FIELD: information technology.
SUBSTANCE: medium contains nonvolatile memory (NVM) divided into several separate areas, in which information is located with different degrees of protection. Access to each of these areas of memory is regulated by the EM processor separately. The processor controlling access to the NVP controls access to each of the NVP areas by concurrently having a positive result of, at least, one authentication of each of the EM end user and the user computing device, to which the electronic medium is connected. And the EM contains a means for additional authentication of the user when accessing separate areas of the device memory and a cryptographic protection processor for cryptographic information, for controlling access to the functions of which the processor that manages access to the NVP is intended. The processor controlling access to the NVP is configured to obtain the results of additional user authentication from the additional identification means and to provide access only to a portion of the NVP, externally indistinguishably simulating the work with the entire EM memory, with a negative result of additional authentication indicating that the user is operating under an external coercion or control.
EFFECT: increasing the level of the access control security.
7 cl, 5 tbl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR SECURE EXTENSION OF FUNCTIONS OF INFORMATION SECURITY HARDWARE | 2014 |
|
RU2574347C2 |
INFORMATION PROTECTION SYSTEM FOR ELECTRIC TRAIN TRAFFIC CONTROL SYSTEM IN AUTOMATIC MODE | 2023 |
|
RU2806927C1 |
DEVICE FOR PROTECTING INFORMATION FROM UNSANCTIONED ACCESS FOR COMPUTERS OF INFORMATIONAL AND COMPUTING SYSTEMS | 2006 |
|
RU2321055C2 |
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS | 2013 |
|
RU2538329C1 |
SYSTEM OF PROTECTION OF INFORMATION FROM UNAUTHORIZED ACCESS | 2017 |
|
RU2648942C1 |
COMPUTING DEVICE FOR CROSS-BORDER ELECTRONIC DOCUMENT WORKFLOW (OPTIONS) AND THE METHOD FOR CROSS-BORDER ELECTRONIC DOCUMENT WORKFLOW | 2021 |
|
RU2759249C1 |
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS | 2014 |
|
RU2569577C1 |
METHOD AND SYSTEM FOR UNIDIRECTIONAL DATA TRANSMISSION BETWEEN COMPUTING DEVICES | 2023 |
|
RU2817533C1 |
SYSTEM, METHOD AND DEVICE FOR CONTINUOUS USER AUTHENTICATION AND PROTECTION OF AUTOMATED WORKSTATION RESOURCES FROM UNAUTHORIZED ACCESS | 2018 |
|
RU2691201C1 |
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL | 2016 |
|
RU2633098C1 |
Authors
Dates
2017-11-08—Published
2016-09-05—Filed