Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
5Activity
0 of .
Results for:
No results containing your search query
P. 1
ATT PRISM Pirate Patent

ATT PRISM Pirate Patent

Ratings: (0)|Views: 6,936 |Likes:
Published by torrentfreak
ATT PRISM Pirate Patent
ATT PRISM Pirate Patent

More info:

Published by: torrentfreak on Jul 13, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/17/2013

pdf

text

original

 
US008190581B2
(12)
Ulllted States
Patent
(10)
Patent
N0.:
US
8,190,581
B2
Loman
t
al.
(45)
Date
ofPatent:
May
9,
2012
(54)
REAL-TIME
CONTENT
DETECTION
IN
ISP
OTHER
PUBLICATIONS
TRANSMISSIONS
S.
Brin,
J.
Davis,
H. Garcia-Molina,
“Copy
etection
Mechanism
or
(75)
Inventors:
James
M
Loman’
D
n
s,
TX
Us);
Digital
Documents”
Dept
of
Computer
Science,
Stanford Univ.
,
Alexandre
Gerber
Madison
NJ
(US)_
Proceedings
of
the
ACM
SIGNOD
Annual
Conference,
San
Jose,
Oliver spatscheck’
Randolpfl
NJ
(Us;
ACM
SIGMOD
ecord
Ol.
24,
iss.
2,
May
1995.
A.a
Todimalaplgrham
Park’
NJ
Us),
Vobile,
Inc,
“TVU
nd
Vobile
Announce
First
Commercial
Deploy
J
y
ment
of
Digital
Fingerprinting
for
Live
Event
Producers
and
Content
. _
Owners”
Reuters, Press
Release
May
9,
2008.
(73)
Asslgnee'
A1;&T
ntellectual
Property
I
L'P"
Vobile,
Inc,
“NAB
0081Vobile
Launches
VideoDNA
Live;
Enables
At
ama’
GA
Us)
Real-Time
Digital
Content
Protection
for
Live Broadcast Events”
T
hh
',P Rl
A
.l6,2008.
(
*
)
Notice:
Subject
to
any
disclaimer,
the
term
of
hisec
S
OWWlre
regs e
ease pr
patent
is
extended
or adjusted
under 35
(Continued)
U.S.C.
154(b)
by
327
days.
Primary Examiner
*
ohammad
li
21
A
l.
N
:
12/315
380
( )
pp
0
Assistant
Examiner
*
ohn Hocker
(22)
Filed:
Dec.
3,
2008
57
ABSTRACT
(65)
Prior Publication
Data
( )
A
ethod
and
system
for
detecting the
transmission
of
pre
US
2010/0138543
A1
Jun‘
3
2010
identi?ed
content,
such
as
copyrighted
material,
over
an
(51)Int
Cl
Internet
Service Provider
(ISP)
network.
A
et
of
rules
is
G081?
}7/00 (2006
01)
provided
to
identify
one
or
more
tra?ic
?oW
pro?les
of
data
52
U
Cl
'
707/685_
707/705
streams
transmitting
preidenti?ed
content.
Preferably
the
( )
_'
' '
"""
_'
"""
_
"""""""""""
rules
are
adaptively created
through
analysis
of
actual
ISP
(58)
Field
of
Classi?cation
Search
................
..
707/687,
data
in
Conjunction
With
dataSuggesting
an
initial
Set
of
_ _
797/705’
685
pro?le
characteristics.
The
rules
are
applied
to
data
streams
See
apphcanon
?le
for
Complete
Search
hlstory'
being
transmitted
in
the
ISP
network,
so
that
data
streams
(56)
References Cited
?tting
one
or
more
of
he
pro?les
are identi?ed.
A
atabaseU.S.
PATENT
DOCUMENTS
contains,
e.g.,
as
digital
signatures
or
?ngerprints,
one
or
more
items
of
content
Whose
transmission
is
sought
to
be
detected.
Data
streams identi?ed
as
matching
a
pro?le
are
analyzed
to
determine
if
their
content
matches an
item
of
content
in
the database,
and
if so,
an
action
is
taken
Which
may
nclude
interrupting
the transmission,
suspending
an ISP
account, orreporting the transmission.
An
SP
With
a
system
performing
this
method
may
ffer
services
to
content
provid
ers,
and
a
plurality
of
SPs
may
ointly
use
a
single
database
of
preidenti?ed
content
to
be
compared
o
each
ISP’s
identi
22 Claims,
4
Drawing
Sheets
5,875,175
A
*
2/1999
Shereretal.
................
..
370/230
6,006,269
A
*
12/1999
Phaal
..........................
..
709/227
6,658,423
B1
12/2003
Pughetal.
7,149,788
Bl*
12/2006Gundlaetal.
..............
..
709/218
7,165,100
B2
l/2007
Cranor
et
al.
7,840,178
B2*
11/2010
Hellman
....................
..
455/302
7,853,664
Bl*
12/2010
Wang
tal.
..
..
709/217
7,861,312
B2*
12/2010 Leeetal. 726/27
2006/0229124
Al*
10/2006
Walker
etal.
463/20
2006/0229125
Al*
10/2006
Walker
etal.
463/20
?ed
datastreams
2006/0232004
Al*
10/2006
Walker
etal.
273/1381
2006/0259318
Al*
11/2006
Walker
etal.
........
..
705/1
2007/0094408
Al*
4/2007
Gundla
etal.
..............
..
709/231
1&0
R
100
\
1200
j
 
US
8,190,581
B2
Page
2
OTHER
PUBLICATIONS
C.
Cranor,
T.
Johnson,
0.
Spatscheck,
and
V.
Shkapenyuk.
“Gigascope:
High
Performance
Network
Monitoring
With
an
SQL
Interface”,
in
Proc.
ACM
SIGMOD
nt.
Conf.
on
Management
of
Data,
pp.
647-651,2003.
M.
Thottan
and
C.
Ji,
“Anomaly
Detection
in
IP
Networks”,
IEEE
Transactions
on
Signal Processing,
vol.
51,
No.
8,
pp.
2191-2203,
Aug.
2003.
L.
Lewis and
G. Dreo,
“Extending
trouble
ticket
systems
to
fault
diagnosis”,
IEEE
Network,
vol.
7,
pp.
44-51,
Nov.
1993.A.Lakhina,
M.
Crovella
and
.
Diot,
“Characterization
of
Network
Wide
Anomalies
in
Traf?cFlows”,
IMC
’04,
Oct.
25-27,
2004,
Taormina,
Sicily,
Italy.
A. Lakhina,
M.
Crovella
and
C.
Diot,
“Diagnosing
Network-Wide
Traf?c
Anomalies”,
SIGCOMM
04,
Aug.
30-Sep.
3,
2004,
Portland,
Oregon,
USA.
*
cited
by
examiner

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
terefere321 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->