Method and apparatuses for ensuring secure attachment in size constrained authentication protocols
A technology of protocol and certificate, applied in the fields of mobile devices and servers implementing the method
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0076] For a more complete understanding of the invention, the invention will now be described in detail with reference to the accompanying drawings. The detailed description will illustrate and describe what are considered to be the preferred embodiments of the invention. It will of course be understood that various modifications and changes in form or detail could readily be made without departing from the spirit of the invention. It is therefore intended that the invention may not be limited to the exact form and details shown and described herein, nor to any less than the entire invention herein disclosed and hereinafter claimed. In different drawings, the same elements are designated with the same reference signs. For the sake of clarity, only those elements and steps that are useful for understanding the invention are shown in the drawings and will be described.
[0077] figure 1 A flowchart is schematically shown of the exchange over the network NW between the creden...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


