News Column

"Systems and Methods for Security Tiering in Peer-To-Peer Networking" in Patent Application Approval Process

August 12, 2014



By a News Reporter-Staff News Editor at Information Technology Newsweekly -- A patent application by the inventors Anson, Douglas M. (Dripping Springs, TX); Andrews, Carlton A. (Austin, TX); Robison, Charles D. (Round Rock, TX); Konetski, David (Austin, TX); Molsberry, Frank H. (Georgetown, TX); Lo, Yuan-Chang (Austin, TX), filed on January 22, 2013, was made available online on July 31, 2014, according to news reporting originating from Washington, D.C., by VerticalNews correspondents.

This patent application is assigned to Dell Products L.p.

The following quote was obtained by the news editors from the background information supplied by the inventors: "As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to users is information handling systems. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.

"Information handling systems may often be coupled to one another via peer-to-peer networking. A peer-to-peer (often abbreviated to 'P2P') network is one in which each information handling system in the network can act as a client or server for the other information handling systems in the network, allowing shared access to various resources such as files, peripherals, and sensors without the need for a central server. Peer-to-peer networks can be set up within the home, a business, or over the Internet.

"Of particular concern in peer-to-peer networks is security, in order to guard a particular information handling system from unwanted attacks from other information handling systems. Most traditional peer-to-peer networks employ a simple security mechanism to help guard the network from unwanted attacks or usage. In such approaches, peers attempt to connect to one another, pass a simple security check, then either proceed with data transfer or disconnect depending on the security check. In larger peer-to-peer environments, this simple security mechanism is insufficient, typically because not all potential peers can be thought of as being at the same level of trust."

In addition to the background information obtained for this patent application, VerticalNews journalists also obtained the inventors' summary information for this patent application: "In accordance with the teachings of the present disclosure, the disadvantages and problems associated with peer-to-peer networking between information handling systems have been reduced or eliminated.

"In accordance with embodiments of the present disclosure, an information handling system may include a processor and a memory communicatively coupled to the processor having stored thereon a peer-to-peer agent comprising one or more instructions. The instructions may the processor to, when read and executed by the processor: (i) determine, based on published messages from one or more of other information handling systems indicative of availability of the one or more other information handling systems for peer-to-peer networking, one or more potential peer information handling systems of the other information handling systems to which the information handling system may potentially couple for peer-to-peer networking; (ii) receive from each of one or more of the potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system; (iii) compare the peer minimum acceptable security level to a security level of the information handling system; and (iv) complete a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.

"In accordance with these and other embodiments of the present disclosure, a method may include determining, at an information handling system based on published messages from one or more of other information handling systems remotely coupled to the information handling system and indicative of availability of the one or more other information handling systems for peer-to-peer networking, one or more potential peer information handling systems of the other information handling systems to which the information handling system may potentially couple for peer-to-peer networking. The method may also include receiving from each of one or more of the potential peer information handling systems a connection request comprising a peer minimum acceptable security level for the peer information handling system. The method may also include comparing the peer minimum acceptable security level to a security level of the information handling system. The method may further include completing a peer-to-peer connection between the information handling system and the peer information handling system if the minimum acceptable security level is not higher than that of the security level of the information handling system.

"Technical advantages of the present disclosure will be apparent to those of ordinary skill in the art in view of the following specification, claims, and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

"A more complete understanding of the present embodiments and advantages thereof may be acquired by referring to the following description taken in conjunction with the accompanying drawings, in which like reference numbers indicate like features, and wherein:

"FIG. 1 illustrates a block diagram of an example peer-to-peer network, in accordance with certain embodiments of the present disclosure; and

"FIG. 2 illustrates a flow chart of an example method for peer-to-peer connectivity, in accordance with certain embodiments of the present disclosure."

URL and more information on this patent application, see: Anson, Douglas M.; Andrews, Carlton A.; Robison, Charles D.; Konetski, David; Molsberry, Frank H.; Lo, Yuan-Chang. Systems and Methods for Security Tiering in Peer-To-Peer Networking. Filed January 22, 2013 and posted July 31, 2014. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=92&p=2&f=G&l=50&d=PG01&S1=20140724.PD.&OS=PD/20140724&RS=PD/20140724

Keywords for this news article include: Dell Products L.p., Information Technology, Information and Data Storage.

Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC


For more stories covering the world of technology, please see HispanicBusiness' Tech Channel



Source: Information Technology Newsweekly


Story Tools






HispanicBusiness.com Facebook Linkedin Twitter RSS Feed Email Alerts & Newsletters