FIELD: object authentication. SUBSTANCE: method involves use of identification module such as SIM-card; peripheral device generates request incorporating random number and cryptogram obtained by processing random number by algorithm 2 using private key 2; request is transferred to identification module that checks up random number cryptogram and generates response by encrypting request using algorithm 1 and random number 1; response is returned to peripheral device which compares it with result of encryption of request using algorithm 1 and private key 1. EFFECT: enhanced reliability of protection against unauthorized use of network services. 4 cl, 2 dwg
Authors
Dates
2004-03-10—Published
2002-06-18—Filed