Peer data protocol
First Claim
1. A system for securely storing a data object, comprising:
- a computerized owning node that owns the data object;
a plurality of computerized neighbor nodes, wherein said owning node and said neighbor nodes are distinct and are collectively members of a network in which they have peer-to-peer status; and
a plurality of possessing nodes that store the data object, wherein said plurality of possessing nodes is a subset of said plurality of said neighbor nodes, thereby securely storing the data object away from its said owning node.
1 Assignment
0 Petitions
Accused Products
Abstract
A Peer Data Protocol (PDP)(10) for securely storing a data object (20) on a peer-to-peer network (50) of nodes (14). An owning node (16) owns the data object (20), possessing nodes hold the data object (20), an indexing node (68) facilitates overall operation of the PDP (10), and a backup node (66) may optionally be provided to ensure that the data object (20) is available even when the possessing nodes (18) holding it are not. The possessing nodes (18) securely store the data object (20) remote from its owning node (16), yet themselves have no access to the contents of the data object (20) unless granted such by the owning node (16). To enhance the security of this scheme the possessing nodes (18) may be chosen from among a large pool of neighbor nodes (56), the data object (20) may be piece-wise stored across multiple of the possessing nodes (18), and the pieces may be share-wise stored across multiple of the possessing nodes (18) and analyzed for integrity before later use.
-
Citations
25 Claims
-
1. A system for securely storing a data object, comprising:
-
a computerized owning node that owns the data object;
a plurality of computerized neighbor nodes, wherein said owning node and said neighbor nodes are distinct and are collectively members of a network in which they have peer-to-peer status; and
a plurality of possessing nodes that store the data object, wherein said plurality of possessing nodes is a subset of said plurality of said neighbor nodes, thereby securely storing the data object away from its said owning node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for securely storing a data object, the method comprising the steps of:
-
(a) constructing a network of computerized nodes, wherein one said node is an owning node that owns the data object and a plurality of said nodes are neighbor nodes that are distinct from said owning node;
(b) assigning a plurality of said nodes to be possessing nodes, wherein said plurality of possessing nodes is a subset of said plurality of said neighbor nodes;
(c) storing the data object on said plurality of possessing nodes, thereby securely storing the data object away from its said owning node. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification