NETWORK-ASSISTED PEER-TO-PEER SECURE COMMUNICATION ESTABLISHMENT
First Claim
1. A method for secure communications, comprising:
- providing, by a first computing device, connectivity information associated therewith to a network server;
receiving, at the first computing device, connectivity information respectively associated with one or more other computing devices from the network server;
establishing, by the first computing device and independent of the network server, a security association with at least one of the one or more other computing devices; and
participating, by the first computing device and independent of the network server, in a secure peer-to-peer session with the at least one other computing device.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed for establishing network-assisted secure communications in a peer-to-peer environment. For example, a method for secure communications comprises the following steps. A first computing device provides connectivity information associated therewith to a network server. The first computing device receives connectivity information respectively associated with one or more other computing devices from the network server. The first computing device, independent of the network server, establishes a security association with at least one of the one or more other computing devices. The first computing device, independent of the network server, participates in a secure peer-to-peer session with the at least one other computing device.
-
Citations
20 Claims
-
1. A method for secure communications, comprising:
-
providing, by a first computing device, connectivity information associated therewith to a network server; receiving, at the first computing device, connectivity information respectively associated with one or more other computing devices from the network server; establishing, by the first computing device and independent of the network server, a security association with at least one of the one or more other computing devices; and participating, by the first computing device and independent of the network server, in a secure peer-to-peer session with the at least one other computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computing device, comprising:
-
a memory; and a processor device operatively coupled to the memory and configured to cause the computing device to; provide connectivity information associated with the computing device to a network server; receive from the network server connectivity information respectively associated with one or more other computing devices; establish, independent of the network server, a security association with at least one of the one or more other computing devices; and participate, independent of the network server, in a secure peer-to-peer session with the at least one other computing device.
-
-
18. A system, comprising:
-
a communications module; and a cryptography module operatively coupled to the communications module; wherein the communications module and the cryptography module cooperate to perform the steps of; providing connectivity information to a network server; receiving from the network server connectivity information respectively associated with one or more computing devices; establishing, independent of the network server, a security association with at least one of the one or more computing devices; and participating, independent of the network server, in a secure peer-to-peer session with the at least one computing device. - View Dependent Claims (19, 20)
-
Specification