Method of monitoring enforcement of house arrest with biometric authentication of monitored individual

FIELD: information technology.

SUBSTANCE: authentication device is used to store biometric data of a monitored individual by sensing a sequence from predefined handwritten words written by the monitored individual on a graphics pad. Each word is presented to the monitored individual before the individual repeats the word and the time allocated for the individual to write said word is limited. Further the biometric authentication device is trained to recognise said handwritten words and fragments thereof written by the monitored individual. Data input and training are carried out until first- and second-type error probability forecast falls to a given value for a predefined number of words. In authentication mode, verification words are presented to the monitored individual in a random sequence and the individual handwrites each verification word just presented recently. The obtained biometric data are then compared with reference data and an evaluation is made of the similarity of said words. The sequence of verification words presented to the individual is increased until a decision is made on the authentication result with the probability of first- and second-type errors, close to a predefined value.

EFFECT: high reliability of automated monitoring of enforcement of house arrest and avoiding the need to use hand and leg bracelets.

4 cl, 1 dwg

 

The invention relates to control the location of the convicted person (suspect) under house arrest, as well as control other restrictions of freedom of movement of citizens, imposed by law enforcement agencies on persons released on his own recognizance, probation and parole and early release with the right of abode only in the prescribed location.

A device - cuff-pad [1], limiting the freedom of action of the controlled person. The disadvantage of this device is causing people physical discomfort and harm when applying it. In addition, the use of such devices is not allowed when the control location convicted under house arrest. Requires direct control of the superintendent for performance imposed on human limitations, which in most cases eliminates the use of such tools.

A device capable of remotely controlling position of a convict in space, but also the state of the lock handcuffs (open/closed) [2]. This type of device capable of controlling the position of a prisoner without the presence of a human supervisor due to the fact that in handcuffs or in a foot pad mounted electronic components: sensor, vehicle GPS tracking, which organize the communication with the external server protection. The medium is in GPS tracking is actually GPS vehicle positioning his position, which tells the server protection current coordinates of the physical position of handcuffs (foot pads). In the case of changing the position of the electronic handcuffs, electronic pads on the leg (legs) of the security server generates an alarm. In addition, an alarm is generated if an attempt was made to remove the electronic handcuffs (e foot pad).

The practice of using such funds indicates the presence of false alarms related to failures of communication channels due to technical problems, bad weather conditions (for example, electromagnetic storms), and also because of the human factor (lack of a sufficient number of operators protection in the workplace).

Another disadvantage of such devices is that the use of electronic bracelets and electronic foot pads under house arrest violates the human dignity of the convicted because of the need to continuously bear in their bodies the foreign object.

There is a method of biometric authentication of the identity of the person [3] by obtaining the key from the parameters of the pattern of the fingerprint. The obvious positive effects of increased electronic handcuffs biometrics (from collaborative methods [2, 3]) is that is controlling the position not only of the handcuffs, but controlled human presence is adequate when authenticating near the controlling server.

The main disadvantage of this method [3] is that the pattern of the fingerprint, which is static (not modifiable) biometric image, the convicted person may make a dummy pattern of the fingerprint, to collude with another person to present to the controlling server, the dummy finger, and thereby mislead the control system of finding convicted under a house arrest or control other restrictions of freedom of movement of citizens, imposed by law enforcement agencies on persons released on his own recognizance, probation and parole and early release with the right of abode only in the prescribed location.

There is a method of identity authentication by voice [4], according to which controlled pronounces it knows the passphrase. Then this phrase is compared with its reference stored in the device. The positive effect from the use of voice biometrics in the execution control of house arrest is that of controlling the presence of the convicted person, the server checks the availability of the electronic bracelet, and human presence in the apartment where prescribed being convicted.

The main disadvantage of this method [4] is that the voice password can be recorded on any digital media or reproduced by another person. is destined may collude with another person, which will launch a digital recording voice password, presenting its controlling server and thereby mislead the control system of finding convicted under house arrest.

There is a method of identification by the peculiarities of the signature [5], according to which controlled should play your hand-written signature at the time of identification, the machine then compares the submitted sample with reference and makes a conclusion about their compliance. The positive effect from the use of biometrics handwritten images during the execution control of house arrest is that of controlling the presence server checks the availability of the electronic bracelet, and the presence of the person in the apartment where prescribed being convicted.

The main disadvantage of this method [5] is that a person's signature is quite stable and the convicted person can teach another person to play his signature at a fast pace. A prisoner may collude with another person to play someone else's signature, presenting it to the control device and thereby mislead the automatic control of the location of the convict, under house arrest.

The claimed invention is directed to solving the problem of increasing the reliability of the automated control of the IV is of house arrest convicted (suspect), control and other restrictions on freedom of movement imposed on the suspect by bodies of inquiry or convicted by a court.

The technical result consists in the rejection of the necessity of use causes physical discomfort electronic bracelets, worn on the hand or foot.

The technical result is achieved by using device authentication accumulate data on biometrics controlled by the perception of a sequence of pre-defined handwritten words, reproducible controlled on the tablet, with each word report controlled before its reproduction and limit the time allotted to him a manuscript play, then teach the biometric authentication device to recognize handwritten words and fragments, reproduced in a controlled, data entry and training is carried out until the moment when the forecast probability of errors of the first and second kind will be reduced to a specified value at a specified beforehand the number of test words, in the authentication mode report controlled test words in a random sequence, controlled reproduces handwriting each have just communicated to him the word verification in their handwriting, compare the received biometric data with their standards, and t is the train appreciate it, how they are similar, the sequence presented controlled test words increase until a decision has been taken about the authentication result with the probability of occurrence of errors of the first and the second kind is close to a predetermined value.

Additional technical effect is that when automatic biometric authentication in addition use the analysis of the pattern of the fingerprint and/or analysis of geometrical parameters of the body controlled or part thereof, for example, human face and/or hands and/or analysis of the characteristics of voice controlled and/or analysis of the pattern of the iris of the eye is controlled, in addition data about the ongoing multi-biometric authentication process together, document and transmit them to the control center for further review by the operator of control, in addition to the navigation bind to the satellites, the device performs authentication based on the position of several satellites, the choice of the satellites and time taking into account their data accidentally, in addition, control of vibrations and accelerations (motion sensors of the device authentication) and communicate this information to the control center, and control the power from the device authentication, changing environment the situation in the optical range and radio frequency control of the surrounding acoustic environment. The navigation receivers reference to the companions of the device authentication synchronize in a random order, and then control center jointly process the results of binding of coordinates to a map, updating them, and restoring the map of the intensity of the current noise and errors due to them, then identify possible inconsistencies in this map data of each of the multiple devices with biometric authentication.

The proposed method differs from the prototype and analogs, because the device authentication pre accumulates data on biometrics controlled by the perception of a sequence of pre-defined handwritten words, reproducible controlled on the tablet, with each word report controlled before its reproduction and limit the time allotted for his handwritten reproduction. For example, the inspection device displays or reproduces the voice of the word, which is controlled should write his handwriting on the tablet or on the sensitive screen of the device authentication. Device authentication informs controlled a series of words, and controlled plays all just reported to him the words of his handwriting. Words in a reproducible control of the m series are repeated.

Next, teach the biometric authentication device to recognize handwritten words and fragments, reproduced in a controlled, for example, this can be done by machine, made according to GOST R 52633.5-2011, which uses several of the same words, reproduced handwritten controlled.

When the training device biometric authentication control error probability authentication procedures according to GOST R 52633.3-2011. The input biometric data of monitored and training is carried out until the moment when the forecast probability of errors of the first and second kind will be reduced to a specified value at a specified beforehand the number of words.

In the authentication mode report controlled test words in a random sequence, then controlled reproduces handwriting each have just communicated to him the word verification in their handwriting. Device authentication compares the received biometric data with their standards, for example, feeding data to a pre-trained according to GOST R 52633.5 artificial neural network. Further evaluates how similar they are reproduced just the written word and the same word, reproduced previously controlled training device authentication.

The sequence presented controlled test words took the provide before while the device authentication does not decide on the authentication result with the probability of occurrence of errors of the first and the second kind is close to a predetermined value. Time, the authentication procedure may be different as different can be the number declared in the random controlled words, the procedure biometric authentication lasts until the device authentication will not come to a conclusion about the authenticity of a personality controlled with a predetermined probability of error or verify the presence of another person (a negative authentication result with a predetermined probability of error.

The technical result from the implementation of the method under item 1 of the claims is that the convicted person (the suspect) is not electronic handcuffs, however, at the specified time (or at a random point in time, if it is determined the control mode) device authentication notifies controlled on the need to prove their biometric authenticity. Further controlled enters handwritten dialogue with device authentication and confirms its biometric authenticity, if he (the prisoner or suspect) complies with the terms of house arrest or other forms of restriction of its freedom of movement.

The disadvantage of this method, th is defined under item 1 of the claims, that the convicted person (the suspect) is required when authenticating signature to be in the normal psycho-physical state. If controlled is in an altered psycho-physical state (stress, illness, intoxication), go through automatic handwriting checks he can't because his handwriting (the dynamics of handwriting) changes. Occurs when the reviewer personally knowing controlled, must arrive at the location of the device authentication and implement additional organoleptic identification or controlled to perform additional automated biometric authentication, for example, the pattern of the fingerprint is carried out in the presence of the inspectors, which ensures the absence of controlled dummy "Alien" fingerprint.

