USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL
Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication respon...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | BURNS, Gregory NGUYEN, Phil Tien MCDONALD, Cameron Allen George |
description | Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication response from the first federated login provider, receives a second authentication response from the second peer device, authenticates the second authentication response with a second federated login provider, sends the first authentication response to the second peer device, receives an acknowledgment from the second peer device indicating that the second peer device has authenticated the first authentication response with the federated login provider, sends an acknowledgment to the second peer device indicating that the first peer device has authenticated the second authentication response, and authenticates the key exchange based on the acknowledgment from the second peer device. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3114808A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3114808A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3114808A13</originalsourceid><addsrcrecordid>eNqNjEEKwjAUBbNxIeod_gUKhrro9ps8k2JJS5qAXZUicSVaqPfHFDyAqwfDm9mKGPvaGYLTRezh6QINzwGamtbUjkJLGgEqENPZg5WlTJmuGAg3ZdkZZFv5oVulFTg0e7F5TM8lHX67EzkclC3S_B7TMk_39EqfEV0p5ak6VizLPy5fleUvKQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL</title><source>esp@cenet</source><creator>BURNS, Gregory ; NGUYEN, Phil Tien ; MCDONALD, Cameron Allen George</creator><creatorcontrib>BURNS, Gregory ; NGUYEN, Phil Tien ; MCDONALD, Cameron Allen George</creatorcontrib><description>Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication response from the first federated login provider, receives a second authentication response from the second peer device, authenticates the second authentication response with a second federated login provider, sends the first authentication response to the second peer device, receives an acknowledgment from the second peer device indicating that the second peer device has authenticated the first authentication response with the federated login provider, sends an acknowledgment to the second peer device indicating that the first peer device has authenticated the second authentication response, and authenticates the key exchange based on the acknowledgment from the second peer device.</description><language>eng ; fre ; ger</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170111&DB=EPODOC&CC=EP&NR=3114808A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170111&DB=EPODOC&CC=EP&NR=3114808A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BURNS, Gregory</creatorcontrib><creatorcontrib>NGUYEN, Phil Tien</creatorcontrib><creatorcontrib>MCDONALD, Cameron Allen George</creatorcontrib><title>USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL</title><description>Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication response from the first federated login provider, receives a second authentication response from the second peer device, authenticates the second authentication response with a second federated login provider, sends the first authentication response to the second peer device, receives an acknowledgment from the second peer device indicating that the second peer device has authenticated the first authentication response with the federated login provider, sends an acknowledgment to the second peer device indicating that the first peer device has authenticated the second authentication response, and authenticates the key exchange based on the acknowledgment from the second peer device.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjEEKwjAUBbNxIeod_gUKhrro9ps8k2JJS5qAXZUicSVaqPfHFDyAqwfDm9mKGPvaGYLTRezh6QINzwGamtbUjkJLGgEqENPZg5WlTJmuGAg3ZdkZZFv5oVulFTg0e7F5TM8lHX67EzkclC3S_B7TMk_39EqfEV0p5ak6VizLPy5fleUvKQ</recordid><startdate>20170111</startdate><enddate>20170111</enddate><creator>BURNS, Gregory</creator><creator>NGUYEN, Phil Tien</creator><creator>MCDONALD, Cameron Allen George</creator><scope>EVB</scope></search><sort><creationdate>20170111</creationdate><title>USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL</title><author>BURNS, Gregory ; NGUYEN, Phil Tien ; MCDONALD, Cameron Allen George</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3114808A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2017</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>BURNS, Gregory</creatorcontrib><creatorcontrib>NGUYEN, Phil Tien</creatorcontrib><creatorcontrib>MCDONALD, Cameron Allen George</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BURNS, Gregory</au><au>NGUYEN, Phil Tien</au><au>MCDONALD, Cameron Allen George</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL</title><date>2017-01-11</date><risdate>2017</risdate><abstract>Disclosed are methods and systems for authenticating a key exchange between a first peer device and a second peer device. In an aspect, the first peer device sends federated login credentials of a user and a first identifier to a first federated login provider, receives a first authentication response from the first federated login provider, receives a second authentication response from the second peer device, authenticates the second authentication response with a second federated login provider, sends the first authentication response to the second peer device, receives an acknowledgment from the second peer device indicating that the second peer device has authenticated the first authentication response with the federated login provider, sends an acknowledgment to the second peer device indicating that the first peer device has authenticated the second authentication response, and authenticates the key exchange based on the acknowledgment from the second peer device.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre ; ger |
recordid | cdi_epo_espacenet_EP3114808A1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION WIRELESS COMMUNICATIONS NETWORKS |
title | USING END-USER FEDERATED LOGIN TO DETECT A BREACH IN A KEY EXCHANGE ENCRYPTED CHANNEL |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T17%3A51%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BURNS,%20Gregory&rft.date=2017-01-11&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3114808A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |