Declared technologies base

TRANSFER OF INNOVATIONAL TECHNOLOGIES

HARDWARE AND SOFTWARE FOR IDENTIFY AND AUTHENTICATE USERS WITH CHANNEL PROTECTION - BIK RIDER (BIK MOUSE)


Purpose of the development: The system is designed for use in information and computer systems. Deal comprehensively with the issues of security and secure user authentication data entry and applied in the following cases: --- Log on locally to the workstation; --- Network login to the workstation or domain; --- Access to network resources; --- Access to web-based resources; --- Access to databases; --- Access to VPN-networks; --- Starting processes under alternate credentials; --- For authentication applications; --- Other authentication procedures.

Recommended application field: Information computer system.

Advantages over analogues: The main advantages of the complex: - Secretive, fast and easy code entry; - Protection of the transmission channel code to the computer; - Stability of the code (password) to the attacks "in the dictionary"; - Ability to use simple passwords; - Full integration with the operating system; - High degree of protection; - The ability to easily change the code combination by hand; - One key for an unlimited number of devices with built-in readers; - Authenticator is not the key, and typed on it a combination. The most effective set of keyboard can be used instead of passwords, or with them. Replacing standard keyboard passwords BIK key benefits include: a set of stealth code, protection channel code, resistance to attack, "the dictionary", the possibility of using simple passwords. In this case we have two-factor user authentication (password + key), which in some cases is a direct requirement of the security policy. Information system administrators are able to use the system for managing user accounts as a separate workstation (Local Security Policy), and group security policy domain (Active Directory). Complex significantly enhances security and user authentication can be used anywhere in the information system.

The development stage readiness: Ready for application

Technical and economic effect: Complex seamlessly integrates into the information system and can be used separately or in conjunction with other means of identification and authentication. The complex retains all custom quality standard means of authentication: - Ease of use; - Reliability; - Universality; - Compatibility; - Seamless integration with existing systems; - Resistance to loss, theft, copying.

Description of the development:
()
At initial installation, the administrator is prompted to enter the complex security code, which is used to encrypt the channel effect on the key users from the reader to the computer (operating system). Each instance has its own administrator reprogrammable security code. Using a unique security code allows you to "fix" the complex to a specific workstation, protecting workstations from malicious use of different devices instead of "native" key reader BIK. The software monitors the presence of the reader key BIK and prevents boot your computer in case of power readers (reader or mouse). Thus, additional controls are the physical integrity of information computer system. The complex is fully consistent with the requirements and standards in the field of information protection.

corresponds technical description
Ready for implementation

Possibility of transfer abroad:
Licence's sale
Technological document's sale
Creation of joint enterprise
Realization of finished commodity

Photo

Country Ukraine

For additional information turn to:
E-mail: gal@uintei.kiev.ua

or fill out the form:
Organization name :
Address :
Settlement account :
Bank :
MFO :
OKPO code :

Scientific organization tutor's data :
Surname :
Name :
Patronymic :
Scientific degree :
Phone :
Fax :
E-mail :
Cooperation proposals (joint patent, joint enterprise, assembly sale and so on :
country: