COMMUNICATING IN A PEER-TO-PEER COMPUTER ENVIRONMENT
First Claim
Patent Images
1. A computer implemented method for communicating in a peer-to-peer computer environment, said method comprising:
- receiving a request from a user at a peer provider node computer system, wherein said request is signed by a private key; and
provided a public key verifies said private key, providing potential peers to said user from said peer provider node computer system such that said user is enabled to utilize said peer-to-peer computer environment for a communication according to user requirements.
2 Assignments
0 Petitions
Accused Products
Abstract
Communicating in a peer-to-peer computer environment. A request is received from a user at a peer provider node computer system, wherein the request is signed by a private key. Provided a public key verifies the private key, providing potential peers to the user from the peer provider node computer system such that the user is enabled to utilize the peer-to-peer computer environment for a communication according to user requirements.
50 Citations
37 Claims
-
1. A computer implemented method for communicating in a peer-to-peer computer environment, said method comprising:
-
receiving a request from a user at a peer provider node computer system, wherein said request is signed by a private key; and provided a public key verifies said private key, providing potential peers to said user from said peer provider node computer system such that said user is enabled to utilize said peer-to-peer computer environment for a communication according to user requirements. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-usable storage medium having instructions embodied therein for causing a computer system to perform the steps of communicating in a peer-to-peer computer environment:
-
receiving a request from a user at a peer provider node computer system, wherein said request is signed by a private key; and provided a public key verifies said private key, providing potential peers to said user from said peer provider node computer system such that said user is enabled to utilize said peer-to-peer computer environment for a communication according to user requirements. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A system for communicating in a peer-to-peer computer environment:
-
a peer provider node configured to receive a request from a user wherein said request is signed by a private key and provided that a public key verifies said private key, said peer provider node is further configured to provide potential peers to said user such that said user is enabled to utilize said peer-to-peer computer environment for a communication according to user requirements; and at least one relay peer configured to receive a portion of said communication from said user and configured to send said portion of said communication to a second user, wherein said at least one relay peer is one of said potential peers. - View Dependent Claims (36, 37)
-
Specification