Password Installation in Home Networks
First Claim
1. A terminal arranged to securely share data, comprising:
- a network interface for receiving multimedia content and connecting to at least one other terminal over a network;
one or more processors; and
a memory storing instructions which, when executed by the one or more processors, implementa) first password logic for receiving a first password that is used by the terminal to securely form the network with the at least one other terminal, andb) second password logic for receiving a second password from the at least one other terminal over the network secured by the first password and for resetting the first password with the second password to thereby secure the network using the second password.
1 Assignment
0 Petitions
Accused Products
Abstract
An arrangement is provided for securely sharing data on a network by enabling a user to select and install a commonly-shared password in each terminal device that is on the network. The terminal devices are then able to form a network that is temporarily secured using the user-installed password. A terminal-generated password is next created by one of the terminal devices and distributed over the temporarily secured network to the other devices. The terminal-generated password replaces the user-generated password so that the network is reformed and secured using the terminal-generated password. In one illustrative example, the terminal-generated password is created using a unique identifier, such as one or more MAC (Media Access Control) addresses associated with terminal devices on the network, as an input to a hash function that generates the new password having sufficient length and randomness to provide robust protection against password attack.
48 Citations
21 Claims
-
1. A terminal arranged to securely share data, comprising:
-
a network interface for receiving multimedia content and connecting to at least one other terminal over a network; one or more processors; and a memory storing instructions which, when executed by the one or more processors, implement a) first password logic for receiving a first password that is used by the terminal to securely form the network with the at least one other terminal, and b) second password logic for receiving a second password from the at least one other terminal over the network secured by the first password and for resetting the first password with the second password to thereby secure the network using the second password. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium containing instructions which, when executed by one or more processor disposed in an electronic device, performs a method comprising:
-
providing a user interface to enable user input of a temporary password that is usable by a first terminal for authenticating other terminals which possess the temporary password so as to form a temporary network on an infrastructure that is commonly shared by the first terminal and the other terminals; generating a new password; and transmitting the new password over the temporary network to authenticated terminals to replace the temporary password and form a password-secured network using the new password on the commonly shared infrastructure. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for enabling data to be securely shared over an infrastructure, the method comprising:
-
storing a user-generated password in a memory of a terminal; using the user-generated password for shared-key authentication for forming a network on the infrastructure with authenticated terminals; generating a terminal-generated password; and transmitting the terminal-generated password to the authenticated terminals on the network to thereby securely share data using the second password. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification