By now, all necessary information from the view of the master node is readily prepared. The information, including the authentication information MN_Rand, encrypted session user name MN_U_Session, and the proxy credential issued by the CA, is sent to the slave node, and the authentication process goes to the next phase.