PEER-TO-PEER AUTHENTICATION AND AUTHORISATION Russian patent published in 2010 - IPC H04K1/00 

Abstract RU 2390945 C2

FIELD: information technology.

SUBSTANCE: authentication mechanism uses a storage for authorised persons which can be individually filled by users of computer devices and can contain certificates of objects which a user wishes to allow to act as certification authorities. Consequently, a peer-to-peer connection can be made even if not a single device presents a certificate or a chain of trust signed by the certification authority of a third party provided that, each device presents a certificate or a chain of trust signed by a device present in the storage of authorised persons. If authenticated, a remote user can access confidential resources on the host device by borrowing user rights through local processes and creating the corresponding marker by changing the password or type of user password by hash-value of the user certificate and then registering the user. The marker can be referenced using a standard way for determining whether a remove use is authorised to access the confidential resource.

EFFECT: easier authentication of computer devices.

20 cl, 5 dwg

Similar patents RU2390945C2

Title Year Author Number
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES 2007
  • Medvinskij Gennadij
  • Ilak Kristian
  • Khagiu Kostin
  • Parsonz Dzhon Eh.
  • Fatkhalla Mokhamed Ehmad Ehl' Din
  • Lich Pol Dzh.
  • Kamel' Tarek Bukhaa Ehl'-Din Makhmud
RU2439692C2
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA 2007
  • Kross Dehvid B.
  • Lich Pol Dzh.
  • Shutts Klaus Ju.
  • Jang Robert D.
  • Sherman Natan K.
RU2434340C2
METHOD TO CONTROL ACCESS TO SECURED NETWORK BASED ON THREE-ELEMENT AUTHENTICATION OF PEER-TO-PEER OBJECTS 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2444156C1
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN 2016
  • Sprague, Michael
  • Sprague, Steven
RU2673842C1
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION 2008
  • Mauehrs Dehvid R.
  • Dubrovkin Dehniehl
  • Lejbehn Roj
  • Shmidt Donal'D I.
  • Visvanatan Rehm
  • Brezak Dzhon I.
  • Uord Richard B.
RU2390838C2
METHOD OF CONTROLLING IDENTIFICATION OF USERS OF INFORMATION RESOURCES OF HETEROGENEOUS COMPUTER NETWORK 2009
  • Lekshin Oleg Sergeevich
RU2415466C1
PROVIDING COMMUNICATION SECURITY WITH EXTENDED MULTIMEDIA PLATFORMS 2015
  • Elien Zhan-Emil
  • Balma Deniel Kollinz
  • Kri Rokko Iii
  • Frej Majkl Brendan
  • Khellajar Pol Stefen
  • Ten Viktor
  • Kim Kie Khiun
  • Mukhlestejn Trevis Dzh.
  • Yunoki Robert S.
  • Bajer Kennet Majkl
  • Uolin Ues
RU2685975C2
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION 2003
  • Mauehrs Dehvid R.
  • Dubrovkin Dehniehl
  • Lejbehn Roj
  • Shmidt Donal'D I.
  • Visvanatan Rehm
  • Brezak Dzhon I.
  • Uord Richard B.
RU2337399C2
SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES 2015
  • Glejzmejkers Kurt
  • Khemilton Malkolm
  • Berberoglu Gokkhan
RU2675055C2
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE 2014
  • Stern Allon Dzh.
RU2675902C2

RU 2 390 945 C2

Authors

Gupta Rokhit

Manion Todd R.

Rao Ravi T.

Singkhal Sandip K.

Dates

2010-05-27Published

2005-08-01Filed