Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for facilitating access control in a peer-to-peer overlay network

A peer-to-peer node and access-allowing technology, applied in the transmission system, electrical components, etc., can solve the problems of infringing on the privacy of peer A, leaking identity or membership, etc.

Inactive Publication Date: 2017-05-24
QUALCOMM INC
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution incurs significant overhead in messaging and computation when the collections involved in the operation are large
Furthermore, such an operation can reveal all of peer A's identity or membership to peer B and potentially to all nodes in the routing path, which may violate peer A's privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for facilitating access control in a peer-to-peer overlay network
  • Method and system for facilitating access control in a peer-to-peer overlay network
  • Method and system for facilitating access control in a peer-to-peer overlay network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In the following description, specific details are given to provide a thorough understanding of the described implementations. However, one of ordinary skill in the art would understand that various implementations may be practiced without these specific details. For example, circuits may be shown in block diagram form in order not to obscure the implementation in unnecessary detail. In other instances, well-known circuits, structures and techniques may be shown in detail so as not to obscure the described implementations.

[0026] The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any implementation or embodiment described herein as "exemplary" is not necessarily to be construed as preferred or superior to other embodiments or implementations. Likewise, the term "embodiments" does not require that all embodiments include the discussed feature, advantage, or mode of operation. The terms "peer-to-peer overlay network" and "...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and apparatuses are provided for facilitating access controls for digital objects stored within a peer-to-peer overlay network. A privacy-preserving method is provided for matching identities between a first peer node and a second peer node in a peer-to-peer network. Such identity matching may be used, for example, to ascertain whether the first peer node should provide access to certain digital object stored in the peer-to-peer overlay network. Rather than providing its identities in an unprotected format, the second peer may provide its identities to the first peer node in a concealed representation so as to prevent the first peer from learning about non-matching identities. Such concealed representation may be a data structure that cryptographically conceals one or more identities of the second peer node or a user of the second peer node within a shared data space of the data structure.

Description

technical field [0001] Features disclosed herein relate generally to peer-to-peer overlay networks, and at least some features relate to facilitating access control in peer-to-peer overlay networks while maintaining user privacy. Background technique [0002] Peer-to-peer (P2P) overlay networks are designed for low-cost scalability and easy deployment of applications. In a P2P network, each user is connected to the rest of the network via a set of peers. Additionally, each user may have a set of identities (eg, member information, email addresses, group memberships, account identifiers, and / or other forms of member / account identifiers) that form a discrete set. This identity set can be considered as a discrete set in the mathematical sense, that is, a collection of elements with the same characteristics. The problem arises when two peers (A and B) wish to discover the intersection of their identity sets. For example, peer A may include identities ("Yahoo-A", "gmail-A", "f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0407H04L63/10H04L67/104
Inventor Y·毛D·W·克雷格
Owner QUALCOMM INC