners of electronic media content or one or more users who have subscribed to use one or more items of electronic media content 104. For instance, the information can include which individual or business has subscribed to the electronic media content providers' services and the type of license (i.e., residential or commercial) for each subscriber. Such information can be stored on or accessed through the electronic system. If the electronic media content providers cannot provide subscriber's information due to confidentiality agreement with the subscriber, the electronic system can also serve as a gateway between electronic media content providers and auditors.

Once an individual becomes an auditor of the electronic system, the electronic system will interact with the auditor in various ways. Referring to FIG. 2, in one aspect of at least one embodiment of the present invention, the electronic system 201 alerts or notifies an auditor to inspect certain individual or business 204 based on the auditor's 203 location. For example, and not by way of limitation, if there is a special sporting event (i.e., Super Bowl(D) and the event is being broadcast on TV only at certain region, the electronic system 201 will alert auditors 203 in proximity to that region to pay attention to individual or business 204 playing the special event on TV. The alert or notification can be a mobile text message, email, voice mail, or notification generated by mobile application. The electronic system is capable of locating the auditor's 203 geographical location through the IP address if the auditor is accessing the webpage of the electronic system, or through GPS if the auditor 203 is using mobile devise 202 that has GPS function, or through any similar technology. In another aspect of at least one embodiment of the present invention, the electronic system 201 also allows the auditors 203 to query and verify whether an individual or business 204 has the authorization to use an electronic media content without first receiving notification from the electronic system 201. For instance, if an auditor sees an individual or business 204 is using an electronic media content and the auditor is able to identify the identity of the individual or business 204, the auditor can provide the identity to the electronic system 201 and the electronic system 201 will verify whether the individual or business 204 has the authorization to use the electronic media content 105. FIG. 8 is a process flow diagram showing how the electronic system can interact with the auditor based on the auditor's location. In another aspect of at least one embodiment of the present invention, the electronic system will assign the auditor to audit the use of electronic media on a specific region based on the auditor's location. The electronic system has the option of not to assign the auditor to an area if certain number of other auditors has already been assigned to that area.

There can be numerous ways where auditors can verify whether an individual or business has the authorization to use the electronic media content. In one aspect of at least one embodiment of the present invention, the electronic system provides auditors with geographic locations or ranges of electronic media content. When the auditors see that the electronic media content is being used outside of its geographic locations or ranges, the auditors can immediately tell that the use of the electronic media content is likely unauthorized. The auditors can then confirm their findings with the electronic system. In another aspect of at least one embodiment of the present invention, the electronic system provides auditors with a list showing which individual or business has the authorization to use the electronic media content within the auditors' area. If an individual or business is using the electronic media content but is not on the legal list, the auditors will immediately know that the use of electronic media content is unauthorized. The legal list can also be combined or tied with map applications (i.e., Google® map, Apple® map, etc.) so that auditors can see the exact locations of subscribers in the legal list on the map. For instance, as illustrate in FIG. 5, the list is incorporated into Google® map where different colors of dots can be used to represent which individual or business has subscribed to the electronic media content provider, the type of licensing, or whether a previous subscriber's license has expired.

In yet another aspect of at least one embodiment of the present invention as shown in FIG. 3, the auditors can identify the source of an electronic media content through unique identifier that identifies one or more items of electronic media content, one or more owners of electronic media content or one or more users who have subscribed to use one or more items of electronic media such as watermark 301 on a TV programs 302. The unique identifier also includes, but is not limited to, watermarks or other distortions to the media content, digital signature, digital fingerprint, pixilation, banner or audio signal, image recognition or biometrics or anything else is commonly used in the art or can be embedded or added to in the electronic media content. The unique identifier may also be known only to the auditors and be updated periodically so that the chance of subscribers discovering or tempering with the unique identifier is greatly reduced. Once the source of an electronic media content is identified, the auditors can access the electronic system to verify whether the individual or business using the electronic media content has the authorization or correct license to do so. FIG. 6 is a process flow diagram showing how an auditor can use the unique identifier to detect unauthorized use of electronic media content.

In yet another aspect of at least one embodiment of the present invention, the auditor is provided with special equipment associating with the electronic system that is capable of identifying one or more items of electronic media content, one or more owners of electronic media content or one or more users who have subscribed to use one or more items of electronic media content. The equipment can read information that is being transmitted from any device receiving, transmitting or displaying the electronic media content. For instance, an electronic media content provider may embed a transmitter transmitting licensing and/or subscriber information in their TV box, satellite dish, or any device it provides to its customer for viewing or receiving its media content. The auditor can then retrieve those information through the special equipment and determine whether there is unauthorized use. For example, if the information reveals that the subscriber did not subscribe the electronic media content at that location or the license has already expired, or reveals that the electronic media content should be used residentially but the user is using it commercially, the auditor will immediately know that the use of the electronic media content is unauthorized.

In yet another aspect of at least one embodiment of the present invention as shown in FIG. 9, auditors are being provided with software, application or device that will perform auto audit trail tracking and field resource immediate response. The electronic system and/or the software, application or device can track the location of auditors and dispatch auditors based on their locations or based on leads generated by the electronic system which can be realized by technology like Serving Area Interface (SAI), Sequence Retrieval System (SRS) or any other similar technology. As shown in FIG. 10, the electronic system may also provide auditors with trails they should take, and have auditors perform live video recording along the trails. The live video recording will be streamed to the electronic system. Then a quality control team is provided at different location to monitor the process of auditing and provide assistance to the auditors if necessary. In yet another aspect of at least one embodiment of the present invention, the quality control team can also perform live audit via the streamed video recording. By doing this, auditors or users of the software, application or device will not necessarily need to have the knowledge of how to audit a media content as such function will be performed by the quality control team instead.

Once the auditors determine that an unauthorized use of electronic media content occurs, the auditors can gather evidence 106 and submit the evidence of the unauthorized use 107 in various forms and means to the electronic system. For instance, as shown in FIG. 4, the auditors 401 can take photos or videos of the unauthorized use and upload them to the electronic system 403 through its website, web application, mobile application, or other similar technology. If the auditors are using mobile devices (i.e., smart phone, PDA, tablet, camera, optical device or tablet computer etc.) 402, the auditors 401 may use the mobile application provided by the electronic system 403 to perform the photo/video taking and uploading tasks.

The electronic system also allows the auditors to provide detail information regarding the unauthorized use, such as identity of individual or business using the electronic media content, or specific location and time of the unauthorized use. If auditors do not provide these information, the electronic system may still be able to determine the time and location of the unauthorized use based on IP address or GPS location of the auditor, the time auditor accessed or provided information regarding unauthorized use of the electronic media content through the mobile application, or the time picture or video evidence was taken by the auditor. If graphical evidence is not available, the auditors may simply provide textual or voice description of the unauthorized use to the electronic system. The electronic system may provide special forms for auditors to fill out such as forms asking auditors to provide specific date, time, location and description of the unauthorized use of electronic media content.

After the electronic system 403 receives the evidence from auditors 401 as shown in FIG. 4, the electronic system may compile the evidence into a legal document 404 (i.e., affidavits or declaration of auditors) 108. The auditors can sign the generated legal document 404 electronically if the jurisdiction allows digital signature, or the auditors can submit notarized copy of the legal document when required. The electronic media content providers can then use the legal document against individual or business for unauthorized use of their electronic media content. As shown in FIG. 7, if the identity or contact information of the individual or business is known, the electronic system may also send message (i.e., text message, email, post mail, etc.) to the individual or business warning them of the unauthorized use and requesting them to pay the required licensing fee and/or penalty to avoid legal actions.

In yet another embodiment of the present disclosure, upon detection/confirmation of the unauthorized use of a media content by an individual or business, the electronic system will alert the media content owner/provider of the unauthorized use and provide the content owner/provider with information relating to the unauthorized use (e.g., live evidence of unauthorized use of the media content or account, license, subscription information about the media content). The content owner/provider can then immediately decide whether to block or suspend the individual or business from further access to the media content, thereby immediately correct or resolve any unauthorized or misuse of the media content. In yet another aspect of at least one embodiment of the present disclosure, the media content owner/provider can optionally deliver a warning message that is embedded or streamed with the media content to the individual or business and requesting the individual or business to cease the unauthorized use and/or pay the necessary fees. Since the warning message will be displayed on the media content (e.g., a banner or message box displaying on the media content screen showing that the use of the media content is unauthorized), it can effectively deter users, especially commercial users, from using the media content without authorization.

The present disclosure further provides an incentive, payment or award to the auditor for correctly identifying unauthorized use of electronic media content. For instance, once the electronic system 403 confirms that the evidence submitted by the auditors 401 is proper and authentic, the electronic system awards the auditor with money 405, gift or store credit.

