System and method for searching for specific types of people or information on a Peer-to-Peer network

ABSTRACT

The present invention provides a system and a method for searching for specific types of people or specific types of information on a Peer-to-Peer network, and in particular, using specific types of search terms as a means of profiling to find specific types of information or specific types of people on a Peer-to-Peer network. When a specific type of person or specific type of information is needed, a specific type of search term is issued on the Peer-to-Peer network. If that specific type of person or specific type of information is available a response will be received.

RELATED PATENT APPLICATION

This is a continuation-in-part of U.S. patent application Ser. No.10/764,111 filed on Jan. 23, 2004 entitled “Method for Monitoring andProviding Information Over a Peer to Peer Network.

FIELD OF THE INVENTION

The present invention provides a system for searching for specific typesof people or specific types of information on a Peer-to-Peer network,and in particular, using specific types of search terms as a means ofprofiling to find specific types of information or specific types ofpeople on a Peer-to-Peer network. A method for searching for specifictypes of people or information on a Peer-to-Peer network is alsoprovided.

BACKGROUND OF THE INVENTION

As used herein, peer to peer networks which are the subject of thepresent invention comprise multiple nodes, each node typicallyconsisting both of file server and client which can send and receivedata or “Communication messages” to or from a node to which such isconnected.

In a peer to peer network each node is connected to other nodes over acommunication medium such as the internet either directly or throughsome type of proxy. For example, when a search request is issued suchoriginating node sends a search request to all of the nodes to which itis connected. (see FIG. 1) These nodes search their list of availablefiles and if a match is found they send a response back with thelocation. However, a peer to peer proxy network typically consists ofnode A which is connected to a node B and node B is connected to a nodeC. (see FIG. 2) Node A is not connected to node C such that if node Aissues a search request it will be forwarded to node B and Node B willsearch its available files and if a match is found it will send aresponse back to node A. Node B will then forward node A's request tonode C and Node C will search its available files and if a match isfound it will send a response back to node B. Node B will then forwardthis response to node A. FIG. 3 discloses a nonproxy loop networkwherein each node is directly connected to another.

Some peer to peer networks utilize a leaf node/main node proxy topology(See FIG. 4) where some nodes are classified as main nodes and theremaining nodes are classified as leaf nodes. Leaf nodes can onlyconnect to main nodes. Only main nodes can connect to other main nodes.When a leaf node issues a search request it sends the request to themain node that it is connected to. The main node then forwards therequest to any other leaf nodes that are connected to it and also to anymain nodes it is connected to. These main nodes forward the request toany leaf nodes that are connected to them.

Commonly these networks are used to share music, movies, and softwarefiles among its users. To access this network a user installs aPeer-to-Peer client software application that is capable of connectingto, and utilizing the Peer-to-Peer network. When installing the softwarethe user must select a folder on their computer system in which to storeany downloaded files. Any files placed into this folder are also madeavailable to other users. For instance, if user #1 places a file named“foofile” in their shared folder, user #2 would then be able to accessand download the file.

For whatever reason, users sometimes select a folder as the sharedfolder that contains sensitive information or information they do nototherwise wish to share or they may later begin to place sensitiveinformation or information they do not otherwise wish to share intotheir shared folder by mistake. Usually this action is done by mistakeand unknowingly by the user but sometimes it is done by a maliciousperson. Sometimes the Peer-to-Peer client software has a software bugthat permits the sharing of files and directories that the user neverintended to be shared. Sometimes it is a violation of corporate policyto have Peer-to-Peer client software installed.

The information shared may be detrimental the user, the company theywork for, or even to national security. For instance, an employee ofcompany “A” may inadvertently be sharing confidential information oncompany “B.” It would therefore be advantageous to locate these peoplewho are sharing sensitive or protected information so that theinformation can be removed or the person can be made to stop sharing theinformation.

Accordingly it is an object of the present invention to provide a methodfor locating specific types of people or specific information onPeer-to-Peer networks by issuing specific search terms that would resultin locating and identifying information that should not be shared.

SUMMARY OF THE INVENTION

Generally, the present invention provides a system for locating specifictypes of people or specific types of information by issuing specificsearch terms known to result in a response from a specific type ofperson or a response by someone with a specific type of information. Thepreferred system comprises:

-   -   a. a storage medium for storing instructions;    -   b. a user input device for receiving user input; and    -   c. a processor unit operable to process the user input and to        use the instructions to execute a program to:        -   i. connect to the Peer-to-Peer network; and        -   ii. issue a search for a specific term or specific group of            terms for a specific type of person or a specific type of            information.

The present invention also provides a method for locating specific typesof people or specific types of information.

Other advantages of the present invention will become apparent from aperusal of the following detailed description of presently preferredembodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a simplified schematic of a two node peer to peer network;

FIG. 2 is a simplified schematic of a peer to peer proxy network;

FIG. 3 is a simplified schematic view of a peer to peer, nonproxy, loopnetwork.

DESCRIPTION OF PRESENTLY PREFERRED EMBODIMENTS

The preferred system of the present invention advantageously utilizesspecific terms or groups of terms to locate specific types of people orspecific types of information.

In the preferred embodiment, the invention is embodied in a computersystem that contains a processor unit, main memory, and an interconnectbus. The processor unit may contain a single microprocessor, or maycontain a plurality of microprocessors for configuring the computer as amulti-processor system. The main memory stores, in part, instructionsand data for execution by the processor unit. If the ability of theinventive system is wholly or partially implemented in software, themain memory stores the executable code when in operation. The mainmemory may include banks of dynamic random access memory as well as highspeed memory.

The computer system may further include a mass storage device,peripheral devices, portable storage medium drives, input controldevice, a graphics subsystem, and an output display. The computer systemmay be connected through one or more data transport means. For example,the processor unit and the main memory may be connected via a localmicroprocessor bus, and the mass storage device, peripheral devices,portable storage medium drives, graphics subsystem may be connected viaone or more input/output (I/O) busses. The mass storage device, whichmay be implemented with a magnetic disk drive or an optical disk drive,is nonvolatile storage device for storing data and instructions for useby the processor unit. In the software embodiment, the mass storagedevice stores the software for loading to the main memory.

The input control device(s) provide a portion of the user interface fora user of the computer system. The input control devices may include analpha numeric keypad for inputting alphanumeric and other keyinformation, a cursor control device, such as a mouse, a trackball, astylus, or cursor direction keys. In order to display textual andgraphical information, the computer system contains the graphicssubsystem and the output display. The output display may include acathode ray tube display or a liquid crystal display. The graphicssubsystem receives textual and graphical information and processes theinformation for output to the output display.

The components contained in the computer system are those typicallyfound in general purpose computer systems, and in fact, these componentsare intended to represent a broad category of such computer componentsthat are well known in the art.

The system may be implemented in either hardware or software. For thesoftware embodiment, the software that includes a plurality of computerexecutable instructions for implementation on a general purpose computersystem. Prior to loading into a general purpose computer system, thesystem may reside as encoded information on a computer readable medium,such as a magnetic floppy disc, magnetic tape compact disc read onlymemory (CD-ROM). In one hardware embodiment, the system may comprise adedicated processor including processor instructions for performing thefunctions described herein. Circuits may also be developed to performthe functions described herein.

In one preferred embodiment of the present invention, issuing a searchfor the term MBNA, dispute, statement, bank, Citibank, american express,bankone, card services, chase, checking, debit, deposit, firstusa, loan,payment, savings, or transaction will result in locating people and/orinformation related to financial accounts.

In another embodiment of the present invention, issuing a search for theterm dispute, cover letter, resume, creditcard, mbna, or Citibank willresult in locating people and/or information related to identify theftand credit card disputes.

