FIELD: information technologies.
SUBSTANCE: method includes the following stages: 1) configuring authentication roles for network objects; 2) authentication of an authentication object and a request object, which configured authentication roles by an authentication protocol; and 3) upon completion of authentication, the authentication object and the request object approve a key, in which in a message of key approval a field is added to monitor integrity of messages, as well as a field to establish protocol synchronisation, besides, values of the specified fields are used to verify the message of key approval.
EFFECT: higher safety and efficiency of realisation.
12 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF AUTHENTICATION WITH ONE-SIDED ACCESS | 2008 |
|
RU2454811C2 |
WAPI UNICAST SECRET KEY NEGOTIATION METHOD | 2008 |
|
RU2448427C2 |
METHOD OF DOUBLE-SIDED AUTHENTICATION OF ACCESS | 2008 |
|
RU2444143C2 |
AUTHENTICATION SYSTEMS AND METHODS | 2013 |
|
RU2587417C2 |
METHOD OF ACCESS WITH AUTHENTICATION AND ACCESS SYSTEM WITH AUTHENTICATION IN WIRELESS MULTI-HOP NETWORK | 2008 |
|
RU2446606C1 |
KEY GENERATION IN COMMUNICATION SYSTEM | 2003 |
|
RU2333607C2 |
SECONDARY AUTHENTICATION OF USER DEVICE | 2017 |
|
RU2755258C2 |
METHOD FOR DECENTRALIZED DISTRIBUTION OF KEY INFORMATION | 2019 |
|
RU2716207C1 |
METHOD AND APPARATUS FOR REDUCING OVERHEAD FOR CHECKING DATA INTEGRITY IN WIRELESS COMMUNICATION SYSTEM | 2010 |
|
RU2509445C2 |
AUTHENTICATION FOR NEXT-GENERATION SYSTEMS | 2017 |
|
RU2727160C1 |
Authors
Dates
2012-06-27—Published
2008-10-30—Filed