Peer-to-peer network
First Claim
Patent Images
1. A peer-to-peer network comprising:
- common peers and at least one police peer in a structured overlay of the network, said at least one police peer providing security within the network by checking the functionality of possible malicious peers; and
a central certification authority for managing the certification of the peers in the structured overlay of the network;
wherein the central certification authority is further adapted for managing the positioning of the peers in the structured overlay of the network, and in that the peer-to-peer network is adapted to surround a possible malicious peer by a plurality of police peers.
3 Assignments
0 Petitions
Accused Products
Abstract
In order to provide security within a peer-to-peer network (100) comprising common peers (0, 7, 10, 15, 20, 28) providing the functionality of the network (100), at least one police peer (4, 9, 23) is added to the network (100), said at least one police peer (4, 9, 23) providing security within the network (100) and being certified by a central certification authority (110) managing the certification and positioning of the peers (0, 4, 7, 9, 10, 15, 20, 23, 28).
19 Citations
6 Claims
-
1. A peer-to-peer network comprising:
-
common peers and at least one police peer in a structured overlay of the network, said at least one police peer providing security within the network by checking the functionality of possible malicious peers; and a central certification authority for managing the certification of the peers in the structured overlay of the network; wherein the central certification authority is further adapted for managing the positioning of the peers in the structured overlay of the network, and in that the peer-to-peer network is adapted to surround a possible malicious peer by a plurality of police peers. - View Dependent Claims (2, 3, 4)
-
-
5. A method for providing security in a peer-to-peer network comprising common peers, at least one police peer providing security within the network and a central certification authority managing the certification and positioning of the common peers and the at least one police peer in a structured overlay of the network,
comprising the following steps managed and/or performed by the at least one police peer: -
(a) the functionality of a possible malicious peer is checked and the possible malicious peer is surrounded by a plurality of police peers; (b) if the malignance of the malicious peer is affirmed, the certification authority declares the certificate of the malicious peer invalid and the malicious peer is asked to disconnect from the network; (c) if the disconnection of the malicious peer in step fails, all other peers close their connections with the malicious peer; wherein the at least one police peer resides in the structured overlay of the network. - View Dependent Claims (6)
-
Specification