Robust peer-to-peer networks and methods of use thereof
First Claim
Patent Images
1. A method of authentication of peers of a peer-to-peer network;
- comprising the steps of;
a) tracking by a certificate issuer at most a predetermined number of node IDs for each peer on the peer-to-peer network;
b) requesting, by a requesting peer, a certificate for authenticating a communicating peer; and
c) listing in each certificate issued at least one node ID of the predetermined number of node IDs assigned for the communicating peer.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of authentication of peers of a peer-to-peer network includes a certificate issuer tracking at most a predetermined number of node IDs for each peer on the peer-to-peer network, a requesting peer requesting from the certificate issuer a certificate for authenticating a communicating peer and each certificate issued listing at least one node ID of the predetermined number of node IDs assigned for the communicating peer.
-
Citations
31 Claims
-
1. A method of authentication of peers of a peer-to-peer network;
- comprising the steps of;
a) tracking by a certificate issuer at most a predetermined number of node IDs for each peer on the peer-to-peer network; b) requesting, by a requesting peer, a certificate for authenticating a communicating peer; and c) listing in each certificate issued at least one node ID of the predetermined number of node IDs assigned for the communicating peer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- comprising the steps of;
-
8. A method of verifying that a node ID of a claimant node corresponds to a locator address of the source in a peer-to-peer network using a verifier node;
- comprising the steps of;
a) sending a notification message from a claimant node that includes the node ID and locator address of the claimant node; b) receiving, by the claimant node, a first message via a first path of the peer-to-peer network; c) receiving, by the claimant node, at least one further message via at least one further path different from the first path; d) sending, by the claimant node, a response to the first message and the at least one further message; e) receiving, by the claimant node, an other message indicating whether the claimant node is authenticated to the peer-to-peer network. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
- comprising the steps of;
-
16. A system for verifying that node IDs correspond to locator addresses of nodes in a peer-to-peer network, comprising:
-
a claimant node which is configured to send a notification message that includes the node ID and locator address of the claimant node; a verifier node which is configured to receive the node ID and locator address of the claimant node via the notification message, as a request for a binding placement record, to send a first message via a first path of the peer-to-peer network and to send at least one further message via at least one further path different from the first path, wherein the claimant node is configured to send a response to the first message and the at least one further message; and the verifier node is configured to determine if the response to the first message and the at least one further message is correct and if the response to the first message and the at least one further message is correct, the verifier node is configured to store the node ID and locator address sent by the claimant node in the verifier node, as a binding check, for use by other nodes of the peer-to-peer network. - View Dependent Claims (17, 18)
-
-
19. A method of storing resources on peers in a peer-to-peer network, each peer managing resources with resource keys in a respective range of a key space, the method comprising the steps of:
-
a) generating a first resource key based on a key generation function using a resource name; b) storing a resource at a peer in the peer-to-peer network corresponding to the first resource key; c) deterministically changing the resource name; d) generating a further resource key based on the key generation function using the deterministically changed resource name; and e) storing the resource at another peer in the peer-to-peer network corresponding to the further resource key. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A method for retrieving resources from peers in a peer-to-peer network, each peer managing resources with resource keys in a respective range of a key space, each resource being stored at a plurality of peers using a corresponding plurality of different resource keys, the method comprising the steps of:
-
a) generating a plurality of resource keys based on a key generation function using a resource name of a resource to be retrieved; b) determining at least one selected peer based on the plurality of generated resource keys; c) routing a request for the resource to be retrieved to the at least one selected peer through the peer-to-peer network; d) determining an availability of the resource at the at least one selected peer; and e) if the resource to be retrieved is not available at the at least one selected peer;
selecting at least one other peer and routing a further request for the resource to be retrieved to the at least one other selected peer. - View Dependent Claims (25)
-
-
26. A peer-to-peer network with a plurality of peers, comprising:
-
a first peer having a first node ID generated by a first node ID generating function and a second node ID generated by a second node ID generating function; and a second peer having a third node ID generated by the first node ID generating function and a fourth node ID generated by the second node ID generating function such that the first peer communicates with the second peer on the peer-to-peer network using both the first and second node IDs. - View Dependent Claims (27, 28, 29, 30)
-
-
31. A multiple topology peer-to-peer network with a plurality of peers, comprising:
-
a first peer having a first node ID generated by a first node ID generating function and associated with first and second topologies of the peer-to-peer network, the first and second topologies being different from each other; and a second peer having a second node ID generated by the first node ID generating function and associated with the first and second topologies of the peer-to-peer network such that the first and second peers communicate via links established according to either or both of the first or second topologies.
-
Specification