FIELD: information technology.
SUBSTANCE: method is realised by authenticating software by entering a unique reference identifier based on values of the characteristics of the software, and increasing accuracy of controlling operation of the software by determining software subsystems disrupting its operation and providing the required time expenses on performing automated system functions by cutting time expenses on executing actions for providing fail-safe execution of the software.
EFFECT: high reliability and accuracy of controlling operation of software.
3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF CONTROLLING SOFTWARE OPERATION | 2006 |
|
RU2331101C1 |
METHOD OF MONITORING AND CONTROLLING ACCESS TO A SECURE FACILITY WITH FLEXIBLE USER AUTHENTICATION | 2023 |
|
RU2819194C1 |
INFORMATION PROTECTION SYSTEM FOR ELECTRIC TRAIN TRAFFIC CONTROL SYSTEM IN AUTOMATIC MODE | 2023 |
|
RU2806927C1 |
DIGITAL KEY CARRIER AUTHORIZATION METHOD AND SYSTEM | 2018 |
|
RU2709281C1 |
METHOD FOR PROVIDING INTEGRATED SECURITY OF FACILITIES, TERRITORIES AND POPULATION BASED ON THE SOFTWARE AND HARDWARE COMPLEXES AND MULTI-PURPOSE SOFTWARE AND HARDWARE COMPLEX FOR MANAGEMENT OF INTEGRATED SECURITY SYSTEM | 2020 |
|
RU2790795C2 |
METHOD AND SYSTEM FOR HIERARCHICAL CONTROL OF INTEGRITY OF ELECTRONIC DOCUMENTS | 2023 |
|
RU2805339C1 |
METHOD OF FUNCTIONING COMPUTER DEVICE OPERATING SYSTEM OF SOFTWARE AND HARDWARE COMPLEX | 2016 |
|
RU2626350C1 |
PROTECTED DATA LOADING AND STORAGE IN DATA PROCESSING DEVICE | 2005 |
|
RU2408071C2 |
DEVICE FOR PROTECTING INFORMATION FROM UNSANCTIONED ACCESS FOR COMPUTERS OF INFORMATIONAL AND COMPUTING SYSTEMS | 2006 |
|
RU2321055C2 |
PROVIDER OF ACCESS TO BASE NETWORK | 2018 |
|
RU2765567C2 |
Authors
Dates
2012-10-20—Published
2011-06-24—Filed