Discrete device identification of the human operator

 

The invention relates to computer technology and may find application in the organization of authorized access to resources of the computing system. The technical result is to increase the reliability of the identification system by increasing the difficulty of unauthorized access to resources of the computing system. The technical result is achieved due to the fact that the device contains a memory block of passwords, the comparison circuit, the first and second triggers, the first and second group of items, dialer, group of items OR, register, nonlinear functional Converter, the first subtractive counter, the first and the second element And the first element OR (inverted output), the second element OR the second summing counter, decoder, clock. 1 Il.

The invention relates to computing, and in particular to a device identification (establish) a person using electronic means, and may be used to provide authorized access to the software and hardware and information devices and resources information system.

Know the Oia, electronic switch, the detector, the shift register and the dialer, in which the manually dialed access codes, when the comparison circuit, is compared with a predetermined (model) code. Depending on the comparison result control circuit switch allows access to the operator when matching the entered password with a stored pattern or does not allow access in case of negative result of the comparison. [1]

The disadvantage of this device is its low reliability in restricted access due to availability determination reference password stored in the memory block of the system passwords. This is a consequence of the fact that storing passwords is explicit, i.e. the conversion of sample passwords when you enter them in the storage unit is not performed. The probability of obtaining a password from the memory block, it was necessary to maximally reduce. Because of the stated disadvantage of this device has not found wide application.

The closest in technical essence and the achieved positive effect is the device identification of the human operator, containing the memory block of passwords, the comparison circuit, the first and second triggers, dialer device is pout, the second, third and fourth group of elements And functional Converter, counter, clock, item, differentiating chain, diode, providing increased reliability limit unauthorized access to resources of the computing system by increasing the complexity of the definition of operator standard passwords. The reliability limit unauthorized access to the device depends on the type and parameters used for irreversible transformations of nonlinear functional transducers. [2]

The device is implemented on the elements of digital technology that allowed us to match it with real computing systems to provide access to a human operator to resources of the computing system.

The disadvantage of this device is the low reliability.

The required technical result of the invention is to improve the reliability of the device.

The required technical result is achieved that the device containing the memory block of passwords, the comparison circuit, the first trigger, the first group of elements And, dialer, group of items OR, register, nonlinear functional Converter, the first is Roy trigger the second element OR the second element And the second (summing counter, decoder, clock (GTI), inputs of the second element And the second (summing) the counter and decoder, while the second input of the second element And receives a sequence of clock pulses of the GTI, which also receives input From the second trigger signal which is supplied to the first input of the second element And whose output is connected with the control input of a nonlinear functional of the Converter and to the S input of the second counter, the output of which is connected by a parallel bus to a decoder, have To+1 the output, where K is the number of transformations dialed sequence of the password, which is connected to the input R of the second (summing) of the meter, single input of the first (subtractive) counter and control input of the second group of elements; the first output of the decoder is connected to the input register, the second input of the first element And the first input connected to the inverse output of the first element OR the input of which is connected by a parallel bus with the output of the counter; the output of the first element And connected to the first input of the second element OR with a control input of the comparison circuit, to which, is outinen with parallel input nonlinear functional Converter; the first output of the comparison circuit, indicating a positive result of the comparison is connected to the S input of the first trigger on the R input of which receives the pulse power, which is also fed to the R input of the register and to the second input of the second element OR the output of which is connected to the R input of the second trigger; the second output of the comparison circuit, signaling the negative result of the comparison is supplied to the output device for alerting the operator that an incorrect password is input; the output of the first trigger is connected with the control input of the first group of elements And the output of which is connected by a parallel bus to the entrance of the protected computing system; the first output of the dialer is connected by a parallel bus to the entrance of a group of elements And parallel to the input of the first counter and to the input of group members OR, which is also connected to the output of the second group of elements And parallel to the input of which is connected to the output of a nonlinear functional of the inverter; the output of the group of elements OR connected by a parallel bus input register; a second output of the dialer is connected to the S input of the second trigger.

The associated analysis of the prototype shows that the proposed device otlichaete the criterion of “novelty” technical solutions. The implementation of all new elements known from the scientific literature that meets the criterion of “industrial applicability”.

In the scientific literature not found in the device described by a set of new features that allows us to conclude that the technical solutions according to the criterion of “inventive step”.

The invention is illustrated in the drawing. Digital device identification of the human operator contains the memory block password 1, the comparison circuit 2, the first trigger 3, the output signal “error” is 4, the first group of elements And 5, the output of which connects the dialer from the protected system 6, the dialer 7, a group of items, OR 8, case 9, nonlinear functional Converter 10, the first (subtractive) counter 11, a second group of elements And 12, the first element And 13, the first element OR (inverted output) 14, a second trigger 15, the pulse at power-16, the second element OR 17, the second And gate 18, the second (summing) of the counter 19, the decoder 20, the clock 21. [4]

The second input of the second element And 18 connected to the generator output clock pulses (GTI) 21, which, in addition, connected to the input With the second trigger 15, the output of which is pionernogo Converter 10 and to the S input of the second counter 19, the output of which is connected by a parallel bus to a decoder 20 having K+1 outputs, where K is the number of transformations dialed sequence of the password, which is connected to the input R of the second (summing) of the counter 19, a single input of the first (subtractive) of the counter 11 and the controlling input of the second group of elements And 12, the first output of the decoder is connected to the input of register 9, with the second input of the first element And 13, the first input connected to the inverse output of the first element OR 14, the inlet of which is connected by a parallel bus with the output of the counter 19, the output of the first element And 13 connected to the first input of the second element OR with a control input of the comparison circuit 2, to which, moreover, parallel busses are connected to the output of the memory block passwords 1 and the output of register 9, which, in addition, connected to the parallel input of a nonlinear functional of the Converter 10, the first output of the comparison circuit 2, indicating a positive result of the comparison, is connected to the S input of the first flip-flop 3, R input of which receives the pulse power is 16, which is also fed to the R input of the register 9 and the second input of the second element OR 17, the output of which is connected to the R input of the second trigger 15; the second output shemaine the operator of entering an incorrect password; the output of the first trigger is connected with the control input of the first group of elements And 5, the output of which is connected by a parallel bus to the entrance of the protected computing system; the first output of the dialer 7 is connected by a parallel bus to the entrance of the first group of elements And 5, the parallel input of the first counter 11 and to the input of group members, OR 8, which is also connected to the output of the second group of elements And 12, parallel input of which is connected to the output of a nonlinear functional of the Converter 10; the output of the second group of elements OR 8 is connected by a parallel bus input register 9; the second output of the dialer 7 is connected to the S input of the second trigger 15.

The memory block password 1 is designed to store digital sequence corresponding to the converted password and used for comparison with the sequence formed during the transformation of the password entered by the operator. While retrieving a sequence from a block of memory passwords can not give the possibility to the operator not knowing the password, you can get it by conversion from the received sequence, since the algorithm inverse transformation in the scheme is not provided.

The dialer 7 is irvy (parallel) output and delivery, after that, the signal on the second output.

Nonlinear functional Converter 10 is a discrete playback device of nonlinear functions [3] and is designed to generate irreversible (ambiguous) code combination.

Clock 21 is designed to generate a sequence of clock pulses.

The first (subtractive) counter 11 is designed to count in the reverse order of the number of clock cycles conversion and, when zeros on all the outputs, control, together with the decoder, feed converted combinations of the comparison circuit.

The second (summing) of the counter 19 is designed for counting the number of clock pulses to control the decoder 20 and the termination of their submission upon receipt of the control signal at the R input of counter 19.

The decoder 20 is designed to generate the first control pulse for enabling the typed sequence logon password nonlinear functional Converter and generate k+1 pulse to ensure the delivery of the converted sequence to the input of the comparison circuit and the completion of the conversion.

The device operates as follows.

P 9, and through the element OR 17 - second trigger 15. The first trigger 3 closes the first group of elements And 5 and, thereby, closes the login for dialer 7; reset register 9; the second trigger 15 closes the second And gate 18, which prevents the pulses from clock 21 to enter the second counter 19.

The operator typing the password on the dialer 7, in parallel through the first output of the dialer 7 and the group of items, OR 8 passes it to the input of register 9, in which the code is stored. Part code, password, component code P the number of repetitions of the operation of the nonlinear transformation is applied to the triggers of the first counter 11.

Typing the code, the operator sends a signal from the second output of the dialer 7, which is supplied to the S input of the second trigger 15, which, moving in one state, opens the second And gate 18 and to the input of the second counter 19 starts to receive pulses from the clock 21.

The first pulse, socetanny the second counter 19 will cause the signal at the first output of the decoder 20, which through their first serves clock pulse for the register 9, the output of which is in parallel code will receive a password and pic is t to transform. After k cycles of work for the GTI 21 at the k+1 output of the decoder 20, a signal will appear translating the second counter 19 in the zero state, reducing per unit stored in the first counter 11 number of transactions nonlinear transformation, and opening the second group of items 12 through which the nonlinear transformation with the function of the Converter 10 through a group of items, OR 8 to the input of the register 9.

Continued with the GTI 21 pulses through the reset counter 19 called first appearance of the signal at the first output of the decoder 20, which introduces stored in the register 9 data in a nonlinear Converter; then, after processing data in a nonlinear functional Converter 10, the appearance of a signal at the k+1 output of the decoder, further reducing the value of the number of repetitions of the operation of the nonlinear transformation of the first counter 11.

The data processing process is similarly repeated until such time as all outputs of the first counter 11 does not appear zeros, meaning that the process is nonlinear transformation was performed P times. At that moment, the inverse output of the first element OR 14, a signal will appear, opening the first item 13.

Cont what causes the appearance at the output of the register 9 of the transformed information, coming through the open first item 13 on the input of the comparison circuit 2, and activating it, and also through the OR element 17 moves the second trigger 15 in the zero state, than by the second element And 18, stops the flow of pulses per second (summing) the counter 19.

If the value of the reference password does not match with the calculated result, the output of the comparison circuit generates an error signal 4, the first trigger 3 remains in the zero state, the first group of elements And 5 does not allow the dialer to resources protected system.

If the value of the reference password coincides with the calculated result, the output of the comparison circuit generates a signal translating a first trigger 3 in one state that opens the first group of elements And 5, which allow the dialer to resources protected system.

As with the GTI pulses being delivered to the second counter, no process operation does not occur, and it does not impede the work of the dialer system.

Thus, the proposed device can improve the qualitative characteristics of the digital device, identification of the human operator on the protection of information from Eabody device and is achieved with the exception of the analog circuit elements, having less reliability; reducing the number of complex discrete elements, such as registers; the decrease in the total number of elements of the device and electrical connections between them.

Sources of information

1. U.S. patent No. 4525713, CL H 04 Q 9/00, 1985

2. RF patent №2075777, CL 6 G 06 F 12/14, H 04 Q 9/00, 1997

3. Titze U., Schenk, K. Semiconductor circuitry: a reference guide. - M.: Mir, 1983, page 341.

4. Panibratov A. P., Belyaev, S. N., Kozyreva, M. Computing machines, systems and networks. - M.: Finance and statistics, 1991, 400 S.

Claims

Discrete device identification of the human operator, containing the memory block of passwords, the comparison circuit, the first trigger, the first group of elements And, dialer, group of items OR, register, nonlinear functional Converter, designed for the formation of irreversible code combination, the first subtractive counter, the second group of elements And the first element And the first element OR with an inverted output of the second trigger, the second element OR generator of clock pulses, characterized in that it additionally introduced the second element And the second sum counter and decoder, thus the switching impulse stroke of the second element And receives a sequence of clock pulses from clock pulses, coming to the input of the second trigger signal which is supplied to the first input of the second element And whose output is connected with the control input of a nonlinear functional of the Converter and to the S input of the second counter, the output of which is connected by a parallel bus to a decoder, (K+1)-th output, where K is the number of transformations dialed sequence of the password, which is connected to the input R of the second sum counter, single subtractive input of the first counter and control input of the second group of elements And the first output of the decoder is connected to the input register, the second input of the first element And first input connected to the inverse output of the first element OR the input of which is connected by a parallel bus output of the first subtractive counter, the output of the first element And connected to the first input of the second element OR with a control input of the comparison circuit, which is parallel to the tire connected to the output of the memory block of passwords and the output register, which is connected to the parallel input of a nonlinear functional of the Converter, the first output of the comparison circuit connected to the S input of the first flip-flop, the output of the second element OR connected to the R input of the second trigger speed of the first group of elements And, the output of which is connected by a parallel bus to the entrance of the protected computing system, the output of the dialer is connected by a parallel bus to the entrance of the first group of elements And parallel to the subtractive input of the first counter and to the input of group members OR, which is also connected to the output of the second group of elements And parallel to the input of which is connected to the output of a nonlinear functional of the Converter, the output of the group of elements OR connected by a parallel bus input register, the signal "version" of the dialer is supplied to the S input of the second trigger.

 

Same patents:

The invention relates to the field of information security with cryptographic transformation of data

The invention relates to the field of authentication objects

The invention relates to methods of protecting computer memory from unauthorized access through an arbitrary communication channels and to the structure of the devices for implementing such methods

The invention relates to the field of computing, and in particular to means of information protection from unauthorized access to electronic computing systems (machines), local area networks (LAN) - based personal computers (PC)

The invention relates to a device for data exchange with setting permissions on data exchange

The invention relates to a method of monitoring the performance of computer programs in accordance with their intended purpose

The invention relates to the field of optical recording and reproducing video and/or audio data, in particular to the recording medium for storing identification information of the manufacturer of the recording device, changing the contents of the recording media

The invention relates to a device and method for authentication of the content of the memory

The invention relates to the processing unit and method for accessing a memory having multiple memory cells for storing data values

Processor // 2248608

FIELD: computers, data protection.

SUBSTANCE: processor has bus interface device, device for selection/decoding of commands, device for dispatching/execution, program string decoding device, which string is selected from program and loaded in first levels command cash, which contains a set of N two-input elements XOR, keys memory, storing different N-bit decoding keys.

EFFECT: higher efficiency.

2 dwg

FIELD: technologies for authentication of information.

SUBSTANCE: method includes performing absolute identification for confirming legality of data carrier according to first rule in preset time. Authentication information is recorded on this data carrier in previously set position. Process of arbitrary authentication is performed for confirming legality of said data carrier in accordance to second rule in arbitrary time. First rule includes announcing confirmation of standard match, if information for authentication is detected as registered in selected preset position. Second rule in given arbitrary authentication process includes announcing standard match, if information for authentication is detected as not registered in arbitrary positions, different from given preset position.

EFFECT: higher reliability.

6 cl, 12 dwg

FIELD: computers.

SUBSTANCE: method includes, on basis of contents of central processor registers, received after processor performs some sort of command, by means of mathematical logical operation, forming certain finite control sum and storing it in memory, and on basis of contents of registers, received before start of execution by said processor of directly next command, certain starting checksum is formed, while if starting checksum mismatches finite checksum, error message is generated, which can be followed by halting of processor operation or blocking of chip board with its removal from circulation.

EFFECT: higher reliability.

2 cl, 2 dwg

FIELD: copy protection.

SUBSTANCE: system has content distribution block, multiple recording and playback devices for digital data, calculations processing block, meant to perform communications with recording and playback devices and performing calculations processing for transferring license payments.

EFFECT: higher reliability of copy protection.

5 cl, 55 dwg

FIELD: electronics.

SUBSTANCE: device has signaling bus, loaded with clock signal, at least one couple of buses serving for encoding one bit, detector circuit, multiplexer. According to method in case of first value of signal of signal bus two buses of one couple detect same level of signal, and in case of second value of signal of signal bus two buses of one couple detect different signal levels, detect forbidden states during operation of board, change process of system functioning, to generate alarm in that way.

EFFECT: higher reliability of protection.

2 cl, 7 dwg

FIELD: microprocessors.

SUBSTANCE: device has central processing devices, including first cryptographic block, at least one peripheral block, including second cryptographic block, device also has data bus, random numbers generator, conductor for supplying clock signal, conductor for providing random numbers signal, set of logical communication elements, while each cryptographic block has register of displacement with check connection.

EFFECT: higher level of unsanctioned access protection.

7 cl, 1 dwg

FIELD: digital memory technologies.

SUBSTANCE: board has rewritable power-independent memory and control circuit, means for storing address, pointing at limit between authentication area and non-authentication area, circuit for changing size of said areas. Reading device contains estimation means, reading information, pointing at number of times, for which digital data can be read, and playback means. Second device variant additionally has means for digital output of contents.

EFFECT: higher efficiency.

3 cl, 23 dwg

FIELD: computer science.

SUBSTANCE: method includes protective mathematical conversion of service data of network frame prior to transfer to environment for transfer of a LAN. To said protective conversion the data is subjected, which is contained in headers of network frames of channel level, and also in headers of all encapsulated network packets and segments. As a result the very possibility of interception is prevented.

EFFECT: higher efficiency.

7 cl, 2 dwg

FIELD: data carriers.

SUBSTANCE: device for reproduction of data from data carrier, program zone of which is used for recording a set of files, and control zone - for controlling copy protection data concerning the file, recorded in program zone, has computer for calculating copy protection information for each time file is reproduced, comparison means for comparing value, calculated on reproduction command, being prior to current one, to value, calculated on current reproduction command, and if these values coincide, the last value is stored as copy protection value, calculated on reproduction command , prior to current one and control means for allowing reproduction of file, appropriate for current command, if value, calculated as response to command, previous relatively to current command, coincides as a result of comparison to value, calculated as a response to current command.

EFFECT: higher reliability, higher efficiency.

4 cl, 46 dwg

FIELD: data carriers.

SUBSTANCE: device has calculating, reserving and recording modules. Each variant of semiconductor memory card contains area for recording user data for controlling volume and area for recording user data. On carrier method for computer initialization is recorded, including calculation of size of volume control information, reserving areas and recording therein of control information for volume and user data, recording main boot record and sectors table in first section of first area, skipping preset number of sectors, recording information of boot sector of section, file allocation table and root directory element to following sectors.

EFFECT: higher efficiency.

5 cl, 59 dwg

Up!