Unlock instant, AI-driven research and patent intelligence for your innovation.

Unauthorized content detection for information transfer

A purposeful, computer-based technique used in the field of unauthorized image detection to solve problems such as false positives

Inactive Publication Date: 2007-06-13
ALCATEL LUCENT SAS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while such heuristics can detect a large number of offending images, they can also generate many false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized content detection for information transfer
  • Unauthorized content detection for information transfer
  • Unauthorized content detection for information transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Referring to FIG. 1, a diagram of a packet switch and other components according to one embodiment of the present invention is shown. Packet switch 10 receives input packets 12 and forwards them as output packets 14 to an end user's destination. The packet switch 10 is not under the administrative control of the end user, but preferably there is some relationship between the administrative control of the packet switch 10 and the end user. For example, the packet switch 10 may be an ingress switch of an enterprise network, and the end user may be an employee of the enterprise. As another example, the packet switch 10 may be an access switch of an ISP, and the end user may be a customer of the ISP. In any event, an end user is an individual who downloads computer files, such as picture files or music files, stored as computer files through the packet switch 10 .

[0014] Management system 16 provides a management interface to packet switch 10 . Offending packet detecto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method is provided for detecting offending or illegal download activity. An agency, such as a law enforcement agency, generates a list of checksums over a designated area of each of a set of computer files. The agency provides the list of checksums and an identification of the designated area to an administrator of a packet switch. The checksum of the designated area of packets passing through the switch are calculated. If a calculated checksum is found in the list of offending checksums, then the packet is flagged. In order to keep processing overhead manageable, a checksum for only some packets may be calculated. Although only known offending computer files can be detected in this manner, the use of known checksums of known offending computer files greatly reduces the likelihood of false positive detection of packets.

Description

technical field [0001] The present invention relates to the identification of specific files during transmission, and more particularly to the detection of unauthorized images during transmission. Background technique [0002] Internet service providers (ISPs) and businesses are increasingly feeling the need to ensure that unauthorized content, such as pornographic images or copyrighted material, is not delivered to end users using network resources under the control of the ISP or business. For example, law enforcement agencies could require ISPs to monitor downloads of pornographic images that show illegal content. As another example, an enterprise may wish to monitor employees who download pornographic images onto the enterprise network. Blocking such downloads may be desirable when monitoring instances of an individual's illegal downloading activity, but detecting such downloads may also be useful, or even preferable. In order to detect such download activity, it is des...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor S·G·阿比盖尔
Owner ALCATEL LUCENT SAS