System for protecting hardware in form of printed circuit boards, formed by deep drawing in half-cup

FIELD: physics; computer engineering.

SUBSTANCE: tachograph for highly sensitive processing and protecting data which includes a system for protecting hardware for a protected circuit has a substrate which has a central region projecting backwards, where the central region is surrounded by regions which project forward. Due to this, the system for protecting hardware is particularly made in form of a half-cup. Also the system for protecting hardware has conducting structures placed on and/or in the substrate for detecting access to the protected circuit.

EFFECT: design of a system for protecting hardware which can be integrated into an electronic module, which provides reliable detection of attack on hardware.

5 cl, 3 dwg

 

Electronic modules for highly sensitive data processing and data protection, such as used, for example, in the tachograph trucks, as well as in financial institutions, payment machines, airplanes and everywhere where the processing of sensitive data must be protected by a hardware way from manipulation from outside, such as, for example, chemical or physical attack (e.g., mechanical, laser, fire, etc), so that the data cannot be manipulated.

Still there is a solution in which the protected electronic modules are Packed around with the help of the so-called film protection against drilling. This film protection against drilling ships, for example, the firm Gore in the form of a finished product or company Freudenberg in the form of a film with print of silver conductive paste. Film electrically connected inside the module. After the electronic component is a three-dimensional image Packed, he then poured into the casing of synthetic resin. When you try opening the packaging, in places in which there is a hacking, electric conductive tracks or resistive conductors on the film are forced to damaged and broken that the electronic module and causes the stored data is immediately erased. Due to this data, it is impossible of manipulieren is th and attack from the outside, thus, can be recognized by the relevant authorities.

This is known from the prior art method peculiar to two problems. First, the application of the film does not match any electronic method of installation. On the other hand, the film already during installation often damaged, which leads to a high percentage of marriage.

Accordingly, the present invention is the creation of a system of hardware protection for electronic modules that can be integrated in the electronic manufacturing procedure.

This problem is solved in accordance with the independent claims. Preferred embodiments of the reflected in the dependent claims.

In accordance with this system of hardware protection for the protected circuit contains a conductive or non-conductive planar substrate. Planar substrate is, in General, not equal, and has a protruding ago the Central region, which is preferably completely surrounded by protruding forward areas. On the substrate and/or posted by the conductive patterns to detect access to the protected circuit. When unauthorized access to the schema of the conductive structures are damaged, so that there is contact, or the contact is interrupted, and thereby access to the schema about arrivals.

The preferred way leaning forward region have an edge that runs parallel to the protruding back of the Central region. This edge protection system hardware can be placed on a flat holder schemes and there to glue or solder, or, in principle, to provide the contact.

In particular, the substrate is in the form of poluchasa.

The substrate preferably is a received deep drawing PCB and/or film.

A preferred manner, the conductive patterns and insulating gaps of the surface of the sensor form a fine structure in the form of a grid, in grid form with meanders and/or sectors, which are conductive structures, for example, in the form of geometric structures. The insulation gap between the two elements of the conductive structures in the form of conductive tracks (cell width) corresponds to the regular structures HDI (high density interconnects). The same is true for the width of the form conductive patterns.

Especially simply and economically conductive patterns can be produced by printing. This is the preferred way until planar substrate else is equal then there is not subjected to deep drawing.

Protection system hardware contains, in particular, the contacts for the connection means is of obnarujenia to detect damage to the conductive structures.

In the method of manufacturing the protection system of hardware with one of the above types of planar substrate provided with the conductive structures to detect access to the protected circuit. Before or preferably after, the planar substrate is provided in the form in which it has a protruding ago the Central region, which is surrounded by a protruding forward areas. Preferred variants of the method is used to determine the preferred options for implementation the protection system of hardware and Vice versa.

The device contains protection system of hardware with one of the above types and holder circuit for the protected circuit. Protection system hardware protruding forward areas of the substrate placed on the holder of the scheme, so that between the protruding ago a Central region and a holder of scheme forms a space for the protected circuit.

Holder circuit represents or contains the preferred way PCB holder scheme. Often it is also necessary to protect the rear. For this purpose, the device has, in particular, the second protection system hardware according to one of the described type which is placed on the side of the holder schemes, opposite the first security system.

In addition, the device contains preferred about the time detection means for detecting violations of conductive structures due to unauthorized access and/or unauthorized manipulation. To and detection were themselves protected, they can be run as an integral part of the protected schema.

The entire module with the holders of the schemes is used, in particular, in the tachograph, the data logger road and/or rail or vehicles not moving on rails vehicle. But it can also be used in the payment machines, devices, financial institutions and on airplanes. In particular, the use of the module with the holders of the schemes always has the advantage when used subject to the protection of cryptographic keys (RSA, DES).

The invention relates to a tachograph for highly sensitive data processing and protection, including protected circuit for processing sensitive data, the holder of the protected circuit, and system hardware protection for the protected circuit with two planar substrates, of which at least one has a protruding ago the Central region, which is preferably completely surrounded by protruding forward areas, and/or in the substrate posted by conductive patterns to detect access to the protected circuit, and to a method of manufacturing a tachograph.

Other characteristics and advantages of the invention arise from the description of examples with reference to the drawings showing the following:

Figure 1 - forms of the complete device with the holder of the scheme, on one side of which is placed the protection system of hardware, and on the other side of which, opposite the aforementioned one side, placed second protection system hardware;

Figure 2 is an alternative form of the device holder circuit, one side of which is placed the protection system of hardware, and on the other side of which, opposite the aforementioned one side, placed second protection system hardware;

Figure 3 - the substrate with the conductive structures from which it is made security system hardware.

1 shows a protection system 10 hardware with the plane substrate 11, 12, which has a protruding back of the Central region 11, which is completely surrounded by a protruding forward areas 12. On the substrate 11, 12, and it placed the conductive patterns 13, 14. For this purpose, the substrate 11, 12 contains two prepreg (semi-finished composite plastic) 15, 16. The first prepreg 15 forms a side of the substrate 11, 12, which faces the direction in which stands back of the Central region 11. On the side of the prepreg 15, which faces the direction in which the protruding areas 12, surrounding the Central region 11, the first conductive structure 13 from the two already mentioned conductive structures 13, 14.

It also placed W is Roy prepreg 16, on the side, opposite the first conductive structure 13, placed second conductive structure 14.

System 10 hardware protection includes the contacts 17 for contacting conductive structures 13, 14 with other conductive structures of the protection system hardware and detection means for detecting damage of conductive structures 13, 14.

System 10 hardware protection for its exposed forward areas 12, in particular its edges placed on the holder 20 schemes for protected circuit 21. As presented in figure 1 the example of executing the holder 20 schema designed as a multilayer printed circuit Board.

In the area in which the holder 20 schemes placed parallel to the center area of the edge of the protruding areas 12, the holder 20 of the scheme, for its part, to protect the protected circuit 21 is conductive patterns 22 of the holder of the scheme, through which may be logged mechanical drilling holder 20 schemes. They are connected through the conclusions 17 with the conductive structures 13, 14 of the system 10 hardware protection.

In addition, the holder 20 of the circuit is the contacts 23 of the input and output outside the scope of protection, which through conductors associated with the protected circuit 21, which pass through the layers of conductive structures 22 of the holder 20 schema.

On the side, against the opposite system 10 hardware protection, on the holder 20 of the scheme is the second system 30 of hardware protection. The second system 30 of hardware protection is constructed similarly to the first system 10 hardware protection and is, therefore, the protruding ago Central oblast, which is surrounded by a protruding forward areas 32. Its substrate is formed, for example, prepregs 35, 36, between which is located the first conductive structure 33, which through contacts 37 are connected with the second conductive structure 34 which is placed on the turned from prepreg 35 and the conductive patterns 33 side of the prepreg 36. The second system 30 of hardware protection is placed in relation to the first system 10 hardware protection rotated to a certain angle.

The form of execution according to figure 2 differs from the forms of execution shown in Fig 1, the fact that both systems 10, 30 of hardware protection is not hosted by layered printed circuit Board holder 20 of the scheme, and directly one to another. The holder 20 of the schema contains in this example, in addition to its multi-layered printed circuit Board, another holder 24 through which the protected circuit 21 and a multilayer printed circuit Board holder 20 of the scheme are held in the space, which is obtained between the exposed back of the Central regions 11, 31 of the systems 10, 30 of hardware protection.

