18447098. APPARATUS, METHOD, AND COMPUTER PROGRAM simplified abstract (Nokia Technologies Oy)

From WikiPatents
Jump to navigation Jump to search

APPARATUS, METHOD, AND COMPUTER PROGRAM

Organization Name

Nokia Technologies Oy

Inventor(s)

Markus Staufer of Munich (DE)

Peter Schneider of Munich (DE)

Ranganathan Mavureddi Dhanasekaran of Munich (DE)

APPARATUS, METHOD, AND COMPUTER PROGRAM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18447098 titled 'APPARATUS, METHOD, AND COMPUTER PROGRAM

Simplified Explanation

The abstract describes a method for authenticating a second apparatus using a cryptographic key and verifying information.

  • Obtain an identifier of a cryptographic key according to a first security communication protocol.
  • Signal a first authentication request to a second apparatus using a second security communication protocol, including the identifier of the cryptographic key and first verifying information.
  • Receive an authentication response from the second apparatus, including second verifying information.
  • Verify the second apparatus for the second security communication protocol using the second value and the cryptographic key.

---

      1. Potential Applications
  • Secure communication between devices
  • Two-factor authentication systems
  • Data encryption and decryption processes
      1. Problems Solved
  • Ensuring secure authentication between devices
  • Preventing unauthorized access to sensitive information
  • Mitigating risks of data breaches and cyber attacks
      1. Benefits
  • Enhanced security measures for communication protocols
  • Efficient and reliable authentication processes
  • Protection of sensitive data and information


Original Abstract Submitted

There is provided an apparatus, method and computer program for causing a first apparatus to: obtain an identifier of a cryptographic key according to a first security communication protocol; signal, to a second apparatus, a first authentication request according to a second security communication protocol, the first authentication request comprising the identifier of the cryptographic key and a first verifying information according to a second security communication protocol, wherein the first verifying information comprises a first value calculated using the cryptographic key; receive, from the second apparatus, an authentication response according to the second security communication protocol, the authentication response comprising a second verifying information according to the second security communication protocol, wherein the second verifying information comprises a second value; and verify the second apparatus for the second security communication protocol using the second value and the cryptographic key.