FIELD: information technology.
SUBSTANCE: method involves the following steps on which: a first subject sends a first message; a second subject sends a second message to a trustworthy third party after receiving said first message; said trustworthy third party returns a third message after receiving the second message; after receiving the third message and verification of the signature of the trustworthy third party, said second subject obtains the public key of the first subject to verify the signature of the first subject in the first message and, if verification is successful, sends a fourth message; said first subject receives said fourth message and verifies the signature of the trustworthy third party, and the obtains the public key of the second subject to verify the signature of the second subject in the fourth message.
EFFECT: preventing problems during authentication caused by failure to access a network before successful authentication.
10 cl, 5 dwg
Title |
Year |
Author |
Number |
METHOD AND SYSTEM FOR TRUSTED THIRD PARTY-BASED TWO-WAY OBJECT IDENTIFICATION |
2008 |
- Te Man'Sja
- Tsao Tszjun'
- Laj Sjaolun
- Pan Ljaotszjun'
- Khuan Chzhehnkhaj
|
RU2458481C2 |
METHOD OF ACCESS WITH AUTHENTICATION AND ACCESS SYSTEM WITH AUTHENTICATION IN WIRELESS MULTI-HOP NETWORK |
2008 |
- Sjao Juehlehj
- Tsao Tszjun'
- Laj Sjaolun
- Khuan Chzhehn'Khaj
|
RU2446606C1 |
METHOD AND APPARATUS FOR AUTHENTICATION OF IDENTIFICATION INFORMATION, DEVICE, MICROCIRCUIT, INFORMATION STORAGE MEDIA AND PROGRAM |
2021 |
- Tie, Mansya
- Tsao, Tszyun
- Laj, Syaolun
- Chzhao, Syaozhun
- Li, Tsin
- Chzhan, Byanlin
- Van, Yuekhuej
|
RU2807058C1 |
METHOD OF TRUSTED NETWORK CONNECTION FOR IMPROVEMENT OF PROTECTION |
2008 |
- Sjao Juehlehj
- Tsao Tszjun'
- Laj Sjaolun
- Khuan Chzhehn'Khaj
|
RU2437230C2 |
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS |
2005 |
- Bach Dzheremi Tomas
- Su Tszyn'Jan'
- Narajanan Sankaran
- Ehjdel'Man Vadim
|
RU2378773C2 |
WIRELESS DEVICE, USER ACCESS CONTROL CLIENT REQUEST METHOD AND ACCESS CONTROL CLIENT METHOD |
2011 |
- Shell Stefan V.
- Fon Khauk Dzherrol'D
|
RU2518924C2 |
METHOD OF DOUBLE-SIDED AUTHENTICATION OF ACCESS |
2008 |
- Pan Ljaotszjun'
- Tsao Tszjun'
- Te Man'Sja
- Khuan Chzhehn'Khaj
|
RU2444143C2 |
METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION |
2008 |
- Cha Inkhiok
- Shakh Jodzhendra K.
- E Chun'Sjuan'
|
RU2428808C2 |
DOMAIN NAME CONTROL SCHEME FOR CROSS-CHAIN INTERACTIONS IN BLOCKCHAIN SYSTEMS |
2018 |
|
RU2718959C1 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA |
2007 |
- Kross Dehvid B.
- Lich Pol Dzh.
- Shutts Klaus Ju.
- Jang Robert D.
- Sherman Natan K.
|
RU2434340C2 |