CN101427234A - 对等联系人交换 - Google Patents
对等联系人交换 Download PDFInfo
- Publication number
- CN101427234A CN101427234A CNA2007800142617A CN200780014261A CN101427234A CN 101427234 A CN101427234 A CN 101427234A CN A2007800142617 A CNA2007800142617 A CN A2007800142617A CN 200780014261 A CN200780014261 A CN 200780014261A CN 101427234 A CN101427234 A CN 101427234A
- Authority
- CN
- China
- Prior art keywords
- pki
- unique identifier
- message
- encryption unique
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
一系统可在公众可用的索引存储器中发布经认证的联系人信息、检索联系人信息并确认它。所要求保护的方法和系统可提供基于客户机的、服务器可任选的方法来进行发布。公众可用的索引存储可以是在对等网络中使用的分布式散列表。系统可在其中服务器不可用或者其中服务器信任最小的其它安全目录服务应用程序中使用。
Description
背景
目录服务通常使用网络服务器来提供。为了使用目录服务,要求用户连接至服务器并具有用户帐号以便访问目录服务。另外,用户必须信任服务器提供数据完整性和数据认证。如果目录服务旨在用于较小的连接实体组,例如自组织网络,则创建并设立用于该自组织网络的目录服务器可能是低效率的。例如,自组织网络在本质上一般是瞬时的,并且由于管理员时间、装备资源容量(某一服务器必须被重新分配或添加)以及用户时间(帐号创建与设立可能牵涉到用户),为短持续时间和少量用户设立专用服务器的成本太过高昂。而且,尽管基于服务器的系统是常见的,但新的无服务器的系统诸如对等网络可在创建自组织网络方面提供更多的灵活性,因为它们不要求专用的服务器来促进通信。然而,为了使用现有的加密过程来允许在这些自组织网络上的安全通信,可能需要目录服务来促进不依赖于基于服务器的模型的公钥交换。
概述
一系统在公众可用的索引存储中发布经认证的联系信息。该系统还可提供检索联系人信息并验证它的方法。所要求保护的方法和系统可以是基于客户机的,而服务器是可任选的。公众可用的索引存储可以是在对等网络中使用的分布式散列表。该系统可在其它其中服务器不可用或者其中服务器信任最小的安全目录服务应用程序中使用。
在一个实施例中,系统可用作一般的消息发布系统。在另一实施例中,系统可用于提供选择性发布,在其中被投送的记录仅可由预期的接收者来检索和阅读。
附图
图1例示可按照权利要求操作的计算系统的框图;
图2例示一般的对等网络;
图3例示一般的目录服务器和服务;
图4例示分布式散列表;
图5例示在权利要求的实施例中使用的记录;
图6例示发布过程实施例;
图7例示检索过程实施例;
图8例示包含持续时间参数的修改记录;
图9例示使用持续时间参数的另一个确认过程;
图10例示用于选择性发布的修改记录;
图11例示用于选择性发布的发布过程实施例;以及
图12例示用于选择性发布的检索过程实施例。
描述
尽管下面的文本阐述众多不同实施例的详细描述,但应当理解,该描述的法律范围是由本专利所附的权利要求书的语言定义的。详细描述应当仅解释为是示例性的,并不描述每一可能的实施例,因为描述每一可能的实施例即使不是不可能也是不实际的。众多的替换实施例可使用当前技术或者使用在本专利的申请日之后开发的技术来实现,但仍然落在本发明的范围之内。
还应当理解,除非在本专利中使用“如在本文所使用的,术语‘________’这里定义为表示...”语句或相似语句来明确定义一个术语,否则不旨在其普通或平常的意义之外明确或隐含地限制该术语的意义,并且这样的术语不应解释为限于基于在本专利的任何部分(除了权利要求书的语言之外)中所作的任何陈述的范围。对于在本专利所附权利要求书中所述的任何术语在本专利中以与单数意义一致的方式来引用,这仅是为了清楚而不混淆读者,并且不是要隐含或者以其它方式来将该权利要求术语限制于该单数意义。最后,除非一个权利要求元素是通过陈述词语“装置(means)”和功能而非陈述任何结构来定义,任何权利要求元素的范围不应基于对35U.S.C.§112第六段的应用来解释。
图1例示合适计算系统环境100的一个示例,在其上可实现所要求保护的方法和装置的各块的系统。计算系统环境100只是合适计算环境的一个示例并且不旨在对权利要求的方法和装置的使用范围或功能性提出任何限制。也不应当将计算环境100解释为对在示例性操作环境100中例示的任一组件或组件组合有任何依赖性或需求。
要求保护的方法和装置的各块可与众多其它通用或专用计算系统环境或配置一起使用。适于与本发明的方法或装置一起使用的公知的计算系统、环境和/或配置包括但不限于,个人计算机、服务器计算机、手持式或膝上型设备、多处理器系统、基于微处理器的系统、机顶盒、可编程消费电子产品、网络PC、小型计算机、大型计算机、包含任何上述系统或设备的分布式计算环境等等。
要求保护的方法和装置的各块可在诸如程序模块等由计算机执行的计算机可执行指令的一般上下文中描述。一般而言,程序模块包括例程、程序、对象、组件、数据结构等,它们执行特定的任务或者实现特定的抽象数据类型。这些方法和装置还可在分布式计算环境中实践,其中任务由通过通信网络链接的远程处理设备来执行。在分布式计算环境中,程序模块可位于包含存储器存储设备在内的本地和远程两者的计算机存储介质中。
参考图1,用于实现要求保护的方法和装置的各块的示例性系统包括计算机110形式的通用计算设备。计算机110的组件包括但不限于,处理单元120、系统存储器130和系统总线121,后者将包括系统存储器在内的各种系统组件耦合至处理单元120。系统总线121可以是任意若干类型的总线结构,其中包括存储器总线或存储器控制器、外围总线和使用任何各种总线体系结构的局部总线。作为示例而非限制,这样的体系结构包括工业标准体系结构(ISA)总线、微通道体系结构(MCA)总线、增强型ISA(EISA)总线、视频电子标准协会(VESA)局部总线以及还被称为夹层总线的外围组件互连(PCI)总线。
计算机110一般包括各种计算机可读介质。计算机可读介质是可由计算机110访问的任何可用介质并且包括易失性与非易失性、可移动与不可移动介质。作为示例而非限制,计算机可读介质可包括计算机存储介质和通信介质。计算机存储介质包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性与非易失性、可移动与不可移动介质。计算机存储介质包括但不限于,RAM、ROM、EEPROM、闪存或其它存储器技术,CD-ROM、数字多功能盘(DVD)或其它光盘存储,磁带盒、磁带、磁盘存储或其它磁存储设备,或者任何可用于存储所需信息并可由计算机110访问的任何其它介质。通信介质一般体现为在诸如载波或其它传输机制中的经调制数据信号中的计算机可读指令、数据结构、程序模块或其它数据并且包括任何信息传递介质。术语“经调制的数据信号”指具有以将信息编码到信号中的方式设置或改变的一或多个特性的信号。作为示例而非限制,通信介质包括线接介质如线接网络或直接线连接以及无线介质如声音、RF、红外和其它无线介质。上述的任何组合也应当包括在计算机可读介质的范围内。
系统存储器130包括易失性和/或非易失性存储器形式的计算机存储介质,诸如只读存储器(ROM)131和随机存取存储器(RAM)132。基本输入/输出系统133(BIOS)包含诸如启动时帮助在计算机110内的元件之间传送信息的基本例程,通常存储在ROM 131中。RAM 132一般包含可由处理单元120立即访问和/或正在操作的数据和/或程序模块。作为示例而非限制,图1例示操作系统134、应用程序135、其它程序模块136和程序数据137。
计算机110还可包括其它可移动/不可移动、易失性/非易失性计算机存储介质。仅作为示例,图1例示读写不可移动、非易失性磁介质的硬盘驱动器140,读写可移动、非易失性磁盘152的磁盘驱动器151以及读写可移动、非易失性光盘156诸如CD ROM或其它光介质的光盘驱动器155。可在示例性操作环境中使用的其它可移动/不可移动、易失性/非易失性计算机存储介质包括但不限于,磁带盒、闪存卡、数字多功能盘、数字录像带、固态RAM、固态ROM等等。硬盘驱动器141一般通过不可移动存储器接口诸如接口140连接至系统总线121,而磁盘驱动器151和光盘驱动器155一般通过可移动存储器接口诸如接口150连接至系统总线121。
上面讨论并在图1中例示的这些驱动器及其相关联的计算机存储介质为计算机110提供计算机可读指令、数据结构、程序模块和其它数据的存储。在图1中,例如,硬盘驱动器141例示为存储操作系统144、应用程序145、其它程序模块146和程序数据147。注意,这些组件可以与操作系统134、应用程序135、其它程序模块136和程序数据137相同或者不同。操作系统144、应用程序145、其它程序模块146和程序数据147在这里给出不同的标号以说明至少它们是不同的副本。用户可通过输入设备诸如键盘162和定点设备161(通常指鼠标、轨迹球或触摸板)将命令和信息输入到计算机20中。其它输入设备(未示出)可包括话筒、操纵杆、游戏手柄、圆盘式卫星天线、扫描仪等等。这些和其它输入设备通常通过耦合至系统总线的用户输入接口160连接到处理单元120,但可通过其它接口和总线结构诸如并行端口、游戏端口或通用串行总线(USB)来连接。监视器191或其它类型的显示设备也通过诸如视频接口190的接口连接到系统总线121。除了监视器之外,计算机还可包括其它外围输出设备诸如扬声器197和打印机196,它们可通过输出外围接口190来连接。
计算机110可在使用至一或多个远程计算机如远程计算机180的逻辑连接的网络化环境中运行。远程计算机180可以是个人计算机、服务器、路由器、网络PC、对等设备或其它普通网络节点,并且一般包括上面相对于计算机110所述的许多或全部元素,尽管在图1中仅示出一个存储器存储设备181。图1所示的逻辑连接包括局域网(LAN)171和广域网(WAN)173,但还可包括其它网络。这类联网环境在办公室、企业级计算机网络、内联网和因特网中是很常见的。
当在LAN联网环境中使用时,计算机110通过网络接口或适配器170连接到LAN 171。当在WAN联网环境中使用时,计算机110通常包括调制解调器172或用于在诸如因特网等WAN 173上建立通信的其它装置。调制解调器172可以是内置或外置的,它可以通过用户输入接口160或其它合适的机制连接至系统总线121。在网络化环境中,相对于计算机110描述的程序模块或其部分可以存储在远程存储器存储设备中。作为示例而非限制,图1将远程应用程序185例示为驻留在存储器设备181上。应了解到,例示的网络连接是示例性的并且可使用在计算机之间建立通信链接的其它手段。
对等(P2P)系统使用以分散方式例如在没有中央服务器的帮助下相互通信的节点的网络。对等网络中的每一节点(例如应用程序或设备)可通过直接连接与网络上的另一节点通信,或者每一节点可使用一或多个中间节点间接地通信以将通信中继至预期的节点。
图2例示P2P系统200的高级示图。系统200包括对等实体(202-212)的集合。对等实体(202-212)可以是通过网络或网络组合耦合在一起的个人计算机设备。图2例示了其中每一对等实体(202-212)连接至所有其它对等实体(202-212)的示例。在其它情形中,一或多个对等实体(202-212)可以通过一或多个中间参与者(202-212)连接至其它对等实体(202-212)。然而,为了在对等网络上提供安全通信,首先需要建立对等节点之间的安全连接。
连接安全可基于如本领域所公知的对称密钥加密过程。然而,为了实现该加密安全,对等实体需要首先交换允许在最初建立安全连接的证书和/或公钥。在一些现有系统中,诸如在图3中所示的,该交换可使用中央目录服务器300来促进,其中用户301、302、303可将它们的证书304、305、306和/或公钥投送到目录服务器300上。目录服务307可以是包含按用作密钥309的用户名或者其它标识符来索引的证书和/或公钥的记录308的数据库表。能够连接到目录服务器300并被允许访问目录服务307的用户可使用目标用户的标识符来查找目标用户,并且获得目标用户对应的公钥。该方法要求到服务器300的连通性、与目录服务器300的显式注册并且信任目录服务器300。而且,某方必须负担主宿的成本,诸如服务器。当用户303正从远程位置连接时,另外还需要因特网连通性310。服务器注册过程涉及用于在目录服务器300中提升信任的用户帐户。例如,如果任何用户可访问服务器300,则可认为服务器300更容易受到损害,特别是在投送和交换诸如公钥的安全信息的时候。此外,因为自组织的临时网络的瞬时性质以及设立目录服务器的难度,为自组织的临时网络创建目录服务器是不切实际的。用于自组织非对等网络的可能工作区可以是通过电子邮件或通过网络外的过程来交换公钥,诸如向目标成员物理地发送或者邮寄包含证书/公钥的磁盘。这可允许对等实体建立服务器无关的安全链接。然而,这很麻烦且容易出错。
所要求保护的服务器无关索引过程的实施例可使用无服务器索引存储,诸如图4所示的分布式散列表(DHT)400。该分布式散列表400可在一组形成对等网络405的对等实体401-404上维护。分布式散列表中的条目可例如使用散列函数在逻辑上划分或归组。散列函数可用某种有组织的方式来将记录聚集在一起,从而使检索更有效率。DHT具有两个基本属性:1)表(例如表400)跨多个节点(例如节点401-404)的分布;以及2)提供用于发布和检索记录的路由机制(未示出)。路由机制和分布可由诸如Chord、PNRP、Pastry、Tapestry等覆盖协议管理。尽管DHT可用于提供按照权利要求的实施例的索引存储,但要强调的是,可使用可由一组对等实体容易地访问的任何索引存储,包括基于服务器的索引。在基于服务器的索引的情形中,所要求保护的系统可单独减少服务器所要求的信任的等级,因为所要求保护的系统可为不安全的索引存储提供必需的安全等级。
所要求保护的服务器无关索引过程的实施例可使用如图5所示的特定记录格式。图5例示,发布者可将包含联系人信息501、发布者的公钥502和使用发布者的私钥的联系人信息的签名503的记录500投送至索引存储。或者,签名可以是联系人信息和公钥的组合。该记录可由记录密钥504来索引。在一个实施例中,记录的密钥504可以是加密的唯一标识符(CUI)。CUI具有两个基本属性。第一,CUI在统计上是唯一的,以及第二,CUI可对应于特定的用户公钥,诸如发布者公钥502。与普通的数据库索引方案相似,记录密钥需要是唯一的,以防止重复的实体条目。因此,CUI可以是按照其对于特定的情形或应用程序为唯一的可能性很大的方式而得到的。例如,在只有少量成员的对等者组中,如果加密唯一标识符可从相同的成员公钥得到的可能性对于组大小而言是不太可能的,则CUI在统计上是唯一的。
CUI可使用诸如散列或加密算法的算法从公钥得到。可使用该算法验证CUI对应或者匹配其公钥。在一个实施例中,CUI可用于以较短且用户可管理的形式,诸如在题为“Callsigns”美国专利第10/882079号中描述的P2P系统中使用的对等者名称来表示较长的用户标识符诸如公钥。
图5的记录可用于将联系人信息发布至索引存储,诸如图4的DHT 400。CUI密钥504可用于定位每一记录500并且检索联系人信息501和公钥502。在该实施例中,所发布的信息可以是公开的,即所发布的信息可以不加密,除签名之外。然而,下面描述的其它实施例可加密所发布信息的各部分。而且,尽管该实施例例示使用记录500来促进公钥502的交换,但要强调的是,该系统可在任何其中可使用唯一消息发布的应用程序中使用。例如,代替联系人信息501,可针对用户CUI 504投送任何消息。
图6例示按照权利要求的实施例的一般发布过程。使用诸如散列函数的算法,可为给定用户的公钥生成CUI 601。重要的是注意,无论使用什么算法,都可验证CUI是否对应于用于生成它的公钥。可构造联系人信息或者其它消息数据以及发布者的公钥的记录602,并且联系人信息和/或发布者的公钥可由发布者的私钥(它对应于公钥)来签署603。包括联系人信息、公钥和签名的记录可插入到公众可用的索引中604。记录可由对应于发布者公钥的CUI来索引。
图7例示按照权利要求的实施例的检索过程。希望与第二对等者连接的用户可获得第二对等者的CUI 701。可在带外通过电子邮件或者网络外过程来获得CUI(例如,传统邮件、语音通信、名片等)。CUI随后可用于在索引存储中查找映射到该CUI的记录702。如上所述,记录可包括密钥、一些消息信息(联系人信息)和签名。
用户随后可基于CUI来查询索引存储以检索记录703。一旦检索到CUI,即可使用包含在记录内的公钥来验证CUI以确保它们彼此对应704。该过程框可用于验证记录对应于CUI。可用许多方法来使CUI在统计上对于公钥是唯一的。在一个实施例中,对等通信系统可预建立通用映射过程,例如使用公认的散列函数。该初始的验证过程帮助确保记录确实对应于给定的CUI。
如果CUI正确地映射,则记录的签名随后可用于确定该签名是否由发布者的对应私钥签名705。这可通过提供消息源自发布者的证据来认证消息,因为可以假设发布者拥有对应于用于该加密的公钥的私钥。
如果记录/消息被正确地签名,则随后可对记录的联系人信息执行消息格式和/或句法检查706。这可用于,例如确保消息没有被删改过以匹配签名。尽管提供被删改的消息以匹配加密的签名在统计上是困难的,但并非不可能。然而,删改会导致不符合预期或期望格式的消息。因而,首先检查消息以确定消息格式是否符合期望格式。例如,在传输联系人信息时,联系人信息可要求十个字符的格式。如果记录格式不提供这十个字符的格式,则消息可能已经被某人或某物篡改了711。
或者或者另外,可检查消息的语义。例如,联系人信息可限制为选项列表以及这些选项之间的特定关系。因此,如果格式要求两个条目,第一条目与第二个条目相关(语义)并且它们不匹配该期望格式,则消息可能已经被某人或某物篡改了711。
如果验证过程704、705、706均已经成功完成,则记录是真实的并且随后被使用707,例如,公钥可用于建立通信链接。如果验证步骤704、705、706中的任一个失败,则消息可能已经某人或某物被篡改711。在公钥交换系统的情形中,可拒绝连接。
在图8所示的另一实施例中,持续时间参数801可被包括在记录800中。该持续时间参数801可对应于在所述的认证过程中使用的加密等级。例如,加密等级可对应于用于生成在所要求保护的系统中使用的公/私钥对的加密强度。如果加密强度高,则持续时间长,反之亦然。持续时间参数801可指示记录有效性的持续时间。因而,持续时间参数801可在图9所示的检索过程中使用。图9例示图7的相同过程,添加了框909,在其中检查由持续时间参数801指示的持续时间901以确定持续时间是否已经期满。如果持续时间参数801期满,则记录可能被损坏911。否则记录是有效的907。
图10-12例示另一个实施例,其中可使用选择性发布来允许第一用户发布仅有作为目标的第二用户才能检索的数据。在该选择性发布实施例中,可使用如图10所示的记录1001。记录1001可包括由两个CUI 1003、1004的组合形成的密钥1002。第一CUI 1003可与第一用户相关联,而第二CUI 1004可与第二用户相关联。可通过简单地将第二CUI追加到第一CUI来形成该组合。该记录可包括消息部分1005和持续时间参数1006。消息1005可包含关于发布者的联系人信息、发布者公钥和签名的数据。
图11例示使用图10的记录1001的选择性发布过程。发布者可从公钥得到其CUI 1101,获得所选接收者的CUI 1102,构造消息1103,使用发布者的私钥签署该消息1104并基于CUI组合密钥1101将该消息插入到索引中1105。另外,消息可使用预期接收者的公钥来加密1106。
图12例示与图7相似的添加了框1201、1202、1203的选择性发布过程的检索过程。希望检索所发布的记录的接收者首先获得发布者的CUI 1201,然后根据组合的CUI密钥在索引存储查找记录1202。在又一个增强的实施例中,消息可使用接收者的公钥来加密。因而,只有接收者可解密预期的数据。在接收者使用CUI组合密钥检索消息1202之后,接收者可使用其私钥来首先解密记录1203,之后验证过程和确认按照图7进行。在该选择性发布实施例中,接收者的公钥(用于加密记录)可根据接收者CUI来确定,发布者用它来创建组合密钥。
在上述实施例的另一个增强方案中,密钥可以是组公钥,它由对等者组拥有。在该实施例中,组的任何成员可按照组公钥查找记录并且执行认证过程。用户组有权访问记录并且可明确地作为所投送消息的接收目标。
应当强调的是,尽管上述特定实施例可与公钥交换目录相关联,但联系人信息可表示其它数据。例如,代替联系人信息,记录可以是普通消息投送。因而,所要求保护的系统可用作任何公众可用的索引存储上的一般发布系统。所要求保护的系统还可用于提供除公钥查找以外的目录服务。所要求保护的系统允许现有的分布式索引存储诸如分布式散列表用作安全的目录服务工作而不依赖于服务器。
另外,所要求保护的系统可在现有的基于服务器的目录上使用,在其中服务器安全最小化,从而需要由所要求保护的系统提供的认证过程。在自组织系统诸如对等者组和对等网络中,公钥发布和检索的无服务器过程可通过减少作为主机的专用服务器提供目录服务的需求来使得这样的网络的创建更有效率。所要求保护的方法和系统还可最小化用户的牵连,因为公/私钥加密过程可消除用户明确地向服务器注册的需求。
Claims (20)
1.一种使用公众可用的索引存储用于安全发布系统的方法,所述方法包括:
提供在统计上对于公钥是唯一的加密唯一标识符;
用发布者私钥签署消息,其中所述消息包括所述发布者公钥;
将所述消息插入公众可用的索引存储,其中所述消息由所述加密唯一标识符索引;
基于所述加密唯一标识符检索所述条目;
确定所述加密唯一标识符是否与所述公钥有关;以及
确定所述消息是否由对应于所述公钥的私钥签署。
2.如权利要求1所述的方法,其特征在于,还包括确定所述消息是否具有期望的格式和句法。
3.如权利要求1所述的方法,其特征在于,所述索引存储是分布式散列表和目录服务器之一。
4.如权利要求1所述的方法,其特征在于,所述加密唯一标识符是使用散列函数从所述用户公钥得到的。
5.如权利要求1所述的方法,其特征在于,还包括在确定所述加密唯一标识符与所述公钥有关、所述消息由对应于所述公钥的私钥签署以及所述消息具有期望的格式和句法时,允许计算机执行所述检索以使用所述公钥。
6.如权利要求1所述的方法,其特征在于,所述消息还包括与加密强度成比例的持续时间参数。
7.如权利要求6所述的方法,其特征在于,还包括在确定由所述持续时间参数指示的持续时间尚未期满、所述加密唯一标识符与所述公钥有关、所述消息由对应于所述公钥的私钥签署以及所述消息具有期望的格式和句法时,允许计算机执行所述检索以使用所述公钥。
8.如权利要求1所述的方法,其特征在于,所述加密唯一标识符包括组公钥。
9.如权利要求1所述的方法,其特征在于,所述加密唯一标识符是至少根据第一用户加密唯一标识符和第二用户加密唯一标识符形成的。
10.一计算机系统包括:
形成对等网络的多个对等节点;
所述对等网络的分布式散列表;
第一对等节点,创建在统计上对于所述第一对等节点的公钥唯一的加密唯一标识符,以及将包含所述公钥并且由对应于所述公钥的私钥签署的消息插入到由所述加密唯一标识符索引的所述分布式散列表中;
第二节点,基于所述加密唯一标识符检索所述消息、确定所述加密唯一标识符是否与所述公钥有关、确定所述消息是否由对应于所述公钥的所述私钥签署以及确定所述消息是否具有期望的格式和句法来检索所述消息。
11.如权利要求10所述的系统,其特征在于,在确定所述加密唯一标识符与所述公钥有关、所述签名由对应于所述公钥的所述私钥签署以及所述消息具有期望的格式和句法时,所述第二节点使用所述公钥与所述第一节点通信。
12.如权利要求10所述的系统,其特征在于,所述加密唯一标识符包括关联于所述第一节点的第一加密唯一标识符与关联于所述第二节点的第二加密唯一标识符的组合。
13.如权利要求12所述的系统,其特征在于,所述消息是使用所述第二节点的公钥加密的。
14.如权利要求10所述的系统,其特征在于,所述消息包括持续时间参数,其中所述持续时间参数与用于生成所述公钥和对应于所述公钥的所述私钥的加密算法的强度成比例。
15.如权利要求14所述的系统,其特征在于,在由所述持续时间参数指示的持续时间尚未期满、所述加密唯一标识符与所述公钥有关、所述消息由对应于所述公钥的所述私钥签署以及所述消息具有期望的格式和句法时,所述第二节点接受所述消息。
16.一种具有用于执行下列操作的计算机可执行指令的计算机可读介质,所述操作包括:
从公钥得到加密唯一标识符;
基于所述加密唯一标识符在索引存储中检索条目,其中所述条目包含消息和公钥,它们一起由对应于所述公钥的私钥签署;
确定所述加密唯一标识符是否与所述公钥有关;以及
确定所述消息和公钥是否由所述私钥签署。
17.如权利要求16所述的计算机可读介质,其特征在于,还包括确定所述消息是否具有期望的格式和句法。
18.如权利要求16所述的计算机可读介质,其特征在于,还包括确定所述消息的持续时间参数是否已经期满。
19.如权利要求18所述的计算机可读介质,其特征在于,所述持续时间参数指示的持续时间与用于生成所述公钥和私钥的加密等级成比例。
20.如权利要求16所述的计算机可读介质,其特征在于,所述加密唯一标识符是通过组合第一加密唯一标识符与第二加密唯一标识符来形成的,以及其中,所述消息是使用关联于所述第二加密唯一标识符的计算机的公钥来加密的。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/408,894 US8086842B2 (en) | 2006-04-21 | 2006-04-21 | Peer-to-peer contact exchange |
US11/408,894 | 2006-04-21 | ||
PCT/US2007/010092 WO2007124180A2 (en) | 2006-04-21 | 2007-04-23 | Peer-to-peer contact exchange |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101427234A true CN101427234A (zh) | 2009-05-06 |
CN101427234B CN101427234B (zh) | 2011-02-23 |
Family
ID=38620832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007800142617A Active CN101427234B (zh) | 2006-04-21 | 2007-04-23 | 用于对等联系人交换的方法和系统 |
Country Status (12)
Country | Link |
---|---|
US (1) | US8086842B2 (zh) |
EP (1) | EP2089808A2 (zh) |
JP (1) | JP2009534940A (zh) |
KR (1) | KR20090015026A (zh) |
CN (1) | CN101427234B (zh) |
AU (1) | AU2007240567B2 (zh) |
BR (1) | BRPI0710015A2 (zh) |
CA (1) | CA2646331A1 (zh) |
MX (1) | MX2008013133A (zh) |
NO (1) | NO20084035L (zh) |
RU (1) | RU2444054C2 (zh) |
WO (1) | WO2007124180A2 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145642A (zh) * | 2018-08-13 | 2019-01-04 | 晋商博创(北京)科技有限公司 | 基于cpk数字印章的数据存储方法、终端及数据库 |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
GB2446199A (en) * | 2006-12-01 | 2008-08-06 | David Irvine | Secure, decentralised and anonymous peer-to-peer network |
US9411976B2 (en) * | 2006-12-01 | 2016-08-09 | Maidsafe Foundation | Communication system and method |
GB2446169A (en) * | 2006-12-01 | 2008-08-06 | David Irvine | Granular accessibility to data in a distributed and/or corporate network |
US9319518B2 (en) * | 2006-12-22 | 2016-04-19 | Bce Inc. | Method and system for configuring information regarding processing of calls involving a party |
US9497028B1 (en) | 2007-05-03 | 2016-11-15 | Google Inc. | System and method for remote storage auditing |
US9838365B2 (en) * | 2007-07-10 | 2017-12-05 | Qualcomm Incorporated | Peer to peer identifiers |
US8775817B2 (en) * | 2008-05-12 | 2014-07-08 | Microsoft Corporation | Application-configurable distributed hash table framework |
US7921089B2 (en) * | 2008-07-24 | 2011-04-05 | Zscaler, Inc. | Feature based data management |
US9379895B2 (en) | 2008-07-24 | 2016-06-28 | Zscaler, Inc. | HTTP authentication and authorization management |
US8806201B2 (en) * | 2008-07-24 | 2014-08-12 | Zscaler, Inc. | HTTP authentication and authorization management |
US9800413B2 (en) * | 2008-08-15 | 2017-10-24 | Gm Global Technology Operations, Inc. | System and method for performing an asymmetric key exchange between a vehicle and a remote device |
CA2647921C (en) | 2008-12-24 | 2014-06-10 | Bce Inc. | Method and system for configuring a contact database associated with a user |
JP2010239257A (ja) * | 2009-03-30 | 2010-10-21 | Nec Corp | 暗号タグ管理システム、情報端末、タグ情報の隠蔽方法およびプログラム |
US8769285B2 (en) | 2009-08-13 | 2014-07-01 | Qualcomm Incorporated | Methods and apparatus for deriving, communicating and/or verifying ownership of expressions |
KR101631618B1 (ko) * | 2010-07-06 | 2016-06-27 | 삼성전자주식회사 | 가상 개인화 그룹 생성 방법 및 가상 개인화 그룹을 이용하는 통신 기기와 허브를 포함하는 네트워크 |
WO2013073115A1 (ja) * | 2011-11-16 | 2013-05-23 | パナソニック株式会社 | コンテンツ配信装置及びコンテンツ配信システム |
CN104704493B (zh) * | 2012-08-15 | 2019-06-07 | 维萨国际服务协会 | 可搜索的经加密的数据 |
WO2015139026A2 (en) | 2014-03-14 | 2015-09-17 | Go Tenna Inc. | System and method for digital communication between computing devices |
US9392057B2 (en) * | 2014-04-11 | 2016-07-12 | Qualcomm Incorporated | Selectively exchanging data between P2P-capable client devices via a server |
EP3186988A4 (en) * | 2014-08-28 | 2018-04-25 | Nokia Technologies OY | Method and apparatus for establishment of private communication between devices |
US9608907B2 (en) | 2014-09-29 | 2017-03-28 | Vivint, Inc. | Systems and methods for centrally-assisted distributed hash table |
WO2016050285A1 (en) | 2014-09-30 | 2016-04-07 | Telefonaktiebolaget L M Ericsson (Publ) | Technique for handling data in a data network |
FR3031211B1 (fr) * | 2014-12-31 | 2017-02-10 | Thales Sa | Infrastructure d'authentification de telephones ip d'un systeme toip proprietaire par un systeme eap-tls ouvert |
EP3259871B1 (en) * | 2015-02-20 | 2020-09-16 | Telefonaktiebolaget LM Ericsson (publ) | Method of providing a hash value for a piece of data, electronic device and computer program |
EP3259873B1 (en) | 2015-02-20 | 2018-12-12 | Telefonaktiebolaget LM Ericsson (publ) | Method of providing a hash value for a piece of data, electronic device and computer program |
WO2016162094A1 (en) | 2015-04-10 | 2016-10-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Verification paths of leaves of a tree |
US10205709B2 (en) | 2016-12-14 | 2019-02-12 | Visa International Service Association | Key pair infrastructure for secure messaging |
US11343245B2 (en) | 2017-06-14 | 2022-05-24 | Harman International Industries, Incorporated | Systems and methods for security of network connected devices |
KR102451524B1 (ko) * | 2018-01-31 | 2022-10-06 | 케이블텔레비젼래버러토리즈,인코포레이티드 | 디지털 원장을 이용한 프라이버시 관리를 위한 시스템들 및 방법들 |
WO2020051332A1 (en) * | 2018-09-06 | 2020-03-12 | Gracenote, Inc. | Methods and apparatus for efficient media indexing |
US11315150B2 (en) | 2019-05-08 | 2022-04-26 | Data Vault Holdings, Inc. | Portfolio driven targeted advertising network, system, and method |
CN111414630B (zh) * | 2020-03-05 | 2020-11-20 | 北京远盟普惠健康科技有限公司 | 一种精准体检的数据安全处理方法和处理系统 |
Family Cites Families (200)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5005200A (en) | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5563998A (en) | 1990-10-19 | 1996-10-08 | Moore Business Forms, Inc. | Forms automation system implementation |
EP0711480B1 (en) | 1993-07-27 | 1997-06-11 | International Business Machines Corporation | Method and system for authenticated secure key distribution in a communication system |
DE69312328T2 (de) | 1993-09-20 | 1998-01-08 | Ibm | System und verfahren zur änderung des schlüssels oder des kennwortes in einem kommunikationsnetzwerk mit schlüssel- verteilung |
US5689641A (en) | 1993-10-01 | 1997-11-18 | Vicor, Inc. | Multimedia collaboration system arrangement for routing compressed AV signal through a participant site without decompressing the AV signal |
US5371794A (en) | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5473691A (en) | 1993-11-05 | 1995-12-05 | Microsoft Corporation | System and method for computer data transmission |
US5787172A (en) | 1994-02-24 | 1998-07-28 | The Merdan Group, Inc. | Apparatus and method for establishing a cryptographic link between elements of a system |
US5511122A (en) | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication |
US5944794A (en) | 1994-09-30 | 1999-08-31 | Kabushiki Kaisha Toshiba | User identification data management scheme for networking computer systems using wide area network |
US5673319A (en) | 1995-02-06 | 1997-09-30 | International Business Machines Corporation | Block cipher mode of operation for secure, length-preserving encryption |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US5854898A (en) | 1995-02-24 | 1998-12-29 | Apple Computer, Inc. | System for automatically adding additional data stream to existing media connection between two end points upon exchange of notifying and confirmation messages therebetween |
US5784562A (en) | 1995-10-10 | 1998-07-21 | U S West Advanced Technologies, Inc. | System for using a dialog session context to process electronic forms data on the world wide web |
US6028938A (en) | 1996-04-30 | 2000-02-22 | Shana Corporation | Secure electronic forms permitting layout revision |
US5917480A (en) | 1996-06-04 | 1999-06-29 | Microsoft Corporation | Method and system for interacting with the content of a slide presentation |
JPH09326807A (ja) | 1996-06-06 | 1997-12-16 | Nec Corp | 共有セルメモリ型atm交換制御方法及び共有セルメモリ型atm交換スイッチ |
GB2318486B (en) | 1996-10-16 | 2001-03-28 | Ibm | Data communications system |
US6600823B1 (en) | 1996-10-22 | 2003-07-29 | Unisys Corporation | Apparatus and method for enhancing check security |
JPH10133576A (ja) | 1996-10-31 | 1998-05-22 | Hitachi Ltd | 公開鍵暗号方法および装置 |
US6367012B1 (en) | 1996-12-06 | 2002-04-02 | Microsoft Corporation | Embedding certifications in executable files for network transmission |
US5892904A (en) | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US6632248B1 (en) | 1996-12-06 | 2003-10-14 | Microsoft Corporation | Customization of network documents by accessing customization information on a server computer using uniquie user identifiers |
US5848244A (en) * | 1996-12-20 | 1998-12-08 | Mci Communications Corporation | System and method for time-based real-time reconfiguration of a network |
US6154541A (en) | 1997-01-14 | 2000-11-28 | Zhang; Jinglong F | Method and apparatus for a robust high-speed cryptosystem |
US6108673A (en) | 1997-02-25 | 2000-08-22 | International Business Machines Corporation | System for creating a form from a template that includes replication block |
US6078700A (en) * | 1997-03-13 | 2000-06-20 | Sarachik; Karen B. | Method and apparatus for location and inspecting a two-dimensional image including co-linear features |
US5903721A (en) | 1997-03-13 | 1999-05-11 | cha|Technologies Services, Inc. | Method and system for secure online transaction processing |
BR9714592A (pt) | 1997-03-21 | 2005-04-12 | Canal & Sa Empresa De Telecomu | Processo de baixa de dados para um conjunto receptor/decodificador mpeg e um sistema de transmissão mpeg para implementação do mesmo |
US5746691A (en) | 1997-06-06 | 1998-05-05 | Global Therapeutics, Inc. | Method for polishing surgical stents |
US5987376A (en) | 1997-07-16 | 1999-11-16 | Microsoft Corporation | System and method for the distribution and synchronization of data and state information between clients in a distributed processing system |
US6279110B1 (en) | 1997-11-10 | 2001-08-21 | Certicom Corporation | Masked digital signatures |
US6148405A (en) | 1997-11-10 | 2000-11-14 | Phone.Com, Inc. | Method and system for secure lightweight transactions in wireless data networks |
US6163809A (en) | 1997-12-08 | 2000-12-19 | Microsoft Corporation | System and method for preserving delivery status notification when moving from a native network to a foreign network |
US6237035B1 (en) | 1997-12-18 | 2001-05-22 | International Business Machines Corporation | System and method for preventing duplicate transactions in an internet browser/internet server environment |
US6229806B1 (en) | 1997-12-30 | 2001-05-08 | Motorola, Inc. | Authentication in a packet data system |
US6807632B1 (en) * | 1999-01-21 | 2004-10-19 | Emc Corporation | Content addressable information encapsulation, representation, and transfer |
US6078948A (en) | 1998-02-03 | 2000-06-20 | Syracuse University | Platform-independent collaboration backbone and framework for forming virtual communities having virtual rooms with collaborative sessions |
US6088805A (en) | 1998-02-13 | 2000-07-11 | International Business Machines Corporation | Systems, methods and computer program products for authenticating client requests with client certificate information |
US6216110B1 (en) | 1998-02-27 | 2001-04-10 | Microsoft Corporation | System and method for publishing calendar information to a publicly accessible location |
US6108687A (en) | 1998-03-02 | 2000-08-22 | Hewlett Packard Company | System and method for providing a synchronized display to a plurality of computers over a global computer network |
US6308266B1 (en) | 1998-03-04 | 2001-10-23 | Microsoft Corporation | System and method for enabling different grades of cryptography strength in a product |
US6055236A (en) | 1998-03-05 | 2000-04-25 | 3Com Corporation | Method and system for locating network services with distributed network address translation |
US7032242B1 (en) | 1998-03-05 | 2006-04-18 | 3Com Corporation | Method and system for distributed network address translation with network security features |
US6529932B1 (en) | 1998-04-01 | 2003-03-04 | Microsoft Corporation | Method and system for distributed transaction processing with asynchronous message delivery |
US6101499A (en) | 1998-04-08 | 2000-08-08 | Microsoft Corporation | Method and computer program product for automatically generating an internet protocol (IP) address |
US6128738A (en) | 1998-04-22 | 2000-10-03 | International Business Machines Corporation | Certificate based security in SNA data flows |
US6175833B1 (en) | 1998-04-22 | 2001-01-16 | Microsoft Corporation | System and method for interactive live online voting with tallies for updating voting results |
US6247029B1 (en) | 1998-05-01 | 2001-06-12 | International Business Machines Corporation | Web browser form enhancements |
US6269099B1 (en) | 1998-07-01 | 2001-07-31 | 3Com Corporation | Protocol and method for peer network device discovery |
US6615348B1 (en) | 1999-04-16 | 2003-09-02 | Intel Corporation | Method and apparatus for an adapted digital signature |
US6155840A (en) | 1998-09-18 | 2000-12-05 | At Home Corporation | System and method for distributed learning |
US6636899B1 (en) | 1998-09-24 | 2003-10-21 | Xerox Corporation | Architecture for software for remote maintenance of a machine such as a copier |
US6327652B1 (en) | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system |
US6363352B1 (en) | 1998-11-13 | 2002-03-26 | Microsoft Corporation | Automatic scheduling and formation of a virtual meeting over a computer network |
US6233606B1 (en) | 1998-12-01 | 2001-05-15 | Microsoft Corporation | Automatic cache synchronization |
US6367009B1 (en) | 1998-12-17 | 2002-04-02 | International Business Machines Corporation | Extending SSL to a multi-tier environment using delegation of authentication and authority |
US6578143B1 (en) | 1998-12-18 | 2003-06-10 | Qualcomm Incorporated | Method for negotiating weakened keys in encryption systems |
US6453357B1 (en) | 1999-01-07 | 2002-09-17 | Cisco Technology, Inc. | Method and system for processing fragments and their out-of-order delivery during address translation |
US20010013050A1 (en) | 1999-01-11 | 2001-08-09 | Shah Niraj A. | Buddy list aggregation |
US6615357B1 (en) | 1999-01-29 | 2003-09-02 | International Business Machines Corporation | System and method for network address translation integration with IP security |
US6526506B1 (en) | 1999-02-25 | 2003-02-25 | Telxon Corporation | Multi-level encryption access point for wireless network |
US6636888B1 (en) | 1999-06-15 | 2003-10-21 | Microsoft Corporation | Scheduling presentation broadcasts in an integrated network environment |
US6957346B1 (en) | 1999-06-15 | 2005-10-18 | Ssh Communications Security Ltd. | Method and arrangement for providing security through network address translations using tunneling and compensations |
US6397303B1 (en) | 1999-06-24 | 2002-05-28 | International Business Machines Corporation | Data processing system, cache, and method of cache management including an O state for memory-consistent cache lines |
US6405290B1 (en) | 1999-06-24 | 2002-06-11 | International Business Machines Corporation | Multiprocessor system bus protocol for O state memory-consistent data |
US6088700A (en) | 1999-08-06 | 2000-07-11 | Larsen; Kenneth N. | Automated forms completion for global information network applications |
US6675205B2 (en) | 1999-10-14 | 2004-01-06 | Arcessa, Inc. | Peer-to-peer automated anonymous asynchronous file sharing |
US20010010720A1 (en) | 1999-11-12 | 2001-08-02 | Kimball Bridget D. | Multiple signature authentication in conditional access systems |
US6526411B1 (en) | 1999-11-15 | 2003-02-25 | Sean Ward | System and method for creating dynamic playlists |
US6671804B1 (en) * | 1999-12-01 | 2003-12-30 | Bbnt Solutions Llc | Method and apparatus for supporting authorities in a public key infrastructure |
US6421673B1 (en) | 1999-12-13 | 2002-07-16 | Novient, Inc. | Method for mapping applications and or attributes in a distributed network environment |
GB2357407A (en) * | 1999-12-17 | 2001-06-20 | Int Computers Ltd | Cryptographic key replacement using key lifetimes |
US6598083B1 (en) | 1999-12-30 | 2003-07-22 | Intel Corporation | System and method for communicating over a non-continuous connection with a device on a network |
JP2001209304A (ja) | 2000-01-24 | 2001-08-03 | Nec Corp | 暗号評価支援システム及びプログラムを記録した機械読み取り可能な記録媒体 |
US20010035976A1 (en) | 2000-02-15 | 2001-11-01 | Andrew Poon | Method and system for online presentations of writings and line drawings |
US6745178B1 (en) | 2000-04-28 | 2004-06-01 | International Business Machines Corporation | Internet based method for facilitating networking among persons with similar interests and for facilitating collaborative searching for information |
GB2365671A (en) | 2000-05-17 | 2002-02-20 | Ibm | Teleconferencing system and method |
US20040034794A1 (en) | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
EP1292872B2 (en) | 2000-06-09 | 2018-12-19 | Certicom Corp. | A method for the application of implicit signature schemes |
US6760762B2 (en) | 2000-07-17 | 2004-07-06 | Tele Services Solutions, Inc | Intelligent network providing network access services (INP-NAS) |
US6968179B1 (en) | 2000-07-27 | 2005-11-22 | Microsoft Corporation | Place specific buddy list services |
US6701344B1 (en) | 2000-07-31 | 2004-03-02 | The Boeing Company | Distributed game environment |
US6714966B1 (en) | 2000-07-31 | 2004-03-30 | The Boeing Company | Information delivery service |
US6789189B2 (en) * | 2000-08-04 | 2004-09-07 | First Data Corporation | Managing account database in ABDS system |
US7216233B1 (en) | 2000-08-14 | 2007-05-08 | Sun Microsystems, Inc. | Apparatus, methods, and computer program products for filtering information |
US6941384B1 (en) | 2000-08-17 | 2005-09-06 | International Business Machines Corporation | Methods, systems and computer program products for failure recovery for routed virtual internet protocol addresses |
CA2317081C (en) | 2000-08-28 | 2004-06-01 | Ibm Canada Limited-Ibm Canada Limitee | Estimation of column cardinality in a partitioned relational database |
JP2002077274A (ja) | 2000-08-31 | 2002-03-15 | Toshiba Corp | ホームゲートウェイ装置、アクセスサーバ装置及び通信方法 |
GB2372846A (en) | 2000-11-15 | 2002-09-04 | Vhsoft I P Company Ltd | Selective distribution of electronic files via a common access platform |
US20020073204A1 (en) | 2000-12-07 | 2002-06-13 | Rabindranath Dutta | Method and system for exchange of node characteristics for DATA sharing in peer-to-peer DATA networks |
DE10062303C2 (de) | 2000-12-14 | 2002-11-28 | Layers Ag 7 | Verfahren zum Betrieb eines Ad Hoc-Netzwerkes zur drahtlosen Datenübertragung von synchronen und asynchronen Nachrichten |
US7925703B2 (en) | 2000-12-26 | 2011-04-12 | Numedeon, Inc. | Graphical interactive interface for immersive online communities |
US6791582B2 (en) | 2000-12-29 | 2004-09-14 | International Business Machines Corporation | Method and system for identifying and displaying information that is new or has been updated in a place |
US7020686B2 (en) | 2000-12-29 | 2006-03-28 | International Business Machines Corporation | Method and system for providing synchronous communication and person awareness in a place |
US7127676B2 (en) | 2000-12-29 | 2006-10-24 | International Business Machines Corporation | Method and system for providing a separate browser window with information from the main window in a simpler format |
US6941366B2 (en) | 2001-01-17 | 2005-09-06 | International Business Machines Corporation | Methods, systems and computer program products for transferring security processing between processors in a cluster computing environment |
US7146432B2 (en) | 2001-01-17 | 2006-12-05 | International Business Machines Corporation | Methods, systems and computer program products for providing failure recovery of network secure communications in a cluster computing environment |
AU2002234258A1 (en) | 2001-01-22 | 2002-07-30 | Sun Microsystems, Inc. | Peer-to-peer network computing platform |
US8472606B2 (en) | 2001-02-27 | 2013-06-25 | Verizon Data Services Llc | Methods and systems for directory information lookup |
GB2367986B (en) | 2001-03-16 | 2002-10-09 | Ericsson Telefon Ab L M | Address mechanisms in internet protocol |
US7065587B2 (en) | 2001-04-02 | 2006-06-20 | Microsoft Corporation | Peer-to-peer name resolution protocol (PNRP) and multilevel cache for use therewith |
US7203837B2 (en) | 2001-04-12 | 2007-04-10 | Microsoft Corporation | Methods and systems for unilateral authentication of messages |
US7272636B2 (en) | 2001-04-24 | 2007-09-18 | Sun Microsystems, Inc. | Peer group name server |
US7171415B2 (en) | 2001-05-04 | 2007-01-30 | Sun Microsystems, Inc. | Distributed information discovery through searching selected registered information providers |
US20030018701A1 (en) | 2001-05-04 | 2003-01-23 | Gregory Kaestle | Peer to peer collaboration for supply chain execution and management |
GB2378268B (en) | 2001-06-04 | 2005-08-03 | Gordon Ross | A method of providing an interactive multi dimensional visual user interface to groups of users |
FI111115B (fi) | 2001-06-05 | 2003-05-30 | Nokia Corp | Menetelmä ja järjestelmä avainten vaihtoon tietoverkossa |
US6801604B2 (en) | 2001-06-25 | 2004-10-05 | International Business Machines Corporation | Universal IP-based and scalable architectures across conversational applications using web services for speech and audio processing resources |
EP1278168B1 (en) * | 2001-07-16 | 2006-11-29 | Francotyp-Postalia GmbH | Security module for an account management system |
US7222187B2 (en) | 2001-07-31 | 2007-05-22 | Sun Microsystems, Inc. | Distributed trust mechanism for decentralized networks |
US20030036941A1 (en) | 2001-08-17 | 2003-02-20 | International Business Machines Corporation | System and method for scheduling multiple meetings on an electronic calendar |
WO2003019404A1 (en) | 2001-08-30 | 2003-03-06 | Riverhead Networks Inc. | Protecting against distributed denial of service attacks |
US7493363B2 (en) | 2001-09-19 | 2009-02-17 | Microsoft Corporation | Peer-to-peer group management and method for maintaining peer-to-peer graphs |
JP2003101570A (ja) | 2001-09-21 | 2003-04-04 | Sony Corp | 通信処理システム、通信処理方法、およびサーバー装置、並びにコンピュータ・プログラム |
US20030065934A1 (en) | 2001-09-28 | 2003-04-03 | Angelo Michael F. | After the fact protection of data in remote personal and wireless devices |
US7353247B2 (en) | 2001-10-19 | 2008-04-01 | Microsoft Corporation | Querying applications using online messenger service |
US20030083544A1 (en) | 2001-10-25 | 2003-05-01 | Catherine Richards | Method and apparatus for finding love |
JP3935712B2 (ja) | 2001-11-21 | 2007-06-27 | 大日本印刷株式会社 | クライアント装置、pinロック解除装置、およびpinロック解除方法 |
WO2003050998A1 (en) | 2001-12-07 | 2003-06-19 | Ntru Cryptosystems, Inc. | Digital signature and authentication method and apparatus |
US20030217096A1 (en) | 2001-12-14 | 2003-11-20 | Mckelvie Samuel J. | Agent based application using data synchronization |
JP3967589B2 (ja) | 2001-12-28 | 2007-08-29 | 富士通株式会社 | 広告配信方法及び広告配信装置 |
US20030126027A1 (en) | 2001-12-31 | 2003-07-03 | Kimberly-Clark Worldwide | Integrated web ring site and method for presenting information |
US6996715B2 (en) | 2002-01-03 | 2006-02-07 | Lockheed Martin Corporation | Method for identification of a user's unique identifier without storing the identifier at the identification site |
US7500102B2 (en) | 2002-01-25 | 2009-03-03 | Microsoft Corporation | Method and apparatus for fragmenting and reassembling internet key exchange data packets |
US7865715B2 (en) | 2002-02-28 | 2011-01-04 | Hewlett-Packard Development Company, L.P. | Increasing peer privacy |
US6782294B2 (en) | 2002-03-22 | 2004-08-24 | Arecont Intellectual Property Holdings, Llc | Internet based distributed control system |
US20040128350A1 (en) | 2002-03-25 | 2004-07-01 | Lou Topfl | Methods and systems for real-time virtual conferencing |
US20030217106A1 (en) | 2002-03-25 | 2003-11-20 | Eytan Adar | System and method for profiling clients within a system for harvesting community knowledge |
US6912622B2 (en) | 2002-04-15 | 2005-06-28 | Microsoft Corporation | Multi-level cache architecture and cache management method for peer-to-peer name resolution protocol |
US7051102B2 (en) * | 2002-04-29 | 2006-05-23 | Microsoft Corporation | Peer-to-peer name resolution protocol (PNRP) security infrastructure and method |
US20030204724A1 (en) | 2002-04-30 | 2003-10-30 | Microsoft Corporation | Methods for remotely changing a communications password |
US20030217073A1 (en) | 2002-05-14 | 2003-11-20 | Walther Dan E. | Increasing the level of automation when scheduling and managing meetings |
DE60323182D1 (de) * | 2002-06-11 | 2008-10-09 | Matsushita Electric Ind Co Ltd | Authentifizierungssystem |
US7120930B2 (en) | 2002-06-13 | 2006-10-10 | Nvidia Corporation | Method and apparatus for control of security protocol negotiation |
GB2391135B (en) | 2002-06-28 | 2006-01-11 | Nokia Corp | User group creation |
US7502945B2 (en) | 2002-06-28 | 2009-03-10 | Microsoft Corporation | Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system |
US7370197B2 (en) | 2002-07-12 | 2008-05-06 | Microsoft Corporation | Method and system for authenticating messages |
US20040111423A1 (en) | 2002-07-13 | 2004-06-10 | John Irving | Method and system for secure, community profile generation and access via a communication system |
AU2003240171A1 (en) | 2002-07-15 | 2004-02-02 | Nokia Corporation | An ipv6 address ownership authentification based on zero-knowledge identification protocols or based on one time password |
US20050076218A1 (en) | 2002-07-17 | 2005-04-07 | Collie Brown | Cryptographic electronic gift certificate cross-reference to related applications |
PA8575901A1 (es) | 2002-07-18 | 2004-07-20 | Pfizer Prod Inc | Derivados de piperidina novedosos |
US7392375B2 (en) | 2002-09-18 | 2008-06-24 | Colligo Networks, Inc. | Peer-to-peer authentication for real-time collaboration |
US7206934B2 (en) * | 2002-09-26 | 2007-04-17 | Sun Microsystems, Inc. | Distributed indexing of identity information in a peer-to-peer network |
US20040078436A1 (en) | 2002-10-18 | 2004-04-22 | International Business Machines Corporation | Adding meeting information to a meeting notice |
US7249123B2 (en) | 2002-10-31 | 2007-07-24 | International Business Machines Corporation | System and method for building social networks based on activity around shared virtual objects |
US7346770B2 (en) | 2002-10-31 | 2008-03-18 | Microsoft Corporation | Method and apparatus for traversing a translation device with a security protocol |
US9100218B2 (en) | 2002-11-18 | 2015-08-04 | Aol Inc. | Enhanced buddy list interface |
US20040143603A1 (en) | 2002-11-21 | 2004-07-22 | Roy Kaufmann | Method and system for synchronous and asynchronous note timing in a system for enhancing collaboration using computers and networking |
US20040199786A1 (en) | 2002-12-02 | 2004-10-07 | Walmsley Simon Robert | Randomisation of the location of secret information on each of a series of integrated circuits |
US8095409B2 (en) | 2002-12-06 | 2012-01-10 | Insors Integrated Communications | Methods and program products for organizing virtual meetings |
US7209948B2 (en) | 2002-12-20 | 2007-04-24 | International Business Machines, Corporation | Collaborative review of distributed content |
US20040122901A1 (en) | 2002-12-20 | 2004-06-24 | Nortel Networks Limited | Providing computer presence information to an integrated presence system |
US20040141005A1 (en) | 2003-01-22 | 2004-07-22 | International Business Machines Corporation | System and method for integrating online meeting materials in a place |
US7694136B2 (en) | 2003-02-10 | 2010-04-06 | International Business Machines Corporation | Method for distributing and authenticating public keys using hashed password protection |
FR2851704A1 (fr) | 2003-02-20 | 2004-08-27 | France Telecom | Procede de gestion de presence selective pour service de messagerie instantanee au sein d'un reseau de telecommunication tel que le reseau internet |
JP4517578B2 (ja) | 2003-03-11 | 2010-08-04 | 株式会社日立製作所 | ピアツーピア通信装置および通信方法 |
US7895338B2 (en) | 2003-03-18 | 2011-02-22 | Siemens Corporation | Meta-search web service-based architecture for peer-to-peer collaboration and voice-over-IP |
US7610487B2 (en) | 2003-03-27 | 2009-10-27 | Microsoft Corporation | Human input security codes |
US7624264B2 (en) | 2003-03-27 | 2009-11-24 | Microsoft Corporation | Using time to determine a hash extension |
US7409544B2 (en) | 2003-03-27 | 2008-08-05 | Microsoft Corporation | Methods and systems for authenticating messages |
US8261062B2 (en) | 2003-03-27 | 2012-09-04 | Microsoft Corporation | Non-cryptographic addressing |
US7304994B2 (en) | 2003-04-09 | 2007-12-04 | Nec Laboratories America, Inc. | Peer-to-peer system and method with prefix-based distributed hash table |
EP1473899A1 (en) | 2003-04-28 | 2004-11-03 | Telefonaktiebolaget LM Ericsson (publ) | Security in a communications network |
US8161094B2 (en) | 2003-06-04 | 2012-04-17 | Sony Computer Entertainment Inc. | System and method for notification within decentralized network |
EP2270622B1 (en) | 2003-06-05 | 2016-08-24 | Intertrust Technologies Corporation | Interoperable systems and methods for peer-to-peer service orchestration |
US7539771B2 (en) | 2003-06-06 | 2009-05-26 | Microsoft Corporation | Organizational locality in prefix-based structured peer-to-peer overlays |
US7337213B2 (en) | 2003-06-19 | 2008-02-26 | International Business Machines Corporation | Method and apparatus for managing messages in a messaging session |
US20050009537A1 (en) | 2003-07-11 | 2005-01-13 | Crocker Ronald T. | Method and apparatus for facilitating wireless presence-based services |
US20050027805A1 (en) | 2003-07-15 | 2005-02-03 | Aoki Norihiro Edwin | Instant messaging and enhanced scheduling |
US7512653B2 (en) | 2003-08-11 | 2009-03-31 | Sony Corporation | System and method for dynamically grouping messaging buddies in an electronic network |
CA2439582A1 (en) | 2003-09-05 | 2005-03-05 | Webtech Dezine Inc. | Method, system and apparatus for internet-based sales generation |
WO2005026872A2 (en) | 2003-09-16 | 2005-03-24 | Terassic-5 Infosec Ltd | Internal lan perimeter security appliance composed of a pci card and complementary software |
US7546343B2 (en) | 2003-09-23 | 2009-06-09 | Alcatel-Lucent Usa Inc. | System and method for supporting virtual conferences |
US7200638B2 (en) | 2003-10-14 | 2007-04-03 | International Business Machines Corporation | System and method for automatic population of instant messenger lists |
US8260857B2 (en) | 2003-10-23 | 2012-09-04 | Microsoft Corporation | One to many data projection system and method |
US20050091284A1 (en) | 2003-10-23 | 2005-04-28 | Microsoft Corporation | Composite view |
US20050102245A1 (en) | 2003-11-07 | 2005-05-12 | International Business Machines Corporation | System, method, and service for negotiating schedules while preserving privacy through a shared representation |
US7129891B2 (en) | 2003-11-21 | 2006-10-31 | Xerox Corporation | Method for determining proximity of devices in a wireless network |
US20050138393A1 (en) | 2003-12-22 | 2005-06-23 | Challener David C. | Determining user security level using trusted hardware device |
US20050198173A1 (en) | 2004-01-02 | 2005-09-08 | Evans Alexander W. | System and method for controlling receipt of electronic messages |
US20050160291A1 (en) | 2004-01-16 | 2005-07-21 | Sharp Laboratories Of America, Inc. | System and method for securing network-connected resources |
US7885901B2 (en) | 2004-01-29 | 2011-02-08 | Yahoo! Inc. | Method and system for seeding online social network contacts |
CA2457478A1 (en) | 2004-02-12 | 2005-08-12 | Opersys Inc. | System and method for warranting electronic mail using a hybrid public key encryption scheme |
US20050182928A1 (en) | 2004-02-12 | 2005-08-18 | Chandar Kamalanathan | System and method for secure HTML links |
AU2004201058B1 (en) * | 2004-03-15 | 2004-09-09 | Lockstep Consulting Pty Ltd | Means and method of issuing Anonymous Public Key Certificates for indexing electronic record systems |
US8880502B2 (en) | 2004-03-15 | 2014-11-04 | International Business Machines Corporation | Searching a range in a set of values in a network with distributed storage entities |
US7397766B2 (en) | 2004-03-31 | 2008-07-08 | Lucent Technologies Inc. | High-speed traffic measurement and analysis methodologies and protocols |
US20050228824A1 (en) | 2004-04-01 | 2005-10-13 | Gattuso Joseph A | Intelligent consequence management system |
EP1587239A1 (en) | 2004-04-14 | 2005-10-19 | Siemens Mobile Communications S.p.A. | Method of and apparatus for server-side management of buddy lists |
US7478120B1 (en) | 2004-04-27 | 2009-01-13 | Xiaohai Zhang | System and method for providing a peer indexing service |
WO2005122733A2 (en) | 2004-06-09 | 2005-12-29 | James Bergin | Systems and methods for management of contact information |
US7929689B2 (en) | 2004-06-30 | 2011-04-19 | Microsoft Corporation | Call signs |
US7925729B2 (en) | 2004-12-07 | 2011-04-12 | Cisco Technology, Inc. | Network management |
KR100651715B1 (ko) | 2004-10-07 | 2006-12-01 | 한국전자통신연구원 | 차세대 인터넷에서 자동으로 주소를 생성하고 수락하는방법 및 이를 위한 데이터 구조 |
WO2006068450A1 (en) | 2004-12-24 | 2006-06-29 | Samsung Electronics Co., Ltd. | System and method for providing mobility and secure tunnel using mobile internet protocol within internet key exchange protocol version 2 |
US20060265402A1 (en) | 2005-05-20 | 2006-11-23 | Andrew Edmond | Grid network for distribution of files |
US20070008987A1 (en) | 2005-07-06 | 2007-01-11 | Microsoft Corporation | Capturing contacts via people near me |
US7568106B2 (en) | 2005-12-16 | 2009-07-28 | International Business Machines Corporation | Cooperative non-repudiated message exchange in a network environment |
US20070192676A1 (en) | 2006-02-13 | 2007-08-16 | Bodin William K | Synthesizing aggregated data of disparate data types into data of a uniform data type with embedded audio hyperlinks |
-
2006
- 2006-04-21 US US11/408,894 patent/US8086842B2/en not_active Expired - Fee Related
-
2007
- 2007-04-23 KR KR1020087025220A patent/KR20090015026A/ko not_active IP Right Cessation
- 2007-04-23 EP EP07776230A patent/EP2089808A2/en not_active Withdrawn
- 2007-04-23 MX MX2008013133A patent/MX2008013133A/es not_active Application Discontinuation
- 2007-04-23 CA CA002646331A patent/CA2646331A1/en not_active Withdrawn
- 2007-04-23 AU AU2007240567A patent/AU2007240567B2/en not_active Ceased
- 2007-04-23 CN CN2007800142617A patent/CN101427234B/zh active Active
- 2007-04-23 RU RU2008141720/08A patent/RU2444054C2/ru not_active IP Right Cessation
- 2007-04-23 JP JP2009506645A patent/JP2009534940A/ja not_active Withdrawn
- 2007-04-23 BR BRPI0710015-9A patent/BRPI0710015A2/pt not_active IP Right Cessation
- 2007-04-23 WO PCT/US2007/010092 patent/WO2007124180A2/en active Application Filing
-
2008
- 2008-09-23 NO NO20084035A patent/NO20084035L/no not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145642A (zh) * | 2018-08-13 | 2019-01-04 | 晋商博创(北京)科技有限公司 | 基于cpk数字印章的数据存储方法、终端及数据库 |
CN109145642B (zh) * | 2018-08-13 | 2020-11-10 | 晋商博创(北京)科技有限公司 | 基于cpk数字印章的数据存储方法、终端及数据库 |
Also Published As
Publication number | Publication date |
---|---|
NO20084035L (no) | 2008-10-15 |
MX2008013133A (es) | 2008-10-21 |
RU2444054C2 (ru) | 2012-02-27 |
WO2007124180A3 (en) | 2007-12-13 |
CA2646331A1 (en) | 2007-11-01 |
US8086842B2 (en) | 2011-12-27 |
JP2009534940A (ja) | 2009-09-24 |
CN101427234B (zh) | 2011-02-23 |
US20070250700A1 (en) | 2007-10-25 |
RU2008141720A (ru) | 2010-04-27 |
WO2007124180A2 (en) | 2007-11-01 |
EP2089808A2 (en) | 2009-08-19 |
AU2007240567A1 (en) | 2007-11-01 |
BRPI0710015A2 (pt) | 2011-08-02 |
KR20090015026A (ko) | 2009-02-11 |
AU2007240567B2 (en) | 2011-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101427234B (zh) | 用于对等联系人交换的方法和系统 | |
US12086799B2 (en) | Method and system for zero-knowledge and identity based key management for decentralized applications | |
US10121143B1 (en) | Method and system for blockchain-based combined identity, ownership, integrity and custody management | |
US11836717B2 (en) | System and method for processing payments in fiat currency using blockchain and tethered tokens | |
CA3015695C (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
JP5016749B2 (ja) | 認証された文書の電子的送信、格納および検索システムおよび方法 | |
CN102932136B (zh) | 用于管理加密密钥的系统和方法 | |
EP1878190B1 (en) | Method and device of enabling a user of an internet application access to protected information | |
CN101689989B (zh) | 用于创建和确认密码保护文档的方法和装置 | |
CN101331509A (zh) | 包括可显示的声明的安全性令牌 | |
US20120259635A1 (en) | Document Certification and Security System | |
JP5065682B2 (ja) | 名前解決のためのシステムおよび方法 | |
JP7462903B2 (ja) | 利用者端末、認証者端末、登録者端末、管理システムおよびプログラム | |
KR102051454B1 (ko) | 조건 검증에 의한 블록체인 기반 의사결정 시스템 | |
KR102666241B1 (ko) | 하이브리드 스마트 컨트랙트를 이용한 디지털 저작물 및 저작권 관리 시스템 및 방법 | |
KR102493093B1 (ko) | 블록체인 기반의 내용증명 이메일 서비스 제공 장치 및 방법 | |
EP4165577A1 (en) | Internet data usage control system | |
Jinlert | Certification authorities (CA) and public key infrastructure (PKI) for securing information | |
Beebe et al. | Web Services Security: Proposed Model for Content Delivery Assurance in a Low Trust Scenario. | |
JP2005341201A (ja) | 情報処理装置、サーバ装置及び電子データ入手先保全方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150430 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20150430 Address after: Washington State Patentee after: Micro soft technique license Co., Ltd Address before: Washington State Patentee before: Microsoft Corp. |