JP2011503936A - ピアツーピアネットワーク - Google Patents
ピアツーピアネットワーク Download PDFInfo
- Publication number
- JP2011503936A JP2011503936A JP2010530441A JP2010530441A JP2011503936A JP 2011503936 A JP2011503936 A JP 2011503936A JP 2010530441 A JP2010530441 A JP 2010530441A JP 2010530441 A JP2010530441 A JP 2010530441A JP 2011503936 A JP2011503936 A JP 2011503936A
- Authority
- JP
- Japan
- Prior art keywords
- peer
- network
- peers
- police
- malicious
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims description 16
- 230000008569 process Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 description 9
- 238000011835 investigation Methods 0.000 description 5
- 238000013475 authorization Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006641 stabilisation Effects 0.000 description 1
- 238000011105 stabilization Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
- H04L67/1046—Joining mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1087—Peer-to-peer [P2P] networks using cross-functional networking aspects
- H04L67/1093—Some peer nodes performing special functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
- H04L63/064—Hierarchical key distribution, e.g. by multi-tier trusted parties
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
・ その任務を果たすためにネットワーク内の任意の位置を占めることができる。
・ 見えない方法でネットワーク内の他のピアと同じ任務を果たす(例えば、データの保存、メッセージの転送など)。
・ ネットワークの問題、例えば、他の悪意あるピアの攻撃などを分析してほしい旨の訴えを他のピアから受けることができる。
・ 状況を分析し、必要ならば他のポリスピアと協力して悪意あるピアを突き止めるための調査を開始する。
・ 協力を行い、安全なデータ保存及び通信を行うために追加オーバーレイネットワークによって相互接続される。
・ ネットワークから悪意あるピアの隔離を、例えば、証明書を撤回することにより行うことができる。
・ 保証された信頼性を有するピアのプールから選ばれるべきである。
・ 例えば、証明検証クエリに応答するために中央ユニットの代りに動作する代行機能のスケーラブルチームの一部であってよい。
・ 例えば、ブートストラップピア及びNATトラバーサル方式(TURN、STUN)などの各種信頼性関連のサービス用のピアであってよい。
Claims (5)
- ピアツーピアネットワーク(100)であって、
一般ピア(0、7、10、15、20、28)、及び推定の悪意あるピア(7)の機能をチェックすることによりネットワーク(100)内でセキュリティを提供する少なくとも1つのポリスピア(4、9、23)、及び
ネットワーク(100)の構造化オーバーレイ内でピア(0、4、7、9、10、15、20、23、28)の証明及び位置付けを管理するための中央認証局(110)
からなるピアツーピアネットワーク(100)。 - 請求項1記載のピアツーピアネットワークであって、ピア(0、4、7、9、10、15、20、23、28)が新規ピア(7)の結合プロセス中にのみ認証局(110)と通信するように構成されたことを特徴とするピアツーピアネットワーク。
- 請求項1記載のピアツーピアネットワークであって、前記少なくとも1つのポリスピア(4、9、23)の証明書が一般ピア(0、7、10、15、20、28)の一般署名及びそれに加えてポリス署名を含むことを特徴とするピアツーピアネットワーク。
- 請求項1記載のピアツーピアネットワークであって、複数のポリスピア(4、9、23)が追加オーバーレイネットワーク(140)内で相互接続されることを特徴とするピアツーピアネットワーク。
- 請求項1記載のピアツーピアネットワークであって、複数のポリスピア(4、9、23)によって推定の悪意あるピア(7)を囲むように構成されたピアツーピアネットワーク。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP07291326.2 | 2007-11-05 | ||
EP07291326A EP2056563B1 (en) | 2007-11-05 | 2007-11-05 | Peer-to-peer network |
PCT/EP2008/064282 WO2009059895A1 (en) | 2007-11-05 | 2008-10-22 | Peer-to-peer network |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2011503936A true JP2011503936A (ja) | 2011-01-27 |
JP5000763B2 JP5000763B2 (ja) | 2012-08-15 |
Family
ID=39323007
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2010530441A Expired - Fee Related JP5000763B2 (ja) | 2007-11-05 | 2008-10-22 | ピアツーピアネットワーク |
Country Status (8)
Country | Link |
---|---|
US (1) | US8683551B2 (ja) |
EP (1) | EP2056563B1 (ja) |
JP (1) | JP5000763B2 (ja) |
KR (1) | KR101250295B1 (ja) |
CN (1) | CN101431529B (ja) |
ES (1) | ES2394107T3 (ja) |
PL (1) | PL2056563T3 (ja) |
WO (1) | WO2009059895A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012512617A (ja) * | 2008-12-22 | 2012-05-31 | クアルコム,インコーポレイテッド | ピアツーピア・ネットワークのための分散ハッシュテーブルにおけるセキュリティで保護されたノード識別子割当て |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10764748B2 (en) * | 2009-03-26 | 2020-09-01 | Qualcomm Incorporated | Apparatus and method for user identity authentication in peer-to-peer overlay networks |
GB2489676A (en) * | 2011-03-29 | 2012-10-10 | Sigmoid Solutions Ltd | Overlay network comprising management node controlling access of subordinate nodes |
MY167516A (en) * | 2012-12-11 | 2018-09-04 | Mimos Berhad | A system and method for peer-to-peer entity authentication with nearest neighbours credential delegation |
US10305748B2 (en) | 2014-05-19 | 2019-05-28 | The Michael Harrison Tretter Auerbach Trust | Dynamic computer systems and uses thereof |
US10666735B2 (en) | 2014-05-19 | 2020-05-26 | Auerbach Michael Harrison Tretter | Dynamic computer systems and uses thereof |
US9742853B2 (en) | 2014-05-19 | 2017-08-22 | The Michael Harrison Tretter Auerbach Trust | Dynamic computer systems and uses thereof |
US11567818B2 (en) * | 2016-04-26 | 2023-01-31 | Akimbo Technologies Inc. | Method of detecting faults in a fault tolerant distributed computing network system |
US9813659B1 (en) * | 2016-05-11 | 2017-11-07 | Drone Racing League, Inc. | Diversity receiver |
US11005879B2 (en) * | 2017-06-29 | 2021-05-11 | Webroot Inc. | Peer device protection |
CN111654500A (zh) * | 2020-06-05 | 2020-09-11 | 杭州安恒信息技术股份有限公司 | 多维度网站可信度检测方法、装置和计算机设备 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006261880A (ja) * | 2005-03-16 | 2006-09-28 | Hitachi Ltd | ネットワーク通信方法およびネットワークシステム |
JP2008529434A (ja) * | 2005-02-01 | 2008-07-31 | ノキア シーメンス ネットワークス ゲゼルシャフト ミット ベシュレンクテル ハフツング ウント コンパニー コマンディトゲゼルシャフト | 分散型ネットワークにおけるネットワークエレメントの制御方法および制御装置 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7222187B2 (en) * | 2001-07-31 | 2007-05-22 | Sun Microsystems, Inc. | Distributed trust mechanism for decentralized networks |
US8037202B2 (en) * | 2002-10-31 | 2011-10-11 | Oracle America, Inc. | Presence detection using mobile agents in peer-to-peer networks |
US7328243B2 (en) * | 2002-10-31 | 2008-02-05 | Sun Microsystems, Inc. | Collaborative content coherence using mobile agents in peer-to-peer networks |
US8108455B2 (en) * | 2002-10-31 | 2012-01-31 | Oracle America, Inc. | Mobile agents in peer-to-peer networks |
US7254608B2 (en) * | 2002-10-31 | 2007-08-07 | Sun Microsystems, Inc. | Managing distribution of content using mobile agents in peer-topeer networks |
US7395536B2 (en) * | 2002-11-14 | 2008-07-01 | Sun Microsystems, Inc. | System and method for submitting and performing computational tasks in a distributed heterogeneous networked environment |
US7761569B2 (en) * | 2004-01-23 | 2010-07-20 | Tiversa, Inc. | Method for monitoring and providing information over a peer to peer network |
US7350074B2 (en) * | 2005-04-20 | 2008-03-25 | Microsoft Corporation | Peer-to-peer authentication and authorization |
US8316104B2 (en) * | 2005-11-15 | 2012-11-20 | California Institute Of Technology | Method and apparatus for collaborative system |
US8046490B1 (en) * | 2009-03-12 | 2011-10-25 | Google Inc. | System and method for enhancing network security |
EP2583211B1 (en) * | 2010-06-15 | 2020-04-15 | Oracle International Corporation | Virtual computing infrastructure |
-
2007
- 2007-11-05 PL PL07291326T patent/PL2056563T3/pl unknown
- 2007-11-05 ES ES07291326T patent/ES2394107T3/es active Active
- 2007-11-05 EP EP07291326A patent/EP2056563B1/en not_active Not-in-force
-
2008
- 2008-10-22 KR KR1020107009868A patent/KR101250295B1/ko active IP Right Grant
- 2008-10-22 WO PCT/EP2008/064282 patent/WO2009059895A1/en active Application Filing
- 2008-10-22 JP JP2010530441A patent/JP5000763B2/ja not_active Expired - Fee Related
- 2008-11-04 US US12/264,715 patent/US8683551B2/en active Active
- 2008-11-04 CN CN200810174335.XA patent/CN101431529B/zh not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008529434A (ja) * | 2005-02-01 | 2008-07-31 | ノキア シーメンス ネットワークス ゲゼルシャフト ミット ベシュレンクテル ハフツング ウント コンパニー コマンディトゲゼルシャフト | 分散型ネットワークにおけるネットワークエレメントの制御方法および制御装置 |
JP2006261880A (ja) * | 2005-03-16 | 2006-09-28 | Hitachi Ltd | ネットワーク通信方法およびネットワークシステム |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012512617A (ja) * | 2008-12-22 | 2012-05-31 | クアルコム,インコーポレイテッド | ピアツーピア・ネットワークのための分散ハッシュテーブルにおけるセキュリティで保護されたノード識別子割当て |
US9344438B2 (en) | 2008-12-22 | 2016-05-17 | Qualcomm Incorporated | Secure node identifier assignment in a distributed hash table for peer-to-peer networks |
Also Published As
Publication number | Publication date |
---|---|
PL2056563T3 (pl) | 2013-04-30 |
US8683551B2 (en) | 2014-03-25 |
EP2056563B1 (en) | 2012-09-26 |
CN101431529B (zh) | 2014-12-24 |
KR20100057701A (ko) | 2010-05-31 |
WO2009059895A1 (en) | 2009-05-14 |
CN101431529A (zh) | 2009-05-13 |
JP5000763B2 (ja) | 2012-08-15 |
KR101250295B1 (ko) | 2013-04-03 |
ES2394107T3 (es) | 2013-01-21 |
US20090119747A1 (en) | 2009-05-07 |
EP2056563A1 (en) | 2009-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5000763B2 (ja) | ピアツーピアネットワーク | |
KR101260188B1 (ko) | 피어투피어 네트워크에 대한 분산 해시 테이블에서의 보안 노드 식별자 할당 | |
Awerbuch et al. | Group spreading: A protocol for provably secure distributed name service | |
AU2004202255A1 (en) | Peer-to-peer name resolution wire protocol and message format data structure for use therein | |
MX2012015175A (es) | Sistema y metodo para mensajeria segura en una red hibrida entre iguales. | |
JP2009501454A (ja) | リンク管理システム | |
Aiello et al. | Tempering Kademlia with a robust identity based system | |
Rossberg et al. | Distributed automatic configuration of complex ipsec-infrastructures | |
CN110971506B (zh) | 一种去中心化实时集群通讯方法、装置、设备及系统 | |
Ford | UIA: A global connectivity architecture for mobile personal devices | |
Bryan et al. | The design of a versatile, secure P2PSIP communications architecture for the public internet | |
Fessi et al. | A cooperative sip infrastructure for highly reliable telecommunication services | |
Wang | Attacks against peer-to-peer networks and countermeasures | |
CN101471938A (zh) | 一种点对点p2p网络中的认证方法、系统和装置 | |
CN101510892A (zh) | 用于网络通信系统的命名服务方案及利用其实现的通信方法 | |
Trossen et al. | Impact of Distributed Ledgers on Provider Networks | |
JP4992335B2 (ja) | ポリシーファイルの分配方法およびコミュニティシステム | |
Khan et al. | SecP2PSIP: A Distributed Overlay Architecture for Secure P2PSIP | |
Manner et al. | Seamless service interworking of ad-hoc networks and the Internet | |
del Campo et al. | Providing security services in a multiprotocol service discovery system for ubiquitous networks | |
Arnedo-Moreno et al. | JXTA security in basic peer operations | |
Gu et al. | Random visitor: A defense against identity attacks in P2P overlay networks | |
Heiler et al. | Peer-to-Peer Matrix | |
Cormier et al. | Approaches to Securing P2PSIP in MANETs | |
del Campo et al. | Providing Security Services in a Resource Discovery System. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20110920 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20110928 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20111227 |
|
A602 | Written permission of extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A602 Effective date: 20120110 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20120328 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20120418 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20120516 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 5000763 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20150525 Year of fee payment: 3 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |