<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2019-4-3-0-7</article-id><article-id pub-id-type="publisher-id">1787</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>APPLICATION OF MULTIMODAL AUTHENTICATION AT CRITICAL INFORMATION INFRASTRUCTURE FACILITIES</article-title><trans-title-group xml:lang="en"><trans-title>APPLICATION OF MULTIMODAL AUTHENTICATION AT CRITICAL INFORMATION INFRASTRUCTURE FACILITIES</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuznetsov</surname><given-names>Denis Andreevich</given-names></name><name xml:lang="en"><surname>Kuznetsov</surname><given-names>Denis Andreevich</given-names></name></name-alternatives><email>wvxp@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Damm</surname><given-names>Victor Aleksandrovich</given-names></name><name xml:lang="en"><surname>Damm</surname><given-names>Victor Aleksandrovich</given-names></name></name-alternatives><email>wvxp@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuznetsov</surname><given-names>Andrey Viktorovich</given-names></name><name xml:lang="en"><surname>Kuznetsov</surname><given-names>Andrey Viktorovich</given-names></name></name-alternatives><email>kvaa77@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Basov</surname><given-names>Oleg Olegovich</given-names></name><name xml:lang="en"><surname>Basov</surname><given-names>Oleg Olegovich</given-names></name></name-alternatives><email>oobasov@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2019</year></pub-date><volume>4</volume><issue>3</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2019/3/it_7.pdf" /><abstract xml:lang="ru"><p>The security of the operation of the objects of the critical information infrastructure of the Russian Federation determines the high level of defense capacity of the State, security and law and order. At present, the traditional authentication systems used at such sites, which involve the use of knowledge and ownership factors in the process of granting access rights to users, do not fully meet the requirements. Such systems have serious disadvantages that make them highly vulnerable to the attacker. The use of biometric single-mode authentication methods is also not devoid of disadvantages and does not guarantee a high level of security of automated systems. The analysis showed that the transition to multimodal authentication systems allows to meet the requirements of authentication systems, as well as to significantly increase the level of reliability of decision-making and reduce the probability of errors.</p></abstract><trans-abstract xml:lang="en"><p>The security of the operation of the objects of the critical information infrastructure of the Russian Federation determines the high level of defense capacity of the State, security and law and order. At present, the traditional authentication systems used at such sites, which involve the use of knowledge and ownership factors in the process of granting access rights to users, do not fully meet the requirements. Such systems have serious disadvantages that make them highly vulnerable to the attacker. The use of biometric single-mode authentication methods is also not devoid of disadvantages and does not guarantee a high level of security of automated systems. The analysis showed that the transition to multimodal authentication systems allows to meet the requirements of authentication systems, as well as to significantly increase the level of reliability of decision-making and reduce the probability of errors.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>intellectual space</kwd><kwd>multimodality</kwd><kwd>detection of the person</kwd><kwd>authentication</kwd><kwd>automation</kwd><kwd>recognition</kwd><kwd>access control</kwd></kwd-group><kwd-group xml:lang="en"><kwd>intellectual space</kwd><kwd>multimodality</kwd><kwd>detection of the person</kwd><kwd>authentication</kwd><kwd>automation</kwd><kwd>recognition</kwd><kwd>access control</kwd></kwd-group></article-meta></front><back /></article>