Figure 3 you can see the flat is Yu substrate 41, 42, 44 with a rectangular Central region 41, which on its four edges surrounded by regions 42, 44. Region 42, 44 have, on their side, respectively, the area adjacent to the Central region 41, which is way deep drawing is deflected at an angle with respect thereto, and the edge, remote from the Central region 41, which, for its part, in relation to the adjacent Central area 41 area 42 so rejected that he again runs parallel to the Central region 41. Between surrounding the Central region 41 regions 42 have slots 43, which due to deep drawing regions 42, 44 are disclosed, so that they are at their junction with each other, the edges can pripisivaetsya to each other. All substrate 41, 42, 44 in the form of pre-structured and then subjected to deep drawing layers of protection against drilling is covered with a conductive meander structure.

Protection system against manipulation of the hardware, therefore, is embedded in one or two three-dimensional poluchasa, which are formed, for example, in the form of a part or parts, deep drawing and which protect the circuit with its module or completely surround (figure 2), or mounted on a printed circuit Board 20 of the protected module printed circuit Board 21 (Fig 1).

If in a particular form of execution used only one three-dimensional poluchasa, Thomesto second poluchasa can be used flat printed circuit Board 20 instead of the second poluchasa. Then on the side facing the first poluchasa, electronic components are placed, and on the opposite side is located the protection system of hardware with its conductive structures.

For the last incident, said additional system hardware protection can also be integrated in the printed circuit Board 20 used for a module, for example, due to the fact that the latter in areas where it is connected with the system 10 hardware protection by means of soldering or adhesive itself has a grid conducting structure 22. This can be, for example, implemented due to the fact that the printed circuit Board 20 is made in the form of a multilayer printed circuit boards, which in these areas contains several placed one above the other conductive layers, which protect from mechanical drilling.

Performing pelucas 11, 12; 31, 32 of the system 10 hardware protection can be performed in such a way that they are made of exposed deep drawing of PCB material, such as, for example, glass-fibre reinforced prepreg FR4, which in the initial state is not yet overiden. On the other hand, perhaps the use of films, in particular films RCC (copper with polymer coating, with partial pre-structuring of copper or other suitable for deep drawing film plated or without it.

<> Before deep drawing followed by curing unilateral or bilateral wire mesh conductors or resistors is structured. A protective grid of conductive structures 13, 14; 33, 34 may be implemented as a structured metal mesh conductors, for example, photolithographically by etching or other suitable method. It can also be implemented as a resistive mesh with the conductive structures, preferably overdoseavandia polymer system is applied on one side or both sides of the screen printing method or resistive printing, and thus is formed the protective structure.

Such resistive grid can also be applied direct printing carbon ink or other suitable method.

Implementation of the elements 11, 12; 31, 32 deep drawing for a system of hardware protection can, on the one hand, to be such that they are like multi-layer PCB, and conduits necessary for installation of the protection system, facing to the side of the module and do not have any leading outside interlayer electrical contacts on the outside of poluchasa. For this purpose, all necessary for the functioning of pelucas protection schemes and hardware module interlayer contacts lie within the protection circuit or the issue is lnany as hidden interlayer contacts. And/or necessary structural layers for mounting submodules are as consistently growing patterns with laser holes or otherwise made interlayer contacts.

For the case when poluchasa deep drawing system of hardware protection is placed directly on one side or on two sides on the circuit Board 20 of the holder of the scheme for the protected circuit, it is, according to the above-described variants of execution, in the form of a multilayer printed circuit Board with a corresponding grid 22 of hardware protection against mechanical attacks.

Cup-shaped conductive structures of the protection system hardware have pads in the configuration of the lattice, which serve to then make the electrical connection between both bowls protection system hardware surrounding the electronic module of the protected circuit, with holder schemes for protected circuit or multi-layer printed circuit Board holder schemes for protected schema.

Bowls protection system hardware have one or more conductive layers. They are made from, for example, multiple copper layers, which, respectively, contain very finely structured conductive tracks of conductive structures 13, 14; 33, 34, which are small cells cover the entire surface layer of the food and the passage from layer to layer, due to the execution of conductive paths.

The width of the conductors of one layer overlap with this insulation distances and of the corresponding conductive paths of the layers belonging to him and separated by a dielectric.

They through in-depth inter-layer connection or Micro-Vias to the module are connected to the internal Assembly.

The execution layer, for example, in the x direction with a similar meander structure of the thin copper conductive tracks and below it or above it a layer in the direction y with a similar structure, separated by a dielectric layer, provides a system of hardware protection module against mechanical manipulation due to the fact that these conductive paths towards the inside connected to the module and, thereby, due to the ultra-thin structure is damaged. When this interrupt occurs conductors that are registered in the scheme. Alternatively, you can apply two schemes, and may be recorded due to the manipulation of short circuit of both schemes.

