Method and system for distributing data in a network
First Claim
1. A method of distributing data between nodes in a network constructed by mutually connecting the nodes, each of the nodes including topology management means for managing topology information for recognizing a connection relationship between an upstream node and a downstream node, means for exchanging the topology information between the nodes, and transmission/reception means for the stream data, the method comprising the steps of:
- executing connection between the upstream node and the downstream node;
exchanging the topology information between the upstream node and the downstream node which are connected to each other; and
transmitting the stream data to a downstream node recognized on the basis of the topology information when serving as an upstream node.
1 Assignment
0 Petitions
Accused Products
Abstract
A data distribution method is disclosed which can realize autonomous or private data distribution between user terminals in a network environment such as the Internet. In this method, the respective nodes exchange topology information indicating a connection relationship between upstream nodes and downstream nodes, and relay stream data from the upstream nodes to the downstream nodes. Each node arbitrarily separates from the network and connects to an upstream node in accordance with a predetermined condition.
-
Citations
24 Claims
-
1. A method of distributing data between nodes in a network constructed by mutually connecting the nodes,
each of the nodes including topology management means for managing topology information for recognizing a connection relationship between an upstream node and a downstream node, means for exchanging the topology information between the nodes, and transmission/reception means for the stream data, the method comprising the steps of: -
executing connection between the upstream node and the downstream node;
exchanging the topology information between the upstream node and the downstream node which are connected to each other; and
transmitting the stream data to a downstream node recognized on the basis of the topology information when serving as an upstream node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable storage medium comprising:
-
an instruction for causing a computer to execute transmission/reception of stream data between nodes in a network constructed by connecting the nodes to each other;
an instruction for causing the computer to execute functions of registering, updating, and providing topology information for recognition of a connection relationship between an upstream node and a downstream node;
an instruction for causing the computer to execute connection between an upstream node and a downstream node;
an instruction for causing the computer to exchange the topology information between the upstream node and the downstream node which are connected to each other; and
an instruction for causing the computer to transmit or relay the stream data to a downstream node recognized on the basis of the topology information when operating as an upstream node. - View Dependent Claims (13, 14, 15)
-
-
16. A system for distributing data between nodes in a network constructed by connecting the nodes to each other, comprising:
-
means for establishing connection between an upstream node and downstream node or cutting connection therebetween;
means for managing topology information for recognizing a connection relationship between an upstream node and a downstream node;
means for exchanging the topology information between an upstream node and a downstream node which are connected to each other; and
means for transmitting the stream data to a downstream node recognized on the basis of the topology information, when operating as an upstream node.
-
-
17. An authentication method of realizing an authentication function between a plurality of nodes connected to a computer network, and using public key cryptography using encryption key data and decryption key data in pairs,
each of the nodes being configured to operate as one of an upstream node which transmits data, a downstream node which received data, and a relay node which is a downstream node and also serves as an upstream node, and key data providing means for providing the decryption key data to the upstream node, and providing the downstream node or relay node with connection authentication key data obtained by encrypting authentication information containing node identification information for identifying a proper downstream node by using the encryption key data, the method comprising the steps of: -
transmitting the connection authentication key data acquired from the key data providing means by a predetermined procedure to an upstream node as a connection request target;
causing an upstream node to decrypt the connection authentication key data received from a downstream node by using the decryption key data acquired from the key data providing means and execute authentication processing with respect to the downstream node by using authentication information contained in the decrypted connection authentication key data; and
causing a relay node to serve as downstream node and decrypt the connection authentication key data acquired from another downstream node by using the decryption key data acquired from another upstream node, thereby executing authentication processing with respect to said another downstream node by using authentication information contained in the decrypted connection authentication key data. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A computer-readable storage medium upon which coded steps are written for a method of executing authentication between a plurality of nodes connected to a computer network by using a public key encryption scheme using decryption key data and encryption key data in pairs,
each of the nodes including a computer which executes the program and being configured to operate as one of an upstream node which transmits data, a downstream node which receives data, and a relay node which is a downstream node and also functions as an upstream node, wherein the method comprises the steps of: -
providing the decryption key data to the upstream node by a predetermined procedure;
providing the downstream node or the relay node with connection authentication key data obtained by encrypting authentication information containing node identification information for identifying a proper downstream node by using the encryption key data;
causing a downstream node to transmit the connection authentication key data acquired by a predetermined procedure to an upstream node as a connection request target;
causing an upstream node to decrypt the connection authentication key data from a downstream node by using the acquired decryption key data;
causing an upstream node to execute authentication processing with respect to the downstream node by using authentication information contained in the decrypted connection authentication key data;
causing a relay node to serve as a downstream node and decrypt the connection authentication key data from another downstream node by using the decryption key data acquired from another upstream node; and
executing authentication processing with respect to said another downstream node by using authentication information contained in the decrypted connection authentication key data.
-
-
23. A method of performing contents distribution accompanied by authentication processing between a plurality of nodes connected to a computer network,
each of the nodes being configured to operate as one of a distribution source node which provides a contents distribution service, a user node which receives the contents distribution service, and a relay node functioning as a user node and a contents distribution relay node, a specific node of the nodes providing the distribution source node with authentication master key data corresponding to the decryption key data by a predetermined procedure in public key cryptography using encryption key data and decryption key data in pairs, and the specific node including electronic ticket providing means for providing the user node or the relay node with an electronic ticket obtained by encrypting authentication information containing node identification information for identifying a proper node and contents identification information for identifying a content as a distribution target by using the encryption key data by a predetermined procedure in accordance with a request from the user node or the relay node, the method comprising the steps of: -
decrypting the electronic ticket received from the user node or the relay node by using the authentication master key data acquired from the electronic ticket providing means in accordance with a contents distribution request from the user node or the relay node;
executing collation between the authentication information decrypted in the decrypting step and the plain text authentication information received from the user node or the relay node; and
when the collation result in the collating step indicated a coincidence, determining that the user node or the relay node which has generated the distribution request is a proper node, and distributing a content corresponding to the contents identification information contained in the authentication information to the proper node. - View Dependent Claims (24)
-
Specification