
Security Issues 169
signatures based on tokens obtained fro m the original content source from
which the contents are purchased. These tokens are time-stamped and have a
short valid time periods. Legitimate clients can periodically refresh the tokens
to continue the sharing, while pirates cannot do the same. Upon receiving
downloading requests, legitimate clients verify the identities of the requesting
peers. If the requesting peers are also legitimate, the digital signatures match
those associated with the shared file chunks. On the other ha nd, pirates ar e
detected because the signatures do not match.
Once a pirate’s downloading request is detected, ...