Peer-to-peer (P2P) network access control method

An access control, peer-to-peer network technology, applied in network-related fields, can solve problems such as the abolition of network members, failure to provide a perfect access control mechanism for network members, and failure to improve them.

Active Publication Date: 2014-09-03
广州优网信息技术有限公司 +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The invention provides a peer-to-peer network access control method to solve the technical problems that the existing technology does not provide a perfect access control mechanism for network members, and cannot trace and evaluate the behavior of network members and abolish malicious members

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Peer-to-peer (P2P) network access control method
  • Peer-to-peer (P2P) network access control method
  • Peer-to-peer (P2P) network access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080]The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0081] Refer to attached figure 1 . The invention is an access control mechanism in the peer-to-peer network realized based on two access control strategies of authentication and credible value evaluation. Its architecture adopts the cluster-based distributed structure, which is suitable for the distributed network environment based on the cluster structure. When the system is created, it consists of several clusters, and new members must join one of the clusters when they join the peer-to-peer network. The number of clusters can be determined according to the actual situation. In this embodiment, three clusters are used, and the cluster identifiers are G1, G2, and G3 respectively. Before the system formally accepts new members, necessary initialization is required. The system requires the existence of a trusted dealer (TD for sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the P2P network relevant technical field, particularly a P2P network access control method. The method includes that a credible center selects a ternary polynomial which is utilized for calculating a binary polynomial and selecting a random inter-cluster integer for a cluster head, and sending the integer to the cluster head; the cluster head calculates a unary function for a member, and sends the unary function to the member, simultaneously, selects a random intra-cluster integer, and constructs an access control function; and the member calculates to obtain the intra-cluster integer based on the unary function and the access control function. The cluster head uses the unary function and the access control function to control the joining and abolishing of the member. A credible value mechanism can be introduced to achieve the tracking evaluation of member behaviors, after the member joins the P2P network. According to the P2P network access control method, a two layer access control strategy based on a cluster structure is provided to achieve the control of the safe access of the P2P network, so that the safety problems of the network entering of illegal members to trace and evaluate behaviors of network members, and the revoking of malicious members are solved.

Description

technical field [0001] The invention relates to the technical field related to peer-to-peer networks, in particular to a peer-to-peer network access control method. Background technique [0002] Peer to Peer (P2P for short) is one of the most important and hot topics in computer network research, and has great development and application value. The peer-to-peer network breaks through the traditional client / server (C / S) model, and each member has an equal status in the network, being both a resource provider and a resource acquirer. Peer-to-peer network has incomparable characteristics of C / S mode, and these characteristics are the reasons why peer-to-peer network has been valued and developed tremendously all over the world. The characteristics of the peer-to-peer network include the following aspects: [0003] Decentralization: Peer-to-peer network is a distributed architecture. The resources and services in the network are distributed among all members, and each member i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
Inventor 王晓明徐帅文林艳纯
Owner 广州优网信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products