FIELD: information technology.
SUBSTANCE: system includes a first object for sending a first message to a second object, sending a third message to a third object after receiving a second message sent by the second object, verifying a fourth message after receiving a fourth message sent from the third object so as to complete authentication of the second object through the first object, sending a fifth message to the second object when verification is completed; a second object for receiving a first message sent by the first object, sending a second message to a first object, verifying a fifth message after receiving a fifth message sent by the first object; a third object for receiving a third message sent by the first object, verifying whether the available first and the second object are available, performing preliminary processing in accordance with the verification results, sending a fourth message to the second object when processing is completed.
EFFECT: eliminating technical problems associated with failure to authenticate a public key.
9 cl, 2 dwg
Title |
Year |
Author |
Number |
METHOD AND SYSTEM FOR TWO-WAY AUTHENTICATION OF SUBJECTS |
2008 |
- Te Man'Sja
- Tsao Tszjun'
- Khuan Chzhehn'Khaj
- Laj Sjaolun
|
RU2445741C1 |
SECURE AUTHENTICATED CHANNEL |
2009 |
- Andro Zhan P'Er
- Djuran Alan
- Sirven Tomas
|
RU2488226C2 |
SECURED CHANNEL WITH AUTHENTICATION |
2004 |
- Andro Zhan P'Er
- Djuran Alan
- Sirven Tomas
|
RU2359416C2 |
METHOD AND APPARATUS FOR AUTHENTICATION OF IDENTIFICATION INFORMATION, DEVICE, MICROCIRCUIT, INFORMATION STORAGE MEDIA AND PROGRAM |
2021 |
- Tie, Mansya
- Tsao, Tszyun
- Laj, Syaolun
- Chzhao, Syaozhun
- Li, Tsin
- Chzhan, Byanlin
- Van, Yuekhuej
|
RU2807058C1 |
METHOD TO CONTROL ACCESS TO SECURED NETWORK BASED ON THREE-ELEMENT AUTHENTICATION OF PEER-TO-PEER OBJECTS |
2008 |
- Sjao Juehlehj
- Tsao Tszjun'
- Laj Sjaolun
- Khuan Chzhehn'Khaj
|
RU2444156C1 |
METHOD OF ACCESS WITH AUTHENTICATION AND ACCESS SYSTEM WITH AUTHENTICATION IN WIRELESS MULTI-HOP NETWORK |
2008 |
- Sjao Juehlehj
- Tsao Tszjun'
- Laj Sjaolun
- Khuan Chzhehn'Khaj
|
RU2446606C1 |
METHOD AND DEVICE FOR MUTUAL AUTHENTICATION |
2007 |
- Peres Aram
- Dondeti Lakshminatkh Reddi
|
RU2420896C2 |
METHOD OF TRUSTED NETWORK CONNECTION FOR IMPROVEMENT OF PROTECTION |
2008 |
- Sjao Juehlehj
- Tsao Tszjun'
- Laj Sjaolun
- Khuan Chzhehn'Khaj
|
RU2437230C2 |
METHOD AND DEVICE TO ARRANGE PROTECTION OF LOCATION INFORMATION AND TO CONTROL ACCESS WITH APPLICATION OF LOCATION INFORMATION |
2008 |
- Cha Inkhiok
- Shakh Jodzhendra K.
- E Chun'Sjuan'
|
RU2428808C2 |
DOMAIN NAME CONTROL SCHEME FOR CROSS-CHAIN INTERACTIONS IN BLOCKCHAIN SYSTEMS |
2018 |
|
RU2718959C1 |