**2. Analysis of existing methods**

Traditional methods of authentication (verification of secret knowledge-based reusable password and verification of biometric characteristics and devices) have a common disadvantage: the ability to intercept confirming the authenticity of the user information with its subsequent playback of the infringer to perform any action against a target system on behalf of a registered user. To improve protection against unauthorized access to sensitive information, it is usually recommended to use the two or multifactor authentication.

Consider the drawbacks of traditional methods of authenticating users of information systems in the case of remote access systems.

### **2.1 User authentication based on validation of secret knowledge**

The main advantage of validation of knowledge-based authentication of user secret reusable password is the ease of its implementation and use. At the same time, the password authentication has many drawbacks:

