Method and system for establishing trust in a peer-to-peer network
First Claim
Patent Images
1. A computer-implemented method for enabling trusted content, the method comprising:
- receiving a certificate associated with content from a peer of a plurality of peers in a peer-to-peer network;
receiving a pointer file associated with the content, wherein the pointer file includes a hash and an address of a tracker server, and wherein the tracker server mediates and logs communications between the plurality of peers, and wherein the tracker server does not store the content;
determine the validity of the content by comparing the hash within the pointer file to a block within the content; and
determine the authenticity of the content by using the certificate to identify the content source.
13 Assignments
0 Petitions
Accused Products
Abstract
A method and system for establishing trust in a peer-to-peer network is disclosed. According to one embodiment, a computer implemented method comprises receiving a certificate associated with content from a peer in a peer-to-peer network. A file certificate associated with the content is received wherein the file certificate includes a hash. The validity of the content is determined with the file certificate. The authenticity of the content is determined with the file certificate.
114 Citations
24 Claims
-
1. A computer-implemented method for enabling trusted content, the method comprising:
-
receiving a certificate associated with content from a peer of a plurality of peers in a peer-to-peer network; receiving a pointer file associated with the content, wherein the pointer file includes a hash and an address of a tracker server, and wherein the tracker server mediates and logs communications between the plurality of peers, and wherein the tracker server does not store the content; determine the validity of the content by comparing the hash within the pointer file to a block within the content; and determine the authenticity of the content by using the certificate to identify the content source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable medium having stored thereon a plurality of instructions for enabling trusted content, said plurality of instructions when executed by a computer, cause said computer to perform:
-
receiving a certificate associated with content from a peer of a plurality of peers in a peer-to-peer network; receiving a pointer file associated with the content, wherein the pointer file includes a hash and an address of a tracker server, and wherein the tracker server mediates and logs communications between the plurality of peers, and wherein the tracker server does not store the content; determine the validity of the content by comparing the hash within the pointer file to a block within the content; and determine the authenticity of the content by using the certificate to identify the content source. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for enabling trusted content, the system comprising:
-
a processor; a bus connected to the processor; and memory connected to the bus;
wherein the processor executes instructions to receive a certificate associated with content from a peer of a plurality of peers in a peer-to-peer network;receive a pointer file associated with the content, wherein the pointer file includes a hash and an address of a tracker server, and wherein the tracker server mediates and logs communications between the plurality of peers, and wherein the tracker server does not store the content; determine the validity of the content by comparing the hash within the pointer file to a block within the content; and determine the authenticity of the content by using the certificate to identify the content source. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification