Peer-to-peer networks with protections
First Claim
Patent Images
1. A device, comprising:
- at least one processor; and
one or more storage media including processor-executable instructions that are capable of being executed by the at least one processor, wherein the processor-executable instructions, when executed, direct the device to perform actions comprising;
generating a first random number;
creating a first tracking hash value based on an object and the first random number;
producing a peer certification value responsive to the first tracking hash value;
formulating a peer-signed certificate using the peer certification value;
detecting if an ascertained individualized certificate has been revoked with reference to a revocation list that is made available at a central server and is distributed to a plurality of peers, the revocation list containing a list of revoked certificates;
updating a revocation list stored locally on a peer if a threshold of a maximum non-updating period is reached, the threshold of a maximum non-updating period corresponding to a predetermined period of time in which the revocation list is to be updated;
building a tracking information set that includes the peer-signed certificate, the peer certification value, an encrypted tracking value, the first random number, and a second random number;
formulating an atomic unit by combining the object with the tracking information set by inserting the tracking information set into a tracking attribute field of the object;
attempting to upload the atomic unit to a peer-to-peer network;
when the atomic unit is uploaded to the peer-to-peer network, joining the atomic unit to persistent metadata that contains an uploader-signed certificate that is used to track an uploader of the atomic unit;
authenticating and validating the uploader-signed certificate when the atomic unit is first uploaded to the peer-to-peer network and when the atomic unit is replicated from a first peer to a second peer;
entitling the uploader of the atomic unit to upload additional atomic units to the peer-to-peer network and to remain anonymous until illicit material uploaded by the uploader is discovered; and
upon discovery of the illicit material, identifying the uploader and removing the illicit material from the peer-to-peer network.
2 Assignments
0 Petitions
Accused Products
Abstract
In a peer-to-peer environment, copyrights and users'"'"' privacies can be protected by a tracking mechanism. In described implementations, tracking mechanisms can use certificates that are produced using random numbers to protect the privacy of users and/or certificates that are produced responsive to at least one hardware identifier to enable uploader to be identified to protect copyrights.
36 Citations
16 Claims
-
1. A device, comprising:
-
at least one processor; and one or more storage media including processor-executable instructions that are capable of being executed by the at least one processor, wherein the processor-executable instructions, when executed, direct the device to perform actions comprising; generating a first random number; creating a first tracking hash value based on an object and the first random number; producing a peer certification value responsive to the first tracking hash value; formulating a peer-signed certificate using the peer certification value; detecting if an ascertained individualized certificate has been revoked with reference to a revocation list that is made available at a central server and is distributed to a plurality of peers, the revocation list containing a list of revoked certificates; updating a revocation list stored locally on a peer if a threshold of a maximum non-updating period is reached, the threshold of a maximum non-updating period corresponding to a predetermined period of time in which the revocation list is to be updated; building a tracking information set that includes the peer-signed certificate, the peer certification value, an encrypted tracking value, the first random number, and a second random number; formulating an atomic unit by combining the object with the tracking information set by inserting the tracking information set into a tracking attribute field of the object; attempting to upload the atomic unit to a peer-to-peer network; when the atomic unit is uploaded to the peer-to-peer network, joining the atomic unit to persistent metadata that contains an uploader-signed certificate that is used to track an uploader of the atomic unit; authenticating and validating the uploader-signed certificate when the atomic unit is first uploaded to the peer-to-peer network and when the atomic unit is replicated from a first peer to a second peer; entitling the uploader of the atomic unit to upload additional atomic units to the peer-to-peer network and to remain anonymous until illicit material uploaded by the uploader is discovered; and upon discovery of the illicit material, identifying the uploader and removing the illicit material from the peer-to-peer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving a peer hardware identifier from a peer at an authority, the peer hardware identifier based on at least one hardware component of the peer; determining a modified peer hardware identifier from the peer hardware identifier; producing an individualized certification value responsive to the modified peer hardware identifier; formulating an authority-signed certificate using the individualized certification value, the authority-signed certificate being used by the peer to access a peer-to-peer network; maintaining a revocation list at the authority, the revocation list including multiple respective modified peer hardware identifiers corresponding to multiple respective devices that are to be denied access to a peer-to-peer network; distributing the revocation list to a number of devices that are permitted access to the peer-to-peer network; requiring each device receiving the revocation list to update a locally stored revocation list when a threshold of a maximum non-updating period is reached, the threshold of a maximum non-updating period corresponding to a predetermined period of time in which the locally stored revocation list is to be updated; in response to the peer uploading an atomic unit to the peer-to-peer network, joining the atomic unit to persistent metadata and associating a peer-signed certificate with the atomic unit that is used to track the peer, the atomic unit being created by combining an object with a tracking information set that includes the individualized certification value, the authority-signed certificate, an encrypted tracking value, a first random number, and a second random number, the tracking information set being inserted into a tracking attribute field of the object; authenticating and validating the peer-signed certificate when the atomic unit is first uploaded to the peer-to-peer network and when the atomic unit is replicated from a first peer to a second peer; entitling the peer to upload additional atomic units to the peer-to-peer network and to remain anonymous until either the atomic unit or the additional atomic units are determined to be illicit; and upon discovery of illicit content, identifying the peer utilizing the peer-signed certificate and removing uploaded content associated with the peer from the peer-to-peer network. - View Dependent Claims (11, 12, 13)
-
-
14. One or more processor-accessible storage device comprising processor-executable instructions that include;
-
a peer-to-peer application that uses a first certificate signed by an authority to evidence uploading rights for a peer-to-peer network and a second certificate signed by a peer on which the peer-to-peer application is to execute, the first certificate including an individualized certification value that is based, at least in part, on an identifier of at least one hardware component of the peer; and a signing and verifying module that verifies an authenticity and integrity of an object when the peer either downloads or replicates an object from another peer, the signing and verifying module further to; create an atomic unit to be uploaded to the peer-to-peer network, the atomic unit being created by combining the object with a tracking information set that includes the first certificate, the second certificate, a peer certification value, an encrypted tracking value, a first random number, and a second random number; return a failure and reject the download or replication of the atomic unit when the verification is unsuccessful; instructing the peer to perform an independent verification of authenticity and integrity for the atomic unit and remove the atomic unit from storage when the verification is unsuccessful; joining the atomic unit to persistent metadata that contains an uploader-signed certificate when the atomic unit is uploaded by the another peer to the peer-to-peer network, the uploader-signed certificate being used to track the another peer; entitling the another peer to upload one or more additional atomic units to the peer-to-peer network and to remain anonymous until the atomic unit or the one or more additional atomic units uploaded by the another peer are determined to be illicit; and upon discovering an illicit object, identifying the another peer utilizing the uploader-signed certificate and removing objects uploaded by the another peer from the peer-to-peer network; and a revocation list that contains a list of revoked certificates and that is maintained at a central server and is distributed to each peer, each peer being required to update its locally stored revocation list when a threshold of a maximum non-updating period is reached, the threshold of a maximum non-updating period corresponding to a predetermined period of time in which the locally stored revocation list is to be updated. - View Dependent Claims (15, 16)
-
Specification