FIELD: radio engineering, communication.
SUBSTANCE: method comprises the steps of: transmitting, with the secure access device, the first authentication data and the first control adjustment to the legitimate application program, upon access of the operating system to the protected area of the storage device for downloading the legitimate application file and executing the file of the legitimate application program In the operating system for use as a legitimate application program. A legitimate application program is executed in the operating system serving as an application program to be authenticated; determining whether the application program to be authenticated and executed in the operating system contains the first authentication data and the first control adjustment; and when the result of the determination is negative, the application program to be authenticated as an unauthenticated, illegitimate application program is identified, and the said unauthorized application program is denied access to the device.
EFFECT: improved security of data transmission.
16 cl, 3 dwg
Authors
Dates
2017-09-19—Published
2015-01-20—Filed