CN100452031C - System and method for discovering potential collaborators in a peer-to-peer P2P network - Google Patents
System and method for discovering potential collaborators in a peer-to-peer P2P network Download PDFInfo
- Publication number
- CN100452031C CN100452031C CNB2004800074067A CN200480007406A CN100452031C CN 100452031 C CN100452031 C CN 100452031C CN B2004800074067 A CNB2004800074067 A CN B2004800074067A CN 200480007406 A CN200480007406 A CN 200480007406A CN 100452031 C CN100452031 C CN 100452031C
- Authority
- CN
- China
- Prior art keywords
- network
- web services
- search
- potential
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 230000009467 reduction Effects 0.000 claims description 17
- 230000000977 initiatory effect Effects 0.000 claims description 13
- 230000004044 response Effects 0.000 claims description 13
- 239000000344 soap Substances 0.000 claims description 5
- 230000008569 process Effects 0.000 description 19
- 230000009471 action Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 5
- 239000003795 chemical substances by application Substances 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 230000006855 networking Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008439 repair process Effects 0.000 description 2
- QDZOEBFLNHCSSF-PFFBOGFISA-N (2S)-2-[[(2R)-2-[[(2S)-1-[(2S)-6-amino-2-[[(2S)-1-[(2R)-2-amino-5-carbamimidamidopentanoyl]pyrrolidine-2-carbonyl]amino]hexanoyl]pyrrolidine-2-carbonyl]amino]-3-(1H-indol-3-yl)propanoyl]amino]-N-[(2R)-1-[[(2S)-1-[[(2R)-1-[[(2S)-1-[[(2S)-1-amino-4-methyl-1-oxopentan-2-yl]amino]-4-methyl-1-oxopentan-2-yl]amino]-3-(1H-indol-3-yl)-1-oxopropan-2-yl]amino]-1-oxo-3-phenylpropan-2-yl]amino]-3-(1H-indol-3-yl)-1-oxopropan-2-yl]pentanediamide Chemical compound C([C@@H](C(=O)N[C@H](CC=1C2=CC=CC=C2NC=1)C(=O)N[C@@H](CC(C)C)C(=O)N[C@@H](CC(C)C)C(N)=O)NC(=O)[C@@H](CC=1C2=CC=CC=C2NC=1)NC(=O)[C@H](CCC(N)=O)NC(=O)[C@@H](CC=1C2=CC=CC=C2NC=1)NC(=O)[C@H]1N(CCC1)C(=O)[C@H](CCCCN)NC(=O)[C@H]1N(CCC1)C(=O)[C@H](N)CCCNC(N)=N)C1=CC=CC=C1 QDZOEBFLNHCSSF-PFFBOGFISA-N 0.000 description 1
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 101001074449 Crotalus durissus terrificus Phospholipase A2 inhibitor CNF Proteins 0.000 description 1
- 102100024304 Protachykinin-1 Human genes 0.000 description 1
- 101800003906 Substance P Proteins 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
Systems and methods are provided for discovering mobile partners in a peer-to-peer (P2P) network. Each collaborator is identified in the P2P network by a unique ID. Each collaborator may also be identified by an identity file published in the P2P network. The collaboration application may include any of a variety of applications involving the exchange of information between two or more collaborators, such as voice over IP (VoIP). Dynamic file queries may be performed to filter identity files that are mostly related to a particular peer partner. Web services are used end-to-end between P2P mobile devices and between devices and third party service providers. Search engines use self-provisioning concepts for searches as well as web service queries. End-user devices register their personal information in the P2P network using identity self-provisioning and web service templates for various purposes (e.g., personal, gaming, or business).
Description
Technical field
The present invention relates to the networking field, more particularly, relate to find terminal user's device and between terminal user's device/among set up collaboration application session.
Background technology
P2P is a kind of traffic model, and wherein two or more participants (or " equity side ") have identical communication capacity and arbitrary participant can initiate communication session.This model is different from other traffic model, for example, " client/server " model and " master/slave " model, wherein different nodes may have different communication capacities.By making each communication node have the dual capability of server and client computer, can realize P2P communication.In recent years, term " P2P " is generally used for describing one group of user and can uses the application of network (for example, the Internet) by at least one the direct swap file of intermediate server.In most of P2P models, make the terminal user can't discover intermediate server effectively, therefore cause the terminal user to think and realized being connected with other terminal user " directly ".
Normally a kind of temporary network of P2P network, it allows a sets of computer user to interconnect and directly find and/or transmits the file that is stored in each other people computing machine (for example, being stored in hard disk drive).Usually set up the P2P network by using such as the P2P networking software of Kazaa (being commonly referred to FastTrack now), Napster and Gnutella.
The initial development of P2P network mainly is because its ability of directly sharing multimedia (for example, music, film).Yet unsolved and the shared legal issue that is associated of protected works can reduce the use of the P2P network that is used for this purpose.Therefore, use the P2P network to have superiority in other respects, for example, in recreation and commercial application facet.
Summary of the invention
In one aspect of the invention, provide the system that is used for going up the potential device of discovery at peer-to-peer network (P2P).This system comprises searcher and a plurality of potential device that is connected to the P2P network in operation.Described searcher comprises: be used for the parts to the P2P network registration; Be used for initiating the parts of web services to the web services supplier; Be used for using described web services to ask parts at the available P2P server of described P2P network from described web services supplier; Be used for using described web services at the troop parts of the described available P2P server of registration of web services; Be used for carrying out the parts of identity from supply at described P2P network; Be used for obtaining searching for the potential co-worker's of described P2P network the parts of one or more Search Results; Be used to obtain about the service of each Search Results and the parts of identity availability; Be used to reduce the quantity of Search Results to produce the parts of the results list that reduces; And be used for initiating parts with one or more potential co-workers' of the results list of described reduction collaboration session.
In another aspect of this invention, provide the method that is used for searcher potential co-worker of discovery on equity (P2P) network.This method may further comprise the steps: to the P2P network registration; The supplier initiates web services to web services; Use described web services to ask P2P server available in described P2P network from described web services supplier; Use described web services in web services is trooped, to register described available P2P server; In described P2P network, carry out identity from supply; Obtain the one or more Search Results of the potential co-worker in the described P2P network of search; Acquisition is about the service and the identity availability of each Search Results; The quantity of reduction Search Results is to produce the results list of reduction; And the collaboration session of the one or more potential co-workers in the results list of initiation and described reduction.
In another aspect of this invention, provide the method that is used for searcher potential co-worker of discovery on equity (P2P) network.This method may further comprise the steps: to the P2P network registration, the supplier initiates web services to web services, use web services to ask P2P server available on the P2P network from the web services supplier, use web services in web services is trooped, to register available P2P server, on the P2P network, carry out identity from supply, obtain the one or more Search Results of the potential co-worker on the search P2P network, to service of obtaining of each Search Results and identity availability, the quantity of reduction Search Results is to produce the results list of reduction, the collaboration session of one or more potential co-workers in the results list of initiating and reducing.
Description of drawings
By will appreciate that the present invention with reference to the detailed description below in conjunction with accompanying drawing, reference number identical among the figure identifies components identical, wherein:
Fig. 1 describes according to one embodiment of the present of invention, is used for searcher is found potential co-worker's method on equity (P2P) network process flow diagram;
Fig. 2 (a) and 2 (b) describe according to an illustrative embodiment of the present invention, are used for the xml code of exemplary registration process;
Fig. 3 describes according to an illustrative embodiment of the present invention, is used for the xml code of exemplary response request action;
Fig. 4 describes the supply process certainly according to an illustrative embodiment of the present invention;
Fig. 5 (a) describes according to an illustrative embodiment of the present invention, based on the demonstration program of the remote inquiry of the P2P device of web services;
Fig. 5 (b) describes according to an illustrative embodiment of the present invention, based on the alternative exemplary process of the remote inquiry of the P2P device of web services;
Fig. 5 (c) describes according to an illustrative embodiment of the present invention, based on the demonstration program of the remote inquiry of the call center agent of web services;
Fig. 6 (a) describes the xml code according to the exemplary search form of an illustrative embodiment of the present invention;
Fig. 6 (b) describes the xml code according to another exemplary search form of an illustrative embodiment of the present invention;
Fig. 6 (c) describes the xml code according to another exemplary search form of an illustrative embodiment of the present invention;
Fig. 7 describes according to an illustrative embodiment of the present invention, the demonstration identity with search criterion and exemplary search form; And
Fig. 8 has described an explanation according to an illustrative embodiment of the present invention, internuncial synoptic diagram between super reciprocity P2P network and/or the P2P entrance.
Embodiment
Illustrative embodiment of the present invention is described below.For clear, the actual whole features that realize are not described in this manual.Certainly can be appreciated that, in the exploitation of any this practical embodiments, must make the specific decision of many realizations to reach developer's specific objective, for example, the relevant and professional relevant constraint of compliance with system, this can be different with different realizations.And, can be appreciated that this development may be complicated and consuming time, still, for the those of ordinary skills that obtain benefit of the present disclosure, this only is a normal work to do.
Though the present invention allows various modifications and alterative version, specific embodiment and this paper of showing wherein by the example among the figure describe these specific embodiments in detail.Yet, should be appreciated that specific embodiment described herein is not to limit the present invention to disclosed particular form, but on the contrary, purpose is to contain all modifications, equivalent and the substitute that falls into as in the scope of the present invention of claims definition.
Be appreciated that and adopt various forms of hardware, software, firmware, application specific processor or their combination to realize system and method described herein.Particularly, preferably at least a portion of the present invention is embodied as the application that comprises programmed instruction, programmed instruction (for example specifically is included in one or more program storage devices, hard disk, magnetic floppy disk, RAM, ROM, CD ROM etc.) in and can be by comprising that any device or the machine (universal digital computer that for example, has processor, storer and input/output interface) that are fit to architecture carry out.Will also be appreciated that because preferably adopt software to realize some composition system component and process steps of describing in the accompanying drawing, so the connection between the system module (or logic flow of method step) may be different with programming mode of the present invention.According to the principle of the invention, those of ordinary skill in the related art can imagine of the present invention these and realize with similar.
