RU2013150147A - Method of protecting intellectual property in pyring networks - Google Patents

Method of protecting intellectual property in pyring networks Download PDF

Info

Publication number
RU2013150147A
RU2013150147A RU2013150147/08A RU2013150147A RU2013150147A RU 2013150147 A RU2013150147 A RU 2013150147A RU 2013150147/08 A RU2013150147/08 A RU 2013150147/08A RU 2013150147 A RU2013150147 A RU 2013150147A RU 2013150147 A RU2013150147 A RU 2013150147A
Authority
RU
Russia
Prior art keywords
database
content
ss
network
method according
Prior art date
Application number
RU2013150147/08A
Other languages
Russian (ru)
Inventor
Кирилл Николаевич Сафонов
Александр Николаевич Сафонов
Original Assignee
Кирилл Николаевич Сафонов
Александр Николаевич Сафонов
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Кирилл Николаевич Сафонов, Александр Николаевич Сафонов filed Critical Кирилл Николаевич Сафонов
Priority to RU2013150147/08A priority Critical patent/RU2013150147A/en
Publication of RU2013150147A publication Critical patent/RU2013150147A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks

Abstract

1. The method of registering the misuse of intellectual property rights, implemented using a network sensor containing server equipment, a database of protected content, an IP address database and a network interface, while the hardware implements the service software for performing the following main steps of the method: network sensor protection of intellectual property in peer-to-peer networks (SS ZIPSPS) collects active torrent links; SS ZIPSPS establishes the correspondence of data files, p posted on the peer-to-peer network to the corresponding copyrighted content from the database; SS ZIPSS registers and documents the violation of the legal rights of the copyright holders; records the violation of the terms of use is recorded using a network sensor, register the fact of unlicensed downloading / distribution of the content of the copyright holder, and also identify the IP address of the sider / licher; allowed and prohibited options for using licensed content are recorded in the Database (DB) of the network sensor for each instance and licensed content; .registriruyut the IP-address of the user's computer in the network the sensor database, in the corresponding table of addresses of violators; inform Internet service providers and right holders about the violation detected exceptional prav.2. The method according to claim 1, in which additionally notify violators of the unlawful use of someone else's intellectual property using advertising platforms. The method according to claim 2, in which a message is sent to the attacker at the appropriate IP address with a proposal to stop the wrongdoing

Claims (14)

1. The method of registering the misuse of intellectual property rights, implemented using a network sensor containing server hardware, a database of protected content, an IP address database and a network interface, while the hardware implements the service software for performing the following main steps of the method:
a network sensor for protecting intellectual property in peer-to-peer networks (SS ZIPSS) collects active torrent links;
SS ZIPSPS establishes the correspondence of data files located on a peer-to-peer network to the corresponding copyrighted content from the database;
SS ZIPSPS registers and documents the violation of the legal rights of copyright holders;
record violation of the terms of use, record it with a network sensor, register the fact of unlicensed downloading / distribution of content of the copyright holder, and also identify the IP address of the sider / license;
allowed and prohibited use cases of licensed content are recorded in the Database (DB) of the network sensor for each instance of licensed content ;.
register the IP address of the user's computer in the database of the network sensor in the corresponding table of addresses of violators;
inform Internet service providers and copyright holders of a reported violation of exclusive rights.
2. The method according to claim 1, in which additionally notify violators of the unlawful use of someone else's intellectual property using advertising platforms.
3. The method according to claim 2, in which a message is sent to the attacker at the appropriate IP address with a proposal to stop the misuse of intellectual property.
4. The method according to claim 3, in which, by agreement with the copyright holder, the message contains an offer of payment and / or purchase of rights to the corresponding work.
5. The method according to claim 1, in which the SS ZIPSPS checks the data files transmitted through the peer-to-peer network for the content of intellectual property rights in them.
6. The method according to claim 1, in which the SS ZISPS establishes a connection with the torrent network acting as a client of the network and downloads files, connects to the torrent tracker at the address specified in the torrent file, tells it its address and the hash sum of the torrent file and in response receives the addresses of other clients downloading or distributing content.
7. The method according to claim 1, in which the downloaded segment of the data file is stored in temporary storage on a network sensor.
8. The method according to claim 1, in which the SS ZISPS checks the checksum of the data file segment, while if the checksum matches the checksum stored in the torrent file, the segment is considered loaded successfully and without errors, otherwise the data file segment is re-placed in queue for download, establish a connection with the sider and reload into temporary storage.
9. The method according to claim 1, in which the SS ZIPSPS verifies the content contained in the segment obtained from the active links of the file from the database content of the network filter with licensing conditions for each instance.
10. The method according to claim 1, in which the SS ZISPS searches by the hash sum of the received file segment, text data extracted from the downloaded file, the name of the downloaded file, evaluate the relevance of the analyzed downloaded file to the content element from the database of the network sensor, then with more relevance 95% of the content is recognized as equivalent to the content element from the database of the network sensor, and using the network sensor, the conditions for the distribution and use of this content element are checked under the license conditions of the copyright holder d.
11. The method according to claim 10, in which the SS ZISPS compares and performs the calculation of relevance for such information as: hash-sum of documents (file or file segments); file name and extension; metadata, tags, service information contained in compared documents, etc. An example of compared metadata is an ID3 signature used in audio files in MP3 format and containing data on the name of the track, album, artist name, etc.
12. The method according to claim 11, in which the SS ZISPS provided that at the first stage it was not possible to establish the correspondence of the downloaded file to any of the database elements of the content of the network sensor, analyze the audio files, audio tracks.
13. The method according to item 12, in which the SS ZISPS performs the comparison step, provided that the downloaded file contains a video sequence, and in the previous steps it was not possible to establish the correspondence of the downloaded file to any of the database sensor contents of the network sensor.
14. The method according to item 13, in which the SS ZIPSPS verifies the corresponding graphic images (video materials and pictures) compares with the licensed materials the database of the network sensor.
RU2013150147/08A 2013-11-11 2013-11-11 Method of protecting intellectual property in pyring networks RU2013150147A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
RU2013150147/08A RU2013150147A (en) 2013-11-11 2013-11-11 Method of protecting intellectual property in pyring networks

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
RU2013150147/08A RU2013150147A (en) 2013-11-11 2013-11-11 Method of protecting intellectual property in pyring networks
PCT/RU2013/001032 WO2015069134A1 (en) 2013-11-11 2013-11-18 Method for protecting intellectual property in peer-to-peer networks

Publications (1)

Publication Number Publication Date
RU2013150147A true RU2013150147A (en) 2015-05-20

Family

ID=53041796

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2013150147/08A RU2013150147A (en) 2013-11-11 2013-11-11 Method of protecting intellectual property in pyring networks

Country Status (2)

Country Link
RU (1) RU2013150147A (en)
WO (1) WO2015069134A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU191682U1 (en) * 2019-05-29 2019-08-15 Общество с ограниченной ответственностью "СМАРТ ЭНДЖИНС СЕРВИС" System for purchasing digital content using a mobile device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2903512B1 (en) * 2006-07-10 2008-10-10 Trident Media Guard Tmg Sa Method for controlling the illicit diffusion of protected works and computer system for implementing a method
US20080066181A1 (en) * 2006-09-07 2008-03-13 Microsoft Corporation DRM aspects of peer-to-peer digital content distribution
US20100263048A1 (en) * 2009-04-14 2010-10-14 Chih-Jen Chang Malware prevention method and system in a peer-to-peer environment
EP2715595A4 (en) * 2011-05-31 2014-10-29 Robert Steele System to identify multiple copyright infringements and collecting royalties
US8880603B2 (en) * 2011-06-07 2014-11-04 Interdigital Patent Holdings, Inc. Peer to peer (P2P) operation by integrating with content delivery networks (CDN)

Also Published As

Publication number Publication date
WO2015069134A1 (en) 2015-05-14

Similar Documents

Publication Publication Date Title
Biddle et al. The darknet and the future of content protection
US9223988B1 (en) Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components
CN101043319B (en) Digital content protective system and method
CN105760716B (en) Digital certificates management
Moore et al. The impact of incentives on notice and take-down
Gibler et al. Adrob: Examining the landscape and impact of android application plagiarism
MX2009002290A (en) Drm aspects of peer-to-peer digital content distribution.
CN1470972A (en) System and method for providing key operation of safety server
WO2007106902A3 (en) Identifying unauthorized access to a network resource
WO2008076520A3 (en) Digital rights management copy sharing system and method
SG171651A1 (en) Digital rights management using trusted processing techniques
WO2007106687A3 (en) Role aware network security enforcement
CN101196970A (en) Digital copyright management system based on digital watermarking and mobile proxy
Seng The state of the discordant union: An empirical analysis of DMCA takedown notices
Weissbacher et al. Why is CSP failing? Trends and challenges in CSP adoption
Mendel et al. Global survey on internet privacy and freedom of expression
US20130007870A1 (en) Systems for bi-directional network traffic malware detection and removal
US20130007882A1 (en) Methods of detecting and removing bidirectional network traffic malware
US20080288411A1 (en) Methods, media, and systems for tracking and encrypting content usage
US7653940B2 (en) Tracing and identifying piracy in wireless digital rights management system
KR20120102450A (en) Method and apparatus for managing contents to sharing contents among devices
JP6155521B2 (en) Detect and prevent illegal purchases of content on the Internet
Sedayao Enhancing cloud security using data anonymization
CN102073826A (en) System and method for digital copyright management using lightweight digital watermark adding component
CN102184351A (en) Content reading system and content reading method

Legal Events

Date Code Title Description
FA92 Acknowledgement of application withdrawn (lack of supplementary materials submitted)

Effective date: 20150629