A method obtains a first data item signature for a first data item, the first data item signature comprising an association between a plurality of synch points in the first data item and a corresponding plurality of block signatures. The process attempts to find one of the synch points in a second d
A method obtains a first data item signature for a first data item, the first data item signature comprising an association between a plurality of synch points in the first data item and a corresponding plurality of block signatures. The process attempts to find one of the synch points in a second data item; and, if such a synch point is found, then a block signature of a corresponding block of bits in the second data item is determined. The process ascertains whether the synch point and corresponding block signature from the second data item correspond to a synch point and block signature in the first data item. If a predetermined number of synch points and corresponding block signatures match, the first and second data items are considered to match. In response to said determining, one or more actions associated with the first data item are performed.
대표청구항▼
1. A computer-implemented method, implemented by hardware in combination with software, the method comprising, at least in part on a particular device in a network: (A) obtaining a first data stream signature for a first data stream, the first data stream signature comprising an association between
1. A computer-implemented method, implemented by hardware in combination with software, the method comprising, at least in part on a particular device in a network: (A) obtaining a first data stream signature for a first data stream, the first data stream signature comprising an association between a plurality of synch points in the first data stream and a corresponding plurality of block signatures, and associating at least one action with said first data stream, wherein said association comprises an ordered sequence of corresponding synch point and block signature pairs, and wherein, for a particular pair comprising a particular synch point and a particular block signature, the particular block signature associated with the particular synch point was determined by applying a hash function or message digest function to a corresponding particular block of bits associated with the particular synch point, and wherein said data stream signature is based on fewer than all of the bits in the data stream;(B) attempting to find a synch point of the plurality of synch points in a second data stream; and(C) if a synch point of the plurality of synch points is found in the second data stream, then: (C)(1) determining a block signature of a corresponding block of bits in the second data stream, wherein the block signature is determined by applying a hash function or message digest function to the corresponding block of bits in the second data stream; and(C)(2) ascertaining whether or not the synch point and the corresponding block signature from the second data stream correspond to a synch point and block signature in the first data stream signature; and(C)(3) when the synch point and the corresponding block signature from the second data stream correspond to a synch point and block signature in the first data stream signature, maintaining information indicative of the correspondence;(D) repeating steps (B) and (C) while at least some of the second data stream remains unprocessed, until a predetermined number of synch points and corresponding block signatures from the second data stream match synch points and corresponding block signatures in the first data stream signature;(E) determining a match between the first data stream and the second data stream when the predetermined number of synch points and corresponding block signatures from the second data stream match synch points and corresponding block signatures in the first data stream signature; and(F) in response to said determining a match in (E), performing one or more actions of said at least one action associated with the first data stream. 2. The method of claim 1 wherein steps (B) and (C) are repeated in parallel for multiple different portions of the second data stream. 3. The method of claim 1 wherein at least one of said one or more actions associated with the first data stream are selected from: (F)(1) denying access to the second data stream;(F)(2) maintaining information about the second data stream. 4. The method of claim 3 wherein the information maintained in (F)(2) includes information about the particular device. 5. The method of claim 1 wherein the particular device is a router in said network. 6. The method of claim 1 further comprising: obtaining a plurality of packets; andextracting payload information from the plurality of packets to obtain at least some of the second data stream. 7. The method of claim 1 further comprising: (H) in the event of a match between the first data stream and the second data stream, as determined in (E), subjecting the second data stream to additional checking to determine if it is the same as the first data stream. 8. The method of claim 1 wherein the corresponding block of bits of each particular synch point is directly adjacent to the particular synch point. 9. The method of claim 1 wherein said second data stream comprises a stream. 10. The method of claim 9 wherein at least one of said one or more actions associated with the first data stream are selected from: (i) stopping the stream; (ii) modifying the stream; and (iii) tracking information about the stream. 11. The method of claim 10 wherein said modifying the stream comprises: replacing at least a portion of the stream with another stream. 12. The method of claim 11 wherein the stream is modified so that the stream's synch points and corresponding block signatures do not change. 13. The method of claim 10 wherein said tracking information about the stream comprises tracking one or more of: date information, time information, source information, and destination information. 14. A computer-implemented method, implemented by hardware in combination with software, the method comprising, at least in part on a particular device in a network: (A) obtaining a plurality of data stream signatures, at least one signature for each of a plurality of data stream, the data stream signature for each particular data stream of the plurality of data stream comprising an association between a plurality of synch points in the particular data stream and a corresponding plurality of block signatures for the particular data stream,wherein said association comprises an ordered sequence of corresponding synch point and block signature pairs, and wherein, for a particular pair comprising a particular synch point and a particular block signature,and wherein said data stream signature is based on fewer than all of the bits in the data stream;(B) attempting to find a synch point of the plurality of data stream signatures in a second data stream; and(C) if a synch point of the plurality of data stream signatures is found in the second data stream, then: (C)(1) determining a block signature of a corresponding block of bits in the second data stream, wherein the block signature is determined by applying a hash function or message digest function to the corresponding block of bits in the second data stream; and(C)(2) ascertaining whether or not the synch point and the corresponding block signature of the second data stream correspond to a synch point and block signature in any of the plurality of data stream signatures; and(C)(3) when the synch point and the corresponding block signature of the second data stream correspond to a synch point and block signature in one or more of the plurality of data stream signatures, maintaining information indicative of the correspondence;(D) repeating steps (B) and (C) while at least some of the second data stream remains unprocessed, until a predetermined number of synch points and corresponding block signatures from the second data stream match synch points and corresponding block signatures in at least one of the plurality of data stream signatures;(E) when a predetermined number of synch points and corresponding block signatures from the second data stream match the predetermined number of synch points and block signatures in a first data stream signature of the plurality of data stream, said first data stream signature corresponding to a first data stream, indicating a match between the first data stream and the second data stream; and(F) in response to said determining a match in (E), performing one or more actions associated with the first data stream. 15. The method of claim 14 wherein at least one of said one or more actions associated with the first data stream are selected from: (F)(1) denying access to the second data stream;(F)(2) maintaining information about the second data stream;(F)(3) stopping the second data stream; and(F)(4) modifying the second data stream. 16. The method of claim 15 wherein the particular device comprises a router in said network. 17. A non-transitory computer-readable recording medium storing one or more programs, which, when executed, cause one or more computers in a network to, at least: (A) obtain a first data stream signature for a first data stream, the first data stream signature comprising an association between a plurality of synch points in the first data stream and a corresponding plurality of block signatures,wherein said association comprises an ordered sequence of corresponding synch point and block signature pairs, and wherein, for a particular pair comprising a particular synch point and a particular block signature, and wherein said data stream signature is based on fewer than all of the bits in the data stream,and associating at least one action with said first data stream;(B) attempt to find a synch point of the plurality of synch points in a second data stream; and(C) if a synch point of the plurality of synch points is found in the second data stream, then: (C)(1) determine a block signature of a corresponding block of bits in the second data stream, wherein the block signature is determined by applying a hash function or message digest function to the corresponding block of bits in the second data stream; and(C)(2) ascertain whether or not the synch point and the corresponding block signature from the second data stream correspond to a synch point and block signature in the first data stream signature; and(C)(3) when the synch point and the corresponding block signature from the second data stream correspond to a synch point and block signature in the first data stream signature, maintain information indicative of the correspondence;(D) repeat steps (B) and (C) while at least some of the second data stream remains unprocessed, until a predetermined number of synch points and corresponding block signatures from the second data stream match synch points and corresponding block signatures in the first data stream signature;(E) determine a match between the first data stream and the second data stream when the predetermined number of synch points and corresponding block signatures from the second data stream match synch points and corresponding block signatures in the first data stream signature; and(F) in response to said determining a match in (E), perform one or more actions of said at least one action associated with the first data stream. 18. The non-transitory computer-readable recording medium of claim 17 wherein at least one of said one or more actions associated with the first data stream are selected from: (F)(1) denying access to the second data stream;(F)(2) maintaining information about the second data stream;(F)(3) stopping the second data stream; and (F)(4) modifying the second data stream. 19. Readable recording medium of claim 18 wherein said modifying the second data second data stream comprises: replacing at least a portion of the second data stream with another stream. 20. The non-transitory computer-readable recording medium of claim 17 wherein said one or more computers comprise a router in said network.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (25)
Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
Farber David A. ; Lachman Ronald D., Data processing system using substantially unique identifiers to identify data items, whereby identical data items hav.
Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Vijayaraghavan, Srinivas Belur; Aswathanarayana, Tejasvi, Hash-based access to resources in a data processing network.
Rieck, Konrad; Laskov, Pavel; Mueller, Klaus-Robert; Duessel, Patrick, Method and apparatus for automatic comparison of data sequences using local and global relationships.
Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Vijayaraghavan, Srinivas Belur; Aswathanarayana, Tejasvi, Methods, apparatus and computer programs for enhanced access to resources within a network.
Mattox, Jason; Feathergill, David Allen; Afonso, Delano Xavier; Herman, Jeremy Christopher; Bryant, III, Thomas H., Replication systems and methods for a virtual computing environment.
Davis, Marc Eliot; O'Sullivan, Joseph James; Higgins, Christopher William; Saft, Keith David; Hayashi, Nathanael Joe; Boerries, Marco; Callan, Paul; Wroblewski, Luke, System and method for delivery of augmented messages.
Woodhill James R. (Houston TX) Woodhill Louis R. (Richmond TX) More ; Jr. William Russell (Houston TX) Berlin Jay Harris (Houston TX), System and method for distributed storage management on networked computer systems using binary object identifiers.
Ozawa, Toshiro; Tran, Dang Van; Kashyap, Praveen; Xie, Fei, System and method for real-time video content sharing with synchronization via closed-caption metadata.
Ackerman, Steve F.; Hull, Christopher S.; Stokes, Ryan Q., System and method for transmitting needed portions of a data file between networked computers.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.