K. Tashev, J. Arzieva, A.T Arziev, Rakhimberdiev Kuvonchbek
{"title":"对象信息通信系统的方法认证","authors":"K. Tashev, J. Arzieva, A.T Arziev, Rakhimberdiev Kuvonchbek","doi":"10.1109/ICISCT55600.2022.10146923","DOIUrl":null,"url":null,"abstract":"In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of access to computer systems, the use of blockchain technology in solving the problem of identification and authentication basics, working principle of Blockstack and uPort authentication protocols based on Blockchain technology, advantages and disadvantages of Blockstack, uPort authentication protocols are analyzed. Also, the working principle of the DNS server system based on the Blockstack authentication protocol, developed on the basis of the Bitcoin blockchain, was studied. The blockchain layer of the Blockstack infrastructure is an analogue of the bitcoin blockchain. Here, the blockchain analogue is crypto-resistant, decentralized, and information is distributed through a consensus mechanism. In the given thesis questions of the authentication of objects of information-communication systems on the basis of mutual authenticate are considered.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Method authentication of objects information communication systems\",\"authors\":\"K. Tashev, J. Arzieva, A.T Arziev, Rakhimberdiev Kuvonchbek\",\"doi\":\"10.1109/ICISCT55600.2022.10146923\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of access to computer systems, the use of blockchain technology in solving the problem of identification and authentication basics, working principle of Blockstack and uPort authentication protocols based on Blockchain technology, advantages and disadvantages of Blockstack, uPort authentication protocols are analyzed. Also, the working principle of the DNS server system based on the Blockstack authentication protocol, developed on the basis of the Bitcoin blockchain, was studied. The blockchain layer of the Blockstack infrastructure is an analogue of the bitcoin blockchain. Here, the blockchain analogue is crypto-resistant, decentralized, and information is distributed through a consensus mechanism. In the given thesis questions of the authentication of objects of information-communication systems on the basis of mutual authenticate are considered.\",\"PeriodicalId\":332984,\"journal\":{\"name\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT55600.2022.10146923\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT55600.2022.10146923","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Method authentication of objects information communication systems
In this article, the issue of authentication of objects of information and communication systems based on mutual authentication, models of authentication of users of information and communication systems, the use a five-level authentication model in the control of access to computer systems, the use of blockchain technology in solving the problem of identification and authentication basics, working principle of Blockstack and uPort authentication protocols based on Blockchain technology, advantages and disadvantages of Blockstack, uPort authentication protocols are analyzed. Also, the working principle of the DNS server system based on the Blockstack authentication protocol, developed on the basis of the Bitcoin blockchain, was studied. The blockchain layer of the Blockstack infrastructure is an analogue of the bitcoin blockchain. Here, the blockchain analogue is crypto-resistant, decentralized, and information is distributed through a consensus mechanism. In the given thesis questions of the authentication of objects of information-communication systems on the basis of mutual authenticate are considered.