Method for evaluating and authorizing peer-to-peer network node by certificate

A network node and certificate technology, applied in the direction of user identity/authority verification, public key of secure communication, electrical components, etc., can solve the problems of complex evaluation algorithm, affecting authorization security, incomplete acquisition of historical interaction experience, etc. The effect of improving security and reducing storage space

Inactive Publication Date: 2008-12-31
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still some problems
For example, the evaluation algorithm is complicated, the acquisition of historical interaction experience is incomplete, the interaction experience takes up a large storage space,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for evaluating and authorizing peer-to-peer network node by certificate
  • Method for evaluating and authorizing peer-to-peer network node by certificate
  • Method for evaluating and authorizing peer-to-peer network node by certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The method of using certificates to evaluate and authorize peer-to-peer network nodes is that resource providers make authorization decisions based on the level of authorization certificates held by nodes and the level of resources requested by resource requesters; After the end, directly use the evaluation certificate to evaluate the performance of the other party; when the node logs in next time, first exchange the obtained evaluation certificate and the remaining authorization certificate to the super node where it is located, and obtain a new certificate time stamp. transactions; details are as follows:

[0038] Step 1. Node registration, obtain initial evaluation certificate and authority certificate

[0039] Nodes A and B select CA to send a registration request, and the CA node judges whether node A and node B have passed the registration according to the joining requirements of the system. For registered nodes, assign node IDs and assign initial authority certi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for carrying out evaluation and authorization to nodes in a peer-to-peer network by applying a certificate, which provides a safety-oriented authorization scheme in the peer-to-peer network, takes advantage of the features such as the strong dynamism of the peer-to-peer network and the strong independence of the nodes, etc., adopts the authorization scheme that associates evaluation with permission and essentially solves the problem of safe authorization in distributed computation. The method of the invention comprises the steps that: according to the levels of the authority certificate hold by the nodes and the levels of resources that are asked to be accessed by resource requesters, authorized decision-making is carried out by a resource provider; after transaction is finished, the resource providers and the resource requesters directly adopt the certificate to evaluate the performance of the other party; when a node logs in next time, the obtained evaluation certificate and the left authorization certificates are exchanged on a super node firstly so as to obtain the timestamp of a new certificate, continue the afterwards transaction, and improve evaluation rationality and authorization security carried out to node behavior in the peer-to-peer computing field. Compared with other evaluation and authorization schemes, the scheme of the invention is characterized by simplicity and safety, etc..

Description

technical field [0001] The present invention proposes an authorization scheme that focuses on security in the peer-to-peer network, utilizes the characteristics of peer-to-peer network nodes such as strong dynamics and strong node autonomy, and adopts an authorization scheme associated with evaluation and authority, which is mainly used to solve distributed computing The security authorization problem in , belongs to the field of distributed computing security. Background technique [0002] Peer-to-peer computing is a typical distributed computing technology that can make full use of scattered idle resources at the edge of the network, such as computing power resources, storage resources, and data resources of nodes, to promote resource sharing, cooperative computing, and information interaction. With the continuous improvement of network bandwidth and the rapid development of computer technology, P2P technology is gradually applied to the fields of file sharing, instant mes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04L29/08H04L29/06
Inventor 王汝传韩志杰赵慧娟李玲娟支萌萌徐小龙吴敏饶元李致远
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products