The present invention allows collaboration seeker in public places (for example, Airport lounges, cafe) or it is private/as fixedly to locate and inquire about potential co-worker in Wireline or the wireless family environment (for example, using fixed broadband ADSL or WLAN DSL couple in router).
The present invention's influence by multiple known P2P working application/software (for example, Kazaa, OpenNAP, Gnutella, FastTrack, LimeWire etc.) one of equity (" the P2P ") network set up, make collaboration seeker can from collaboration pool, search for potential co-worker.Collaboration seeker can use user-defined search criterion to search for potential co-worker.Term " cooperative association " refers to lineup, machine or the device that participates in the P2P network as used herein.Term " potential co-worker " refers to and uses the cooperative association that user-defined search criterion refined as used herein.Therefore, potential co-worker's quantity can be not many than the quantity of cooperative association.In case one or more potential co-workers are identified, collaboration seeker can be set up the collaboration session with one or more potential co-workers.Collaboration session comprise but be not limited to use and/service, transmit as IP-based voice that (VoIP) phone, multi-player gaming, many people are commercial to be used and the application of machine.Usually use collaboration application to initiate collaboration session.Collaboration session is usually directed to mutual between two or more examples of same application or equivalent application (for example, VoIP soft phone).
Each co-worker in the cooperative association can use one or more terminal user's devices to be connected to the P2P network.Terminal user's device can include but not limited to personal digital assistant (" PDA "), the laptop computer with Wireless Networking ability and mobile phone (for example, smart phone).Be understandable that the method that the fundamental purpose of the P2P network among the present invention provides the identification terminal user's set and discerns potential co-worker thus.In case the user has discerned one or more potential co-workers from cooperative association, collaboration seeker just can obtain one or more potential co-workers' IP address and begin collaboration session.
Should be appreciated that owing to known the IP address, thereby allow the user to use or do not use the P2P networking software directly to get in touch with potential co-worker.For example, by the session of between two or more co-workers, can cooperating of the Internet or LAN (Local Area Network) (" LAN ").
The present invention can refine and reduce co-worker's quantity of returning from cooperative association by the device of inquiring about potential co-worker.Collaboration seeker is initiated the search based on search criterion.This can realize on the P2P collaboration application that for example proposes search criterion with the search form that customizes.If there was not high-speed cache in the past, collaboration seeker can be downloaded the search form from for example web services supplier (" WSP ").That WSP can be based on paying and separate with Internet service provider (" ISP ").The P2P collaboration application can be searched for the P2P network automatically and be returned potential co-worker's result set.
The existing P2P networks that great majority are popularized are verified their overall convergent-divergent and support responsible consumer group's ability.In addition, the part of these P2P networks is to use creating such as the open-source software of OpenNAP of generally can getting.By utilizing existing P 2P network technology, many advantages have been inherited automatically.One of them is that network is " supply certainly ", and this has eliminated a large amount of burdens of ISP.Term " supply certainly " refers to the ability of terminal user's device as client-server (that is, having " server " ability) as used herein.
Be understandable that the present invention is not limited to the P2P network or the P2P networking software of any particular type.In one embodiment, can use special-purpose P2P network (for example, using open source code to realize).In alternative, one or more existing public P2P networks can be " backpacks ".In another embodiment, the two can use hybrid mode to utilize special use and public P2P network.And, various models for the proposition of P2P network have been arranged, for example, serverless backup, super node server and tiered server architecture, each all has its advantage separately.
The present invention is based on the advantage of P2P network, by providing with various known such as World Wide Web Consortium
Any closely-related framework that is independent of application/service makes up in the web services of definition and the web service architecture (" WSA ").Web services provides the method for the intercommunication between the different software application that operates on various platforms and/or the framework.This universal method makes framework can be used as the means that provide and dispose a plurality of application and service, rather than uses the service that single special use only is provided as most of known P2P.
The present invention can use the architecture based on first search network service.In a META Search Engine, for example, the user submits key word in the search box to.Engine sends to several independent search engines with search.Obtain the result from all search engines of being inquired about.META Search Engine does not have web database usually.But engine sends to the database that search engine companies is safeguarded with search terms.
Referring now to Fig. 1, show flow process Figure 100 of illustration method according to one embodiment of the present of invention, this method is used to find potential co-worker so that carry out collaboration session on the P2P network.Terminal user's (collaboration seeker) device enters (105) hot zone (that is, the geographic area that wireless network covers, for example the Internet) or uses any alternate manner to be connected to any IP network.Terminal user's device can be in the various portable electron devices that can be connected to focus any, for example, PDA, laptop computer or mobile phone.
