. . "Rather than prohibiting all P2P or other applications based on a particular protocol, these systems filter out infringing transmissions by matching them against a master database." . .