METHOD AND SYSTEM FOR PROTECTING INFORMATION FROM UNAUTHORISED USE (VERSIONS THEREOF) Russian patent published in 2015 - IPC G06F21/31 H04L9/32 

Abstract RU 2560810 C2

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to protection of information from unauthorised use. A method of creating a safe environment for protecting information from unauthorised use includes encrypting information using a cryptographic processor and a private cryptographic key stored in a user device; generating and sending a data packet containing a one-time user authentication code to the server of the service person; decrypting the data packet at the server of the service person and verifying at the server the one-time user authentication code and a verification code; in case of a positive verification result, the server sends to the user the data packet and the one-time user authentication code obtained when decrypting data packet of the user; the user device then generates a new data packet characterised by a new one-time user authentication code, the data packet consisting of an encrypted part and an unencrypted part, the unencrypted part containing a verification code configured to verify integrity of the entire data packet and a user identifier.

EFFECT: high level of security during user authentication.

17 cl, 2 dwg

Similar patents RU2560810C2

Title Year Author Number
BIOMETRIC COMPARISON FOR PRIVACY PROTECTION USING SERVER 2018
  • Sheets, John F.
  • Wagner, Kim R.
  • Arora, Sunpreet Singh
  • Best-Rowden, Lacey
  • Jiang, Chunxi
RU2776258C2
MUTUAL AUTHENTICATION OF PROGRAM LEVELS 2016
  • Mansour, Rasta
  • Bhattacharya, Soumendra
  • Youdale, Robert
RU2715032C2
PAYMENT PRIVACY TOKENISATION APPARATUS, METHODS AND SYSTEMS 2012
  • Oborn Timoti Viljam
RU2602394C2
METHOD AND USER AUTHENTICATION SYSTEM THROUGH MOBILE DEVICE WITH USAGE OF CERTIFICATES 2013
  • Vantsak Gergej
RU2638741C2
METHOD, SYSTEM AND COMPUTER DEVICE FOR PROVIDING COMMUNICATION SERVICES BETWEEN RESOURCES IN COMMUNICATION NETWORKS AND INTERNET TO PERFORM TRANSACTIONS 2002
  • Serebrennikov Oleg Aleksandrovich
RU2273107C2
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS 2015
  • Le Saint, Eric
  • Gordon, James
  • Joshi, Roopesh
RU2710897C2
REMOTE PAYMENT TRANSACTIONS PROTECTED PROCESSING, INCLUDING AUTHENTICATION OF CONSUMERS 2014
  • Makhotin Oleg
  • Pirzadekh Kiushan
RU2663476C2
TRUSTED INTEGRITY MANAGER (TIM) 2010
  • Tavo Sebast'En
  • Nakhari Khadi
  • Djupra Ehrik
RU2523304C2
METHODS AND DEVICE FOR LARGE-SCALE PROPAGATION OF ELECTRONIC ACCESS CLIENTS 2013
  • Khaggerti Devid
  • Khok Dzherrold
  • Dzuang Ben
  • Li Li
  • Matias Arun
  • Maklaflin Kevin
  • Narasimkhan Avinash
  • Sharp Kris
  • Vaid Yusuf
  • Yan Syanin
RU2595904C2
TRUSTED REMOTE ATTESTATION AGENT (TRAA) 2010
  • Nakhari Khadi
RU2537795C2

RU 2 560 810 C2

Authors

Rabinovich Il'Ja Samuilovich

Dates

2015-08-20Published

2013-11-01Filed