FIELD: information technology.
SUBSTANCE: result is achieved due to preliminary check of a dynamic variable depending on accurate time and repeatability of identifiers of a client and a session without any preliminary use of convolution (hashing) functions to them with the suppression of incorrect requests for authentication in case of an error occurrence. After that, the convolution function is used, which provides, in case of no errors, authenticity of earlier checked authentication data, as well as a check of authenticity of an access subject based on identification data of a user. Reduction of computational complexity of a checking algorithm of an authentication sequence is determined by the fact that at reception of multiple incorrect requests for authentication, these requests are suppressed before the convolution (hashing) function is used, and therefore, considerable reduction of load on a system (device) takes place, which implements a checking algorithm of the authentication sequence at reception of incorrect requests for authentication.
EFFECT: reduction of computational complexity of a checking algorithm of the authentication sequence at reception of multiple incorrect requests for authentication, which in its turn improves resistance to attacks like service denial at processing of multiple and, as a rule, incorrect requests for the access provision.
2 dwg, 1 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF AUTHENTICATION OF RADIO NETWORK CORRESPONDENTS | 2017 |
|
RU2653316C1 |
METHOD AND DEVICE OF HOST UNIT IDENTIFICATION PROTOCOL | 2005 |
|
RU2390959C2 |
AUTHENTICATION IN PROTECTED COMPUTERIZED GAME SYSTEM | 2003 |
|
RU2302276C2 |
METHOD AND SYSTEM FOR PROTECTING INFORMATION FROM UNAUTHORISED USE (VERSIONS THEREOF) | 2013 |
|
RU2560810C2 |
METHODS AND DEVICE FOR LARGE-SCALE PROPAGATION OF ELECTRONIC ACCESS CLIENTS | 2013 |
|
RU2595904C2 |
KEY GENERATION IN COMMUNICATION SYSTEM | 2003 |
|
RU2333607C2 |
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
METHOD FOR REMOTE CHANGING OF COMMUNICATION PASSWORD | 2003 |
|
RU2307391C2 |
SECURE ACCESS TO PERSONAL HEALTH RECORDS IN EMERGENCY SITUATIONS | 2012 |
|
RU2602790C2 |
COMPUTER-IMPLEMENTED METHOD OF PROVIDING SECURE GROUP COMMUNICATIONS WITH FAILURE PROPERTIES, PERFECT DIRECT PRIVACY AND CORRESPONDENCE OF TEXT OF CORRESPONDENCE | 2018 |
|
RU2693192C1 |
Authors
Dates
2014-10-10—Published
2013-03-26—Filed