System and method for anonymous addressing of content on network peers and for prvate peer-to-peer file sharing

a content sharing and peer-to-peer technology, applied in the field of file sharing systems, system and method for anonymous addressing of content, can solve the problems of slow file sharing speed, dhts do not directly support keyword searching, and it is difficult for someone to identify who is downloading or who is offering files, so as to achieve efficient and private peer-to-peer file sharing

Inactive Publication Date: 2016-06-30
ZAID SAM
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention provides a system and method for efficient and private peer-to-peer file sharing. The system allows a unique link to be assigned to any file or set of files on a peer computer, which is then registered with a publishing server. The peer recipient can access the link, receive the server's connectivity information, and then receive the file from the publisher without passing through the server or reconfiguring any devices. Additionally, the invention includes an obfuscation scheme to enhance content security and privacy.

Problems solved by technology

Unfortunately, the Gnutella model of all nodes being equal quickly died from bottlenecks as the network grew from incoming Napster refugees.
This is not without drawbacks; perhaps most significantly, DHTs do not directly support keyword searching (as opposed to exact-match searching).
This makes it harder for someone to identify who is downloading or who is offering files.
Third-generation networks have not reached mass usage for file sharing because most current implementations incur too much overhead in their anonymity features, making them slow or hard to use.
However, this protection comes at a cost: downloads can take time to rise to full speed because it may take time for enough peer connections to be established, and it takes time for a node to receive sufficient data to become an effective uploader.
UDP does not guarantee reliability or ordering in the way that TCP does.
Datagrarns may arrive out of order, appear duplicated, or go missing without notice.
This leaves the internal network ill-suited to act as a server, as the NAT device has no way of determining the internal host for which incoming packets are destined.
On the Internet, this problem has not generally been relevant to home users behind NAT devices, as they either do not need to act as servers or can use static NAT mappings to correlate incoming requests to internal hosts.
However, applications such as P2P file sharing (such as BitTorrent or Gnutella clients) or VoIP networks (such as Skype) require clients to act like servers, thereby posing a problem for users behind NAT devices, as incoming requests cannot be correlated to the proper internal host.
In either case, the high level protocol must be designed with NAT traversal in mind, and it does not work reliably across symmetric NATs or other poorly-behaved legacy NATs.
If no DHCP server is available, that is, the network is unmanaged; the device must assign itself an address.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for anonymous addressing of content on network peers and for prvate peer-to-peer file sharing
  • System and method for anonymous addressing of content on network peers and for prvate peer-to-peer file sharing
  • System and method for anonymous addressing of content on network peers and for prvate peer-to-peer file sharing

Examples

Experimental program
Comparison scheme
Effect test

examples of embodiments

OF THE INVENTION

Example 1

P2P File Sharing Infrastructure

[0148]Referring to FIG. 1, there is illustrated a High-level Schematic of Peering System of one embodiment of the invention. It has six basic functioning modules: a Peer Client 1a, a Publishing Server 1b, a Database Server 1c, a Web Server 1d, a PKI Server 1e, and a Swarming Server 1f. Not shown are typical system components including system administrative functions, privacy protection functions, user setup and run execution functions, reporting services, input and output devices, and backup systems. Not specifically disclosed but would be obvious to one skilled in the art are provisions of interfaces and services. Also not shown or described are all references to the Database Server 1c as these would be obvious to anyone skilled in the art.

[0149]The Peer Client 1a runs continuously on a peer node. It authenticates and communicates its connectivity information periodically with the Publishing Server 1b. It negotiates direct co...

example 2

Private Sharing Network

[0155]FIG. 2 shows how a social graph can be layered on top of the P2P file sharing infrastructure described in Example 1 to enable a private sharing network (privnet). The social layer aggregates edgelinks published by peers who are members of the privnet creating a social taxonomy of shared content. Peers in the privnet can browse and search through this social taxonomy using a standard web user agent (web browser) to collaborate, interact, download, and discuss content contained within. In this model, the user experience is identical to searching, browsing, or collaborative with web-hosted content.

[0156]The Social Server 1g in FIG. 1 is used to import a social graph from a 3rd party service (e.g. Facebook, MySpace, Google, etc). The Social Server 1g publishes an HTML interface enabling any authenticated peer to bind their social identity with their filesharing identity creating a “social peer”. Any social peer can create their own privnet. Once a privnet i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for efficient and private peer-to-peer file sharing consists of ascribing a uniquely identified and anonymous link (an “edgelink”) to any file or set of files on a peer computer. The link is registered with a publishing server along with continuously updated connectivity information about the peer without registering any identifying information about the file. A peer recipient is able to access the link, receive connectivity information about the publishing peer from the server, and then receive the file from the publishing peer without file content passing through the server, mediating any intermediary NAT devices without requiring any manual or automatic device reconfiguration.

Description

FIELD OF THE INVENTION[0001]This invention pertains to the field of electrical computers and digital processing systems and in particular file sharing systems and specifically a system and a method for anonymous addressing of content stored on computers at the edge of the network. This is coupled with a system and method for the private peer-to-peer exchange of anonymously addressed content.BACKGROUND OF THE INVENTIONNetwork ArchitectureClient-Server[0002]Client-server is a computing architecture which separates a client from a server, and is almost always implemented over a computer network. Each client or server connected to a network can also be referred to as a node. The most basic type of client-server architecture employs only two types of nodes: clients and servers. This type of architecture is sometimes referred to as two-tier. It allows devices to share files and resources.[0003]Each instance of the client software can send data requests to one or more connected servers. In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/06H04L63/0421H04L67/42H04L67/104H04L63/0407H04L63/0442H04L67/1063H04L67/01
Inventor ZAID, SAMLEM, PAULLINSCOTT, GARYBECEVELLO, ADAMZAID, TARIQ
Owner ZAID SAM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products