Description: The analysis of method of authentication of traffic is conducted on the basis of BDS-test. His characteristic failings are exposed and the ways of their removal are offered. The structures of dynamic subsystems are certain in the computer systems of critical application. The algorithm of forming of cycles is developed. Improved method of structural authentication of the computer system of critical application on the basis of the complex use of the looked after portrait and BDS-test.
Keywords: computer systems of critical application, structural authentication, BDS-test, looked after portrait