Authenticating peer-to-peer connections
First Claim
1. A method of establishing and authenticating a peer-to-peer connection between at least two client components, said client components each having an authenticated connection to a server, said method comprising:
- exchanging a shared key between the client components via the server;
establishing a peer-to-peer connection between the client components;
exchanging the shared key between the client components via the established, peer-to-peer connection; and
authenticating each of the client components by verifying that the shared key exchanged via the peer-to-peer connection corresponds to the shared key exchanged via the server.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods employing authenticated connections to a central server to establish and authenticate a peer-to-peer connection between peer devices. The invention circumvents the potential vulnerability of clear-text transmission of secrets through a series of encrypted data transfers. A secret key is encrypted and then transmitted from one peer device to another using authenticated connections to the server. The secret key is then used to transmit encrypted data over a peer connection between the peer devices for the purpose of authenticating the peer devices on each end of the connection.
274 Citations
55 Claims
-
1. A method of establishing and authenticating a peer-to-peer connection between at least two client components, said client components each having an authenticated connection to a server, said method comprising:
-
exchanging a shared key between the client components via the server;
establishing a peer-to-peer connection between the client components;
exchanging the shared key between the client components via the established, peer-to-peer connection; and
authenticating each of the client components by verifying that the shared key exchanged via the peer-to-peer connection corresponds to the shared key exchanged via the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of establishing and authenticating a peer connection between a first device and a second device, the first device and the second device having authenticated connections to a server, said method comprising:
-
enabling the first device and the second device to exchange a shared key in encrypted form via the authenticated connections;
receiving a request from the first device for an identifier associated with the second device; and
transmitting the requested identifier to the first device, wherein the first device and the second device establish the peer connection based on the identifier. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. One or more computer-readable media having computer-executable components comprising:
-
a server component; and
one or more client components, wherein each of the client components has a authenticated connection to the server component, and wherein the server component interacts with each of the client components via the authenticated connection to establish and authenticate a peer connection between one or more of the client components. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A method of securing information between a first device and a second device, the method comprising:
-
establishing authenticated connections to a server from the first device and from the second device;
encrypting, in the first device, a shared key using a public key associated with the second device;
transmitting the shared key as encrypted using the public key associated with the second device from the first device to the second device via said authenticated connections to the server;
decrypting, in the second device, the shared key received from the first device;
establishing a peer connection between the first device and the second device;
encrypting, in the second device, the shared key received from the first device using a public key associated with the first device;
transmitting the shared key as encrypted using the public key associated with the first device from the second device to the first device via said peer connection;
decrypting, in the first device, the shared key received from the second device; and
confirming, in the first device, that the shared key received from the second device via said peer connection is the same as the shared key transmitted to the second device via said authenticated connections to the server to thereby authenticate the second device. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. A method of securing information between a first device and a second device, the method comprising:
-
establishing authenticated connections to a server from the first device and from the second device;
encrypting, in the first device, a shared key using a public key associated with the second device;
transmitting the shared key as encrypted using the public key associated with the second device from the first device to the second device via said authenticated connections to the common server;
decrypting, in the second device, the shared key received from the first device;
establishing a peer connection between the first device and the second device;
transmitting the shared key as encrypted using the public key associated with the second device from the first device to the second device via said peer connection;
decrypting, in the second device, the shared key received from the first device via said peer connection; and
confirming, in the second device, that the shared key received from the first device via said peer connection is the same as the shared key received from the first device via said authenticated connections to the server to thereby authenticate the first device. - View Dependent Claims (47, 48, 49, 50, 51, 52, 53, 54, 55)
-
Specification