Russian Federation
The features and disadvantages of the traditional method of user identification on the network and the features and advantages of identification using a one-time password obtained using a security token are considered. The features of hardware and software tokens are considered. The identification of a user on the network for the use of a software token is discussed in detail, including installing the application on the user's mobile device, registering the user's device on the network server, and entering the PIN code in the software token application. As a result, the user's device generates a one-time password used to log in to the network. The advantages of using software tokens are noted. Algorithms for generating one-time codes for software tokens are considered in detail, including a flowchart and the text of the enlarged modules in C#. The steps of the one-time password generation algorithm are described in detail.
information safety, secure access, user identification, computer networks, hardware security token, software security token, hash function, encryption algorithm, one-time password
1. GOST R 51275-2006. Information Safety. The object of informatization. Factors influencing information. General regulations // ELECTRONIC FUND of legal and regulatory-technical documentation. URL: http://www.docs.cntd.ru (date of reference: 24.03.2025).
2. Ananchenko I.V., Musaev A.A. Protection of applications. M.: Proceedings of SPIIRAN, 2013.
3. The concept of a security token for software control devices / A.N. Kokoulin [et al.] // Technical Sciences – from theory to practice. 2016. № 1.
4. Markova S.V. Identification of vulnerabilities in information systems // Fundamental studies. 2022. № 9.
5. Shelupanov A. Authentication. Theory and practice of ensuring secure access to information resources. M.: Hotline – Telecom Publishing House, 2009.
6. Johnson M. New adwanced personal data protection. Wiley Information Technologies, 2016.
7. Joseph, Migga, Kizza. Computer Network Security. Springer Science & Business Media, 2005.
8. Jie Wang; Zachary A. Kissel. Introduction to Network Security: Theory and Practice. Wiley, 2015.
9. Owen Poole. Network Security. Routledge, 2007.
10. eToken USB keys and smart cards. URL: http://www.aladdin-rd.ru/catalog/etoken (date of reference: 24.03.2025).




