Method and system for facilitating access control in a peer-to-peer overlay network
A peer-to-peer node and access-allowing technology, applied in the transmission system, electrical components, etc., can solve the problems of infringing on the privacy of peer A, leaking identity or membership, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In the following description, specific details are given to provide a thorough understanding of the described implementations. However, one of ordinary skill in the art would understand that various implementations may be practiced without these specific details. For example, circuits may be shown in block diagram form in order not to obscure the implementation in unnecessary detail. In other instances, well-known circuits, structures and techniques may be shown in detail so as not to obscure the described implementations.
[0026] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any implementation or embodiment described herein as "exemplary" is not necessarily to be construed as preferred or superior to other embodiments or implementations. Likewise, the term "embodiments" does not require that all embodiments include the discussed feature, advantage, or mode of operation. The terms "peer-to-peer overlay network" and "...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


