Secured peer-to-peer network data exchange
First Claim
Patent Images
1. A method comprising:
- a first peer sending a message to a second peer on a peer-to-peer network, wherein the message indicates that the first peer is requesting a session with the second peer;
the first peer sending a first public key to the second peer;
the second peer receiving the first message;
the second peer receiving the first public key;
the second peer determining if a session with the first peer is to be established in response to the message indicating the first peer is requesting a session with the second peer;
if it is determined that a session with the first peer is to be established;
the second peer generating a first session key from the first public key;
the second peer sending a message including the first session key to the first peer indicating that the second peer accepts the request for the session; and
the first peer receiving the message including the first session key; and
the first peer and the second peer using the first session key to encrypt and decrypt data exchanged between the first peer and the second peer to provide secure exchange of said data between the first peer and the second peer on the peer-to-peer network.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing secure exchange of messages between peers in peer groups. Embodiments may be used to provide secured sessions between peers in the peer-to-peer network. Embodiments may also be used to provide secured group sessions among a plurality of peers. A first peer may generate and send a public key to a second peer. The second peer may generate a session key from the public key. The second peer may send the session key to the first peer, or alternatively to two or more peers in a group session. The session key may be secured when sending. Messages and/or other data exchanged between the two peers may be encrypted and decrypted using the session key.
-
Citations
65 Claims
-
1. A method comprising:
-
a first peer sending a message to a second peer on a peer-to-peer network, wherein the message indicates that the first peer is requesting a session with the second peer; the first peer sending a first public key to the second peer; the second peer receiving the first message; the second peer receiving the first public key; the second peer determining if a session with the first peer is to be established in response to the message indicating the first peer is requesting a session with the second peer; if it is determined that a session with the first peer is to be established; the second peer generating a first session key from the first public key; the second peer sending a message including the first session key to the first peer indicating that the second peer accepts the request for the session; and the first peer receiving the message including the first session key; and the first peer and the second peer using the first session key to encrypt and decrypt data exchanged between the first peer and the second peer to provide secure exchange of said data between the first peer and the second peer on the peer-to-peer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
a first peer sending a first public key to a second peer in a peer-to-peer network; the second peer receiving the first public key; the second peer generating a first session key from the first public key; the second peer sending the first session key to the first peer; the first peer receiving the first session key; and the first peer and the second peer using the first session key to encrypt and decrypt data exchanged between the first peer and the second peer to provide secure exchange of said data between the first peer and the second peer on the peer-to-peer network. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method comprising:
-
a plurality of peers in a peer-to-peer network joining in a session; generating one or more session keys from one or more public keys of the plurality of peers, wherein the one or more session keys are configured for use by the plurality of peers to provide secure exchange of messages between peers in the session; wherein there are one or more unique pairs of the plurality of peers, wherein each unique pair of the plurality of peers shares a particular one of the one or more session keys, wherein the particular session key is generated from a public key of one of the particular pair of peers, and wherein only the particular pair of peers possesses the particular session key; and each of the one or more pairs of peers using the particular session key shared by the pair to encrypt and decrypt data exchanged between the peers in the pair to provide secure exchange of said data between the peers in the pair on the peer-to-peer network. - View Dependent Claims (26, 27, 28)
-
-
29. A method comprising:
-
a plurality of peers in a peer-to-peer network joining in a session; generating a session key from a public key of a first of the plurality of peers; providing the session key to each of the plurality of peers, wherein only the plurality of peers in the session possess the session key; and each of the plurality of peers in the session using the particular session key shared by the pair to encrypt and decrypt data exchanged between the peers in the session to provide secure exchange of said data among the peers in the session on the peer-to-peer network. - View Dependent Claims (30, 31, 32)
-
-
33. A peer-to-peer network comprising:
-
a plurality of network nodes coupled to the peer-to-peer network; a first peer configured to execute on one of the network nodes coupled to the peer-to-peer network; a second peer configured to execute on a different one of the network nodes coupled to the peer-to-peer network; wherein the first peer is configured to; send a message to the second peer requesting a session with the second peer; and send a first public key to the second peer; wherein the second peer is configured to; receive the first message requesting a session; receive the first public key; determine if a session with the first peer is to be established in response to the message requesting a session; if the second peer determines that a session with the first peer is to be established; generate a first session key from the first public key; send a second message to the first peer, wherein the second message indicates that the second peer accepts the request for the session; and send the first session key to the first peer; wherein the first peer is further configured to; receive the second message; receive the first session key; and wherein the first peer and the second peer are further configured to use the first session key to encrypt and decrypt data exchanged between the first peer and the second peer to provide secure exchange of said data between the first peer and the second peer on the peer-to-peer network. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A peer-to-peer network comprising:
-
a plurality of network nodes coupled to the peer-to-peer network; a first peer configured to execute on one of the network nodes coupled to the peer-to-peer network; a second peer configured to execute on one of the network nodes coupled to the peer-to-peer network; wherein the first peer is configured to send a first public key to the second peer; wherein the second peer is configured to; receive the first message; generate a first session key from the first public key; and send the first session key to the first peer; and wherein the first peer is further configured to receive the first session key; wherein the first peer and the second peer are further configured to use the first session key to encrypt and decrypt data exchanged between the first peer and the second peer to provide secure exchange of said data between the first peer and the second peer on the peer-to-peer network. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
-
56. A tangible, computer accessible medium comprising program instructions, wherein the program instructions are computer-executable to implement:
-
a first peer sending a first public key to a second peer in a peer-to-peer network; the second peer receiving the first public key; the second peer generating a first session key from the first public key; the second peer sending the first session key to the first peer; the first peer receiving the first session key; and the first peer and the second peer using the first session key to encrypt and decrypt data exchanged between the first peer and the second peer to provide secure exchange of said data between the first peer and the second peer on the peer-to-peer network. - View Dependent Claims (57, 58, 59, 60, 61, 62, 63, 64, 65)
-
Specification