Methods and systems for exchanging security information via peer-to-peer wireless networks
First Claim
Patent Images
1. A method, comprising:
- exchanging a first key between a granting node and a requesting node via a peer-to-peer wireless network;
generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key;
comparing the human-perceptible hashes via an out-of-band communication channel; and
transmitting a second key to the requesting node for providing access to a centrally-based wireless network.
10 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided. In use, a first key is exchanged between a granting node and a requesting node via a peer-to-peer wireless network. Further, a human-perceptible hash is generated at the granting node and the requesting node, utilizing the first key. Such human-perceptible hashes are then compared via an out-of-band communication channel. To this end, a second key may then be transmitted to the requesting node for providing access to a centrally-based wireless network.
-
Citations
20 Claims
-
1. A method, comprising:
-
exchanging a first key between a granting node and a requesting node via a peer-to-peer wireless network;
generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key;
comparing the human-perceptible hashes via an out-of-band communication channel; and
transmitting a second key to the requesting node for providing access to a centrally-based wireless network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product embodied on a computer readable medium, comprising:
-
computer code for communicating a first key between a granting node and a requesting node via a peer-to-peer wireless network;
computer code for generating a human-perceptible hash at at least one of the granting node and the requesting node, utilizing the first key, whereby the human-perceptible hash is capable of being compared via an out-of-band communication channel; and
computer code for transmitting a second key to the requesting node for providing access to a centrally-based wireless network.
-
-
20. A system, comprising:
-
a granting node and a requesting node for generating a human-perceptible hash utilizing a first key communicated via a peer-to-peer wireless network, and comparing the human-perceptible hash via an out-of-band communication channel;
wherein a second key is transmitted to the requesting node for providing access to a centrally-based wireless network.
-
Specification