Identification authentication method between peer-to-peer user nodes in P2P network

A P2P network and peer-to-peer user technology, applied in the field of identity authentication between user nodes, can solve problems such as huge loads, reduce pressure, simplify the process, and achieve simple effects

Inactive Publication Date: 2009-05-27
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to overcome the identity verification method in the prior art, which brings huge load to the server due to the need

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication method between peer-to-peer user nodes in P2P network
  • Identification authentication method between peer-to-peer user nodes in P2P network
  • Identification authentication method between peer-to-peer user nodes in P2P network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0035] The present invention will be further described below in conjunction with the drawings and specific embodiments.

[0036] In order to facilitate understanding, in an embodiment of the present invention, a simple P2P network is taken as an example to illustrate how to implement the method of the present invention. Such as figure 2 As shown, in this P2P network, there are two user nodes, user node A and user node B, user nodes A and B are connected through the network, and there is another user node on the network. Point A and B are connected to the authentication server. There are asymmetric encryption algorithms on user node A, user node B, and authentication server. The user nodes in the P2P network will get their own certificates during the login process, which can be used to achieve mutual identity authentication. reference image 3 , First, the process of obtaining the user node certificate is explained.

[0037] A user node, suppose it is user node A, enter the user n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for authenticating identification among peer-to-peer nodes in a P2P network. Each peer-to-peer node in the P2P network has a certificate which is acquired when a user node logs on the network through a certificate server, and the certificate comprises an encryption result of a private key of the certificate server to a public key of the user node. The method comprises the following steps: a first user node transmits an identification authentication message to a second user node in the network, wherein the identification authentication message comprises a certificate of the first user node and the public key of the first user node; a second user node authenticates identification of the first user node by the identification authentication message, after authentication succeeds, the identification authentication message is returned to the first user node, wherein the identification authentication message comprises a certificate of the second user node and the public key of the second user node; and the first user node authenticates the identification of the second user node by the identification authentication message returned by the second user node, and if the authentication succeeds, identification authentication between two user nodes succeeds.

Description

technical field [0001] The invention relates to an authentication and authorization method of the Internet, in particular to an identity authentication method between peer user nodes in a P2P network. Background technique [0002] P2P (Peer to Peer, peer-to-peer) network is also called peer-to-peer network. Nodes can join or exit the network freely, and resources can be better shared between nodes. P2P network has broad application prospects in direct communication between users, file exchange and distributed computing. [0003] While the structure of the P2P network brings advantages to it, it also brings certain defects, especially in terms of network security. Since the P2P network is a decentralized network, each node in the network can freely join or withdraw and share resources. Therefore, if the entry of illegal users cannot be well prevented, illegal users can easily spread viruses and Trojan horses to the network through the network, affecting the information sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L29/06H04L29/08
Inventor 李军刘靖杨国标
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products