DE602006005014D1 - Netzwerkinformationen in einem Peer-to-Peer Netzwerk - Google Patents

Netzwerkinformationen in einem Peer-to-Peer Netzwerk

Info

Publication number
DE602006005014D1
DE602006005014D1 DE602006005014T DE602006005014T DE602006005014D1 DE 602006005014 D1 DE602006005014 D1 DE 602006005014D1 DE 602006005014 T DE602006005014 T DE 602006005014T DE 602006005014 T DE602006005014 T DE 602006005014T DE 602006005014 D1 DE602006005014 D1 DE 602006005014D1
Authority
DE
Germany
Prior art keywords
peer
key
encrypted
network
value pair
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
DE602006005014T
Other languages
German (de)
English (en)
Inventor
John L Miller
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/063,769 external-priority patent/US7849303B2/en
Priority claimed from US11/064,142 external-priority patent/US8365301B2/en
Priority claimed from US11/063,768 external-priority patent/US20060190715A1/en
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of DE602006005014D1 publication Critical patent/DE602006005014D1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • H04L9/0833Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1061Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
    • H04L67/1065Discovery involving distributed pre-established resource-based relationships among peers, e.g. based on distributed hash tables [DHT] 

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
DE602006005014T 2005-02-22 2006-02-21 Netzwerkinformationen in einem Peer-to-Peer Netzwerk Active DE602006005014D1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/063,769 US7849303B2 (en) 2005-02-22 2005-02-22 Peer-to-peer network information storage
US11/064,142 US8365301B2 (en) 2005-02-22 2005-02-22 Peer-to-peer network communication
US11/063,768 US20060190715A1 (en) 2005-02-22 2005-02-22 Peer-to-peer network information retrieval

Publications (1)

Publication Number Publication Date
DE602006005014D1 true DE602006005014D1 (de) 2009-03-19

Family

ID=36589105

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602006005014T Active DE602006005014D1 (de) 2005-02-22 2006-02-21 Netzwerkinformationen in einem Peer-to-Peer Netzwerk

Country Status (4)

Country Link
EP (1) EP1694027B1 (enExample)
JP (1) JP2006236349A (enExample)
AT (1) ATE422131T1 (enExample)
DE (1) DE602006005014D1 (enExample)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008033552A2 (en) * 2006-09-12 2008-03-20 Iwatchnow Inc. System and method for distributed media streaming and sharing
EP1906616A1 (de) * 2006-09-29 2008-04-02 Nokia Siemens Networks Gmbh & Co. Kg Verfahren zur geschützten Einbindung zumindest eines Netzelementes in ein Peer-to-Peer-Netzwerk
GB2446199A (en) 2006-12-01 2008-08-06 David Irvine Secure, decentralised and anonymous peer-to-peer network
US8281023B2 (en) * 2008-11-14 2012-10-02 Qualcomm Incorporated Systems and methods for data authorization in distributed storage networks
JP5061167B2 (ja) * 2009-09-08 2012-10-31 株式会社野村総合研究所 クラウドコンピューティングシステム
EP2548328A1 (en) * 2010-05-14 2013-01-23 Siemens Aktiengesellschaft Method of group key generation and management for generic object oriented substantiation events model
US8516607B2 (en) * 2011-05-23 2013-08-20 Qualcomm Incorporated Facilitating data access control in peer-to-peer overlay networks
DE102014203813A1 (de) 2014-02-28 2015-09-03 Siemens Aktiengesellschaft Verwendung von Zertifikaten mittels einer Positivliste
MX2018010056A (es) * 2016-02-23 2019-01-21 Nchain Holdings Ltd Un metodo y sistema para asegurar software de computadora usando un cuadro hash distribuido y una cadena de bloques.
US10754968B2 (en) 2016-06-10 2020-08-25 Digital 14 Llc Peer-to-peer security protocol apparatus, computer program, and method
WO2025243395A1 (ja) * 2024-05-21 2025-11-27 Ntt株式会社 演算処理装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8204992B2 (en) * 2002-09-26 2012-06-19 Oracle America, Inc. Presence detection using distributed indexes in peer-to-peer networks
US7577999B2 (en) * 2003-02-11 2009-08-18 Microsoft Corporation Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system

Also Published As

Publication number Publication date
JP2006236349A (ja) 2006-09-07
EP1694027B1 (en) 2009-01-28
EP1694027A1 (en) 2006-08-23
ATE422131T1 (de) 2009-02-15

Similar Documents

Publication Publication Date Title
Yao et al. Privacy-preserving max/min query in two-tiered wireless sensor networks
Cranston et al. Regular graphs of odd degree are antimagic
ATE532144T1 (de) Dokumentsicherheitsverwaltungssystem
EP4235475A3 (en) Systems and methods of database encryption in a multitenant database management system
DE602006005014D1 (de) Netzwerkinformationen in einem Peer-to-Peer Netzwerk
WO2009155473A3 (en) Information rights management
Xi et al. Privacy preserving shortest path routing with an application to navigation
JP6961324B2 (ja) 検索可能暗号処理システム
WO2007092658B1 (en) Method of transferring digital rights
WO2007031955A3 (en) Cryptographic role-based access control
WO2008124201A3 (en) Secure file encryption
DE602007005457D1 (de) Vor-ablauf-ausräumung von authentifikationsschlüsselkontexten
WO2006049904A3 (en) Distributed data consolidation network
Ocansey et al. Dynamic searchable encryption with privacy protection for cloud computing
CN107294701B (zh) 具有高效密钥管理的多维密文区间查询装置及查询方法
Grassi et al. Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE
GB0709764D0 (en) Anonymous Authentication
Guo et al. Order‐Revealing Encryption Scheme with Comparison Token for Cloud Computing
Marshall et al. Circumference and pathwidth of highly connected graphs
KR20200088180A (ko) 블록체인 기반의 다수의 사용자 간의 자료 공유 서비스를 위한 자료 관리 방법
WO2009030864A3 (fr) Base de donnees distribuee
WO2008026184A3 (en) Method of key management
Ren et al. Neutral operator and neutral differential equation
Li Positive Periodic Solutions of Second‐Order Differential Equations with Delays
Bitner et al. Brachiopoda

Legal Events

Date Code Title Description
8364 No opposition during term of opposition