Acorn: providing network-level security in P2P overlay architectures
First Claim
Patent Images
1. A method for providing network-based security, comprising:
- moving a coordinator functionality between members of a set of candidate coordinator nodes in a network, without notifying a plurality of clients in the network; and
flexibly adapting the frequency with which the coordinator functionality is moved.
12 Assignments
0 Petitions
Accused Products
Abstract
To address the problem of providing network-based security to mitigate and detect cheating in peer-to-peer (P2P) gaming architecture, an architecture suite called architectures with coordinator obfuscation for resilient P2P gaming networks (ACORN) is presented that uses a combination of low overhead, per-packet access authentication, moving-coordinator and cheat detection mechanisms to effectively mitigate security threats.
124 Citations
20 Claims
-
1. A method for providing network-based security, comprising:
-
moving a coordinator functionality between members of a set of candidate coordinator nodes in a network, without notifying a plurality of clients in the network; and
flexibly adapting the frequency with which the coordinator functionality is moved. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for providing network-based security, comprising:
-
a central server for providing a plurality of services;
a plurality of clients, each client being capable of connecting to the central server to access one of the services, each client being capable of joining and leaving a network;
a current coordinator having a coordinator functionality in the network, the current coordinator receives a plurality of update messages from the clients and communicates the update messages to the clients; and
a coordinator access point (CAP) for moving the coordinator functionality between members of a set of candidate coordinator nodes in the network and for cheat detection. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer readable medium storing instructions for performing a method for providing network-based security, the method comprising:
-
moving a coordinator functionality between members of a set of candidate coordinator nodes in a network, without notifying a plurality of clients in the network; and
flexibly adapting the frequency with which the coordinator functionality is moved. - View Dependent Claims (18, 19, 20)
-
Specification