System for distributing decoy content in a peer to peer network
First Claim
Patent Images
1. A method for providing decoy data for a work in a peer to peer network, comprising:
- receiving, by a computing device hosting a peer in the peer to peer network, supplied data for a current work over a peer to peer connection, the supplied data including supplied identifier information of said data for said current work, wherein the supplied identifier information includes a supplied hash code of the data;
generating a feature vector of the current work;
determining whether said current work is a protected work based on a comparison of the feature vector to a plurality of stored feature vectors of protected works;
inserting, by said computing device, said decoy data into said supplied data for the current work to generate modified data for the current work responsive to a determination that said feature vector is similar to one of the plurality of stored feature vectors;
generating new identifier information for said modified data based on said decoy data, the new identifier information including a new hash code of the modified data;
storing said modified data for said current work, including said decoy data, said supplied identifier information and said new identifier information, in a memory, wherein said modified data is associated with the supplied identifier information and said modified data is associated with the new identifier information, wherein the supplied identifier information is used to identify the supplied data in the peer to peer network and the new identifier information is used to identify the modified data in the peer to peer network; and
determining whether to use the supplied identifier information or the new identifier information for said modified data, wherein the determined identifier information identifies the modified data to another processing system.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for generating and distributing decoy data for a work in a Peer to Peer network. The system is included in software providing a Peer to Peer connection for a processing system. The processing system receives data for a work over a Peer to Peer connection. The system then determines whether, the work is a protected work. If the work is a protected work, the system insert decoy data into the data of the work and stores the data of the work including the decoy data in memory. The data of the work including the decoy data is then made available for transfer over the Peer to Peer network by the processing system.
200 Citations
21 Claims
-
1. A method for providing decoy data for a work in a peer to peer network, comprising:
-
receiving, by a computing device hosting a peer in the peer to peer network, supplied data for a current work over a peer to peer connection, the supplied data including supplied identifier information of said data for said current work, wherein the supplied identifier information includes a supplied hash code of the data; generating a feature vector of the current work; determining whether said current work is a protected work based on a comparison of the feature vector to a plurality of stored feature vectors of protected works; inserting, by said computing device, said decoy data into said supplied data for the current work to generate modified data for the current work responsive to a determination that said feature vector is similar to one of the plurality of stored feature vectors; generating new identifier information for said modified data based on said decoy data, the new identifier information including a new hash code of the modified data; storing said modified data for said current work, including said decoy data, said supplied identifier information and said new identifier information, in a memory, wherein said modified data is associated with the supplied identifier information and said modified data is associated with the new identifier information, wherein the supplied identifier information is used to identify the supplied data in the peer to peer network and the new identifier information is used to identify the modified data in the peer to peer network; and determining whether to use the supplied identifier information or the new identifier information for said modified data, wherein the determined identifier information identifies the modified data to another processing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus for providing decoy data for a work in a peer to peer network, comprising:
-
means for receiving supplied data for a current work over a peer to peer connection, the supplied data including supplied identifier information of said supplied data for said current work, wherein the supplied identifier information includes a supplied hash code of the data; means for generating a feature vector of said current work; means for determining whether said current work is a protected work based on a comparison of the feature vector to a plurality of stored feature vectors of protected works; means for inserting said decoy data into said supplied data for said current work to generate modified data for the current work responsive to a determination that said feature vector is similar to one of the plurality of stored feature vectors; means for generating new identifier information for said modified data based on said decoy data, the new identifier information including a new hash code of the modified data; means for storing said modified data for said current work, including said decoy data, said supplied identifier information and said new identifier information in a memory, wherein said modified data is associated with the supplied identifier information and said modified data is associated with the new identifier information, wherein the supplied identifier information is used to identify the supplied data in the peer to peer network and the new identifier information is used to identify the modified data in the peer to peer network; and means for determining whether to use the supplied identifier information or the new identifier information for said modified data, wherein the determined identifier information identifies the modified data to another processing system. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification