METHOD OF AUTHENTICATION WITH ONE-SIDED ACCESS Russian patent published in 2012 - IPC H04L9/32 H04W12/04 H04W12/06 

Abstract RU 2454811 C2

FIELD: information technologies.

SUBSTANCE: compliance with parameters of a system established by the third object, the second object sends a message to the first object about grouping of distribution of an authentication and key request. The first object verifies reliability of the message sent from the second object, and if it is reliable, the first object generates a message of grouping of an authentication and key response and sends it to the second object, which verifies reliability of the message sent from the first object, and if it is reliable, the second object generates a message of grouping to confirm authentication and the key and sends this message to the first object. The first object verifies reliability of the message of grouping of authentication and key confirmation, and if it is reliable, authentication is successful, and the key is considered as the main key of the agreement.

EFFECT: higher expansibility of a network.

19 cl, 1 dwg

Similar patents RU2454811C2

Title Year Author Number
METHOD OF DOUBLE-SIDED AUTHENTICATION OF ACCESS 2008
  • Pan Ljaotszjun'
  • Tsao Tszjun'
  • Te Man'Sja
  • Khuan Chzhehn'Khaj
RU2444143C2
TRUSTED INTEGRITY MANAGER (TIM) 2010
  • Tavo Sebast'En
  • Nakhari Khadi
  • Djupra Ehrik
RU2523304C2
SIMPLE ACCESS AUTHENTICATION METHOD AND SYSTEM 2008
  • Pan Ljaotszjun'
  • Tsao Tszjun'
  • Te Man'Sja
  • Khuan Chzhehn'Khaj
RU2445740C1
METHOD AND APPARATUS FOR AUTHENTICATION OF IDENTIFICATION INFORMATION, DEVICE, MICROCIRCUIT, INFORMATION STORAGE MEDIA AND PROGRAM 2021
  • Tie, Mansya
  • Tsao, Tszyun
  • Laj, Syaolun
  • Chzhao, Syaozhun
  • Li, Tsin
  • Chzhan, Byanlin
  • Van, Yuekhuej
RU2807058C1
PROVIDING COMMUNICATION SECURITY WITH EXTENDED MULTIMEDIA PLATFORMS 2015
  • Elien Zhan-Emil
  • Balma Deniel Kollinz
  • Kri Rokko Iii
  • Frej Majkl Brendan
  • Khellajar Pol Stefen
  • Ten Viktor
  • Kim Kie Khiun
  • Mukhlestejn Trevis Dzh.
  • Yunoki Robert S.
  • Bajer Kennet Majkl
  • Uolin Ues
RU2685975C2
METHOD OF ACCESS WITH AUTHENTICATION AND ACCESS SYSTEM WITH AUTHENTICATION IN WIRELESS MULTI-HOP NETWORK 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2446606C1
WIRELESS DEVICE, USER ACCESS CONTROL CLIENT REQUEST METHOD AND ACCESS CONTROL CLIENT METHOD 2011
  • Shell Stefan V.
  • Fon Khauk Dzherrol'D
RU2518924C2
CRYPTOGRAPHIC AUTHENTICATION AND TOKENIZED TRANSACTIONS 2017
  • Collinge, Mehdi
  • Johnson, Alan
RU2741321C2
METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION 2008
  • Cha Inkhiok
  • Shakh Jodzhendra K.
  • E Chun'Sjuan'
RU2428808C2
METHOD AND DEVICE FOR SECURE DATA TRANSMISSION 2010
  • Fris Shteffen
  • Zeeval'D Majk
RU2554532C2

RU 2 454 811 C2

Authors

Pan Ljaotszjun'

Tsao Tszjun'

Te Man'Sja

Khuan Chzhehn'Khaj

Dates

2012-06-27Published

2008-11-07Filed