Welcome,

Protect my content


Products for File Tracking and Identification Companies

The Global File Registry database contains file identifiers (file hashes, URLs, content IDs, etc.) for millions of data items which content owners would like taken down from GFR-integrated web site, search engines and P2P networks.

Broadly, there are three ways in which those unique identifiers can make their way into the Global File Registry database:

  1. For single or low-volume data items, the content owner may log into Global File Registry and manually enter the unique identifiers of their files which they find on P2P networks, etc. For instance, if Microsoft was concerned about pirated copies on Windows XP being available on eMule, they could simply run eMule, search for “Windows XP” and, once they’ve identified that the file is a pirated copy, simply copy and paste its filehash into Global File Registry BackOffice – easy.
  2. This manual “search, find and take down” approach is of course best suited to content owners who have few, and likely valuable, files which they want to actively police.

  3. Content owners who have more files they want to police than can reasonably be done manually, they’re able to set up their own in-house systems to routinely monitor P2P networks, search engines, etc., for their content. For instance, it’s fairly easy to have an automated script search torrent sites for certain keywords, then examine the contents of the torrent files that come up in search results. If the resulting files match certain keywords and are a certain size, they’re may be infringing. The company may then use manual or automated methods of verifying that the file is indeed one they own the copyright to, and is being distributed without their permission. The company can then use our Web Services Interface to ‘push’ the file identifiers for those files into the Global File Registry database, ensuring that within 48 hours those files will be removed from GFR-supported web sites, search engines and P2P applications.
  4. For companies who lack the technology, resources or time to implement these automated “search, find, take down” procedures in-house, they’re welcome to outsource this function to companies who specialize in this – which is where you come in…

  5. If your company provides specialist content identification services – such as audio or video fingerprint recognition – or provides services which search the internet for infringing files, then Global File Registry is the partner who can “close the loop” in your content recognition business, giving you the means to provide an end-to-end content recognition and take-down service to your clients.

“Hash For Cash”
Suitable for companies which provide audio, video and/or image recognition software services, or who provide services which search the internet for infringing content.
If that’s you, then we should be talking. You supply the file hashes, we take down files with those hashes. That’s why we call it “hash for cash”.

Key features:

  • Content owners come to you, asking you to police a given set of networks for infringing copies of their files.
  • You use your data mining and/or file identification systems and technology to create a list of Unique Identifiers (file hashes, URLs, or content management system IDs, as appropriate) of infringing files.
  • Using our SOAP Web Services Interface, you ‘push’ those Unique Identifiers into Global File Registry BackOffice.
  • We feed those identifiers to the relevant supporting web sites, search engines and P2P networks, such that those files are filtered out from those networks.

This package is available to qualified file tracking & identification partners


Products : Products for File Tracking and Identification Companies