摘要 |
To protect against the illegal distribution of files in peer-to-peer networks, a method includes activating simulated user terminals on several peer-to-peer networks by protection platforms connected at different points in the network, generating corrupted versions of files to be protected having features identical to those of the files to be protected, and making the corrupted versions available for sharing by means of at least one user terminal simulated by at least one of the protection platforms.
|