Carried out authors researches in the field of practical implementation of absolute undeciphering capability conditions show, that the given problem may be solved by using the approach consisting in virtualization of identifiers bands sample spaces. It is supposed, that the bank system uses 2 sorts of identifiers: virtual and working. Virtual identifiers are for correspondents and are formed by them. A feature of the prospective approach is that sample spaces of virtual identifier bands X* is continuous, therefore its infinite entropy (H [X *] = ∞ is ensured for the unauthorized user. Passage from the continuous form of identifiers sample space to the discrete form, mandatory in the bank system, is carried out by using of the authentication program complex developed and patented by authors (fig. 1)
Figure 1.
The basis of the complex operation is definition of an average information content and articulation. Numerical values of these parameters combination may be used as the working identifier. Two complex operations modes are supposed: 1) working identifier creation mode; 2) authentication mode.
Key features of the offered approach are:
- For the authorized access of the correspondent to the bank system only the virtual identifier which is formed by the correspondent in analogue mode independently is used. It absolutely eliminates possibility of a fake imitation.
- The working identifier is used only as the measurement standard for matching that removes necessity of its special protection.
- The correspondent operatively may change the virtual identifier, representing the working identifier appropriate to him in bank.
The offered approach and its implementation opens the newest area of the bank system perfecting in a direction of unauthorized access to the bank information security.
Given results are obtained during researches spent by writers at support of Russian federation Education Ministry T02-03.1-816
Библиографическая ссылка
Kotenko V.V., Rumjantsev K.E., Polikarpov S.V., Levendyan I.B. INFORMATION AND BANK SYSTEMS CORRESPONDENTS AUTHENTICATION BASED ON VIRTUAL IDENTIFIERS SHAPING // Современные наукоемкие технологии. – 2004. – № 2. – С. 37-37;URL: https://top-technologies.ru/ru/article/view?id=21611 (дата обращения: 21.11.2024).