Nokia Technologies Oy (20240320533). APPARATUS, METHOD, AND COMPUTER PROGRAM FOR ALLOWING AN AUTHENTICATOR TO AUTHENTICATE A SUPPLICANT simplified abstract

From WikiPatents
Jump to navigation Jump to search

APPARATUS, METHOD, AND COMPUTER PROGRAM FOR ALLOWING AN AUTHENTICATOR TO AUTHENTICATE A SUPPLICANT

Organization Name

Nokia Technologies Oy

Inventor(s)

Danny De Vleeschauwer of Antwerp (BE)

APPARATUS, METHOD, AND COMPUTER PROGRAM FOR ALLOWING AN AUTHENTICATOR TO AUTHENTICATE A SUPPLICANT - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240320533 titled 'APPARATUS, METHOD, AND COMPUTER PROGRAM FOR ALLOWING AN AUTHENTICATOR TO AUTHENTICATE A SUPPLICANT

The disclosure pertains to an apparatus designed to generate m qubits |c based on a challenge c; transform the m qubits |c into m qubits |x using at least an m qubit phase shifting gate (unknown to a supplicant); transmit the m qubits |x to the supplicant; receive m qubits |x′ from the supplicant; transform the m qubits |x′ into m qubits |c′ using at least an inverse m qubits phase shifting gate and an inverse m qubits phase shifting gate; and authenticate the supplicant by measuring the m qubits |c′ and comparing the measurement to the challenge c.

  • Generates m qubits based on a challenge
  • Transforms qubits using phase shifting gates
  • Transmits qubits to supplicant for authentication
  • Receives qubits from supplicant for further processing
  • Authenticates supplicant based on measurement comparison

Potential Applications: - Quantum cryptography - Secure communication systems - Quantum computing

Problems Solved: - Ensuring secure authentication in quantum systems - Preventing unauthorized access to quantum data

Benefits: - Enhanced security in quantum communication - Reliable authentication processes - Protection against quantum hacking

Commercial Applications: Title: Quantum Secure Authentication Systems This technology can be used in industries such as finance, defense, and healthcare to secure sensitive data and communications. It can also be applied in government agencies for secure information exchange.

Questions about Quantum Secure Authentication Systems: 1. How does this technology improve upon traditional authentication methods? This technology offers enhanced security through the use of quantum principles, making it virtually unhackable. 2. What are the potential drawbacks of implementing quantum secure authentication systems? One potential drawback could be the initial cost of setting up quantum systems, but the long-term security benefits outweigh this concern.


Original Abstract Submitted

the disclosure relates to an apparatus configured to: generate () m qubits |c based on a challenge c; transform () the m qubits |c into m qubits |x using at least an m qubit phase shifting gate �known to the apparatus and unknown to a supplicant; transmit (), to the supplicant, the m qubits |x; receive (), from the supplicant, m qubits |x′; transform () the m qubits |x′ into m qubits |c′ using at least an inverse m qubits phase shifting gate � and using an inverse m qubits phase shifting gate �; and authenticate () the supplicant based on measuring the m qubits |c′ and comparing the measurement of the m qubits |c′ to the challenge c.