PURPOSE:
The complex is intended for use in any computer systems. It solves the problem of secure secure input of user authentication data and is used in the following cases:
-
- local entrance to the workstation;
- network entry to a workstation or domain.
- access to network resources;
- access to web resources;
- access to databases;
- access to VPN networks;
- starting processes on behalf of another user;
- application authentication tools;
- other authentication procedures.
DESCRIPTION:
The complex is transparently integrated into the information system and can be used both separately and together with other means of identification and authentication. Most effectively, the complex can be used instead of keyboard passwords or simultaneously with them. In this case, two-factor user authentication is implemented (password + key), which in some cases is a direct requirement of the company’s security policy. During the initial installation of the complex, the administrator is asked to enter the security code, which is used to encrypt the channel for transmitting user keys from the reader to the computer (operating system). The user enters his code by simply inserting the CEC key into the reader. There are two types of key reader devices: a USB reader and a standard computer mouse. The use of a unique security code allows you to “link” the complex to a specific workstation, thereby protecting the workstation from the use of harmful devices instead of the “native key reader” of the VIC. Information system administrators have the ability to use the complex to manage user accounts of both a separate workstation (Local Security Policy) and group domain security policy (Active Directory) without significant changes in the system.
ADVANTAGES:
-
- covert, quick and easy code entry
- protection of the code transmission channel to the computer;
- code (password) resistance to dictionary attacks;
- the ability to use simple passwords and full integration into the operating system;
- the high degree of protection;
- the ability to easily change the code combination manually;
- one key for an unlimited number of devices with built-in readers;
- the authenticator is not the key itself, but the combination typed on it.
RECOMMENDED FIELD OF APPLICATION:
Information Computer Systems.
RESULTS OF THE RESEARCH:
Provides consistent results.
STAGE OF THE DEVELOPMENT READINESS:
Put into production.
TRANSFER OPPORTUNITY:
Sales of finished products.
NOVELTY:
1 patent of Ukraine.
IF YOU ARE INTERESTED IN THIS DEVELOPMENT, PLEASE,
WRITE TO US