FIELD: information technology.
SUBSTANCE: in response to obtaining an access request, an application program control module is established to generate a key confirmation request. Further, in response to obtaining a key confirmation request, a hardware control module is established for generating a key entry request through the application program control module, which prompts the user to quickly enter the key. Upon obtaining the entered key, the hardware control module is established to determine conformity of the entered key to a predetermined key, which is predefined in the hardware control module. If it is determined that the entered key conforms to the predetermined key, the hardware control module is established for entry into execution mode. Otherwise, the hardware control module is established for entry into failure mode. Entry of the key is interrupted by the input device connected to the hardware control module.
EFFECT: protection of entered and pre-entered keys from computer operating system access.
16 cl, 2 dwg
Authors
Dates
2011-12-27—Published
2009-11-03—Filed