Protecting a web resource from unauthorized access using an authentication method without the need to enter personal data.
Vorobuev L.O., Chernyshova A.V.
The article describes an authentication method that allows you to get rid of the need to enter the user's personal information to access the web resource. Existing methods of authentication are analyzed, their advantages and disadvantages are determined. The author's algorithm of hashing is described; the substantiation of its application in the developed method of authentication is given.Keywords: authentication, authorization, identification, unauthorized access, information system