Peer-to-peer communications
First Claim
1. A method for establishing secure peer-to-peer communications comprising the steps of:
- authenticating a requesting peer with a security agent;
authenticating, with the security agent, a requested peer with which the requesting peer requests to communicate;
distributing an encrypted session key from the security agent to the requesting peer and the requested peer; and
encrypting communications between the requesting peer and the requested peer using the session key.
2 Assignments
0 Petitions
Accused Products
Abstract
A protocol for secure peer-to-peer communications is established based on existing cryptographic techniques and encryption algorithms. The peers (120, 130, 140) and a central security agent (110) undergo mutual authentication. A newly generated nonce is used for authentication, and a random session key is used for a session. The security agent (110) generates unique session keys for communication between peers (120, 130, 140). The security agent (110) removes the burden of mutual authentication between requested peer (130, 140) and the requesting peer (120), as the security agent (110) independently authenticates the requesting peer (120) and the requested peer (130, 140). The requested peer (130, 140) and the requesting peer (120) are sent a session key by the security agent (110).
63 Citations
25 Claims
-
1. A method for establishing secure peer-to-peer communications comprising the steps of:
-
authenticating a requesting peer with a security agent;
authenticating, with the security agent, a requested peer with which the requesting peer requests to communicate;
distributing an encrypted session key from the security agent to the requesting peer and the requested peer; and
encrypting communications between the requesting peer and the requested peer using the session key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product for establishing secure peer-to-peer communications comprising computer software recorded on a computer-readable medium for performing the steps of:
-
authenticating a requesting peer with a security agent;
authenticating, with the security agent, a requested peer with which the requesting peer requests to communicate;
distributing a secret session key from the security agent to the requested peer and the requesting peer; and
encrypting communications between the requesting peer and the requested peer using the secret session key. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus for enabling secure peer-to-peer communications, the apparatus comprising:
-
a first, security agent computer system and a second, requesting peer computer system, the first computer program having a first processor and first memory, wherein the first memory includes a first computer program and the first processor is operative with the first program to perform the steps of;
authenticating the requesting peer;
authenticating at least one requested peer with which the requesting peer requests to communicate; and
distributing an encrypted session key to the requesting peer and the requested peer;
wherein the second computer system has a second processor and second memory, the second memory includes a second computer program and the second processor is operative with the second program to perform the step of encrypting a communication to the requested peer using the session key. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification