Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protection transmission method of P2P network

A peer-to-peer network and data protection technology, applied in transmission systems, electrical components, etc., can solve problems such as inapplicable P2P network file transmission methods, and achieve the effect of simple and effective encryption process, protection of rights and interests, and prevention of hacker attacks

Inactive Publication Date: 2011-10-26
新疆新颖电子科技有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But for P2P networks, the file receiving end not only obtains file slices from the seed server or file server, but more importantly, it can also obtain file slices from other online clients, that is to say, the URL of the file slice is not fixed on the seed server or file server. However, it changes dynamically with the change of the shared client. Therefore, the above-mentioned processing solution in the prior art can only be applied to the file download method of the client / server in essence, and is not suitable for the file transfer method of the P2P network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection transmission method of P2P network
  • Data protection transmission method of P2P network
  • Data protection transmission method of P2P network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described in detail below through specific embodiments and accompanying drawings.

[0044] figure 1 This is a schematic diagram of a message interaction flow according to an embodiment of the present invention. like figure 1 As shown, the data protection method of this embodiment involves four logical entities and three processes:

[0045] The four logical entities are entities that perform data processing based on a peer-to-peer network. It includes: a data publisher 101, an encryption server such as a content digital rights encryption and protection technology (DRM) server 102, a data requesting client client A 103, and a client B 104 for indirect data transmission in a peer-to-peer network.

[0046] The three processes mainly include an encryption process 11 , a registration process 12 , and a data acquisition and decryption process 13 .

[0047] Encryption process 11, through which the data issuer 101 completes fragmentation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a data protection transmission method for peer-to-peer network. The method has an encryption server arranged in a peer-to-peer network, and comprises following the steps that: A. a data publication party sends data needing to be published to the encryption server; B. the encryption server encrypts the data needing to be published, saves a corresponding key and returns the encrypted data to the data publication party; C. the data publication party publishes the encrypted data in different pieces; D. a data request client collects the published encrypted data pieces through the peer-to-peer network; the data request client acquires the corresponding key from the encryption server and decrypts the collected encrypted data pieces according to the key. The present invention can be applicable to the characteristics of the peer-to-peer network, improve the data transmission security of the peer-to-peer network, prevent hackers from attacking the peer-to-peer network data and guarantee the rights and benefits of data owners and users.

Description

technical field [0001] The present invention relates to encryption technology of data communication, in particular to a data protection transmission method of point-to-point (P2P) network. Background technique [0002] At present, with the development of broadband Internet technology, point-to-point transmission technology is more and more widely used due to its low cost, strong network connectivity and high scalability. In such a distributed network, network participants share hardware and network resources, and they are both resource providers and resource acquirers. In this way, it not only solves the problem of excessive dependence on servers in the original client / server network architecture. In addition, it also enriches the program source, allowing users to have more choices. [0003] However, due to the characteristics of peer-to-peer networks, the security of data transmitted on peer-to-peer networks is relatively low, which makes peer-to-peer networks very vulnera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 何康
Owner 新疆新颖电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products