Secure protocol for peer-to-peer network
First Claim
1. A method of managing wireless communications, the method comprising:
- operating a wireless computing device as a controlling member of a peer-to-peer group, including;
providing a master key to each of multiple remote devices, wherein the individual master key for each specific remote device of the multiple remote devices is different than the master key for every other remote device of the multiple remote devices;
determining whether a master key of a first remote device that is attempting to join the peer-to-peer group is valid; and
in response to determining that the master key of the first remote device is valid, generating a transient key for the first remote device based on the master key of the first remote device.
2 Assignments
0 Petitions
Accused Products
Abstract
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.
243 Citations
20 Claims
-
1. A method of managing wireless communications, the method comprising:
operating a wireless computing device as a controlling member of a peer-to-peer group, including; providing a master key to each of multiple remote devices, wherein the individual master key for each specific remote device of the multiple remote devices is different than the master key for every other remote device of the multiple remote devices; determining whether a master key of a first remote device that is attempting to join the peer-to-peer group is valid; and in response to determining that the master key of the first remote device is valid, generating a transient key for the first remote device based on the master key of the first remote device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. At least one computer readable storage medium comprising a memory, or a disk, storing computer executable instructions for performing operations to manage a peer-to-peer wireless network, the operations comprising:
operating a first wireless device as a controller for the peer-to-peer wireless network, including; issuing an individual master key to each of multiple other wireless devices, wherein the individual master key issued to each of the other multiple wireless devices is different than the individual master key for every other wireless device of the multiple other wireless devices; determining whether a master key transmitted to the first wireless device by a second wireless device in association with an attempt by the second wireless device to join the peer-to-peer wireless network is valid; and in response to determining that the master key transmitted to the first wireless device by the second wireless device is valid, issuing a transient key for the peer-to-peer wireless network to the second wireless device. - View Dependent Claims (11, 12, 13, 14, 15)
-
16. A computing device comprising:
-
a radio; at least one processor; and computer storage medium storing computer-executable instructions for execution on the at least on processor, the computer-executable instructions for causing the computing device to; operate the computing device as a group owner of a peer-to-peer group of multiple remote devices; control the peer-to-peer group in accordance with a peer-to-peer protocol; exchange encrypted data with a particular remote device in the peer-to-peer group, the encrypted data being encrypted for decryption by the particular remote device with a transient key generated for that particular remote device; perform a key generation process for each of the multiple remote devices, the key generation process comprising, for each remote device of the multiple remote devices; generating an individualized master key for that remote device; and storing the master key for that remote device in a key store; determine validity of a master key presented by a remote device attempting to join the peer-to-peer group; and generate a transient key for the remote device attempting to join the peer-to-peer group if the master key presented by that remote device is determined to be valid. - View Dependent Claims (17, 18, 19, 20)
-
Specification