Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP)
First Claim
1. A method of constructing a domain based on a public key and implementing the domain using universal plug and play (UPnP) so that a unique domain can be constructed to allow only an authorized user to use content in a public-key based architecture in a home network, comprising:
- (a) selecting one of controlled devices that are operable as a master device and determining the selected one of the controlled devices, as the master device;
(b) performing device authentication in such a manner that other controlled devices receive a secret information block from the determined master device and create certificates; and
(c) determining slave devices by selecting one or more devices among authenticated controlled devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of constructing a unique domain for preventing content from being illegally used by an unauthorized third person in a public key-based architecture and applying the constructed domain to a home network using universal plug and play (UPnP). The method of the present invention includes selecting one of controlled devices that are operable as a master device and determining the selected device as the master device; performing device authentication in such a manner that other controlled devices receive a secret information block from the determined master device and create certificates; and determining slave devices by selecting one or more devices among the authenticated controlled devices.
69 Citations
8 Claims
-
1. A method of constructing a domain based on a public key and implementing the domain using universal plug and play (UPnP) so that a unique domain can be constructed to allow only an authorized user to use content in a public-key based architecture in a home network, comprising:
-
(a) selecting one of controlled devices that are operable as a master device and determining the selected one of the controlled devices, as the master device;
(b) performing device authentication in such a manner that other controlled devices receive a secret information block from the determined master device and create certificates; and
(c) determining slave devices by selecting one or more devices among authenticated controlled devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification