FIELD: information technology.
SUBSTANCE: according to the authentication method, the code is periodically changed by changing the shape of the authenticator. The method is realised by an authenticator having secret elements (3) with coded symbols (6), and locking elements (5) designed to secure a secret element (3) once it has been rotated to a certain angle. The secret elements (3) are in the form of polyhedrons. The reader, which along with the authenticator is designed to carry out the present method, has a body which has two parts (12, 13) or (20, 21) and a shaft (16 or 23) in the form of a polyhedron for the passage of the authenticator, and also channels (14) for the passage of an optical or electromagnetic signal. The reader has scanning pairs made up of components (18) and (19) arranged on the body.
EFFECT: group of inventions increases the capacity of the coded information and enhance the usability of the authenticator, and can be used in any object, access to which requires input of coded information.
26 cl, 25 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD AND APPARATUS FOR CHECKING AUTHENTICITY OR RIGHTS USING ONE-TIME TRANSACTION CODES | 2006 |
|
RU2414001C2 |
APPARATUS AND METHOD FOR IDENTIFICATION AND AUTHENTICATION | 2007 |
|
RU2469391C2 |
AUTHENTICATION INTERFACE | 2005 |
|
RU2408144C2 |
AUTHENTICATION IN COMMUNICATIONS | 2003 |
|
RU2326429C2 |
INFORMATION REGISTRATION AND AUTHENTICATION METHOD AND DEVICE | 2016 |
|
RU2682430C1 |
METHOD OF CREATING AND CHECKING ELECTRONIC IMAGE AUTHENTICATED BY DIGITAL WATERMARK | 2010 |
|
RU2450354C1 |
AUTHENTICATION METHOD AND SYSTEM | 2013 |
|
RU2759365C1 |
ACOUSTIC AUTHENTICATION FOR RECORDING IN WIRELESS NETWORK | 2011 |
|
RU2557471C2 |
METHODS AND APPARATUS FOR AUTHENTICATION AND IDENTIFICATION USING PUBLIC KEY INFRASTRUCTURE IN IP TELEPHONY ENVIRONMENT | 2009 |
|
RU2506703C2 |
AUTHENTICATION AT IDENTIFICATION INFORMATION PROVIDER | 2010 |
|
RU2509446C2 |
Authors
Dates
2013-11-20—Published
2010-06-25—Filed