18447098. APPARATUS, METHOD, AND COMPUTER PROGRAM simplified abstract (Nokia Technologies Oy)
APPARATUS, METHOD, AND COMPUTER PROGRAM
Organization Name
Inventor(s)
Peter Schneider of Munich (DE)
Ranganathan Mavureddi Dhanasekaran of Munich (DE)
APPARATUS, METHOD, AND COMPUTER PROGRAM - A simplified explanation of the abstract
This abstract first appeared for US patent application 18447098 titled 'APPARATUS, METHOD, AND COMPUTER PROGRAM
Simplified Explanation
The abstract describes a method for authenticating a second apparatus using a cryptographic key and verifying information.
- Obtain an identifier of a cryptographic key according to a first security communication protocol.
- Signal a first authentication request to a second apparatus using a second security communication protocol, including the identifier of the cryptographic key and first verifying information.
- Receive an authentication response from the second apparatus, including second verifying information.
- Verify the second apparatus for the second security communication protocol using the second value and the cryptographic key.
---
- Potential Applications
- Secure communication between devices
- Two-factor authentication systems
- Data encryption and decryption processes
- Problems Solved
- Ensuring secure authentication between devices
- Preventing unauthorized access to sensitive information
- Mitigating risks of data breaches and cyber attacks
- Benefits
- Enhanced security measures for communication protocols
- Efficient and reliable authentication processes
- Protection of sensitive data and information
Original Abstract Submitted
There is provided an apparatus, method and computer program for causing a first apparatus to: obtain an identifier of a cryptographic key according to a first security communication protocol; signal, to a second apparatus, a first authentication request according to a second security communication protocol, the first authentication request comprising the identifier of the cryptographic key and a first verifying information according to a second security communication protocol, wherein the first verifying information comprises a first value calculated using the cryptographic key; receive, from the second apparatus, an authentication response according to the second security communication protocol, the authentication response comprising a second verifying information according to the second security communication protocol, wherein the second verifying information comprises a second value; and verify the second apparatus for the second security communication protocol using the second value and the cryptographic key.