Preventing distribution of modified or corrupted files
First Claim
1. A method of affecting a trustworthy-measure associated with a source node in a distributed network, the method comprising:
- receiving an information file from the source node and a corresponding identifying code that is based on content of the information file when the information file is introduced to the network, and computing an associated code based on received content of the information file;
comparing the associated code with the identifying code;
transmitting an error report to an administrator node, the error report identifying the source node and the information file, when at least one of the following occur;
the associated code does not correspond to the identifying code, and the content of the information file is abnormal;
verifying the error report by the administrator node; and
reducing the value of the trustworthy-measure associated with the source node in response to the administrator node verifying the error report, thereby providing the reduced-value trustworthy measure for evaluating subsequent use of the source node;
wherein transmitting an error report includes transmitting an error report in response to the step of comparing indicating that a difference between the associated code and the identifying code is not caused by a communication error, andfurther including;
repeating the receiving, computing, and comparing steps prior to transmitting the error report.
13 Assignments
0 Petitions
Accused Products
Abstract
An administrator node (130) adjusts a trustworthy-measure associated with nodes (110) that are suspected of unauthorized modifications of content material. The original provider of the content material to a network binds an identifying code to it. Upon receiving the material from a source node (110), a target node (120) computes an associated code for the received material. If the computed code and the identifying code differ, the material is determined to be modified, and a discrepancy report is submitted to the administrator node (130). The administrator node (130) effects a penalty against the root source if the modification is confirmed; or against the target node (120) if the discrepancy report is unfounded. The penalties include downgrading of the trustworthiness-measure associated with each node, and these trustworthiness-measures are available for use by potential target nodes in their selection of preferred source nodes.
23 Citations
20 Claims
-
1. A method of affecting a trustworthy-measure associated with a source node in a distributed network, the method comprising:
-
receiving an information file from the source node and a corresponding identifying code that is based on content of the information file when the information file is introduced to the network, and computing an associated code based on received content of the information file; comparing the associated code with the identifying code; transmitting an error report to an administrator node, the error report identifying the source node and the information file, when at least one of the following occur;
the associated code does not correspond to the identifying code, and the content of the information file is abnormal;verifying the error report by the administrator node; and
reducing the value of the trustworthy-measure associated with the source node in response to the administrator node verifying the error report, thereby providing the reduced-value trustworthy measure for evaluating subsequent use of the source node;wherein transmitting an error report includes transmitting an error report in response to the step of comparing indicating that a difference between the associated code and the identifying code is not caused by a communication error, and further including;
repeating the receiving, computing, and comparing steps prior to transmitting the error report. - View Dependent Claims (2, 18, 19)
-
-
3. A method of facilitating control of distribution of modified or corrupted files in a distributed network, the method comprising:
-
providing a catalog of available files to nodes of the distributed network, the catalog identifying each file of the available files and a corresponding source node of each file, processing an error report from a target node that received a downloaded file from a selected source node, verifying the error report, degrading a trustworthy-measure of at least one node of the distributed network based on a result of verifying the error report, and providing the trustworthy-measure of the at least one node to other nodes of the distributed network; wherein verifying the error report is based upon an identifying code corresponding to an original version of the downloaded file, and verifying the error report includes receiving the downloaded file from the selected source node by an administrator node, computing a verification code based on content of the downloaded file received by the administrator node, comparing the verification code with the identifying code, and verifying the error report when the verification code does not correspond to the identifying code. - View Dependent Claims (4)
-
-
5. A method of controlling a trustworthy-measure associated with a source node in a distributed network, the method comprising:
-
receiving, from a reporting node, a report of a modification or corruption of an information file by the source node, determining a validity of the report, and degrading the trustworthy-measure associated with the source node when the report is determined to be valid; wherein determining the validity of the report includes notifying the source node of the report, and assessing a response from the source node to determine the validity of the report; and wherein receiving a report of a modification or corruption of an information file by the source node includes receiving a report that the modification or corruption was not caused by a communication error, and assessing the response includes;
determining that the report is valid if the response is a null-response, or an admittance of effecting the modification or corruption of the information, and revising the report to identify an alternative source of the modification or corruption of the information, if the response includes an acknowledgement of the modification or corruption. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A communications network, comprising:
-
a plurality of nodes, including at least a source node, a target node, and an administrator node, the source node having an information file and a corresponding identifying code based on content of the information file at a prior point in time, the target node being configured to;
receive the information file and identifying code, transmit a discrepancy report based on at least one of;
a discrepancy between the identifying code and a computed code based on received content of the information file, and an abnormality in the information file, andthe administrator node being configured to;
receive the discrepancy report, verify validity of the discrepancy report, and modify a trustworthy-measure associated with at least one node of the plurality of nodes in response to verifying the validity of the discrepancy report;wherein the administrator node is further configured to verify validity of the discrepancy report prior to modifying the trustworthy-measure by verifying that the discrepancy report is indicative of a modification or corruption of an information file by the source node that is not based upon a communication error. - View Dependent Claims (11, 12, 13)
-
-
14. An administrator node in a distributed communications network for exchanging information files among a plurality of nodes, the administrator node configured to:
- receive a discrepancy report from a reporting node, the discrepancy report identifying a source node and an information file, verify the discrepancy report, and modify a trustworthy-measure associated at least one node of the plurality of nodes, based on whether the discrepancy report is valid; and
wherein the discrepancy report is based on a comparison of a code computed by the reporting node to an identifying code corresponding to contents of the information file at a prior time to determine that the discrepancy report identifies a discrepancy that is not due to a communication error, the administrator node is configured to verify the discrepancy report by;
receiving the information file from the source node, and determining a verification code based on received content of the information file, and comparing the verification code to the identifying code. - View Dependent Claims (15, 16, 17)
- receive a discrepancy report from a reporting node, the discrepancy report identifying a source node and an information file, verify the discrepancy report, and modify a trustworthy-measure associated at least one node of the plurality of nodes, based on whether the discrepancy report is valid; and
-
20. A method of facilitating control of distribution of modified or corrupted files in a distributed network, the method comprising:
-
providing a catalog of available files to nodes of the distributed network, the catalog identifying each file of the available files and a corresponding source node of each file, processing an error report from a target node that received a downloaded file from a selected source node, verifying the error report, degrading a trustworthy-measure of at least one node of the distributed network based on a result of verifying the error report, and providing the trustworthy-measure of the at least one node to other nodes of the distributed network; wherein verifying the error report includes determining an originator node responsible for modifications to the downloaded file giving rise to the error report, wherein determining the originator node includes notifying the selected source node, and assessing a response from the selected source node to determine the validity of the error report; and wherein assessing the response includes determining that the error report is valid if the response is a null-response or an admittance of causing the modifications to the downloaded file, and revising the report to identify an alternative source of the modifications to the downloaded file if the response includes an acknowledgement of the modifications.
-
Specification