Device and control method for central authorization control in P2P file transfer
A technology of file transmission and authorization control, which is applied in the transmission system, digital transmission system, data exchange through path configuration, etc., can solve the problem of unable to control the authority of the transmitter, achieve reliable data integrity, resist information leakage, and high security sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] In this embodiment, we propose a new and improved method to realize the central authorization control function in the P2P transmission process in the non-centralized directory mode.
[0043] For the P2P file transfer mode of the non-centralized directory mode, that is, multiple nodes (Peers) of the group do not use the central directory server, but use a full peer-to-peer structure: each node records the IP addresses of multiple other nodes, Breadth-first or depth-first search is carried out by covering the network. After a certain range is searched, the result matching the search condition is returned to the user, and the file is directly exchanged between two nodes (Peers).
[0044] A device for performing central authorization control in P2P file transmission in this embodiment includes a plurality of nodes composed of multiple client computers participating in P2P file transmission, and the nodes perform data interaction through a communication network, Each client ...
Embodiment 2
[0082] In this embodiment, we propose a new and improved method to realize the central authorization control function in the P2P transmission process of the centralized directory mode.
[0083] The difference between this embodiment and Embodiment 1 is that a device for performing central authorization control in P2P file transmission in this embodiment also includes a central directory server used by multiple nodes, and the central directory server includes a single or multiple CPUs and memory devices, and the central directory server performs data interaction with each login node through a communication network.
[0084] As shown in Figure 3, a kind of method for central authorization control in the P2P file transmission of this embodiment comprises the following steps:
[0085] Step 1: Node A logs in to the ticket server;
[0086] Step 2: Node A logged in to the ticket server generates a pair of temporary keys (public key Ktu+private key Kti);
[0087] Step 3: The ticket ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 