[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Uberti, 2015 - Google Patents

Internet Engineering Task Force (IETF) T. Reddy Request for Comments: 7635 P. Patil Category: Standards Track R. Ravindranath

Uberti, 2015

View PDF
Document ID
7930458135057442523
Author
Uberti J
Publication year

External Links

Snippet

This document proposes the use of OAuth 2.0 to obtain and validate ephemeral tokens that can be used for Session Traversal Utilities for NAT (STUN) authentication. The usage of ephemeral tokens ensures that access to a STUN server can be controlled even if the tokens …
Continue reading at ftp.perl.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/12Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
    • H04L29/12009Arrangements for addressing and naming in data networks
    • H04L29/1233Mapping of addresses of the same type; Address translation
    • H04L29/12339Internet Protocol [IP] address translation
    • H04L29/1249NAT-Traversal
    • H04L29/125NAT-Traversal for a higher-layer protocol, e.g. for SIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1003Signalling or session protocols
    • H04L65/1006SIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements or network protocols for addressing or naming
    • H04L61/25Network arrangements or network protocols for addressing or naming mapping of addresses of the same type; address translation
    • H04L61/2503Internet protocol [IP] address translation
    • H04L61/256Network address translation [NAT] traversal
    • H04L61/2564Network address translation [NAT] traversal for a higher-layer protocol, e.g. for session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/12Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
    • H04L29/12009Arrangements for addressing and naming in data networks
    • H04L29/1233Mapping of addresses of the same type; Address translation
    • H04L29/12339Internet Protocol [IP] address translation
    • H04L29/1249NAT-Traversal
    • H04L29/12537NAT-Traversal transparent to the NAT server

Similar Documents

Publication Publication Date Title
JP5106682B2 (en) Method and apparatus for machine-to-machine communication
US10270601B2 (en) Providing forward secrecy in a terminating SSL/TLS connection proxy using ephemeral Diffie-Hellman key exchange
KR101516909B1 (en) Discovery of security associations for key management relying on public keys
KR101394730B1 (en) Identity based authenticated key agreement protocol
Fischl et al. Framework for establishing a secure real-time transport protocol (SRTP) security context using datagram transport layer security (DTLS)
Westerlund et al. Options for securing RTP sessions
WO2015180654A1 (en) Method and apparatus for achieving secret communications
US20080137859A1 (en) Public key passing
CN101420413A (en) Session cipher negotiating method, network system, authentication server and network appliance
CN101635823A (en) Method and system of terminal for encrypting videoconference data
Igoe Suite B cryptographic suites for secure shell (SSH)
Mattsson et al. Mikey-ticket: Ticket-based modes of key distribution in multimedia internet keying (mikey)
US20170127280A1 (en) Secure handling of secure socket layer ("ssl") traffic
Saint-Andre et al. Use of transport layer security (TLS) in the extensible messaging and presence protocol (XMPP)
EP3216163B1 (en) Providing forward secrecy in a terminating ssl/tls connection proxy using ephemeral diffie-hellman key exchange
CN102025485B (en) Key negotiation method, key management server and terminal
Reddy et al. Session Traversal Utilities for NAT (STUN) Extension for Third-Party Authorization
Uberti Internet Engineering Task Force (IETF) T. Reddy Request for Comments: 7635 P. Patil Category: Standards Track R. Ravindranath
Vrakas et al. Obscuring users' identity in VoIP/IMS environments
Pittoli et al. Security architectures in constrained environments: A survey
US8769280B2 (en) Authentication apparatus and method for non-real-time IPTV system
CN118540167B (en) IPK-based MQTT protocol identity authentication method and data transmission method
Gerber Authentication and Authorization for Constrained Environments
Kumar et al. Beyond Tokens: Distributed, De-Centralized, Local Authorization Framework for Beyond 5GC SBI
Tao et al. A lightweight authentication scheme for Session Initiation Protocol