Interdiction of unauthorized copying in a decentralized network
First Claim
1. A system for interdicting unauthorized copying in a decentralized network comprising:
- a plurality of software agents masquerading as nodes in a decentralized network; and
a query matcher that receives search results from the plurality of software agents, and reports matches of the search results with protected files back to the plurality of software agents so that the software agents can interdict unauthorized copying of the protected files in the decentralized network.
3 Assignments
0 Petitions
Accused Products
Abstract
An interdiction system includes software agents masquerading as nodes in a decentralized network, a query matcher that receives search results captured by the software agents and reports matches with protected files back to the software agents, and a central coordinating authority that coordinates activities of the software agents by sending instructions to the software agents specifying actions to be taken. Possible activities and related interdicting methods include manipulating search results before forwarding them on in the network, quarantining selected nodes in the network, performing file impersonations such as transferring synthesized decoys, performing file transfer attenuation, and hash spoofing.
-
Citations
70 Claims
-
1. A system for interdicting unauthorized copying in a decentralized network comprising:
-
a plurality of software agents masquerading as nodes in a decentralized network; and
a query matcher that receives search results from the plurality of software agents, and reports matches of the search results with protected files back to the plurality of software agents so that the software agents can interdict unauthorized copying of the protected files in the decentralized network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method for interdicting unauthorized copying in a decentralized network, comprising:
-
infiltrating a decentralized network with a plurality of software agents masquerading as nodes so as to intercept communications related to search queries;
identifying references to protected files in the communications; and
interdicting unauthorized copying of the protected files with respect to the communications. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A method for interdicting unauthorized copying in a decentralized network, comprising:
- interposing one or more software agents resembling nodes between a client node and neighboring nodes of the client node in a decentralized network such that all communications related to search queries must pass through the one or more software agents so as to allow the one or more software agents to interdict unauthorized copying by the client node in the decentralized network.
- View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
Specification