IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0359208
(2006-02-21)
|
등록번호 |
US-7757274
(2010-08-02)
|
발명자
/ 주소 |
- Lillie, Terrance L.
- Wiedmann, Christian
- Zeljko, Robert
- Sneiderman, Richard P.
- Wiedmann, Ulrich
- Chu, Gigi C.
- Lynch, Sean R.
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
10 인용 특허 :
34 |
초록
▼
A system, method and computer program product are provided. In use, a first key is exchanged between a granting node and a requesting node via a peer-to-peer wireless network. Further, a human-perceptible hash is generated at the granting node and the requesting node, utilizing the first key. Such h
A system, method and computer program product are provided. In use, a first key is exchanged between a granting node and a requesting node via a peer-to-peer wireless network. Further, a human-perceptible hash is generated at the granting node and the requesting node, utilizing the first key. Such human-perceptible hashes are then compared via an out-of-band communication channel. To this end, a second key may then be transmitted to the requesting node for providing access to a centrally-based wireless network.
대표청구항
▼
What is claimed is: 1. A method, comprising: exchanging a first key between a granting node and a requesting node via a peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes vi
What is claimed is: 1. A method, comprising: exchanging a first key between a granting node and a requesting node via a peer-to-peer wireless network; generating a human-perceptible hash at the granting node and the requesting node, utilizing the first key; comparing the human-perceptible hashes via an out-of-band communication channel; and securely transmitting a second key to the requesting node based on the comparison of the human-perceptible hashes, the second key for providing access to a centrally-based wireless network. 2. The method as recited in claim 1, wherein the peer-to-peer wireless network includes an ad-hoc wireless network. 3. The method as recited in claim 1, wherein the centrally-based wireless network includes a network operating in an infrastructure mode. 4. The method as recited in claim 1, wherein the first key is utilized to establish a secure communication channel between the granting node and the requesting node. 5. The method as recited in claim 4, wherein the secure communication channel is established utilizing a transport layer security (TLS) session. 6. The method as recited in claim 1, wherein the first key is exchanged in response to a request by the requesting node. 7. The method as recited in claim 6, wherein the first key is exchanged based on user input through a graphical user interface presented on the granting node. 8. The method as recited in claim 6, wherein the granting node informs other nodes if the request is denied. 9. The method as recited in claim 1, wherein the human-perceptible hash includes an audibly-perceptible hash. 10. The method as recited in claim 1, wherein the human-perceptible hash includes a visually-perceptible hash. 11. The method as recited in claim 10, wherein the visually-perceptible hash includes text. 12. The method as recited in claim 10, wherein the visually-perceptible hash includes graphical images. 13. The method as recited in claim 1, wherein the human-perceptible hash is generated by the requesting node generating a first random value and the granting node generating a second random value. 14. The method as recited in claim 13, wherein the human-perceptible hash is further generated by the requesting node generating a first derived value utilizing the first random value, and the granting node generating a second derived value utilizing the second random value. 15. The method as recited in claim 14, wherein the human-perceptible hash is further generated by the requesting node and the granting exchanging the first and second derived values. 16. The method as recited in claim 15, wherein the human-perceptible hash is further generated by the requesting node combining the second derived value with the first random value, and the granting node combining the first derived value with the second random value. 17. The method as recited in claim 1, wherein the first key is utilized to establish a secure communication channel between the granting node and the requesting node, and the second key, which is different from the first key, provides access to the centrally-based wireless network. 18. A computer program product embodied on a computer readable storage medium, comprising: computer code for communicating a first key between a granting node and a requesting node via a peer-to-peer wireless network; computer code for generating a human-perceptible hash at at least one of the granting node and the requesting node, utilizing the first key, whereby the human-perceptible hash is capable of being compared via an out-of-band communication channel; and computer code for securely transmitting a second key to the requesting node based on the comparison of the human-perceptible hash, the second key for providing access to a centrally-based wireless network. 19. A system, comprising: a granting node and a requesting node for generating a human-perceptible hash utilizing a first key communicated via a peer-to-peer wireless network, and comparing the human-perceptible hash via an out-of-band communication channel; wherein the system is operable such that a second key is securely transmitted to the requesting node based on the comparison of the human-perceptible hash, the second key for providing access to a centrally-based wireless network.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.