Security architecture for peer-to-peer storage system
First Claim
1. A method, implemented by a computing device, comprising:
- receiving a request to register a peer in a peer-to-peer system, the peer-to-peer system enabling a first peer of the peer-to-peer system to provide a first storage area to another peer of the peer-to-peer system and enabling the first peer of the peer-to-peer system to store data in a second storage area on a second peer of the peer-to-peer system after providing the first storage area;
generating or selecting a transaction key for the peer;
storing the transaction key in association with registration information for the peer;
receiving a password from the peer to enable a secure transmission of the transaction key to the peer;
transmitting the transaction key from the server to the peer, the transaction key accessible to the peer using the password;
in response to receiving a transaction request from the peer to perform a peer-to-peer transaction with another peer of the peer-to-peer system, generating a token including file information for a file associated with the peer-to-peer transaction and including a signature, the token generated based at least in part on the transaction key;
sending the token from the server to the peer to enable the peer to perform the peer-to-peer transaction; and
in response to a failure of the second peer to authenticate a second token associated with a second peer-to-peer transaction, receiving information associated with the failure from the second peer.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary method includes receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing the transaction key in association with registration information for the peer; transmitting the transaction key to the peer and, in response to a request to perform a desired peer-to-peer transaction by another peer, generating a token, based at least in part on the transaction key. Such a token allows for secure transactions in a peer-to-peer system including remote storage of data and retrieval of remotely stored data. Other exemplary techniques are also disclosed including exemplary modules for a peer-to-peer server and peers in a peer-to-peer system.
50 Citations
22 Claims
-
1. A method, implemented by a computing device, comprising:
-
receiving a request to register a peer in a peer-to-peer system, the peer-to-peer system enabling a first peer of the peer-to-peer system to provide a first storage area to another peer of the peer-to-peer system and enabling the first peer of the peer-to-peer system to store data in a second storage area on a second peer of the peer-to-peer system after providing the first storage area; generating or selecting a transaction key for the peer; storing the transaction key in association with registration information for the peer; receiving a password from the peer to enable a secure transmission of the transaction key to the peer; transmitting the transaction key from the server to the peer, the transaction key accessible to the peer using the password; in response to receiving a transaction request from the peer to perform a peer-to-peer transaction with another peer of the peer-to-peer system, generating a token including file information for a file associated with the peer-to-peer transaction and including a signature, the token generated based at least in part on the transaction key; sending the token from the server to the peer to enable the peer to perform the peer-to-peer transaction; and in response to a failure of the second peer to authenticate a second token associated with a second peer-to-peer transaction, receiving information associated with the failure from the second peer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing device comprising:
-
a processor and a computer-readable storage device; a module maintained on the computer-readable storage device, the module including instructions that are executable by the processor to; receive a request to register a peer in a peer-to-peer system in which, in response to a first peer of the peer-to-peer system providing a first storage area to another peer of the peer-to-peer system, a second storage area on a second peer of the peer-to-peer system is provided to the first peer to store data; generate or select a transaction key for the peer; store the transaction key for the peer in association with registration information for the peer; securely transmit the transaction key to the peer by password protecting the transaction key using a password provided by the peer; in response to receiving a transaction request from the peer to perform a peer-to-peer transaction, generate a token including file information for a file associated with the peer-to-peer transaction and including a signature, the token generated based at least in part on the transaction key; send the token from the server to the peer to enable the peer to perform the peer-to-peer transaction; and in response to a failure of the peer to authenticate a second token associated with a second peer-to-peer transaction, receiving information associated with the failure from the peer. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable storage device including instructions executable by a processor to perform operations comprising:
-
in response to receiving a registration request from a peer, registering the peer in a peer-to-peer system in which, in response to a first peer of the peer-to-peer system providing a first storage area to another peer of the peer-to-peer system, a second storage area on a second peer of the peer-to-peer system is provided to the first peer to store data; generating or selecting a transaction key for the peer; associating the transaction key with registration information for the peer; transmitting the transaction key from the server to the peer, the transaction key protected by a password provided by the peer; in response to receiving a transaction request from the peer to perform a particular transaction in the peer-to-peer system, generating a token including file information for a file associated with the particular transaction and including a digital signature, the token generated based at least in part on the transaction key; sending the token from the server to the peer to enable the peer to perform the particular transaction; and in response to the second peer of the peer-to-peer system failing to authenticate a second token associated with a second peer-to-peer transaction, receiving information associated with the authentication failure from the second peer. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification