System for distributing decoy content in a peer to peer network
First Claim
1. A method for providing decoy data for a work in a peer to peer network:
- receiving data for a work over a peer to peer connection;
determining whether said work is a protected work;
inserting decoy data into said data of said work responsive to a determination said work is a protected work;
storing said data including said decoy data of said work in a memory.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for generating and distributing decoy data for a work in a Peer to Peer network. The system is included in software providing a Peer to Peer connection for a processing system. The processing system receives data for a work over a Peer to Peer connection. The system then determines whether, the work is a protected work. If the work is a protected work, the system insert decoy data into the data of the work and stores the data of the work including the decoy data in memory. The data of the work including the decoy data is then made available for transfer over the Peer to Peer network by the processing system.
-
Citations
39 Claims
-
1. A method for providing decoy data for a work in a peer to peer network:
-
receiving data for a work over a peer to peer connection;
determining whether said work is a protected work;
inserting decoy data into said data of said work responsive to a determination said work is a protected work;
storing said data including said decoy data of said work in a memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus for providing decoy data for a work in a peer to peer network:
-
means for receiving data for a work over a peer to peer connection;
means for determining whether said work is a protected work;
means for inserting decoy data into said data of said work responsive to a determination said work is a protected work;
means for storing said data including said decoy data of said work in a memory. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A product for providing decoy data for a work in a peer to peer network from a processing system connected to said network comprising:
-
Instructions for directing a processing unit to;
receive data for a work over a peer to peer connection, determine whether said work is a protected work, insert decoy data into said data of said work responsive to a determination said work is a protected work,and store said data including said decoy data of said work in a memory; and
a media readable by said processing unit to store said instructions. - View Dependent Claims (28, 29, 30, 31, 32, 33, 35, 36, 37, 38, 39)
-
-
34. The product of claim 34 wherein said instructions to determine whether said work is a protected work comprise:
-
instructions for directing said processing unit to;
compare said identity of said work to a list of protected works responsive to a determination of said identity of said work, and determine said work is a protected work responsive to said identity being on said list of protected works.
-
Specification