Identification of subjects in access control systems with the help of identification logic-temporal function as an effective method of complex information protection
{"title":"Identification of subjects in access control systems with the help of identification logic-temporal function as an effective method of complex information protection","authors":"N. V. Sachanyuk-Kavetska, I. O. Bondarenko","doi":"10.31649/1681-7893-2018-35-1-14-23","DOIUrl":null,"url":null,"abstract":"As an identifier of the subject of access to information resources, you can use a special identification logic-time function (LTF) – the unequal difference in the user's biometric LTF characteristics, ranked by the degree of their importance. The possibility of increasing the efficiency of the protection of the access to information with the use of this special function is considered. The reliability of passwords can be greatly improved if you use some image converted to a logic-time function.","PeriodicalId":142101,"journal":{"name":"Optoelectronic information-power technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Optoelectronic information-power technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31649/1681-7893-2018-35-1-14-23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As an identifier of the subject of access to information resources, you can use a special identification logic-time function (LTF) – the unequal difference in the user's biometric LTF characteristics, ranked by the degree of their importance. The possibility of increasing the efficiency of the protection of the access to information with the use of this special function is considered. The reliability of passwords can be greatly improved if you use some image converted to a logic-time function.