In another embodiment of the present invention, issuing a search for theterm stock, broker, Merrill, smith barney, ameritrade, datek, scottrade,charlesswab, dividend, jpmorgan, or tdwaterhouse will result in locatingpeople and/or information related to investment accounts.

In another embodiment of the present invention, issuing a search for theterm chairman, board of directors, CFO, CEO, CTO, COO, CXO, or boardmeeting will result in locating people and/or information related tocorporate executives or corporate operations.

In another embodiment of the present invention, issuing a search for theterm budget or audit will result in locating people and/or informationrelated to corporate financials.

In another embodiment of the present invention, issuing a search for theterm board meeting, chairman, confidential, contact list, client list,contract, agreement, FYI05, FYI04, FYI06, FYI07 (and so on), agmt,agreement, executive, or budget will result in locating people and/orinformation related to miscellaneous corporate operations.

In another embodiment of the present invention, issuing a search for theterm contact list, client list, forecast, NDA, SOW, proposal, RFQ, RFP,or RFI will result in locating people and/or information related tosales.

In another embodiment of the present invention, issuing a search for theterm Deposition, disclosure, NDA, mutual, or Confidentiality will resultin locating people and/or information related to legal matters.

In another embodiment of the present invention, issuing a search for theterm DSC will result in locating people and/or information related topictures.

In another embodiment of the present invention, issuing a search for theterm SF85P or EPSQ will result in locating people and/or informationrelated to security clearances.

In another embodiment of the present invention, issuing a search for theterm response plan, emergency plan, preparedness, DHS, homelandsecurity, coast guard, DHHS, smallpox, or emergency will result inlocating people and/or information related to homeland security.

In another embodiment of the present invention, issuing a search for theterm USCG, DHS, Homeland Security, USSS, FBI, or CIA will result inlocating people and/or information related to protection agencies orinvestigation units.

In another embodiment of the present invention, issuing a search for theterm r@ygold, boylover, childlover, pedo, pedofile, pedophile,Pedophilia, kiddy, Lolita, prelolitas, b@rebone, or ddoggprn will resultin locating people and/or information related to child pornography.

In another embodiment of the present invention, issuing a search for theterm Incident or investigation will result in locating people and/orinformation related to investigations.

In another embodiment of the present invention, issuing a search for theterm phrack, 2600, credit cards, hacker, hack, anarchist cookbook, orcredit will result in locating people and/or information related tohackers.

In another embodiment of the present invention, issuing a search for theterm aetc, afcc, afic, aflc, afmc, afres, afspc, afsoc, afsc, apgc, hqc,pacaf, or usafe will result in locating people and/or informationrelated to Air Force commands.

In another embodiment of the present invention, issuing a search for theterm usareur, forscom, tradoc, usace, medcom, usarpac, smdc, usasoc, ormtmc will result in locating people and/or information related to Armycommands.

In another embodiment of the present invention, issuing a search for theterm SOP, OPORD or annex will result in locating people and/orinformation related to military cadets.

In another embodiment of the present invention, issuing a search for theterm northcom, usnorthcom, uscentcom, centcom, useucom, eucom, uspacom,pacom, ussouthcom, or southcom will result in locating people and/orinformation related to major military commands.

In another embodiment of the present invention, issuing a search for theterm accenture, booz allen, Lockheed, Boeing, Raytheon, GeneralDynamics, Litton, GTE, Textron, Humana, DynCorp, Sverdrup, Halliburton,Aerospace, Unisys, Worldcorp, Mitretek, Ssangyong, Teledyne, orSabreliner will result in locating people and/or information related tomilitary or government contractors.

In another embodiment of the present invention, issuing a search for theterm CONOPS will result in locating people and/or information related todesign concepts.

In another embodiment of the present invention, issuing a search for theterm barracks, battalion, brigade, division, or regiment will result inlocating people and/or information related to military units.

In another embodiment of the present invention, issuing a search for theterm intsum, inscom, C4isr, c4i, c4isp, c4i-sp, c4i-sr, c4i-ta, c3i willresult in locating people and/or information related to intelligence.

