Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for establishing device connection

A technology of equipment and electronic equipment, applied in the direction of digital transmission system, digital data authentication, secure communication device, etc., can solve problems such as hindering computing equipment

Active Publication Date: 2020-07-03
MICROSOFT TECH LICENSING LLC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While using random MAC addresses helps address the problem of attacks or malicious entities forging a connection to a computing device, using random MAC addresses also prevents efficient (e.g., automatic) discovery between two computing devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for establishing device connection
  • Method and device for establishing device connection
  • Method and device for establishing device connection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The techniques described herein utilize trusted entities within a domain to enable domain-joined devices to establish trust with each other so they can discover and connect to each other securely. Trust can be established between devices if they have verified each other as authenticated devices. In various examples discussed herein, a device is configured to provide trust information to a trusted entity and / or receive trust information from a trusted entity. Trust information may include, for example, the public key of an encryption key pair, a certificate of authenticity that has been signed by a trusted entity and / or a hash function and hash seed used to compute a series of results forming a hash chain . A device can use the trust information to securely and automatically (eg, without any or limited user involvement) discover and connect to another device. In addition, a device can use trust information to dynamically change the MAC address used to communicate with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The techniques described herein utilize trusted entities within a domain to enable devices to establish trust with each other so they can discover and connect to each other securely. In various examples discussed herein, a device is configured to provide trust information to the trusted entity and / or receive trust information from the trusted entity. Said trust information may for example comprise a public key of an encryption key pair, a certificate of authenticity which has been signed by said trusted entity and / or a hash function used to compute a sequence of results forming a hash chain and the hash seed. The device may use the trust information to securely and automatically (eg, without any or limited user involvement) discover and connect to another device. Additionally, the device may use the trust information to dynamically alter a MAC address used to communicate with the other device.

Description

Background technique [0001] Typically, a computing device broadcasts a static Media Access Control (MAC) address that allows other devices to discover the device and connect to the device via the broadcasted static MAC address. A MAC address includes a unique identifier assigned to a network interface for communication on a physical network segment. For example, MAC addresses are used as network addresses for Ethernet and Wi-Fi. [0002] However, by broadcasting its static MAC address, a computing device becomes vulnerable to attacks or malicious entities (eg, devices) with which the computing device does not intend to connect. Attacks or malicious entities can utilize static MAC addresses to forge connections, consume data from the device, and in various instances even take control of the device. To combat these attacks or malicious entities, computing devices can be associated with random MAC addresses and / or static universal MAC addresses. For example, pairing and discov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/0823H04L63/0853H04L63/0876H04L63/0442H04L9/0825H04L9/3236H04L9/3265G06F21/44H04L9/50H04L63/10
Inventor P.达伍德 谢诺达 达伍德A.萨布里H.索尼D.M.因加尔斯N.L.波特
Owner MICROSOFT TECH LICENSING LLC