FIELD: information technology.
SUBSTANCE: method contains the following steps: create the pair of cryptographic encryption keys: public and private encryption keys; decide if the grid system units are legitimate and perform the exchange of encryption keys; then encrypt the data, contained in the user task with the public encryption key and distribute the user task over the legitimate units of the grid system; then the legitimate units of the grid system decrypt the received data and perform the user task.
EFFECT: increase the security of the grid system and reduce the time required to maintain the reliable grid systems operation by reducing the equipment downtime, caused by its failure due to computer attacks to the grid system resources.
2 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR PREDICTING SAFETY IN ACHIEVABLE STATES OF GRID SYSTEMS | 2016 |
|
RU2638005C1 |
METHOD OF AUTHENTICATION OF USER ACCOUNTS IN GRID SYSTEMS AND SYSTEM FOR ITS IMPLEMENTATION | 2013 |
|
RU2536678C1 |
METHOD OF THE DATA ACCESS CONTROL WITH THE USERS ACCOUNTS PROTECTION | 2017 |
|
RU2658894C1 |
PROVIDER OF ACCESS TO BASE NETWORK | 2018 |
|
RU2765567C2 |
DELEGATED MANAGEMENT OF DISTRIBUTED RESOURCES | 2004 |
|
RU2360368C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
PEER-TO-PEER AUTHENTICATION AND AUTHORISATION | 2005 |
|
RU2390945C2 |
METHOD FOR ENSURING SECURE MOBILE FINANCIAL TRANSACTIONS IN MOBILE COMMUNICATION NETWORKS (VERSIONS) AND ARCHITECTURE FOR REALISING SAID METHOD | 2010 |
|
RU2446467C1 |
MULTIFUNCTIONAL IDENTIFICATION OF A VIRTUAL COMPUTING NODE | 2015 |
|
RU2679188C2 |
SYSTEM AND METHOD FOR THROUGH ADMINISTRATION OF KEYS | 2017 |
|
RU2711508C1 |
Authors
Dates
2017-10-24—Published
2016-03-28—Filed