Data protection transmission method of P2P network

A peer-to-peer network and data protection technology, applied in transmission systems, electrical components, etc., can solve problems such as inappropriate P2P network file transmission methods, achieve simple and effective encryption process, avoid redundant processing, and prevent hacker attacks.

Inactive Publication Date: 2008-07-16
新疆新颖电子科技有限公司
View PDF1 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But for P2P networks, the file receiving end not only obtains file slices from the seed server or file server, but more importantly, it can also obtain file slices from other online clients, that is to say, the URL of the file slice is not fixed on the seed server or file server. However, it changes dynamically with the change of the shared client. Therefore, the above-mentioned processing solution in the prior art can only be applied to the file download method of the client / server in essence, and is not suitable for the file transfer method of the P2P network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection transmission method of P2P network
  • Data protection transmission method of P2P network
  • Data protection transmission method of P2P network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described in detail below through specific embodiments and accompanying drawings.

[0044] FIG. 1 is a schematic diagram of a message interaction process according to an embodiment of the present invention. As shown in Figure 1, the data protection method of this embodiment involves four logical entities and three processes:

[0045] The four logical entities are entities that process data based on a point-to-point network. Including: a data publisher 101, an encryption server such as a content digital copyright encryption protection technology (DRM) server 102, a data request client, namely client A 103, and a client B 104 for indirect data transmission in a peer-to-peer network.

[0046] The three processes mainly include an encryption process 11 , a registration process 12 , and a data acquisition and decryption process 13 .

[0047] Encryption process 11, through which the data publisher 101 completes fragmentation and encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a data protection transmission method for peer-to-peer network. The method has an encryption server arranged in a peer-to-peer network, and comprises following the steps that: A. a data publication party sends data needing to be published to the encryption server; B. the encryption server encrypts the data needing to be published, saves a corresponding key and returns the encrypted data to the data publication party; C. the data publication party publishes the encrypted data in different pieces; D. a data request client collects the published encrypted data pieces through the peer-to-peer network; the data request client acquires the corresponding key from the encryption server and decrypts the collected encrypted data pieces according to the key. The present invention can be applicable to the characteristics of the peer-to-peer network, improve the data transmission security of the peer-to-peer network, prevent hackers from attacking the peer-to-peer network data and guarantee the rights and benefits of data owners and users.

Description

technical field [0001] The invention relates to an encryption technology for data communication, in particular to a data protection transmission method of a peer-to-peer (P2P) network. Background technique [0002] At present, with the development of broadband Internet technology, point-to-point transmission technology has been more and more widely used due to its characteristics of low cost, strong network connectivity and high scalability. In such a distributed network, network participants share hardware and network resources, and are both resource providers and resource acquirers. In this way, it not only solves the problem of over-reliance on servers in the original client / server network architecture It solves problems such as low rate, and also enriches the source of programs, allowing users to choose more. [0003] However, because of the characteristics of the peer-to-peer network, the security of data transmitted on the peer-to-peer network is relatively low, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 何康
Owner 新疆新颖电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products