[go: up one dir, main page]

HK1218175B - A system and method for creating a list of shared information on a peer-to-peer network - Google Patents

A system and method for creating a list of shared information on a peer-to-peer network Download PDF

Info

Publication number
HK1218175B
HK1218175B HK16106016.9A HK16106016A HK1218175B HK 1218175 B HK1218175 B HK 1218175B HK 16106016 A HK16106016 A HK 16106016A HK 1218175 B HK1218175 B HK 1218175B
Authority
HK
Hong Kong
Prior art keywords
searches
peer
criteria
network
information
Prior art date
Application number
HK16106016.9A
Other languages
Chinese (zh)
Other versions
HK1218175A1 (en
Inventor
P. Hopkins Samuel
Original Assignee
Kroll Information Assurance, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kroll Information Assurance, Llc filed Critical Kroll Information Assurance, Llc
Publication of HK1218175A1 publication Critical patent/HK1218175A1/en
Publication of HK1218175B publication Critical patent/HK1218175B/en

Links

Description

一种用于在对等网络上创建共享信息列表的系统和方法A system and method for creating a shared information list on a peer-to-peer network

本申请是申请日为2008年4月10日,申请号为200880011661.7,发明名称为This application is filed on April 10, 2008, with application number 200880011661.7 and the invention is

“一种用于在对等网络上创建共享信息列表的系统和方法”的申请的分案申请。Divisional application of the application for "A system and method for creating a shared information list on a peer-to-peer network".

相关申请Related applications

本申请要求2007年4月12日提交的美国临时申请号为60/923,042的权益。上述申请的全部教导在此引入以供参考。This application claims the benefit of U.S. Provisional Application No. 60/923,042, filed April 12, 2007. The entire teachings of the above application are incorporated herein by reference.

技术领域Technical Field

本发明涉及在连接的网络计算机内对信息进行定位。The present invention relates to locating information within connected network computers.

背景技术Background Art

对等网络在网络上参与者之间使用不同的连通性,并且使用网络参与者的累积带宽而不是常规的集中化资源。对等网络典型地被用于经由大量的自组(ad hoc)连接来连接节点。这样的网络对于很多用途来说是有用的。共享包含音频、视频、数据或任何数字格式信息的内容文件是普遍的,并且诸如电话流量之类的实时数据也使用对等网络予以传递。为了接入对等网络以便共享内容文件,用户利用能够连接网络计算机的对等网络软件应用。Peer-to-peer networks utilize heterogeneous connectivity between participants on the network, utilizing the aggregated bandwidth of network participants rather than conventional centralized resources. Peer-to-peer networks are typically used to connect nodes via a large number of ad hoc connections. Such networks are useful for a wide range of purposes. Sharing content files containing audio, video, data, or any digitally formatted information is common, and real-time data such as telephone traffic is also transmitted using peer-to-peer networks. To access a peer-to-peer network to share content files, users utilize peer-to-peer network software applications that connect to networked computers.

发明内容Summary of the Invention

示例实施例的方法或相应设备包括用以从对等网络获得一个或多个搜索的网络节点。该网络节点将所述一个或多个搜索与一个或多个标准进行比较。比较之后,该网络节点更新所述一个或多个标准以包含所述一个或多个搜索的变体。更新之后,该网络节点基于更新的标准发出所述一个或多个搜索。接下来,该网络节点确定与所述一个或多个搜索相关联的所得信息。确定之后,该网络节点创建所得信息列表以供分析。在实施例中,所述方法或相应设备采用C、C++、.NET或Visual Basic程序代码。The method or corresponding apparatus of an example embodiment includes a network node configured to obtain one or more searches from a peer-to-peer network. The network node compares the one or more searches against one or more criteria. After the comparison, the network node updates the one or more criteria to include variations of the one or more searches. After the update, the network node issues the one or more searches based on the updated criteria. Next, the network node determines the resulting information associated with the one or more searches. After the determination, the network node creates a list of the resulting information for analysis. In an embodiment, the method or corresponding apparatus utilizes C, C++, .NET, or Visual Basic programming code.

在实施例中,所述一个或多个标准是下列之一:预定义的关键字、关键字集,或关键字子集。此外,所述一个或多个标准可以涉及个体、组织、组群或其他可标识的实体。In an embodiment, the one or more criteria are one of the following: a predefined keyword, a set of keywords, or a subset of keywords. Additionally, the one or more criteria may relate to an individual, organization, group, or other identifiable entity.

在实施例中,所述一个或多个搜索是对等网络中的广播消息。在实施例中,所述网络节点把所述一个或多个搜索与所述一个或多个标准进行比较使用下列之一:比较、字符串内、模糊逻辑匹配,或其他(一个或多个)比较技术。In an embodiment, the one or more searches are broadcast messages in a peer-to-peer network. In an embodiment, the network node compares the one or more searches to the one or more criteria using one of: comparison, within-string, fuzzy logic matching, or other comparison technique(s).

在实施例中,所述网络节点采用帐户标点、复数或所述一个或多个标准的其他变体来进行更新。在实施例中,所述网络节点还被配置为将具有所述一个或多个搜索的TCP/IP分组发送到网络节点。In an embodiment, the network node employs account punctuation, pluralization, or other variations of the one or more criteria for updating. In an embodiment, the network node is further configured to send a TCP/IP packet with the one or more searches to the network node.

在实施例中,所得信息是组织的名称、与组织有关的信息,个体的名称,或与个体有关的信息。In an embodiment, the obtained information is the name of an organization, information related to an organization, the name of an individual, or information related to an individual.

在实施例中,列表存储在数据库、计算机程序、存储器或适合的存储设备中。在实施例中,所述网络节点还被配置为针对提供对列表的访问而收集费用。在实施例中,所述网络节点还被配置为基于所述一个或多个搜索标识安全风险。In an embodiment, the list is stored in a database, a computer program, a memory or a suitable storage device. In an embodiment, the network node is further configured to collect a fee for providing access to the list. In an embodiment, the network node is further configured to identify a security risk based on the one or more searches.

根据细读对本发明的实施例的下列详细描述本发明的其它优点将变得显而易见。Other advantages of the present invention will become apparent from a perusal of the following detailed description of embodiments of the invention.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

如在附图中所图示的,根据对本发明的示例实施例的更特定的描述前述将是明显的,在附图中遍及不同视图同样的参考标记指代相同的部分。附图没必要按照比例,重点宁愿着重在对本发明的实施例进行图示。The foregoing will be apparent from the more particular description of example embodiments of the invention, as illustrated in the accompanying drawings in which like reference numerals refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating embodiments of the invention.

图1A是根据本发明的示例实施例描绘监视对等网络上的搜索以创建列表的通信网络的框图;FIG1A is a block diagram depicting a communications network monitoring searches on a peer-to-peer network to create a list according to an example embodiment of the present invention;

图1B是根据本发明的示例实施例的所得信息的示例列表;FIG1B is an example listing of obtained information according to an example embodiment of the present invention;

图2是描绘根据本发明的示例实施例的示例搜索分组的框图;FIG2 is a block diagram depicting an example search grouping according to an example embodiment of the present invention;

图3A是描绘根据本发明的示例实施例的在网络上发出搜索的流程图;3A is a flow chart depicting issuing a search on a network according to an example embodiment of the present invention;

图3B是根据本发明的示例实施例的示例标准;FIG3B is an example standard according to an example embodiment of the present invention;

图4是描绘根据本发明的示例实施例的向数据库添加搜索的流程图;4 is a flow chart depicting adding a search to a database according to an example embodiment of the present invention;

图5是描绘根据本发明的示例实施例的示例监视过程的流程图;FIG5 is a flow chart depicting an example monitoring process according to an example embodiment of the present invention;

图6是图示根据本发明的示例实施例的在对等网络上创建搜索信息列表的流程图;6 is a flowchart illustrating creation of a search information list on a peer-to-peer network according to an example embodiment of the present invention;

图7是描绘根据本发明的示例实施例的针对费用向客户提供列表的流程图。7 is a flow chart depicting providing a list to a customer for expenses according to an example embodiment of the present invention.

具体实施方式DETAILED DESCRIPTION

如今,组织和个人冒着公开不应共享的信息的风险。为了降低这种风险,组织或个人定位信息并且标识什么信息是私密的(例如,不应当公开)。在标识什么信息是私密的之后,组织可以采取动作以阻止该信息的公开。阻止不适当的信息共享的一种方式是通过监视在诸如对等网络之类的网络中所进行的对与企业、组织或者公司有关的短语、术语,或一个或多个标准的搜索,诸如公司名称或其他术语。Today, organizations and individuals risk disclosing information that should not be shared. To mitigate this risk, organizations or individuals locate information and identify what information is private (e.g., should not be disclosed). After identifying what information is private, the organization can take action to prevent the disclosure of that information. One way to prevent inappropriate information sharing is by monitoring searches conducted on networks, such as peer-to-peer networks, for phrases, terms, or one or more criteria related to businesses, organizations, or companies, such as company names or other terms.

图1A是描绘根据本发明的示例实施例的监视对等网络上的搜索110,120以创建列表的通信网络100的框图。特别地,网络节点140监视在对等网络112上所发出的搜索。对等网络112包括相互通信的节点a 105,节点b 115和节点c 125。在操作中,节点a 105向节点b115发送搜索110。类似地,节点 b 115向节点c 125发送搜索 b 120。例如,节点a 105和节点b 115可发出对短语“Acme Bank”的搜索。一旦发出了该搜索,网络节点140典型地通过获得与搜索110、120相关联的广播消息来从对等网络112获得该搜索110、120。在获得搜索110、120之后,网络节点140使用诸如比较之类的比较技术来把搜索110、120与一个或多个标准160(例如,短语)相比较。如果一个或多个标准160与搜索110、120相匹配(例如,标准是“AcmeBank”),则网络节点140更新该一个或多个标准160以包含搜索110,120的变体(例如,“Acme Banks”)。为了这样做,网络节点140采用复数(pluralization)或本领域已知的其它算法来确定搜索110、120的这些附加变体。FIG1A is a block diagram illustrating a communication network 100 monitoring searches 110, 120 on a peer-to-peer network to create a list, according to an exemplary embodiment of the present invention. Specifically, a network node 140 monitors searches issued on a peer-to-peer network 112. The peer-to-peer network 112 includes node a 105, node b 115, and node c 125, which are in communication with one another. In operation, node a 105 sends a search 110 to node b 115. Similarly, node b 115 sends a search b 120 to node c 125. For example, node a 105 and node b 115 may issue a search for the phrase "Acme Bank." Once the search is issued, the network node 140 typically obtains the search 110, 120 from the peer-to-peer network 112 by obtaining a broadcast message associated with the search 110, 120. After obtaining searches 110, 120, network node 140 compares searches 110, 120 to one or more criteria 160 (e.g., phrases) using a comparison technique, such as a comparison. If one or more criteria 160 matches searches 110, 120 (e.g., if the criteria is "AcmeBank"), network node 140 updates the one or more criteria 160 to include variations of searches 110, 120 (e.g., "Acme Banks"). To do so, network node 140 employs pluralization or other algorithms known in the art to determine these additional variations of searches 110, 120.

在更新标准160之后,网络节点140基于更新的标准发出新搜索150a-b。结果,网络节点140从对等网络112接收响应,以及创建来自新搜索150a-b的所得信息155a-b的列表并将所得信息155a-b存储在数据库145中以供分析。After updating criteria 160, network node 140 issues new searches 150a-b based on the updated criteria. As a result, network node 140 receives responses from peer network 112 and creates a list of resulting information 155a-b from new searches 150a-b and stores resulting information 155a-b in database 145 for analysis.

在优选实施例中,网络节点140从对等网络112接收包含所得信息155a-b的响应。示例所得信息155a在图1B中示出。特别地,图1B将所得信息155a示出为TCP/IP分组,其包含包含16字节的描述符id(标识符)107、有效载荷(payload)描述符id 119、生存时间(timeto live)值(通常为3)137、跳数值(hops value)142(通常为0)、有效载荷长度147,以及有效载荷152。有效载荷典型地包括包含在有效载荷中的文件标题数目、TCP/IP端口、IP地址、主机速度、具有文件索引的结果集、文件大小、文件名和服务体(servent)ID号。在实施例中,所得信息也可以包括文件的名称和大小,以及拥有该文件的计算机的IP地址。应当理解,服务体是对等网络节点,其具有服务器和客户端这两者的特征。针对所得信息155a的其他配置也是可能的。In a preferred embodiment, network node 140 receives a response from peer-to-peer network 112 containing result information 155a-b. Example result information 155a is shown in FIG1B . Specifically, FIG1B illustrates result information 155a as a TCP/IP packet containing a 16-byte descriptor ID 107, a payload descriptor ID 119, a time-to-live value (typically 3) 137, a hops value 142 (typically 0), a payload length 147, and a payload 152. The payload typically includes the number of file headers contained within the payload, the TCP/IP port, the IP address, the host speed, a result set with a file index, the file size, the file name, and a servent ID number. In embodiments, the result information may also include the file name and size, as well as the IP address of the computer that owns the file. It should be understood that a servent is a peer-to-peer network node that possesses both server and client characteristics. Other configurations for result information 155a are also possible.

现在返回去参考图1A,分析节点180可以接收列表170,其允许操作者或软件逻辑190来标识列表170中搜索信息的模式。例如,软件逻辑190确定对于共享会是不适当的信息,诸如包含敏感或私密信息的共享文件夹。也就是说,信息可能会因非故意地,或者恶意的行为或病毒而被共享。例如,某人可能非故意地共享了包含诸如信用卡号之类的个人信息的争议信件。用户可能搜索这些争议信件并获取信用卡号。也就是说,该用户可能发出搜索并接收到争议信件,其涉及针对信用卡所有者的信用卡购买。在该争议信件中,信用卡所有者包括信用卡号和/或其他个人信息。因此,现在该用户可以查看并有可能使用该信用卡所有者的信用卡号和/或其他个人信息。Referring now back to Figure 1A, the analysis node 180 may receive the list 170, which allows an operator or software logic 190 to identify patterns in the search information in the list 170. For example, the software logic 190 determines that information may be inappropriate for sharing, such as a shared folder containing sensitive or private information. That is, information may be shared unintentionally, or due to malicious behavior or a virus. For example, someone may have unintentionally shared dispute letters containing personal information such as a credit card number. A user may search for these dispute letters and obtain the credit card number. That is, the user may issue a search and receive a dispute letter involving a credit card purchase against the credit card owner. In the dispute letter, the credit card owner includes the credit card number and/or other personal information. Therefore, the user can now view and potentially use the credit card number and/or other personal information of the credit card owner.

在其他示例中,对等网络112软件可能具有容许对文件或信息进行共享的软件缺陷。同样地,用户计算机可能有病毒或蠕虫,其连接到对等网络112,并且在用户不知晓的情况下共享信息,诸如非故意地共享了节点b 115中的文件夹118。不管共享的原因,用户可以发出对包含把组织或个人作为目标的术语的搜索,例如“Acme Bank dispute letter”或“John Smith credit card”。允许经由搜索访问敏感或私密信息可能导致组织、国家安全或其他用户的风险。In other examples, the peer-to-peer network 112 software may have a software bug that allows files or information to be shared. Similarly, a user's computer may have a virus or worm that connects to the peer-to-peer network 112 and shares information without the user's knowledge, such as accidentally sharing folder 118 in node b 115. Regardless of the reason for sharing, a user may issue a search containing terms that target an organization or individual, such as "Acme Bank dispute letter" or "John Smith credit card." Allowing access to sensitive or private information through searches may pose a risk to the organization, national security, or other users.

应当理解,本发明的实施例并不限于使用数据库,诸如数据库145,以及本发明的实施例也可以在网络节点140上将列表存储在报告中,或存储在某其他适合的位置或存储器。其他配置也是可能的。It should be understood that embodiments of the present invention are not limited to the use of a database, such as database 145, and embodiments of the present invention may also store the list in a report, or in some other suitable location or memory, on network node 140. Other configurations are also possible.

还应当理解的是对等网络112的其他配置也是可能的。例如,一个和多个节点可以被分类为主节点而其他节点被分类为叶节点。叶节点连接到主节点,主节点可以连接到其他主节点。因此,如果叶节点发出搜索请求,该叶节点将该搜索请求发送给连接到该叶节点的主节点。在接收到该搜索请求时,主节点将该请求转发给连接到该请求主节点的主节点和每个叶节点。接收主节点将每个搜索请求转发给处于连接中的每个叶节点。本发明的实施例同样也可以从叶节点搜索获得所得信息。此外,应当理解的是,分析节点180和软件逻辑190是通信网络100的任选部件,也可以采用没有这些部件的实施例。It should also be understood that other configurations of the peer-to-peer network 112 are possible. For example, one or more nodes may be classified as master nodes and other nodes may be classified as leaf nodes. Leaf nodes are connected to master nodes, and master nodes may be connected to other master nodes. Thus, if a leaf node issues a search request, the leaf node sends the search request to the master node connected to the leaf node. Upon receiving the search request, the master node forwards the request to the master node and each leaf node connected to the requesting master node. The receiving master node forwards each search request to each leaf node in the connection. Embodiments of the present invention may also obtain information from leaf node searches. Furthermore, it should be understood that the analysis node 180 and software logic 190 are optional components of the communication network 100, and embodiments without these components may also be employed.

图2是描绘根据本发明的示例实施例的示例搜索分组200的框图。特别地,该搜索分组200包含16字节描述符id 205、有效载荷描述符id 210、生存时间值215、跳数值220、搜索项(search term)的有效载荷长度225、搜索项230,和用户接受的最小速度235。在优选实施例中,诸如图1的网络节点140之类的网络节点基于搜索分组200中的搜索创建报告。该报告可包括与标准匹配的所有搜索的列表,其包括复本。可替换地,该报告可包括与该标准匹配的搜索项225的列表,其没有复本。对于包含复本的报告,可以以与搜索的数目相对应的数目次地存储特定搜索项225。使用对特定搜索项225的搜索数目在下面所描述的确定模式中是有用的。在实施例中,报告也可包括每个搜索项225和相应的16字节描述符id 205。FIG2 is a block diagram illustrating an example search packet 200 according to an example embodiment of the present invention. Specifically, search packet 200 includes a 16-byte descriptor ID 205, a payload descriptor ID 210, a time-to-live value 215, a hop count value 220, a search term's payload length 225, a search term 230, and a minimum speed 235 accepted by the user. In a preferred embodiment, a network node, such as network node 140 in FIG1 , creates a report based on the searches in search packet 200. The report may include a list of all searches that matched the criteria, including duplicates. Alternatively, the report may include a list of search terms 225 that matched the criteria, without duplicates. For reports that include duplicates, a particular search term 225 may be stored a number of times corresponding to the number of searches. Using the number of searches for a particular search term 225 is useful in determining a pattern as described below. In embodiments, the report may also include each search term 225 and its corresponding 16-byte descriptor ID 205.

图3A是描绘根据本发明的示例实施例的在网络上发出搜索的流程图。特别地,图3A显示了用于通过监视搜索、发出搜索和获得响应来监视组织信息的过程300。该过程300通过使用网络节点来获得对等网络广播消息来监视对等网络以得到匹配一个或多个标准305的搜索。在优选实施例中,该过程通过诸如C++、Visual Basic之类的编程语言来使用诸如比较、模糊逻辑匹配之类的比较技术或者本领域已知的其它比较技术。使用其他编程语言或比较技术也是可能的。在示例实施例中,编程语言考虑了诸如缩写之类的帐户标点和复数来或者修改搜索项,修改一个或多个标准,或者添加附加的标准搜索项。例如,如果搜索项是“Acme Banks”,则该过程将“Banks”末尾的“s”去除以扩大结果。也就是说,过程300包括多种标准搜索项,诸如“Acme Bank”和“Acme Banks”。FIG3A is a flow chart depicting a method of issuing a search on a network according to an exemplary embodiment of the present invention. Specifically, FIG3A shows a process 300 for monitoring organizational information by monitoring searches, issuing searches, and obtaining responses. This process 300 monitors a peer-to-peer network for searches that match one or more criteria 305 by using network nodes to obtain peer-to-peer network broadcast messages. In a preferred embodiment, this process utilizes comparison techniques such as comparison, fuzzy logic matching, or other comparison techniques known in the art using programming languages such as C++ or Visual Basic. Using other programming languages or comparison techniques is also possible. In an exemplary embodiment, the programming language takes into account account punctuation and pluralization, such as abbreviations, to modify the search terms, modify one or more criteria, or add additional standard search terms. For example, if the search term is "Acme Banks," the process removes the "s" at the end of "Banks" to expand the results. In other words, process 300 includes multiple standard search terms, such as "Acme Bank" and "Acme Banks."

考虑下面的示例。过程300通过从诸如图2的搜索分组200之类的对等网络搜索分组提取搜索项来监视网络以得到搜索项或短语(例如“Acme Banks”)。在提取搜索项之后,可以使用比较、字符串内(intrastring)、模糊逻辑匹配或其他(一个或者多个)比较技术,把该搜索项与标准进行比较。更具体地,过程300确定一个或多个标准是否被匹配310。如果不存在匹配,则过程300返回到监视315新搜索,否则过程300继续。更具体地,过程300从对等网络获得或接收与组织(例如“Acme Bank”)或个体相关的一个或多个搜索。过程300把该一个或多个搜索与一个或多个标准进行比较。例如,该一个或多个标准可以是预定义关键字、关键字集或关键字子集,并且可以存储在数据库、计算机程序、列表、报告、存储器或其他适合的存储设备中。Consider the following example. Process 300 monitors a network for a search term or phrase (e.g., "Acme Banks") by extracting a search term from a peer-to-peer network search group, such as search group 200 of FIG. 2 . After extracting the search term, the search term may be compared to criteria using comparison, intrastring, fuzzy logic matching, or other comparison technique(s). More specifically, process 300 determines whether one or more criteria are matched 310 . If no match exists, process 300 returns to monitoring 315 for new searches, otherwise process 300 continues. More specifically, process 300 obtains or receives one or more searches related to an organization (e.g., "Acme Bank") or an individual from a peer-to-peer network. Process 300 compares the one or more searches to one or more criteria. For example, the one or more criteria may be predefined keywords, sets of keywords, or subsets of keywords, and may be stored in a database, computer program, list, report, memory, or other suitable storage device.

在实施例中,组织或其他用户用搜索项定义一个或多个标准。例如,组织定义与组织对应的一个或多个标准,诸如公司名称、地址、(一个或多个)商标名称,高级管理层(executive management)的(一个或者多个)名字、地址,或者其他代表性标准(或关键字)。示例标准350在图3B中示出。更具体地,示例标准350显示了由可疑个体在网络上发出的搜索项。在发出一个或多个搜索之后,过程300返回到监视阶段325。示例标准350典型地是与组织关键字相匹配的术语或短语的列表,所述组织关键字由人力资源、客户、代理或计算机规定。In an embodiment, an organization or other user defines one or more criteria for search terms. For example, the organization may define one or more criteria corresponding to the organization, such as a company name, address, brand name(s), name(s) and address(es) of executive management, or other representative criteria (or keywords). Example criteria 350 is shown in FIG3B . More specifically, example criteria 350 displays search terms issued by suspicious individuals on the network. After issuing one or more searches, process 300 returns to monitoring phase 325. Example criteria 350 is typically a list of terms or phrases that match organizational keywords, as specified by human resources, clients, agencies, or computers.

在实施例中,对一个和多个标准进行定义可以由组织和其他用户手动输入。在实施例中,过程300监视发出的搜索,以及将所发出的搜索与现有标准进行匹配,并且将该搜索添加为附加的标准。In an embodiment, defining one or more criteria may be manually entered by the organization and other users.In an embodiment, process 300 monitors issued searches and matches the issued searches to existing criteria and adds the searches as additional criteria.

继续图3A,如果标准被匹配上,则过程300将一个和多个搜索发出到对等网络320上。过程300通过使用下述之一来发出搜索:对等软件应用、非对等系统,或者接入到对等节点来发出搜索的系统。在实施例中,搜索经由传输控制协议和因特网协议(TCP/IP)分组予以发出。TCP/IP分组典型地包含16字节描述符标识器、128的有效载荷描述符标识符、生存时间值(通常为3)、跳数值(通常为0)、具有搜索项长度的有效载荷长度、搜索项,和用户接受的最小速度。Continuing with FIG3A , if the criteria are matched, process 300 initiates one or more searches onto peer-to-peer network 320. Process 300 initiates the search using one of the following: a peer-to-peer software application, a non-peer-to-peer system, or a system that accesses a peer node to initiate the search. In an embodiment, the search is initiated via a Transmission Control Protocol and Internet Protocol (TCP/IP) packet. A TCP/IP packet typically contains a 16-byte descriptor identifier, a 128-byte payload descriptor identifier, a time-to-live value (typically 3), a hop count value (typically 0), a payload length with the length of the search term, the search term, and a minimum speed accepted by the user.

在实施例中,过程400将一个和多个搜索添加到存储器,如图4所示。过程400监视对等网络以得到与一个和多个标准405相匹配的一个或多个搜索。过程400确定所述一个或多个标准是否匹配410。如果存在匹配,则过程400将该搜索添加到列表420。如果该列表包含如标准中所提供的与客户相关的组织名称,则过程400确定该用户可能是恶意的并且以他们的客户为目标。过程400通过使用度量(metrics)来确定这样的行为存在,诸如所接收的搜索的数目或搜索的复杂度。更具体地,如果用户搜索短语“Acme Bank Statements”,则进行用户正尝试找到银行声明信息的确定。过程400将搜索(和/或实际的搜索)记录添加到存储器400并返回到监视阶段425以标识附加搜索。然而,如果没有标准匹配,则过程400返回到监视阶段410而不将搜索添加到存储器。In one embodiment, process 400 adds one or more searches to memory, as shown in FIG4 . Process 400 monitors the peer-to-peer network for one or more searches that match one or more criteria 405. Process 400 determines whether the one or more criteria match 410. If there is a match, process 400 adds the search to a list 420. If the list contains the name of an organization associated with the customer, as provided in the criteria, process 400 determines that the user is likely malicious and targeting their customers. Process 400 determines the presence of such behavior by using metrics, such as the number of searches received or the complexity of the searches. More specifically, if a user searches for the phrase "Acme Bank Statements," it determines that the user is attempting to find bank statement information. Process 400 adds the search (and/or actual search) record to memory 400 and returns to monitoring stage 425 to identify additional searches. However, if no criteria match, process 400 returns to monitoring stage 410 without adding the search to memory.

如图5所示的监视过程500允许组织防止不想要的或不适当的信息共享。在优选实施例中,监视过程500中的监视系统监视对等网络并针对词或短语505基于配置监视对等网络。在实施例中,所述配置可以由监视系统的操作者手动输入或以某其它方式预先确定。对等网络用户发出对词或短语510的搜索。转而,监视系统监测对等网络上的搜索并比较该搜索与所述词或短语515。此外,监视系统监测到搜索与某词或短语相匹配,并把该搜索发出到网络520上。例如,通过监视“无赖”用户的搜索,银行记录该搜索响应以便以后标识无赖用户。因此,银行有能力标识是否可能存在潜在问题。监视系统可以将响应记录到数据库中和/或将与所发出的搜索相匹配的文件下载到计算机存储器、数据库或打印媒体525上。在优选实施例中,监视系统可以使用TCP/IP连接到主机并下载文件。应当理解的是,可以通过TCP/IP分组或其他传输分组来发出搜索。Monitoring process 500, as shown in Figure 5, allows organizations to prevent unwanted or inappropriate information sharing. In a preferred embodiment, the monitoring system in monitoring process 500 monitors a peer-to-peer network and monitors the peer-to-peer network for a word or phrase 505 based on a configuration. In embodiments, the configuration may be manually entered by an operator of the monitoring system or predetermined in some other manner. A user of the peer-to-peer network issues a search for a word or phrase 510. The monitoring system, in turn, monitors the search on the peer-to-peer network and compares the search to the word or phrase 515. Furthermore, the monitoring system detects a match between the search and a particular word or phrase and issues the search to network 520. For example, by monitoring searches by "rogue" users, a bank can record the search responses to later identify rogue users. This allows the bank to identify potential issues. The monitoring system can record the responses in a database and/or download files matching the issued search to computer memory, a database, or printed media 525. In a preferred embodiment, the monitoring system can use TCP/IP to connect to a host computer and download the files. It should be understood that searches can be issued using TCP/IP packets or other transport packets.

在实施例中,监视系统发出“推(Push)”消息,其指示文件主机连接到该监视系统并上载文件。因此,该监视规避了防止消息传输的任何主机防火墙。该推消息可以是TCP/IP分组,其会包含16字节描述符id、64的有效载荷描述符id、生存时间值(通常为3)、跳数值(通常为0)、有效载荷长度,以及有效载荷。所述有效载荷包括服务体标识器、文件索引、监视系统的IP地址,和监视系统的TCP/IP端口。In one embodiment, the monitoring system issues a "push" message instructing the file host to connect to the monitoring system and upload the file. This monitoring circumvents any host firewalls that might otherwise block message transmission. The push message can be a TCP/IP packet containing a 16-byte descriptor ID, a 64-byte payload descriptor ID, a time-to-live value (typically 3), a hop count (typically 0), a payload length, and a payload. The payload includes a server identifier, a file index, the monitoring system's IP address, and the monitoring system's TCP/IP port.

图6是图示根据本发明的示例实施例的在对等网络上创建搜索信息列表的流程图。过程600在605从对等网络获得一个或多个搜索。在610,过程600把一个或多个搜索与一个或多个标准相比较以确定是否存在什么匹配。在615,过程600更新一个或多个标准以包含该一个或多个搜索的变体或其他改变。在620,过程600基于更新的标准向网络发出一个或多个搜索,从而获得所得信息。在625,过程600确定与该一个或多个搜索相关联的所得信息。在630,该过程创建所得信息列表以供分析。FIG6 is a flow chart illustrating the creation of a search information list on a peer-to-peer network according to an exemplary embodiment of the present invention. Process 600 obtains one or more searches from the peer-to-peer network at 605. At 610, process 600 compares the one or more searches to one or more criteria to determine if a match exists. At 615, process 600 updates the one or more criteria to include variations or other changes to the one or more searches. At 620, process 600 issues one or more searches to the network based on the updated criteria, thereby obtaining result information. At 625, process 600 determines the result information associated with the one or more searches. At 630, the process creates a list of result information for analysis.

应当理解的是,所得信息可以以列表、报告、数据库报告,或其他适合表示的形式。此外,如上所解释的,软件逻辑可以被用来基于一个或多个标准标识搜索/所得信息的模式。可替换地,该所得信息可由分析者进行查阅以标识任何模式/风险。例如,分析者或软件逻辑在所得信息中标识出大量的针对组织中特定执行者的搜索,所述搜索与个人的或商业信息有关。该大量的与该执行者有关的搜索指明了可能的身份盗窃或其他潜在风险。It should be understood that the resulting information can be in the form of a list, report, database report, or other suitable representation. In addition, as explained above, software logic can be used to identify patterns in the searches/obtained information based on one or more criteria. Alternatively, the resulting information can be reviewed by an analyst to identify any patterns/risks. For example, the analyst or software logic may identify in the resulting information a large number of searches for a particular executive in the organization, the searches being related to personal or business information. This large number of searches related to this executive indicates possible identity theft or other potential risks.

图7是描绘根据本发明的示例实施例的针对费用向客户提供列表的流程图。例如,过程700创建列表,其可以包括搜索结果或由一个或多个标准标识的其他信息。在710,过程700通过数据库或其他适合的表示(例如报告)为客户/组织提供对列表的访问。在优选实施例中,客户通过连接到诸如图1的数据库145之类的数据库来接收对列表的访问,并查阅该列表。在715,过程700对访问该列表从用户收集费用。费用可以以范围从一次、每天、每星期、每月的订阅基础或者每年的订阅基础而予以收集,向组织开具针对费用的发票,或基于预付费收集该费用。在示例实施例中,费用可以是固定费用或者为了查阅列表,其中,对于对列表的无限制访问或者对于列表的每次访问收取一次费用。其他安排也是可能的。FIG7 is a flow chart illustrating providing a list to a client for a fee, according to an example embodiment of the present invention. For example, process 700 creates a list, which may include search results or other information identified by one or more criteria. At 710, process 700 provides the client/organization with access to the list via a database or other suitable representation (e.g., a report). In a preferred embodiment, the client receives access to the list by connecting to a database, such as database 145 in FIG1 , and accesses the list. At 715, process 700 collects a fee from the user for accessing the list. The fee may be collected on a subscription basis ranging from one-time, daily, weekly, monthly, or annual, with the organization invoiced for the fee, or collected on a prepaid basis. In an example embodiment, the fee may be a fixed fee or a fee for accessing the list, with a single fee charged for unlimited access to the list or for each access to the list. Other arrangements are also possible.

使用本发明的实施例,硬件系统可以被用作计算机、小型装置、基于ASIC的设备或其他类似的设备,可以用特定逻辑或编程代码(例如软件)对其进行编程。该系统或者直接地或者不过使用网关与物理网络连接。编程逻辑为设备提供了在物理网络和对等网络这两者上传送和接收的能力。编程逻辑的示例包括软件程序或硬编码程序信息,诸如在基于ASIC的设备上所找到的信息。Using embodiments of the present invention, a hardware system can be used as a computer, small appliance, ASIC-based device, or other similar device that can be programmed with specific logic or programming code (e.g., software). The system is connected to a physical network, either directly or through a gateway. The programming logic provides the device with the ability to transmit and receive on both the physical network and a peer-to-peer network. Examples of programming logic include software programs or hard-coded program information, such as that found on ASIC-based devices.

应当理解的是,这里所公开的任何过程可以以硬件、固件或软件的形式予以实现。如果以软件实现,该软件可以是以任何适合的软件语言的处理器指令,并存储在任何形式的计算机可读介质上。处理器指令由处理器加载并执行,诸如通用目的或应用特定的处理器,其进而执行这里所公开的示例实施例。It should be understood that any of the processes disclosed herein can be implemented in the form of hardware, firmware, or software. If implemented in software, the software can be processor instructions in any suitable software language and stored on any form of computer-readable medium. The processor instructions are loaded and executed by a processor, such as a general-purpose or application-specific processor, which in turn executes the example embodiments disclosed herein.

虽然参考本发明的优选实施例,已经特别示出和描述了本发明,不过本领域技术人员应当理解,在脱离所附权利要求所包括的本发明的范围的情况下,在其中可以进行形式和细节上的各种变化。While the invention has been particularly shown and described with reference to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention as encompassed by the appended claims.

Claims (13)

1.一种用于在连接的网络计算机内对信息进行定位的方法,包括:1. A method for locating information within a connected network computer, comprising: 从对等网络上广播的一个或多个消息获得一个或多个搜索;Obtain one or more searches from one or more messages broadcast on a peer-to-peer network; 确定所述一个或多个获得的搜索是否与一个或多个标准匹配,其中所述一个或多个标准是下列之一:指示正在搜索涉及个人、组织、群组或其他可标识的实体的信息的可疑个体的预定义的关键字、关键字集、或者关键字子集;Determine whether the one or more obtained searches match one or more criteria, wherein the one or more criteria are one of the following: predefined keywords, keyword sets, or subsets of keywords that indicate a search for suspicious individuals involving information about individuals, organizations, groups, or other identifiable entities; 响应于确定所述一个或多个获得的搜索与所述一个或多个标准匹配:In response to determining that the one or more obtained searches match the one or more criteria: 更新所述一个或多个标准以包括所述一个或多个获得的搜索的变体,所述一个或多个获得的搜索的变体包括帐户标点、复数和所述一个或多个搜索的其他变体,Update the one or more criteria to include variations of the one or more obtained searches, including account punctuation, plurals, and other variations of the one or more searches. 基于更新的标准向所述对等网络发出一个或多个新搜索,所述一个或多个新搜索不同于所述一个或多个获得的搜索,One or more new searches are issued to the peer network based on the updated standards, and these new searches are different from the one or more previously obtained searches. 确定与所述一个或多个新搜索相关联的所得信息;和Determine the obtained information associated with the one or more new searches; and 创建所述所得信息的列表以供分析,所述所得信息包括以下项中一个或多个:组织的名称、与所述组织有关的信息、个体的名称,与所述个体有关的信息;以及Create a list of the obtained information for analysis, the obtained information including one or more of the following: the name of the organization, information related to the organization, the name of the individual, information related to the individual; and 响应于确定所述一个或多个获得的搜索与所述一个或多个标准不匹配,针对其他搜索监视所述对等网络。In response to determining that one or more obtained searches do not match one or more criteria, the peer network is monitored for other searches. 2.根据权利要求1所述的方法,其中将所述一个或多个获得的搜索与所述一个或多个标准进行比较使用下述之一:比较、字符串内、模糊逻辑匹配,或其他比较技术。2. The method of claim 1, wherein comparing the one or more obtained searches with the one or more criteria uses one of the following: comparison, intra-string matching, fuzzy logic matching, or other comparison techniques. 3.根据权利要求1所述的方法,由C++或Visual Basic程序代码来执行。3. The method according to claim 1, executed by C++ or Visual Basic program code. 4.根据权利要求1所述的方法,其中基于更新的标准发出一个或多个新搜索还包括:将具有所述一个或多个新搜索的TCP/IP分组发送到所述对等网络上的网络节点。4. The method of claim 1, wherein issuing one or more new searches based on updated criteria further comprises: sending TCP/IP packets containing the one or more new searches to network nodes on the peer network. 5.根据权利要求1所述的方法,其中所述列表存储在数据库、计算机程序、存储器或适合的存储设备中。5. The method of claim 1, wherein the list is stored in a database, computer program, memory, or suitable storage device. 6.根据权利要求1所述的方法,还包括针对提供对列表的访问而收集费用。6. The method of claim 1, further comprising collecting fees for providing access to the list. 7.根据权利要求1所述的方法,还包括将所述所得信息的列表提供给组织或个人作为如下的证据:允许经由搜索对等网络对敏感或私密信息进行访问,其导致所述组织或个人产生风险。7. The method of claim 1, further comprising providing the list of the obtained information to an organization or individual as evidence that access to sensitive or private information via a peer-to-peer search network poses a risk to the organization or individual. 8.一种网络节点,用来执行计算机程序代码的指令以在对等网络上创建搜索信息列表,包括:8. A network node for executing instructions of computer program code to create a list of search information on a peer-to-peer network, comprising: 包含计算机程序代码的网络节点,被配置为:Network nodes containing computer program code are configured as follows: (1)从对等网络上广播的一个或多个消息获得一个或多个搜索;(1) Obtain one or more searches from one or more messages broadcast on a peer-to-peer network; (2)确定所述一个或多个获得的搜索是否与一个或多个标准匹配,其中所述一个或多个标准是下列之一:指示正在搜索涉及个人、组织、群组或其他可标识的实体的信息的可疑个体的预定义的关键字、关键字集、或者关键字子集;(2) Determine whether the one or more obtained searches match one or more criteria, wherein the one or more criteria are one of the following: predefined keywords, keyword sets, or subsets of keywords indicating that a search is being conducted for information involving a person, organization, group, or other identifiable entity; (3)响应于确定所述一个或多个获得的搜索与所述一个或多个标准匹配:(3) In response to determining that the one or more obtained searches match the one or more criteria: 通过采用帐户标点、复数和搜索的其他变体更新所述一个或多个标准来更新所述一个或多个标准以包括所述一个或多个获得的搜索的变体,The one or more criteria are updated to include the one or more obtained search variations by incorporating account punctuation, plurals, and other variations of the search. 基于更新的标准向所述对等网络发出一个或多个新搜索,所述一个或多个新搜索不同于所述一个或多个获得的搜索,One or more new searches are issued to the peer network based on the updated standards, and these new searches are different from the one or more previously obtained searches. 确定与所述一个或多个新搜索相关联的所得信息,和Determine the obtained information associated with the one or more new searches, and 在数据库中创建所述所得信息的列表,所述所得信息包括以下项中一个或多个:组织的名称、与所述组织有关的信息、个体的名称,与所述个体有关的信息;以及Create a list of the obtained information in the database, the obtained information including one or more of the following: the name of the organization, information related to the organization, the name of the individual, and information related to the individual; and (4)响应于确定所述一个或多个获得的搜索与所述一个或多个标准不匹配,针对其他搜索监视所述对等网络。(4) In response to determining that one or more of the obtained searches do not match one or more of the criteria, monitor the peer network for other searches. 9.根据权利要求8所述的网络节点,其中所述网络节点使用下述之一来将所述一个或多个获得的搜索与所述一个或多个标准进行比较:比较、字符串内、模糊逻辑匹配,或其他比较技术。9. The network node of claim 8, wherein the network node uses one of the following to compare the one or more obtained searches with the one or more criteria: comparison, intra-string matching, fuzzy logic matching, or other comparison techniques. 10.根据权利要求8所述的网络节点,其中所述网络节点通过使用C++或Visual Basic程序代码来创建搜索信息列表。10. The network node of claim 8, wherein the network node creates a list of search information using C++ or Visual Basic program code. 11.根据权利要求8所述的网络节点,其中所述网络节点还被配置为将具有所述一个或多个新搜索的TCP/IP分组发送到通信网络以确定所得信息。11. The network node of claim 8, wherein the network node is further configured to send TCP/IP packets with the one or more new searches to the communication network to determine the obtained information. 12.根据权利要求8所述的网络节点,其中所述列表存储在数据库、计算机程序、存储器或适合的存储设备中。12. The network node of claim 8, wherein the list is stored in a database, a computer program, a memory, or a suitable storage device. 13.根据权利要求8所述的网络节点,其中所述网络节点还被配置为基于所述一个或多个新搜索来标识安全风险。13. The network node of claim 8, wherein the network node is further configured to identify security risks based on the one or more new searches.
HK16106016.9A 2007-04-12 2016-05-26 A system and method for creating a list of shared information on a peer-to-peer network HK1218175B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US92304207P 2007-04-12 2007-04-12
US60/923042 2007-04-12

Publications (2)

Publication Number Publication Date
HK1218175A1 HK1218175A1 (en) 2017-02-03
HK1218175B true HK1218175B (en) 2020-12-24

Family

ID=

Similar Documents

Publication Publication Date Title
AU2008239682B2 (en) A system and method for creating a list of shared information on a peer-to-peer network
US9922330B2 (en) System and method for advertising on a peer-to-peer network
US10841324B2 (en) Method and system for uniquely identifying a user computer in real time using a plurality of processing parameters and servers
US8321952B2 (en) Method and system for monitoring online computer network behavior and creating online behavior profiles
US10263958B2 (en) Internet mediation
CN103875015A (en) Multi-factor identity fingerprinting with user behavior
US20160080319A1 (en) System to identify a computer on a network
Park et al. Improving tor hidden service crawler performance
CN113505260A (en) Face recognition method and device, computer readable medium and electronic equipment
HK1218175B (en) A system and method for creating a list of shared information on a peer-to-peer network
HK1144132A (en) A system and method for creating a list of shared information on a peer-to-peer network
US20070011172A1 (en) Managed e-community trading environments
van Veldhuizen et al. The Bitcoin-Network Protocol from a Forensic Perspective
CN117725041A (en) Data storage method, device, equipment and computer readable storage medium
CN118798904A (en) Object recognition method, device, storage medium and electronic device
AU2012227205A1 (en) System and method for advertising on a peer-to-peer network
JP2004304629A (en) Method and program for managing address data
HK1146967B (en) System and method for advertising on a peer-to-peer network