Uberti, 2015 - Google Patents
Internet Engineering Task Force (IETF) T. Reddy Request for Comments: 7635 P. Patil Category: Standards Track R. RavindranathUberti, 2015
View PDF- Document ID
- 7930458135057442523
- Author
- Uberti J
- Publication year
External Links
Snippet
This document proposes the use of OAuth 2.0 to obtain and validate ephemeral tokens that can be used for Session Traversal Utilities for NAT (STUN) authentication. The usage of ephemeral tokens ensures that access to a STUN server can be controlled even if the tokens …
- 230000001010 compromised 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/12—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
- H04L29/12009—Arrangements for addressing and naming in data networks
- H04L29/1233—Mapping of addresses of the same type; Address translation
- H04L29/12339—Internet Protocol [IP] address translation
- H04L29/1249—NAT-Traversal
- H04L29/125—NAT-Traversal for a higher-layer protocol, e.g. for SIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/10—Signalling, control or architecture
- H04L65/1003—Signalling or session protocols
- H04L65/1006—SIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements or network protocols for addressing or naming
- H04L61/25—Network arrangements or network protocols for addressing or naming mapping of addresses of the same type; address translation
- H04L61/2503—Internet protocol [IP] address translation
- H04L61/256—Network address translation [NAT] traversal
- H04L61/2564—Network address translation [NAT] traversal for a higher-layer protocol, e.g. for session initiation protocol [SIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/12—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
- H04L29/12009—Arrangements for addressing and naming in data networks
- H04L29/1233—Mapping of addresses of the same type; Address translation
- H04L29/12339—Internet Protocol [IP] address translation
- H04L29/1249—NAT-Traversal
- H04L29/12537—NAT-Traversal transparent to the NAT server
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5106682B2 (en) | Method and apparatus for machine-to-machine communication | |
US10270601B2 (en) | Providing forward secrecy in a terminating SSL/TLS connection proxy using ephemeral Diffie-Hellman key exchange | |
KR101516909B1 (en) | Discovery of security associations for key management relying on public keys | |
KR101394730B1 (en) | Identity based authenticated key agreement protocol | |
Fischl et al. | Framework for establishing a secure real-time transport protocol (SRTP) security context using datagram transport layer security (DTLS) | |
Westerlund et al. | Options for securing RTP sessions | |
WO2015180654A1 (en) | Method and apparatus for achieving secret communications | |
US20080137859A1 (en) | Public key passing | |
CN101420413A (en) | Session cipher negotiating method, network system, authentication server and network appliance | |
CN101635823A (en) | Method and system of terminal for encrypting videoconference data | |
Igoe | Suite B cryptographic suites for secure shell (SSH) | |
Mattsson et al. | Mikey-ticket: Ticket-based modes of key distribution in multimedia internet keying (mikey) | |
US20170127280A1 (en) | Secure handling of secure socket layer ("ssl") traffic | |
Saint-Andre et al. | Use of transport layer security (TLS) in the extensible messaging and presence protocol (XMPP) | |
EP3216163B1 (en) | Providing forward secrecy in a terminating ssl/tls connection proxy using ephemeral diffie-hellman key exchange | |
CN102025485B (en) | Key negotiation method, key management server and terminal | |
Reddy et al. | Session Traversal Utilities for NAT (STUN) Extension for Third-Party Authorization | |
Uberti | Internet Engineering Task Force (IETF) T. Reddy Request for Comments: 7635 P. Patil Category: Standards Track R. Ravindranath | |
Vrakas et al. | Obscuring users' identity in VoIP/IMS environments | |
Pittoli et al. | Security architectures in constrained environments: A survey | |
US8769280B2 (en) | Authentication apparatus and method for non-real-time IPTV system | |
CN118540167B (en) | IPK-based MQTT protocol identity authentication method and data transmission method | |
Gerber | Authentication and Authorization for Constrained Environments | |
Kumar et al. | Beyond Tokens: Distributed, De-Centralized, Local Authorization Framework for Beyond 5GC SBI | |
Tao et al. | A lightweight authentication scheme for Session Initiation Protocol |