OneID detailed protocol specificationsThe following documents explain (without revealing the exact protocol details) how OneID works: How OneID works: The basic concepts OneID core authentication/authorization protocol
(video) There is also the specification for the OneID end-to-end protocols for authentication, authorization, and pairing. The protocol details are not really a secret because all the security of OneID is based on the strength of the NSA Suite B cryptography (and not on the secrecy of any of our protocols). You may contact us to obtain this document. |