Data protection transmission method of P2P network
A peer-to-peer network and data protection technology, applied in transmission systems, electrical components, etc., can solve problems such as inapplicable P2P network file transmission methods, and achieve the effect of simple and effective encryption process, protection of rights and interests, and prevention of hacker attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The present invention will be further described in detail below through specific embodiments and accompanying drawings.
[0044] figure 1 This is a schematic diagram of a message interaction flow according to an embodiment of the present invention. like figure 1 As shown, the data protection method of this embodiment involves four logical entities and three processes:
[0045] The four logical entities are entities that perform data processing based on a peer-to-peer network. It includes: a data publisher 101, an encryption server such as a content digital rights encryption and protection technology (DRM) server 102, a data requesting client client A 103, and a client B 104 for indirect data transmission in a peer-to-peer network.
[0046] The three processes mainly include an encryption process 11 , a registration process 12 , and a data acquisition and decryption process 13 .
[0047] Encryption process 11, through which the data issuer 101 completes fragmentation...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com