Local area network
First Claim
1. A method, by a security manager in a first ad-hoc network, of facilitating communication between a first device located in the first ad-hoc network and a second device located in a second ad-hoc network, the method comprising:
- authenticating with the first device;
sending the first device a first group key;
receiving, via first and second relay agents, a request for authentication from the second device, wherein the first ad-hoc network includes a first plurality of devices, the second ad-hoc network includes a second plurality of devices, and the first relay agent is in the first ad-hoc network and the second relay agent is in the second ad-hoc network; and
sending the second device the first group key.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and system for distributed security for a plurality of devices in a communication network, each of the devices being responsible for generating, distributing and controlling its own keys for access to the communication network and using the keys to establish a trusted network, each device'"'"'s membership to the communication network being checked periodically by other devices by using a challenge response protocol to establish which devices are allowed access to the communication network and the trusted network.
-
Citations
11 Claims
-
1. A method, by a security manager in a first ad-hoc network, of facilitating communication between a first device located in the first ad-hoc network and a second device located in a second ad-hoc network, the method comprising:
-
authenticating with the first device; sending the first device a first group key; receiving, via first and second relay agents, a request for authentication from the second device, wherein the first ad-hoc network includes a first plurality of devices, the second ad-hoc network includes a second plurality of devices, and the first relay agent is in the first ad-hoc network and the second relay agent is in the second ad-hoc network; and sending the second device the first group key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security manager in a first ad-hoc network configured to perform operations to facilitate communication between a first device located in the first ad-hoc network and a second device located in a second ad-hoc network, the operations comprising:
-
authenticating with the first device; sending the first device a first group key; receiving, via first and second relay agents, a request for authentication from the second device, wherein the first ad-hoc network includes a first plurality of devices, the second ad-hoc network includes a second plurality of devices, and the first relay agent is in the first ad-hoc network and the second relay agent is in the second ad-hoc network; and sending the second device the first group key. - View Dependent Claims (11)
-
Specification