Key catalogs in a content centric network
First Claim
1. A computer system to facilitate key retrieval, comprising:
- a processor;
a storage device coupled to the processor and storing instructions that when executed by a computer cause the computer to perform a method, the method comprising;
generating, by a client computing device, a first interest for a key indicated in a signed key catalog, wherein the key indicated in the signed key catalog is embedded within a key set such that a request for another key within the signed key catalog functions as the first interest, wherein the signed key catalog comprises a link to a chunked key stream partitioned based on a chunking protocol;
in response to receiving the key as a received key, verifying the received key by determining that a hash of the received key matches a hash of the key as indicated in the catalog based on a name for the received key;
generating a second interest for a content object, wherein a name for the second interest includes a name prefix associated with the key as indicated in the catalog, wherein the first interest is transmitted before or concurrent with transmitting the second interest; and
in response to receiving the content object, verifying the received content object based on the key.
3 Assignments
0 Petitions
Accused Products
Abstract
One embodiment provides a system that facilitates efficient key retrieval by using key catalogs in a content centric network. During operation, the system generates, by a client computing device, a first interest for a key indicated in a signed key catalog. In response to receiving the key, the system verifies the received key by determining that a hash of the received key matches a hash of the key as indicated in the catalog based on a name for the received key. The system generates a second interest for a content object, wherein a name for the second interest includes a name prefix associated with the key as indicated in the catalog, wherein the first interest is transmitted before or concurrent with transmitting the second interest. In response to receiving the content object, the system verifies the received content object based on the key.
-
Citations
20 Claims
-
1. A computer system to facilitate key retrieval, comprising:
-
a processor; a storage device coupled to the processor and storing instructions that when executed by a computer cause the computer to perform a method, the method comprising; generating, by a client computing device, a first interest for a key indicated in a signed key catalog, wherein the key indicated in the signed key catalog is embedded within a key set such that a request for another key within the signed key catalog functions as the first interest, wherein the signed key catalog comprises a link to a chunked key stream partitioned based on a chunking protocol; in response to receiving the key as a received key, verifying the received key by determining that a hash of the received key matches a hash of the key as indicated in the catalog based on a name for the received key; generating a second interest for a content object, wherein a name for the second interest includes a name prefix associated with the key as indicated in the catalog, wherein the first interest is transmitted before or concurrent with transmitting the second interest; and in response to receiving the content object, verifying the received content object based on the key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method to facilitate key retrieval, the method comprising:
-
generating, by a client computing device, a first interest for a key indicated in a signed key catalog, wherein the key indicated in the signed key catalog is embedded within a key set such that a request for another key within the signed key catalog functions as the first interest, wherein the signed key catalog comprises a link to a chunked key stream partitioned based on a chunking protocol; in response to receiving the key as a received key, verifying the received key by determining that a hash of the received key matches a hash of the key as indicated in the catalog based on a name for the received key; generating a second interest for a content object, wherein a name for the second interest includes a name prefix associated with the key as indicated in the catalog, wherein the first interest is transmitted before or concurrent with transmitting the second interest; and in response to receiving the content object, verifying the received content object based on the key. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer system to facilitate key retrieval, comprising:
-
a processor; a storage device coupled to the processor and storing instructions that when executed by a computer cause the computer to perform a method, the method comprising creating, by a content producing device, a key catalog that indicates a collection of key sets, wherein a key set indicates one or more keys based on a name prefix associated with a respective key, a name for the respective key, and a hash of the respective key; and producing a digital signature for the key catalog based on a private key of the content producing device of the catalog, wherein a given key in the key catalog is embedded within a given key set such that a request for another key within the key catalog functions as a first interest in a content-centric network, and wherein the signed key catalog comprises a link to a chunked key stream partitioned based on a chunking protocol. - View Dependent Claims (20)
-
Specification