FORMING THE KEY DEPENDING ON THE PARAMETER Russian patent published in 2018 - IPC G06F21/33 H04L9/08 H04L9/32 

Abstract RU 2670778 C9

FIELD: information technology.

SUBSTANCE: invention relates to the field of user authentication. Authentication method for providing access to one or more computing resources of the provider of computing resources comprises the steps, on which the message and the signature of the message from the authentication side are received, form, in part, based on the received message, the expected signature, at least by calling the hash function of the message authentication code, that one call to the hash function of the message authentication code includes inputting a message authentication code into the hash function, which is based at least in part on a secret certificate shared with the authentication party, the secret certificate is received from the master key source and corresponds to the key zone, one other call to the hash function of the message authentication code includes the result of the previous call of the hash function of the message authentication code as input to the hash function of the message authentication code, determine whether the received signature corresponds to the expected signature, and perform one or more actions for which authentication of the received message is required.

EFFECT: increase the effectiveness of authentication.

29 cl, 24 dwg

Similar patents RU2670778C9

Title Year Author Number
FORMING THE KEY DEPENDING ON THE PARAMETER 2017
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2671052C1
KEY FORMATION DEPENDING ON PARAMETER 2018
  • Roth, Gregory, B.
  • Behm, Bradley, Jeffery
  • Crahen, Eric, D.
  • Ilac, Cristian, M.
  • Fitch, Nathan, R.
  • Brandwine, Eric, Jason
  • O`Neill, Kevin, Ross
RU2709162C1
KEY GENERATION DEPENDING ON PARAMETER 2012
  • Rot Gregori B.
  • Bekhm Bredli Dzheffri
  • Krakhen Erik D.
  • Ilak Kristian M.
  • Fitch Natan R.
  • Branduajn Erik Dzhejson
  • O'Nejll Kevin Ross
RU2582540C2
KEY FORMATION DEPENDING ON PARAMETER 2012
  • Rot Gregori B.
  • Bekhm Bredli Dzheffri
  • Krakhen Erik D.
  • Ilak Kristian M.
  • Fitch Natan R.
  • Branduajn Erik Dzhejson
  • O`Nejll Kevin Ross
RU2636105C1
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER 2015
  • Novak, Mark Fishel
  • Ben-Zvi, Nir
  • Ferguson, Niels T.
RU2693313C2
SECURE DATA EXCHANGE ENSURING DIRECT SECRECY 2018
  • Le Saint, Eric
  • Mohassel, Payman
RU2771928C2
LIMITED ACCESS TO FUNCTIONAL SETS OF MOBILE TERMINAL 2006
  • Tarkkala Lauri
RU2391796C2
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA 2007
  • Kross Dehvid B.
  • Lich Pol Dzh.
  • Shutts Klaus Ju.
  • Jang Robert D.
  • Sherman Natan K.
RU2434340C2
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS 2015
  • Le Saint, Eric
  • Gordon, James
  • Joshi, Roopesh
RU2710897C2
SIGNING AND VERIFYING AUTHENTICITY OF SESSION INITIATION PROTOCOL ROUTING HEADERS 2005
  • Bach Dzheremi Tomas
  • Su Tszyn'Jan'
  • Narajanan Sankaran
  • Ehjdel'Man Vadim
RU2378773C2

RU 2 670 778 C9

Authors

Roth Gregory B.

Behm Bradley Jeffery

Crahen Eric D.

Ilac Cristian M.

Fitch Nathan R.

Brandwine Eric Jason

O'Neill Kevin Ross

Dates

2018-10-25Published

2017-10-09Filed