摘要 |
FIELD: information technology.SUBSTANCE: according to the authentication method, the code is periodically changed by changing the shape of the authenticator. The method is realised by an authenticator having secret elements (3) with coded symbols (6), and locking elements (5) designed to secure a secret element (3) once it has been rotated to a certain angle. The secret elements (3) are in the form of polyhedrons. The reader, which along with the authenticator is designed to carry out the present method, has a body which has two parts (12, 13) or (20, 21) and a shaft (16 or 23) in the form of a polyhedron for the passage of the authenticator, and also channels (14) for the passage of an optical or electromagnetic signal. The reader has scanning pairs made up of components (18) and (19) arranged on the body.EFFECT: group of inventions increases the capacity of the coded information and enhance the usability of the authenticator, and can be used in any object, access to which requires input of coded information.26 cl, 25 dwg |