http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2015157693-A2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_972852a6e3c26cf338852ae14b86494c
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2463-061
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-083
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3242
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0435
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-321
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0478
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-061
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0861
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0894
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0816
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0485
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-041
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04W12-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-78
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/A61K8-21
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/A61Q11-00
filingDate 2015-04-10-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_694780116a7f3fdc4978fbca5fd4d6cd
publicationDate 2015-10-15-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2015157693-A2
titleOfInvention System and method for an efficient authentication and key exchange protocol
abstract Embodiments of systems and methods disclosed herein provide a simple and effective method for authentication and key exchange that is secure from man-in-the-middle attacks and is characterized by perfect forward secrecy. More specifically, in certain embodiments, the systems and methods are disclosed that enable secure communications between a local device and a remote device(s) via a protocol that uses a Central Licensing Authority that shares derived secrets with the endpoints, without sharing the secrets themselves. The derived secrets may be comprised of public information, taking the form of nonces, in order to protect the system against replay-style attacks. Each endpoint can generate its own nonce with sufficient entropy such that neither endpoint is dependent on the trustworthiness of the other.
priorityDate 2014-04-11-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID5934
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID422109267
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID409536203
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID7050
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID416052272
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID643181
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID3030
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419568092

Total number of triples: 35.