Secure protocol for peer-to-peer network
First Claim
1. A method of managing wireless communications, the method comprising:
- operating a wireless computing device as a controlling member of a peer-to-peer group, including;
performing a key generation process with a first wireless device, including;
providing a first master key to the first wireless device;
performing a key generation process with a second wireless device, including;
providing a second master key to the second wireless device, the second master key being different than the first master key;
forming a peer-to-peer group including the first wireless device and the second wireless device as clients, the forming comprising;
authenticating the first wireless device based on the first master key;
generating a first transient key based on the first master key;
authenticating the second wireless device based on the second master key; and
generating a second transient key based on the second master key; and
exchanging data with the first wireless device and the second wireless device as part of the peer-to-peer group, the exchanging comprising;
encrypting data for transmission to the first wireless device with the first transient key; and
encrypting data for transmission to the second wireless device with the second transient key.
2 Assignments
0 Petitions
Accused Products
Abstract
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.
-
Citations
20 Claims
-
1. A method of managing wireless communications, the method comprising:
operating a wireless computing device as a controlling member of a peer-to-peer group, including; performing a key generation process with a first wireless device, including; providing a first master key to the first wireless device; performing a key generation process with a second wireless device, including; providing a second master key to the second wireless device, the second master key being different than the first master key; forming a peer-to-peer group including the first wireless device and the second wireless device as clients, the forming comprising; authenticating the first wireless device based on the first master key; generating a first transient key based on the first master key; authenticating the second wireless device based on the second master key; and generating a second transient key based on the second master key; and exchanging data with the first wireless device and the second wireless device as part of the peer-to-peer group, the exchanging comprising; encrypting data for transmission to the first wireless device with the first transient key; and encrypting data for transmission to the second wireless device with the second transient key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A computing device comprising:
-
a radio; at least one processor; and computer storage medium storing computer-executable components for execution on the at least on processor, the computer-executable components comprising; a peer-to-peer control component configured to operate the computing device as a group owner of a peer-to-peer group of multiple remote devices, and to control the peer-to-peer group in accordance with a peer-to-peer protocol; a key generator, the key generator configured to provide a master key to each of the multiple remote devices, wherein the master key for each of the multiple remote devices is different than the master key for every other remote device of the multiple remote devices; and an authentication component, the authentication component configured to; determine whether a remote device attempting to join the peer-to-peer group has a valid master key; and in response to a determination that the remote device attempting to join the peer-to-peer group has the valid master key, generate a transient key for the remote device based on the valid master key. - View Dependent Claims (9, 10, 11, 12)
-
-
13. At least one computer readable storage medium comprising a memory, or a disk, that stores computer executable instructions that, when executed by a processor of a controller device, perform a method comprising:
-
performing a key generation process with each of a plurality of remote devices, the key generation process comprising, for each remote device of the plurality of remote devices; providing a master key to that remote device; and storing the master key for that remote device in a key store; forming, as a controlling member, a peer-to-peer group of the controller device and at least a subset of the plurality of remote devices, the forming comprising, for each remote device in the subset; authenticating that remote device based on the master key stored in the key store for that remote device; and generating a transient key for that remote device based on the master key stored in the key store for that remote device; and exchanging data with the remote devices in the peer-to-peer group, the exchanging comprising, for one or more remote devices in the group; encrypting data to be sent to that remote device with the transient key generated for that remote device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification