Portable electronic device to verify input test sequence of characters on the basis of pre-defined character sequence
FIELD: portable electronic devices.
SUBSTANCE: portable electronic device includes memory to store a secret code in the form of pre-defined character sequence; rotating device with touch surface providing for user tactile impact and installed in such a manner as to provide for rotation around its axis; feedback tools separated from the rotating device to provide for feedback to user when turning the rotating device; conversion tool to convert each turn in sequence of turns of the rotating device to a character of corresponding ordered test character sequence, and verification tool to verify the test character sequence by comparing it with pre-defined character sequence.
EFFECT: user convenience during input of test character sequence along with provision of security and restriction of access to the device or to its individual functions.
33 cl, 7 dwg
The technical FIELD
The invention relates to a portable electronic device for verification of test input sequences of characters by comparing with a predetermined sequence of symbols and to a method for providing security to a portable electronic device.
The LEVEL of TECHNOLOGY
Currently, portable electronic devices use security methods to restrict access to the device or to one or more of its functions. For example, some modern mobile phones can be configured so that the user must enter a secret PIN code when you switch the device to use this device.
Typically, such a device has a memory that stores the secret code in the form of a predetermined sequence of symbols, usually numbers. When the phone is switched on, the user enters a sequence of digits using the numeric keypad of a mobile phone. When you enter each digit on the display shows the sign '*'. When the user finishes the input sequence, he presses a function key, and the mobile phone checks the user-entered sequence of characters, comparing it with the stored predetermined sequence of characters. If the verification ends successful is about, you are allowed access to the device if the verification fails, then access to the device is prohibited.
According to one of embodiments of the present invention features a portable electronic device that includes memory for storing a secret code in the form of a predetermined sequence of characters; a rotary device having a tactile surface for tactile user and installed with the possibility of rotation around the axis; feedback tool that is separate from the rotary device to provide feedback to the user during rotation of the rotator; conversion means for converting each rotation of the sequence of rotations of the rotator in the symbol corresponding to the ordered test sequences of characters and verification tools to verify the test sequence of characters by comparing with a predetermined sequence of characters.
According to one of embodiments of the present invention proposes a method of providing security to a portable electronic device containing a rotary device including a user performs an ordered sequence of rotations of the rotary device is TBA; the provision in a portable electronic device, separately from the rotary device, feedback to the user when turning the rotary device at run time ordered sequence of turns and check whether the ordered sequence of rotations made by the user, a predetermined ordered sequence of rotations.
BRIEF DESCRIPTION of DRAWINGS
For a better understanding of the present invention will be made with reference only as an example, on the accompanying drawings on which:
figure 1 illustrates the portable electronic device 10; Piga and 2B schematically illustrate an example of performing rotary means 3C input cross-section and in plan; and
figa, 3B, 3C and 3D illustrate the visual feedback provided to the user by the display 16.
DETAILED DESCRIPTION of embodiments of the INVENTION
In versions of the invention, the user can implement the security in the electronic device 10 by executing an ordered sequence of rotations of the rotator 32. The device 10 provides, separately from the rotator 32, feedback to the user when turning the rotary device 32 at the time ordered sequence for oratov. Checks whether an ordered sequence of rotations performed by the user, the preset sequence of turns. This check may occur in the device 10.
Figure 1 illustrates the portable electronic device 10 containing the memory 12, the means 20 user input device 14 audio output, the image output device in the form of a display 16 and a processor 18. The processor 18 is connected to receive input control signals from the means 20 input and to apply the appropriate control signals to the device 14 audio output and a display 16. The processor 18 is also connected to memory 12 is read from the memory 12 and the entries in the memory 12.
The device 14 audio output provides an electrically amplified audio output signal to the user.
The memory 12 stores the secret code in the form of a predetermined sequence of characters. Predefined sequence of characters may be specified by the user.
Portable electronic device in this example operates as a mobile cell phone. In other examples, the portable electronic device may not have this functionality. The electronic device 10 further comprises a cellular transceiver 13, connected to the processor 18, which makes possible the implementation of communication in a cellular network St is zi (not shown).
Means 20 include input rotary tool 30 input and additional function keys 22. The rotary means 30 takes the input from a first control input signal 31 in the processor 18, and the function keys 22 serves the second control input signals 23 to the processor 18.
The rotary tool 30 entry includes rotated by the user rotating the device. The rotation of the rotator changes the continuous analogue electrical characteristic of the rotary input means. Periodically take samples electrical characteristics and quanthouse obtaining quantized values. The quantized value is some value from a discrete set of quantized values, each of which represents a different angular position of the rotary device. The quantized value is periodically sent to the processor 18 as a time varying first digital signal 31 of the control.
An example of executing a turning means 30 input schematically shown in cross section on figa and plan on figv.
The rotary tool 30 input in this example replaces the keyboard. The rotary tool 30 input can be used for data entry, for example, to dial a phone number or enter alphanumeric text. Each of the many different angular positions of the rotary device which may correspond to a particular input symbol.
The rotary tool 30 entry includes discoid rotary device 32 installed with the possibility of rotation around the axis 34, in response to tactile stimuli to the user. Discoid rotary device 32 has a circular flat top tactile surface 36 that is designed to impact the user's fingers.
When using the device, the user touches the upper tactile surface 36 of the finger. When the movement of the finger in contact with the upper tactile surface 36, the friction between the user's finger and the upper tactile surface 36 causes discoid rotary device to rotate.
Circular upper tactile surface 36 has a downward curved edge 38 that is essentially inaccessible to the user. The axis 34 of rotation in this example is essentially perpendicular to the upper tactile surface 36. Electronic device 10 has a front surface 11 and the axis 34 of rotation in this example is essentially perpendicular to the front surface 11 of the electronic device.
The processor 18 provides the means of verification of the current user-entered sequence of rotations of the rotator (test sequence) by comparing with a predetermined sequence of rotations of the rotator. The EU and the verification is successful, the procedure security is successfully completed, and access. If the verification fails, the procedure of the security fails and access is denied. Access can refer both to the use of an electronic device 10 in General, and some of the functionality provided by this device.
The processor 18 receives the first control signal 31 from the rotary means 30 input. This signal indicates the current angular position of the rotator 32. The processor 18 also receives the second control signal 23 from the first function keys selectable by the user to indicate completion of the rotation, and the second function keys selectable by the user to indicate completion of a sequence of turns.
The user rotates the rotator and then presses the first soft key to indicate completion of the rotation. This is repeated for each rotation of the sequence of rotations of the rotator. Then the user presses the second function key to indicate completion of a sequence of turns.
After each complete rotation processor 18 converts the current quantized value, which is the first control signal 23, a single data value from a set C is achene data "character". In this example, the transformation is performed in the ASCII character set. The processor 18 stores the symbol in the memory 12 as a serial addition test sequence of characters.
After completion of the sequence of turns, marked by the signal input of the second function key, the CPU 18 checks the user-entered test sequence of characters matches a stored predetermined sequence of characters. If the verification is successful, the procedure security succeeds, and access is allowed. If verification is unsuccessful, the procedure of the security fails and access is denied. Access can refer both to the use of the electronic device 10, and some of the functionality provided by this device.
The processor 18 in addition to performing the function of providing secure access, described above, also controls the feedback provided to the user during security procedures. Provide feedback is separate from any noise or tactile feedback provided to the user turning device 32 as it rotates.
The processor 18 controls the display to provide visual feedback, as the show is about to figa, 3B, 3C and 3D.
The display is initially controlled by the processor 18 to display the image locked box 40 that is illustrated in figa. The image of the safe includes a housing 42 of the safe, the door 44 of the safe and dialer 46 safe on the door 44 of the safe. The current input symbol 50 is displayed by displaying the current angular position of the dialer safe. The sequence of characters 52 is displayed by the display previously entered turns dialer box 46 in the current sequence.
The image to be displayed during the rotation of the rotator 32 clockwise to its next discrete quantized value, illustrated in figv. When the processor 18 determines that the first input signal 31 is changed, since the rotary device is rotated until the next discrete quantized values, the processor 18 converts the new discrete quantized value in the symbol indicates this symbol on the display, and turn the dialer safe on the image of a safe and delivers the first control signal sound in the audio output device.
