FIELD: computer technology.
SUBSTANCE: method for continuous user authentication involves comparing the parameters of the user’s keyboard handwriting with the handwriting patterns of authorized users from the database to make a decision about the user’s access to work with data. At the same time, the user fully authentication is implemented, for which the user passes all access operations, including biometric identification by keyboard handwriting. If the authentication results are positive, the decision-making module allows the user to log in to the system, after which the user accesses the resources allowed to him. During the user’s work, a continuous passive biometric identification of the user is carried out, actually controlling his presence at the workplace by keyboard handwriting.
EFFECT: increasing in the efficiency of protecting an automated workplace from unauthorized actions at all stages of its operation and ensuring the reliability of protection against unauthorized access to information and technical resources.
1 cl, 1 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM, METHOD AND DEVICE FOR CONTINUOUS USER AUTHENTICATION AND PROTECTION OF AUTOMATED WORKSTATION RESOURCES FROM UNAUTHORIZED ACCESS | 2018 |
|
RU2691201C1 |
DEVICE FOR PROTECTING INFORMATION FROM UNSANCTIONED ACCESS FOR COMPUTERS OF INFORMATIONAL AND COMPUTING SYSTEMS | 2006 |
|
RU2321055C2 |
COMPUTER SYSTEM WITH REMOTE CONTROL BY SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT AND METHOD FOR IMPLEMENTATION OF REMOTE CONTROL | 2016 |
|
RU2633098C1 |
APPARATUS FOR CREATING TRUSTED ENVIRONMENT FOR COMPUTERS OF INFORMATION COMPUTER SYSTEMS | 2013 |
|
RU2538329C1 |
DEVICE TO CREATE TRUSTED EXECUTION ENVIRONMENT FOR SPECIAL PURPOSE COMPUTERS | 2014 |
|
RU2569577C1 |
COMPUTER SYSTEM WITH REMOTE MANAGEMENT OF SERVER AND DEVICE FOR CREATING TRUSTED ENVIRONMENT | 2017 |
|
RU2690782C2 |
DEVICE OF HARDWARE AND SOFTWARE COMPLEX FOR GENERATING KEY INFORMATION AND RADIO DATA FOR RADIO STATION | 2016 |
|
RU2636092C1 |
DEVICE OF HARDWARE AND SOFTWARE COMPLEX FOR GENERATING KEY INFORMATION AND RADIO DATA FOR RADIO STATION | 2016 |
|
RU2634202C1 |
SYSTEM OF PROTECTION OF INFORMATION FROM UNAUTHORIZED ACCESS | 2017 |
|
RU2648942C1 |
METHOD AND DEVICE FOR TRUSTED COMPUTER BOOTING WITH CONTROL OF PERIPHERAL INTERFACES | 2020 |
|
RU2748575C1 |
Authors
Dates
2021-12-21—Published
2020-12-04—Filed