Automated Secure Pairing for Wireless Devices
First Claim
Patent Images
1. A method for pairing at least two devices, the method comprising:
- performing, via a direct connection between the at least two devices, a first authentication protocol including;
receiving a pairing request that includes an identifier; and
comparing the identifier to entries previously stored in an address book;
performing, via an indirect connection between the at least two devices, a second authentication protocol including;
generating a randomly generated nonce using a security key;
encrypting the randomly generated nonce using the security key;
sending a challenge that includes the encrypted randomly generated nonce;
receiving a challenge response that includes the randomly generated nonce that is decrypted; and
comparing the randomly generated nonce that is decrypted and received in the challenge response to the randomly generated nonce that is generated; and
determining to accept the pairing request based in part on whether the identifier coincides with at least one of the entries stored in the address book and the randomly generated nonce that is decrypted matches the randomly generated nonce that is generated based at least in part on the comparing.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and/or techniques (“tools”) are described herein that relate to automated secure pairing for devices, and that relate to parallel downloads of content using devices. The tools for pairing the devices may perform authentication protocols that are based on addresses and on keys. The address-based authentication protocol may operate on address book entries maintained by the devices. The key-based authentication protocol may operate using a key exchange between the devices.
-
Citations
20 Claims
-
1. A method for pairing at least two devices, the method comprising:
-
performing, via a direct connection between the at least two devices, a first authentication protocol including; receiving a pairing request that includes an identifier; and comparing the identifier to entries previously stored in an address book; performing, via an indirect connection between the at least two devices, a second authentication protocol including; generating a randomly generated nonce using a security key; encrypting the randomly generated nonce using the security key; sending a challenge that includes the encrypted randomly generated nonce; receiving a challenge response that includes the randomly generated nonce that is decrypted; and comparing the randomly generated nonce that is decrypted and received in the challenge response to the randomly generated nonce that is generated; and determining to accept the pairing request based in part on whether the identifier coincides with at least one of the entries stored in the address book and the randomly generated nonce that is decrypted matches the randomly generated nonce that is generated based at least in part on the comparing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable storage media comprising machine-readable instructions that, when executed by the machine, cause the machine to:
-
receive a pairing request containing an identifier of an initiating device over the direct communication link between the initiating device and a target device; perform a first authentication protocol via the direct communication link, the first authentication protocol comprising verifying that the identifier coincides with at least one previously stored entry in an address book of the target device; and perform a second authentication protocol via an indirect communication link between the initiating device and the target device, the second authentication protocol to; generate a first nonce and a second nonce; encrypt the first nonce using an authentication key; send a challenge to the initiating device, the challenge including the first nonce in an encrypted form and the second nonce in a decrypted form; and receive a challenge response containing the first nonce in a decrypted form and the second nonce in an encrypted form. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-readable storage media comprising machine-readable instructions that, when executed by the machine, cause the machine to:
-
receive a pairing request that includes an identifier via a direct connection between the at least two devices; compare the identifier to previously stored entries in an address book; and generate a randomly generated nonce using a security key; encrypt the randomly generated nonce using the security key; send, via an indirect connection between the at least two devices, a challenge that includes the encrypted randomly generated nonce; receive, via the indirect connection, a challenge response that includes the randomly generated nonce that is decrypted; compare the randomly generated nonce that is decrypted to the randomly generated nonce that is generated; and determine to accept the pairing request if the identifier coincides with at least one of the previously stored entries in the address book and the randomly generated nonce that is decrypted matches the randomly generated nonce that is generated.
-
Specification