System for distributing information using a secure peer-to-peer network
First Claim
1. A secure peer-to-peer network, comprising:
- a server connected to a network;
a first peer computer connected to the network;
wherein the first peer computer is configured to communicate requests for information to the server;
wherein the server is configured to respond to requests for information by providing the identity of at least a second peer computer;
wherein the requested information is stored on the second peer computer; and
wherein the first peer computer is configured to obtain the requested information from the second peer computer;
wherein the first peer computer is configured to obtain from the server information to verify the reliability of the information provided by the second peer computer.
4 Assignments
0 Petitions
Accused Products
Abstract
A secure peer-to-peer network including servers and peer computers that are connected via a network are described. In one aspect of the invention, the reliability of information provided by one peer to another can be verified. One embodiment includes a server connected to a network and a first peer computer connected to the network. In addition, the first peer computer is configured to communicate requests for information to the server, wherein the server is configured to respond to requests for information by providing the identity of at least a second peer computer, wherein the requested information is stored on the second peer computer, wherein the first peer computer is configured to obtain the requested information from the second peer computer and the first peer computer is configured to obtain from the server information to verify the reliability of the information provided by the second peer computer.
34 Citations
25 Claims
-
1. A secure peer-to-peer network, comprising:
-
a server connected to a network;
a first peer computer connected to the network;
wherein the first peer computer is configured to communicate requests for information to the server;
wherein the server is configured to respond to requests for information by providing the identity of at least a second peer computer;
wherein the requested information is stored on the second peer computer; and
wherein the first peer computer is configured to obtain the requested information from the second peer computer;
wherein the first peer computer is configured to obtain from the server information to verify the reliability of the information provided by the second peer computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A server, comprising:
-
hosted information stored on the server;
a list identifying computers, where the list is stored on the server; and
verification information stored on the server;
wherein the list identifying computers identifies a number of computers that acquired the hosted information at some point in the past;
wherein the verification information can be derived from the hosted information in accordance with a predetermined algorithm. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer configured to obtain information, comprising:
-
software;
wherein the software configures the computer to enable it to request information from a server;
wherein the software configures the computer to receive peer tables from a server;
wherein the software configures the computer to send requests for information to computers listed in a received peer table;
wherein the software configures the computer to send requests to a server for verification information relating to information received from other computers;
wherein the software configures the computer to verify the reliability of information received from other computers using verification information received from the server. - View Dependent Claims (19, 20, 21)
-
-
22. A method of obtaining information comprising:
-
contacting a server to request the information;
receiving information identifying peer computers possessing the information from the server;
contacting the peer computers to request the information;
receiving the information;
contacting the server for verification information; and
verifying the reliability of the information. - View Dependent Claims (23, 24, 25)
-
Specification