FIELD: computer engineering.
SUBSTANCE: technical result is achieved due to the fact that in order to obtain access and execute commands, based on the unique data of the user—Object No. 2, a digital file is created and stored in the memory of the IC, which is an OCV No. 2; IC performs procedure of comparison and recognition of provided OCV No. 2 in OCV database; based on the obtained as a result of the operation of the algorithms for recognizing data on the OCV No. 2, a digital file is created and stored in the IC, which is a potential public key for obtaining access to IC resources; authentication takes place by comparing the secret and potential public keys with each other; if the comparison result gives the agreed number of matches, then the user is provided with access to the IC resources in this session, additional commands associated with the secret key are executed, or rejected; when keys are created by different algorithms in different IC, identification is provided by software.
EFFECT: improved protection of the provided data.
1 cl, 1 dwg
Authors
Dates
2024-04-03—Published
2023-08-21—Filed