摘要:
A system and method of serverless peer-to-peer group management and maintenance is presented. Group formation and discovery of private, public, and enumerated groups are provided, as is a method of joining such a peer-to-peer group. Group information management provided by the present invention ensures that each node maintains a current database from the initial joining of the group through the run phase of membership. Group graph maintenance utilizes a group signature to ensure that partitions in a graph may be detected and repaired. The utility of connections within the graph are also monitored so that non-productive connections may be dropped to increase the efficiency of the group. The diameter of the graph is also monitored and adjusted to ensure rapid information transfer throughout the group. A disconnect procedure is used to maintain the graph integrity and prevent partitions resulting from the departure of a group member.
摘要:
A method for ensuring valid and secure peer-to-peer communications in a group structure. Specifically, the system of the present invention presents a method of ensuring secure peer-to-peer group formation, group member addition, group member eviction, group information distribution, etc. Such functionality may be distributed to the individual peers in the group to further enhance the overall security of the group while enhancing flexibility. The P2P group security allows every peer who is a valid member of the group to invite new members. The recipients of these invitations are then able to contact any member of the group to join the group, not only the inviter. Further, groups may function when the group creator is not online. Likewise, the method allows the creation of secure groups with users from different security domains, relying on their security credentials in those domains for initial authentication.
摘要:
A method for use in a peer-to-peer communication system to ensure valid connections are made in a secure manner includes the steps of receiving an address record for a peer node which includes an ID certificate. The ID certificate is validated and checked to verify that the ID certificate has not expired. Further, the method determines if the node from whom the address record was received is to be trusted, and the number of instances of the IP address included in the certificate is already stored in cache. When the foregoing are completed successfully, i.e. the certificate is valid, not expired, has been supplied by a trusted neighbor, and does not point to an IP address that already exists for different ID's multiple times, the method opportunistically verifies ownership of the ID certificate at the peer node's IP address. That is, the verification of ownership only occurs when the advertiser of the ID is the owner of that ID (or when the ID is to be used). If any of the above cannot be completed successfully, the address record is discarded.
摘要:
A wireless station is connected to a wireless network through an access point and can establish a direct client-to-client connection to a second wireless station. The wireless station can communicate directly with the second wireless station without involving the access point. The wireless station communicates with the wired network and with other wireless stations through the access point. The second wireless station may have an infrastructure connection to the access point or may be independent.
摘要:
A wireless device that desires to be connected to a wireless network broadcasts itself and its capabilities to a network using an information element. The information element is provided with frames, such as management frames, in a channel that is not protected or encrypted. The information element is forwarded to one or more potential registrar devices. One of the registrar devices then provides configuration information to the enrollee, for example as a registrar information element. The configuration information may be passed out of band or in band, and may be passed using cryptography, which may involve public key cryptography, encryption with a PIN, or some other type of secure exchange.
摘要:
A wireless station is connected to a wireless network through an access point and can establish a direct client-to-client connection to a second wireless station. The wireless station can communicate directly with the second wireless station without involving the access point. The wireless station communicates with the wired network and with other wireless stations through the access point. The second wireless station may have an infrastructure connection to the access point or may be independent.
摘要:
A wireless station is connected to a wireless network through an access point and can establish a direct client-to-client connection to a second wireless station. The wireless station can communicate directly with the second wireless station without involving the access point. The wireless station communicates with the wired network and with other wireless stations through the access point. The second wireless station may have an infrastructure connection to the access point or may be independent.
摘要:
A wireless station is connected to a wireless network through an access point and can establish a direct client-to-client connection to a second wireless station. The wireless station can communicate directly with the second wireless station without involving the access point. The wireless station communicates with the wired network and with other wireless stations through the access point. The second wireless station may have an infrastructure connection to the access point or may be independent.
摘要:
A wireless station is connected to a wireless network through an access point and can establish a direct client-to-client connection to a second wireless station. The wireless station can communicate directly with the second wireless station without involving the access point. The wireless station communicates with the wired network and with other wireless stations through the access point. The second wireless station may have an infrastructure connection to the access point or may be independent.
摘要:
A shared concept of time, called “graph time,” is agreed upon by all nodes within a graph. Each node maintains its own local delta representative of a difference in the node's system clock and graph time. Upon connecting to a neighbor node in a graph, a node is sent graph time as perceived by the neighbor node. In accordance with an embodiment, the node assumes that the lag time in receiving the graph time from the neighbor node is one-half of the lag time between the request for the connection and the receipt of the graph time. Graph time as sent by the neighbor node is added to one-half of the total delay and the sum is subtracted from the node's system time to calculate the delta for the node requesting connection.