FIELD: information technology.
SUBSTANCE: system for secure transfer of user authentication data to an Internet site contains the following means: a plug-in in the browser installed on the user's computer, wherein the plugin is intended to determine that the user has made a connection to the site, which requires protection of the received and transmitted authentication data (hereinafter - the protected site) by means of the said browser, and transmission of information that a connection has occurred to the protected site to the anti-virus application; an anti-virus application installed on the computer to check the operating system installed on the computer for the presence of vulnerabilities and malicious applications after reception of the information from the plug-in and transmission of information about the check performed, as well as information received from the plug-in to the device for secure data transmission, and application of secure data channel settings; a device for secure data transmission, designed to: select the settings for the secure data channel between the device for secure data transmission and the protected site based on the information about the check performed by the anti-virus application, authentication data transmission via the secure data channel between the device for secure data transmission and the protected site for authentication on this site, with the transmission being based on information that the user has connected to the protected site using the browser, at that the authentication data is stored on the device for secure data transmission and encrypted.
EFFECT: provision of secure transmission of user data to an Internet site.
8 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
REMOTE PAYMENT TRANSACTIONS PROTECTED PROCESSING, INCLUDING AUTHENTICATION OF CONSUMERS | 2014 |
|
RU2663476C2 |
SYSTEM AND METHOD OF PROVIDING SAFETY OF ONLINE TRANSACTIONS | 2013 |
|
RU2587423C2 |
SYSTEM AND METHOD FOR PROVIDING PRIVACY OF INFORMATION USED DURING AUTHENTICATION AND AUTHORISATION OPERATIONS USING TRUSTED DEVICE | 2013 |
|
RU2583710C2 |
METHOD AND SYSTEM FOR AUTHENTICATION OF DATA PROCESSING SYSTEM USER | 2003 |
|
RU2354066C2 |
SYSTEM AND METHOD OF ANALYZING CONTENT OF ENCRYPTED NETWORK TRAFFIC | 2018 |
|
RU2706894C1 |
SYSTEM AND METHOD OF DETECTING FRAUDULENT ONLINE TRANSACTIONS | 2014 |
|
RU2571721C2 |
CONTROLLING USER AUTHENTICATION | 2009 |
|
RU2524868C2 |
PEER-TO-PEER AUTHENTICATION AND AUTHORISATION | 2005 |
|
RU2390945C2 |
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF MALICIOUS COMPONENTS | 2010 |
|
RU2446459C1 |
METHOD FOR IDENTIFYING INCONSISTENT USE OF THE RESOURCES OF A USER COMPUTING APPARATUS | 2020 |
|
RU2757330C1 |
Authors
Dates
2017-11-09—Published
2016-06-24—Filed