In another embodiment of the present invention, issuing a search for theterm spawar, navsoc, cnrse, USFLTFORCOM, comUSFLTFORCOM, COMUSNAVEUR,USNAVEUR, airlant, airpac, surflant, surfor, ussurfor, comnavsurflant,navsurflant, secondfleet, c3f, cusns, cmwc, COMINEWARCOM, MINEWARCOM,ewtglant, or cffc will result in locating people and/or informationrelated to Naval commands.

In another embodiment of the present invention, issuing a search for theterm frago, bolo, sitrep, intsum, SPOD, RSOI, conop, warno, opord,fragord, warnord, oplan, or MDMP will result in locating people and/orinformation related to military operations.

In another embodiment of the present invention, issuing a search for theterm that are numbers with a suffix of “th”, “rd”, and “nd” will resultin locating people and/or information related to military units.

In another embodiment of the present invention, issuing a search for theterm improvised, PETN, explosives, FM, cyanide, Islamic, jihad, Koran,mujahid, mujahideen, muslim, ricin, underground storage, advancedlanguage patterns, dead sea scrolls, department homeland security, whitepower, nitrite, nitrate, military, sniper training, poison, silencer, oranarchists will result in locating people and/or information related toterrorists.

In another embodiment of the present invention, issuing a search for theterm Koran, Dead Sea Scrolls, Muslim, Islamic, or Islam will result inlocating people and/or information related to muslim culture.

EXAMPLES

The following Example illustrates an embodiment of the system accordingto the present Invention.

Example 1

This example illustrates a system for locating information relating tomilitary operations.

Military operation change orders are called frago's. In this exampleuser #1 wishes to locate military personnel. User #1 connects to thePeer-to-Peer network and issues a search for the term “frago.” User #2is in the military and has a file named “frago-opordl.doc.” User #2responds to User #1 that he possesses a file that matches the term“frago” and makes the file available for User #1 to download. User #1has located military information being shared by military personnel.

