The new hardware-software authentification complex of information systems and networks users was developed. In this paper an introduction method of the multi user modes of access rights was used. At concurrence decrypted and a reference line standard procedure of identification is carried out and the user gets access to resources of system.
Asad Mahmoud Al-Naser . Hardware Key for Information Systems Users Authentification.
DOI: https://doi.org/10.36478/ajit.2006.1470.1472
URL: https://www.makhillpublications.co/view-article/1682-3915/ajit.2006.1470.1472