Secure peer-to-peer cache sharing
First Claim
1. A method for securely retrieving data cached in a peer-to-peer network comprising two or more networked peer computers, the method comprising:
- transmitting a broadcast request for the requested data on the network, the broadcast request comprising data sufficient to prove possession of a hash value for the requested data to the peer computers;
receiving a reply to the broadcast request from a caching peer computer, the reply comprising data sufficient to prove possession of the requested data by the caching peer computer; and
in response to receiving the reply, receiving the requested data from the caching peer computer.
2 Assignments
0 Petitions
Accused Products
Abstract
A system, apparatus, method, and computer-readable medium are provided for secure P2P caching. In one method, a requesting peer obtains a hash of requested data from a server. The requesting peer then transmits a request for the data to other peers. The request proves that the requesting peer has the hash. If a caching peer has the data, it generates a reply to the request that proves that it has the requested data. If the requesting peer receives a reply from a caching peer, the requesting peer establishes a connection to the caching peer and retrieves the data from the caching peer. If the requesting peer does not receive a reply to the request from any other peer, the requesting peer establishes a connection to the server and retrieves the data from the server. The requesting peer stores the data for use in responding to requests from other peers.
56 Citations
20 Claims
-
1. A method for securely retrieving data cached in a peer-to-peer network comprising two or more networked peer computers, the method comprising:
-
transmitting a broadcast request for the requested data on the network, the broadcast request comprising data sufficient to prove possession of a hash value for the requested data to the peer computers; receiving a reply to the broadcast request from a caching peer computer, the reply comprising data sufficient to prove possession of the requested data by the caching peer computer; and in response to receiving the reply, receiving the requested data from the caching peer computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for securely providing data cached in a peer-to-peer network comprising two or more networked peer computers, the method comprising:
-
receiving a broadcast request for the requested data at a caching peer computer, the broadcast request comprising data sufficient to prove possession of a hash value for the requested data by the requesting peer computer; in response to receiving the broadcast request, determining whether the caching peer computer has the requested data; in response to determining that the caching peer computer has the requested data, transmitting a reply to the broadcast request, the reply comprising data sufficient to prove possession of the requested data by the caching peer computer; and transmitting the requested data to the requesting peer computer. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method for caching data in a peer-to-peer network comprising two or more networked peer computers, the method comprising:
providing a cache manager for execution at each of the peer computers, the cache manager operative to receive a request for data from an application protocol, transmit a broadcast request comprising data sufficient to prove possession of a hash value for the requested data to the peer computers, receive a reply to the broadcast request comprising data sufficient to prove possession of the requested data by a caching peer computer, and to receive the requested data from the caching peer computer in response to receiving the reply. - View Dependent Claims (17, 18, 19, 20)
Specification