Claims
- 1. A peer computing system comprising:
a plurality of peer nodes; wherein the plurality of peer nodes are each configured to participate on a network with others of the plurality of peer nodes in areas of interest and to exchange codats relevant to the areas of interest with the other peer nodes, wherein a codat is computer-representable content or data; wherein at least a subset of the plurality of peer nodes are each configured to:
determine confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest; determine risk associated with the other peer node; and determine trust in the other peer node as a provider of codats relevant to the particular area of interest from the confidence in the other peer node and the risk associated with the other peer node.
- 2. The peer computing system as recited in claim 1, wherein the risk is determined from one or more of integrity of codats provided by the other peer node, accessibility of the other peer node, and performance of the other peer node.
- 3. The peer computing system as recited in claim 1, wherein the peer node is further configured to:
locate one or more codats relevant to the particular area of interest on the other peer node; if the trust in the other peer node is above a trust threshold, access the located one or more codats from the other peer node; and if the trust in the other peer node is not above the trust threshold, not access the located one or more codats from the other peer node.
- 4. The peer computing system as recited in claim 1, wherein the peer node is further configured to provide the determined trust in the other peer node as feedback to the other peer node.
- 5. The peer computing system as recited in claim 1, wherein the peer node is further configured to propagate the determined trust in the other peer node to others of the plurality of peer nodes.
- 6. The peer computing system as recited in claim 1, wherein, to determine confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest, the peer node is further configured to:
determine relevance of a set of codats provided by the other peer node to the particular area of interest; and determine confidence in the other peer node as a provider of codats relevant to the particular area of interest from the determined relevance of the set of codats.
- 7. The peer computing system as recited in claim 1, wherein, to determine confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest, the peer node is further configured to determine confidence in the other peer node as a provider of codats relevant to the particular area of interest from confidence in each of a set of codats relevant to the particular area of interest and provided by the other peer node.
- 8. The peer computing system as recited in claim 1, wherein the peer node is further configured to determine confidence in each codat in the set codats, and wherein, to determine confidence in each codat in the set of codats, the peer node is further configured to:
determine relevance of the particular codat to the particular area of interest; and determine popularity of the particular codat among the plurality of peer nodes.
- 9. The peer computing system as recited in claim 1, wherein the plurality of peer nodes is configured to implement a peer-to-peer environment on the network according to a peer-to-peer platform comprising one or more peer-to-peer platform protocols for enabling the plurality of peer nodes to discover each other, to communicate with each other, and to find and exchange the codats in the peer-to-peer environment.
- 10. A peer node comprising:
a processor; a memory comprising program instructions, wherein the program instructions are executable by the processor to:
participate on a network with other peer nodes in an area of interest and to exchange codats relevant to the areas of interest with the other peer nodes, wherein a codat is computer-representable content or data; determine confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest; determine risk associated with the other peer node; and determine trust in the other peer node as a provider of codats relevant to the particular area of interest from the confidence in the other peer node and the risk associated with the other peer node.
- 11. The peer node as recited in claim 10, wherein the risk is determined from one or more of integrity of codats provided by the other peer node, accessibility of the other peer node, and performance of the other peer node.
- 12. The peer node as recited in claim 10, wherein the peer node is further configured to:
locate one or more codats relevant to the particular area of interest on the other peer node; if the trust in the other peer node is above a trust threshold, access the located one or more codats from the other peer node; and if the trust in the other peer node is not above the trust threshold, not access the located one or more codats from the other peer node.
- 13. The peer node as recited in claim 10, wherein the peer node is further configured to provide the determined trust in the other peer node as feedback to the other peer node.
- 14. The peer node as recited in claim 10, wherein the peer node is further configured to propagate the determined trust in the other peer node to one or more other peer nodes.
- 15. The peer node as recited in claim 10, wherein, to determine confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest, the peer node is further configured to:
determine relevance of a set of codats provided by the other peer node to the particular area of interest; and determine confidence in the other peer node as a provider of codats relevant to the particular area of interest from the determined relevance of the set of codats.
- 16. The peer node as recited in claim 10, wherein, to determine confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest, the peer node is further configured to determine confidence in the other peer node as a provider of codats relevant to the particular area of interest from confidence in each of a set of codats relevant to the particular area of interest and provided by the other peer node.
- 17. The peer node as recited in claim 10, wherein the peer node is further configured to determine confidence in each codat in the set codats, and wherein, to determine confidence in each codat in the set of codats, the peer node is further configured to:
determine relevance of the particular codat to the particular area of interest; and determine popularity of the particular codat among the other peer nodes.
- 18. The peer node as recited in claim 10, wherein the program instructions are further executable within the peer node to participate with the other peer nodes in a peer-to-peer environment on the network according to a peer-to-peer platform comprising one or more peer-to-peer platform protocols for enabling peer nodes to discover each other, to communicate with each other, and to find and exchange the codats in the peer-to-peer environment.
- 19. A method comprising:
a peer node participating on a network with other peer nodes in an area of interest and to exchange codats relevant to the areas of interest with the other peer nodes, wherein a codat is computer-representable content or data; the peer node determining confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest; the peer node determining risk associated with the other peer node; and the peer node determining trust in the other peer node as a provider of codats relevant to the particular area of interest from the confidence in the other peer node and the risk associated with the other peer node.
- 20. The method as recited in claim 19, wherein the risk is determined from one or more of integrity of codats provided by the other peer node, accessibility of the other peer node, and performance of the other peer node.
- 21. The method as recited in claim 19, further comprising:
the peer node locating one or more codats relevant to the particular area of interest on the other peer node; if the trust in the other peer node is above a trust threshold, the peer node accessing the located one or more codats from the other peer node; and if the trust in the other peer node is not above the trust threshold, the peer node not accessing the located one or more codats from the other peer node.
- 22. The method as recited in claim 19, further comprising the peer node providing the determined trust in the other peer node as feedback to the other peer node.
- 23. The method as recited in claim 19, further comprising the peer node propagating the determined trust in the other peer node to one or more other peer nodes.
- 24. The method as recited in claim 19, wherein, in said determining confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest, the method further comprises:
determining relevance of a set of codats provided by the other peer node to the particular area of interest; and determining confidence in the other peer node as a provider of codats relevant to the particular area of interest from the determined relevance of the set of codats.
- 25. The method as recited in claim 19, wherein, in said determining confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest, the method further comprises determining confidence in the other peer node as a provider of codats relevant to the particular area of interest from confidence in each of a set of codats relevant to the particular area of interest and provided by the other peer node.
- 26. The method as recited in claim 19, further comprising the peer node determining confidence in each codat in the set codats, and wherein, in said determining confidence in each codat in the set of codats, the method further comprises:
determining relevance of the particular codat to the particular area of interest; and determining popularity of the particular codat among the other peer nodes.
- 27. The method as recited in claim 19, wherein the peer nodes are configured to implement a peer-to-peer environment on the network according to a peer-to-peer platform comprising one or more peer-to-peer platform protocols for enabling the peer nodes to discover each other, communicate with each other, and to find and exchange the codats in the peer-to-peer environment.
- 28. An article of manufacture comprising software instructions executable to implement:
a peer node participating on a network with other peer nodes in an area of interest and to exchange codats relevant to the areas of interest with the other peer nodes, wherein a codat is computer-representable content or data; the peer node determining confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest; the peer node determining risk associated with the other peer node; and the peer node determining trust in the other peer node as a provider of codats relevant to the particular area of interest from the confidence in the other peer node and the risk associated with the other peer node.
- 29. The article of manufacture as recited in claim 28, wherein the risk is determined from one or more of integrity of codats provided by the other peer node, accessibility of the other peer node, and performance of the other peer node.
- 30. The article of manufacture as recited in claim 28, wherein the software instructions are further executable to implement:
the peer node locating one or more codats relevant to the particular area of interest on the other peer node; if the trust in the other peer node is above a trust threshold, the peer node accessing the located one or more codats from the other peer node; and if the trust in the other peer node is not above the trust threshold, the peer node not accessing the located one or more codats from the other peer node.
- 31. The article of manufacture as recited in claim 28, wherein the software instructions are further executable to implement the peer node providing the determined trust in the other peer node as feedback to the other peer node.
- 32. The article of manufacture as recited in claim 28, wherein the software instructions are further executable to implement the peer node propagating the determined trust in the other peer node to one or more other peer nodes.
- 33. The article of manufacture as recited in claim 28, wherein, in said determining confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest, the software instructions are further executable to implement:
determining relevance of a set of codats provided by the other peer node to the particular area of interest; and determining confidence in the other peer node as a provider of codats relevant to the particular area of interest from the determined relevance of the set of codats.
- 34. The article of manufacture as recited in claim 28, wherein, in said determining confidence in one of the other peer nodes as a provider of codats relevant to a particular area of interest, the software instructions are further executable to implement determining confidence in the other peer node as a provider of codats relevant to the particular area of interest from confidence in each of a set of codats relevant to the particular area of interest and provided by the other peer node.
- 35. The article of manufacture as recited in claim 28, wherein the software instructions are further executable to implement the peer node determining confidence in each codat in the set codats, and wherein, in said determining confidence in each codat in the set of codats, the software instructions are further executable to implement:
determining relevance of the particular codat to the particular area of interest; and determining popularity of the particular codat among the other peer nodes.
- 36. The article of manufacture as recited in claim 28, wherein the peer nodes are configured to implement a peer-to-peer environment on the network according to a peer-to-peer platform comprising one or more peer-to-peer platform protocols for enabling the peer nodes to discover each other, communicate with each other, and to find and exchange the codats in the peer-to-peer environment.
PRIORITY INFORMATION
[0001] This application claims benefit of priority to provisional application Serial No. 60/308,932 filed Jul. 31, 2001 titled Trust Mechanism For A Peer-To-Peer Network Computing Platform.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60308932 |
Jul 2001 |
US |