FIELD: computer engineering. SUBSTANCE: information protection is important for information exchange between users in computer network, including user identification and tracing. Goal of invention is achieved by encryption of user identifier and/or password and synchronization indicator, preferably using fixed time interval and secret one-way function. Then encrypted message, which is called dynamic user identifier, is transmitted to authorized body of home region, where the user is registered. Authorized body of home region has set of mapping tables, which are preliminary calculated for each time interval (or another chosen method for synchronization), between dynamic user identifiers and respective real personal data about users. This results in possibility of rapid detection whether given encrypted message is sent by registered user or not. On the other hand, a hacker cannot decode personal data about user from encrypted message and track movements of user. EFFECT: increased protection of mobile user, prevention of tracing of movements of user. 15 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM FOR TRANSMITTING DATA STREAM OVER DATA TRANSMISSION NETWORKS | 1995 |
|
RU2121761C1 |
METHOD FOR PRODUCTION AND SERVICING MULTIPLE VERSIONS OF DOCUMENTS IN DATA PROCESSING SYSTEM LIBRARY | 1992 |
|
RU2144207C1 |
METHOD AND DEVICE FOR CONNECTION OF WIRELESS LAN TO WIRED LAN | 1995 |
|
RU2121762C1 |
METHOD AND DEVICE FOR INITIALIZATION OF DATA PROCESSING SYSTEM | 1992 |
|
RU2155376C2 |
REMOTE VARIABLE AUTHENTICATION PROCESSING | 2011 |
|
RU2563163C2 |
COMMUNICATION SYSTEM | 1991 |
|
RU2117405C1 |
SERVO ADDRESS CODING SYSTEM AND METHOD | 1995 |
|
RU2139577C1 |
LOAD BALANCING USING SERVER COMPUTER PROCESSORS | 1996 |
|
RU2156546C2 |
METHOD AND DEVICE FOR GAINING ACCESS TO COMPUTER RESOURCES THROUGH FIRE WALL | 1997 |
|
RU2178583C2 |
TOKEN-BASED TRANSACTION AUTHENTICATION | 2011 |
|
RU2565368C2 |
Authors
Dates
2000-06-10—Published
1994-10-27—Filed