SECURE PROTOCOL FOR PEER-TO-PEER NETWORK
First Claim
1. A method of operating a wireless computing device configured as a controlling device in a peer-to-peer group, the method comprising:
- performing a key generation process with a first device, whereby a first master key is provided to the first device;
performing a key generation process with a second device, whereby a second master key is provided to the second device, the second master key being different than the first master key;
forming a peer-to-peer group including the first wireless device and the second wireless device as clients, the forming comprising;
authenticating the first wireless device based on the first master key;
generating a first transient key based on the first master key;
authenticating the second wireless device based on the second master key; and
generating a second transient key based on the second master key;
exchanging data with the first wireless device and the second wireless device as part of the peer-to-peer group, the exchanging comprising;
encrypting data sent to the first wireless device with the first transient key; and
encrypting data sent to the second wireless device with the second transient key.
2 Assignments
0 Petitions
Accused Products
Abstract
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.
84 Citations
20 Claims
-
1. A method of operating a wireless computing device configured as a controlling device in a peer-to-peer group, the method comprising:
-
performing a key generation process with a first device, whereby a first master key is provided to the first device; performing a key generation process with a second device, whereby a second master key is provided to the second device, the second master key being different than the first master key; forming a peer-to-peer group including the first wireless device and the second wireless device as clients, the forming comprising; authenticating the first wireless device based on the first master key; generating a first transient key based on the first master key; authenticating the second wireless device based on the second master key; and generating a second transient key based on the second master key; exchanging data with the first wireless device and the second wireless device as part of the peer-to-peer group, the exchanging comprising; encrypting data sent to the first wireless device with the first transient key; and encrypting data sent to the second wireless device with the second transient key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 12)
-
-
8. A computing device comprising:
-
a radio; at least one processor; computer storage medium comprising computer-executable components for execution on the at least on processor, the computer-executable components comprising; a peer-to-peer control component configured to interact with one or more remote devices to provide a group in accordance with a peer-to-peer protocol; a key generator, the key generator configured to interact with each of a plurality of remote devices to generate a unique master key for each of the plurality of remote devices; an authentication component, the authentication component configured to; determine whether a remote device attempting to join a peer-to-peer group controlled by the peer-to-peer control component has a valid master key, and when the remote device has a valid master key, interact with the remote device to generate a transient key for the remote device based on the valid master key. - View Dependent Claims (9, 10, 11)
-
-
13. At least one computer readable storage medium comprising computer executable instructions that, when executed by a processor, perform a method comprising:
-
performing a key generation process with each of a plurality of remote devices to provide a unique master key to each of the plurality of remote devices; storing the unique master key for each of the plurality of remote devices; forming a peer-to-peer group including at least a subset of the plurality of remote devices, the forming comprising, for each remote device in the subset; authenticating the device based on a stored master key; and generating a transient key based on the stored master key; exchanging data with the remote devices in the peer-to-peer group, the exchanging comprising, for one or more remote devices in the group; encrypting data sent to the remote device with a transient key generated for the remote device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification