Generation of self-certified identity for efficient access control list management
First Claim
Patent Images
1. A method for registering a new device to a control point in a home network, the method comprising:
- generating a first self-certified control point device identification at the control point, the self-certified control point device identification uniquely identifying the control point, wherein a pseudo-random function uses a control point device identification name and a generated pseudo-random number for inputs for generating the first self-certified control point device identification; and
sending a secure message to the new device containing the first self-certified control point device identification.
2 Assignments
0 Petitions
Accused Products
Abstract
In a first embodiment of the present invention, a method for registering a new device to a control point in a home network is provided, the method comprising: generating a first self-certified identification at the control point, the generation using a pseudo-random generated number and using an identification of the control point; and sending a secure message to the new device containing the first self-certified identification.
14 Citations
20 Claims
-
1. A method for registering a new device to a control point in a home network, the method comprising:
-
generating a first self-certified control point device identification at the control point, the self-certified control point device identification uniquely identifying the control point, wherein a pseudo-random function uses a control point device identification name and a generated pseudo-random number for inputs for generating the first self-certified control point device identification; and sending a secure message to the new device containing the first self-certified control point device identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for copying access control list entries from a first device in a home network to a second device in a home network, the method comprising:
-
sending a request to access the access control list (ACL) entries from a control point to the first device, the request including a self-certified control point device identification of the control point, the self-certified control point device identification uniquely identifying the control point, wherein the self-certified control point device identification is generated by using a pseudo-random function that uses a generated pseudo-random number and a device identification name as inputs; accessing the ACL entries on the first device after the first device authenticates the self-certified control point device identification; sending a request to access an ACL from the control point to the second device, the request including the self-certified control point device identification; and copying the ACL entries from the first device to the second device after the second device authenticates the self-certified control point device identification. - View Dependent Claims (12)
-
-
13. A control point in a home network, the control point comprising:
-
means for generating a first self-certified control point device identification at the control point, the self-certified control point device identification uniquely identifying the control point, wherein a pseudo-random function uses a pseudo-random generated number and a device identification name of the control point as inputs for generating the first self-certified control point device identification; and means for sending a secure message to the new device containing the first self-certified control point device identification. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A control point in a home network, the control point comprising:
-
means for sending a request to access the access control list (ACL) entries from the control point to the first device, the request including a self-certified control point device identification, the self-certified control point device identification uniquely identifying the control point, wherein the self-certified control point device identification is generated by a pseudo-random function that uses a pseudo-random generated number and a device identification name of the control point as inputs for generating the self-certified control point device identification; means for accessing the ACL entries on the first device after the first device authenticates the self-certified control point device identification; means for sending a request to access an ACL from a control point to the second device, the request including the self-certified control point device identification of the control point; means for copying the ACL entries from the first device to the second device after the second device authenticates the self-certified control point device identification.
-
-
19. A program storage device readable by a machine, tangibly embodying a set of computer instructions executable by the machine to perform a method for registering a new device to a control point in a home network, the method comprising:
-
generating a first self-certified control point device identification at the control point, the self-certified control point device identification uniquely identifying the control point, wherein a pseudo-random function uses a pseudo-random generated number and a device identification name of the control point as inputs for generating the first self-certified control point device identification; and sending a secure message to the new device containing the first self-certified control point device identification.
-
-
20. A program storage device readable by a machine, tangibly embodying a set of computer instructions executable by the machine to perform a method for copying access control list entries from a first device in a home network to a second device in a home network, the method comprising:
-
sending a request to access the access control list (ACL) entries from a control point to the first device, the request including a self-certified control point device identification, the self-certified control point device identification uniquely identifying the control point, wherein the self-certified control point device identification is generated by a pseudo-random function that uses a pseudo-random generated number and a device identification name of the control point as inputs; accessing the ACL entries on the first device after the first device authenticates the self-certified control point device identification; sending a request to access an ACL from a control point to the second device, the request including the self-certified control point device identification of the control point; and copying the ACL entries from the first device to the second device after the second device authenticates the self-certified control point device identification.
-
Specification