Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_972852a6e3c26cf338852ae14b86494c |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2463-061 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-083 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3242 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0435 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-321 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0478 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-061 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0861 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0894 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0816 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0485 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-041 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-78 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/A61K8-21 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/A61Q11-00 |
filingDate |
2015-04-10-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_694780116a7f3fdc4978fbca5fd4d6cd |
publicationDate |
2015-10-15-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
WO-2015157693-A2 |
titleOfInvention |
System and method for an efficient authentication and key exchange protocol |
abstract |
Embodiments of systems and methods disclosed herein provide a simple and effective method for authentication and key exchange that is secure from man-in-the-middle attacks and is characterized by perfect forward secrecy. More specifically, in certain embodiments, the systems and methods are disclosed that enable secure communications between a local device and a remote device(s) via a protocol that uses a Central Licensing Authority that shares derived secrets with the endpoints, without sharing the secrets themselves. The derived secrets may be comprised of public information, taking the form of nonces, in order to protect the system against replay-style attacks. Each endpoint can generate its own nonce with sufficient entropy such that neither endpoint is dependent on the trustworthiness of the other. |
priorityDate |
2014-04-11-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |