Peer-to-peer communications
First Claim
1. A method for establishing secure peer-to-peer communications comprising the steps of:
- authenticating a requesting peer with a security agent;
generating an encrypted request for peer-to-peer communication with a requested peer, wherein the request includes an identification of the requested peer and the generating of the request includes tile requesting peer encrypting the requested peer identification, wherein the encrypting uses a public key of the security agent;
sending the encrypted, peer-to-peer communication request to the security agent from the requesting peer;
authenticating the requested peer with the security agent;
generating a session key by the security agent;
generating a first encrypted instance of the session key by the security agent using a public key of the requested peer;
generating a second encrypted instance of the session key by the security agent using a public key of the requesting peer;
sending the first encrypted instance of the session key by the security agent to the requested peer;
sending the second encrypted instance of the session key by the security agent to the requesting peer;
encrypting data by the requesting peer using the second encrypted instance of the session key;
sending the encrypted data directly from the requesting peer to the requested peer; and
receiving the encrypted data and decrypting the encrypted data by the requested peer, wherein the decrypting uses the first instance of the encrypted session key.
2 Assignments
0 Petitions
Accused Products
Abstract
A protocol for secure peer-to-peer communications is established based on existing cryptographic techniques and encryption algorithms. The peers (120, 130, 140) and a central security agent (110) undergo mutual authentication. A newly generated nonce is used for authentication, and a random session key is used for a session. The security agent (110) generates unique session keys for communication between peers (120, 130, 140). The security agent (110) removes the burden of mutual authentication between requested peer (130, 140) and the requesting peer (120), as the security agent (110) independently authenticates the requesting peer (120) and the requested peer (130, 140). The requested peer (130, 140) and the requesting peer (120) are sent a session key by the security agent (110).
52 Citations
11 Claims
-
1. A method for establishing secure peer-to-peer communications comprising the steps of:
-
authenticating a requesting peer with a security agent; generating an encrypted request for peer-to-peer communication with a requested peer, wherein the request includes an identification of the requested peer and the generating of the request includes tile requesting peer encrypting the requested peer identification, wherein the encrypting uses a public key of the security agent; sending the encrypted, peer-to-peer communication request to the security agent from the requesting peer; authenticating the requested peer with the security agent; generating a session key by the security agent; generating a first encrypted instance of the session key by the security agent using a public key of the requested peer; generating a second encrypted instance of the session key by the security agent using a public key of the requesting peer; sending the first encrypted instance of the session key by the security agent to the requested peer; sending the second encrypted instance of the session key by the security agent to the requesting peer; encrypting data by the requesting peer using the second encrypted instance of the session key; sending the encrypted data directly from the requesting peer to the requested peer; and receiving the encrypted data and decrypting the encrypted data by the requested peer, wherein the decrypting uses the first instance of the encrypted session key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification