FIELD: information technology.
SUBSTANCE: authentication mechanism uses a storage for authorised persons which can be individually filled by users of computer devices and can contain certificates of objects which a user wishes to allow to act as certification authorities. Consequently, a peer-to-peer connection can be made even if not a single device presents a certificate or a chain of trust signed by the certification authority of a third party provided that, each device presents a certificate or a chain of trust signed by a device present in the storage of authorised persons. If authenticated, a remote user can access confidential resources on the host device by borrowing user rights through local processes and creating the corresponding marker by changing the password or type of user password by hash-value of the user certificate and then registering the user. The marker can be referenced using a standard way for determining whether a remove use is authorised to access the confidential resource.
EFFECT: easier authentication of computer devices.
20 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES | 2007 |
|
RU2439692C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
METHOD TO CONTROL ACCESS TO SECURED NETWORK BASED ON THREE-ELEMENT AUTHENTICATION OF PEER-TO-PEER OBJECTS | 2008 |
|
RU2444156C1 |
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN | 2016 |
|
RU2673842C1 |
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION | 2008 |
|
RU2390838C2 |
METHOD OF CONTROLLING IDENTIFICATION OF USERS OF INFORMATION RESOURCES OF HETEROGENEOUS COMPUTER NETWORK | 2009 |
|
RU2415466C1 |
PROVIDING COMMUNICATION SECURITY WITH EXTENDED MULTIMEDIA PLATFORMS | 2015 |
|
RU2685975C2 |
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION | 2003 |
|
RU2337399C2 |
SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES | 2015 |
|
RU2675055C2 |
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE | 2014 |
|
RU2675902C2 |
Authors
Dates
2010-05-27—Published
2005-08-01—Filed