SECURITY AND AUTHENTICATIONS IN PEER-TO-PEER NETWORKS
First Claim
1. A method comprising the steps:
- receiving a first request for access to a secured data resource from a client on a peer-to-peer network,verifying that the client is authorized to obtain access to the secured data resource;
generating a second request for access to the secured data resource, wherein the request comprises peer-to-peer control information and information identifying the secured data resource; and
transmitting the second request to the client.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing access to a secured data resource to a client on a peer-to-peer network. The system includes a content management server which receives and verifies a first request for access to a secured data resource from the client. If the first request is valid, the content management server generates a second request for access to the secured data resource which comprises peer-to-peer control information and information identifying the secured data resource, and which can additionally include a signature generated using a shared key. The content management transmits the second request to the client, which then retransmits the second request to a peer-to-peer control server. The control server receives the second request and validates it. Such validations can include validating the request with the shared key. If the second request is valid, the control server transmits instructions for accessing the secured data resource back to the client.
80 Citations
66 Claims
-
1. A method comprising the steps:
-
receiving a first request for access to a secured data resource from a client on a peer-to-peer network, verifying that the client is authorized to obtain access to the secured data resource; generating a second request for access to the secured data resource, wherein the request comprises peer-to-peer control information and information identifying the secured data resource; and transmitting the second request to the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for a comprising the steps:
-
receiving a request from a client on a peer-to-peer network for access to a secured data resource, the request comprising peer-to-peer control information and information identifying the secured data resource; validating the request; generating instructions for accessing the secured data resource; and transmitting the instructions to the client. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising the steps:
-
transmitting a first request for access to the secured data resource to a content management server, the first request additionally comprising a first set of validation credentials; receiving a second request for access to the secured data resource from the content management server, the request comprising peer-to-peer control information, information identifying the secured data resource, and a second set of validation credentials; transmitting the second request to a peer-to-peer control server; receiving instructions for accessing the secured data resource from the peer-to-peer control server. - View Dependent Claims (19, 20, 21, 22)
-
-
23. A computer-readable medium having computer-executable instructions for a method comprising the steps:
-
receiving a first request for access to a secured data resource from a client on a peer-to-peer network; verifying that the client is authorized to obtain access to the secured data resource; generating a second request for access to the secured data resource, wherein the request comprises peer-to-peer control information and information identifying the secured data resource; and transmitting the second request to the client. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A computer-readable medium having computer-executable instructions for a method comprising the steps:
-
receiving a request from a client on the peer-to-peer network for access to a secured data resource, the request comprising peer-to-peer control information and information identifying the secured data resource; validating the request; generating instructions for accessing the secured data resource; and transmitting the instructions to the client. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39)
-
-
40. A computer-readable medium having computer-executable instructions for a method comprising the steps:
-
transmitting a first request for access to the secured data resource to a content management server, the first request additionally comprising a first set of validation credentials; receiving a second request for access to the secured data resource from the content management server, the request comprising peer-to-peer control information, information identifying the secured data resource, and a second set of validation credentials; transmitting the second request to a peer-to-peer control server; receiving instructions for accessing the secured data resource from the peer-to-peer control server. - View Dependent Claims (41, 42, 43, 44)
-
-
45. A system comprising:
-
a receiving module that receives a first request for access to a secured data resource from a client on a peer-to-peer network; a verification module that verifies that the client is authorized to obtain access to the secured data resource; a request generation module that generates a second request for access to the secured data resource, wherein the request comprises peer-to-peer control information and information identifying the secured data resource; and a transmission module that transmits the second request to the client. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A system comprising:
-
a receiving module that receives a request from a client on a peer-to-peer network for access to a secured data resource, the request comprising peer-to-peer control information and information identifying the secured data resource; a validation module that validates the request; an instruction generation module that generates instructions for accessing the secured data resource; and a transmission module that transmits the instructions to the client. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61)
-
-
62. A peer-to-peer client comprising:
-
a first transmission module that transmits a first request for access to the secured data resource to a content management server, the first request additionally comprising a first set of validation credentials; a first receiving module that receives a second request for access to the secured data resource from the content management server, the request comprising peer-to-peer control information, information identifying the secured data resource, and a second set of validation credentials; a second transmission module that transmits the second request to a peer-to-peer control server; a second receiving module that receives instructions for accessing the secured data resource from the control server.
-
-
63. The client of 62 wherein the first set of validation credentials contains at least one item selected from the list:
- User ID, cookie.
- View Dependent Claims (64, 65, 66)
Specification