PEER-TO-PEER SECURITY PROTOCOL APPARATUS, COMPUTER PROGRAM, AND METHOD
First Claim
Patent Images
1. A computer program product comprising computer executable instructions stored on a non-transitory computer readable medium that when executed by a processor instruct the processor to:
- identify a message that is directed from a first peer device to a second peer device;
copying the message; and
cause a copy of the message to be sent to an auditing server.
2 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, computer program, and method are afforded for providing a peer-to-peer security protocol. In operation, a message is identified that is directed from a first peer device to a second peer device. Further, the message is copied, so that a copy of the message is caused to be sent to an auditing server.
91 Citations
20 Claims
-
1. A computer program product comprising computer executable instructions stored on a non-transitory computer readable medium that when executed by a processor instruct the processor to:
-
identify a message that is directed from a first peer device to a second peer device; copying the message; and cause a copy of the message to be sent to an auditing server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus, comprising:
a first server configured to; identify a message that is directed from a first peer device to a second peer device; copying the message; and cause a copy of the message to be sent to a second server.
-
20. A method, comprising:
-
identifying, utilizing a first server, a message that is directed from a first peer device to a second peer device; copying, utilizing the first server, the message; and causing, utilizing the first server, a copy of the message to be sent to a second server.
-
Specification