Unauthorized content detection for information transfer
A purposeful, computer-based technique used in the field of unauthorized image detection to solve problems such as false positives
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] Referring to FIG. 1, a diagram of a packet switch and other components according to one embodiment of the present invention is shown. Packet switch 10 receives input packets 12 and forwards them as output packets 14 to an end user's destination. The packet switch 10 is not under the administrative control of the end user, but preferably there is some relationship between the administrative control of the packet switch 10 and the end user. For example, the packet switch 10 may be an ingress switch of an enterprise network, and the end user may be an employee of the enterprise. As another example, the packet switch 10 may be an access switch of an ISP, and the end user may be a customer of the ISP. In any event, an end user is an individual who downloads computer files, such as picture files or music files, stored as computer files through the packet switch 10 .
[0014] Management system 16 provides a management interface to packet switch 10 . Offending packet detecto...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 