How it works
The communication flow of the method is divided in two phases. The first phase, RAV (Registration-Authentication-Verification), will only be transacted the first time. Three steps of registration, authentication and verification is been made between the party/user, the device and connection between the person and the device and the seed server.
The second phase, The session establishment Phase;
- Node A send authentication request and a communication request to the server to connect with Node B.
- Server send authentication response with a generating file and the attached metadata to each Node in a secure way.
- Each Node will generate an intermediate data set. The first intermediate data set is sent from Node A to Node B (publicly). The second intermediate data set is made by Node B.
- Node B generate a third intermediate data set which is sent to Node A (publicly).
- A process file is created in each node, independent and autonomous from the other node. This replaces shared keys / secrets.
- The communication between the parties will start without any connection with the SES server needed, so even if anything would happen to the server the communication can continue. When the session is over, there is no trace of the communication on the parties devices. The communication sequence mutates every millisecond/nanosecond which makes it secure against all known attacks and man-in-middle attacks.