The electronic system will also keep track of tasks performed by auditors and generate lead assignments. For instance, if the electronic system receives a high number of unauthorized use reports from auditors regarding particular individual or business, the electronic system will put the individual or business on a priority list so that electronic media content providers can choose who to prosecute first based on the priority list. The electronic system will also track progress of the audits performed by the auditor and periodically reminds the auditor to complete one or more tasks required by the auditing process. For instance, the electronic system will verify that the information received from the auditor regarding the unauthorized use of electronic media content is complete. If an auditor forgot to upload evidence or some information is missing, the electronic system will notify the auditor of the missing information.

In yet another embodiment of the present disclosure, the system and method can also be used to detect, verify, prevent and correct unauthorized use of non-electronic media contents. Non-electronic media contents include, but are not limited to, trademark, copyright works, software, grey market goods, pharmaceutical drugs and any other consumer product. The electronic system can provide one or more auditors with information regarding a unique identifier that identifies one or more items of non-electronic media content, one or more owners of non-electronic media content or one or more users who have subscribed to use one or more items of non-electronic media content. The auditor can then determine whether a non-electronic media content is being used with authorization based on the unique identifier. For instance, a unique identifier can be embedded or marked on a consumer product where the unique identifier identifies information such as manufacture, destination of sale or authorized vendor of the consumer product. Such information can also be embedded in and disclosed by the bar code of the product if there is one. If the auditor finds that an individual or business is distributing the commercial product without authorization, the auditor can take and submit evidence of the unauthorized use or sale to the electronic system in exchange for reward. Since the owner or authorized distributor of the commercial product can use the evidence against the individual or business for the unauthorized use or distribution, the present disclosure effectively protects and prevents the owner or authorized distributor from unfair competition or loss of revenue resulting from unauthorized/unlawful trading of grey market goods.

Among other things, the present invention provides various benefits and advantages to the electronic media content providers. One benefit of the systems and method of the present disclosure is that it prevents unfair competition. For instance, business entities or individuals who use the electronic media content without authorization can operate their business at lower expense compared to their competitors who lawfully subscribed to the use of the electronic media content. By avoiding paying the required licensing fee, those business entities or individuals may then reduce the cost of their product or service by the amount they saved from the unauthorized use, thereby creating unfair competition to their competitors. Another benefit of the present invention is to prevent or protect late subscribers of the media content from being mistaken for the unauthorized use by the auditors because the electronic system will update the information or database of media content subscribers instantly, thereby resolving latency. The method of the present invention deters and even prevents unauthorized use of electronic media content because it incentivizes the auditors to report unauthorized use of electronic media content with award and there is no limitation on the number of auditors. The mobile application disclosed by the present invention also makes the auditing easy and expedient because almost every person has a smart phone that can take pictures and videos. In addition, when the individual or business sees detailed evidence (i.e., photo, video, etc.) of their unauthorized use of electronic media content, it will prompt them to pay the required licensing fees or to resolve the case quickly and prior to litigation to enforce the rights that were violated.

It should be understood, of course, that the foregoing relates to exemplary embodiments of the invention and that modifications may be made without departing from the spirit and scope of the invention as set forth in the following claims. 