Terminal user's device is to P2P network registration (110), thereby permission terminal user device utilizes the P2P network.This can finish or finish automatically by collaboration seeker is manual, as long as terminal user's device enters (105) focus or uses any alternate manner to be connected to any IP network.Can use web services and SOAP (Simple Object Access Protocol) agreement on HTTP (HTML (Hypertext Markup Language)), the FTP (file transfer protocol (FTP)) etc. on IP (Internet protocol) network to carry out this enrollment process.Property for the sake of simplicity, our illustrative embodiment is mainly utilized the soap protocol that is used on the HTTP.But, should be appreciated that as those skilled in the art and can imagine, can utilize in the variety of protocol any.Fig. 2 (a) and Fig. 2 (b) show exemplary registration process.Fig. 2 (a) expression terminal user device uses the web service request of P2P network.Fig. 2 (b) expression P2P acknowledges receipt of the response of web service request.
Refer again to Fig. 1, terminal user's device uses HTTP/XML (extend markup language)/soap protocol to initiate (115) web services to known web services supplier (" WSP ").This initiates step can comprise discovery WSP.Can use registration of UDDI (universal description, discovery and integrated) web services and Business Entity to find WSP.Be understandable that the discovery of WSP can be optional (that is, being hard-coded in terminal user's device if know specific WSP information).
The P2P server that terminal user's device request (120) is available.In one embodiment, terminal user's device uses web services to send " request action " to WSP.Web services can be carried out any amount of request action, perhaps receives any amount of response, action or method.Request action and response can define in the WSDL service descriptor file.Usually by WSP the WSDL service descriptor file is published in the public UDDI commerce services registration server.The example of request action comprises " requestServerReport " and " getServerReportResult " that represents respectively as Fig. 2 and Fig. 3.Fig. 3 illustrates the response of WSP, P2P server, port that will use that expression report is available and the tabulation of SOAP service agreement key element that is connected to the number of users of this port.Use the XML/SOAP protocol element this information can be sent to terminal user's device.As shown in Figure 3, the tabulation of one or more available P2P webservers is returned in order " getServerReportResult ".In alternative, order " getServerReportResult " (for example also can be returned specific P2P network type, OpenNap, Kazaa, Gnutella, eMule, Kademlia or Limewire), the P2P access port that comprises " portal server " and will use." portal server " is mainly used in first registration on the special P 2 P network.As shown in Figure 3, terminal user's device is only supported a P2P network (that is, using the OpenNap of port 8888).Yet, be understandable that terminal user's device can be supported any amount of P2P procotol.Be understandable that also, request action " requestServerReport " and " getServerReport " be shown be only used for the illustrative purpose that other command method and the function imagined as those skilled in the art can realize.
Refer again to Fig. 1, (that is, realize two or two above computer set of web services) terminal user's device is trooped P2P server registers (125) to web services in.As known for the skilled artisan, use the standard middleware architecture platform be required to provide web services to carry out one or more P2P servers and web services trooped and be connected and enrollment process that disconnection is connected.By J2EE (Java2 platform, enterprise version) web service architecture (for example, the WebSphere of IBM that uses any specialty
, BEA WebLogic
, JBOSS), available P2P agreement sends to J2EE web services adapter (" J2EE adapter ") with statistical information and other P2P protocol element.According to J2EE connector architecture specification, JSR112V1.5, J2EE adapter are the combinations of " connection " and " adapter resource ".The J2EE adapter can be in web services is trooped be registered as P2P " inlet " server traditional forms of enterprises's infosystem (" EIS ") (IBM for example automatically
CICS transaction system, SAP/R3 use).This architecture allows key service features, the load balance between (a) P2P server for example, (b) redundancy, (c) database synchronization, (d) the proprietary EIS message transformation in the XML web services message, and a plurality of EIS adapters that (e) are used for each additional P2P agreement of supporting.
Terminal user's device is carried out (130) identity from supply.As mentioned above, term " supply certainly " refers to the ability of terminal user's device as client-server." identity is from supply " process provides terminal user's identity by terminal user's device.Identity can be desired simple or strengthen (that is, complicated) form as user or WSP.WSP can provide template/form simple or that strengthen to be used to import identity data.In one embodiment, simple list can be used as the acquiescence form and embeds or download to automatically in terminal user's device, if the terminal user needs, he can inquire about and download the enhancing form.Fig. 4 (a) illustrates the situation that identity form is embedded into as the part of terminal user's device.Collaboration seeker is imported data in identity form.Identity is published to the P2P network and returns and announce and reply.Fig. 4 (b) illustrates that terminal user's device inquiry WSP is to seek the alternate example of identity form.Web service request is sent to WSP and WSP returns to terminal user's device with identity form.The terminal user enters data into identity form.Terminal user's device is published to the P2P network with identity and returns announcement and reply.
For security consideration, the form that the reference template inspection terminal user that reference examples such as WSP have finishes.This has been avoided the error format file and provides more simplifying and safer search procedure, and these will be described in greater detail below.In addition, be understandable that the type of the information of announcing and content depend on the terminal user fully in the P2P network.Therefore, the terminal user can select not fill all possible field in the identity form.
Referring now to Fig. 5 (a), show first exemplary search procedure in conjunction with one embodiment of the present of invention.ISP 505 is responsible for should asking " service descriptor " is delivered to the device that requires particular search.User's set 510 expectations obtain the method for access search information and relevant search process from ISP 505.Therefore, user's set 510 requests so-called " web service descriptor file " (hereinafter claiming " wsdl document ").
