Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet data distribution oriented identity authentication and data encryption method

A technology for data distribution and authentication, applied in the field of Internet data transmission, it can solve the problems of long time for data block encryption and decryption, and it is not suitable for controlled distribution of Internet data security, so as to achieve the effect of ensuring security.

Active Publication Date: 2013-12-04
SPACE STAR TECH CO LTD
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the Internet environment, the encryption and decryption time of each data block is too long, and the tracker server needs to provide a large space for storing keys, so this system is not suitable for the secure and controlled distribution of Internet data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet data distribution oriented identity authentication and data encryption method
  • Internet data distribution oriented identity authentication and data encryption method
  • Internet data distribution oriented identity authentication and data encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The method of the present invention mainly adopts the filtering mechanism of identity verification added in the BT protocol, and protects the data in the way of symmetrical encryption and point-to-point key distribution during data transmission, thereby realizing the Internet under the condition of security control. The purpose of efficient data distribution is to enable the controlled and safe transmission of data in the private network.

[0025] Such as figure 1 As shown, the composition of data distribution nodes in the BitTorrent environment mainly includes Tracker servers, data centers, and other client nodes (authorized nodes, destination nodes, or unauthorized nodes) in the network, where Tracker servers and data centers may or may not be located in the same place . The Tracker server is mainly responsible for the control and distribution of node information and file information, node verification and authorization, and saves the decryption key given by the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An Internet data distribution oriented identity authentication and data encryption method mainly comprises four processes of: (1) sending out a service request by a client; (2) carrying out identity authentication based on the client information by a Tracker server; (3) sending encrypted original data and a decryption key to a target node and sending encrypted data to an authorized node; (4) receiving all the encrypted data and decrypting the data by the target node. According to the invention, the node is firstly subjected to the identity authentication, the encrypted data and the decrypted key are sent to the target node with the authority, and data are sent to the authorized node, so that distribution efficiency is improved, unauthorized nodes are shielded, and data security is ensured. The Internet data distribution oriented identity authentication and data encryption method has wide practical value and application foreground in the field of the Internet data security controlled distribution in a P2P (Peer-to-Peer) environment.

Description

technical field [0001] The invention belongs to the field of Internet data transmission, and relates to a method for safely and controlled distribution of Internet data under the BitTorrent environment. Background technique [0002] In recent years, with the rapid increase in the scale and application of the Internet, mobile Internet, and cloud computing, the amount of data has directly increased. The rapid development of BitTorrent applications has led to increasing requirements for the security of Internet data distribution, and the security of the existing BitTorrent network has become a major concern. How to add an effective secure and controlled distribution mechanism to provide security for communication between nodes has become a hot spot. [0003] At present, some scholars have conducted research on behaviors that may damage the BT network and proposed some improvement schemes. For example, in AntiLiar's solution, each node can independently detect spoofing attacks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/08
Inventor 谭东宇祝明发徐春杰李明泉王守信肖利民秦广军伍彦飞刘华田季王智尧
Owner SPACE STAR TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products