The execution of conductive structures 13, 14; 33, 34 in the form of very thin conductors may preferably be carried out by the method of carbon printing (a method of printing a resistive paste), printing a conductive paste (silver conductive paste or ink printing carbon ink in all imaginable with whom ructure, which on the whole surface on at least one layer formed of the fine-grained configuration and are electrically connected inside to the schema.

At least one of the cups 11, 12; 31, 32 system hardware protection can also be performed on the technology elastic-rigid printed circuit boards, or may be applied elastic guide data.

The dielectric gap layer protection system hardware on the bowls protection system hardware should be selected so that at the end of the drilling was damage to the protective layers located above and below, and thus was initiated the protection mechanism.

The electrical connection and the mechanical connection of the cups system hardware protection between themselves or with the holder of the scheme for the protected circuit can be implemented by means of soldering with subsequent soldering seam sealing adhesive, lamination, contact bonding or other such means. Traditional methods of connection can also be used.

The described system of hardware protection has the advantage of sensor systems, integrated into bowls protection system of hardware and, if necessary, in the multilayer printed circuit Board holder schemes for protected circuit which can be manufactured according to the traditional "high the tech" technology printed circuit boards and can be equipped and processed on conventional production lines for the manufacture of electronic modules. In addition, one achieves the advantage that a reliable, economical and processed for installation without significant cost of the protection system can directly provide and integrate into an electronic module that provides reliable detection of attacks on the hardware.

1. Tachograph for highly sensitive data processing and protection, including protected circuit (21) for processing sensitive data, the holder (20) of the protected circuit (21), as well as a system of hardware protection for the protected circuit (21) with two planar substrates(11, 12; 31, 32), of which at least one has a protruding ago Central region (11, 31), which is preferably completely surrounded by protruding forward regions (12, 32), and/or in the substrate (11, 12; 31, 32) posted by conductive structures (13, 14; 33, 34) for detecting access to the protected circuit (21).

2. The tachograph according to claim 1, characterized in that the said protected circuit placed on one of the planar substrates (11, 12) on the side facing the other substrate (31, 32),.

3. The tachograph according to claim 1, characterized in that the said protected circuit is placed on the circuit Board between the two substrates (11, 12; 31, 32) serving back the Central region.

4. The tachograph according to claim 3, characterized in that the printed circuit Board is made of flexible material or the ceramic.

5. The tachograph according to claim 1, characterized in that the protruding region of the substrate (12, 32) have an edge that runs parallel to the protruding ago the Central region of the substrate (11, 31).

6. The tachograph according to any one of claims 1 to 5, characterized in that the substrate (11, 12; 31, 32) is made in the form of poluchasa.

7. The tachograph according to any one of claims 1 to 5, characterized in that the substrate (11, 12; 31, 32) is obtained by deep drawing.

8. The tachograph according to any one of claims 1 to 5, characterized in that the substrate (11, 12; 31, 32) includes a circuit Board and/or film.

9. The tachograph according to any one of claims 1 to 5, characterized in that the conductive patterns (13, 14; 33, 34) form a grid.

10. The tachograph according to any one of claims 1 to 5, characterized in that the conductive patterns (13, 14; 33, 34) formed by printing, etching, photostructurable, laser structuring or similar method.

11. The tachograph according to any one of claims 1 to 5, characterized in that the system (10; 30) of hardware protection contains conclusions (17; 37) for connection detection means for detecting damage to the conductive structures(13, 14; 33, 34).

12. The tachograph according to claim 1, characterized in that the security system (10) with protruding forward regions (12) of the substrate (11, 12) placed on said holder (20) circuit between the serving back the Central region (11) and the holder (20) is formed a space for the protected circuit (21).

1. The tachograph according to claim 1 or 12, characterized in that it further equipped with a second protection system (30) hardware which is placed on the side of the holder (20) scheme, opposite the first protection system (10).

14. The tachograph according to claim 1, wherein the protected circuit (21) includes means for detecting violations of conductive structures(13, 14; 33, 34).

15. The tachograph according to claim 1, characterized in that it is designed for use in a vehicle, particularly a truck.

16. A method of manufacturing a tachograph for highly sensitive data processing and protection, including protected circuit (21) for processing sensitive data, the holder (20) of the protected circuit (21), as well as a system of hardware protection for the protected circuit (21) with two planar substrates(11, 12; 31, 32), where and/or in the substrate (11, 12; 31, 32) are made conductive patterns to detect access to the protected circuit (21), and before that, or, preferably, after that planar substrate lead in the form in which it has a protruding ago Central region (11, 31), which is surrounded by a protruding forward regions (12, 32).



 

Same patents:

FIELD: physics.

SUBSTANCE: invention is related to electronic units, namely, to simplification of such units. In particular, invention is related to electronic ballast resistors for gas discharge lamps, at that such ballast resistors have higher scattering of heat, reduced amount of components, minimised mechanical stress in electric components and improved suppression of electromagnetic interferences (EMI). Electronic unit having vessel is arranged with sealing against effect of environment, with possibility to suppress EMI and proper thermal connection between hot electric components and external heat radiator contained in unit.

EFFECT: improvement of electronic units operation, improvement of electronic ballast resistances operation for gas discharge lamps, reduction of mechanical stresses in such devices, lower EMI emitted by these devices.

4 cl, 6 dwg

FIELD: physics, control.

SUBSTANCE: present invention is related to electron field devices such as transmitters of technological processes parameters used for monitoring (routine inspection) of these processes. In particular, the present invention is related to electron field devices used in environment of technological plants, which may produce high level of electromagnet interference. Field industrial device (200) for operation under severe conditions comprises body (208) with electroconductive walls that surround cavity (206) with open end. Cavity may contain electronic module (292) based on printed circuit boards. Device comprises ready-fitted printed circuit board (270), which represents multilayer printed circuit board with through electric contacts and hidden layer (350) of grounding, which is electrically connected to body (202) for screening of electronic module (292) against electromagnet interference and provision of electronic module protection against effect of environment.

EFFECT: creation of body designs for transmitters of technological processes parameters, which possess improved resistance to effect of moisture and substances that pollute the environment, and also provide efficient filtration of electromagnetic field and radio interference.

30 cl, 9 dwg

Damped board // 2332817

FIELD: electricity.

SUBSTANCE: damped board contains printed circuit board and damping unit consisting of reinforcing layer made of structural material bonded with printed board by layer of viscoelastic material. Damping unit is performed as two-layer frame passing through fixing points of printed board and containing reinforcing layer and layer of viscoelastic material.

EFFECT: providing of printed boards damping with maximum saving of useful area; minimal increase of board mass and keeping damping properties in wide temperature range.

3 cl, 7 dwg

FIELD: electronics; printed circuit boards.

SUBSTANCE: multilayer printed circuit board consisting of signal dielectric layers comprising topological patterns of the printed wiring and interchanging with screening layers having the form of a grid provided with printed conductors reflecting the topological pattern configuration of their nearest signal layer. Top layers of said printed circuit board are covered with a protection coat that consists of a mixture of ferrite powder and plastic binder based on protective varnishes or compounds and is applied by means of spreading, immersion or spraying.

EFFECT: enhancement of the quality of printed circuit board protection against effects of EMI.

Electronic board // 2280967

FIELD: electronics, tool-making industry, namely, engineering of electronic boards.

SUBSTANCE: result is achieved because in electronic board as substrate the body of device is utilized, and conductive pattern is made of solder.

EFFECT: lower laboriousness and simplified manufacture of electronic boards, decreased losses during manufacture, possible processing of electronic board after expiration of service time.

FIELD: printed-circuit boards, multilayer conductors, and ribbon cables.

SUBSTANCE: proposed method involves spatial disposition of conducting communication lines which makes it possible to compensate for electromagnetic pickups in three-phase power circuits caused by self-induction and is based on compensating effect attained by superimposing electromagnetic inductances shifted in phase due to phase shift of currents carried by three adjacent conductors; novelty is that only positive (forward) currents carried by three adjacent layers and shifted in phase through 120 deg. are used in three-phase circuits. Passing three-phase current of same amplitude through three adjacent conducting tracks disposed strictly in parallel one on top of other in these three adjacent layers where columns built of conducting tracks occurring in three layers are formed we shall obtain equal-amplitude vectors in each layer using cyclic phase transfer; these vectors correspond to harmonic oscillations on vector diagram from all three phases (A, B, C).

EFFECT: maximized compensation of noise caused by self-induction.

4 cl, 3 dwg

FIELD: electronics.

SUBSTANCE: device has electronic boards block with radio-elements thereon and with radial grooves made in them, electric connectors of electronic boards and arc shields separating boards with sockets for bodies of radio-elements, connected to electronic boards by frame fixing, central bushing and rods. Along peripheral line of each arc shield slits are made, combined with radial grooves of each electronic board. Electric connectors of boards are made in form of shields curved around side surface for console portions of boards, current-conducting drawing of which is made in form of circular sectors, positioned between shields slits.

EFFECT: higher resistance to physical impact.

2 dwg

The electronic unit // 2234205
The invention relates to electronics and can be used in blocks of electronic equipment to improve cooling efficiency, in particular in the aviation lights - multi-function remote control

Electronic unit // 2233566
The invention relates to the field of electronic structures of blocks that can be used in miniature transceiver devices and control systems

Electronic unit // 2233565
The invention relates to the field of electronic structures of blocks used in missiles or portable launchers

FIELD: physics; computer engineering.

SUBSTANCE: present invention includes an e-mail component and an identification request component. The e-mail component can receive e-mail messages and calculate associated probability that data of the e-mail message are spam. The identification request component sends an identification request to the e-mail message sender having the said probability greater than the first received value. The identification request component corrects the probability that the given e-mail message is spam at least partially based on the response to the identification request. The identification request can be an embedded code, a calculated identification request, an identification request requiring participation of a person, and/or micro-payment requirement.

EFFECT: invention provides detection of spam through identification requests.

31 cl, 13 dwg

FIELD: physics; computer engineering.

SUBSTANCE: invention relates to ensuring information security on web serves. In order to monitor security of a web server, such quality factors of operation of the web server as query runtime t and number of link errors eERROR are given at a preliminary stage. A loading test is then carried out to determine threshold values of the query runtime of the web server (tCRIT) and number of link errors (eERROR-CRIT). Analytical models for predicting query runtime tPRED are constructed. Monitoring period TM is determined at the functioning stage of the server, after which N queries are received for establishing connection during the monitoring period TM. Current values of quality factors of operation of the web server t,eERROR are derived. The predicted query runtime tPRED is then calculated based on the said values. Values of tPRED and eERROR are then compared with threshold values of the quality factors and if threshold values are greater than the said values, there is an attack.

EFFECT: invention improves quality of monitoring security of a web server and provides on-line detection of critical mode of operation of the web server caused by unknown and known "denial of service" attacks, as well as legitimate user requests.

3 dwg

FIELD: physics; computer engineering.

SUBSTANCE: present invention relates to a method and system for sharing objects which can be located in different machines. These objects can be accessed and shared over a computer network, for example the Internet. The objects can be computer programming objects which can include application programming interfaces (API), programming object libraries, determination of computer program objects and other similar information for applications based on a computer network. The method and the system do not require a server computer since the invention can work as a peer-to-peer or a multipoint computer network.

EFFECT: method and system can work with peer-to-peer networks and "client-server" networks without requirement for identification of computers on the network as servers or non-server computers (clients).

20 cl, 9 dwg

FIELD: physics; computer engineering.

SUBSTANCE: invention relates to protection of information systems, and specifically to assessment of security of information systems through presentation of system states, security requirements and a model for monitoring and controlling access using predicate logic and automatic verification of meeting security requirements on several system states, taking into account rules of the model for monitoring and controlling access. The result is achieved due to predicate presentation of system states, a model for monitoring and controlling access, security requirements, as well as application of resolution (output) rules, automating verification of security requirements on system states.

EFFECT: cutting on number of security management errors, increased guarantee of meeting security requirements, cutting on time and resource expenses on assessing security of information systems.

10 cl, 3 dwg

FIELD: physics; communications.

SUBSTANCE: invention relates to inspection technology and can be used in telecommunication systems. Values of disruptive effects on a communication line are monitored, while simultaneously evaluating transmission capacity of each type of communication line. The obtained values are scaled relative maximum values for each class of parametres. The given values are used to train artificial neural networks with radial basic elements for approximating dependency of efficiency of each type of communication line on values of disruptive effects. Matrices of synaptic weights of trained neural networks are filled and further installed in accordance with a specific designed communication network for evaluating transmission capacity from forecast values of disruptive effects, obtained with time delay. Based on the forecast values of transmission capacity for each communication line, the available network resource is allocated between subscribers taking into account their priority categories.

EFFECT: wider functional capabilities, lying in timely rendering of information services to subscribers of different categories with external disruptive effects acting on a communication network.

11 dwg

FIELD: physics; computer engineering.

SUBSTANCE: invention relates to management of security of Windows family operating systems (including Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server, Microsoft Windows XP Professional, Microsoft Windows Server 2003, Microsoft Windows Server 2008, Microsoft Windows Vista Ultimate, Enterprise and Business 32-x and 64-x versions of any localisation), and specifically to comparison of configuration characteristics of operating systems from the view point of assessing their security. The result is achieved owing to possibility of comparing configuration parametres, monitoring the behaviour of changes in status and detection from a given "standard" status in Windows family operating systems after proposal of a procedure for comparing security status and switching to the analysed complete set of configuration parameters of security of user layer resources.

EFFECT: increased efficiency of assessing system security.

3 cl, 1 dwg

FIELD: physics; communications.

SUBSTANCE: invention relates to the technology of protecting digital content, and specifically to playing back digital content using licenses. A chain comprises an end license associated with content at one end, and a root license at the other end and all intermediate licenses in between. The end license and all intermediate licenses in the chain are attached to neighbouring licenses in the chain towards the root license, and the root license is attached to the private key owner (PR-U). Each license in the chain is verified and confirmation is made of whether the license allows content playback. A decryption key is obtained from the end license based on application of (PR-U) to the root license. The obtained key is used to decrypt the encrypted content, and the decrypted content is played back.

EFFECT: provision of playback of encrypted digital content on a computer in accordance with a license chain, on which a request for playing back encrypted content is received and a license chain corresponding to that content is found.

5 cl, 5 dwg

FIELD: physics; computer engineering.

SUBSTANCE: invention relates to systems and methods for coordinating software components. Version management policy, which is included in the target component, shows how to access the target component, for instance either as a library component or as a platform component. A component can be designated a library component when it creates a version which is compatible at the binary code level. When other components request for such a component, they receive exactly the component version which they requested. On the other hand, a component can be designated a platform component when it creates a version which is compatible at the bit code level. When other components request for such a component, they receive the last updated version of the requested component instead. That way, access to the corresponding component version is provided (even a version which is different from the requested version). Other implementation versions include mechanisms for stratification of the component application field, based on different data processing levels.

EFFECT: improved version management.

23 cl, 8 dwg

FIELD: physics; computer engineering.

SUBSTANCE: invention relates to computer security. In the system, according to the invention, a basic operating system is used together with a highly reliable operating system. The basic operating system is at least a certain part of infrastructure of the highly reliable system. Occlusion of elements of the graphical user interface, related to the highly reliable operating system, is prevented. Also part of the secret information, which upon command can be displayed by elements of the graphical user interface, related to the highly reliable system, is stored. Coordination of defined components of images of all elements of the graphical user interface, related to the highly reliable operating system, also enables identification of valid elements. In the system for managing windows of the basic operating system there is public heading information for window identification, belonging to the process operating under control of the highly reliable operating system. Information of the secret heading, related to same window, is used only in the highly reliable operating system.

EFFECT: invention increases security of computer systems from hacking.

30 cl, 9 dwg

FIELD: physics; computer engineering.

SUBSTANCE: invention relates to architecture and a method of permitting display of digital content with the corresponding digital license, associated with a specific computer device. Transmitting and receiving computer devices are connected to each other over a network. A transmitting device transmits protected digital content to a receiving device such that, the receiving device can access that content even if the content is directly licensed to the transmitting device and not to the receiving device.

EFFECT: coordinated access to content between computer devices on a network.

20 cl, 6 dwg

FIELD: engineering of devices and methods for using server for access to processing server, which performs given processing.

SUBSTANCE: for this in accordance to method reservation is requested, reservation is confirmed, authentication information included in reservation information is stored, service is requested on basis of authentication information, server utilization is authenticated and server is utilized on basis of authentication result, while on stage of reservation confirmation device for controlling reservation transfers reservation setting information, and on stage of authentication server utilization is only confirmed when authentication information matches authentication information transferred from user terminal. Device contains receiving means, information generation device and transmitting means.

EFFECT: creation of method for using server, device for controlling server reservation and means for storing a program, capable of providing multiple users with efficient utilization of functions of processing server with simultaneous decrease of interference from unauthorized users without complicated processing or authentication operations.

6 cl, 51 dwg

Up!