The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 06, 2016

Filed:

Jul. 06, 2015
Applicant:

Netflix, Inc., Los Gatos, CA (US);

Inventors:

Jean-Marie White, San Jose, CA (US);

Baskar Odayarkoil, Los Gatos, CA (US);

Lee Adams, Los Gatos, CA (US);

Assignee:

Netflix, Inc., Los Gatos, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/08 (2006.01); H04W 12/04 (2009.01); H04W 12/06 (2009.01); H04L 9/32 (2006.01);
U.S. Cl.
CPC ...
H04L 63/061 (2013.01); H04L 9/0822 (2013.01); H04L 9/0827 (2013.01); H04L 9/3297 (2013.01); H04L 63/0428 (2013.01); H04L 63/0471 (2013.01); H04W 12/04 (2013.01); H04W 12/06 (2013.01); H04L 2463/062 (2013.01);
Abstract

In an approach, a target computing device receives a pairing request from a controller computing device, the pairing request including controller credentials that were previously received by the controller computing device from an authentication server computer and encrypted under a service key. The target computing device forwards the pairing request to the authentication server, the authentication server computer being configured to return a pairing response based at least in part on the controller credentials. The target computing device receives the pairing which includes a shared secret encrypted under a target device key and the same shared secret encrypted under a controller key. The target computing device decrypts the shared secret encrypted under the target device key and forwards the shared secret encrypted under the controller key to the controller device. Using the decrypted shared secret, the target computing device establishes a secure connection to the controller computing device.


Find Patent Forward Citations

Loading…