USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL

Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication respon...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: BURNS, Gregory, NGUYEN, Phil Tien, MCDONALD, Cameron Allen George
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator BURNS, Gregory
NGUYEN, Phil Tien
MCDONALD, Cameron Allen George
description Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication response from the first federated login provider, receives a second authentication response from the second peer device, authenticates the second authentication response with a second federated login provider, sends the first authentication response to the second peer device, receives an acknowledgment from the second peer device indicating that the second peer device has authenticated the first authentication response with the federated login provider, sends an acknowledgment to the second peer device indicating that the first peer device has authenticated the second authentication response, and authenticates the key exchange based on the acknowledgment from the second peer device.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3114808A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3114808A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3114808A13</originalsourceid><addsrcrecordid>eNqNjEEKwjAUBbNxIeod_gUKhrro9ps8k2JJS5qAXZUicSVaqPfHFDyAqwfDm9mKGPvaGYLTRezh6QINzwGamtbUjkJLGgEqENPZg5WlTJmuGAg3ZdkZZFv5oVulFTg0e7F5TM8lHX67EzkclC3S_B7TMk_39EqfEV0p5ak6VizLPy5fleUvKQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL</title><source>esp@cenet</source><creator>BURNS, Gregory ; NGUYEN, Phil Tien ; MCDONALD, Cameron Allen George</creator><creatorcontrib>BURNS, Gregory ; NGUYEN, Phil Tien ; MCDONALD, Cameron Allen George</creatorcontrib><description>Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication response from the first federated login provider, receives a second authentication response from the second peer device, authenticates the second authentication response with a second federated login provider, sends the first authentication response to the second peer device, receives an acknowledgment from the second peer device indicating that the second peer device has authenticated the first authentication response with the federated login provider, sends an acknowledgment to the second peer device indicating that the first peer device has authenticated the second authentication response, and authenticates the key exchange based on the acknowledgment from the second peer device.</description><language>eng ; fre ; ger</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20170111&amp;DB=EPODOC&amp;CC=EP&amp;NR=3114808A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20170111&amp;DB=EPODOC&amp;CC=EP&amp;NR=3114808A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BURNS, Gregory</creatorcontrib><creatorcontrib>NGUYEN, Phil Tien</creatorcontrib><creatorcontrib>MCDONALD, Cameron Allen George</creatorcontrib><title>USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL</title><description>Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication response from the first federated login provider, receives a second authentication response from the second peer device, authenticates the second authentication response with a second federated login provider, sends the first authentication response to the second peer device, receives an acknowledgment from the second peer device indicating that the second peer device has authenticated the first authentication response with the federated login provider, sends an acknowledgment to the second peer device indicating that the first peer device has authenticated the second authentication response, and authenticates the key exchange based on the acknowledgment from the second peer device.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjEEKwjAUBbNxIeod_gUKhrro9ps8k2JJS5qAXZUicSVaqPfHFDyAqwfDm9mKGPvaGYLTRezh6QINzwGamtbUjkJLGgEqENPZg5WlTJmuGAg3ZdkZZFv5oVulFTg0e7F5TM8lHX67EzkclC3S_B7TMk_39EqfEV0p5ak6VizLPy5fleUvKQ</recordid><startdate>20170111</startdate><enddate>20170111</enddate><creator>BURNS, Gregory</creator><creator>NGUYEN, Phil Tien</creator><creator>MCDONALD, Cameron Allen George</creator><scope>EVB</scope></search><sort><creationdate>20170111</creationdate><title>USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL</title><author>BURNS, Gregory ; NGUYEN, Phil Tien ; MCDONALD, Cameron Allen George</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3114808A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2017</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>BURNS, Gregory</creatorcontrib><creatorcontrib>NGUYEN, Phil Tien</creatorcontrib><creatorcontrib>MCDONALD, Cameron Allen George</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BURNS, Gregory</au><au>NGUYEN, Phil Tien</au><au>MCDONALD, Cameron Allen George</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL</title><date>2017-01-11</date><risdate>2017</risdate><abstract>Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication response from the first federated login provider, receives a second authentication response from the second peer device, authenticates the second authentication response with a second federated login provider, sends the first authentication response to the second peer device, receives an acknowledgment from the second peer device indicating that the second peer device has authenticated the first authentication response with the federated login provider, sends an acknowledgment to the second peer device indicating that the first peer device has authenticated the second authentication response, and authenticates the key exchange based on the acknowledgment from the second peer device.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3114808A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T17%3A51%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BURNS,%20Gregory&rft.date=2017-01-11&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3114808A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true