Violations in a peer-to-peer relay network
First Claim
1. A method of detecting and recovering from a violation in a peer-to-peer relay network, comprising:
- sending a first message having first content data from a sending peer system to a receiving peer system;
detecting a manipulation of data in said sent first message, said manipulation of data changing the outcome of processing by the receiving peer system;
wherein detecting said manipulation includes;
relaying back the sent first message to the sending peer by the receiving peer system;
comparing by the sending peer of the relayed back message to the sent first message to identify a receiving peer responsible for the manipulation of data; and
sending a manipulated data alert message to other peer systems connected to the peer system in said peer-to-peer relay network, the manipulated data alert message identifying the receiving peer as responsible for the manipulation of data.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for implementing peer-to-peer relay. In one implementation, a method of detecting and recovering from violations in a peer-to-peer relay network includes: receiving a message at a peer system from a sending peer system connected to said peer system in a peer-to-peer relay network detecting a violation in said received message; and sending an alert message to each peer system connected to said peer system in said peer-to-peer relay network; wherein each peer system in said peer-to-peer relay network stores a connection limit defining a number of other peer systems up to which that peer system is permitted to connect, and each peer system stores a set of one or more relay rules for relaying data to other peer systems connected to that peer system.
51 Citations
3 Claims
-
1. A method of detecting and recovering from a violation in a peer-to-peer relay network, comprising:
-
sending a first message having first content data from a sending peer system to a receiving peer system; detecting a manipulation of data in said sent first message, said manipulation of data changing the outcome of processing by the receiving peer system; wherein detecting said manipulation includes; relaying back the sent first message to the sending peer by the receiving peer system; comparing by the sending peer of the relayed back message to the sent first message to identify a receiving peer responsible for the manipulation of data; and sending a manipulated data alert message to other peer systems connected to the peer system in said peer-to-peer relay network, the manipulated data alert message identifying the receiving peer as responsible for the manipulation of data. - View Dependent Claims (2, 3)
-
Specification