In more detail, when the controller 18 determines that the first input signal 31 is changed, the processor 18 converts the current quantized value represented by the first control signal 23, ASCII character, otobrazhayut value as the current input symbol. This example shows the current input symbol 50 is "4". The value displayed is the current input symbol discretely increases as the rotation of the rotator clockwise and discretely decreases as the rotation of the rotary device in a counterclockwise direction. The display under control of the processor 18 provides feedback on the absolute degree of rotation of the rotary device, represent the current input symbol 50.
In more detail, when the controller 18 determines that the first input signal 31 is changed, the processor 18 converts the change of the first input signal 31 to change the displayed image of the box so that the dialer box shown on the picture seems to be rotatable together with the rotating device and is similar to him. The angular position illustrated in the drawings with the use of arrows.
In more detail, when the controller 18 determines that the first input signal 31 is changed, the CPU 18 supplies the first control signal sound in the audio output device. This signal controls the audio output device to produce an audible "click"sound that mimics the sound that is created by the rotation of the dialer safe. Thus, the audio output device under control of the processor 18 provides feedback on the relative change in the structure of the angular position of the rotator. Each preset position when turning the device enables the change of the quantized signal, which in turn provides a 'click'.
When the processor 18 determines that the turn is finished, it controls the display so that the current input character is moved in the sequence of characters in place of the last character of the sequence 52 of symbols, see figs.
If the verification performed during the security procedures, the successful, the processor 18 controls the image presented on the display 16, so that it seemed as if the door opens, as shown in fig.3D, and simultaneously controls the audio output device to make a sound similar to the sound of the opening door.
In the above description, the end of the turn is marked by the user pressing the first soft key. In other embodiments, the completion of the rotation can be indicated by the user in other ways. For example, the user can change the direction of rotation of the rotary device on the opposite, the processor 18 may be configured to detect changes direction and takes quantized values that occurred before the change of direction as the input value corresponding to the end of the turn. Or, n the example, the user can pause in the movement of the rotary device, for example, more than 0.5 seconds, and the processor 18 may be configured to recognize such a long pause and take quantized values in the moment of pause, as the input value corresponding to the end of turn.
Although embodiments of the present invention have been described above with respect to various examples, it should be understood that modifications of these examples can be made without deviating from the essence and in the framework of the claimed invention. For example, although described discoid rotary device can be used in other forms of rotary devices. For example, the rotator may have the form of a wheel or drum, where the user acts on the curved surface of the rotator. Or, for example, although in the described example, the verification procedure is done in hardware, it can alternatively take place anywhere. For example, the secret code in the form of a predetermined sequence of characters can be stored on the remote station, and the device may send a message indicating the test sequence of characters to the remote station, a remote station may provide a means of verification for the comparison of the received test sequence of characters stored ZAR is it a given sequence of characters.
Although in the above description, attention was drawn to those features of the invention, which are assumed to be especially important, it should be understood that the applicant claims protection in respect of any patentable feature or combination of features mentioned above and/or shown on the drawings, regardless of whether they were highlighted.
1. An electronic device for verification of the test sequence of characters, including
memory for storing a secret code in the form of a predetermined sequence of symbols;
the rotary device having a tactile surface for tactile user and installed with the possibility of rotation around the axis;
feedback tool that is separate from the rotary device to provide the user with visual, audible and/or tactile feedback when the rotation of the rotator;
conversion tool for converting each rotation of the sequence of rotations of the rotator in the symbol corresponding to the ordered test sequences of characters, and
means of verification test sequence of characters by comparing with a predetermined sequence of characters.
2. An electronic device according to claim 1, in which cf is the rotary conversion is arranged to quantize the degree of rotation of the rotary device with obtaining the quantized values from the discrete set of quantized values.
3. An electronic device according to claim 2, in which the feedback tool reacts to every change of the quantized value during rotation, providing for user feedback by pointing to the change of the quantized values.
4. An electronic device according to claim 2, in which the feedback tool reacts to every change of the quantized value during rotation, providing for user feedback by specifying the quantized value.
5. An electronic device according to claim 2, in which the quantized value at the end of the rotation matches the character of the test sequence.
6. An electronic device according to claim 1, in which the feedback tool is the output device.
7. An electronic device according to claim 6, in which the feedback tool is the audio output device.
8. An electronic device according to claim 7, in which the audio output device provides the first audible output signal for each predetermined degree of rotation of the rotary device.
9. The electronic device of claim 8, in which the first audible output signal simulates a "click"you hear when turning the dialer safe.
10. An electronic device according to claim 7, in which the audio output device provides a second audible output signal with proper verification test after the outermost characters compared to a pre-specified sequence of characters.
11. The electronic device of claim 10, in which the second audible output signal simulates the sound of the opening door.
12. An electronic device according to claim 6, in which the feedback tool contains display.
13. The electronic device according to item 12, in which the feedback tool modifies the displayed symbol as the rotation of the rotator.
14. The electronic device according to item 13, in which the value of the displayed symbol increases with the rotation of the rotary device in the first direction and decreases when the rotation of the rotator in the opposite second direction.
15. The electronic device according to item 12, in which the display is configured to display each of the characters ordered the test sequence of characters.
16. An electronic device according to claim 1, in which the feedback tool includes a display for displaying the image at least dialer safe.
17. The electronic device according to item 16, which is shown on the display dialer safe rotates as you rotate the rotator.
18. Electronic device 17, in which the display is configured to display the open door of the safe with proper verification test sequence the character is in, compared to a pre-specified sequence of characters.
19. An electronic device according to claim 1, in which the tactile surface of the rotator is the upper tactile surface, while the rotary unit is installed with the possibility of rotation in response to tactile stimuli of the user, around an axis essentially perpendicular to the above-mentioned upper tactile surface.
20. An electronic device according to claim 1, which has a front surface, with tactile surface of the rotator is the upper tactile surface, and the rotary device is mounted can be rotated in response to tactile stimuli of the user, around an axis essentially perpendicular to the front surface of the electronic device.
21. An electronic device according to claim 1, in which the rotary device is discoid and is essentially flat and circular reizopoulou upper tactile surface.
22. The electronic device according to item 21, in which the curved edge, reaching down from the essentially circular upper tactile surface of the discoid rotary device essentially unavailable.
23. An electronic device according to claim 1, in which the rotary device is used to enter data.
24. An electronic device according to any one of the preceding paragraphs, to the which is a portable electronic device.
25. The way of safety, including
the user performs an ordered sequence of rotations of the rotary device in the electronic device;
the software in the electronic device, separately from the rotary device, visual, audible and/or tactile feedback to the user when turning the rotary device at run time ordered sequence of rotations; and
determine whether an ordered sequence of rotations made by the user, a predetermined ordered sequence of rotations.
26. The method according A.25 which, when providing feedback device for the user it provides output for a user electrically amplified sound signal.
27. The method according A.25, optionally including the quantization of the angular position of the rotary device with obtaining the quantized values from the discrete set of quantized values.
28. The method according to p. 25, further comprising providing in the electronic device, separately from the rotary device, feedback to the user indicating the change of the quantized values.
29. The method according to p. 25, further comprising providing in the electronic device, separately from the rotator, education is Noah communication to the user, specifies the quantized value.
30. The method according A.25, in which electronic device provides, separately from the rotary device, feedback to the user when the rotary device is held by turning each value of a discrete set of predefined values of the rotation angle.
31. The method according to any of PP-30, in which the electronic device is a portable electronic device.
32. Electronic device to provide the user enter a sequence of characters, including:
the rotary device having a tactile surface for tactile user and installed with the possibility of rotation around the axis;
feedback tool that is separate from the rotary device to provide the user with visual, audible and/or tactile feedback when rotating the rotator,
when the electronic device has a first mode in which the rotary device allows the user to enter a sequence of characters to switch from the first mode to the second mode in which the user has access to features that are not available in the first mode.
33. A processor for verification of the test sequence of characters, including
means for upravleniekrovlia feedback electronic device depending on the rotation of the rotary device in the electronic device, this feedback tool used to provide the user with visual, audible and/or tactile feedback and are separate from the rotator;
means for converting each rotation of the sequence of rotations of the rotator in the symbol corresponding to the ordered test sequences of characters; and
means of verification whether the test sequence of symbols of a predetermined sequence of characters.
SUBSTANCE: in accordance to the method, cryptographic module is provided with two types of data, which may be received even from a communication partner who is not cryptographically reliable, and which either remain in cryptographic module, or are connected to the document. The information, which remains in cryptographic module, is used to protect the information in the document by generation of a check value, and information which is transferred to document, is used to confirm the fact that the document is protected by a cryptographic module, during the check of document authenticity in a control device.
EFFECT: the contact between cryptographically reliable contact device and document creator is realized directly.
2 cl, 3 dwg
FIELD: infrastructure of public keys (PKI), namely, registration and activation of PKI functions in infrastructures of public keys in SIM-cards.
SUBSTANCE: in accordance to the method, reference code and corresponding activation code are recorded in a table at protection server integrated in PKI or connected to PKI. The user inputs reference code or number in record form together with his personal data, after that the form is sent to PKI and to protection server. After registration is confirmed from the side of PKI, the confirmation information is transmitted to user and supplemented with a request to input activation code at user terminal. Simultaneously, the activation code associated with reference code in the table and identification data of smart-card of user are transmitted to activation module in PKI, then activation code together with identification data of smart-card is transmitted from terminal to activation module and on receipt thereof the activation module determines whether the data coincides with activation code and identification data, provided in advance by protection server, and in case they do, the module performs command of activation of PKI-component of smart-card.
EFFECT: reduced processing time.
FIELD: methods and system for processing visualized digital information.
SUBSTANCE: the system for protecting visualized digital data contains a set of computing devices, where at least one of them is the main device, and at least another one is a remote computing device, where each one of aforementioned devices contains one or more processing components, configured for usage in data processing chain, consisting of components for processing protected information, subject to visualization for user, individual processing components which support one or more of such interfaces, such as authentication interface and intermediary authentication interface, where the intermediary authentication interface ensures reading of authentication identifiers and recording of authentication identifiers, and authentication identifier uses for each one of one or more lists for checking each component in each one of aforementioned one or more lists, to determine authorized components, where an authorized component may receive non-encrypted data. Methods describe operation of the system.
EFFECT: protection from unsanctioned access or duplication of unprotected information immediately after that information reaches visualization device, such as a user computer.
20 cl, 8 dwg
FIELD: online transactions.
SUBSTANCE: method for conducting an online transaction includes providing a transaction manager. Single use transaction request identification is generated, transaction manager compares transaction request identification to banking information of registered user. Registered user is provided with transaction request identification, registered user requests purchase of product or service from a merchant, where purchase requests includes providing transaction request identification to the merchant. The merchant dispatches a request to transaction manager for payment by money transfer from user to merchant, where payment request includes identification of transaction request and cost; check by transaction manager of trustworthiness of transaction request identification; and, if transaction request information is trustworthy, request for electronic transfer of money is dispatched to financial institution to transfer a sum of money from user account to another account; it is checked, whether sufficient sum of money is available on banking account of user, and, if sufficient amount is available, the financial institution conducts the transfer according to banking information; and transaction manager receives confirmation about transaction from financial institution and dispatches a confirmation to the merchant.
EFFECT: increased efficiency.
5 cl, 16 dwg
FIELD: protocols for interaction of peer entities of network structure and, in particular, concerns protective infrastructures for protocols of interaction of peer entities.
SUBSTANCE: methods are provided, which suppress capability of malicious node to disrupt normal operation of peer-to-peer network. Claimed methods allow nodes to use both protected and unprotected data about identity, ensuring self-check thereof. Then necessary or comfortable, association of ID is checked by "enclosing" a trustworthiness checking procedure into appropriate messages. Probability of connection to malicious node is initially reduced due to random selection of node with which connection is established. Also, information from malicious nodes is identified and may be discarded by recording information about previous connections, which will require a response in the future.
EFFECT: creation of protection infrastructure for a system with peer-to-peer network structure.
4 cl, 6 dwg
FIELD: communications engineering, possible use for checking protection of message (Msg), which is transmitted and received in electronic form.
