Maidsafe.net

Inactive Publication Date: 2010-03-11
UNIV OF CALIFORNIA IRVINE
View PDF76 Cites 141 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0002]An issue with today's networks is a combination of vendor lock in, imposed vendor based controls and lack of standards. The present 3 invention al

Problems solved by technology

An issue with today's networks is a combination of vendor lock in, imposed vendor based controls and lack of standards.
Also today, many computer resources are underutilised to a great 1 degree, including disk space, memory, processing power and any other 2 attached resources, this is inefficient and environmentally detrimental.
Systems of messaging and voting exist today but do not allow either authentication on what was voted for or on line anonymity.
There have been some attempts as listed below, but none of these systems operate as maidsafe.net does.
All of these systems require a lost or (whether distributed or not) record of authorised users and pass phrases or certificates and therefore do not represent prior art.
In this approach, the rerouting algorithm and the establishing of alarm collection times become increasingly complex as the number of failed channels increases, and a substantial amount of time will be taken to collect alarm signals and to transfer rerouting information should a large number of channels of a multiplexed transmission system fail.
One shortcoming of this multiple wave approach is that it takes a long recovery time.
Document 3 also relates to fault recovery for single transmission systems and has a disadvantage in that route-finding packets tend to form a loop and hence a delay is likely to be encountered.
It also does not allow for multiple access and sharing of the testing and ownership of chunks.
This is not prior art for this present inventions but very likely not enforceable as there are many cases of prior art against this Microsoft patent.
(a) US2003053053625 discloser shows limitation of asymmetrical and symmetrical encryption algorithms, and particularly not requiring generating a key stream from symmetric keys, nor requiring any time synchronising, with minimal computational complexity and capable of operated at high speed.
A significant difference between this approach and prior cipher method is that the session key is used to derive processing parameters (tables and delays) of the encryptor and decryptor in advance of data transmission.
Network firewalls are typically based on packet filtering which is limited in principle, since the rules that judge which packets to accept or reject are based on subjective decisions.
Even VPNs (Virtual Private Networks) and other forms of data encryption, including digital signatures, are not really safe because the information can be stolen before the encryption process, as default programs are allowed to do whatever they like to other programs or to their data files or to critical files of the operating system.
While such a system works well for smaller networks, there is a potential bottleneck at the interface between the LAN and the file storage system.
While the storage area networks are generally more flexible and scalable in terms of providing end user connectivity to different server-storage environments, the systems are also more complex.
The systems require hardware, such as gateways, routers, switches, and are thus costly in terms of hardware and associated software acquisition.
The Byzantine agreements require rather lengthy exchanges of messages and thus are inefficient and even impractical for use in a system in which many modifications to files are ant

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Maidsafe.net
  • Maidsafe.net
  • Maidsafe.net

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0268]FIG. 5 illustrates a flow chart of data assurance event sequence in accordance with first embodiment of this invention

second embodiment

[0269]FIG. 6 illustrates a flow chart of file chunking event sequence in accordance with second embodiment of this invention

[0270]FIG. 7 illustrates a schematic diagram of file chunking example

[0271]FIG. 8 illustrates a flow chart of self healing event sequence

[0272]FIG. 9 illustrates a flow chart of peer ranking event sequence

[0273]FIG. 10 illustrates a flow chart of duplicate removal event sequence

[0274]With reference to FIG. 5, guaranteed accessibility to user data by data assurance is demonstrated by flow chart. The data is copied to at least three disparate locations at step (10). The disparate locations store data with an appendix pointing to the other two locations by step (20) and is renamed with hash of contents. Preferably this action is managed by another node i.e. super node acting as an intermediary by step (30).

[0275]Each local copy at user's PC is checked for validity by integrity test by step (40) and in addition validity checks by integrity test are made that the ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating resources and freedom by allowing users to anonymously and irrefutably be seen as genuine individuals on the network and to communicate with other users with total security and to securely access resources that are both their own and those that are shared by others with them. Further, this invention comprises a system of self healing data, secure messaging and a voting system to allow users to dictate the direction of development of the network, whereby adoption or denial of proposed add-ons to the network will be decided. System incompatibilities and security breaches on networks and the Internet are addressed by this invention where disparity and tangents of development have had an undue influence. The functional mechanisms that this invention provides will restore open communications and worry-free access in a manner that is very difficult to infect with viruses or cripple through denial of service attacks and spam messaging, plus, it will provide a foundation where vendor lock-in need not be an issue.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation of International Application PCT / GB2007 / 004421 with an International Filing Date of Nov. 21, 2007, and claiming priority to co-pending Great Britain Patent Application No. 0624053.5 filed on Dec. 1, 2006 and co-pending Great Britain Patent Application No. 0709759.5 filed May 22, 2007, all of which are relied on and incorporated herein by reference.STATEMENT OF INVENTION[0002]An issue with today's networks is a combination of vendor lock in, imposed vendor based controls and lack of standards. The present 3 invention allows users to take charge of a new global network in a 4 manner that will maintain effectiveness and promote the setting and 5 attaining of common goals.[0003]Another issue with today's networks is the security and privacy of data, 7 this invention allows a secure private and free network where users can 8 enjoy an efficiently managed working environment that presents a 9 guaranteed level o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/24G06F15/16G06F21/62H04K1/00
CPCG06F21/6218H04L63/08H04L63/0421H04L41/30H04L9/00H04L67/104H04L67/1095
Inventor IRVINE, DAVID
Owner UNIV OF CALIFORNIA IRVINE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products