FIELD: technological processes.
SUBSTANCE: invention is related to devices of users authentication. Inviter, who already belongs to the group, together with invitee use a secret password. Inviter uses the password to create the invitation, afterwards the invitation is presented to invitee and authenticator. Authenticator creates request key and value, and sends the request value to the invitee. Using password and information from the invitation, the invitee recreates request key, uses request key for derivation of response value from request value, and sends response value to authenticator. Authenticator compares response value with expected value and in case of their coincidence, is convinced that the invitee certainly has the possibility to recreate request key. Authenticator is convinced that the invitee is exactly the one who received the invitation of inviter, and admits the invitee in the group.
EFFECT: provides development of trust relationship for authentication with the purpose of joining the group.
43 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
KEY GENERATION IN COMMUNICATION SYSTEM | 2003 |
|
RU2333607C2 |
LOW-LATENCY PEER-TO-PEER SESSION ESTABLISHMENT | 2010 |
|
RU2542911C2 |
METHOD AND APPARATUS FOR CHECKING AUTHENTICITY OR RIGHTS USING ONE-TIME TRANSACTION CODES | 2006 |
|
RU2414001C2 |
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
AUTHENTICATION IN COMMUNICATIONS | 2003 |
|
RU2326429C2 |
METHOD FOR REMOTE CHANGING OF COMMUNICATION PASSWORD | 2003 |
|
RU2307391C2 |
IMAGE BASED KEY DERIVATION FUNCTION | 2014 |
|
RU2676231C2 |
INTERACTING MODULE FACILITIES FOR COLLECTION OF AUTHENTICATORS AND ACCESS | 2004 |
|
RU2369025C2 |
SYSTEMS AND METHODS FOR LINKING DEVICES TO USER ACCOUNTS | 2015 |
|
RU2665869C2 |
TOKEN-BASED TRANSACTION AUTHENTICATION | 2011 |
|
RU2565368C2 |
Authors
Dates
2008-05-27—Published
2003-04-23—Filed