CN101288261B - 用于检测对等网络软件的系统和方法 - Google Patents

用于检测对等网络软件的系统和方法 Download PDF

Info

Publication number
CN101288261B
CN101288261B CN2006800209383A CN200680020938A CN101288261B CN 101288261 B CN101288261 B CN 101288261B CN 2006800209383 A CN2006800209383 A CN 2006800209383A CN 200680020938 A CN200680020938 A CN 200680020938A CN 101288261 B CN101288261 B CN 101288261B
Authority
CN
China
Prior art keywords
peer
computer
software
network
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2006800209383A
Other languages
English (en)
Other versions
CN101288261A (zh
Inventor
S·P·霍普金斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kroll Information Assurance Co.,Ltd.
Tiffusa IP Co.
Tifsa Holdings
Original Assignee
Tiversa Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=37087674&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN101288261(B) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Tiversa Inc filed Critical Tiversa Inc
Publication of CN101288261A publication Critical patent/CN101288261A/zh
Application granted granted Critical
Publication of CN101288261B publication Critical patent/CN101288261B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1061Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
    • H04L67/1068Discovery involving direct consultation or announcement among potential requesting and potential source peers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明提供了一种用于检测计算机系统是否参与、已经参与或可以参与对等网络的方法。扫描软件在要扫描的目标系统或将扫描目标系统的远程系统上执行。如果检测到对等客户端软件,那么所述扫描软件可以通知强制用户,禁用所述对等客户端软件,或一并采取这两个操作。

Description

用于检测对等网络软件的系统和方法
技术领域
本发明提供了一种用于检测计算机系统是否参与、已经参与或可以参与对等网络的系统。
背景技术
如这里所用,作为本发明主题的对等网络包括多个节点,每个节点典型情况下由文件服务器和客户端组成,所述文件服务器和客户端可以向或从其所连接的节点发送和接收数据或“通信消息”。
在对等网络中,每个节点直接或通过某种类型的代理经由诸如互联网之类的通信介质连接到其它节点。例如当发布搜索请求时,这种发起节点向其所连接的所有节点发送搜索请求。(参见图1)这些节点搜索它们可用的文件列表并且如果找到匹配,那么它们发回带有位置的响应。然而,对等的代理网络典型情况下由被连接到节点B的节点A组成并且节点B被连接到节点C。(参见图2)节点A并未连接到节点C以致如果节点A发布搜索请求,那么该请求会被转送到节点B并且节点B会搜索其可用的文件并且如果找到匹配,那么它会向节点A发回响应。然后节点B把节点A的请求转送到节点C并且节点C会搜索其可用的文件,并且如果找到匹配那么它会向节点B发回响应。然后节点B把此响应转送到节点A。图3公开了其中每个节点被直接连接到另一节点的无代理环形网络。
一些对等网络利用叶节点/主节点代理拓扑(参见图4),其中一些节点被分类为主节点并且其余节点被分类为叶节点。叶节点只可以连接到主节点。只有主节点可以连接到其它主节点。当叶节点发布搜索请求时,它向其所连接到的主节点发送请求。然后主节点把请求转送到被连接到它的任何其它叶节点以及它所连接到的任何主节点。这些主节点把该请求转送到被连接到它们的任何叶节点。
通常这些网络用来在其用户之间共享音乐、电影和软件文件。为了访问此网络,用户安装能够连接到并且利用对等网络的对等客户端软件应用。当安装所述软件时,用户必须在他们的计算机系统上选择文件夹,其中用于存储任何下载的文件。被置于此文件夹中的任何文件对其它用户也是可用的。例如,如果用户#1把名称为“foofile”的文件放在他们的共享文件夹中,那么用户#2将能够访问并下载所述文件。
对于任何原因来说,用户有时选择包含敏感信息或者他们并不希望共享的信息的文件夹作为共享文件夹,或者他们可能稍后开始错误地把敏感信息或他们并不希望共享的信息放入到他们的共享文件夹中。通常此动作由用户错误地并且未察觉地进行,但是有时这由恶意者来进行。有时对等客户端软件具有软件错误,该软件错误允许共享那些用户从来不想共享的文件和目录。有时它违反了安装对等客户端软件的公司策略。
所共享的信息可能对用户、他们所工作的公司甚至国家安全来说是有害的。因此这对网络管理员或其职责为把信息强制保留为能够利用所安装的对等网络软件来定位计算机的其他人来说是有用的,使得可以评定或删除所述软件。知道对等网络软件是否曾经被安装和利用使得可以进行威胁评定也可能是有益的。
据此本发明的目的是提供一种用于扫描计算机以便查明其是否参与、已经参与或可以参与对等网络的系统。
发明内容
本发明总体上提供一种用于查明计算机是否参与、已经参与或可以参与对等网络的系统。优选的系统包括步骤:
a.在目标计算机上执行软件程序;并且
b.向所述目标计算机扫描对等客户端软件的签名、对等网络通信或从对等网络所获得的文件。
从而本发明提供了一种用于扫描计算机系统以便查明所述计算机是否参与、已经参与或可以参与对等网络的系统。
通过熟读本发明目前优选实施例的以下具体实施方式,本发明的其它优点将变得显而易见。
附图说明
图1是两个节点对等网络的简图;
图2是对等的代理网络的简图;
图3是对等的无代理环形网络的简要示图。
具体实施方式
本发明的优选系统有益地利用扫描软件程序来扫描目标计算机以便寻找参与对等网络的签名、参与对等网络的能力或者它们两个。扫描软件具有确定的优选属性并且为由强制用户所想要的具体类型的对等扫描系统来配置这些属性。
在本发明的一个优选实施例中,在目标计算机上执行软件程序。此软件程序向注册表条目搜寻与已知对等客户端软件匹配的一组具体键或值。如果找到匹配,那么可以通知强制用户,软件程序可以禁用对等客户端软件,或一并采取这两个操作。
在本发明的另一实施例中,在目标计算机上执行软件程序。此软件程序向所述文件和目录搜寻与已知对等客户端软件匹配的一组具体值。如果找到匹配,那么可以通知强制用户,软件程序可以禁用对等客户端软件,或一并采取这两个操作。
在本发明的另一实施例中,在目标计算机上执行软件程序。此软件程序会向目前运行的进程搜寻与已知对等客户端软件匹配的值。如果找到匹配,那么可以通知强制用户,软件程序可以禁用对等客户端软件,或一并采取这两个操作。
在本发明的另一实施例中,在目标计算机上执行软件程序。此软件程序会向文件和目录搜寻为音乐、电影、电子书的文件或者通常从对等网络所获取的其它文件。如果计算机包含具体数目个以上的这些文件,那么可以通知强制用户。
在本发明的另一实施例中,在目标计算机上执行软件程序。此软件程序会监视用于搜寻具体值的网络通信,所述具体值用于表明正进行对等网络通信。如果正进行通信,那么可以通知强制用户,软件程序可以禁用对等网络通信,或一并采取这两个操作。
在本发明的另一实施例中,执行软件程序,所述软件程序扫描目标计算机的TCP/IP端口以搜寻已知的对等网络端口。如果找到匹配,那么可以通知强制用户。
在优选实施例中,在包含处理器部件、主存储器和互连总线的计算机系统中实现本发明。处理器部件可以包含单个微处理器,或可以包含多个微处理器以便把计算机配置为多处理器系统。主存储器部分地存储用于由处理器部件执行的指令和数据。如果所发明系统的能力整个地或部分地用软件实现,那么主存储器存储当处于操作中时的可执行代码。主存储器可以包括动态随机存取存储器以及高速存储器存储体。
计算机系统可以进一步包括海量存储设备、外围设备、便携式存储介质驱动器、输入控制设备、图形子系统和输出显示器。计算机系统可以经由一个或多个数据传送装置连接。例如,处理器部件和主存储器可以经由本地微处理器总线连接,并且海量存储设备、外围设备、便携式存储介质驱动器、图形子系统可以经由一个或多个输入/输出(I/O)总线连接。可以利用磁盘驱动器或光盘驱动器实现的海量存储设备是用于存储供处理器部件使用的数据和指令的非易失性存储设备。在软件实施例中,海量存储设备存储用于加载到主存储器的软件。
输入控制设备向计算机系统的用户提供用户接口的一部分。输入控制设备可以包括用于输入字母数字及其它按键信息的字母数字小键盘、诸如鼠标、轨迹球、触针或光标方向键之类的光标控制设备。为了显示文本和图形信息,计算机系统包含图形子系统和输出显示器。输出显示器可以包括阴极射线管显示器或液晶显示器。图形子系统接收文本和图形信息并且处理所述信息以便输出到所述输出显示器。
在计算机系统中所包含的组件是那些通常在通用计算机系统中所找到的那些,并且实际上这些组件旨在代表这种在本领域中公知的计算机组件的广阔范畴。
所述系统可以用硬件或软件来实现。对于软件实施例来说,所述软件包括用于在通用计算机系统上执行的多个计算机可执行指令。在加载到通用计算机系统中之前,所述系统可以作为所编码的信息位于计算机可读介质上,诸如软磁盘、磁带压缩光盘、只读存储器(CD-ROM)。在一个硬件实施例中,所述系统可以包括专用处理器,其包括用于执行这里所描述功能的处理器指令。还可以开发电路以便执行这里所描述的功能。
例子
以下例子图示了依照本发明系统的各个实施例。
例子1:此例子图示了用于通过检查(review)目标计算机系统的注册表键(refistry key)及其值来检测对等客户端软件的系统。
在此例子中用户已经把对等客户端软件安装到计算机系统#1上。作为其安装和操作一部分的对等客户端软件已经利用“P2PCLIENT_DOWNLOAD_DIR”值创建注册表键。然后在计算机系统#1上执行扫描软件。扫描软件检查计算机系统#1的注册表键,以查找与已知键“P2PCLIENT_DOWNLOAD_DIR”的匹配。找到匹配并且通知网络管理员。扫描软件然后删除注册表键以便禁用对等客户端软件。
例子2:此例子图示了用于通过检查目标计算机系统的文件和目录来检测对等客户端软件的系统。
在此例子中用户已经把对等客户端软件安装到计算机系统#1上。作为其安装一部分的对等客户端软件已经利用“P2P_SOFTWARE”值创建了目录。然后在计算机系统#1上执行扫描软件。扫描软件检查计算机系统#1的文件和目录,以查找与已知目录“P2P_SOFTWARE”的匹配。找到匹配并且通知网络管理员。
例子3:此例子图示了用于通过检查目标计算机系统的文件和目录来检测对等客户端软件的系统,其目录已经在专用网络上共享并且可用于另一远程系统。
在此例子中用户已经把对等客户端软件安装到计算机系统#1上。作为其安装一部分的对等客户端软件已经利用“P2P_SOFTWARE”值创建了目录。然后在远程计算机系统#2上执行扫描软件。扫描软件经由专用网络检查计算机系统#1的文件和目录,以查找与已知目录“P2P_SOFTWARE”的匹配。找到匹配并且通知网络管理员。
例子4:此例子图示了用于通过检查目前正在目标计算机系统上运行的进程来检测对等客户端软件的系统。
在此例子中用户已经把对等客户端软件安装到计算机系统#1上。  当处于操作中时,对等客户端软件已经利用进程名“p2psoftware.exe”向计算机注册。然后在计算机系统#1上执行扫描软件。扫描软件检查计算机系统#1的进程,以查找与已知进程“ p2psoftware.exe”的匹配。找到匹配并且通知网络管理员。
例子5:此例子图示了用于通过检查存在于目标计算机系统上音乐文件数目来检测对等客户端软件的系统。
在此例子中,用户已经把对等客户端软件安装到计算机系统#1上并且已经下载了15个音乐文件。然后在计算机系统#1上执行扫描软件。扫描软件计数位于计算机上的音乐文件数目并且把该数目与一组阈值10相比较。所定位的音乐文件数目超过所设置的阈值并且通知网络管理员。
例子6:此例子图示了用于通过查看在目标计算机系统上正进行的网络通信来检测对等客户端软件的系统。
在此例子中,用户已经把对等客户端软件安装到计算机系统#1上并且被连接到对等网络。在计算机系统#1和对等网络之间的对等协议消息始终以“123456”开始。然后在计算机系统#1上执行扫描软件。对于已知模式“123456”来说,扫描软件监视所有网络通信。找到匹配并且通知网络管理员。
例子7:此例子图示了用于通过查看在目标计算机系统上哪个TCP/IP端口可用来检测对等客户端软件的系统。
在此例子中用户已经把对等客户端软件安装到计算机系统#1上。对等客户端软件目前正在运行并且已经绑定到端口6346以便接受来自其它对等客户端的入站连接。然后在计算机系统#1或远程计算机上执行扫描软件。扫描软件试图连接到目标计算机上的已知端口“6346”。连接成功并且通知网络管理员。

Claims (2)

1.一种用于检测对等网络软件的方法,所述方法包括:
i.检查目标计算机的表明所述目标计算机上安装对等客户端软件的第一特征,其中从由所述目标计算机的注册表键、注册值、所安装的可执行文件、目录和网络通信所组成的组中选择所述第一特征;
ii.把所述目标计算机的所述第一特征与表明所述目标计算机上安装对等客户端软件的第一已知信息相比较,其中所述第一已知信息选择自已知注册表键、已知目录、已知进程、网络通信模式;
iii.通过在所述目标计算机上的对等客户端软件来检查所述目标计算机的音乐、电影、电子书、或通常从对等网络所获取的其它文件;
iv.把经过检查的音乐、电影、电子书、或通常从对等网络所获取的其它文件的数目与预定义的阈值计数进行比较;
v.根据所述第一特征的比较和在步骤iv所进行的比较,确定对等客户端软件已被安装在所述目标计算机上并且文件正被对等网络通信内的目标计算机共享;
vi.按照所述第一特征的比较和在步骤iv所进行的比较,通知网络管理员确定对等客户端软件已被安装在所述计算机上;以及
vii.禁用所述对等网络软件。
2.如权利要求1所述的用于检测对等网络软件的方法,其中所述文件或目录在专用网络上可用。
CN2006800209383A 2005-04-12 2006-04-11 用于检测对等网络软件的系统和方法 Active CN101288261B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/103,818 US9178940B2 (en) 2005-04-12 2005-04-12 System and method for detecting peer-to-peer network software
US11/103,818 2005-04-12
PCT/US2006/013671 WO2006110826A2 (en) 2005-04-12 2006-04-11 System and method for detecting peer-to-peer network software

Publications (2)

Publication Number Publication Date
CN101288261A CN101288261A (zh) 2008-10-15
CN101288261B true CN101288261B (zh) 2013-07-31

Family

ID=37087674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006800209383A Active CN101288261B (zh) 2005-04-12 2006-04-11 用于检测对等网络软件的系统和方法

Country Status (7)

Country Link
US (1) US9178940B2 (zh)
EP (1) EP1872216B1 (zh)
JP (1) JP4657347B2 (zh)
CN (1) CN101288261B (zh)
BR (1) BRPI0607541B1 (zh)
CA (1) CA2604199C (zh)
WO (1) WO2006110826A2 (zh)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4905165B2 (ja) * 2007-02-07 2012-03-28 富士通株式会社 監視支援プログラム、監視方法および監視システム
US9990674B1 (en) 2007-12-14 2018-06-05 Consumerinfo.Com, Inc. Card registry systems and methods
US7886049B2 (en) * 2007-12-21 2011-02-08 Architecture Technology Corporation Extensible software tool for investigating peer-to-peer usage on a target device
US9076342B2 (en) 2008-02-19 2015-07-07 Architecture Technology Corporation Automated execution and evaluation of network-based training exercises
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US8060424B2 (en) 2008-11-05 2011-11-15 Consumerinfo.Com, Inc. On-line method and system for monitoring and reporting unused available credit
US10057298B2 (en) 2011-02-10 2018-08-21 Architecture Technology Corporation Configurable investigative tool
US10067787B2 (en) 2011-02-10 2018-09-04 Architecture Technology Corporation Configurable forensic investigative tool
US9483606B1 (en) 2011-07-08 2016-11-01 Consumerinfo.Com, Inc. Lifescore
US9106691B1 (en) 2011-09-16 2015-08-11 Consumerinfo.Com, Inc. Systems and methods of identity protection and management
US8738516B1 (en) 2011-10-13 2014-05-27 Consumerinfo.Com, Inc. Debt services candidate locator
US9853959B1 (en) 2012-05-07 2017-12-26 Consumerinfo.Com, Inc. Storage and maintenance of personal data
US9654541B1 (en) 2012-11-12 2017-05-16 Consumerinfo.Com, Inc. Aggregating user web browsing data
US9916621B1 (en) 2012-11-30 2018-03-13 Consumerinfo.Com, Inc. Presentation of credit score factors
US9406085B1 (en) 2013-03-14 2016-08-02 Consumerinfo.Com, Inc. System and methods for credit dispute processing, resolution, and reporting
US10102570B1 (en) 2013-03-14 2018-10-16 Consumerinfo.Com, Inc. Account vulnerability alerts
US10685398B1 (en) 2013-04-23 2020-06-16 Consumerinfo.Com, Inc. Presenting credit score information
US10135759B2 (en) 2013-06-12 2018-11-20 Convida Wireless, Llc Context and power control information management for proximity services
JP6348583B2 (ja) 2013-06-21 2018-06-27 コンヴィーダ ワイヤレス, エルエルシー コンテキスト管理
US10791171B2 (en) * 2013-07-10 2020-09-29 Convida Wireless, Llc Context-aware proximity services
US9477737B1 (en) 2013-11-20 2016-10-25 Consumerinfo.Com, Inc. Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules
US10803766B1 (en) 2015-07-28 2020-10-13 Architecture Technology Corporation Modular training of network-based training exercises
US10083624B2 (en) 2015-07-28 2018-09-25 Architecture Technology Corporation Real-time monitoring of network-based training exercises
US10749890B1 (en) 2018-06-19 2020-08-18 Architecture Technology Corporation Systems and methods for improving the ranking and prioritization of attack-related events
US10817604B1 (en) 2018-06-19 2020-10-27 Architecture Technology Corporation Systems and methods for processing source codes to detect non-malicious faults
US11265324B2 (en) 2018-09-05 2022-03-01 Consumerinfo.Com, Inc. User permissions for access to secure data at third-party
US11315179B1 (en) 2018-11-16 2022-04-26 Consumerinfo.Com, Inc. Methods and apparatuses for customized card recommendations
US11429713B1 (en) 2019-01-24 2022-08-30 Architecture Technology Corporation Artificial intelligence modeling for cyber-attack simulation protocols
US11128654B1 (en) 2019-02-04 2021-09-21 Architecture Technology Corporation Systems and methods for unified hierarchical cybersecurity
US11238656B1 (en) 2019-02-22 2022-02-01 Consumerinfo.Com, Inc. System and method for an augmented reality experience via an artificial intelligence bot
US11887505B1 (en) 2019-04-24 2024-01-30 Architecture Technology Corporation System for deploying and monitoring network-based training exercises
US11403405B1 (en) 2019-06-27 2022-08-02 Architecture Technology Corporation Portable vulnerability identification tool for embedded non-IP devices
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US11444974B1 (en) 2019-10-23 2022-09-13 Architecture Technology Corporation Systems and methods for cyber-physical threat modeling
US11503075B1 (en) 2020-01-14 2022-11-15 Architecture Technology Corporation Systems and methods for continuous compliance of nodes

Family Cites Families (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6151643A (en) * 1996-06-07 2000-11-21 Networks Associates, Inc. Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US6298446B1 (en) * 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US6574729B1 (en) * 1999-08-26 2003-06-03 Lucent Technologies Inc. System for remotely identifying and providing information of unknown software on remote network node by comparing the unknown software with software audit file maintained on server
US7281268B2 (en) * 1999-11-14 2007-10-09 Mcafee, Inc. System, method and computer program product for detection of unwanted processes
EP1107512A1 (en) * 1999-12-03 2001-06-13 Sony International (Europe) GmbH Communication device and software for operating multimedia applications
US6920110B2 (en) * 2001-02-14 2005-07-19 Microsoft Corporation System and method for transferring data over a network
US7181743B2 (en) * 2000-05-25 2007-02-20 The United States Of America As Represented By The Secretary Of The Navy Resource allocation decision function for resource management architecture and corresponding programs therefor
US6931550B2 (en) * 2000-06-09 2005-08-16 Aramira Corporation Mobile application security system and method
US20020044549A1 (en) * 2000-06-12 2002-04-18 Per Johansson Efficient scatternet forming
US7089301B1 (en) * 2000-08-11 2006-08-08 Napster, Inc. System and method for searching peer-to-peer computer networks by selecting a computer based on at least a number of files shared by the computer
US20020069098A1 (en) * 2000-08-31 2002-06-06 Infoseer, Inc. System and method for protecting proprietary material on computer networks
US20040003266A1 (en) 2000-09-22 2004-01-01 Patchlink Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US20040039921A1 (en) * 2000-10-17 2004-02-26 Shyne-Song Chuang Method and system for detecting rogue software
US6918113B2 (en) * 2000-11-06 2005-07-12 Endeavors Technology, Inc. Client installation and execution system for streamed applications
US7903822B1 (en) 2000-11-10 2011-03-08 DMT Licensing, LLC. Method and system for establishing a trusted and decentralized peer-to-peer network
US20020073204A1 (en) * 2000-12-07 2002-06-13 Rabindranath Dutta Method and system for exchange of node characteristics for DATA sharing in peer-to-peer DATA networks
US7205029B2 (en) * 2000-12-19 2007-04-17 Basf Corporation Method of providing cured coating films free of popping defects
US7627897B2 (en) * 2001-01-03 2009-12-01 Portauthority Technologies Inc. Method and apparatus for a reactive defense against illegal distribution of multimedia content in file sharing networks
US7197565B2 (en) * 2001-01-22 2007-03-27 Sun Microsystems, Inc. System and method of using a pipe advertisement for a peer-to-peer network entity in peer-to-peer presence detection
WO2002057917A2 (en) * 2001-01-22 2002-07-25 Sun Microsystems, Inc. Peer-to-peer network computing platform
US6983326B1 (en) * 2001-04-06 2006-01-03 Networks Associates Technology, Inc. System and method for distributed function discovery in a peer-to-peer network environment
US7096503B1 (en) * 2001-06-29 2006-08-22 Mcafee, Inc. Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
US7493363B2 (en) * 2001-09-19 2009-02-17 Microsoft Corporation Peer-to-peer group management and method for maintaining peer-to-peer graphs
US20030095660A1 (en) 2001-10-15 2003-05-22 Overpeer, Inc. System and method for protecting digital works on a communication network
US20030093466A1 (en) * 2001-11-15 2003-05-15 Jarman James D. Drag and drop technology for remote control tool
US7392392B2 (en) * 2001-12-13 2008-06-24 Digimarc Corporation Forensic digital watermarking with variable orientation and protocols
US7840663B1 (en) 2001-12-21 2010-11-23 Mcafee, Inc. Desktop security in peer-to-peer networks
JP2005516283A (ja) 2002-01-22 2005-06-02 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ マルチメディアオブジェクトを配信する方法及びシステム
US20030195852A1 (en) * 2002-04-16 2003-10-16 Geoff Campbell System, method, apparatus and means for protecting digital content
US8667103B2 (en) * 2002-04-26 2014-03-04 Hewlett-Packard Development Company, L.P. System and method for message traffic analysis, categorization, and reporting, within a system for harvesting community knowledge
US7571251B2 (en) * 2002-05-06 2009-08-04 Sandvine Incorporated Ulc Path optimizer for peer to peer networks
US7086089B2 (en) * 2002-05-20 2006-08-01 Airdefense, Inc. Systems and methods for network security
US7042852B2 (en) * 2002-05-20 2006-05-09 Airdefense, Inc. System and method for wireless LAN dynamic channel change with honeypot trap
US7277404B2 (en) * 2002-05-20 2007-10-02 Airdefense, Inc. System and method for sensing wireless LAN activity
US6792545B2 (en) * 2002-06-20 2004-09-14 Guidance Software, Inc. Enterprise computer investigation system
JP2004046419A (ja) 2002-07-10 2004-02-12 Nippon Telegr & Teleph Corp <Ntt> コンテンツ照合サーバおよびコンテンツ照合システム
JP4051670B2 (ja) * 2002-08-01 2008-02-27 ソニー株式会社 コンテンツ配信システム及びコンテンツ配信方法並びに端末装置
KR20040013726A (ko) * 2002-08-08 2004-02-14 케이티하이텔 주식회사 온라인 컨텐츠 분배방법 및 장치
US7089552B2 (en) * 2002-08-29 2006-08-08 Sun Microsystems, Inc. System and method for verifying installed software
US7213047B2 (en) * 2002-10-31 2007-05-01 Sun Microsystems, Inc. Peer trust evaluation using mobile agents in peer-to-peer networks
US8037202B2 (en) * 2002-10-31 2011-10-11 Oracle America, Inc. Presence detection using mobile agents in peer-to-peer networks
US7263070B1 (en) * 2002-11-05 2007-08-28 Sprint Spectrum L.P. Method and system for automating node configuration to facilitate peer-to-peer communication
CN1692616B (zh) * 2002-11-15 2011-01-12 国际商业机器公司 对等环境中的网络流量控制
US7296288B1 (en) * 2002-11-15 2007-11-13 Packeteer, Inc. Methods, apparatuses, and systems allowing for bandwidth management schemes responsive to utilization characteristics associated with individual users
CN1417755A (zh) 2002-11-18 2003-05-14 冯鲁民 功能完善且架构简易的智能交通系统体系
US7451217B2 (en) * 2002-12-19 2008-11-11 International Business Machines Corporation Method and system for peer-to-peer authorization
US7318092B2 (en) * 2003-01-23 2008-01-08 Computer Associates Think, Inc. Method and apparatus for remote discovery of software applications in a networked environment
US7769881B2 (en) * 2003-01-24 2010-08-03 Hitachi, Ltd. Method and apparatus for peer-to peer access
US7356709B2 (en) * 2003-01-31 2008-04-08 Microsoft Corporation Systems and methods for deterring software piracy in a volume license environment
US7774495B2 (en) * 2003-02-13 2010-08-10 Oracle America, Inc, Infrastructure for accessing a peer-to-peer network environment
JP3698707B2 (ja) 2003-05-13 2005-09-21 日本電信電話株式会社 トラフィック分離方法並びにトラフィック分離装置、アドレス情報収集ノード及びトラフィック分離システム装置
FR2857763A1 (fr) * 2003-07-18 2005-01-21 Canon Kk Procede d'acces et de partage d'un document numerique dans un reseau de communication p2p
US20050108557A1 (en) * 2003-10-11 2005-05-19 Kayo David G. Systems and methods for detecting and preventing unauthorized access to networked devices
US7660889B2 (en) * 2003-11-18 2010-02-09 Cisco Technology, Inc. Initialization and acquisition of peers in a peers' list in a peer-to-peer network
US7664048B1 (en) * 2003-11-24 2010-02-16 Packeteer, Inc. Heuristic behavior pattern matching of data flows in enhanced network traffic classification
US7325251B1 (en) * 2003-12-16 2008-01-29 Symantec Corporation Method and system to prevent peer-to-peer (P2P) worms
US7543052B1 (en) * 2003-12-22 2009-06-02 Packeteer, Inc. Automatic network traffic discovery and classification mechanism including dynamic discovery thresholds
US7552474B2 (en) * 2004-03-01 2009-06-23 International Business Machines Corporation Detecting the presence of an installation on a data processing system based on the relative storage locations of one or more files
US7877810B2 (en) * 2004-03-02 2011-01-25 Rovi Solutions Corporation System, method and client user interface for a copy protection service
US20060059560A1 (en) * 2004-09-10 2006-03-16 Montulli Louis J Systems and methods for detecting music sharing
US8600113B2 (en) * 2004-11-12 2013-12-03 The University Court Of The University Of St. Andrews System, method and computer program product for video fingerprinting
US7685636B2 (en) * 2005-03-07 2010-03-23 International Business Machines Corporation System, service, and method for enabling authorized use of distributed content on a protected media
EP1861799B8 (en) * 2005-03-09 2014-12-10 HERE Global B.V. Method and system for content search with mobile computing devices
US7162488B2 (en) * 2005-04-22 2007-01-09 Microsoft Corporation Systems, methods, and user interfaces for storing, searching, navigating, and retrieving electronic information
JP4535275B2 (ja) 2005-04-27 2010-09-01 日本電気株式会社 帯域制御装置
JP2006330783A (ja) 2005-05-23 2006-12-07 Nec Corp オーバレイネットワーク生成アプリケーション起動ノード特定装置およびその方法

Also Published As

Publication number Publication date
EP1872216B1 (en) 2018-05-23
CA2604199C (en) 2015-11-24
US9178940B2 (en) 2015-11-03
JP2008536244A (ja) 2008-09-04
EP1872216A4 (en) 2013-01-23
CN101288261A (zh) 2008-10-15
BRPI0607541A2 (pt) 2009-09-15
BRPI0607541B1 (pt) 2019-04-24
CA2604199A1 (en) 2006-10-19
WO2006110826A3 (en) 2007-12-06
EP1872216A2 (en) 2008-01-02
JP4657347B2 (ja) 2011-03-23
WO2006110826A2 (en) 2006-10-19
US20060248525A1 (en) 2006-11-02

Similar Documents

Publication Publication Date Title
CN101288261B (zh) 用于检测对等网络软件的系统和方法
CN102332072B (zh) 用于检测恶意软件和管理恶意软件相关信息的系统和方法
US7697520B2 (en) System for identifying the presence of Peer-to-Peer network software applications
JP6239215B2 (ja) 情報処理装置、情報処理方法及び情報処理プログラム
US9984171B2 (en) Systems and methods for detecting false code
CN103493061B (zh) 用于应对恶意软件的方法和装置
JP4839278B2 (ja) Urlの類似性分析による処理省略判定プログラム、装置
RU2634173C1 (ru) Система и способ обнаружения приложения удалённого администрирования
US20130185800A1 (en) Anti-virus protection for mobile devices
GB2507360A (en) Threat detection through the accumulated detection of threat characteristics
CN101370010A (zh) 用于安全网络浏览的方法及装置
EP2417551B1 (en) Providing information to a security application
CN109948335B (zh) 用于检测计算机系统中的恶意活动的系统和方法
US20070118597A1 (en) Processing proposed changes to data
US7086090B1 (en) Method and system for protecting pervasive devices and servers from exchanging viruses
WO2007069337A1 (ja) 不正通信プログラムの規制システム及びそのプログラム
JP2013109553A (ja) プログラムのホワイトリスト配信装置及び方法
JP2008140102A (ja) 情報処理装置及び漏洩情報判定方法及びプログラム
JP5341695B2 (ja) 情報処理システム、情報処理方法、およびプログラム
CN105700963A (zh) 管理目标计算设备和远程计算设备之间的远程会话
CN101361054B (zh) 识别对等网络软件应用程序的存在的系统
Tabona et al. Intelligence sharing in big data forensics
CN115048533B (zh) 知识图谱构建的方法、装置、电子设备及可读存储介质
Wang et al. VulAware: Towards Massive-Scale Vulnerability Detection in Cyberspace
USRE47628E1 (en) System for identifying the presence of peer-to-peer network software applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180305

Address after: American New York

Patentee after: Kroll Information Assurance Co.,Ltd.

Address before: American Pennsylvania

Patentee before: Tiffusa IP Co.

Effective date of registration: 20180305

Address after: American Pennsylvania

Patentee after: Tiffusa IP Co.

Address before: American Pennsylvania

Patentee before: Tifsa Holdings

Effective date of registration: 20180305

Address after: American Pennsylvania

Patentee after: Tifsa Holdings

Address before: American Pennsylvania

Patentee before: TIVERSA, Inc.

TR01 Transfer of patent right