Automated secure pairing for wireless devices
First Claim
Patent Images
1. A method for pairing at least two devices, the method comprising:
- performing, via a direct connection between the at least two devices, a first authentication protocol including;
receiving, at a target device of the at least two devices, a pairing request that includes an identifier; and
comparing, by the target device, the identifier to entries previously stored in an address book;
in an event that the comparing indicates that the identifier coincides with at least one of the entries previously stored in the address book, performing, via an indirect connection between the at least two devices, a second authentication protocol including;
generating a random nonce;
encrypting the random nonce using a security key;
sending a challenge that includes the encrypted random nonce;
receiving a challenge response that includes the random nonce that is decrypted; and
comparing the random that is decrypted and received in the challenge response to the random nonce that is generated; and
determining, by the target device, to accept the pairing request based at least in part on whether the random nonce that is decrypted matches the random nonce that is generated.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and/or techniques (“tools”) are described herein that relate to automated secure pairing for devices, and that relate to parallel downloads of content using devices. The tools for pairing the devices may perform authentication protocols that are based on addresses and on keys. The address-based authentication protocol may operate on address book entries maintained by the devices. The key-based authentication protocol may operate using a key exchange between the devices.
63 Citations
20 Claims
-
1. A method for pairing at least two devices, the method comprising:
-
performing, via a direct connection between the at least two devices, a first authentication protocol including; receiving, at a target device of the at least two devices, a pairing request that includes an identifier; and comparing, by the target device, the identifier to entries previously stored in an address book; in an event that the comparing indicates that the identifier coincides with at least one of the entries previously stored in the address book, performing, via an indirect connection between the at least two devices, a second authentication protocol including; generating a random nonce; encrypting the random nonce using a security key; sending a challenge that includes the encrypted random nonce; receiving a challenge response that includes the random nonce that is decrypted; and comparing the random that is decrypted and received in the challenge response to the random nonce that is generated; and determining, by the target device, to accept the pairing request based at least in part on whether the random nonce that is decrypted matches the random nonce that is generated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer storage media comprising machine-readable instructions that, when executed by the machine, cause the machine to:
-
receive a pairing request containing an identifier of an initiating device over a direct communication link between the initiating device and a target device; perform a first authentication protocol via the direct communication link, the first authentication protocol comprising verifying, by the target device, that the identifier coincides with at least one previously stored entry in an address book of the target device; and in an event that the identifier coincides with the at least one previously stored entry in the address book of the target device, perform a second authentication protocol via an indirect communication link between the initiating device and the target device, the second authentication protocol to; generate a first nonce and a second nonce; encrypt the first nonce using an authentication key; send a challenge to the initiating device, the challenge including the first nonce in an encrypted form and the second nonce in a decrypted form; and receive a challenge response containing the first nonce in a decrypted form. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer storage media comprising machine-readable instructions that, when executed by the machine, cause the machine to:
perform a first authentication protocol over a direct communication link between at least two devices, the first authentication protocol to; receive, by a target device of the at least two devices, a pairing request that includes an identifier via a direct connection between the at least two devices; compare, by the target device, the identifier to previously stored entries in an address book of the target device; and in an event that the identifier coincides with at least one of the previously stored entries in the address book of the target device, verify a success of a second authentication protocol performed over an indirect communication link between the at least two devices, the second authentication protocol to; generate a random nonce; encrypt the random nonce using a security key; send a challenge that includes the encrypted random nonce; receive a challenge response that includes the random nonce that is decrypted; compare the random nonce that is decrypted to the random nonce that is generated; and determine, by the target device, to accept the pairing request at least when the random nonce that is decrypted matches the random nonce that is generated.
Specification