METHOD TO CONTROL ACCESS TO SECURED NETWORK BASED ON THREE-ELEMENT AUTHENTICATION OF PEER-TO-PEER OBJECTS Russian patent published in 2012 - IPC H04W12/08 

Abstract RU 2444156 C1

FIELD: information technologies.

SUBSTANCE: method to control access to a secured network based on three-element authentication of peer-to-peer objects includes the following: first of all, initialisation of reliability collectors and reliability verifier, then implementation of the protocol of three-element authentication of peer-to-peer objects with the help of a network access request initiator, a network access controller and a server of authentication policies at the level of network access control for realisation of double-sided authentication of a user between the initiator of access request and the access controller; if authentication is successful or the local policy requires to perform the process of reliability assessment by the TNC terminal, the TNC server and the server of reliability assessment at the level of assessment trusted to the platform, authentication of peer-to-peer objects for realisation of double-sided authentication of platforms reliability between the initiator of access requests and the access controller; finally, the initiator of access requests and the access controller control the ports by references generated by the terminal of the client TNAC and the terminal of the server TNAC.

EFFECT: improved reliability of access to the secured network.

10 cl, 4 dwg

Similar patents RU2444156C1

Title Year Author Number
METHOD OF TRUSTED NETWORK CONNECTION FOR IMPROVEMENT OF PROTECTION 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2437230C2
SYSTEM TO CONTROL ACCESS TO RELIABLE NETWORK BASED ON THREE-ELEMENT EQUIVALENT IDENTIFICATION 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2445695C2
SYSTEM OF TRUSTWORTHY NETWORK CONNECTION FOR SAFETY IMPROVEMENT 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehnkhaj
RU2437228C2
PEER-TO-PEER AUTHENTICATION AND AUTHORISATION 2005
  • Gupta Rokhit
  • Manion Todd R.
  • Rao Ravi T.
  • Singkhal Sandip K.
RU2390945C2
METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION 2008
  • Cha Inkhiok
  • Shakh Jodzhendra K.
  • E Chun'Sjuan'
RU2428808C2
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE 2014
  • Stern Allon Dzh.
RU2675902C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
  • Khejli Dzhon
RU2673969C2
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES 2007
  • Medvinskij Gennadij
  • Ilak Kristian
  • Khagiu Kostin
  • Parsonz Dzhon Eh.
  • Fatkhalla Mokhamed Ehmad Ehl' Din
  • Lich Pol Dzh.
  • Kamel' Tarek Bukhaa Ehl'-Din Makhmud
RU2439692C2
METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS 2001
  • Mur Timoti M.
  • Ajjagari Arun
  • Shetkh Sachin K.
  • Bakhl Pradip
RU2297037C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
RU2672712C2

RU 2 444 156 C1

Authors

Sjao Juehlehj

Tsao Tszjun'

Laj Sjaolun

Khuan Chzhehn'Khaj

Dates

2012-02-27Published

2008-11-14Filed