摘要 |
FIELD: computer engineering, in particular, running of electronic financial transactions. SUBSTANCE: method involves converting confidential information produced by contact of several users from linear array into n-dimensional matrix, which has altered order of information cells. Then, method involves using such n-dimensional matrix for production of new linear array, in which content of information cells is separated by special characters into several pieces, each of which is appended with identifiers of users participated in the contact. Then array is stored in respective databases. When next contact is established, confidential information can be received again only when all participants of previous contact call their respective pieces from databases. Then method involves processing of joint pieces in order, which is reverse to order used after their first contact. EFFECT: increased protection of confidential information against unauthorized access. 7 cl, 1 dwg |