SUBSTANCE: in accordance to the invention method contains stages at transmitting side, at which unambiguous message identifier is associated with message (IDMsg) and control identifier (IDCONTR) of identification code of message owner, which is received by applying encoding (12), connected to owner of transmitted message, to unambiguous message identifier (IDMsg). At receiving side method contains stages, at which fact of presence or absence of already received message with the same associated unambiguous message identifier (IDMsg) is checked and transmitted by means of signal, and match is determined between unambiguous message identifier (IDMsg), associated with received message, and result (IDDCONTR) of decoding of user name of control (IDCONTR).
EFFECT: ensured control of protection of message which is transmitted and received in electronic form.
3 cl, 3 dwg
FIELD: computer networks.
SUBSTANCE: in accordance to the invention, in home computer network, formed with presence of controlling devices and control station, device for notifying control station about operation state of digital rights management relatively to control device includes: DRM module, which executes digital rights management; module for generating status variables, which receives information about operation condition of DRM from DRM module, which indicates condition of current active DRM process, and on basis of received DRM status information generates DRM status variables; and module for universal detection and auto-adjustment of devices (uPnP), which, using uPnP protocol, transmits generated status variables to control station.
EFFECT: recognition of operation state of digital rights management (DRM) process in DRM system, which uses universal protocol (uPnP) for recognition and auto-adjustment of devices.
2 cl, 7 dwg
FIELD: engineering of systems for protecting communication channels, which realize claimed method for user authentication on basis of biometric data by means of provision and extraction of cryptographic key and user authentication.
SUBSTANCE: in accordance to the invention, neither biometric template nor cryptographic user key are explicitly represented in information storage device, without provision of biometric sample and information storage device with a pack stored on it, any cryptographic operations with data are impossible.
EFFECT: creation of biometric access system and method for provision/extraction of cryptographic key and user authentication on basis of biometry, increased key secrecy level, increased reliability, expanded functional capabilities and simplified system creation process.
2 cl, 2 dwg
FIELD: information processing devices.
SUBSTANCE: communication system contains data transfer device, consisting of command transmission block, control block, block for generation of expected value, authentication block, block for measuring response time, block for determining data transfer permission, and data receipt device consisting of command receipt block, block for generating authentication data, block for generating response message, block for transferring response message into data transfer device. Also disclosed are data transfer devices, data receiving devices, data transfer methods, data receipt methods.
EFFECT: increased precision of time measurement, required for transfer of data to communication partner.
14 cl, 16 dwg
FIELD: computing systems, possible use for protecting informational resources in corporate networks.
SUBSTANCE: in accordance to the invention, during registration of user, user identifier and user image identifier signals are assigned and memorized, user inputs identifier and creates corporate network access and service request signal, which is transferred into system core, user image identifier signals are read from memory, authentication of user and his image is performed, and, if user access rank signal is equal to or exceeds acceptable rank, signal is generated to permit execution of actions, description of which is contained in service request signal, where during registration of user, number of mobile device and/or identifier of other source of wireless communications given by user is additionally inputted into memory, prior to taking a decision about access to corporate network by user, a password which is active for one session is generated and sent to the source given by user.
EFFECT: increased protection of systems from unsanctioned access.
3 cl, 1 dwg
FIELD: information protection.
SUBSTANCE: method for transferring messages while providing for confidentiality of identification signs of communication system objects with interaction of devices of communication system subscribers through central device for each communication session cryptographic conversion of subscriber device identifier is performed using encryption key of current subscriber device, while during said cryptographic conversion symmetrical cryptographic algorithm is used and two message transfer modes are taken in consideration, on initiative from subscriber device to central device and vice versa.
EFFECT: protection from unsanctioned access to identifiers of devices of system subscribers transferred via communication channels, in particular when providing for confidentiality of messages identification signs in communications systems with multiple subscriber devices.
FIELD: computer science.
SUBSTANCE: previously for sender and receiver a binary series of digital watermark k-bit long is formed as well as binary series of secret key, message is certified at sender side using binary series of digital watermark and secret key, certified message is sent to receiver, where authenticity of received message is checked using binary series of digital watermark and secret key.
EFFECT: higher reliability, higher efficiency.
4 cl, 5 dwg
FIELD: mobile communications.
SUBSTANCE: server generates one-time activation code, sends it to user via intellectual card in cell phone and when user inputs an activation code in his cell phone, inputted code is transmitted to server for verification, in case of positive result server sends a command to phone to provide for access, which opens access to appropriate set of functions of intellectual card, while portion of functions can contain, for example, PKI-functions, which were concealed and inaccessible for user until said moment, after that user can select his own PIN-code for authentication, encoding and signature for transactions, and, concerning activation of PKI functions, generation of necessary secret and open keys, and also necessary certification are carried out after verification of activation code.
EFFECT: higher efficiency, broader functional capabilities.
1 cl, 1 dwg
FIELD: computer science.
SUBSTANCE: system has center of certification, forming and distribution of keys, at least one user device and at least one distributed data processing server. Method describes operation of said system. Subsystem for forming open keys contains memory block for tables of secret substitutions of columns and rows of secret keys tables, memory block for table of symmetric substitution of columns and rows of external key table, register for sequence of transitive connection between rows of secret substitutions tables, block for logical output on sequence of transitive dependence, memory block for table of relative non-secret substitution of columns and rows of external key table, open key register, input commutation block and control block.
EFFECT: higher efficiency, broader functional capabilities.
5 cl, 15 dwg
FIELD: mobile communications.
SUBSTANCE: protection means has key module and blocking module. Mobile communication system has protection means and communication port. Method describes operation of said protection means and mobile device.
EFFECT: broader functional capabilities.
3 cl, 5 dwg
FIELD: electrical communications.
SUBSTANCE: proposed method that can be used in attack detection systems for on-line detection and blocking of unauthorized attacks in computer systems including Internet involves presetting of list of authorized connections as aggregate of reference connection identifiers, introduction of factor of urgency of reference authorized-connection identifiers and list of names of authorized processes, generation of list of unauthorized connections received in the course of checkup due to introduction of maximal admissible quantity of any of probable unauthorized connections, and their counting.
EFFECT: enhanced reliability of identifying unauthorized attacks in computer networks.
1 cl, 8 dwg
FIELD: systems and method for controlling transfer of keys for decoding or access to encoded information.
SUBSTANCE: each one of variants of information protection systems for controlling access to protected information has hardware means for storing at least one data element, including decoding key and appropriate information protection code, while information protection code sets number of operations of passage of decoding key, and first user, connected to encoded information, can determine through information protection code, whether second user can transfer code for information protection to third user, while number of generation of data is requested each time after receipt of query for transferring decoding key to another user and is decreased for one unit for each request, and as soon as it reaches zero, system denies all further requests.
EFFECT: improved level of information protection.
3 cl, 6 dwg
FIELD: engineering of object access means.
SUBSTANCE: device has saved standard, containing fingerprint of authorized user, combined with verification code. In case of match between fingerprint of authorized user with one stored in memory, verification code if generated. Device activated by key periodically transmits an identifier, on receipt by access device of identifier, matching one of identifiers stored in memory, appropriate access key is extracted and sent to device activated by key to allow access to user.
EFFECT: high level of protection from unauthorized access.
3 cl, 2 dwg
FIELD: radio engineering, in particular, authentication method for stationary regional wireless broadband access systems, possible use, for example, for protecting transferred data in stationary regional broadband access systems.
SUBSTANCE: in accordance to method, two main procedures are performed - authentication of client station and, also, authentication of base station.
EFFECT: increased protection level of transmitted data in stationary wireless broadband access systems.
4 cl, 6 dwg
FIELD: technology for checking authentication and authorization.
SUBSTANCE: method for checking rights of user of end telecommunication device for using a service, while device for accessing telecommunication network receives at least one certificate and identification data from telecommunication end device, after that network control device together with certification device checks, whether certificate, confirming identification data, is valid and whether it has positive status, whether additional privileges are given by additional certificates, and if that is so, then secret data is transferred to access device (session key), which are also transferred to telecommunication end device in form, encrypted by at least an open key, and access device provides free access by taking a decision, appropriate for rights of user of telecommunication network.
EFFECT: simple and efficient authentication and authorization of users for certain services or transactions, performed via telecommunication network.
11 cl, 1 dwg