FIELD: data processing.
SUBSTANCE: invention relates to a method for authenticating correspondents of a radio network (r/n) at a given composition and conditions for locating correspondents of a radio network. Method consists in assigning conditional numbers to all the correspondents of the radio network, additional initial data are set: size of one-dimensional matrix L and identification number of cell (Ninitial), unique for each radio network correspondent, to place and read the value of the authentication information; simultaneously, all radio network correspondents include radio receivers with noise meters and input the initial data, number of n-measurements of noise level is calculated, noise level at each frequency of the signal spectrum with a given pitch Δf is measured, this procedure is repeated n times, mathematical expectation of noise level for each frequency is calculated, hashing algorithm is selected, hash conversion of the values of the mathematical expectation of the noise level is carried out, authenticating message containing a binary sequence of random L numbers, with a uniform distribution law, including data on the chosen algorithm for converting the values of the hash function and the value of the result of hashing of the authentication information, is transmitted, authenticating message is received by all radio network correspondents, selected conditional number of the hash algorithm and the value of the hash result is read, starting with the cell identification number (Ninitial), the values of the i-th hash function are written to the database successively for all radio network correspondents, the codogram including the values of the authenticating message and the service / operational information is generated and transmitted, the codogram is received on the receiving side, hash values are taken from the received codogram, the value of the i-th hash function is compared with the corresponding value of the i-th hash function from the database. If it corresponds, then a successful authentication of the correspondent occurs and a permission signal to process the service and operational information is generated. If not, then service and operational information is blocked.
EFFECT: technical result is to increase the security of the authentication procedure.
1 cl, 7 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR AUTHENTICATING OBJECTS | 2000 |
|
RU2184390C1 |
OBJECT AUTHENTICATION METHOD | 2000 |
|
RU2183348C2 |
METHOD FOR PROTECTED REMOTE ACCESS TO INFORMATION RESOURCES | 2013 |
|
RU2530691C1 |
METHOD OF EXTERNAL QUALITY CONTROL OF COMMUNICATION SERVICES PROVIDED BY NETWORK | 2017 |
|
RU2669535C1 |
METHOD OF TRANSMITTING DATA WITH GIVEN QUALITY IN A COMMUNICATION SYSTEM WHICH DOES NOT PROVIDE A THROUGH COMPOSITE INFORMATION CHANNEL AT ANY TIME | 2020 |
|
RU2734021C1 |
METHOD FOR PHYSICAL DIVERSITY OF DATA RECEPTION AND TRANSMISSION PATHS IN CONDITIONS OF DESTRUCTIVE PROGRAM IMPACT | 2020 |
|
RU2751987C1 |
CONCEALED INFORMATION EXCHANGE METHOD | 2018 |
|
RU2708354C1 |
METHOD FOR DYNAMIC ADDRESSING OF CORRESPONDENTS OF MOBILE RADIO NETWORK AND DEVICE FOR ITS IMPLEMENTATION | 2012 |
|
RU2557451C2 |
AUTHENTICATION IN PROTECTED COMPUTERIZED GAME SYSTEM | 2003 |
|
RU2302276C2 |
METHOD AND DEVICE FOR RECEPTION AND REMOVAL OF INFORMATION CONCERNING OBJECTS OF DIGITAL RIGHTS | 2005 |
|
RU2347266C2 |
Authors
Dates
2018-05-07—Published
2017-02-20—Filed