Network Monitoring And Intellectual Property Protection Device, System, And Method

a network monitoring and intellectual property technology, applied in the field of network monitoring devices and intellectual property protection devices, can solve the problems of users sharing and distributing copyrighted material without the owners' consent, excessive use of network storage facilities, loss of proprietary data (e.g., trade secrets), etc., and achieve the effect of effectively blocking one or more a priori specified communication sessions

Inactive Publication Date: 2010-12-09
FAHMY SAFWAT F
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These dangers include, but are not limited to, exposing the organization's network to the introduction of viruses (programs that are loaded onto a user's computer without their knowledge and that usually perform malicious actions), spyware (software that covertly gathers user information and transmits that information to an unknown third party) and malware (software that is intentionally included or inserted in a system for a harmful purpose), the excessive use of network storage facilities, the loss of proprietary data (e.g., trade secrets) and the liability associated with their users (e.g., employees and students) sharing and distributing copyrighted material without the owners consent.
In the former, one's agreement to forgo use of P2P technology does not in itself prevent such use.
The rapid and acknowledged use of P2P technology for the widespread distribution of copyrighted and other proprietary material attests to the limited ability of these approaches to satisfactorily deal with the use of P2P networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network Monitoring And Intellectual Property Protection Device, System, And Method
  • Network Monitoring And Intellectual Property Protection Device, System, And Method
  • Network Monitoring And Intellectual Property Protection Device, System, And Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015]The following descriptions are presented to enable any person skilled in the art to make and use the invention as claimed and are provided in the context of the particular examples discussed below, variations of which will be readily apparent to those skilled in the art. Accordingly, the claims appended hereto are not intended to be limited by the disclosed embodiments, but are to be accorded their widest scope consistent with the principles and features disclosed herein.

[0016]In one embodiment of the invention, a network monitoring and intellectual property protection method inspects network packets into and out of a given network (e.g., an organization's local area network) to determine if the packet is part of a prohibited transaction (e.g., a P2P or IRC communication stream). In another embodiment of the invention, a network device is configured to perform the aforementioned network monitoring and intellectual property protection operations.

[0017]Referring to FIG. 1, netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and device for detecting and halting specified peer-to-peer (“P2P”) and / or Internet Relay Chat (“IRC”) communication sessions based on a priori defined templates is described. Network packets are intercepted and inspected for patterns (defined by the templates) that identify them as definitely, likely or not being associated with one of the specified P2P and / or IRC protocols. Those packets identified as definitely belonging to one of the specified protocols are prevented from reaching their target destination. Those packets identified as only likely belonging to one of the specified protocols are permitted to continue toward their target destination after select information about the particular session / packet is recorded for later use. Those packets identified as not belonging to one of the specified protocols are permitted to continue to their target destination.

Description

Cross-Reference to Related Application[0001]This application is a continuation of U.S. Non-provisional patent application Ser. No. 11 / 549,568, filed on Oct. 13, 2006, the disclosure of which is incorporated herein by reference.BACKGROUND OF THE INVENTION[0002]The invention relates generally to network monitoring devices and methods for the protection of intellectual property and more particularly, but not by way of limitation, to the detection and halting of peer-to-peer communications between computer systems.[0003]A peer-to-peer (“P2P”) computer network is a network that relies primarily on the collective computing power and bandwidth of the network's individual nodes rather than concentrating it's computational power in a relatively few dedicated systems or servers. P2P networks are typically used for connecting nodes via largely ad hoc connections for sharing files (e.g., audio and video data files) and realtime data (e.g., Internet telephony traffic).[0004]Because of its decent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L12/26
CPCH04L63/0236H04L67/1042H04L67/104H04L2463/103
Inventor FAHMY, SAFWAT F.
Owner FAHMY SAFWAT F
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products