FIELD: information technologies.
SUBSTANCE: configuration data is sent from a peripheral device to a subscription computer. It is determined whether a source of configuration data is true. A coded packet is sent from a subscription computer to a remote ISP computer, if a source of configuration data is true, besides, this coded packet unambiguously identifies the subscription computer. Authenticity of the coded package is inspected at the remote computer. A control package is sent from a remote computer to a subscription computer. Authenticity of a control package is inspected at the subscription computer, and connection is maintained between ISP and the subscription computer, if a control package is authentic.
EFFECT: improved protection against possibility of a user to bypass its original subscription agreement with an ISP.
17 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
PREPAID ACCESS TO DATA PROCESSING USING PORTABLE DATA STORAGE DEVICES | 2008 |
|
RU2463658C2 |
MIGRATION OF DIGITAL LICENCE FROM FIRST PLATFORM TO SECOND PLATFORM | 2006 |
|
RU2406116C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
METHODS AND SYSTEMS FOR AUTHENTICATION OF COMPONENTS IN GRAPHIC SYSTEM | 2003 |
|
RU2310227C2 |
TELECOMMUNICATION CHIP-CARD | 2013 |
|
RU2628492C2 |
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF | 2014 |
|
RU2672712C2 |
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF | 2014 |
|
RU2673969C2 |
METHODS AND SYSTEMS FOR CRYPTOGRAPHIC PROTECTION OF PROTECTED CONTENT | 2002 |
|
RU2308077C2 |
METHOD OF PROVIDING FLIGHT CONTROL SYSTEM DATA TO PERIPHERAL DEVICES | 2016 |
|
RU2721715C2 |
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE | 2014 |
|
RU2675902C2 |
Authors
Dates
2012-11-10—Published
2008-04-03—Filed