CN101155031A - Device and control method for central authorization control in P2P file transfer - Google Patents

Device and control method for central authorization control in P2P file transfer Download PDF

Info

Publication number
CN101155031A
CN101155031A CNA2006101225154A CN200610122515A CN101155031A CN 101155031 A CN101155031 A CN 101155031A CN A2006101225154 A CNA2006101225154 A CN A2006101225154A CN 200610122515 A CN200610122515 A CN 200610122515A CN 101155031 A CN101155031 A CN 101155031A
Authority
CN
China
Prior art keywords
node
key
file
bill server
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006101225154A
Other languages
Chinese (zh)
Inventor
黄声声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Kingsoft Software Co Ltd
Original Assignee
Zhuhai Kingsoft Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Kingsoft Software Co Ltd filed Critical Zhuhai Kingsoft Software Co Ltd
Priority to CNA2006101225154A priority Critical patent/CN101155031A/en
Publication of CN101155031A publication Critical patent/CN101155031A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a novel device for doing central authorization controlling in the transmission of the P2P document and the control method, which settles the problem that the authority of the transmitter can not be controlled in the transmission of the P2P document. Thereby administer is allowed to has the ability of restricting the accessing by the non-authorized user to the sharing document of other person. In the invention the device which does central authorization controlling in the transmission of the P2P document includes a plurality of crunodes which are composed of a plurality of client terminal computers that participate in the transferring of the P2P file, the crunodes does data alternation with the communication network, and each customer end computer includes an input device, a display device and a computer mainframe which are connected together; wherein: the device which does central authorization controlling in the transmission of the P2P document is provided with a bill server that does authorization to the transmission of each crunode and controls the document transmitting content, the bill server includes a single or a plurality of CPUs and internal memory equipment, and the bill server does data alternation to each crunode with the communication network.

