**Acknowledgements**

The author expresses sincere gratitude for student E.V. Mazaeva, for making software implementation of the proposed method.

*Wireless Mesh Networks - Security, Architectures and Protocols*

**References**

ISBN-10: 0201615991

[Accessed: 29 March 2019]

[4] Create Your Own Browser

Extensions, Part 1. Extend Your Reach Into Chrome [Internet]. 2013. Available from: https://www.ibm.com/develope rworks/library/os-extendchrome/ [Accessed: 29 March 2019]

[5] Document Object Model (DOM) [Internet]. 2009. Available from: http://

[6] Kuznetsov RF. Web Page Classifier Based on SVM-Multiclass [Internet]. 2006. Available from: http://romip.ru/ romip2006/10\_kuznecov.pdf [Accessed:

[7] Khorev PB. Authenticate users with their work on the Internet. In: 2018 IV

[8] Mazaeva EV. Method of two-factor authentication of users based on

knowledge of their work in the Internet. In: Science and Education: Materials of the XII International Research and Practice Conference; Munich; November 2–3, 2016. Munich, Germany: Vela Verlag Waldkraiburg;

International Conference on Information Technologies in Engineering Education (Inforino); Moscow, Russia; 2018. pp. 1-4

www.w3.org/DOM/ [Accessed:

29 March 2019]

29 March 2019]

29 March 2019]

2016. pp. 67-69

**81**

[1] Smith RE. Authentication: From Passwords to Public Keys. Boston: Addison-Wesley Publishing Company; 2002. 576p. ISBN-13: 978-0201615999.

*DOI: http://dx.doi.org/10.5772/intechopen.88620*

*User Authentication Based on Knowledge of Their Work on the Internet*

[9] The MD5 Message-Digest Algorithm [Internet]. 1992. Available from: https:// www.ietf.org/rfc/rfc1321.txt [Accessed:

29 March 2019]

[2] Remote Identification [Internet]. 2018. Available from: https://www.cbr. ru/fintech/remote\_authentication/

[3] How to Add Add-ons in Internet Explorer [Internet]. 2018. Available from: https://www.wikihow.com/Add-Addons-in-Internet-Explorer [Accessed:
