Tiversa, Inc. Patent applications |
Patent application number | Title | Published |
20120191849 | Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 07-26-2012 |
20120185601 | Method For Optimally Utilizing A Peer To Peer Network - In accordance with an embodiment of the invention, there is provided a method for splitting a load of monitoring a peer to peer network. The method has a first node in the peer to peer network receiving information reported by a second node in the peer to peer network, including information concerning which nodes are connected to the second node. The method further has the first node connecting to nodes different from the nodes that are connected to the second node using the received information. The method still further has the first node reporting information, including information concerning which nodes are connected to the first node, such that the second node also has access to the reported information, thereby splitting the load of monitoring the peer to peer network among the first and second nodes. | 07-19-2012 |
20120185536 | Method For Optimally Utilizing A Peer To Peer Network - In accordance with an embodiment of the invention, there is provided a method for splitting a load of monitoring a peer to peer network. The method has a first node in the peer to peer network receiving information reported by a second node in the peer to peer network, including information concerning which nodes are connected to the second node. The method further has the first node connecting to nodes different from the nodes that are connected to the second node using the received information. The method still further has the first node reporting information, including information concerning which nodes are connected to the first node, such that the second node also has access to the reported information, thereby splitting the load of monitoring the peer to peer network among the first and second nodes. | 07-19-2012 |
20110289209 | Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 11-24-2011 |
20110289151 | Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID. | 11-24-2011 |
20110066695 | METHOD FOR OPTIMALLY UTIILIZING A PEER TO PEER NETWORK - In accordance with an embodiment of the invention, there is provided a method for splitting a load of monitoring a peer to peer network. The method has a first node in the peer to peer network receiving information reported by a second node in the peer to peer network, including information concerning which nodes are connected to the second node. The method further has the first node connecting to nodes different from the nodes that are connected to the second node using the received information. The method still further has the first node reporting information, including information concerning which nodes are connected to the first node, such that the second node also has access to the reported information, thereby splitting the load of monitoring the peer to peer network among the first and second nodes. | 03-17-2011 |
20110029660 | METHOD FOR MONITORING AND PROVIDING INFORMATION OVER A PEER TO PEER NETWORK - A pseudonode for deployment on a peer to peer network. The pseudonode is programmed for monitoring the peer to peer network to receive search requests therefrom, optionally comparing each said received search with said list of data objects, and to respond to such requests. The response may include advertising; the advertising may be selected in response to the request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method further includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode, and responding to substantially each node representing an acquired ID. | 02-03-2011 |
20080263013 | System and method for creating a list of shared information on a peer-to-peer network - Today information Peer-to-Peer networks sometimes share improper information. Embodiments of the invention solve this problem by creating a list of shared information for analysis. In particular, a method or corresponding apparatus of an example embodiment includes a network node to obtain one or more searches from a Peer-to-Peer network. Next, the network node compares the one or more searches to one or more criteria. After comparing, the network node updates the one or more criteria to include variations of the one or more searches. Further, the network node issues the one or more searches based on the updated criteria. Next, the network node determines resultant information associated with the one or more searches. After determining, the network node creates a list of the resultant information for analysis. Using the list, an operator or software logic can analyze the resultant information to identify patterns and, in turn, identify improper information sharing. | 10-23-2008 |