EARLY DETECTION OF HIGH VOLUME PEER-TO-PEER SWARMS
First Claim
1. An early identification system for high volume swarms involved in distribution of a target asset on a peer-to-peer network, comprising:
- a data feed of peer-to-peer swarm activity involving distribution of peer-to-peer content, wherein said data feed provides swarm data;
an analytics section stored on a computer readable medium with executable code, said analytics section establishing thresholds and processing the swarm data, wherein said high volume swarms are each identified as those having a number of unique peers involved in said distribution of the target asset such that the number of unique peers exceeds said threshold.
3 Assignments
0 Petitions
Accused Products
Abstract
Early detection of high volume swarms in a peer-to-peer network, including a data feed of peer-to-peer swarm activity, and an analytics engine processing the data feed and identifying the high volume swarms that have parameters that exceed a threshold. The system can include a pre-processing section for conditioning the swarm data for the analytics section. There can also be a verification section that confirms that the peer download file matches the target file. The early detection provides for enhanced anti-piracy efforts, improved allocation of network resources, and better business decision-making.
34 Citations
20 Claims
-
1. An early identification system for high volume swarms involved in distribution of a target asset on a peer-to-peer network, comprising:
-
a data feed of peer-to-peer swarm activity involving distribution of peer-to-peer content, wherein said data feed provides swarm data; an analytics section stored on a computer readable medium with executable code, said analytics section establishing thresholds and processing the swarm data, wherein said high volume swarms are each identified as those having a number of unique peers involved in said distribution of the target asset such that the number of unique peers exceeds said threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer readable medium having computer executable instructions providing a method of identifying high risk swarms involved in unauthorized distribution of a target asset, comprising;
-
retrieving swarm data, wherein said swarm data is involved in downloading of an alleged target asset; setting a threshold at a static number if there is an inadequate amount of swarm data; updating said threshold based on if there is sufficient swarm data; flagging alleged high risk swarms as those that exceed said threshold; and verifying that the alleged high risk swarms are the high risk swarms involved in the download of the target asset. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification