CN101427234A - 对等联系人交换 - Google Patents

对等联系人交换 Download PDF

Info

Publication number
CN101427234A
CN101427234A CNA2007800142617A CN200780014261A CN101427234A CN 101427234 A CN101427234 A CN 101427234A CN A2007800142617 A CNA2007800142617 A CN A2007800142617A CN 200780014261 A CN200780014261 A CN 200780014261A CN 101427234 A CN101427234 A CN 101427234A
Authority
CN
China
Prior art keywords
pki
unique identifier
message
encryption unique
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007800142617A
Other languages
English (en)
Other versions
CN101427234B (zh
Inventor
G·S·西德胡
N·霍顿
S·K·辛格豪尔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN101427234A publication Critical patent/CN101427234A/zh
Application granted granted Critical
Publication of CN101427234B publication Critical patent/CN101427234B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

一系统可在公众可用的索引存储器中发布经认证的联系人信息、检索联系人信息并确认它。所要求保护的方法和系统可提供基于客户机的、服务器可任选的方法来进行发布。公众可用的索引存储可以是在对等网络中使用的分布式散列表。系统可在其中服务器不可用或者其中服务器信任最小的其它安全目录服务应用程序中使用。

Description

对等联系人交换
背景
目录服务通常使用网络服务器来提供。为了使用目录服务,要求用户连接至服务器并具有用户帐号以便访问目录服务。另外,用户必须信任服务器提供数据完整性和数据认证。如果目录服务旨在用于较小的连接实体组,例如自组织网络,则创建并设立用于该自组织网络的目录服务器可能是低效率的。例如,自组织网络在本质上一般是瞬时的,并且由于管理员时间、装备资源容量(某一服务器必须被重新分配或添加)以及用户时间(帐号创建与设立可能牵涉到用户),为短持续时间和少量用户设立专用服务器的成本太过高昂。而且,尽管基于服务器的系统是常见的,但新的无服务器的系统诸如对等网络可在创建自组织网络方面提供更多的灵活性,因为它们不要求专用的服务器来促进通信。然而,为了使用现有的加密过程来允许在这些自组织网络上的安全通信,可能需要目录服务来促进不依赖于基于服务器的模型的公钥交换。
概述
一系统在公众可用的索引存储中发布经认证的联系信息。该系统还可提供检索联系人信息并验证它的方法。所要求保护的方法和系统可以是基于客户机的,而服务器是可任选的。公众可用的索引存储可以是在对等网络中使用的分布式散列表。该系统可在其它其中服务器不可用或者其中服务器信任最小的安全目录服务应用程序中使用。
在一个实施例中,系统可用作一般的消息发布系统。在另一实施例中,系统可用于提供选择性发布,在其中被投送的记录仅可由预期的接收者来检索和阅读。
附图
图1例示可按照权利要求操作的计算系统的框图;
图2例示一般的对等网络;
图3例示一般的目录服务器和服务;
图4例示分布式散列表;
图5例示在权利要求的实施例中使用的记录;
图6例示发布过程实施例;
图7例示检索过程实施例;
图8例示包含持续时间参数的修改记录;
图9例示使用持续时间参数的另一个确认过程;
图10例示用于选择性发布的修改记录;
图11例示用于选择性发布的发布过程实施例;以及
图12例示用于选择性发布的检索过程实施例。
描述
尽管下面的文本阐述众多不同实施例的详细描述,但应当理解,该描述的法律范围是由本专利所附的权利要求书的语言定义的。详细描述应当仅解释为是示例性的,并不描述每一可能的实施例,因为描述每一可能的实施例即使不是不可能也是不实际的。众多的替换实施例可使用当前技术或者使用在本专利的申请日之后开发的技术来实现,但仍然落在本发明的范围之内。
还应当理解,除非在本专利中使用“如在本文所使用的,术语‘________’这里定义为表示...”语句或相似语句来明确定义一个术语,否则不旨在其普通或平常的意义之外明确或隐含地限制该术语的意义,并且这样的术语不应解释为限于基于在本专利的任何部分(除了权利要求书的语言之外)中所作的任何陈述的范围。对于在本专利所附权利要求书中所述的任何术语在本专利中以与单数意义一致的方式来引用,这仅是为了清楚而不混淆读者,并且不是要隐含或者以其它方式来将该权利要求术语限制于该单数意义。最后,除非一个权利要求元素是通过陈述词语“装置(means)”和功能而非陈述任何结构来定义,任何权利要求元素的范围不应基于对35U.S.C.§112第六段的应用来解释。
图1例示合适计算系统环境100的一个示例,在其上可实现所要求保护的方法和装置的各块的系统。计算系统环境100只是合适计算环境的一个示例并且不旨在对权利要求的方法和装置的使用范围或功能性提出任何限制。也不应当将计算环境100解释为对在示例性操作环境100中例示的任一组件或组件组合有任何依赖性或需求。
要求保护的方法和装置的各块可与众多其它通用或专用计算系统环境或配置一起使用。适于与本发明的方法或装置一起使用的公知的计算系统、环境和/或配置包括但不限于,个人计算机、服务器计算机、手持式或膝上型设备、多处理器系统、基于微处理器的系统、机顶盒、可编程消费电子产品、网络PC、小型计算机、大型计算机、包含任何上述系统或设备的分布式计算环境等等。
要求保护的方法和装置的各块可在诸如程序模块等由计算机执行的计算机可执行指令的一般上下文中描述。一般而言,程序模块包括例程、程序、对象、组件、数据结构等,它们执行特定的任务或者实现特定的抽象数据类型。这些方法和装置还可在分布式计算环境中实践,其中任务由通过通信网络链接的远程处理设备来执行。在分布式计算环境中,程序模块可位于包含存储器存储设备在内的本地和远程两者的计算机存储介质中。
参考图1,用于实现要求保护的方法和装置的各块的示例性系统包括计算机110形式的通用计算设备。计算机110的组件包括但不限于,处理单元120、系统存储器130和系统总线121,后者将包括系统存储器在内的各种系统组件耦合至处理单元120。系统总线121可以是任意若干类型的总线结构,其中包括存储器总线或存储器控制器、外围总线和使用任何各种总线体系结构的局部总线。作为示例而非限制,这样的体系结构包括工业标准体系结构(ISA)总线、微通道体系结构(MCA)总线、增强型ISA(EISA)总线、视频电子标准协会(VESA)局部总线以及还被称为夹层总线的外围组件互连(PCI)总线。
计算机110一般包括各种计算机可读介质。计算机可读介质是可由计算机110访问的任何可用介质并且包括易失性与非易失性、可移动与不可移动介质。作为示例而非限制,计算机可读介质可包括计算机存储介质和通信介质。计算机存储介质包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性与非易失性、可移动与不可移动介质。计算机存储介质包括但不限于,RAM、ROM、EEPROM、闪存或其它存储器技术,CD-ROM、数字多功能盘(DVD)或其它光盘存储,磁带盒、磁带、磁盘存储或其它磁存储设备,或者任何可用于存储所需信息并可由计算机110访问的任何其它介质。通信介质一般体现为在诸如载波或其它传输机制中的经调制数据信号中的计算机可读指令、数据结构、程序模块或其它数据并且包括任何信息传递介质。术语“经调制的数据信号”指具有以将信息编码到信号中的方式设置或改变的一或多个特性的信号。作为示例而非限制,通信介质包括线接介质如线接网络或直接线连接以及无线介质如声音、RF、红外和其它无线介质。上述的任何组合也应当包括在计算机可读介质的范围内。
系统存储器130包括易失性和/或非易失性存储器形式的计算机存储介质,诸如只读存储器(ROM)131和随机存取存储器(RAM)132。基本输入/输出系统133(BIOS)包含诸如启动时帮助在计算机110内的元件之间传送信息的基本例程,通常存储在ROM 131中。RAM 132一般包含可由处理单元120立即访问和/或正在操作的数据和/或程序模块。作为示例而非限制,图1例示操作系统134、应用程序135、其它程序模块136和程序数据137。
计算机110还可包括其它可移动/不可移动、易失性/非易失性计算机存储介质。仅作为示例,图1例示读写不可移动、非易失性磁介质的硬盘驱动器140,读写可移动、非易失性磁盘152的磁盘驱动器151以及读写可移动、非易失性光盘156诸如CD ROM或其它光介质的光盘驱动器155。可在示例性操作环境中使用的其它可移动/不可移动、易失性/非易失性计算机存储介质包括但不限于,磁带盒、闪存卡、数字多功能盘、数字录像带、固态RAM、固态ROM等等。硬盘驱动器141一般通过不可移动存储器接口诸如接口140连接至系统总线121,而磁盘驱动器151和光盘驱动器155一般通过可移动存储器接口诸如接口150连接至系统总线121。
上面讨论并在图1中例示的这些驱动器及其相关联的计算机存储介质为计算机110提供计算机可读指令、数据结构、程序模块和其它数据的存储。在图1中,例如,硬盘驱动器141例示为存储操作系统144、应用程序145、其它程序模块146和程序数据147。注意,这些组件可以与操作系统134、应用程序135、其它程序模块136和程序数据137相同或者不同。操作系统144、应用程序145、其它程序模块146和程序数据147在这里给出不同的标号以说明至少它们是不同的副本。用户可通过输入设备诸如键盘162和定点设备161(通常指鼠标、轨迹球或触摸板)将命令和信息输入到计算机20中。其它输入设备(未示出)可包括话筒、操纵杆、游戏手柄、圆盘式卫星天线、扫描仪等等。这些和其它输入设备通常通过耦合至系统总线的用户输入接口160连接到处理单元120,但可通过其它接口和总线结构诸如并行端口、游戏端口或通用串行总线(USB)来连接。监视器191或其它类型的显示设备也通过诸如视频接口190的接口连接到系统总线121。除了监视器之外,计算机还可包括其它外围输出设备诸如扬声器197和打印机196,它们可通过输出外围接口190来连接。
计算机110可在使用至一或多个远程计算机如远程计算机180的逻辑连接的网络化环境中运行。远程计算机180可以是个人计算机、服务器、路由器、网络PC、对等设备或其它普通网络节点,并且一般包括上面相对于计算机110所述的许多或全部元素,尽管在图1中仅示出一个存储器存储设备181。图1所示的逻辑连接包括局域网(LAN)171和广域网(WAN)173,但还可包括其它网络。这类联网环境在办公室、企业级计算机网络、内联网和因特网中是很常见的。
当在LAN联网环境中使用时,计算机110通过网络接口或适配器170连接到LAN 171。当在WAN联网环境中使用时,计算机110通常包括调制解调器172或用于在诸如因特网等WAN 173上建立通信的其它装置。调制解调器172可以是内置或外置的,它可以通过用户输入接口160或其它合适的机制连接至系统总线121。在网络化环境中,相对于计算机110描述的程序模块或其部分可以存储在远程存储器存储设备中。作为示例而非限制,图1将远程应用程序185例示为驻留在存储器设备181上。应了解到,例示的网络连接是示例性的并且可使用在计算机之间建立通信链接的其它手段。
对等(P2P)系统使用以分散方式例如在没有中央服务器的帮助下相互通信的节点的网络。对等网络中的每一节点(例如应用程序或设备)可通过直接连接与网络上的另一节点通信,或者每一节点可使用一或多个中间节点间接地通信以将通信中继至预期的节点。
图2例示P2P系统200的高级示图。系统200包括对等实体(202-212)的集合。对等实体(202-212)可以是通过网络或网络组合耦合在一起的个人计算机设备。图2例示了其中每一对等实体(202-212)连接至所有其它对等实体(202-212)的示例。在其它情形中,一或多个对等实体(202-212)可以通过一或多个中间参与者(202-212)连接至其它对等实体(202-212)。然而,为了在对等网络上提供安全通信,首先需要建立对等节点之间的安全连接。
连接安全可基于如本领域所公知的对称密钥加密过程。然而,为了实现该加密安全,对等实体需要首先交换允许在最初建立安全连接的证书和/或公钥。在一些现有系统中,诸如在图3中所示的,该交换可使用中央目录服务器300来促进,其中用户301、302、303可将它们的证书304、305、306和/或公钥投送到目录服务器300上。目录服务307可以是包含按用作密钥309的用户名或者其它标识符来索引的证书和/或公钥的记录308的数据库表。能够连接到目录服务器300并被允许访问目录服务307的用户可使用目标用户的标识符来查找目标用户,并且获得目标用户对应的公钥。该方法要求到服务器300的连通性、与目录服务器300的显式注册并且信任目录服务器300。而且,某方必须负担主宿的成本,诸如服务器。当用户303正从远程位置连接时,另外还需要因特网连通性310。服务器注册过程涉及用于在目录服务器300中提升信任的用户帐户。例如,如果任何用户可访问服务器300,则可认为服务器300更容易受到损害,特别是在投送和交换诸如公钥的安全信息的时候。此外,因为自组织的临时网络的瞬时性质以及设立目录服务器的难度,为自组织的临时网络创建目录服务器是不切实际的。用于自组织非对等网络的可能工作区可以是通过电子邮件或通过网络外的过程来交换公钥,诸如向目标成员物理地发送或者邮寄包含证书/公钥的磁盘。这可允许对等实体建立服务器无关的安全链接。然而,这很麻烦且容易出错。
所要求保护的服务器无关索引过程的实施例可使用无服务器索引存储,诸如图4所示的分布式散列表(DHT)400。该分布式散列表400可在一组形成对等网络405的对等实体401-404上维护。分布式散列表中的条目可例如使用散列函数在逻辑上划分或归组。散列函数可用某种有组织的方式来将记录聚集在一起,从而使检索更有效率。DHT具有两个基本属性:1)表(例如表400)跨多个节点(例如节点401-404)的分布;以及2)提供用于发布和检索记录的路由机制(未示出)。路由机制和分布可由诸如Chord、PNRP、Pastry、Tapestry等覆盖协议管理。尽管DHT可用于提供按照权利要求的实施例的索引存储,但要强调的是,可使用可由一组对等实体容易地访问的任何索引存储,包括基于服务器的索引。在基于服务器的索引的情形中,所要求保护的系统可单独减少服务器所要求的信任的等级,因为所要求保护的系统可为不安全的索引存储提供必需的安全等级。
所要求保护的服务器无关索引过程的实施例可使用如图5所示的特定记录格式。图5例示,发布者可将包含联系人信息501、发布者的公钥502和使用发布者的私钥的联系人信息的签名503的记录500投送至索引存储。或者,签名可以是联系人信息和公钥的组合。该记录可由记录密钥504来索引。在一个实施例中,记录的密钥504可以是加密的唯一标识符(CUI)。CUI具有两个基本属性。第一,CUI在统计上是唯一的,以及第二,CUI可对应于特定的用户公钥,诸如发布者公钥502。与普通的数据库索引方案相似,记录密钥需要是唯一的,以防止重复的实体条目。因此,CUI可以是按照其对于特定的情形或应用程序为唯一的可能性很大的方式而得到的。例如,在只有少量成员的对等者组中,如果加密唯一标识符可从相同的成员公钥得到的可能性对于组大小而言是不太可能的,则CUI在统计上是唯一的。
CUI可使用诸如散列或加密算法的算法从公钥得到。可使用该算法验证CUI对应或者匹配其公钥。在一个实施例中,CUI可用于以较短且用户可管理的形式,诸如在题为“Callsigns”美国专利第10/882079号中描述的P2P系统中使用的对等者名称来表示较长的用户标识符诸如公钥。
图5的记录可用于将联系人信息发布至索引存储,诸如图4的DHT 400。CUI密钥504可用于定位每一记录500并且检索联系人信息501和公钥502。在该实施例中,所发布的信息可以是公开的,即所发布的信息可以不加密,除签名之外。然而,下面描述的其它实施例可加密所发布信息的各部分。而且,尽管该实施例例示使用记录500来促进公钥502的交换,但要强调的是,该系统可在任何其中可使用唯一消息发布的应用程序中使用。例如,代替联系人信息501,可针对用户CUI 504投送任何消息。
图6例示按照权利要求的实施例的一般发布过程。使用诸如散列函数的算法,可为给定用户的公钥生成CUI 601。重要的是注意,无论使用什么算法,都可验证CUI是否对应于用于生成它的公钥。可构造联系人信息或者其它消息数据以及发布者的公钥的记录602,并且联系人信息和/或发布者的公钥可由发布者的私钥(它对应于公钥)来签署603。包括联系人信息、公钥和签名的记录可插入到公众可用的索引中604。记录可由对应于发布者公钥的CUI来索引。
图7例示按照权利要求的实施例的检索过程。希望与第二对等者连接的用户可获得第二对等者的CUI 701。可在带外通过电子邮件或者网络外过程来获得CUI(例如,传统邮件、语音通信、名片等)。CUI随后可用于在索引存储中查找映射到该CUI的记录702。如上所述,记录可包括密钥、一些消息信息(联系人信息)和签名。
用户随后可基于CUI来查询索引存储以检索记录703。一旦检索到CUI,即可使用包含在记录内的公钥来验证CUI以确保它们彼此对应704。该过程框可用于验证记录对应于CUI。可用许多方法来使CUI在统计上对于公钥是唯一的。在一个实施例中,对等通信系统可预建立通用映射过程,例如使用公认的散列函数。该初始的验证过程帮助确保记录确实对应于给定的CUI。
如果CUI正确地映射,则记录的签名随后可用于确定该签名是否由发布者的对应私钥签名705。这可通过提供消息源自发布者的证据来认证消息,因为可以假设发布者拥有对应于用于该加密的公钥的私钥。
如果记录/消息被正确地签名,则随后可对记录的联系人信息执行消息格式和/或句法检查706。这可用于,例如确保消息没有被删改过以匹配签名。尽管提供被删改的消息以匹配加密的签名在统计上是困难的,但并非不可能。然而,删改会导致不符合预期或期望格式的消息。因而,首先检查消息以确定消息格式是否符合期望格式。例如,在传输联系人信息时,联系人信息可要求十个字符的格式。如果记录格式不提供这十个字符的格式,则消息可能已经被某人或某物篡改了711。
或者或者另外,可检查消息的语义。例如,联系人信息可限制为选项列表以及这些选项之间的特定关系。因此,如果格式要求两个条目,第一条目与第二个条目相关(语义)并且它们不匹配该期望格式,则消息可能已经被某人或某物篡改了711。
如果验证过程704、705、706均已经成功完成,则记录是真实的并且随后被使用707,例如,公钥可用于建立通信链接。如果验证步骤704、705、706中的任一个失败,则消息可能已经某人或某物被篡改711。在公钥交换系统的情形中,可拒绝连接。
在图8所示的另一实施例中,持续时间参数801可被包括在记录800中。该持续时间参数801可对应于在所述的认证过程中使用的加密等级。例如,加密等级可对应于用于生成在所要求保护的系统中使用的公/私钥对的加密强度。如果加密强度高,则持续时间长,反之亦然。持续时间参数801可指示记录有效性的持续时间。因而,持续时间参数801可在图9所示的检索过程中使用。图9例示图7的相同过程,添加了框909,在其中检查由持续时间参数801指示的持续时间901以确定持续时间是否已经期满。如果持续时间参数801期满,则记录可能被损坏911。否则记录是有效的907。
图10-12例示另一个实施例,其中可使用选择性发布来允许第一用户发布仅有作为目标的第二用户才能检索的数据。在该选择性发布实施例中,可使用如图10所示的记录1001。记录1001可包括由两个CUI 1003、1004的组合形成的密钥1002。第一CUI 1003可与第一用户相关联,而第二CUI 1004可与第二用户相关联。可通过简单地将第二CUI追加到第一CUI来形成该组合。该记录可包括消息部分1005和持续时间参数1006。消息1005可包含关于发布者的联系人信息、发布者公钥和签名的数据。
图11例示使用图10的记录1001的选择性发布过程。发布者可从公钥得到其CUI 1101,获得所选接收者的CUI 1102,构造消息1103,使用发布者的私钥签署该消息1104并基于CUI组合密钥1101将该消息插入到索引中1105。另外,消息可使用预期接收者的公钥来加密1106。
图12例示与图7相似的添加了框1201、1202、1203的选择性发布过程的检索过程。希望检索所发布的记录的接收者首先获得发布者的CUI 1201,然后根据组合的CUI密钥在索引存储查找记录1202。在又一个增强的实施例中,消息可使用接收者的公钥来加密。因而,只有接收者可解密预期的数据。在接收者使用CUI组合密钥检索消息1202之后,接收者可使用其私钥来首先解密记录1203,之后验证过程和确认按照图7进行。在该选择性发布实施例中,接收者的公钥(用于加密记录)可根据接收者CUI来确定,发布者用它来创建组合密钥。
在上述实施例的另一个增强方案中,密钥可以是组公钥,它由对等者组拥有。在该实施例中,组的任何成员可按照组公钥查找记录并且执行认证过程。用户组有权访问记录并且可明确地作为所投送消息的接收目标。
应当强调的是,尽管上述特定实施例可与公钥交换目录相关联,但联系人信息可表示其它数据。例如,代替联系人信息,记录可以是普通消息投送。因而,所要求保护的系统可用作任何公众可用的索引存储上的一般发布系统。所要求保护的系统还可用于提供除公钥查找以外的目录服务。所要求保护的系统允许现有的分布式索引存储诸如分布式散列表用作安全的目录服务工作而不依赖于服务器。
另外,所要求保护的系统可在现有的基于服务器的目录上使用,在其中服务器安全最小化,从而需要由所要求保护的系统提供的认证过程。在自组织系统诸如对等者组和对等网络中,公钥发布和检索的无服务器过程可通过减少作为主机的专用服务器提供目录服务的需求来使得这样的网络的创建更有效率。所要求保护的方法和系统还可最小化用户的牵连,因为公/私钥加密过程可消除用户明确地向服务器注册的需求。

Claims (20)

1.一种使用公众可用的索引存储用于安全发布系统的方法,所述方法包括:
提供在统计上对于公钥是唯一的加密唯一标识符;
用发布者私钥签署消息,其中所述消息包括所述发布者公钥;
将所述消息插入公众可用的索引存储,其中所述消息由所述加密唯一标识符索引;
基于所述加密唯一标识符检索所述条目;
确定所述加密唯一标识符是否与所述公钥有关;以及
确定所述消息是否由对应于所述公钥的私钥签署。
2.如权利要求1所述的方法,其特征在于,还包括确定所述消息是否具有期望的格式和句法。
3.如权利要求1所述的方法,其特征在于,所述索引存储是分布式散列表和目录服务器之一。
4.如权利要求1所述的方法,其特征在于,所述加密唯一标识符是使用散列函数从所述用户公钥得到的。
5.如权利要求1所述的方法,其特征在于,还包括在确定所述加密唯一标识符与所述公钥有关、所述消息由对应于所述公钥的私钥签署以及所述消息具有期望的格式和句法时,允许计算机执行所述检索以使用所述公钥。
6.如权利要求1所述的方法,其特征在于,所述消息还包括与加密强度成比例的持续时间参数。
7.如权利要求6所述的方法,其特征在于,还包括在确定由所述持续时间参数指示的持续时间尚未期满、所述加密唯一标识符与所述公钥有关、所述消息由对应于所述公钥的私钥签署以及所述消息具有期望的格式和句法时,允许计算机执行所述检索以使用所述公钥。
8.如权利要求1所述的方法,其特征在于,所述加密唯一标识符包括组公钥。
9.如权利要求1所述的方法,其特征在于,所述加密唯一标识符是至少根据第一用户加密唯一标识符和第二用户加密唯一标识符形成的。
10.一计算机系统包括:
形成对等网络的多个对等节点;
所述对等网络的分布式散列表;
第一对等节点,创建在统计上对于所述第一对等节点的公钥唯一的加密唯一标识符,以及将包含所述公钥并且由对应于所述公钥的私钥签署的消息插入到由所述加密唯一标识符索引的所述分布式散列表中;
第二节点,基于所述加密唯一标识符检索所述消息、确定所述加密唯一标识符是否与所述公钥有关、确定所述消息是否由对应于所述公钥的所述私钥签署以及确定所述消息是否具有期望的格式和句法来检索所述消息。
11.如权利要求10所述的系统,其特征在于,在确定所述加密唯一标识符与所述公钥有关、所述签名由对应于所述公钥的所述私钥签署以及所述消息具有期望的格式和句法时,所述第二节点使用所述公钥与所述第一节点通信。
12.如权利要求10所述的系统,其特征在于,所述加密唯一标识符包括关联于所述第一节点的第一加密唯一标识符与关联于所述第二节点的第二加密唯一标识符的组合。
13.如权利要求12所述的系统,其特征在于,所述消息是使用所述第二节点的公钥加密的。
14.如权利要求10所述的系统,其特征在于,所述消息包括持续时间参数,其中所述持续时间参数与用于生成所述公钥和对应于所述公钥的所述私钥的加密算法的强度成比例。
15.如权利要求14所述的系统,其特征在于,在由所述持续时间参数指示的持续时间尚未期满、所述加密唯一标识符与所述公钥有关、所述消息由对应于所述公钥的所述私钥签署以及所述消息具有期望的格式和句法时,所述第二节点接受所述消息。
16.一种具有用于执行下列操作的计算机可执行指令的计算机可读介质,所述操作包括:
从公钥得到加密唯一标识符;
基于所述加密唯一标识符在索引存储中检索条目,其中所述条目包含消息和公钥,它们一起由对应于所述公钥的私钥签署;
确定所述加密唯一标识符是否与所述公钥有关;以及
确定所述消息和公钥是否由所述私钥签署。
17.如权利要求16所述的计算机可读介质,其特征在于,还包括确定所述消息是否具有期望的格式和句法。
18.如权利要求16所述的计算机可读介质,其特征在于,还包括确定所述消息的持续时间参数是否已经期满。
19.如权利要求18所述的计算机可读介质,其特征在于,所述持续时间参数指示的持续时间与用于生成所述公钥和私钥的加密等级成比例。
20.如权利要求16所述的计算机可读介质,其特征在于,所述加密唯一标识符是通过组合第一加密唯一标识符与第二加密唯一标识符来形成的,以及其中,所述消息是使用关联于所述第二加密唯一标识符的计算机的公钥来加密的。
CN2007800142617A 2006-04-21 2007-04-23 用于对等联系人交换的方法和系统 Active CN101427234B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/408,894 US8086842B2 (en) 2006-04-21 2006-04-21 Peer-to-peer contact exchange
US11/408,894 2006-04-21
PCT/US2007/010092 WO2007124180A2 (en) 2006-04-21 2007-04-23 Peer-to-peer contact exchange

Publications (2)

Publication Number Publication Date
CN101427234A true CN101427234A (zh) 2009-05-06
CN101427234B CN101427234B (zh) 2011-02-23

Family

ID=38620832

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007800142617A Active CN101427234B (zh) 2006-04-21 2007-04-23 用于对等联系人交换的方法和系统

Country Status (12)

Country Link
US (1) US8086842B2 (zh)
EP (1) EP2089808A2 (zh)
JP (1) JP2009534940A (zh)
KR (1) KR20090015026A (zh)
CN (1) CN101427234B (zh)
AU (1) AU2007240567B2 (zh)
BR (1) BRPI0710015A2 (zh)
CA (1) CA2646331A1 (zh)
MX (1) MX2008013133A (zh)
NO (1) NO20084035L (zh)
RU (1) RU2444054C2 (zh)
WO (1) WO2007124180A2 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145642A (zh) * 2018-08-13 2019-01-04 晋商博创(北京)科技有限公司 基于cpk数字印章的数据存储方法、终端及数据库

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
GB2446199A (en) * 2006-12-01 2008-08-06 David Irvine Secure, decentralised and anonymous peer-to-peer network
US9411976B2 (en) * 2006-12-01 2016-08-09 Maidsafe Foundation Communication system and method
GB2446169A (en) * 2006-12-01 2008-08-06 David Irvine Granular accessibility to data in a distributed and/or corporate network
US9319518B2 (en) * 2006-12-22 2016-04-19 Bce Inc. Method and system for configuring information regarding processing of calls involving a party
US9497028B1 (en) 2007-05-03 2016-11-15 Google Inc. System and method for remote storage auditing
US9838365B2 (en) * 2007-07-10 2017-12-05 Qualcomm Incorporated Peer to peer identifiers
US8775817B2 (en) * 2008-05-12 2014-07-08 Microsoft Corporation Application-configurable distributed hash table framework
US7921089B2 (en) * 2008-07-24 2011-04-05 Zscaler, Inc. Feature based data management
US9379895B2 (en) 2008-07-24 2016-06-28 Zscaler, Inc. HTTP authentication and authorization management
US8806201B2 (en) * 2008-07-24 2014-08-12 Zscaler, Inc. HTTP authentication and authorization management
US9800413B2 (en) * 2008-08-15 2017-10-24 Gm Global Technology Operations, Inc. System and method for performing an asymmetric key exchange between a vehicle and a remote device
CA2647921C (en) 2008-12-24 2014-06-10 Bce Inc. Method and system for configuring a contact database associated with a user
JP2010239257A (ja) * 2009-03-30 2010-10-21 Nec Corp 暗号タグ管理システム、情報端末、タグ情報の隠蔽方法およびプログラム
US8769285B2 (en) 2009-08-13 2014-07-01 Qualcomm Incorporated Methods and apparatus for deriving, communicating and/or verifying ownership of expressions
KR101631618B1 (ko) * 2010-07-06 2016-06-27 삼성전자주식회사 가상 개인화 그룹 생성 방법 및 가상 개인화 그룹을 이용하는 통신 기기와 허브를 포함하는 네트워크
WO2013073115A1 (ja) * 2011-11-16 2013-05-23 パナソニック株式会社 コンテンツ配信装置及びコンテンツ配信システム
CN104704493B (zh) * 2012-08-15 2019-06-07 维萨国际服务协会 可搜索的经加密的数据
WO2015139026A2 (en) 2014-03-14 2015-09-17 Go Tenna Inc. System and method for digital communication between computing devices
US9392057B2 (en) * 2014-04-11 2016-07-12 Qualcomm Incorporated Selectively exchanging data between P2P-capable client devices via a server
EP3186988A4 (en) * 2014-08-28 2018-04-25 Nokia Technologies OY Method and apparatus for establishment of private communication between devices
US9608907B2 (en) 2014-09-29 2017-03-28 Vivint, Inc. Systems and methods for centrally-assisted distributed hash table
WO2016050285A1 (en) 2014-09-30 2016-04-07 Telefonaktiebolaget L M Ericsson (Publ) Technique for handling data in a data network
FR3031211B1 (fr) * 2014-12-31 2017-02-10 Thales Sa Infrastructure d'authentification de telephones ip d'un systeme toip proprietaire par un systeme eap-tls ouvert
EP3259871B1 (en) * 2015-02-20 2020-09-16 Telefonaktiebolaget LM Ericsson (publ) Method of providing a hash value for a piece of data, electronic device and computer program
EP3259873B1 (en) 2015-02-20 2018-12-12 Telefonaktiebolaget LM Ericsson (publ) Method of providing a hash value for a piece of data, electronic device and computer program
WO2016162094A1 (en) 2015-04-10 2016-10-13 Telefonaktiebolaget Lm Ericsson (Publ) Verification paths of leaves of a tree
US10205709B2 (en) 2016-12-14 2019-02-12 Visa International Service Association Key pair infrastructure for secure messaging
US11343245B2 (en) 2017-06-14 2022-05-24 Harman International Industries, Incorporated Systems and methods for security of network connected devices
KR102451524B1 (ko) * 2018-01-31 2022-10-06 케이블텔레비젼래버러토리즈,인코포레이티드 디지털 원장을 이용한 프라이버시 관리를 위한 시스템들 및 방법들
WO2020051332A1 (en) * 2018-09-06 2020-03-12 Gracenote, Inc. Methods and apparatus for efficient media indexing
US11315150B2 (en) 2019-05-08 2022-04-26 Data Vault Holdings, Inc. Portfolio driven targeted advertising network, system, and method
CN111414630B (zh) * 2020-03-05 2020-11-20 北京远盟普惠健康科技有限公司 一种精准体检的数据安全处理方法和处理系统

Family Cites Families (200)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5005200A (en) 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5563998A (en) 1990-10-19 1996-10-08 Moore Business Forms, Inc. Forms automation system implementation
EP0711480B1 (en) 1993-07-27 1997-06-11 International Business Machines Corporation Method and system for authenticated secure key distribution in a communication system
DE69312328T2 (de) 1993-09-20 1998-01-08 Ibm System und verfahren zur änderung des schlüssels oder des kennwortes in einem kommunikationsnetzwerk mit schlüssel- verteilung
US5689641A (en) 1993-10-01 1997-11-18 Vicor, Inc. Multimedia collaboration system arrangement for routing compressed AV signal through a participant site without decompressing the AV signal
US5371794A (en) 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
US5473691A (en) 1993-11-05 1995-12-05 Microsoft Corporation System and method for computer data transmission
US5787172A (en) 1994-02-24 1998-07-28 The Merdan Group, Inc. Apparatus and method for establishing a cryptographic link between elements of a system
US5511122A (en) 1994-06-03 1996-04-23 The United States Of America As Represented By The Secretary Of The Navy Intermediate network authentication
US5944794A (en) 1994-09-30 1999-08-31 Kabushiki Kaisha Toshiba User identification data management scheme for networking computer systems using wide area network
US5673319A (en) 1995-02-06 1997-09-30 International Business Machines Corporation Block cipher mode of operation for secure, length-preserving encryption
US6658568B1 (en) 1995-02-13 2003-12-02 Intertrust Technologies Corporation Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US5854898A (en) 1995-02-24 1998-12-29 Apple Computer, Inc. System for automatically adding additional data stream to existing media connection between two end points upon exchange of notifying and confirmation messages therebetween
US5784562A (en) 1995-10-10 1998-07-21 U S West Advanced Technologies, Inc. System for using a dialog session context to process electronic forms data on the world wide web
US6028938A (en) 1996-04-30 2000-02-22 Shana Corporation Secure electronic forms permitting layout revision
US5917480A (en) 1996-06-04 1999-06-29 Microsoft Corporation Method and system for interacting with the content of a slide presentation
JPH09326807A (ja) 1996-06-06 1997-12-16 Nec Corp 共有セルメモリ型atm交換制御方法及び共有セルメモリ型atm交換スイッチ
GB2318486B (en) 1996-10-16 2001-03-28 Ibm Data communications system
US6600823B1 (en) 1996-10-22 2003-07-29 Unisys Corporation Apparatus and method for enhancing check security
JPH10133576A (ja) 1996-10-31 1998-05-22 Hitachi Ltd 公開鍵暗号方法および装置
US6367012B1 (en) 1996-12-06 2002-04-02 Microsoft Corporation Embedding certifications in executable files for network transmission
US5892904A (en) 1996-12-06 1999-04-06 Microsoft Corporation Code certification for network transmission
US6632248B1 (en) 1996-12-06 2003-10-14 Microsoft Corporation Customization of network documents by accessing customization information on a server computer using uniquie user identifiers
US5848244A (en) * 1996-12-20 1998-12-08 Mci Communications Corporation System and method for time-based real-time reconfiguration of a network
US6154541A (en) 1997-01-14 2000-11-28 Zhang; Jinglong F Method and apparatus for a robust high-speed cryptosystem
US6108673A (en) 1997-02-25 2000-08-22 International Business Machines Corporation System for creating a form from a template that includes replication block
US6078700A (en) * 1997-03-13 2000-06-20 Sarachik; Karen B. Method and apparatus for location and inspecting a two-dimensional image including co-linear features
US5903721A (en) 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
BR9714592A (pt) 1997-03-21 2005-04-12 Canal & Sa Empresa De Telecomu Processo de baixa de dados para um conjunto receptor/decodificador mpeg e um sistema de transmissão mpeg para implementação do mesmo
US5746691A (en) 1997-06-06 1998-05-05 Global Therapeutics, Inc. Method for polishing surgical stents
US5987376A (en) 1997-07-16 1999-11-16 Microsoft Corporation System and method for the distribution and synchronization of data and state information between clients in a distributed processing system
US6279110B1 (en) 1997-11-10 2001-08-21 Certicom Corporation Masked digital signatures
US6148405A (en) 1997-11-10 2000-11-14 Phone.Com, Inc. Method and system for secure lightweight transactions in wireless data networks
US6163809A (en) 1997-12-08 2000-12-19 Microsoft Corporation System and method for preserving delivery status notification when moving from a native network to a foreign network
US6237035B1 (en) 1997-12-18 2001-05-22 International Business Machines Corporation System and method for preventing duplicate transactions in an internet browser/internet server environment
US6229806B1 (en) 1997-12-30 2001-05-08 Motorola, Inc. Authentication in a packet data system
US6807632B1 (en) * 1999-01-21 2004-10-19 Emc Corporation Content addressable information encapsulation, representation, and transfer
US6078948A (en) 1998-02-03 2000-06-20 Syracuse University Platform-independent collaboration backbone and framework for forming virtual communities having virtual rooms with collaborative sessions
US6088805A (en) 1998-02-13 2000-07-11 International Business Machines Corporation Systems, methods and computer program products for authenticating client requests with client certificate information
US6216110B1 (en) 1998-02-27 2001-04-10 Microsoft Corporation System and method for publishing calendar information to a publicly accessible location
US6108687A (en) 1998-03-02 2000-08-22 Hewlett Packard Company System and method for providing a synchronized display to a plurality of computers over a global computer network
US6308266B1 (en) 1998-03-04 2001-10-23 Microsoft Corporation System and method for enabling different grades of cryptography strength in a product
US6055236A (en) 1998-03-05 2000-04-25 3Com Corporation Method and system for locating network services with distributed network address translation
US7032242B1 (en) 1998-03-05 2006-04-18 3Com Corporation Method and system for distributed network address translation with network security features
US6529932B1 (en) 1998-04-01 2003-03-04 Microsoft Corporation Method and system for distributed transaction processing with asynchronous message delivery
US6101499A (en) 1998-04-08 2000-08-08 Microsoft Corporation Method and computer program product for automatically generating an internet protocol (IP) address
US6128738A (en) 1998-04-22 2000-10-03 International Business Machines Corporation Certificate based security in SNA data flows
US6175833B1 (en) 1998-04-22 2001-01-16 Microsoft Corporation System and method for interactive live online voting with tallies for updating voting results
US6247029B1 (en) 1998-05-01 2001-06-12 International Business Machines Corporation Web browser form enhancements
US6269099B1 (en) 1998-07-01 2001-07-31 3Com Corporation Protocol and method for peer network device discovery
US6615348B1 (en) 1999-04-16 2003-09-02 Intel Corporation Method and apparatus for an adapted digital signature
US6155840A (en) 1998-09-18 2000-12-05 At Home Corporation System and method for distributed learning
US6636899B1 (en) 1998-09-24 2003-10-21 Xerox Corporation Architecture for software for remote maintenance of a machine such as a copier
US6327652B1 (en) 1998-10-26 2001-12-04 Microsoft Corporation Loading and identifying a digital rights management operating system
US6363352B1 (en) 1998-11-13 2002-03-26 Microsoft Corporation Automatic scheduling and formation of a virtual meeting over a computer network
US6233606B1 (en) 1998-12-01 2001-05-15 Microsoft Corporation Automatic cache synchronization
US6367009B1 (en) 1998-12-17 2002-04-02 International Business Machines Corporation Extending SSL to a multi-tier environment using delegation of authentication and authority
US6578143B1 (en) 1998-12-18 2003-06-10 Qualcomm Incorporated Method for negotiating weakened keys in encryption systems
US6453357B1 (en) 1999-01-07 2002-09-17 Cisco Technology, Inc. Method and system for processing fragments and their out-of-order delivery during address translation
US20010013050A1 (en) 1999-01-11 2001-08-09 Shah Niraj A. Buddy list aggregation
US6615357B1 (en) 1999-01-29 2003-09-02 International Business Machines Corporation System and method for network address translation integration with IP security
US6526506B1 (en) 1999-02-25 2003-02-25 Telxon Corporation Multi-level encryption access point for wireless network
US6636888B1 (en) 1999-06-15 2003-10-21 Microsoft Corporation Scheduling presentation broadcasts in an integrated network environment
US6957346B1 (en) 1999-06-15 2005-10-18 Ssh Communications Security Ltd. Method and arrangement for providing security through network address translations using tunneling and compensations
US6397303B1 (en) 1999-06-24 2002-05-28 International Business Machines Corporation Data processing system, cache, and method of cache management including an O state for memory-consistent cache lines
US6405290B1 (en) 1999-06-24 2002-06-11 International Business Machines Corporation Multiprocessor system bus protocol for O state memory-consistent data
US6088700A (en) 1999-08-06 2000-07-11 Larsen; Kenneth N. Automated forms completion for global information network applications
US6675205B2 (en) 1999-10-14 2004-01-06 Arcessa, Inc. Peer-to-peer automated anonymous asynchronous file sharing
US20010010720A1 (en) 1999-11-12 2001-08-02 Kimball Bridget D. Multiple signature authentication in conditional access systems
US6526411B1 (en) 1999-11-15 2003-02-25 Sean Ward System and method for creating dynamic playlists
US6671804B1 (en) * 1999-12-01 2003-12-30 Bbnt Solutions Llc Method and apparatus for supporting authorities in a public key infrastructure
US6421673B1 (en) 1999-12-13 2002-07-16 Novient, Inc. Method for mapping applications and or attributes in a distributed network environment
GB2357407A (en) * 1999-12-17 2001-06-20 Int Computers Ltd Cryptographic key replacement using key lifetimes
US6598083B1 (en) 1999-12-30 2003-07-22 Intel Corporation System and method for communicating over a non-continuous connection with a device on a network
JP2001209304A (ja) 2000-01-24 2001-08-03 Nec Corp 暗号評価支援システム及びプログラムを記録した機械読み取り可能な記録媒体
US20010035976A1 (en) 2000-02-15 2001-11-01 Andrew Poon Method and system for online presentations of writings and line drawings
US6745178B1 (en) 2000-04-28 2004-06-01 International Business Machines Corporation Internet based method for facilitating networking among persons with similar interests and for facilitating collaborative searching for information
GB2365671A (en) 2000-05-17 2002-02-20 Ibm Teleconferencing system and method
US20040034794A1 (en) 2000-05-28 2004-02-19 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
EP1292872B2 (en) 2000-06-09 2018-12-19 Certicom Corp. A method for the application of implicit signature schemes
US6760762B2 (en) 2000-07-17 2004-07-06 Tele Services Solutions, Inc Intelligent network providing network access services (INP-NAS)
US6968179B1 (en) 2000-07-27 2005-11-22 Microsoft Corporation Place specific buddy list services
US6701344B1 (en) 2000-07-31 2004-03-02 The Boeing Company Distributed game environment
US6714966B1 (en) 2000-07-31 2004-03-30 The Boeing Company Information delivery service
US6789189B2 (en) * 2000-08-04 2004-09-07 First Data Corporation Managing account database in ABDS system
US7216233B1 (en) 2000-08-14 2007-05-08 Sun Microsystems, Inc. Apparatus, methods, and computer program products for filtering information
US6941384B1 (en) 2000-08-17 2005-09-06 International Business Machines Corporation Methods, systems and computer program products for failure recovery for routed virtual internet protocol addresses
CA2317081C (en) 2000-08-28 2004-06-01 Ibm Canada Limited-Ibm Canada Limitee Estimation of column cardinality in a partitioned relational database
JP2002077274A (ja) 2000-08-31 2002-03-15 Toshiba Corp ホームゲートウェイ装置、アクセスサーバ装置及び通信方法
GB2372846A (en) 2000-11-15 2002-09-04 Vhsoft I P Company Ltd Selective distribution of electronic files via a common access platform
US20020073204A1 (en) 2000-12-07 2002-06-13 Rabindranath Dutta Method and system for exchange of node characteristics for DATA sharing in peer-to-peer DATA networks
DE10062303C2 (de) 2000-12-14 2002-11-28 Layers Ag 7 Verfahren zum Betrieb eines Ad Hoc-Netzwerkes zur drahtlosen Datenübertragung von synchronen und asynchronen Nachrichten
US7925703B2 (en) 2000-12-26 2011-04-12 Numedeon, Inc. Graphical interactive interface for immersive online communities
US6791582B2 (en) 2000-12-29 2004-09-14 International Business Machines Corporation Method and system for identifying and displaying information that is new or has been updated in a place
US7020686B2 (en) 2000-12-29 2006-03-28 International Business Machines Corporation Method and system for providing synchronous communication and person awareness in a place
US7127676B2 (en) 2000-12-29 2006-10-24 International Business Machines Corporation Method and system for providing a separate browser window with information from the main window in a simpler format
US6941366B2 (en) 2001-01-17 2005-09-06 International Business Machines Corporation Methods, systems and computer program products for transferring security processing between processors in a cluster computing environment
US7146432B2 (en) 2001-01-17 2006-12-05 International Business Machines Corporation Methods, systems and computer program products for providing failure recovery of network secure communications in a cluster computing environment
AU2002234258A1 (en) 2001-01-22 2002-07-30 Sun Microsystems, Inc. Peer-to-peer network computing platform
US8472606B2 (en) 2001-02-27 2013-06-25 Verizon Data Services Llc Methods and systems for directory information lookup
GB2367986B (en) 2001-03-16 2002-10-09 Ericsson Telefon Ab L M Address mechanisms in internet protocol
US7065587B2 (en) 2001-04-02 2006-06-20 Microsoft Corporation Peer-to-peer name resolution protocol (PNRP) and multilevel cache for use therewith
US7203837B2 (en) 2001-04-12 2007-04-10 Microsoft Corporation Methods and systems for unilateral authentication of messages
US7272636B2 (en) 2001-04-24 2007-09-18 Sun Microsystems, Inc. Peer group name server
US7171415B2 (en) 2001-05-04 2007-01-30 Sun Microsystems, Inc. Distributed information discovery through searching selected registered information providers
US20030018701A1 (en) 2001-05-04 2003-01-23 Gregory Kaestle Peer to peer collaboration for supply chain execution and management
GB2378268B (en) 2001-06-04 2005-08-03 Gordon Ross A method of providing an interactive multi dimensional visual user interface to groups of users
FI111115B (fi) 2001-06-05 2003-05-30 Nokia Corp Menetelmä ja järjestelmä avainten vaihtoon tietoverkossa
US6801604B2 (en) 2001-06-25 2004-10-05 International Business Machines Corporation Universal IP-based and scalable architectures across conversational applications using web services for speech and audio processing resources
EP1278168B1 (en) * 2001-07-16 2006-11-29 Francotyp-Postalia GmbH Security module for an account management system
US7222187B2 (en) 2001-07-31 2007-05-22 Sun Microsystems, Inc. Distributed trust mechanism for decentralized networks
US20030036941A1 (en) 2001-08-17 2003-02-20 International Business Machines Corporation System and method for scheduling multiple meetings on an electronic calendar
WO2003019404A1 (en) 2001-08-30 2003-03-06 Riverhead Networks Inc. Protecting against distributed denial of service attacks
US7493363B2 (en) 2001-09-19 2009-02-17 Microsoft Corporation Peer-to-peer group management and method for maintaining peer-to-peer graphs
JP2003101570A (ja) 2001-09-21 2003-04-04 Sony Corp 通信処理システム、通信処理方法、およびサーバー装置、並びにコンピュータ・プログラム
US20030065934A1 (en) 2001-09-28 2003-04-03 Angelo Michael F. After the fact protection of data in remote personal and wireless devices
US7353247B2 (en) 2001-10-19 2008-04-01 Microsoft Corporation Querying applications using online messenger service
US20030083544A1 (en) 2001-10-25 2003-05-01 Catherine Richards Method and apparatus for finding love
JP3935712B2 (ja) 2001-11-21 2007-06-27 大日本印刷株式会社 クライアント装置、pinロック解除装置、およびpinロック解除方法
WO2003050998A1 (en) 2001-12-07 2003-06-19 Ntru Cryptosystems, Inc. Digital signature and authentication method and apparatus
US20030217096A1 (en) 2001-12-14 2003-11-20 Mckelvie Samuel J. Agent based application using data synchronization
JP3967589B2 (ja) 2001-12-28 2007-08-29 富士通株式会社 広告配信方法及び広告配信装置
US20030126027A1 (en) 2001-12-31 2003-07-03 Kimberly-Clark Worldwide Integrated web ring site and method for presenting information
US6996715B2 (en) 2002-01-03 2006-02-07 Lockheed Martin Corporation Method for identification of a user's unique identifier without storing the identifier at the identification site
US7500102B2 (en) 2002-01-25 2009-03-03 Microsoft Corporation Method and apparatus for fragmenting and reassembling internet key exchange data packets
US7865715B2 (en) 2002-02-28 2011-01-04 Hewlett-Packard Development Company, L.P. Increasing peer privacy
US6782294B2 (en) 2002-03-22 2004-08-24 Arecont Intellectual Property Holdings, Llc Internet based distributed control system
US20040128350A1 (en) 2002-03-25 2004-07-01 Lou Topfl Methods and systems for real-time virtual conferencing
US20030217106A1 (en) 2002-03-25 2003-11-20 Eytan Adar System and method for profiling clients within a system for harvesting community knowledge
US6912622B2 (en) 2002-04-15 2005-06-28 Microsoft Corporation Multi-level cache architecture and cache management method for peer-to-peer name resolution protocol
US7051102B2 (en) * 2002-04-29 2006-05-23 Microsoft Corporation Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
US20030204724A1 (en) 2002-04-30 2003-10-30 Microsoft Corporation Methods for remotely changing a communications password
US20030217073A1 (en) 2002-05-14 2003-11-20 Walther Dan E. Increasing the level of automation when scheduling and managing meetings
DE60323182D1 (de) * 2002-06-11 2008-10-09 Matsushita Electric Ind Co Ltd Authentifizierungssystem
US7120930B2 (en) 2002-06-13 2006-10-10 Nvidia Corporation Method and apparatus for control of security protocol negotiation
GB2391135B (en) 2002-06-28 2006-01-11 Nokia Corp User group creation
US7502945B2 (en) 2002-06-28 2009-03-10 Microsoft Corporation Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system
US7370197B2 (en) 2002-07-12 2008-05-06 Microsoft Corporation Method and system for authenticating messages
US20040111423A1 (en) 2002-07-13 2004-06-10 John Irving Method and system for secure, community profile generation and access via a communication system
AU2003240171A1 (en) 2002-07-15 2004-02-02 Nokia Corporation An ipv6 address ownership authentification based on zero-knowledge identification protocols or based on one time password
US20050076218A1 (en) 2002-07-17 2005-04-07 Collie Brown Cryptographic electronic gift certificate cross-reference to related applications
PA8575901A1 (es) 2002-07-18 2004-07-20 Pfizer Prod Inc Derivados de piperidina novedosos
US7392375B2 (en) 2002-09-18 2008-06-24 Colligo Networks, Inc. Peer-to-peer authentication for real-time collaboration
US7206934B2 (en) * 2002-09-26 2007-04-17 Sun Microsystems, Inc. Distributed indexing of identity information in a peer-to-peer network
US20040078436A1 (en) 2002-10-18 2004-04-22 International Business Machines Corporation Adding meeting information to a meeting notice
US7249123B2 (en) 2002-10-31 2007-07-24 International Business Machines Corporation System and method for building social networks based on activity around shared virtual objects
US7346770B2 (en) 2002-10-31 2008-03-18 Microsoft Corporation Method and apparatus for traversing a translation device with a security protocol
US9100218B2 (en) 2002-11-18 2015-08-04 Aol Inc. Enhanced buddy list interface
US20040143603A1 (en) 2002-11-21 2004-07-22 Roy Kaufmann Method and system for synchronous and asynchronous note timing in a system for enhancing collaboration using computers and networking
US20040199786A1 (en) 2002-12-02 2004-10-07 Walmsley Simon Robert Randomisation of the location of secret information on each of a series of integrated circuits
US8095409B2 (en) 2002-12-06 2012-01-10 Insors Integrated Communications Methods and program products for organizing virtual meetings
US7209948B2 (en) 2002-12-20 2007-04-24 International Business Machines, Corporation Collaborative review of distributed content
US20040122901A1 (en) 2002-12-20 2004-06-24 Nortel Networks Limited Providing computer presence information to an integrated presence system
US20040141005A1 (en) 2003-01-22 2004-07-22 International Business Machines Corporation System and method for integrating online meeting materials in a place
US7694136B2 (en) 2003-02-10 2010-04-06 International Business Machines Corporation Method for distributing and authenticating public keys using hashed password protection
FR2851704A1 (fr) 2003-02-20 2004-08-27 France Telecom Procede de gestion de presence selective pour service de messagerie instantanee au sein d'un reseau de telecommunication tel que le reseau internet
JP4517578B2 (ja) 2003-03-11 2010-08-04 株式会社日立製作所 ピアツーピア通信装置および通信方法
US7895338B2 (en) 2003-03-18 2011-02-22 Siemens Corporation Meta-search web service-based architecture for peer-to-peer collaboration and voice-over-IP
US7610487B2 (en) 2003-03-27 2009-10-27 Microsoft Corporation Human input security codes
US7624264B2 (en) 2003-03-27 2009-11-24 Microsoft Corporation Using time to determine a hash extension
US7409544B2 (en) 2003-03-27 2008-08-05 Microsoft Corporation Methods and systems for authenticating messages
US8261062B2 (en) 2003-03-27 2012-09-04 Microsoft Corporation Non-cryptographic addressing
US7304994B2 (en) 2003-04-09 2007-12-04 Nec Laboratories America, Inc. Peer-to-peer system and method with prefix-based distributed hash table
EP1473899A1 (en) 2003-04-28 2004-11-03 Telefonaktiebolaget LM Ericsson (publ) Security in a communications network
US8161094B2 (en) 2003-06-04 2012-04-17 Sony Computer Entertainment Inc. System and method for notification within decentralized network
EP2270622B1 (en) 2003-06-05 2016-08-24 Intertrust Technologies Corporation Interoperable systems and methods for peer-to-peer service orchestration
US7539771B2 (en) 2003-06-06 2009-05-26 Microsoft Corporation Organizational locality in prefix-based structured peer-to-peer overlays
US7337213B2 (en) 2003-06-19 2008-02-26 International Business Machines Corporation Method and apparatus for managing messages in a messaging session
US20050009537A1 (en) 2003-07-11 2005-01-13 Crocker Ronald T. Method and apparatus for facilitating wireless presence-based services
US20050027805A1 (en) 2003-07-15 2005-02-03 Aoki Norihiro Edwin Instant messaging and enhanced scheduling
US7512653B2 (en) 2003-08-11 2009-03-31 Sony Corporation System and method for dynamically grouping messaging buddies in an electronic network
CA2439582A1 (en) 2003-09-05 2005-03-05 Webtech Dezine Inc. Method, system and apparatus for internet-based sales generation
WO2005026872A2 (en) 2003-09-16 2005-03-24 Terassic-5 Infosec Ltd Internal lan perimeter security appliance composed of a pci card and complementary software
US7546343B2 (en) 2003-09-23 2009-06-09 Alcatel-Lucent Usa Inc. System and method for supporting virtual conferences
US7200638B2 (en) 2003-10-14 2007-04-03 International Business Machines Corporation System and method for automatic population of instant messenger lists
US8260857B2 (en) 2003-10-23 2012-09-04 Microsoft Corporation One to many data projection system and method
US20050091284A1 (en) 2003-10-23 2005-04-28 Microsoft Corporation Composite view
US20050102245A1 (en) 2003-11-07 2005-05-12 International Business Machines Corporation System, method, and service for negotiating schedules while preserving privacy through a shared representation
US7129891B2 (en) 2003-11-21 2006-10-31 Xerox Corporation Method for determining proximity of devices in a wireless network
US20050138393A1 (en) 2003-12-22 2005-06-23 Challener David C. Determining user security level using trusted hardware device
US20050198173A1 (en) 2004-01-02 2005-09-08 Evans Alexander W. System and method for controlling receipt of electronic messages
US20050160291A1 (en) 2004-01-16 2005-07-21 Sharp Laboratories Of America, Inc. System and method for securing network-connected resources
US7885901B2 (en) 2004-01-29 2011-02-08 Yahoo! Inc. Method and system for seeding online social network contacts
CA2457478A1 (en) 2004-02-12 2005-08-12 Opersys Inc. System and method for warranting electronic mail using a hybrid public key encryption scheme
US20050182928A1 (en) 2004-02-12 2005-08-18 Chandar Kamalanathan System and method for secure HTML links
AU2004201058B1 (en) * 2004-03-15 2004-09-09 Lockstep Consulting Pty Ltd Means and method of issuing Anonymous Public Key Certificates for indexing electronic record systems
US8880502B2 (en) 2004-03-15 2014-11-04 International Business Machines Corporation Searching a range in a set of values in a network with distributed storage entities
US7397766B2 (en) 2004-03-31 2008-07-08 Lucent Technologies Inc. High-speed traffic measurement and analysis methodologies and protocols
US20050228824A1 (en) 2004-04-01 2005-10-13 Gattuso Joseph A Intelligent consequence management system
EP1587239A1 (en) 2004-04-14 2005-10-19 Siemens Mobile Communications S.p.A. Method of and apparatus for server-side management of buddy lists
US7478120B1 (en) 2004-04-27 2009-01-13 Xiaohai Zhang System and method for providing a peer indexing service
WO2005122733A2 (en) 2004-06-09 2005-12-29 James Bergin Systems and methods for management of contact information
US7929689B2 (en) 2004-06-30 2011-04-19 Microsoft Corporation Call signs
US7925729B2 (en) 2004-12-07 2011-04-12 Cisco Technology, Inc. Network management
KR100651715B1 (ko) 2004-10-07 2006-12-01 한국전자통신연구원 차세대 인터넷에서 자동으로 주소를 생성하고 수락하는방법 및 이를 위한 데이터 구조
WO2006068450A1 (en) 2004-12-24 2006-06-29 Samsung Electronics Co., Ltd. System and method for providing mobility and secure tunnel using mobile internet protocol within internet key exchange protocol version 2
US20060265402A1 (en) 2005-05-20 2006-11-23 Andrew Edmond Grid network for distribution of files
US20070008987A1 (en) 2005-07-06 2007-01-11 Microsoft Corporation Capturing contacts via people near me
US7568106B2 (en) 2005-12-16 2009-07-28 International Business Machines Corporation Cooperative non-repudiated message exchange in a network environment
US20070192676A1 (en) 2006-02-13 2007-08-16 Bodin William K Synthesizing aggregated data of disparate data types into data of a uniform data type with embedded audio hyperlinks

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145642A (zh) * 2018-08-13 2019-01-04 晋商博创(北京)科技有限公司 基于cpk数字印章的数据存储方法、终端及数据库
CN109145642B (zh) * 2018-08-13 2020-11-10 晋商博创(北京)科技有限公司 基于cpk数字印章的数据存储方法、终端及数据库

Also Published As

Publication number Publication date
NO20084035L (no) 2008-10-15
MX2008013133A (es) 2008-10-21
RU2444054C2 (ru) 2012-02-27
WO2007124180A3 (en) 2007-12-13
CA2646331A1 (en) 2007-11-01
US8086842B2 (en) 2011-12-27
JP2009534940A (ja) 2009-09-24
CN101427234B (zh) 2011-02-23
US20070250700A1 (en) 2007-10-25
RU2008141720A (ru) 2010-04-27
WO2007124180A2 (en) 2007-11-01
EP2089808A2 (en) 2009-08-19
AU2007240567A1 (en) 2007-11-01
BRPI0710015A2 (pt) 2011-08-02
KR20090015026A (ko) 2009-02-11
AU2007240567B2 (en) 2011-07-21

Similar Documents

Publication Publication Date Title
CN101427234B (zh) 用于对等联系人交换的方法和系统
US12086799B2 (en) Method and system for zero-knowledge and identity based key management for decentralized applications
US10121143B1 (en) Method and system for blockchain-based combined identity, ownership, integrity and custody management
US11836717B2 (en) System and method for processing payments in fiat currency using blockchain and tethered tokens
CA3015695C (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
JP5016749B2 (ja) 認証された文書の電子的送信、格納および検索システムおよび方法
CN102932136B (zh) 用于管理加密密钥的系统和方法
EP1878190B1 (en) Method and device of enabling a user of an internet application access to protected information
CN101689989B (zh) 用于创建和确认密码保护文档的方法和装置
CN101331509A (zh) 包括可显示的声明的安全性令牌
US20120259635A1 (en) Document Certification and Security System
JP5065682B2 (ja) 名前解決のためのシステムおよび方法
JP7462903B2 (ja) 利用者端末、認証者端末、登録者端末、管理システムおよびプログラム
KR102051454B1 (ko) 조건 검증에 의한 블록체인 기반 의사결정 시스템
KR102666241B1 (ko) 하이브리드 스마트 컨트랙트를 이용한 디지털 저작물 및 저작권 관리 시스템 및 방법
KR102493093B1 (ko) 블록체인 기반의 내용증명 이메일 서비스 제공 장치 및 방법
EP4165577A1 (en) Internet data usage control system
Jinlert Certification authorities (CA) and public key infrastructure (PKI) for securing information
Beebe et al. Web Services Security: Proposed Model for Content Delivery Assurance in a Low Trust Scenario.
JP2005341201A (ja) 情報処理装置、サーバ装置及び電子データ入手先保全方法

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150430

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150430

Address after: Washington State

Patentee after: Micro soft technique license Co., Ltd

Address before: Washington State

Patentee before: Microsoft Corp.