AUTHENTICATION AND ENCRYPTION SYSTEM AND METHOD WITH INTERCEPTION PROTECTION Russian patent published in 2020 - IPC G06F21/36 G06F21/62 H04L9/32 

Abstract RU 2730386 C2

FIELD: computer equipment.

SUBSTANCE: method of providing a user with access to stored information in electronic form using a stored in electronic form of a given access code containing a given number of characters, each of which is characterized by preset position of pin, wherein method includes presenting to user a collection of tokens, which contains at least two tokens and in which each token contains at least two symbols belonging to a plurality of symbols; sending to the user a request to select a token from a plurality of tokens for each position of the pin in the access code; and user authentication based on user-selected tokens, wherein user is authenticated if number of tokens selected by user, is equal to number of symbols in access code, at least one of selected tokens contains corresponding one of access code symbols and position of pin of each of selected tokens, which contains corresponding one of access code symbols, corresponds to position of pin of its corresponding symbol of access code in access code.

EFFECT: technical result consists in provision of authentication and encryption with protection against interception.

26 cl, 43 dwg

Similar patents RU2730386C2

Title Year Author Number
SYSTEM AND METHODS OF PROVIDING ENCRYPTED DATA OF REMOTE SERVER 2015
  • Guglani, Abhishek
  • Sharma, Sanjeev
  • Chitalia, Jalpesh
  • Destremps, Gerald
  • Mardikar, Upendra
  • Xu, Minghua
  • Trevino, Jose Luis Rios
  • Singh, Brijendra
RU2698762C2
PAYMENT PRIVACY TOKENISATION APPARATUS, METHODS AND SYSTEMS 2012
  • Oborn Timoti Viljam
RU2602394C2
METHODS AND SYSTEMS FOR AUTHENTICATING A POSSIBLE USER OF THE FIRST AND SECOND ELECTRONIC SERVICES 2022
  • Baibik Sergey Vyacheslavovich
  • Isupov Oleg Vitalevich
  • Primako Evgeny Mikhailovich
  • Zaitov Eldar Timurovich
  • Vorobkalov Pavel Nikolaevich
  • Kholyavin Vitaly Borisovich
RU2805537C2
SYSTEMS AND METHODS FOR COMMUNICATING RISK USING TOKEN ASSURANCE DATA 2014
  • Dill Mettyu
  • Laksminarayanan Prasanna
  • Pauell Glenn
  • Shits Dzhon F.
  • Karpenter Endryu
RU2681366C2
SYNCHRONIZING THE STATE OF THE MARKER 2019
  • Shankar, Ramesh
  • Sullivan, Brian
  • Mohammed, Sayeed
  • Shenker, Gavin
  • Nassar, Richard
  • Valdez, Clyde
  • Hill, Jonathan
RU2792695C2
SUBSCRIBER SUBSCRIPTION CONCEALED IDENTIFIER 2018
  • Torvinen, Vesa
  • Nakarmi, Prajwol, Kumar
  • Ben Henda, Noamen
  • Castellanos Zamora, David
  • Wifvesson, Monica
  • Saarinen, Pasi
RU2722508C1
SINGLE NETWORK LOGIN DISTRIBUTED SERVICE 2006
  • Chzhu Bin
  • Chen' Tezhuj
  • Li Shipehn
RU2417422C2
METHODS AND APPARATUS FOR AUTHENTICATION AND IDENTIFICATION USING PUBLIC KEY INFRASTRUCTURE IN IP TELEPHONY ENVIRONMENT 2009
  • Fejnberg Igor'
  • Lju Sjujlan'
  • Varni Duglas Uill'Jam
RU2506703C2
SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE USER USING SECURE AUTHORIZATION SERVER 2016
  • Chzhan Dzhenni Tsyan
  • Eldzher Erik G.
  • Bacher Stiven Patrik
RU2718237C2
METHOD, DEVICE AND SYSTEM FOR UPDATING A BOND KEY IN A COMMUNICATION NETWORK FOR ENCODED COMMUNICATION WITH PROVISION APPLICATIONS 2020
  • Yu, Shilin
  • Tsaj, Tsziyan
  • Lyu, Yujtsze
  • Pen, Tszin
  • Yuj, Vantao
  • Lin, Chzhaotszi
  • Mao, Yujsin
  • Lyu, Tszyankhua
RU2801267C1

RU 2 730 386 C2

Authors

Ni Min

Dates

2020-08-21Published

2016-09-28Filed