Description

In the P2P file transfer, carry out the device and the control method of central authorization control
Technical field
The present invention relates to the transmission control technology of computer data, relate in particular to the device and method that in the P2P file transfer, carries out central authorization control.
Background technology
The P2P technology is a kind of technology of finishing mission critical with non-centralized system use distributed resource.The computing technique of customer end/server mode different from the past, the object that resource is provided is not only a certain server, and is opposite, and the status of each node all is identical, possess the client and server double grading, can be simultaneously as service user and ISP.In the file transfer applications of the Internet, employing P2P technology can effectively reduce the traffic load of server, the speed when improving the user's download heap file.But, because distributivity, anonymity that the P2P technology itself has make that using P2P to carry out file transfer is difficult to carry out effective authorization control.We are called a node with the client computer that each participates in the P2P file transfer, and under general situation, node is exactly the employed computer of domestic consumer.
The P2P technology has wide application and prospect, and main application at present has exchange files, Distributed Calculation, collaborative work, distributed search and ecommerce etc.Wherein, file transfer applications is the most ripe field in the present P2P technology.Wherein most typical application case is exactly Napster.It is the P2P file transfer applications of most typical convergence directory pattern.
Shared file system Napster is born in 1999.Napster is a P2P utility system the earliest, participation system be a large amount of personal computer user, each user will oneself be ready that the file of sharing provides out, simultaneously can download the file that other users share.The key problem that Napster need solve is must know which file to be arranged, just can obtain correct matching result like this when the user proposes the file search request on which machine.Can use Napster to share mp3 file in the system separately freely such as, user, this just causes the bootlegger not pay just obtaining the mp3 file that other people share, and music publishers merchant then feels simply helpless to this.
In Napster, use a central server, be called LIST SERVER, deposit metadata of all files information (title of file and some simple descriptors) with and the IP address of depositing node, node at first will connect LIST SERVER when adding system and report self address and the listed files of sharing.Submit searching request to LIST SERVER when the user needs certain file, LIST SERVER returns the memory address of the All Files that meets searching requirement, and the user directly carries out the file download from the node of sharing this file according to corresponding address afterwards.Because LIST SERVER only provides index service, and does not bear file storage and download service, so it supports nodes up to ten thousand simultaneously online.Napster comes into vogue rapidly after issue, becomes fastest-rising network application system very soon.
Because lack effective central authorization control device, Napster has obtained after the immense success in the early stage, runs into the puzzlement of copyright problem very soon.Because it much is music media file that the file that Napster go up to share has, these music media are what not allow by wide-scale distribution when uncommitted.And the LIST SERVER of Napster exactly provides support for the propagation of these files, and the manager of Napster can't prevent effectively that undelegated user from obtaining these files by the Napster service.Therefore Napster is subjected to the challenge that music works side initiates for the protection copyright very soon, and is forced to close in calendar year 2001.
The follow-up developments of P2P technology have further improved the convergence directory pattern that Napster adopted.The P2P technology of new generation that with Gnutella is representative has carried out changing completely to the architecture of Naspter, do not re-use centrales record server, then use full peering structure: the IP address (being called " pointer ") of a plurality of other nodes of each node record, the topology of whole system just becomes a directed graph of being built by pointer like this, usually claim this figure be " nerve of a covering " (Overlay), owing to do not stipulate to have between which node pointer to link to each other in the nerve of a covering of Gnutella, therefore the orderly structure of whole nerve of a covering neither one is (such as annular, cube shaped, hierarchical structure, tree structure, directed acyclic graph etc.), be known as " destructuring nerve of a covering " (Unstructured Overlay).
When the user need carry out file search, just on nerve of a covering, carry out breadth First or depth-first search, after searching certain scope, the result of the match search condition that obtains is returned to the user.Because this search can not spread all over whole nerve of a covering, therefore can not search full problem with regard to existing.But this problem is also not serious, because people always search for some relatively files of popular (popular) in the time of most of, and that these files often have in whole system is a lot of part, as long as the scope of search is not very little, always can search out wherein a or many parts.
In fact, this to the search completeness sacrifice brought very high extensibility: system no longer includes the center node becomes bottleneck, and scale can expand to the scale of up to a million even up to ten million nodes.And owing to there is not pregnable key event, the robustness of system also is improved.
Regrettably, with Gnutella be the central authorization control problem that the P2P technology of new generation of representative does not still solve file transfer.Owing to no longer have a central directory server, the control of authority of user capture file is become one " can not finishing of task " more, this makes people have more doubt to further in-depth P2P The Application of Technology.
The control of the central authorization of traditional P2P requires architecture to take the convergence directory pattern, so that in the authority of the LIST SERVER centralized control client of central authorities.But, be that the P2P framework of the non-convergence directory pattern of representative begins to become gradually new developing direction with Gnutella along with the development of P2P technology.Owing to no longer include the existence of central directory server, carry out unified authorization control and just further become a bigger difficult problem.
As shown in Figure 1, the P2P file transfer of once traditional convergence directory pattern can be described like this:
Node A wishes to obtain file Data, so it has the node of this document to LIST SERVER L inquiry.LIST SERVER L finds that node B has this file, so the address of node B is returned to A.A is to node B demand file Data then, and last B passes to A with file, finishes transmission this time.Fig. 1 has represented this transmission course.
We notice, in the middle of this process, central server has only that a way control A obtaining the file Data of node B---in step 2, to unauthorized user, refusal returns the position of node B, causes A to can not find B.And if the position that A obtains B by other approach, then central server can't stop A to ask for file according to agreement to B.So we find that in fact such way can't effectively carry out authorization control to whole document transmission process.
In the new P2P file transfer pattern of taking non-convergence directory pattern, owing to no longer include the existence of LIST SERVER L, uncontrollable especially to the file transfer behavior of client.P2P Network Management person can't know whether a node has the right to obtain certain file, also can't limit other node and whether this file can be offered it.
Summary of the invention
In order to overcome the deficiency in the existing computer P2P file transfer, the objective of the invention is to: this paper has proposed a kind of new device and the method for controlling of carrying out central authorization control in the P2P file transfer, has solved the problem of uncontrollable transmission person's authority in the P2P file transfer.Thereby allow the manager to have the ability that the restriction unauthorized user is visited the file that other people shares.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of device that in the P2P file transfer, carries out central authorization control, comprise a plurality of nodes of forming by the client computer of many participation P2P file transfer, carry out data interaction by communication network between the described node, each described client computer includes interconnective input equipment, display device and host computer; Wherein: the described device that carries out central authorization control in the P2P file transfer also includes to have for the transport behavior of each node authorizes the also bill server of control documents transmission content, described bill server includes single or multiple CPU and memory device, and described bill server and each node carry out data interaction by communication network.
A kind of method of carrying out central authorization control in the P2P file transfer comprises the steps:
Step 1: node A lands the bill server;
Step 2: the node A that the bill server lands generates a pair of temporary key (PKI Ktu+ private key Kti);
Step 3: the bill server returns to temporary private Kti and lands node A;
Step 4: node A is to node B demand file;
Step 5: node B at first inquires about the interim PKI Ktu of A to bill server TGS;
Step 6: node B uses the interim PKI Ktu of A with file encryption;
Step 7: node B passes to node A with the file of encrypting;
Step 8: node A receives the file after the encryption, then uses the temporary private Kti of oneself to be decrypted, and obtains file.
The invention has the beneficial effects as follows: adopt device and method of controlling of carrying out central authorization control in the P2P file transfer of the present invention, advantage is:
(1) effectively central authorization control
(2) higher fail safe can effectively be resisted leakage of information, forged identity is attacked and replay attack
(3) more reliable data integrity
(4) outstanding scalability
We should be noted that, when node A when node B asks for file, bill server TGS can also control the content of B to file transfer except the interim PKI Ktu that A is provided to B, promptly require B only to allow to transmit certain file to A, node A can't intervene this.Therefore, TGS can do the careful control of rising limit to the authority of node A.
Description of drawings
Fig. 1 is the principle schematic of the P2P file transfer of convergence directory pattern once traditional in the prior art;
Fig. 2 is the present invention carries out the method embodiment one of central authorization control in the P2P file transfer a principle schematic;
Fig. 3 is the present invention carries out the method embodiment two of central authorization control in the P2P file transfer a principle schematic.
Embodiment
The present invention proposes a kind of central authorization control technology, will effectively solve above-mentioned function of in the P2P file transfer, carrying out central authorization control based on rivest, shamir, adelman.
About rivest, shamir, adelman, 1976, American scholar Dime and Henman transmit and cipher key management considerations for solving information disclosure, a kind of new IKE is proposed, the communication two party exchange message of permission on unsafe medium, the key of reaching an agreement safely, Here it is " open key system ".Also be called " rivest, shamir, adelman " with respect to " symmetric encipherment algorithm " this method.
Different with symmetric encipherment algorithm, rivest, shamir, adelman needs two keys: public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair of, if with public-key cryptography data are encrypted, have only with corresponding private cipher key and could decipher; If data are encrypted, have only so with corresponding public-key cryptography and could decipher with private cipher key.Because what encryption and decryption were used is two different keys, so this algorithm is called rivest, shamir, adelman.The assailant who has public-key cryptography can't calculate private cipher key by public-key cryptography, and vice versa.
We abbreviate public-key cryptography as PKI, and private cipher key abbreviates private key as.
Embodiment 1:
In the present embodiment, we have proposed a kind of new improving one's methods, with the central authorization controlled function in the middle of the P2P transmission course that is implemented in non-convergence directory pattern.
P2P file transfer mode for non-convergence directory pattern, the a plurality of nodes (Peers) that are group do not use the center LIST SERVER, then use full peering structure: the IP address of a plurality of other nodes of each node record, by carrying out breadth First or depth-first search on the nerve of a covering, after searching certain scope, the result of the match search condition that obtains is returned to the user, and file directly exchange between two nodes (Peers), carry out.
A kind of device that in the P2P file transfer, carries out central authorization control of present embodiment, comprise a plurality of nodes of forming by the client computer of many participation P2P file transfer, carry out data interaction by communication network between the described node, each described client computer includes interconnective input equipment, display device and host computer; Wherein: the described device that carries out central authorization control in the P2P file transfer also includes to have for the transport behavior of each node authorizes the also bill server of control documents transmission content, described bill server includes single or multiple CPU and memory device, and described bill server and each node carry out data interaction by communication network.
Described node includes:
The conventional func module of the P2P client of common non-convergence directory pattern is in order to search file resource in the P2P network, file in download resource;
Land module, the described module of landing uses personal key to land at the bill server, and obtains the temporary private of self;
Authentication module is when described authentication module is worked as the file resource of other node acquisition request self, to bill server requests authentication-access person's authority;
The authentication request module, described authentication request module was at first sent authentication request to destination node before sending the conventional file resource request of obtaining;
After deciphering module, described close module obtain file resource after the encryption from destination node, use self the temporary private deciphering that obtains when landing;
Key updating module, described key updating module are upgraded temporary key when receiving the replacing temporary key negotiation that the bill server sends.And keep current temporary key till changing temporary key negotiation all connections all finish before beginning.
Described bill server includes:
Key production module, described key production module for node generates a pair of temporary key, and return to temporary private and land node when node lands, and oneself keeps the interim PKI that lands node, and the record landing time;
PKI returns module, and described PKI returns module when the mandate of node inquiry another one node, if the node of being inquired has landed and had a mandate, its interim PKI is returned to the inquirer, and write down this information inquiring;
Overtime control module, the overtime control module of described bill server is checked the landing time of each node, when landing when overtime, sends the replacing temporary key negotiation to node and other node of inquiring about this node.
As shown in Figure 2, a kind of method of carrying out central authorization control in the P2P file transfer comprises the steps:
Step 1: node A lands the bill server;
Step 2: the node A that the bill server lands generates a pair of temporary key (PKI Ktu+ private key Kti);
Step 3: the bill server returns to temporary private Kti and lands node A;
Step 4: node A is to node B demand file;
Step 5: node B at first inquires about the interim PKI Ktu of A to bill server TGS;
Step 6: node B uses the interim PKI Ktu of A with file encryption;
Step 7: node B passes to node A with the file of encrypting;
Step 8: node A receives the file after the encryption, then uses the temporary private Kti of oneself to be decrypted, and obtains file.
As shown in Figure 2, we should be noted that, when node A when node B asks for file, bill server TGS is except the interim PKI Ktu that A is provided to B, can also control the content of B to file transfer, promptly require B only to allow to transmit certain file to A, node A can't intervene this.Therefore, TGS can make very careful control to the authority of A.
In order to solve the safety issue of temporary key better, the propagation of guaranteeing temporary private Kti cannot be intercepted, the propagation of interim PKI Ktu cannot be forged, thereby the identify label mode of node and server is more complete in the system, described method of carrying out central authorization control in the P2P file transfer also comprises the distribution management method of key, wherein, each node and bill server TGS have a pair of personal key; Node has the PKI of bill server TGS, and server has the private key of all nodes.
Described method of carrying out central authorization control in the P2P file transfer also comprises the distribution management method of key, wherein:
1, when node A lands, node A encrypts one section random data with the PKI of bill server TGS, passes to ticket
According to server TGS, bill server TGS uses the private key of oneself with data decryption, will count with the PKI of node A again
According to encrypting once more, transmit back A then;
2, after the private key deciphering of node A with oneself, the data that relatively spread out of and pass back, the identity of affirmation bill server TGS;
3, step 1 above the bill server uses, 2 method are to the identity validation of node A;
4, the personal key of bill server and node is carried out regular update, and renewal frequency can be according to the Cipher Strength decision of key;
When 5, bill server notification node A changes the personal key of node A, need to confirm by step 1,2 server identity.
The transmission of the temporary private Kti of node A is by carrying out behind the public key encryption of A, and this has guaranteed that Kti is not stolen, and the propagation of all PKIs need not to encrypt.
Prevent replay attack during for file transfer, introduce temporary key, described method of carrying out central authorization control in the P2P file transfer also comprises the timeout mechanism control method, wherein, overtime restriction is managed by bill server TGS, when each node landed at bill server TGS, bill server TGS write down the landing time of each node, and this time is the time started of the secret key of node just; Bill server TGS can check the cryptographic key existence time of each node always, and when the cryptographic key existence time of finding certain node A exceeded the cryptographic key existence length T k of setting, bill server TGS sent the replacing temporary key negotiation to A.
Concrete timeout mechanism control method comprises the steps:
1, bill server TGS sends the temporary key request of changing to node A, and node A returns and accepts to change the temporary key response; If the overtime not response of node A, bill server TGS thinks that node A exits network, and notifies all nodes of all temporary keys of inquiring about node A, stops to accept the request of node A;
2, bill server TGS generates a pair of new key, sends private key to node A, PKI is sent to all nodes of the temporary key of inquiring about node A, and their file transfers next time will be used new key; If node A has the file that is transmitting when obtaining new private key, node A will keep old temporary key till all use the end of transmission of old temporary key;
If in the time of 3 bill server TGS notice node A change temporary key, node A and node B are just at transfer files, then this time transmission is unaffected, still uses old temporary key.
Embodiment 2:
In the present embodiment, we have proposed a kind of new improving one's methods, with the central authorization controlled function in the middle of the P2P transmission course that is implemented in the convergence directory pattern.
The present embodiment difference from Example 1 is, a kind of device that in the P2P file transfer, carries out central authorization control of present embodiment, also include a plurality of nodes and use the center LIST SERVER, described center LIST SERVER includes single or multiple CPU and memory device, described center LIST SERVER with respectively land node and carry out data interaction by communication network.
As shown in Figure 3, a kind of method of carrying out central authorization control in the P2P file transfer of present embodiment comprises the steps:
Step 1: node A lands the bill server;
Step 2: the node A that the bill server lands generates a pair of temporary key (PKI Ktu+ private key Kti);
Step 3: the bill server returns to temporary private Kti and lands node A;
Step 4: node A has the position of the node of file data to center catalogue server lookup;
Step 5: the position that the center LIST SERVER will have the node B of file data offers node A;
Step 6: node A is to node B demand file;
Step 7: node B at first inquires about the interim PKI Ktu of A to bill server TGS;
Step 8: node B uses the interim PKI Ktu of A with file encryption;
Step 9: node B passes to node A with the file of encrypting;
Step 10: node A receives the file after the encryption, then uses the temporary private Kti of oneself to be decrypted, and obtains file.
Above-mentioned listed specific implementation is nonrestrictive, to one skilled in the art, is not departing from the scope of the invention, and various improvement and the variation carried out all belong to protection scope of the present invention.

Claims (10)

1. one kind is carried out the device that central authorization is controlled in the P2P file transfer, comprise a plurality of nodes of forming by the client computer of many participation P2P file transfer, carry out data interaction by communication network between the described node, each described client computer includes interconnective input equipment, display device and host computer; It is characterized in that: the described device that carries out central authorization control in the P2P file transfer also includes to have for the transport behavior of each node authorizes the also bill server of control documents transmission content, described bill server includes single or multiple CPU and memory device, and described bill server and each node carry out data interaction by communication network.
2. the device that in the P2P file transfer, carries out central authorization control according to claim 1, it is characterized in that: described node includes:
The conventional func module of the P2P client of common non-convergence directory pattern is in order to search file resource in the P2P network, file in download resource;
Land module, the described module of landing uses personal key to land at the bill server, and obtains the temporary private of self;
Authentication module is when described authentication module is worked as the file resource of other node acquisition request self, to bill server requests authentication-access person's authority;
The authentication request module, described authentication request module was at first sent authentication request to destination node before sending the conventional file resource request of obtaining;
After deciphering module, described close module obtain file resource after the encryption from destination node, use self the temporary private deciphering that obtains when landing;
Key updating module, described key updating module are upgraded temporary key when receiving the replacing temporary key negotiation that the bill server sends.And keep current temporary key till changing temporary key negotiation all connections all finish before beginning.
3. the device that in the P2P file transfer, carries out central authorization control according to claim 1, it is characterized in that: described bill server includes:
Key production module, described key production module for node generates a pair of temporary key, and return to temporary private and land node when node lands, and oneself keeps the interim PKI that lands node, and the record landing time;
PKI returns module, and described PKI returns module when the mandate of node inquiry another one node, if the node of being inquired has landed and had a mandate, its interim PKI is returned to the inquirer, and write down this information inquiring;
Overtime control module, the overtime control module of described bill server is checked the landing time of each node, when landing when overtime, sends the replacing temporary key negotiation to node and other node of inquiring about this node.
4. one kind is used control method of carrying out the device of central authorization control in the P2P file transfer as claimed in claim 1, it is characterized in that: comprise the steps:
Step 1: node A lands the bill server;
Step 2: the node A that the bill server lands generates a pair of temporary key: PKI Ktu+ private key Kti;
Step 3: the bill server returns to temporary private Kti and lands node A;
Step 4: node A is to node B demand file;
Step 5: node B at first inquires about the interim PKI Ktu of A to bill server TGS;
Step 6: node B uses the interim PKI Ktu of A with file encryption;
Step 7: node B passes to node A with the file of encrypting;
Step 8: node A receives the file after the encryption, then uses the temporary private Kti of oneself to be decrypted, and obtains file.
5. method of in the P2P file transfer, carrying out central authorization control according to claim 4, it is characterized in that: described method of carrying out central authorization control in the P2P file transfer also comprises the distribution management method of key, and each node and bill server TGS have a pair of personal key; Node has the PKI of bill server TGS, and server has the private key of all nodes.
6. method of carrying out central authorization control in the P2P file transfer according to claim 5, it is characterized in that: the distribution management method of described key specifically comprises the steps:
When 1) node A landed, node A encrypted one section random data with the PKI of bill server TGS, passes to bill server TGS, and bill server TGS uses the private key of oneself with data decryption, with the PKI of node A data is encrypted once more again, transmits back A then;
2) after the private key deciphering of some A with oneself, the data that relatively spread out of and pass back, the identity of affirmation bill server TGS;
3) step 1 above the bill server uses, 2 method are to the identity validation of node A;
4) personal key of bill server and node is carried out regular update, and renewal frequency can be according to the Cipher Strength decision of key;
When 5) bill server notification node A changes the personal key of node A, need to confirm by step 1,2 server identity.
7. method of in the P2P file transfer, carrying out central authorization control according to claim 4, it is characterized in that: described method of carrying out central authorization control in the P2P file transfer also comprises the timeout mechanism control method, overtime restriction is managed by bill server TGS, when each node lands at bill server TGS, bill server TGS writes down the landing time of each node, and this time is the time started of the secret key of node just; Bill server TGS can check the cryptographic key existence time of each node always, and when the cryptographic key existence time of finding certain node A exceeded the cryptographic key existence length T k of setting, bill server TGS sent the replacing temporary key negotiation to A.
8. method of carrying out central authorization control in the P2P file transfer according to claim 7 is characterized in that: concrete timeout mechanism control method comprises the steps:
1) bill server TGS sends the temporary key request of changing to node A, and node A returns and accepts to change the temporary key response; If the overtime not response of node A, bill server TGS thinks that node A exits network, and notifies all nodes of all temporary keys of inquiring about node A, stops to accept the request of node A;
2) bill server TGS generates a pair of new key, sends private key to node A, PKI is sent to all nodes of the temporary key of inquiring about node A, and their file transfers next time will be used new key; If node A has the file that is transmitting when obtaining new private key, node A will keep old temporary key till all use the end of transmission of old temporary key;
3) if bill server TGS notice node A change temporary key the time, node A and node B be just at transfer files, then this time transmitted unaffectedly, still uses old temporary key.
9. according to claim 2 or the 3 described devices that in the P2P file transfer, carry out central authorization control, it is characterized in that: the described device that in the P2P file transfer, carries out central authorization control, also include a plurality of nodes and use the center LIST SERVER, described center LIST SERVER includes single or multiple CPU and memory device, described center LIST SERVER with respectively land node and carry out data interaction by communication network.
10. one kind is used control method of carrying out the device of central authorization control in the P2P file transfer as claimed in claim 9, comprises the steps:
Step 1: node A lands the bill server;
Step 2: the node A that the bill server lands generates a pair of temporary key: PKI Ktu+ private key Kti;
Step 3: the bill server returns to temporary private Kti and lands node A;
Step 4: node A has the position of the node of file data to center catalogue server lookup;
Step 5: the position that the center LIST SERVER will have the node B of file data offers node A;
Step 6: node A is to node B demand file;
Step 7: node B at first inquires about the interim PKI Ktu of A to bill server TGS;
Step 8: node B uses the interim PKI Ktu of A with file encryption;
Step 9: node B passes to node A with the file of encrypting;
Step 10: node A receives the file after the encryption, then uses the temporary private Kti of oneself to be decrypted, and obtains file.
CNA2006101225154A 2006-09-29 2006-09-29 Device and control method for central authorization control in P2P file transfer Pending CN101155031A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006101225154A CN101155031A (en) 2006-09-29 2006-09-29 Device and control method for central authorization control in P2P file transfer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006101225154A CN101155031A (en) 2006-09-29 2006-09-29 Device and control method for central authorization control in P2P file transfer

Publications (1)

Publication Number Publication Date
CN101155031A true CN101155031A (en) 2008-04-02

Family

ID=39256493

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006101225154A Pending CN101155031A (en) 2006-09-29 2006-09-29 Device and control method for central authorization control in P2P file transfer

Country Status (1)

Country Link
CN (1) CN101155031A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103427998A (en) * 2013-08-20 2013-12-04 航天恒星科技有限公司 Internet data distribution oriented identity authentication and data encryption method
CN105809051A (en) * 2014-12-31 2016-07-27 航天信息股份有限公司 Encryption card based enterprise key distribution method and encryption card based tax declaring method
CN109327482A (en) * 2018-12-18 2019-02-12 陕西医链区块链集团有限公司 P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication
CN110795745A (en) * 2019-10-14 2020-02-14 山东药品食品职业学院 Information storage and transmission system based on server and method thereof
CN114531446A (en) * 2020-10-31 2022-05-24 华为技术有限公司 Data distribution method, device and system based on P2P

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103427998A (en) * 2013-08-20 2013-12-04 航天恒星科技有限公司 Internet data distribution oriented identity authentication and data encryption method
CN105809051A (en) * 2014-12-31 2016-07-27 航天信息股份有限公司 Encryption card based enterprise key distribution method and encryption card based tax declaring method
CN109327482A (en) * 2018-12-18 2019-02-12 陕西医链区块链集团有限公司 P2P communication introduces the data transfer mode of the anti-fake and asymmetrical encryption of authentication
CN110795745A (en) * 2019-10-14 2020-02-14 山东药品食品职业学院 Information storage and transmission system based on server and method thereof
CN114531446A (en) * 2020-10-31 2022-05-24 华为技术有限公司 Data distribution method, device and system based on P2P
CN114531446B (en) * 2020-10-31 2023-04-18 华为技术有限公司 Data distribution method, device and system based on P2P

Similar Documents

Publication Publication Date Title
CN110493347B (en) Block chain-based data access control method and system in large-scale cloud storage
CN111343001B (en) Social data sharing system based on block chain
US11196573B2 (en) Secure de-centralized domain name system
CN108667612B (en) Trust service architecture and method based on block chain
CN109660485A (en) A kind of authority control method and system based on the transaction of block chain
CN111324881B (en) Data security sharing system and method fusing Kerberos authentication server and block chain
US9967091B2 (en) Method for enhancing security in distributed systems
CN105931337A (en) Electronic lock device and system and authorizing method of electronic lock system
CN110380845B (en) Quantum secret communication alliance chain transaction method, system and equipment based on group symmetric key pool
CN111106930B (en) Block chain network construction method and device and block chain network system
Bakre et al. Implementing decentralized digital identity using blockchain
CN112966022B (en) Information query method, device and system of data transaction platform
CN116432207B (en) Power data authority hierarchical management method based on blockchain
Zhang et al. A novel E-payment protocol implented by blockchain and quantum signature
CN101155031A (en) Device and control method for central authorization control in P2P file transfer
Zhang et al. Cerberus: Privacy-preserving computation in edge computing
CN111082930A (en) User encryption method based on quantum encryption
Li et al. Blind quantum signature with controlled four-particle cluster states
van der Horst et al. Mobile trust negotiation: Authentication and authorization in dynamic mobile networks
Noh et al. A Novel User Collusion‐Resistant Decentralized Multi‐Authority Attribute‐Based Encryption Scheme Using the Deposit on a Blockchain
US11893577B2 (en) Cryptographic key storage system and method
AlQallaf Blockchain-based digital identity management scheme for field connected IoT devices
CN110880969B (en) Method and system for generating QKD network authentication key based on alliance chain and implicit certificate
Panduro-Ramirez et al. Blockchain approach for implementing access control in IOT
KR20230127696A (en) A decentralized data sharing system and Collusion-Resistant Multi-Authority Attribute-Based Encryption Scheme based on a Blockchain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080402