摘要:
One embodiment of the present method and apparatus for creating searches in peer-to-peer networks includes forming clusters comprising data from a user's media library and formulating at least one search request message in accordance with the clusters. Formation of the clusters may be guided at least in part by data attributes that the user indicates are important. In this way, the user's media library may be “mined” for information that will aid in creating searches for data that the user may be interested in, but may not necessarily know how to search for or may not necessarily know exists.
摘要:
One embodiment of the present method and apparatus for reducing spam on a peer-to-peer network includes determining, in accordance with a list of known spammer nodes, whether a responding node offering data for download is a known spammer node. If the responding node is a known spammer node, communication from the responding node is discarded. However, if the responding node is not a known spammer node, the offered data is retrieved from the responding node. If it is then determined that the retrieved data does, in fact, include spam, at least one other node on the network is notified that the responding node has sent spam. This information then allows the other node to determine whether or not it would like to receive data from the responding node in the future.
摘要:
One embodiment of the present method and apparatus for user-moderation of an online chat room in which a plurality of users are exchanging messages includes providing the chat room and controlling a manner in which the users send and receive the messages in the chat room in accordance with user feedback relating to the messages. In one embodiment, the user feedback is received in the form of user chat profiles, which describe the respective users' participation in the chat room, and flags, which users may be given in response to messages that are deemed inappropriate for the chat room.
摘要:
One embodiment of the present method and apparatus for re-establishing anonymous data transfers between a first endpoint and a second endpoint in a network includes receiving, from a first node, the identity of a second node connected to the first node, where at least the first node is a neighbor node. A third node (a neighbor node) is then selected, and instructed to connect to the second node in order to establish a link for the path. In this manner, the first endpoint and the second endpoint remain unknown at least to each other (e.g., where “unknown” means that neither endpoint knows any identifying information, such as network address, about the other endpoint), and likely to all other nodes in the path as well. In another embodiment, a failure is detected at a neighbor node, where the neighbor node is part of an original path between the first endpoint and the second endpoint. The neighbor node's repair server is contacted for a repair node associated with the neighbor node, and a connection to the repair node is made such that the path is established in a manner that maintains anonymity of the first endpoint and the second endpoint relative to each other.
摘要:
One embodiment of the present method and apparatus for assisting a peer-to-peer connection between a first node and a second node includes receiving, at a third node, a request for connection assistance from one of the first and second nodes. The third node then connects to both the first node and the second node, receives the data from the first node and delivers the data to the second node. In this manner, data may be transferred between the first and second nodes even if the first and second nodes are unable to directly connect to each other (e.g., due to permanent or temporary limitations).
摘要:
One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).
摘要:
Disclosed are methods and systems for expanding the search space in a Peer-to-Peer (“P2P”) network. In one embodiment, the search space is expanded by increasing the time-to-live value of the search request message. The P2P network may include a plurality of nodes, and the method for increasing the search space in the network includes the steps of receiving a search request message; changing a time-to-live value carried by the message; and forwarding the message to at least one peer node.
摘要:
One embodiment of the present method and apparatus for efficiently expanding a P2P network includes receiving a search request message from a requesting node and sending a response message to the requesting node on behalf of a node that has the requested data, where the response message originates at an intermediate node. The intermediate node may respond on behalf of the “responding” node, for example, in cases where the responding node is too far away from the requesting node to receive the search request message.
摘要:
Disclosed is a method for controlling access to a chat room using a peer-to-peer (“P2P”) network. The method includes the steps of sending a search request to a first set of nodes in the P2P network, the first set of nodes neighboring a node requesting the search and including at least one node; forwarding the request to a second set of nodes neighboring the at least one node in the first set, the second set of nodes including at least one node; comparing the search request to a local profile topic list in each node in the first and second sets; receiving a zero or more responses from nodes in the first and second sets; and establishing a network connection between the node requesting the search and at least one of the nodes responding to the request to form a community.
摘要:
One embodiment of the present method and apparatus for reducing leeches on a P2P network includes receiving a data request message and at least one reference from a requesting node, where the reference pertains to at least one previous data transfer in which the requesting node has engaged. The reference is then verified and it is determined, in accordance with the reference, whether to provide the requested data to the requesting node.