FIELD: information technology.
SUBSTANCE: method of breaking the keyboard password to a computer inside a room with limited access involves using listening devices from the outside to pick up sounds arising when entering the password on the keyboard during user verification, and decrypting said sounds using a sound-character alphabet, where the software of the computer is deliberately crashed and the password is intercepted when rebooting the software during user verification.
EFFECT: fast password breaking by cutting the time for waiting for password entering.
2 dwg
Title | Year | Author | Number |
---|---|---|---|
USER VERIFICATION METHOD IN AUTHORISED ACCESS SYSTEMS | 2007 |
|
RU2351023C2 |
SYSTEM AND METHOD FOR REMOTE USER SERVICE | 2014 |
|
RU2601425C2 |
SOFTWARE-HARDWARE COMPLEX FOR KEYBOARD TYPING TRAINING | 2008 |
|
RU2401462C2 |
METHOD OF PERMANENT AUTHENTICATION OF IDENTITY AND COMPUTER USER STATE BASED ON BEHAVIOUR PATTERNS | 2015 |
|
RU2619196C2 |
METHOD FOR CONCEALED SUPPRESSION OF EAVESDROPPING DEVICE, CONTAINING LOGICAL ELECTRONIC COMPONENTS | 2005 |
|
RU2292652C1 |
METHOD AND SYSTEM FOR USER IDENTIFICATION BY KEYBOARD TYPING PATTERN | 2019 |
|
RU2801673C2 |
METHOD AND SYSTEM FOR INFORMATION INPUT | 2005 |
|
RU2338238C2 |
SYSTEM OF ACCESS CONTROL AND MANAGEMENT BASED ON BIOMETRIC TECHNOLOGIES FOR AUTHENTICATING PERSON BY VOICE AND BY FACE | 2013 |
|
RU2638775C2 |
METHOD OF REFERENCE VALUES GENERATION OF PC USER CHARACTERISTICS | 2005 |
|
RU2333532C2 |
METHOD AND SYSTEM FOR DETERMINING USER STATUS | 2017 |
|
RU2693640C2 |
Authors
Dates
2011-11-20—Published
2010-07-13—Filed