| CPC G06F 21/44 (2013.01) [G06F 8/65 (2013.01); G06F 13/10 (2013.01)] | 16 Claims |

|
1. A computerized method, performed by a computing system configured as a central and having one or more hardware computer processors and one or more computer readable storage mediums storing software instructions executable by the computing system, the computerized method comprising:
receiving a broadcast packet from a peripheral;
determining whether a cache comprises authorization information for the peripheral indicating that bi-directional connection between the central and the peripheral is authorized, wherein the cache comprises authorization information received from a backend;
based on determining that the cache does not include authorization information for the peripheral, sending a request to the backend to determine whether the central is authorized to connect to the peripheral, wherein the request includes an encrypted device identifier associated with the peripheral;
receiving a response from the backend indicating whether the central is authorized to connect to the peripheral; and
in response to the response indicating that the central is authorized to connect to the peripheral, establishing a bi-directional connection with the peripheral.
|