METHODS AND DEVICES FOR CREATING SECURITY GROUP AND AUTHENTICATION OVER P2P NETWORK
First Claim
1. A method of creating a security group over a Peer-To-Peer (P2P) network, comprising:
- one or more invitee terminals each attaching a public key to a peer advertisement in which its own identification information is encrypted using its own private key, and sending a resulting peer advertisement over the P2P network;
an inviter terminal, which has found the peer advertisement, encrypting a group advertisement, including group information about the security group, using public keys of the corresponding invitee terminals, and then sending resulting group advertisements to the invitee terminals which the inviter terminal desires to invite to the security group; and
each of the invitee terminals which received the group advertisements decrypting the received group advertisement using its own private key, and participating in the security group using the group information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of creating a security group over a Peer-To-Peer (P2P) network is disclosed. An invitee terminal attaches a public key to a peer advertisement in which its own identification information is encrypted using its own private key, and then sends a resulting peer advertisement over the P2P network. An inviter terminal, which has found the peer advertisement, encrypts a group advertisement, including group information about the security group, using public keys of the corresponding invitee terminal, and then sends a resulting group advertisement to the invitee terminal desired to be invited to the security group. The invitee terminal decrypts the group advertisement using its own private key, and participates in the security group using the group information.
43 Citations
8 Claims
-
1. A method of creating a security group over a Peer-To-Peer (P2P) network, comprising:
-
one or more invitee terminals each attaching a public key to a peer advertisement in which its own identification information is encrypted using its own private key, and sending a resulting peer advertisement over the P2P network; an inviter terminal, which has found the peer advertisement, encrypting a group advertisement, including group information about the security group, using public keys of the corresponding invitee terminals, and then sending resulting group advertisements to the invitee terminals which the inviter terminal desires to invite to the security group; and each of the invitee terminals which received the group advertisements decrypting the received group advertisement using its own private key, and participating in the security group using the group information. - View Dependent Claims (2)
-
-
3. A method of an inviter terminal of a security group authenticating one or more invitee terminals over a P2P network, comprising:
-
the invitee terminals each encrypting a propagation permission request message, together with its own signature, using a public key of the inviter terminal, and sending a resulting propagation permission request message, so as to propagate a message within the security group; the inviter terminal decrypting the propagation permission request message using its own private key, and then authenticating whether the invitee terminal corresponds to a terminal that the inviter terminal has invited; and when the authentication is completed, the inviter terminal sending a propagation permission response message to the corresponding invitee terminal. - View Dependent Claims (4)
-
-
5. A device for creating a security group over a P2P network, comprising:
-
one or more invitee terminals each for attaching a public key to a peer advertisement, in which its own identification information is encrypted using its own private key, sending a resulting peer advertisement over the P2P network, and, when a group advertisement including group information about the security group is sent over the P2P network, decrypting the group advertisement using its own private key and participating in the security group using the group information; and an inviter terminal for searching for the peer advertisement to be sent over the P2P network, encrypting the group advertisement using respective public keys of the corresponding invitee terminals, and sending resulting group advertisements to the invitee terminals which the inviter terminal desires to invite to the security group. - View Dependent Claims (6)
-
-
7. A device for authenticating participation in a security group over a P2P network to which a group advertisement, including group information about the security group and a public key of an inviter party, is sent, the device comprising:
-
one or more invitee terminals each for encrypting a propagation permission request message, together with its own signature, using the public key, and sending a resulting propagation permission request message so as to propagate a message within the security group; and an inviter terminal for decrypting the propagation permission request message using its own private key, authenticating whether the invitee terminal corresponds to a terminal invited by the inviter terminal, and, when the authentication is completed, sending a propagation permission response message to the corresponding invitee terminal. - View Dependent Claims (8)
-
Specification