POLICY-BASED TRUSTED PEER-TO-PEER CONNECTIONS
First Claim
1. A system, comprising:
- a first computing device comprising a processor and a memory, andan application comprising a set of machine-readable instructions stored in the memory and executable by the processor, wherein the machine-readable instructions, when executed, cause the first computing device to at least;
determine a public address of a first client device and an identifier of a second client device, wherein the public address of the first client device and the identifier of the second client device are specified in a message received from the first client device;
send a query to a second computing device, wherein the query specifies an identifier of the first client device and the identifier of the second client device;
determine that the first client device is authorized to communicate with the second client device based on a response to the query received from the second computing device; and
send the public address of the first client device to the second client device.
3 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various examples for implementations of policy-based trusted peer-to-peer connections. A computing device can receive a message from a first client device, the message specifying a public address of the first client device and an identifier of the second client, device. The computing device can then send a query to a computing device, wherein the query specifies an identifier of the first client device and the identifier of the second client device. The computing device can also determine that the first client device is authorized to communicate with the second client device based on a response to the query received from the second computing device. In some instances, the computing device can then send the public address of the first client device to the second client device.
-
Citations
20 Claims
-
1. A system, comprising:
-
a first computing device comprising a processor and a memory, and an application comprising a set of machine-readable instructions stored in the memory and executable by the processor, wherein the machine-readable instructions, when executed, cause the first computing device to at least; determine a public address of a first client device and an identifier of a second client device, wherein the public address of the first client device and the identifier of the second client device are specified in a message received from the first client device; send a query to a second computing device, wherein the query specifies an identifier of the first client device and the identifier of the second client device; determine that the first client device is authorized to communicate with the second client device based on a response to the query received from the second computing device; and send the public address of the first client device to the second client device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving a message from a first client device, the message specifying a public address of the first client device and an identifier of a second diem device; sending a query to a computing device, wherein the query specifies an identifier of the first client device and the identifier of the second client device; determining that the first client device is authorized to communicate with the second client device based on a response to the query received from the computing device; and sending the public address of the first client device to the second client device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium comprising a set of instructions that, when executed by a processor of a computing device, cause the computing device to at least:
-
receive a message from a first client device, the message specifying a public address of the first client device and an identifier of a second client device; send a query to a computing device, wherein the query specifies an identifier of the first client device and the identifier of the second client device; determine that the first client device is authorized to communicate with the second client device based on a response to the query received from the computing device; and send the public address of the first client device to the second client device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification