METHOD AND SYSTEM FOR TRUSTED THIRD PARTY-BASED TWO-WAY OBJECT IDENTIFICATION Russian patent published in 2012 - IPC H04W12/06 H04L9/32 

Abstract RU 2458481 C2

FIELD: information technology.

SUBSTANCE: system includes a first object for sending a first message to a second object, sending a third message to a third object after receiving a second message sent by the second object, verifying a fourth message after receiving a fourth message sent from the third object so as to complete authentication of the second object through the first object, sending a fifth message to the second object when verification is completed; a second object for receiving a first message sent by the first object, sending a second message to a first object, verifying a fifth message after receiving a fifth message sent by the first object; a third object for receiving a third message sent by the first object, verifying whether the available first and the second object are available, performing preliminary processing in accordance with the verification results, sending a fourth message to the second object when processing is completed.

EFFECT: eliminating technical problems associated with failure to authenticate a public key.

9 cl, 2 dwg

Similar patents RU2458481C2

Title Year Author Number
METHOD AND SYSTEM FOR TWO-WAY AUTHENTICATION OF SUBJECTS 2008
  • Te Man'Sja
  • Tsao Tszjun'
  • Khuan Chzhehn'Khaj
  • Laj Sjaolun
RU2445741C1
SECURE AUTHENTICATED CHANNEL 2009
  • Andro Zhan P'Er
  • Djuran Alan
  • Sirven Tomas
RU2488226C2
SECURED CHANNEL WITH AUTHENTICATION 2004
  • Andro Zhan P'Er
  • Djuran Alan
  • Sirven Tomas
RU2359416C2
METHOD AND APPARATUS FOR AUTHENTICATION OF IDENTIFICATION INFORMATION, DEVICE, MICROCIRCUIT, INFORMATION STORAGE MEDIA AND PROGRAM 2021
  • Tie, Mansya
  • Tsao, Tszyun
  • Laj, Syaolun
  • Chzhao, Syaozhun
  • Li, Tsin
  • Chzhan, Byanlin
  • Van, Yuekhuej
RU2807058C1
METHOD TO CONTROL ACCESS TO SECURED NETWORK BASED ON THREE-ELEMENT AUTHENTICATION OF PEER-TO-PEER OBJECTS 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2444156C1
METHOD OF ACCESS WITH AUTHENTICATION AND ACCESS SYSTEM WITH AUTHENTICATION IN WIRELESS MULTI-HOP NETWORK 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2446606C1
METHOD AND DEVICE FOR MUTUAL AUTHENTICATION 2007
  • Peres Aram
  • Dondeti Lakshminatkh Reddi
RU2420896C2
METHOD OF TRUSTED NETWORK CONNECTION FOR IMPROVEMENT OF PROTECTION 2008
  • Sjao Juehlehj
  • Tsao Tszjun'
  • Laj Sjaolun
  • Khuan Chzhehn'Khaj
RU2437230C2
METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION 2008
  • Cha Inkhiok
  • Shakh Jodzhendra K.
  • E Chun'Sjuan'
RU2428808C2
DOMAIN NAME CONTROL SCHEME FOR CROSS-CHAIN INTERACTIONS IN BLOCKCHAIN SYSTEMS 2018
  • Qiu, Honglin
RU2718959C1

RU 2 458 481 C2

Authors

Te Man'Sja

Tsao Tszjun'

Laj Sjaolun

Pan Ljaotszjun'

Khuan Chzhehnkhaj

Dates

2012-08-10Published

2008-10-23Filed