If ISP 505 has the wsdl document 515 that meets user's set 510 requests, then wsdl document 515 is sent to user's set 510.Based on wsdl document 515, the one SOAP client computer 520 that transmitted by sending protocol element<GetCity in 525 in inquiry can initiate search procedure.Inquiry 525 can not comprise any city name.Received protocol element<GetCity by the SOAP server 530 among the device 535A that inquires about 〉.The 2nd SOAP client computer 540 is utilized protocol element<CityResponse〉response, this is included in the city name of registering among the device 535A that is inquired about.Foregoing inquiry 525 can be carried out on other device such as 535B and 535C.
Referring now to Fig. 5 (b), show second exemplary search procedure according to one embodiment of the present of invention.The process of Fig. 5 (b) is similar to the process of Fig. 5 (a), and it is not city but real-time information, for example " service availability " of specific device or " idle availability " that difference is to inquire about solicited message in 525.
According to unpredictable/uncertainty method, the device 535A that is inquired about can change the protocol element that sends with real-time mode.Can determine that " device availability " is definite by any way, for example local user manipulation or also decision automatically in real time.
Referring now to Fig. 5 (c), show the 3rd exemplary search procedure according to one embodiment of the present of invention.The process of Fig. 5 (c) is similar to the process of Fig. 5 (b), and difference is that Fig. 5 (c) is applicable to unknown end-user (for example, being call center agent here) 535A.In this case, whether the protocol element that the is transmitted Call Agent 535A that inquires about " on duty " in real time can respond call request.In this example, Call Agent 535A can respond it " on duty " and have registration certain " technical ability " thereon.But, may not be that the protocol element that is transmitted that terminal user itself sends can be repeated by other system or process.
Fig. 6 (a) illustrates the exemplary simple personal identity form of using XML.Form stores (a) name, (b) surname, (c) Email, (d) nationality, and (e) sex.File storage in the P2P share directory of (a) terminal user device or (b) " storage " originally on one's body the distributed Hash tables, makes other users to come search terminal user " John Smith " based on the standard that proposes in the identity form at the P2P network.
Fig. 6 (b) illustrates the exemplary business identity form that is used for same subscriber John Smith, as shown in Fig. 6 (b).Business identity form comprises and is used for type of service (that is auto repair shop), the position of business and the clauses and subclauses of registration or license number.Business identity form can be stored in the P2P catalogue identical with personal identity form.
Fig. 6 (c) illustrates exemplary enhanced identity form.As shown in the figure, the enhancing identity provides the simple identity form more information than Fig. 5 (a).Be understandable that the identity form that Fig. 5 (a)-5 (c) is shown only is used for the illustrative purpose, can use other form types and key element as the skilled person envisaged.
Refer again to Fig. 1 now, terminal user's device is searched for (135) potential co-worker from cooperative association.The simple search process is described now.Can recognize that the simple search process is shown only is used for the illustrative purpose, those skilled in the art can imagine other search procedure.
Simply " search procedure " can comprise at least one in following two root phases: the search of (1) P2P filename; (2) P2P file analysis.In one embodiment, can use open protocol and international IT standard to carry out search procedure, pass through following steps:
A) obtain web services (wsdl document/service descriptor) from UDDI commerce services supplier;
B) on device, realize web services according to the WSDL descriptor; And
C) use is analyzed (using soap protocol and XML grammer) each file that returns from the available web service descriptor of top step b.
The P2P file search stage relates to uses filename to reduce identification document.Identification document also can be called as " user profiles ".Shown in Fig. 5 (a), the filename of simple personal identity form comprises terminal user's first name and last name.Therefore, by search file<John.Smith.xml〉can carry out search to the terminal user of specific " John.Smith " by name.As the skilled person envisaged, but the out of Memory in the search file name (for example,<Car.Mechanics.Repair.xml 〉).
Referring now to Fig. 7, suppose that collaboration seeker John wants the people of search " Marie Joe " by name in the P2P network.Device can be initiated search to search all with<Marie.Joe.xml in suitable substance P 2P network〉file of issue and definition.
Each P2P server of being inquired about can with one or more registrations<Marie.Joe.xml file responds, and comprises each file IP address separately.Be appreciated that from terminal user's device online with the terminal user's device in the response indication P2P network of file.
If return a more than file, then the terminal user must each potential partner of manual examination (check), and this can become tediously long and time-consuming procedure.Therefore, it may be favourable further carrying out the P2P file analysis.In the superincumbent example, collaboration seeker can be imported additional search criteria, makes<Marie.Joe.xml〉quantity of file can taper to one.The type of additional search criteria (that is, " shielding ") can be limited in the search form that WSP or third party offer collaboration seeker.Can use any amount of shielding, include but not limited to, e-mail address, city, nationality, sex, street, business, speciality, birthday, business address etc.
What above enumerate is illustrative but not exhaustive.The quantity and the type of shielding depend primarily on WSP.The input field that provides in the identity form is fit to specific WSP search operation usually.For example, if search field " Business " is provided in the identity form, then can provide inquiry SOAP action<GetBusiness〉as the possibility analytical standard.Input shielding can be standard x ML structured file and can use web services protocols and SOAP annex standard with its download (or distribution) to terminal user's device.
Refer again to Fig. 1, terminal user's device uses at the SOAP/XML standard agreement on the HTTP host-host protocol and obtains (140) service or identity availability about each Search Results (above being " Marie.Joe.xml " file in the example).This usually allows terminal user's device to pass network address translater (" NAT ") and the fire wall of company comes inquiry file because HITP is used on the Internet ports 80 mostly and as long as access to the Internet do not interrupted fully with regard to can not interrupting.Be appreciated that as known for the skilled artisan, can use many other agreements (or the mechanism of other agreement of combining with HTTP of use, for example UDP).Many in these are that the public is available, and some allow the definition by the optimal way of fire wall exchange message.For avoid downloading on the P2P network each<Marie.Joe.xml the off-line analysis of file and execute file, terminal user's device can use online remote inquiry, online remote inquiry uses soap protocol.
Terminal user's device uses the quantity of one or more search criterion reduction (145) Search Results.In the example, can refine search in the above, for example,<city by inquiry/search〉enumerated potential co-worker.
Search agent (being called for example NapGear) use<city〉name is to issue<Marie.Joe.xml in the P2P network〉all end devices execution SOAP action<GetCity of file 〉.Suppose that they all start, each peer can use SOAP to respond, for example<and CityResponse〉(for example, " New York ").If peer is closed, can take place overtime in the past in the time of distributing.
Result (or overtime under the situation that does not have response) as the SOAP response, from each device, abandon device and/or file with improper response, for example, because the position (that is, " Los Angeles ") of the request that provides in the search form is not provided " New York ".If additional search refinement is essential, then use the additional web service request of additional search criteria utilization further to reduce Search Results.
In case the terminal user finds one or more potential co-workers, can recognize that the terminal user can add these one or more potential co-workers in the catalogue on this terminal user's device to.Can adopt any realization catalogue in the variety of way, for example, partner list, chat list, user's group etc.Although be selectable, this step allows the terminal user to search for known potential co-worker and need not carry out search step, and is as described above in greater detail.Can be by P2P network notice catalogue about potential co-worker's availability and the automatically updated potential co-worker's of catalogue IP address.
Terminal user's device uses any (for example, VoIP, game on line are used) initiation (150) collaboration session in the various collaboration application.Common selection of terminal user's device and initiation particular collaboration application and one or more potential co-worker follow suit.In one embodiment, use known IP address directly initiating collaboration application in the P2P connection.For example, terminal user's device can use IP address (for H.323) or e-mail address (for SIP) to initiate VoIP software (for example, SJPhone
).Potential co-worker's IP address can directly be provided by P2P network or XML analytic process.When beginning collaboration application on terminal user's device, this IP address is used as command line parameter.In alternative, the use web services can long-range initiation collaboration application between terminal user's device and potential co-worker.
Under the situation that recreation is used, similarly process is suitable for.Search criterion can be different and can not require the potential co-worker of understanding.Being used to play the search criterion used can be including but not limited to " preferred recreation is used " and " top score ".This standard is enough for participation game on line or virtual contest between or the unknown subscriber known at two or more.
Terminal user's device leaves (155) hot zone or any other IP access point or network insertion, and removes the file of announcement from the P2P network.If terminal user's device can not be deleted its identity from the P2P network, then the P2P node can abandon the identification document of user and Ta afterwards in the time cycle of determining (that is, overtime).
Mobile device itself can become the part of P2P server architecture.For example, simple P2P server can be reported to " super equity " P2P server.This P2P architecture has improved network robustness and allowed searches for faster.Super equity be to one skilled in the art know and be widely used in the current P2P network.
Fig. 8 explanation is according to one embodiment of the present of invention, and how simple mobile device is connected to the mobile P 2 P server, and this server can be connected to super reciprocity P2P server and/or P2P network ingress point again.In this example, even two simple end-user devices link together now, they also can use the simple request of issuing super-peer to find mutually.By allowing simple end-user devices be connected to two or more P2P embedded servers, improved the redundancy of network greatly.As shown in Figure 7, if server A lost efficacy (for example, losing its wireless connections), can arrive the whole devices that connected by the server B that still is connected with super peer server.
Should be appreciated that front of the present invention description should not be limited to " terminal user " or personal device.For example, also can utilize any various machines that are connected to the P2P network, make machine can carry out automatic search.Machine can pass through the information of (a) manual collection from the operator, or (b) in real time automatic acquisition of information (the similar temperature of for example, being caught or the measuring unit of pressure) is carried out search.
Above disclosed specific embodiment only is illustrative, and the those skilled in the art for obtaining the benefit that this paper discusses it is evident that, can adopt difference but the present invention is revised and put into practice to the mode of equivalence.And, in following claim, describing, to be used for the details of construction or design shown in this article without limits.Therefore, it is evident that can change or revise top disclosed specific embodiment, all these variations be all thought within the scope of the present invention.Correspondingly, in following claim, set forth the protection domain of this paper.
Claims (19)
- One kind make potential co-worker can be in reciprocity P2P network found system, comprising:Searcher; AndIn operation, be connected to a plurality of potential co-worker of P2P network;Wherein said searcher comprises:Be used for parts to the P2P network registration;Be used for initiating the parts of web services to the web services supplier;Be used for using described web services to ask parts at the available P2P server of described P2P network from described web services supplier;Be used for using described web services at the troop parts of the described available P2P server of registration of web services;Be used for carrying out the parts of identity from supply at described P2P network;Be used for obtaining searching for the potential co-worker's of described P2P network the parts of one or more Search Results;Be used to obtain about the service of each Search Results and the parts of identity availability;Be used to reduce the quantity of Search Results to produce the parts of the results list that reduces; AndBe used for initiating parts with one or more potential co-workers' of the results list of described reduction collaboration session.
- 2. the system as claimed in claim 1 is characterized in that, described searcher is that searchers terminal user device and described a plurality of potential co-worker are a plurality of potential terminal user's devices.
- 3. system as claimed in claim 2 is characterized in that, each in described searchers terminal user device and the described a plurality of potential terminal user's device comprises at least a in personal digital assistant, laptop computer and the cell phone.
- 4. the system as claimed in claim 1, it is characterized in that the described searcher of each response in the identity of one or more submissions of described a plurality of potential co-workers sends web service request and downloads from described web services supplier to the web services supplier.
- 5. the system as claimed in claim 1, it is characterized in that, described searcher login web services supplier is so that use web services and Simple Object Access Protocol to obtain visit to described P2P network on HTML (Hypertext Markup Language) and IP network.
- 6. the system as claimed in claim 1 is characterized in that, described searcher is the machine that is connected to IP network.
- 7. the system as claimed in claim 1 is characterized in that, described P2P network comprises at least a among Kazaam OpenNAP, Gnutella, FastTrack, LimeWire, eMule/Kademila and the Napster.
- 8. the system as claimed in claim 1 is characterized in that, each in one or more identification documents of described a plurality of potential co-workers comprises extensible markup language document.
- 9. the system as claimed in claim 1 is characterized in that, the described parts that are used to initiate collaboration session are independent of described P2P network.
- 10. one kind is used for searcher and finds to comprise potential co-worker's method at reciprocity P2P network:To the P2P network registration;The supplier initiates web services to web services;Use described web services to ask P2P server available in described P2P network from described web services supplier;Use described web services in web services is trooped, to register described available P2P server;In described P2P network, carry out identity from supply;Obtain the one or more Search Results of the potential co-worker in the described P2P network of search;Acquisition is about the service and the identity availability of each Search Results;The quantity of reduction Search Results is to produce the results list of reduction; AndThe collaboration session of one or more potential co-workers in the results list of initiation and described reduction.
- 11. method as claimed in claim 10 is characterized in that, comprises when described searchers's device is connected to IP network to the P2P network registration, from trend P2P network registration.
- 12. method as claimed in claim 10 is characterized in that, initiates web services to the web services supplier and comprises and use the HTTP/CML/SOAP agreement to initiate web services to the web services supplier.
- 13. method as claimed in claim 10 is characterized in that, also comprises using registration of UDDI web services and Business Entity to find described web services supplier.
- 14. method as claimed in claim 10, it is characterized in that, using described web services to ask P2P server available in the described P2P network to comprise from described web services supplier uses web services web service request to be sent to described web services supplier, the tabulation of the P2P server that described web service request request is available.
- 15. method as claimed in claim 14, it is characterized in that, use web services that web service request is sent to described web services supplier and comprise that the use web services sends to described web services supplier with the web service request that defines in the WSDL service descriptor file.
- 16. method as claimed in claim 10 is characterized in that, carries out identity and comprise from supply in described P2P network:The response web service request receives the identity form from described web services supplier, and described identity form comprises a plurality of information fields;Fill one or more in described a plurality of information field; AndIn described P2P network, announce described identity form.
- 17. method as claimed in claim 10 is characterized in that, the one or more Search Results that obtain the potential co-worker in the search P2P network comprise carries out the search of P2P filename.
- 18. method as claimed in claim 10 is characterized in that, the quantity of reduction Search Results comprises with the results list that produces reduction:The response web service request is downloaded the search form from described web services supplier, and described search form comprises a plurality of search fields;Fill one or more in described a plurality of search field;Reduce described one or more Search Results based on one or more in described a plurality of search fields; AndThe result of described reduction step is stored in the results list of reduction.
- 19. method as claimed in claim 10, it is characterized in that the collaboration session of the one or more potential co-workers in the results list of initiation and described reduction comprises the collaboration session of the one or more potential co-workers in the results list that is independent of described P2P network initiation and described reduction.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US45548303P | 2003-03-18 | 2003-03-18 | |
US60/455,483 | 2003-03-18 | ||
US10/801,043 | 2004-03-15 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1761960A CN1761960A (en) | 2006-04-19 |
CN100452031C true CN100452031C (en) | 2009-01-14 |
Family
ID=36707371
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2004800074067A Expired - Lifetime CN100452031C (en) | 2003-03-18 | 2004-03-16 | System and method for discovering potential collaborators in a peer-to-peer P2P network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100452031C (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11769114B2 (en) | 2020-12-03 | 2023-09-26 | Novartis Ag | Collaboration platform for enabling collaboration on data analysis across multiple disparate databases |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8494007B2 (en) * | 2007-07-10 | 2013-07-23 | Qualcomm Incorporated | Coding methods of communicating identifiers in peer discovery in a peer-to-peer network |
CN101420434B (en) * | 2008-12-03 | 2011-12-28 | 深圳市众方信息科技有限公司 | P2P method for supporting VoIP communication |
US9614905B2 (en) * | 2009-10-20 | 2017-04-04 | Avaya Inc. | Determination of persona information availability and delivery on peer-to-peer networks |
WO2014080293A2 (en) | 2012-11-23 | 2014-05-30 | Calgary Scientific Inc. | Methods and systems for peer-to-peer discovery and connection from a collaborative application session |
US10133613B2 (en) * | 2015-05-14 | 2018-11-20 | Microsoft Technology Licensing, Llc | Digital assistant extensibility to third party applications |
CN112272196A (en) * | 2020-03-09 | 2021-01-26 | 上海曼恒数字技术股份有限公司 | Method and system for removing server by system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1229442A2 (en) * | 2001-01-22 | 2002-08-07 | Sun Microsystems, Inc. | Peer-to-peer computing architecture |
EP1282289A2 (en) * | 2001-07-31 | 2003-02-05 | Sun Microsystems, Inc. | Mechanism for trusted relationships in decentralised networks |
-
2004
- 2004-03-16 CN CNB2004800074067A patent/CN100452031C/en not_active Expired - Lifetime
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1229442A2 (en) * | 2001-01-22 | 2002-08-07 | Sun Microsystems, Inc. | Peer-to-peer computing architecture |
EP1282289A2 (en) * | 2001-07-31 | 2003-02-05 | Sun Microsystems, Inc. | Mechanism for trusted relationships in decentralised networks |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11769114B2 (en) | 2020-12-03 | 2023-09-26 | Novartis Ag | Collaboration platform for enabling collaboration on data analysis across multiple disparate databases |
Also Published As
Publication number | Publication date |
---|---|
CN1761960A (en) | 2006-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2004220808B2 (en) | A meta-search WEB service-based architecture for peer-to-peer collaboration and voice-over-IP | |
US7277946B2 (en) | Distributed session listing and content discovery | |
US8023940B2 (en) | Connecting ad hoc piconets to wide area networks and/or grid computing networks | |
KR100953594B1 (en) | Method and apparatus for providing social networking service base on peer-to-peer network | |
EP1434144A2 (en) | Peer-to-peer graphing interfaces and methods | |
US20080307094A1 (en) | Association of peer-to-peer contribution credits with multiple devices | |
US20130166654A1 (en) | Method and Arrangement in a Peer-to-Peer Network | |
Elgazzar et al. | Mobile web services: state of the art and challenges | |
Srirama et al. | Mobile web service provisioning and discovery in android days | |
CN100452031C (en) | System and method for discovering potential collaborators in a peer-to-peer P2P network | |
Srirama et al. | Scalable mobile web service discovery in peer to peer networks | |
Bieri | An overview into the InterPlanetary File System (IPFS): use cases, advantages, and drawbacks | |
KR100860413B1 (en) | Extended home service apparatus and method for providing extended home service in p2p networks | |
Arifuzzaman et al. | Collaboration between network players of information centric network: An engineering-economic analysis | |
Galatopoullos et al. | A P2P SOA enabling group collaboration through service composition | |
US20040221299A1 (en) | Method and apparatus for developing interface protocols for peer to peer applications | |
JP3974357B2 (en) | Shared link setting method, communication system, entity device, computer program thereof, and recording medium thereof | |
Liquori et al. | Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems | |
Arrivets | MONET: Mobile Ad Hoc Blockchains | |
Conrad et al. | A peer-to-peer framework for electronic markets | |
Elgazzar et al. | Enabling mobile web services provisioning | |
Elgazzar | Discovery, personalization and resource provisioning of mobile services | |
Zhygmanovskyi et al. | Peer-to-peer network for flexible service sharing and discovery | |
Bocciarelli et al. | QSHARE: QoS-enabled Description and Discovery of Services in SOA-based P2P Applications | |
Wongrujira et al. | Incentive service model for P2P |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: SIEMENS AKTIENGESELLSCHAFT Free format text: FORMER OWNER: SIEMENS CORPORATE RESEARCH, INC. Effective date: 20100727 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20100727 Address after: New jersey, USA Patentee after: SIEMENS AG Address before: New jersey, USA Patentee before: Siemens Corporate Research, Inc. |
|
CX01 | Expiry of patent term |
Granted publication date: 20090114 |
|
CX01 | Expiry of patent term |