Efficient trusted transmission method based on P2P

A transmission method and credible technology, applied in the field of communication, can solve the problems of lack of trusted network node management function, difficulty in meeting information security transmission, etc.

Inactive Publication Date: 2020-10-27
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing P2P transmission lacks the management function of trusted network no

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient trusted transmission method based on P2P
  • Efficient trusted transmission method based on P2P
  • Efficient trusted transmission method based on P2P

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Common methods of using asymmetric encryption algorithms are as follows: Generate a set of key pairs through the algorithm, the private key of which is kept secretly by the owner (A), the public key can be sent to anyone, and B encrypts the information with the public key and sends it to A. Even if it is obtained by C during the transmission process, the data cannot be decrypted. Only A can decrypt the data through the private key. As long as the private key is not leaked, the data is safe.

[0025] BitTorrent Protocol: BT protocol for short, the BitTorrent protocol is a P2P file transfer communication protocol based on the TCP / IP protocol, and is at the application layer of the TCP / IP structure. The BitTorrent agreement itself also includes many specific content agreements and extension agreements, and is constantly expanding.

[0026] TLS: Transport Layer Security (English: Transport Layer Security, abbreviated as TLS), and its predecessor Secure Sockets Layer (Secure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient trusted transmission method based on P2P, and relates to the technical field of communication. A built-in Tracker uniquely connected with each transmission node isset through a console; the transmission node information is published to a built-in Tracker and each transmission node; and transmission node registration is completed, the registered transmission nodes related to the task is connected with the built-in Tracker in an Http OverTLS mode, mutual verification is performed during TLS handshake, required contents are mutually provided, and fragmentation file transmission is performed.

Description

technical field [0001] The invention discloses a transmission method, relates to the technical field of communication, in particular to a P2P-based efficient and reliable transmission method. Background technique [0002] When sharing the exchange system, traditional data exchange schemes generally perform 1-to-1 or 1-to-many transmission based on trusted nodes of unprotected channels. When distributing large-scale files (folders), all target nodes receive data from the source node , the bandwidth and processing capability of the source node are very high, and it is very easy to reach the upper limit of the bandwidth and processing capability of the source node, resulting in low transmission efficiency. At present, if Internet companies encounter similar problems when releasing new versions of large-scale software, they generally use P2P methods to reduce the burden on servers and data traffic, thereby reducing release costs and improving release efficiency. However, the ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/1078H04L67/1061H04L67/1074H04L63/0428H04L63/0442
Inventor 刘明磊桑成刚段其朴
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products