METHOD AND SYSTEM FOR TWO-WAY AUTHENTICATION OF SUBJECTS Russian patent published in 2012 - IPC H04L9/32 

Abstract RU 2445741 C1

FIELD: information technology.

SUBSTANCE: method involves the following steps on which: a first subject sends a first message; a second subject sends a second message to a trustworthy third party after receiving said first message; said trustworthy third party returns a third message after receiving the second message; after receiving the third message and verification of the signature of the trustworthy third party, said second subject obtains the public key of the first subject to verify the signature of the first subject in the first message and, if verification is successful, sends a fourth message; said first subject receives said fourth message and verifies the signature of the trustworthy third party, and the obtains the public key of the second subject to verify the signature of the second subject in the fourth message.

EFFECT: preventing problems during authentication caused by failure to access a network before successful authentication.

10 cl, 5 dwg

Similar patents RU2445741C1

Title Year Author Number
METHOD AND SYSTEM FOR TRUSTED THIRD PARTY-BASED TWO-WAY OBJECT IDENTIFICATION 2008
  • Te Man'Sja
  • Tsao Tszjun'
  • Laj Sjaolun
  • Pan Ljaotszjun'
  • Khuan Chzhehnkhaj
RU2458481C2
METHOD OF ACCESS WITH AUTHENTICATION AND ACCESS SYSTEM WITH AUTHENTICATION IN WIRELESS MULTI-HOP NETWORK 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2446606C1
METHOD AND APPARATUS FOR AUTHENTICATION OF IDENTIFICATION INFORMATION, DEVICE, MICROCIRCUIT, INFORMATION STORAGE MEDIA AND PROGRAM 2021
  • Tie, Mansya
  • Tsao, Tszyun
  • Laj, Syaolun
  • Chzhao, Syaozhun
  • Li, Tsin
  • Chzhan, Byanlin
  • Van, Yuekhuej
RU2807058C1
METHOD OF TRUSTED NETWORK CONNECTION FOR IMPROVEMENT OF PROTECTION 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2437230C2
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS 2005
  • Bach Dzheremi Tomas
  • Su Tszyn'Jan'
  • Narajanan Sankaran
  • Ehjdel'Man Vadim
RU2378773C2
WIRELESS DEVICE, USER ACCESS CONTROL CLIENT REQUEST METHOD AND ACCESS CONTROL CLIENT METHOD 2011
  • Shell Stefan V.
  • Fon Khauk Dzherrol'D
RU2518924C2
METHOD OF DOUBLE-SIDED AUTHENTICATION OF ACCESS 2008
  • Pan Ljaotszjun'
  • Tsao Tszjun'
  • Te Man'Sja
  • Khuan Chzhehn'Khaj
RU2444143C2
METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION 2008
  • Cha Inkhiok
  • Shakh Jodzhendra K.
  • E Chun'Sjuan'
RU2428808C2
DOMAIN NAME CONTROL SCHEME FOR CROSS-CHAIN INTERACTIONS IN BLOCKCHAIN SYSTEMS 2018
  • Qiu, Honglin
RU2718959C1
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA 2007
  • Kross Dehvid B.
  • Lich Pol Dzh.
  • Shutts Klaus Ju.
  • Jang Robert D.
  • Sherman Natan K.
RU2434340C2

RU 2 445 741 C1

Authors

Te Man'Sja

Tsao Tszjun'

Khuan Chzhehn'Khaj

Laj Sjaolun

Dates

2012-03-20Published

2008-12-09Filed