Declared technologies base

TRANSFER OF INNOVATIONAL TECHNOLOGIES

HARDWARE-SOFTWARE COMPLEX FOR IDENTIFICATION AND AUTHENTICATION OF USERS WITH PROTECTION OF THE CHANNEL - BIK RIDER (BIK MOUSE)


Purpose of the development: The complex is designed for use in any computer systems. It solves the problem of securely entering user authentication data and is used in the following cases: - local input to the workstation; - network entry to the workstation or domain. - access to network resources; - access to web resources; - access to databases; - access to VPN-networks; - running processes on behalf of another user; - means of authentication of application programs; - other authentication procedures.

Recommended application field: Information computer systems.

Advantages over analogues: - hidden, quick and convenient code entry; - protection of the transmission channel code in the computer; - the stability of the code (password) to attacks "by dictionary"; - the ability to use simple passwords and full integration into the operating system; - high degree of protection; - the ability to easily change the code combination manually; - one key for an unlimited number of devices with built-in readers; - the authenticator is not the key itself, but the combination typed on it.

The development stage readiness: Introduced in production

Description of the development:
()
The complex is transparently integrated into the information system and can be used both separately and in conjunction with other means of identification and authentication. The complex can most effectively be used instead of keyboard passwords or simultaneously with them. In this case, two-factor user authentication (password + key) is implemented, which in some cases is a direct requirement of the company s security policy. During the initial installation of the complex, the administrator is asked to enter a security code that is used to encrypt the channel for transferring user keys from the reader to the computer (operating system). The user enters his code by simply inserting the CURRENT key into the reader. There are two types of key reader devices: a USB reader and a standard computer mouse. Using a unique security code allows you to "bind" the complex to a specific workstation, which thereby protects the workstation from the use of malicious devices instead of the “native key reader” BIK. Information system administrators have the ability to use the complex for managing user accounts of both a separate workstation (Local Security Policy) and a group domain security policy (Active Direc tory) without significant changes in the operation of the system.

Information about newness of the development:
there are Ukrainian patents -- 1 items

corresponds technical description
Guarantees stable results getting

Possibility of transfer abroad:
Realization of finished commodity

Photo

Country Ukraine

For additional information turn to:
E-mail: gal@uintei.kiev.ua

or fill out the form:
Organization name :
Address :
Settlement account :
Bank :
MFO :
OKPO code :

Scientific organization tutor's data :
Surname :
Name :
Patronymic :
Scientific degree :
Phone :
Fax :
E-mail :
Cooperation proposals (joint patent, joint enterprise, assembly sale and so on :
country: