发明名称 SECURELY CONNECTING CONTROL DEVICE TO TARGET DEVICE
摘要 In an approach, a target computing device receives a pairing request from a controller computing device, the pairing request including controller credentials that were previously received by the controller computing device from an authentication server computer and encrypted under a service key. The target computing device forwards the pairing request to the authentication server, the authentication server computer being configured to return a pairing response based at least in part on the controller credentials. The target computing device receives the pairing which includes a shared secret encrypted under a target device key and the same shared secret encrypted under a controller key. The target computing device decrypts the shared secret encrypted under the target device key and forwards the shared secret encrypted under the controller key to the controller device. Using the decrypted shared secret, the target computing device establishes a secure connection to the controller computing device.
申请公布号 US2015089222(A1) 申请公布日期 2015.03.26
申请号 US201414161558 申请日期 2014.01.22
申请人 NETFLIX, INC. 发明人 WHITE JEAN-MARIE;ODAYARKOIL BASKAR;ADAMS LEE
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method comprising: using a target computing device, receiving a pairing request from a controller computing device, the pairing request including controller credentials that were previously received by the controller computing device from an authentication server computer and encrypted under a service key that is not available to the controller computing device or the target computing device; using the target computing device, forwarding the pairing request to the authentication server computer, the authentication server computer being configured to return a pairing response based at least in part on the controller credentials; using the target computing device, receiving the pairing response from the authentication server computer, wherein the pairing response includes a shared secret encrypted under a target device key and the same shared secret encrypted under a controller key, the controller key being unavailable to the target computing device and the target device key being unavailable to the controller computing device; using the target computing device, decrypting the shared secret encrypted under the target device key; using the target computing device, forwarding the shared secret encrypted under the controller key to the controller device; using the target computing device, establishing a secure connection to the controller computing device using the decrypted shared secret; using the target computing device, receiving, over the secure connection, one or more control messages from the controller computing device that are configured to control one or more functions of the target computing device.
地址 Los Gatos CA US