FIELD: information technology.
SUBSTANCE: simple access authentication method, comprising steps on which: the trustful third party writes the message (MSG) cipher text formed by enciphering MSG into the first entity; the second entity attains the MSG cipher text from the first entity, and attains the key from the trustful third party after attaining the MSG cipher text; the MSG cipher text is deciphered according to the key, and it is determined that authentication is successful if an MSG plaintext is attained, and it is determined that authentication is unsuccessful if an MSG plaintext is not attained.
EFFECT: securing an electronic tag which does not contain identification information, does not have functional capabilities for computation and having small memory.
10 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF AUTHENTICATION WITH ONE-SIDED ACCESS | 2008 |
|
RU2454811C2 |
CONFIDENTIAL COMMUNICATION CONTROL | 2016 |
|
RU2718689C2 |
MUTUAL AUTHENTICATION OF PROGRAM LEVELS | 2016 |
|
RU2715032C2 |
TRUSTED INTEGRITY MANAGER (TIM) | 2010 |
|
RU2523304C2 |
SECURE DATA EXCHANGE ENSURING DIRECT SECRECY | 2018 |
|
RU2771928C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY | 2017 |
|
RU2756048C2 |
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
METHOD OF DOUBLE-SIDED AUTHENTICATION OF ACCESS | 2008 |
|
RU2444143C2 |
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY | 2017 |
|
RU2756040C2 |
TRUSTED REMOTE ATTESTATION AGENT (TRAA) | 2010 |
|
RU2537795C2 |
Authors
Dates
2012-03-20—Published
2008-12-02—Filed