Sensor derived authentication for establishing peer-to-peer networks
First Claim
Patent Images
1. A method for enabling a first computing device and a second computing device to communicate information, the method comprising, at the second computing device:
- receiving a request from the first computing device to establish a connection with the second computing device;
deriving at least one symmetric key based on at least one physical stimulus that is detected by the first computing device and the second computing device, wherein the first computing device correspondingly derives the at least one symmetric key in accordance with the at least one physical stimulus;
establishing a communication channel with the first computing device based on the at least one symmetric key; and
communicating, to the first computing device over the communication channel, at least a portion of information stored on the second computing device, wherein the first computing device updates its operational configuration in accordance with the at least a portion of information.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and devices for generating an authentication key are provided. Two or more communications devices can generate an authentication key by monitoring a physical stimulus that is experienced by both devices (e.g., a common physical stimulus). Each device can then use an identical, predetermined algorithm to generate a common authentication key based on the stimulus. The devices can use the common authentication key to establish a secure network.
36 Citations
20 Claims
-
1. A method for enabling a first computing device and a second computing device to communicate information, the method comprising, at the second computing device:
-
receiving a request from the first computing device to establish a connection with the second computing device; deriving at least one symmetric key based on at least one physical stimulus that is detected by the first computing device and the second computing device, wherein the first computing device correspondingly derives the at least one symmetric key in accordance with the at least one physical stimulus; establishing a communication channel with the first computing device based on the at least one symmetric key; and communicating, to the first computing device over the communication channel, at least a portion of information stored on the second computing device, wherein the first computing device updates its operational configuration in accordance with the at least a portion of information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A second computing device configured to communicate information with a first computing device, the second computing device comprising:
-
at least one processor; and at least one memory configured to store instructions that, when executed by the at least one processor, cause the second computing device to; receive a request from the first computing device to establish a connection with the second computing device; derive at least one symmetric key based on at least one physical stimulus that is detected by the first computing device and the second computing device, wherein the first computing device correspondingly derives the at least one symmetric key in accordance with the at least one physical stimulus; establish a communication channel with the first computing device based on the at least one symmetric key; and communicate, to the first computing device over the communication channel, at least a portion of information stored on the second computing device, wherein the first computing device updates its operational configuration in accordance with the at least a portion of information. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. At least one non-transitory machine-readable storage medium configured to store instructions that, when executed by at least one processor included in a second computing device, cause the second computing device to communicate information with a first computing device, by carrying out steps that include:
-
receiving a request from the first computing device to establish a connection with the second computing device; deriving at least one symmetric key based on at least one physical stimulus that is detected by the first computing device and the second computing device, wherein the first computing device correspondingly derives the at least one symmetric key in accordance with the at least one physical stimulus; establishing a communication channel with the first computing device based on the at least one symmetric key; and communicating, to the first computing device over the communication channel, at least a portion of information stored on the second computing device, wherein the first computing device updates its operational configuration in accordance with the at least a portion of information. - View Dependent Claims (17, 18, 19, 20)
-
Specification