Method and device for establishing device connection
A technology of equipment and electronic equipment, applied in the direction of digital transmission system, digital data authentication, secure communication device, etc., can solve problems such as hindering computing equipment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] The techniques described herein utilize trusted entities within a domain to enable domain-joined devices to establish trust with each other so they can discover and connect to each other securely. Trust can be established between devices if they have verified each other as authenticated devices. In various examples discussed herein, a device is configured to provide trust information to a trusted entity and / or receive trust information from a trusted entity. Trust information may include, for example, the public key of an encryption key pair, a certificate of authenticity that has been signed by a trusted entity and / or a hash function and hash seed used to compute a series of results forming a hash chain . A device can use the trust information to securely and automatically (eg, without any or limited user involvement) discover and connect to another device. In addition, a device can use trust information to dynamically change the MAC address used to communicate with ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


