FIELD: information technology.
SUBSTANCE: method of applying rules for controlling devices and applications using multi-factor authentication is used, wherein: one or more users are authenticated on a computer when the computer is connected to one or more tokens; wireless connection/disconnection of one or more transponders to one or more tokens after successful user authentication is monitored; rules for controlling devices and applications are applied for a user that has gone through the authentication procedure on the computer, based on information on finding one or more transponders in the receiving area of said one or more tokens.
EFFECT: high protection of information from unauthorised access by applying rules for controlling devices and applications.
18 cl, 7 dwg, 2 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD AND SYSTEM FOR REMOTE CONTROL OF REMOTE ELECTRONIC DEVICES | 2021 |
|
RU2766542C1 |
SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES THROUGH FIREWALL | 2016 |
|
RU2714367C1 |
SYSTEM AND METHOD FOR COUNTING VOTES IN ELECTRONIC VOTING SYSTEM | 2020 |
|
RU2760440C2 |
SYSTEM AND METHODS OF PROVIDING ENCRYPTED DATA OF REMOTE SERVER | 2015 |
|
RU2698762C2 |
SYSTEM AND METHOD FOR ROBUST VALIDATION OF TRANSACTIONS | 2011 |
|
RU2580086C2 |
PERSONAL DEVICE FOR AUTHENTICATION AND DATA PROTECTION | 2016 |
|
RU2633186C1 |
REMOTE ACCESSING PROTECTED FILES THROUGH DATA STREAMING | 2006 |
|
RU2419850C2 |
METHOD FOR CREATING PROTECTED VIRTUAL NETWORKS | 2004 |
|
RU2276466C1 |
MULTI-TUNNEL ADAPTER OF VIRTUAL COMPUTER NETWORK | 2015 |
|
RU2675147C1 |
SYSTEMS AND METHODS FOR PROTECTING NETWORK DEVICES | 2015 |
|
RU2675055C2 |
Authors
Dates
2013-10-10—Published
2012-09-28—Filed