Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and node for storing and routing data on basis of node bottom layer security level

A security level and node technology, applied in the computer field, achieves the effect of simple structure and low maintenance overhead

Inactive Publication Date: 2012-06-06
艾欧特(沈阳)科技有限公司
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a data storage and routing method and node in a P2P network based on the bottom layer security level of the node, so as to solve the problem of how to implement the security defense mechanism scheme of Overlay and Underlay fusion in the prior art on the Overlay of the P2P network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and node for storing and routing data on basis of node bottom layer security level
  • Method and node for storing and routing data on basis of node bottom layer security level
  • Method and node for storing and routing data on basis of node bottom layer security level

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to solve the problem of how to implement the security defense mechanism scheme integrating Overlay and Underlay on the Overlay of the P2P network in the prior art, the present invention provides a data storage and routing method and a node in a P2P network based on the underlying security level of the node. The invention provides a specific realization of the security level division mechanism integrating overlay and underlay based on the underlay security level division mechanism in the P2P network, and improves the overall security of the P2P network on the basis of changing the original P2P network storage and routing mechanism as little as possible. The present invention will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to illustrate the present invention, but not to limit the present invention.

[0019] Method embodiment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a node for storing and routing data in a peer-to-peer (P2P) network on the basis of the node bottom layer security level. The method comprises the following steps of: determining the corresponding relation between the importance level of the data and the node bottom layer security level, and storing the key word level of the data into the node with the corresponding node bottom layer security level according to the importance level and the corresponding relation; and when the data is searched, searching the data in nodes with the same node bottom layer security level as the node in which the data is stored.

Description

technical field [0001] The invention relates to the field of computers, in particular to a data storage and routing method and node in a P2P network based on a node bottom security level in a peer-to-peer (Peer to Peer, referred to as P2P) network. Background technique [0002] In related technologies, the security of the P2P network has received more and more attention, but the research on the security of the P2P upper layer (Overlay) network is mostly limited to the Overlay layer itself, that is, the main research is due to the behavior characteristics of the Overlay itself. Multiple security threats and defenses. Since the Overlay network is built on the Underlay network, the nodes that make up the Overlay network are bound to be affected by infrastructure conditions such as operating systems and network protocols. That is to say, a trusted node on the Overlay layer may have weak security performance on the Underlay layer, making it easy for attackers to attack the node ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L12/56H04L45/16
Inventor 陈书义李媛张春红成城裘晓峰
Owner 艾欧特(沈阳)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products