Security architecture for peer-to-peer storage system
First Claim
1. A method, implemented by a computing device, comprising:
- receiving a request to register a peer in a peer-to-peer system;
generating or selecting a transaction key for the peer;
storing the transaction key in association with registration information for the peer;
transmitting the transaction key to the peer; and
in response to a request to perform a desired peer-to-peer transaction by another peer, generating a token, based at least in part on the transaction key.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary method includes receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing the transaction key in association with registration information for the peer; transmitting the transaction key to the peer and, in response to a request to perform a desired peer-to-peer transaction by another peer, generating a token, based at least in part on the transaction key. Such a token allows for secure transactions in a peer-to-peer system including remote storage of data and retrieval of remotely stored data. Other exemplary techniques are also disclosed including exemplary modules for a peer-to-peer server and peers in a peer-to-peer system.
-
Citations
22 Claims
-
1. A method, implemented by a computing device, comprising:
-
receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing the transaction key in association with registration information for the peer; transmitting the transaction key to the peer; and in response to a request to perform a desired peer-to-peer transaction by another peer, generating a token, based at least in part on the transaction key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A module for a peer-to-peer server, the module comprising:
-
computer-executable instructions to generate or select a transaction key for a peer in the peer-to-peer system; computer-executable instructions to store a transaction key for each peer in the peer-to-peer system; computer-executable instructions to transmit a transaction key for a peer in the peer-to-peer system to the peer; and computer-executable instructions to generate tokens for transactions between peers in the peer-to-peer system based on a receipt of a request by a peer wherein a token comprises a signature based on a transaction key of another peer. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A module for a peer in a peer-to-peer system, the module comprising:
-
computer-executable instructions to call an application programming interface of a server in the peer-to-peer system wherein the call specifies a type of peer-to-peer transaction and returns a token for the transaction; computer-executable instructions to send a token to another peer to initiate a peer-to-peer transaction; and computer-executable instructions to verify a token received by another peer to thereby allow a peer-to-peer transaction to occur. - View Dependent Claims (20)
-
-
21. A method, implemented by a computing device, comprising:
-
requesting, as a peer, a token to perform a desired peer-to-peer transaction in a peer-to-peer system; receiving a token generated based at least in part on a transaction key for the peer; and sending the token to another peer to initiate a peer-to-peer transaction.
-
-
22. A method, implemented by a computing device, comprising:
-
receiving a token from a peer in a peer-to-peer system, the token generated based at least in part on a transaction key for the peer and comprising transaction information for a type of desired peer-to-peer transaction; verifying the token using a different transaction key; and allowing the desired peer-to-peer transaction to occur.
-
Specification