1. A computer implemented method comprising: establishing an electronic relationship between at least one network connected computer that comprises at least one processor and memory and at least one electronic device that comprises at least one processor and memory by using a network connection; receiving from the at least one electronic device, a digital audio, video, or picture of the media content at the at least one network connected computer using a processor and memory of at least one network connected computer to hash, encrypt or process at least a portion of the digital audio, video, or picture to obtain a digital unique identifier; using a processor and memory of at least one network connected computer to obtain information regarding users authorized to use, access, or view the media content with the obtained digital unique identifier near the electronic device's GPS location; using a processor and memory of at least one network connected computer to determine information regarding whether the location near the electronic device's GPS location; and providing one or more auditors, through the electronic device, with information regarding the users authorized to use, access, or view the media content with the obtained digital unique identifier near the electronic device's GPS location, wherein the digital unique identifier is embedded into each media content file and is updated periodically, and wherein the electronic device's GPS location changes periodically.
 2. The method of claim 1 further comprising: receiving information or evidence from the one or more auditors regarding their suitability to be an auditor.
 3. The method of claim 1, wherein the information received from the at least one electronic device comprises picture or video evidence of use of the media content.
 4. The method of claim 1, wherein the at least one electronic device comprises one of a website, an internet application, a computer software application and a mobile software application.
 5. The method of claim 1 further comprising obtaining information regarding the location of the one or more auditors, wherein the location of the one or more auditors comprises one of the electronic device's internet protocol address and global positioning system location IP.
 6. The method of claim 1, wherein the digital audio, video, or picture of the media content was first obtained by an electronic device.
 7. The method of claim 1, wherein the unauthorized users list is downloaded into a mobile application or software from a network connected computer that the auditors can use to help determine unauthorized use of the content.
 8. The method of claim 1, wherein the unique identifier comprises one of a special digital signature, digital fingerprint, watermark, pixilation, banner and any other identifying indicia.
 9. The method of claim 1 further comprising providing an incentive, payment or award to the one of more auditors for correctly identifying unauthorized use of the media content.
 10. The method of claim 1, wherein the electronic system tracks progress of the audits performed by the one or more auditors and periodically reminds the auditors to complete one or more tasks required by the process to identify unauthorized use of the media content.
 11. A computer implemented method comprising: establishing an electronic relationship between at least one network connected computer that comprises at least one processor and memory and at least one electronic device that comprises at least one processor and memory; giving access for the one or more auditors to the electronic device or a mobile application in electronic relationship with network connected computer; receiving from the at least one electronic device to the at least one network connected computer a digital audio, video, or picture of a media content; using a processor and memory of at least one network connected computer to hash, encrypt, or process at least a portion of the digital audio, video, or picture of media content to obtain a digital unique identifier; using the processor and memory of at least one network connected computer to obtain information regarding users authorized to use, access, or view the media content with the obtained digital unique identifier near the electronic device's GPS location, wherein the digital audio, video, or picture of the media content was first obtained by an electronic device; providing one or more auditors, through the electronic device, with information regarding the users authorized to use, access, or view the media content with the obtained digital unique identifier near the electronic device's GPS location; and providing an incentive, payment, or award to the one or more auditors for correctly identifying the unauthorized use of the media content wherein the unique identifier is unique to and is embedded into each media content file and updates periodically.
 12. The method of claim 11, wherein the mobile application further takes photos or records video of the unauthorized use.
 13. The method of claim 11 further comprising: dispatching one or more auditors based on their locations to audit the media content that is being broadcasted in the area of the one or more auditor.
 14. The method of claim 11 further comprising the time and location of the unauthorized use of the media based on internet protocol address or global positioning system (GPS) location of the one or more auditors.
 15. The method of claim 11 further comprising: sending one or more messages to an individual or a business entity involved with the unauthorized use of the media content informing the individual or business entity of the unauthorized use.
 16. A computer implemented method comprising: giving access to a mobile application on an electronic device that has at least one processor and memory to registered auditors to audit the use of media content broadcasted directly or indirectly through a third party by at least one cable or satellite television company; assigning the one or more auditors through the mobile application to audit the use of the media content based on where the media content is being broadcasted and the one or more electronic device's GPS location; using a processor and memory of at least one network connected computer to hash, encrypt, or process at least a portion of the digital audio, video, or picture to obtain the digital unique identifier; using a processor and memory of at least one network connected computer to obtain information regarding users authorized to use, access, or view the media content with obtained digital unique identifier near the electronic device's GPS location; establishing an electronic relationship between at least one network connected computer and the mobile application; providing one of more auditors, through the electronic device, with information regarding the users authorized to use, access, or view the media content with the obtained digital unique identifier near the electronic device's GPS location; receiving audio, picture, or video evidence from the mobile application corresponding to unauthorized use of the media content; tracking progress of the audits performed by the one or more auditors and reminding the one or more auditors to complete tasks required by the process; and wherein the unique identifier is unique to and is embedded into each media content file and updates periodically, and wherein the electronic device's location changes periodically.
 17. The method of claim 16, wherein the mobile application determines the time and location of the unauthorized use based on the internet protocol address or global positioning system (GPS) location of the auditor, the time auditor accessed or provided information regarding unauthorized use of the media content through the mobile application, or the time picture or video evidence was taken by the auditor.
 18. The method of claim 16, wherein the mobile application comprises a software installed on one of a mobile phone, computer, camera, PDA, optical device and tablet computer.
 19. The method of claim 16, further comprising sending the one or more messages to an individual or business entity with the unauthorized use of the media content informing the individual or the business entity of the unauthorized use or requesting the individual or business to compensate or pay a penalty for the unauthorized use of the media content.
 20. The method of claim 16, wherein the one or more auditors will not be assigned to certain area if a certain number of auditors have already been assigned to that area. 