These principles formed the building blocks of the protocol in which personal information is not accessible to third parties and there is no need for all-time or one-time passwords, or even trusted third parties. The Claveo Protocol Phase 1 has 4 stages, with Authorization Request starting from the Service, and the Final Response returning back there.
The Claveo Protocol Phase 1 assumes only one type of participating device. This original idea is now significantly modified during Phase 2, and the new protocol includes several types of participants with varying properties.
These principles led us to build a much more sophisticated and complex protocol, for which we are applying for several US patents. The communication security among the active participants, the Claveo Server and the resource is still a must, however, the passive participants need not have Internet or SSL capability. Furthermore, the Claveo Protocol Phase 2 relaxes user participation, and making it more spontaneous.