System and method for creating a list of shared information on a peer-to-peer network
First Claim
1. A method comprising:
- obtaining one or more searches from one or more messages broadcast on a Peer-to-Peer network;
determining if the one or more obtained searches match one or more criteria, in which the one or more criteria is one of;
a predefined keyword, set of keywords, or a subset of keywords that is indicative of a suspicious individual who is searching for information referring to an individual organization, group, or other identifiable entity;
in response to determining that the one or more obtained searches match the one or more criteria;
updating the one or more criteria to include variations of the one or more obtained searches, the variations of the one or more obtained searches including account punctuation, pluralization, and other variations of the one or more searches,issuing one or more new searches to the Peer-to-Peer network based on the updated criteria, the one or more new searches being different from the one or more obtained searches,determining resultant information associated with the one or more new searches, andcreating a list of the resultant information for analysis, the resultant information comprising one or more of;
an organization'"'"'s name, information related to the organization, an individual'"'"'s name, information related to the individual; and
in response to determining that the one or more obtained searches do not match the one or more criteria, monitoring the Peer-to-Peer network for other searches.
8 Assignments
0 Petitions
Accused Products
Abstract
Today information Peer-to-Peer networks sometimes share improper information. Embodiments of the invention solve this problem by creating a list of shared information for analysis. In particular, a method or corresponding apparatus of an example embodiment includes a network node to obtain one or more searches from a Peer-to-Peer network. Next, the network node compares the one or more searches to one or more criteria. After comparing, the network node updates the one or more criteria to include variations of the one or more searches. Further, the network node issues the one or more searches based on the updated criteria. Next, the network node determines resultant information associated with the one or more searches. After determining, the network node creates a list of the resultant information for analysis. Using the list, an operator or software logic can analyze the resultant information to identify patterns and, in turn, identify improper information sharing.
147 Citations
14 Claims
-
1. A method comprising:
-
obtaining one or more searches from one or more messages broadcast on a Peer-to-Peer network; determining if the one or more obtained searches match one or more criteria, in which the one or more criteria is one of;
a predefined keyword, set of keywords, or a subset of keywords that is indicative of a suspicious individual who is searching for information referring to an individual organization, group, or other identifiable entity;in response to determining that the one or more obtained searches match the one or more criteria; updating the one or more criteria to include variations of the one or more obtained searches, the variations of the one or more obtained searches including account punctuation, pluralization, and other variations of the one or more searches, issuing one or more new searches to the Peer-to-Peer network based on the updated criteria, the one or more new searches being different from the one or more obtained searches, determining resultant information associated with the one or more new searches, and creating a list of the resultant information for analysis, the resultant information comprising one or more of;
an organization'"'"'s name, information related to the organization, an individual'"'"'s name, information related to the individual; andin response to determining that the one or more obtained searches do not match the one or more criteria, monitoring the Peer-to-Peer network for other searches. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network node to execute instructions for computer program code to create a list of searched information on a Peer-to-Peer network, comprising:
a network node containing computer program code configured to; (1) obtain one or more searches from one or more messages broadcast on a Peer-to-Peer network; (2) determine if the one or more obtained searches match one or more criteria, in which the one or more criteria is one of;
a predefined keyword, set of keywords, or a subset of keywords that is indicative of a suspicious individual who is searching for information referring to an individual, organization, group, or other identifiable entity;(3) in response to determining that the one or more obtained searches match the one or more criteria; update the one or more criteria to include variations of the one or more obtained searches by employing account punctuation, pluralization, and other variations of the searches to update the one or more criteria, issue one or more new searches to the Peer-to-Peer network based on the updated criteria, the one or more new searches being different from the one or more obtained searches, determine resultant information associated with the one or more new searches, and create a list of the resultant information in a database, the resultant information comprising one or more of;
an organization'"'"'s name, information related to the organization, an individual'"'"'s name, information related to the individual; and(4) in response to determining that the one or more obtained searches do not match the one or more criteria, monitor the Peer-to-Peer network for other searches. - View Dependent Claims (9, 10, 11, 12, 13)
-
14. A non-transitory carrier medium comprising a computer storage medium having computer readable code for controlling a processor to ensure execution of postprocessing logic for a subject computer program routine, by:
-
obtaining one or more searches from one or more messages broadcast on a Peer-to-Peer network; determining if the one or more obtained searches match one or more criteria, in which the one or more criteria is one of;
a predefined keyword, set of keywords, or a subset of keywords that is indicative of a suspicious individual who is searching for information referring to an individual, organization, group, or other identifiable entity;in response to determining that the one or more obtained searches match the one or more criteria, updating the one or more criteria to include variations of the one or more obtained searches, the variations of the one or more obtained searches including account punctuation, pluralization, and other variations of the one or more searches, issuing one or more new searches to the Peer-to-Peer network based on the updated criteria, the one or more new searches being different from the one or more obtained searches, determining resultant information associated with the one or more new searches, and creating a list of the resultant information for analysis, the resultant information comprising one or more of;
an organization'"'"'s name, information related to the organization, an individual'"'"'s name, information related to the individual; andin response to determining that the one or more obtained searches do not match the one or more criteria, monitor the Peer-to-Peer network for other searches.
-
Specification