1. A system for searching a Peer-to-Peer Network for at least one ofspecific types of people or specific types of information by using atleast one specific search term known to result in locating said specifictypes of people or specific types of information, said systemcomprising: a. a storage medium for storing instructions; b. a userinput device for receiving user input; and c. a processor unit operableto process said user input and to use said instructions to execute aprogram to: i. connect to said Peer-to-Peer network; and ii. issue atleast one specific search term known to locate said specific types ofpeople or specific types of information.
 2. A system as set forth inclaim 1 wherein said specific types of people or said specific types ofinformation are related to financial accounts.
 3. A system as set forthin claim 2 wherein said specific search term is at least one termselected from the group consisting of MBNA, dispute, statement, bank,Citibank, american express, bankone, card services, chase, checking,debit, deposit, firstusa, loan, payment, savings, and transaction.
 4. Asystem as set forth in claim 1 wherein said specific types of people orsaid specific types of information are related to identify theft andcredit card disputes.
 5. A system as set forth in claim 4 wherein saidspecific search term is at least one term selected from the groupconsisting of dispute, cover letter, resume, creditcard, mbna, andCitibank.
 6. A system as set forth in claim 1 wherein said specifictypes of people or said specific types of information are related toinvestment accounts.
 7. A system as set forth in claim 6 wherein saidspecific search term is at least one term selected from the groupconsisting of stock, broker, Merrill, smith barney, ameritrade, datek,scottrade, charlesswab, dividend, jpmorgan, and tdwaterhouse.
 8. Asystem as set forth in claim 1 wherein said specific types of people orsaid specific types of information are related to corporate executivesor corporate operations.
 9. A system as set forth in claim 8 whereinsaid specific search term is at least one term selected from the groupconsisting of chairman, board of directors, CFO, CEO, CTO, COO, CXO,andboard meeting.
 10. A system as set forth in claim 1 wherein saidspecific types of people or said specific types of information arerelated to corporate financials.
 11. A system as set forth in claim 10wherein said specific search term is at least one term selected from thegroup consisting of budget and audit.
 12. A system as set forth in claim1 wherein said specific types of people or said specific types ofinformation are related to miscellaneous corporate operations.
 13. Asystem as set forth in claim 12 wherein said specific search term is atleast one term selected from the group consisting of board meeting,chairman, confidential, contact list, client list, contract, agreement,FYI05, FYI04, FY106, FYI07 (and son on), agmt, agreement, executive, andbudget.
 14. A system as set forth in claim 1 wherein said specific typesof people or said specific types of information are related to sales.15. A system as set forth in claim 14 wherein said specific search termis at least one term selected from the group consisting of contact list,client list, forecast, NDA, SOW, proposal, RFQ, RFP, and RFI.
 16. Asystem as set forth in claim 1 wherein said specific types of people orsaid specific types of information are related to legal matters.
 17. Asystem as set forth in claim 16 wherein said specific search term is atleast one term selected from the group consisting of Deposition,disclosure, NDA, mutual, and Confidentiality.
 18. A system as set forthin claim 1 wherein said specific types of people or said specific typesof information are related to pictures.
 19. A system as set forth inclaim 18 wherein said specific search term is DSC.
 20. A system as setforth in claim 1 wherein said specific types of people or said specifictypes of information are related to security clearances.
 21. A system asset forth in claim 20 wherein said specific search term is at least oneterm selected from the group consisting of SF85P and EPSQ.
 22. A systemas set forth in claim 1 wherein said specific types of people or saidspecific types of information are related to homeland security.
 23. Asystem as set forth in claim 22 wherein said specific search term is atleast one term selected from the group consisting of response plan,emergency plan, preparedness, DHS, homeland security, coast guard, DHHS,smallpox, and emergency.
 24. A system as set forth in claim 1 whereinsaid specific types of people or said specific types of information arerelated to protection or investigation agencies.
 25. A system as setforth in claim 24 wherein said specific search term is at least one termselected from the group consisting of USCG, DHS, Homeland Security,USSS, FBI, and CIA.
 26. A system as set forth in claim 1 wherein saidspecific types of people or said specific types of information arerelated to child pornography.
 27. A system as set forth in claim 26wherein said specific search term is at least one term selected from thegroup consisting of r@ygold, boylover, childlover, pedo, pedofile,pedophile, Pedophilia, kiddy, Lolita, prelolitas, b@rebone, andddoggprn.
 28. A system as set forth in claim 1 wherein said specifictypes of people or said specific types of information are related toinvestigations.
 29. A system as set forth in claim 28 wherein saidspecific search term is at least one term selected from the groupconsisting of incident and investigation.
 30. A system as set forth inclaim 1 wherein said specific types of people or said specific types ofinformation are related to hackers.
 31. A system as set forth in claim28 wherein said specific search term is at least one term selected fromthe group consisting of phrack, 2600, credit cards, hacker, hack,anarchist cookbook, and credit.
 32. A system as set forth in claim 1wherein said specific types of people or said specific types ofinformation are related to Air Force Commands.
 33. A system as set forthin claim 32 wherein said specific search term is at least one termselected from the group consisting of, aetc, afcc, afic, aflc, afmc,afres, afspc, afsoc, afsc, apgc, hqc, pacaf, and usafe.
 34. A system asset forth in claim 1 wherein said specific types of people or saidspecific types of information are related to Army Commands.
 35. A systemas set forth in claim 34 wherein said specific search term is at leastone term selected from the group consisting of usareur, forscom, tradoc,usace, medcom, usarpac, smdc, usasoc, and mtmc.
 36. A system as setforth in claim 1 wherein said specific types of people or said specifictypes of information are related to military cadets.
 37. A system as setforth in claim 36 wherein said specific search term is at least one termselected from the group consisting of SOP, OPORD and annex.
 38. A systemas set forth in claim 1 wherein said specific types of people or saidspecific types of information are related to major military commands.39. A system as set forth in claim 38 wherein said specific search termis at least one term selected from the group consisting of northcom,usnorthcom, uscentcom, centcom, useucom, eucom, uspacom, pacom,ussouthcom, and southcom.
 40. A system as set forth in claim 1 whereinsaid specific types of people or said specific types of information arerelated to military or government contractors.
 41. A system as set forthin claim 40 wherein said specific search term is at least one termselected from the group consisting of accenture, booz allen, Lockheed,Boeing, Raytheon, General Dynamics, Litton, GTE, Textron, Humana,DynCorp, Sverdrup, Halliburton, Aerospace, Unisys, Worldcorp, Mitretek,Ssangyong, Teledyne, and Sabreliner.
 42. A system as set forth in claim1 wherein said specific types of people or said specific types ofinformation are related to design concepts.
 43. A system as set forth inclaim 42 wherein said specific search term is CONOPS.
 44. A system asset forth in claim 1 wherein said specific types of people or saidspecific types of information are related to military units.
 45. Asystem as set forth in claim 44 wherein said specific search term is atleast one term selected from the group consisting of barracks,battalion, brigade, division, and regiment.
 46. A system as set forth inclaim 1 wherein said specific types of people or said specific types ofinformation are related to intelligence.
 47. A system as set forth inclaim 46 wherein said specific search term is at least one term selectedfrom the group consisting of intsum, inscom, C4isr, c4i, c4isp, c4i-sp,c4i-sr, c4i-ta, and c3i.
 48. A system as set forth in claim 1 whereinsaid specific types of people or said specific types of information arerelated to Naval Commands.
 49. A system as set forth in claim 48 whereinsaid specific search term is at least one term selected from the groupconsisting of spawar, navsoc, cnrse, USFLTFORCOM, comUSFLTFORCOM,COMUSNAVEUR, USNAVEUR, airlant, airpac, surflant, surfor, ussurfor,comnavsurflant, navsurflant, secondfleet, c3f, cusns, cmwc,COMINEWARCOM, MINEWARCOM, ewtglant, and cffc.
 50. A system as set forthin claim 1 wherein said specific types of people or said specific typesof information are related to military operations.
 51. A system as setforth in claim 50 wherein said specific search term is at least one termselected from the group consisting of frago, bolo, sitrep, intsum, SPOD,RSOI, conop, warno, opord, fragord, warnord, oplan, and MDMP.
 52. Asystem as set forth in claim 1 wherein said specific types of people orsaid specific types of information are related to military units.
 53. Asystem as set forth in claim 52 wherein said specific search term is atleast one term selected from the group consisting of numbers with asuffix of “th”, “rd”, and “nd.”
 54. A system as set forth in claim 1wherein said specific types of people or said specific types ofinformation are related to terrorists.
 55. A system as set forth inclaim 54 wherein said specific search term is at least one term selectedfrom the group consisting of improvised, PETN, explosives, FM, cyanide,Islamic, jihad, Koran, mujahid, mujahideen, muslim, ricin, undergroundstorage, advanced language patterns, dead sea scrolls, departmenthomeland security, white power, nitrite, nitrate, military, snipertraining, poison, silencer, and anarchists.
 56. A system as set forth inclaim 1 wherein said specific types of people or said specific types ofinformation are related to muslim culture.
 57. A system as set forth inclaim 56 wherein said specific search term is at least one term selectedfrom the group consisting of Koran, Dead Sea Scrolls, Muslim, Islamic,and Islam.
 58. A method for searching a Peer-to-Peer Network for atleast one of specific types of people or specific types of informationby using at least one specific search term known to result in locatingsaid specific types of people or specific types of information, saidmethod comprising the steps of: a. connecting to said Peer-to-Peernetwork; and b. issuing at least one specific search term known tolocate said specific types of people or specific types of information.