FIELD: computer engineering; preventing illegal access to data resources. SUBSTANCE: method involves shaping of user's additional identification code and recording of its location on guarded area. Device has servers, information processing facilities, and personal identification code reading facilities mounted at passageways to guarded area. EFFECT: enhanced reliability. 4 cl, 1 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PROTECTION OF PERSONAL COMPUTER AGAINST UNAUTHORIZED ACCESS AND DEVICE WHICH IMPLEMENTS SAID METHOD | 1997 |
|
RU2126168C1 |
COMPUTER SYSTEM WITH REMOTE MANAGEMENT OF SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT | 2017 |
|
RU2690782C2 |
METHOD AND SYSTEM OF CYBER TRAINING | 2022 |
|
RU2808388C1 |
SYSTEM FOR PROTECTING INFORMATION CONTAINING STATE SECRETS FROM UNAUTHORISED ACCESS | 2012 |
|
RU2504835C1 |
DEVICE PROTECTING AGAINST UNAUTHORISED ACCESS TO INFORMATION | 2007 |
|
RU2334272C1 |
DEVICE FOR PROTECTING INFORMATION FROM UNSANCTIONED ACCESS FOR COMPUTERS OF INFORMATIONAL AND COMPUTING SYSTEMS | 2006 |
|
RU2321055C2 |
DEVICE FOR PROTECTION AGAINST UNAUTHORIZED ACCESS TO INFORMATION THAT IS STORED IN PERSONAL COMPUTER | 1995 |
|
RU2067313C1 |
SYSTEM OF MONITORING OF SPECIAL PURPOSE COMPUTERS SAFETY | 2016 |
|
RU2628458C1 |
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL | 2016 |
|
RU2633098C1 |
SYSTEM FOR PROTECTING INFORMATION CONTAINING STATE SECRETS FROM UNAUTHORISED ACCESS | 2012 |
|
RU2504834C1 |
Authors
Dates
2002-03-10—Published
2001-02-05—Filed