METHOD FOR PROTECTED REMOTE ACCESS TO INFORMATION RESOURCES Russian patent published in 2014 - IPC H04L9/32 

Abstract RU 2530691 C1

FIELD: information technology.

SUBSTANCE: result is achieved due to preliminary check of a dynamic variable depending on accurate time and repeatability of identifiers of a client and a session without any preliminary use of convolution (hashing) functions to them with the suppression of incorrect requests for authentication in case of an error occurrence. After that, the convolution function is used, which provides, in case of no errors, authenticity of earlier checked authentication data, as well as a check of authenticity of an access subject based on identification data of a user. Reduction of computational complexity of a checking algorithm of an authentication sequence is determined by the fact that at reception of multiple incorrect requests for authentication, these requests are suppressed before the convolution (hashing) function is used, and therefore, considerable reduction of load on a system (device) takes place, which implements a checking algorithm of the authentication sequence at reception of incorrect requests for authentication.

EFFECT: reduction of computational complexity of a checking algorithm of the authentication sequence at reception of multiple incorrect requests for authentication, which in its turn improves resistance to attacks like service denial at processing of multiple and, as a rule, incorrect requests for the access provision.

2 dwg, 1 tbl

Similar patents RU2530691C1

Title Year Author Number
METHOD OF AUTHENTICATION OF RADIO NETWORK CORRESPONDENTS 2017
  • Alasheev Aleksandr Viktorovich
  • Alasheev Vadim Viktorovich
  • Begaev Aleksej Nikolaevich
  • Eryshov Vadim Georgievich
  • Starodubtsev Yurij Ivanovich
  • Vershennik Elena Valerevna
  • Bezuglyj Yurij Andreevich
  • Latushko Nikolaj Aleksandrovich
RU2653316C1
METHOD AND DEVICE OF HOST UNIT IDENTIFICATION PROTOCOL 2005
  • Nikander Pekka
RU2390959C2
AUTHENTICATION IN PROTECTED COMPUTERIZED GAME SYSTEM 2003
  • Dzhekson Mark D.
RU2302276C2
METHOD AND SYSTEM FOR PROTECTING INFORMATION FROM UNAUTHORISED USE (VERSIONS THEREOF) 2013
  • Rabinovich Il'Ja Samuilovich
RU2560810C2
METHODS AND DEVICE FOR LARGE-SCALE PROPAGATION OF ELECTRONIC ACCESS CLIENTS 2013
  • Khaggerti Devid
  • Khok Dzherrold
  • Dzuang Ben
  • Li Li
  • Matias Arun
  • Maklaflin Kevin
  • Narasimkhan Avinash
  • Sharp Kris
  • Vaid Yusuf
  • Yan Syanin
RU2595904C2
KEY GENERATION IN COMMUNICATION SYSTEM 2003
  • Khsu Rehjmond T.
RU2333607C2
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS 2015
  • Le Saint, Eric
  • Gordon, James
  • Joshi, Roopesh
RU2710897C2
METHOD FOR REMOTE CHANGING OF COMMUNICATION PASSWORD 2003
  • Ajjagari Arun
  • Ganugapati Krishna
  • Sajmon Dehniel R.
  • Mur Timoti M.
  • Bakhl Pradip
RU2307391C2
SECURE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCY SITUATIONS 2012
  • Keokh Sie Loong
  • Asim Mukhammad
  • Kumar Sandip Shankaran
  • Lenuar Petrus Jokhannes
RU2602790C2
COMPUTER-IMPLEMENTED METHOD OF PROVIDING SECURE GROUP COMMUNICATIONS WITH FAILURE PROPERTIES, PERFECT DIRECT PRIVACY AND CORRESPONDENCE OF TEXT OF CORRESPONDENCE 2018
  • Shejdaev Vadim Fizulievich
  • Gamayunov Denis Yurevich
RU2693192C1

RU 2 530 691 C1

Authors

Tsibulja Aleksej Nikolaevich

Shugurov Dmitrij Evgen'Evich

Markin Dmitrij Olegovich

Gromej Dmitrij Dmitrievich

Dates

2014-10-10Published

2013-03-26Filed