SYSTEM AND METHOD FOR PROVIDING PRIVACY OF INFORMATION USED DURING AUTHENTICATION AND AUTHORISATION OPERATIONS USING TRUSTED DEVICE Russian patent published in 2016 - IPC H04L9/32 G06F21/34 

Abstract RU 2583710 C2

FIELD: information security.

SUBSTANCE: invention relates to systems and methods of ensuring confidentiality of information used during authentication and authorisation, using trusted device. According to one version of implementation of method provide confidentiality of information transmitted for monitoring of operations using trusted device, which includes steps of: identifying user service; selected trusted device associated with identified user service; transmitting request of confidential information required for monitoring operation on associated with user service trusted device; obtaining confidential information required for control, user service in trusted device; control procedure is performed using obtained confidential information.

EFFECT: high protection of confidentiality of information sent for purpose of monitoring of operations.

20 cl, 3 dwg

Similar patents RU2583710C2

Title Year Author Number
SYSTEM AND METHOD FOR PROTECTION FROM LEAKAGE OF CONFIDENTIAL DATA IN WIRELESS NETWORKS 2014
  • Fedko Oleg Aleksandrovich
  • Klimenchuk Aleksej Vitalevich
RU2602956C2
USING PROTECTED DEVICE FOR PROVISION OF SECURE DATA TRANSFER IN INSECURE NETWORKS 2012
  • Dukhvalov Andrej Petrovich
  • Djakin Pavel Vladimirovich
  • Golovanov Sergej Jur'Evich
  • Sumenkov Igor' Igorevich
  • Kulagin Dmitrij Aleksandrovich
  • Vojtovich Aleksej Jur'Evich
  • Kasperskij Evgenij Valentinovich
RU2494448C1
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
METHOD FOR USING A MODEL OF THE IoT APPARATUS TO DETECT ANOMALIES IN THE OPERATION OF THE APPARATUS 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2772072C1
REMOTE PAYMENT TRANSACTIONS PROTECTED PROCESSING, INCLUDING AUTHENTICATION OF CONSUMERS 2014
  • Makhotin Oleg
  • Pirzadekh Kiushan
RU2663476C2
STABLE AUTHORISATION CONTEXT BASED ON EXTERNAL IDENTIFICATION 2008
  • Mauehrs Dehvid R.
  • Dubrovkin Dehniehl
  • Lejbehn Roj
  • Shmidt Donal'D I.
  • Visvanatan Rehm
  • Brezak Dzhon I.
  • Uord Richard B.
RU2390838C2
METHOD FOR CONTROLLING AN IoT APPARATUS FROM THE SIDE OF AN ELEMENT OF THE NETWORK INFRASTRUCTURE 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2769632C1
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2760625C1
METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS 2001
  • Mur Timoti M.
  • Ajjagari Arun
  • Shetkh Sachin K.
  • Bakhl Pradip
RU2297037C2
METHOD FOR CREATING AND APPLYING AN APPLICATION INTERACTION RULE ON AN IOT DEVICE 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2757651C1

RU 2 583 710 C2

Authors

Borovikov Nikolaj Vasilevich

Dates

2016-05-10Published

2013-07-23Filed