FIELD: computer engineering.
SUBSTANCE: invention relates to computer engineering for user authentication. Technical result is achieved by obtaining first cryptographic key; using first cryptographic key and plurality of restriction identifiers, in which limitation identifier of plurality of restriction identifiers indicates at least one of: identification information key zone from plurality of key zones, where said key can be used, geographic position, time or identity of a user, to obtain a second cryptographic key.
EFFECT: high efficiency of authenticating a user.
17 cl, 24 dwg
Title | Year | Author | Number |
---|---|---|---|
FORMING THE KEY DEPENDING ON THE PARAMETER | 2017 |
|
RU2671052C1 |
FORMING THE KEY DEPENDING ON THE PARAMETER | 2017 |
|
RU2670778C9 |
KEY GENERATION DEPENDING ON PARAMETER | 2012 |
|
RU2582540C2 |
KEY FORMATION DEPENDING ON PARAMETER | 2012 |
|
RU2636105C1 |
SECURE TRANSPORT OF ENCRYPTED VIRTUAL MACHINES WITH CONTINUOUS ACCESS OF THE OWNER | 2015 |
|
RU2693313C2 |
SECURE DATA EXCHANGE ENSURING DIRECT SECRECY | 2018 |
|
RU2771928C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE USER USING SECURE AUTHORIZATION SERVER | 2016 |
|
RU2718237C2 |
LIMITED ACCESS TO FUNCTIONAL SETS OF MOBILE TERMINAL | 2006 |
|
RU2391796C2 |
SYSTEM AND METHOD FOR PROVIDING ACCESS TO PROTECTED SERVICES WITH ONE-TIME INPUTTING OF PASSWORD | 2003 |
|
RU2308755C2 |
Authors
Dates
2019-12-16—Published
2018-10-22—Filed