Method and system for content detection and interception in communication networks
First Claim
1. A system comprising:
- at least one processor;
a computer readable memory having program code stored thereon that is executable by said processor to cause the system to perform operations comprising;
detecting at least one message being transferred over a network using according to a predetermined protocol;
generating a payload digital signature based on a payload of said message, wherein said payload digital signature includes a portion of said payload of said message;
obtaining at least one file content digital signature generated based on content of at least one respective content file, wherein said file content digital signature includes a portion of said at least one respective content file;
comparing said file content digital signature with said payload digital signature to determine that a match exists between said file content digital signature and said payload digital signature, and based at least partly on the match existing, determining that a network transmission associated with the at least one message corresponds to an unauthorized copying of copyrighted material of said content of said at least one respective content file; and
based on the network transmission corresponding to the unauthorized copying of copyrighted material, sending a corrupted version of said message to a recipient of said message.
3 Assignments
0 Petitions
Accused Products
Abstract
A system in which data signatures are used to identify copyrighted content passing through a network. The data signatures are derived from files containing copyrighted content to be identified. The signatures are used to search within peer-to-peer data streams flowing through one or more network nodes in a communications network. Any specific technique may be used for pattern recognition between the signatures and the monitored traffic. When a particular file of interest is identified, the system may operate to perform one or more of several possible actions, including stopping the transmission, allowing the transmission but recording the event, making an offer to the recipient allowing them to legally purchase the file, or sending alternative information or intentionally corrupting the information to render it useless to the recipient.
17 Citations
17 Claims
-
1. A system comprising:
-
at least one processor; a computer readable memory having program code stored thereon that is executable by said processor to cause the system to perform operations comprising; detecting at least one message being transferred over a network using according to a predetermined protocol; generating a payload digital signature based on a payload of said message, wherein said payload digital signature includes a portion of said payload of said message; obtaining at least one file content digital signature generated based on content of at least one respective content file, wherein said file content digital signature includes a portion of said at least one respective content file; comparing said file content digital signature with said payload digital signature to determine that a match exists between said file content digital signature and said payload digital signature, and based at least partly on the match existing, determining that a network transmission associated with the at least one message corresponds to an unauthorized copying of copyrighted material of said content of said at least one respective content file; and based on the network transmission corresponding to the unauthorized copying of copyrighted material, sending a corrupted version of said message to a recipient of said message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
detecting, by a computer system, at least one message being transferred over a network according to a predetermined protocol; generating, by the computer system, a payload digital signature based on a payload of said message, wherein said payload digital signature includes a portion of said payload of said message; obtaining, by the computer system, at least one file content digital signature based on content of at least one respective content file, wherein said file content digital signature includes a portion of said at least one respective file; comparing, by the computer system, said file content digital signature with said payload digital signature to determine that a match exists between said file content digital signature and said payload digital signature, and based at least partly on the match existing, determining that a network transmission associated with the at least one message corresponds to an unauthorized copying of copyrighted material of said content of said at least one respective content file; and based on the network transmission corresponding to the unauthorized copying of the copyrighted material, the computer system sending a corrupted version of said message to a recipient of said message. - View Dependent Claims (15, 16, 17)
-
Specification