×

Secured and access controlled peer-to-peer resource sharing method and apparatus

  • US 7,120,691 B2
  • Filed: 03/15/2002
  • Issued: 10/10/2006
  • Est. Priority Date: 03/15/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. In a peer-to-peer network a method of securely conducting a resource search initiated by a first client, the resource search included with a search request having a credentials signal indicative of the first client, the method comprising the steps of:

  • communicating the search request from the first client to a second client, the second client having a multiplicity of second resources, each of the multiplicity of second resources having at least one corresponding access attribute;

    at the second client, selectively searching the multiplicity of second resources in response to comparison of the authentication and authorization data within the credentials signal and the at least one access attribute of each of the multiplicity of second resources;

    communicating the search request from the second client to a third client, the third client having a multiplicity of third resources, each of the multiplicity of third resources having at least one corresponding access attribute; and

    at the third client, selectively searching the multiplicity of third resources in response to comparison of the credentials signal and the at least one access attribute of each of the multiplicity of third resources,wherein the credentials signal includes an identification signal indicative of the first client,the access attributes of the second and third resources includes an authorization signal indicative of at least one of a plurality of clients, the plurality of clients including the first client,said step of selectively searching the second multiplicity of resources further includes the steps of;

    communicating from the second client to an authentication process external to the first, second and third clients the identification signal;

    receiving from the authentication process an authenticated signal indicative of the first client in response thereto; and

    searching one of the second multiplicity of resources if the authenticated signal substantially matches the authorization signal included with the corresponding access attributes, andsaid step of selectively searching the third multiplicity of resources further includes the steps of;

    communicating from the third client to the authorization process the identification signal;

    receiving from the authorization process the authenticated signal indicative of the first client in response thereto; and

    searching one of the third multiplicity of resources if the authenticated signal substantially matches the authorization signal included with the corresponding access attributes.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×