METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE Russian patent published in 2018 - IPC G06F21/33 G06F21/30 

Abstract RU 2675902 C2

FIELD: electrical communication engineering.

SUBSTANCE: invention relates to a method for requesting an operation, a device for implementing said method, and a method of authorising an operation. Method includes generating a request to perform an operation on the targeted computing device, wherein the request comprises the geographic location of the targeted computing device, the operation to be performed on the targeted computing device, and the period of time during which the operation will be performed, signing the request with a private key of a first private, public key pair, transmitting the request to an authentication server, receiving an authorisation response from the authentication server that includes the request and an authorisation token, the authorisation token having at least one of the following: a predetermined authorisation period, permission to perform an operation on a predetermined targeted computing device and permission to perform predetermined operations on the targeted computing device, and transmitting a response to the authorisation request to the targeted computing device.

EFFECT: technical result is to ensure the safe operation of operating systems.

27 cl, 9 dwg

Similar patents RU2675902C2

Title Year Author Number
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
  • Khejli Dzhon
RU2673969C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
RU2672712C2
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS 2020
  • Schwartz, Jonathan David
  • Tarnouskaya, Anastasiya
RU2807463C2
DEVICE SAFETY AUTOMATIC CERTIFICATION WITH THE USE OF THE BLOCKS CHAIN 2016
  • Sprague, Michael
  • Sprague, Steven
RU2673842C1
REMOTE PAYMENT TRANSACTIONS PROTECTED PROCESSING, INCLUDING AUTHENTICATION OF CONSUMERS 2014
  • Makhotin Oleg
  • Pirzadekh Kiushan
RU2663476C2
COMPLEX OF HARDWARE AND SOFTWARE CREATING PROTECTED CLOUD ENVIRONMENT WITH AUTONOMOUS FULL-FUNCTION LOGICAL CONTROL INFRASTRUCTURE WITH BIOMETRIC-NEURAL NETWORK IDENTIFICATION OF USERS AND WITH AUDIT OF CONNECTED HARDWARE 2016
  • Radajkin Aleksej Gennadevich
  • Sachkov Evgenij Anatolevich
RU2635269C1
METHOD FOR CONTROLLING PROTECTED COMMUNICATION LINE IN DYNAMIC NETWORKS 2001
  • Mur Timoti M.
  • Ajjagari Arun
  • Shetkh Sachin K.
  • Bakhl Pradip
RU2297037C2
SECURE REMOTE PAYMENT TRANSACTION PROCESSING 2014
  • Shits Dzhon
  • Vagner Kim
  • Obyue Kristian
  • Lyu Frederik
  • Karpenko Igor
  • Pauell Glenn
  • Pirzadekh Kiushan
RU2674329C2
DYNAMIC REPUTATION INDICATOR FOR OPTIMIZATION OF COMPUTER SECURITY OPERATIONS 2017
  • Hajmasan Gheorghe-Florin
  • Mondoc Alexandra
  • Portase Radu-Marian
RU2723665C1
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT 2015
  • Fergyuson Nils T.
  • Samsonov Evgenij Anatolevich
  • Kinskhumann
  • Chandrashekar Samartkha
  • Messek Dzhon Entoni
  • Novak Mark Fishel
  • Makkarron Kristofer
  • Temkhejn Amitabkh Prakash
  • Van Tsyan
  • Krus Devid Mettyu
  • Ben-Zvi Nir
  • Vinberg Anders Bertil
RU2679721C2

RU 2 675 902 C2

Authors

Stern Allon Dzh.

Dates

2018-12-25Published

2014-07-01Filed