PREVENTING DISTRUBTION OF MODIFIED OR CORRUPTED FILES
First Claim
1. A method of affecting a trustworthy-measure associated with a source node in a distributed network, comprising:
- receiving an information file from the source node and a corresponding identifying code that is based on content of the information file when the information file is introduced to the network, computing an associated code based on received content of the information file;
comparing the associated code with the identifying code; and
transmitting Fan error report to an administrator node, identifying the source node and the information file, when at least one of the following occur;
the associated code does not correspond to the identifying code, and the content of the information file is abnormal;
thereby facilitating a reduction of the trustworthy-measure associated with the source node.
13 Assignments
0 Petitions
Accused Products
Abstract
An administrator node (130) adjusts a trustworthy-measure associated with nodes (110) that are suspected of unauthorized modifications of content material. The original provider of the content material to a network binds an identifying code to it. Upon receiving the material from a source node (110), a target node (120) computes an associated code for the received material. If the computed code and the identifying code differ, the material is determined to be modified, and a discrepancy report is submitted to the administrator node (130). The administrator node (130) effects a penalty against the root source if the modification is confirmed; or against the target node (120) if the discrepancy report is unfounded. The penalties include downgrading of the trustworthiness-measure associated with each node, and these trustworthiness-measures are available for use by potential target nodes in their selection of preferred source nodes.
25 Citations
29 Claims
-
1. A method of affecting a trustworthy-measure associated with a source node in a distributed network, comprising:
- receiving an information file from the source node and a corresponding identifying code that is based on content of the information file when the information file is introduced to the network, computing an associated code based on received content of the information file;
comparing the associated code with the identifying code; and
transmitting Fan error report to an administrator node, identifying the source node and the information file, when at least one of the following occur;
the associated code does not correspond to the identifying code, and the content of the information file is abnormal;
thereby facilitating a reduction of the trustworthy-measure associated with the source node. - View Dependent Claims (2, 3, 4)
- receiving an information file from the source node and a corresponding identifying code that is based on content of the information file when the information file is introduced to the network, computing an associated code based on received content of the information file;
-
5. A method of facilitating control of distribution of modified or corrupted files in a distributed network, comprising:
- providing a catalog of available files to nodes of the distributed network, the catalog identifying each file of the available files and a corresponding source node of each file, processing an error report from a target node that received a downloaded file from a selected source node, verifying the error report, degrading a trustworthy-measure of at least one node of the distributed network based on a result of verifying the error report, and providing the trustworthy-measure of the at least one node to other nodes of the distributed network.
- View Dependent Claims (6, 7, 8, 9)
-
10. A method of controlling a trustworthy-measure associated with a source node in a distributed network, comprising:
- receiving, from a reporting node, a report of a modification or corruption of an information file by the source node, determining a validity of the report, and degrading the trustworthy-measure associated with the source node when the report is determined to be valid.
- View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
20. A communications network, comprising:
- a plurality nodes, including at least a source node, a target node, and an administrator node, the source node having an information file and a corresponding identifying code based on content of the information file at a prior point in time, the target node being configured to;
receive the information file and identifying code, transmit a discrepancy report based on at least one of;
a discrepancy between the identifying code and a computed code based on received content of the information file, and an abnormality in the information file, and the administrator node being configured to;
receive the discrepancy report, and modify a trustworthy-measure associated with at least one node of the plurality of nodes, based on the discrepancy report. - View Dependent Claims (21, 22, 23, 24)
- a plurality nodes, including at least a source node, a target node, and an administrator node, the source node having an information file and a corresponding identifying code based on content of the information file at a prior point in time, the target node being configured to;
-
25. An administrator node in a communications network comprising a plurality nodes, that is configured to:
- receive a discrepancy report from a reporting node, the discrepancy report identifying a source node and an information file, verify the discrepancy report, and modify a trustworthy-measure associated at least one node of the plurality of nodes, based on whether the discrepancy report is valid.
- View Dependent Claims (26, 27, 28, 29)
Specification