This drawback of the method according to p. 1. eliminated by the method proposed by p. 2 claims. If not controlled can independently undergo the procedure handwritten biometric authentication dialog, the device authentication requires him to authenticate through the presentation of a pattern of the fingerprint and/or geometric parameters of the body controlled or part thereof, for example, a person's face when they hear them specified by the device authentication g is of losovyj phrases. Device authentication may require controlled to approach the camera and show the camera the picture of his iris. The device authentication document data from ongoing multi-biometric authentication. The data are processed together, then transmitted to the control center for further review by operator control, and software machine control biometric authenticity in the center of the control.

Additional technical result from the implementation of the method according to p. 2 is that increases the reliability of the received device authentication solutions through the use of additional multi-biometric parameters controlled and authentication is carried out in automatic mode, and delayed automatic mode under the control of the operator, personally knowing controlled. The operator provides additional control is out of line, slica voice controlled his face with the available samples, and controlling the timing of voice phrases with facial expressions and variation lips monitored.

The disadvantage of this method that implements PP.1, 2 claims, is to attack the unauthorized transportation of biometric authentication when zlomislic the nick covers the biometric authentication device screen and creates under the screen electromagnetic environment equivalent to the place of house arrest. In this antenna device, biometric authentication, see electronic emulators moving satellites navigation characteristic point in space, where should serve house arrest convicted person (the suspect).

This defect fixes a method, implemented on p. 3 claims. Under item 3 formulas device authentication provides navigation bind to the satellites, based on the position of several satellites, the choice of the satellites and time accounting data is random. In addition, the device authentication controls your vibration and acceleration (motion sensors) and reports this information to the control center. As well as device authentication controls off, changing environmental conditions in the optical range and radio frequency, and controls the surrounding acoustic environment.

Additional technical result from the implementation of the method according to p. 3 is that the biometric authentication device actively monitors its state and the state of the environment (vibration, acoustic, electromagnetic). The inspection is carried out on multiple navigation satellites whose data are recorded in a random order, at a randomly chosen instant of the time, what makes attacking creating emulator surrounding the device authentication electromagnetic environment. In addition, the transportation device authentication is excluded by the operation for internal motion sensors, additionally, the device authentication controls optical environment around him and the electromagnetic environment around him, and the power is off. This precludes attempts to approach the device authentication without recourse to convict (untried) and enter the device authentication misled by the unauthorized transportation together with the convict (untried).

The drawback of the method according to p. 3 formulas of the invention is the low accuracy of the computations of coordinates, the device authentication.

This disadvantage is eliminated, if you implement the method according to p. 4 claims, which is that part of the adjacent device authentication is synchronized between themselves and simultaneously observe the same signals of navigation satellites, then these data are processed in the control centre, which carries out the coordinate of each device authentication by knowledge of their coordinates and joint array processing the received data. While restoring map intens is vnesti interference, imposed on the data obtained, further Refine the data and simultaneously perform the detection of potential attacks on each specific form of authentication. The attack is detected by the difference data is significantly overestimated the noise level near one of the biometric authentication devices compared to the projected average level and compared with the noise level recorded on other devices biometric authentication.

Additional technical result from the implementation of the method under item 4 is to improve the accuracy of calculating the coordinates of each device authentication by the compensation of natural interference [6, 7], over the close device authentication, in addition to reveal attempts to attack individual device authentication by setting sources of interference [8]. The attacker cannot attack multiple device authentication, as it does not know in advance what satellites will be used by the device and at what times, and which pairs (or threes, fours, fives) device authentication data from the same satellites at the same time.

An example implementation of the methods on PP.1, 2, 3 claims in the form of device shown in Fig.1, where 1 - device authentication, consisting of lansheng computer with sensitive screen, 2 - modem connection with the control center 3 - external camera with lights and microphone, 4 - lens, built-in tablet computer - 1 video camera with lights and microphone, the satellites of the global navigation system - 5, 6, 7.

The proposed device comprises a tablet computer - 1 with sensitive screen, a built-in microphone and built-in video camera having a lens - 4, tablet computer 1 is connected to an external power supply and to the service provider through the modem 2. In addition, the tablet computer 1 connected external camcorder - 3 with a microphone, which has its own illumination, and its lens is aimed at tablet PC - 1. Tablet PC - 1 has a built-in vibration sensor and acceleration, built-in microphone and built-in navigation receiver oriented to receive signals of navigation satellites.

The device operates as follows: controlled under the control (in the presence of the person who installs the device authentication), writes his handwriting the words that appear on the screen of a tablet PC - 1. So in Fig.1 shows the case where the screen of a tablet PC - 1 appeared the word "House" and controlled wrote his writing that word on the sensitive screen of a tablet PC. Before starting the tablet is the first computer is connected to AC power and is physically secured in the apartment controlled, for example, prevernal screws with seal to the window-sill of one of the apartment Windows.

Under the supervision of inspectors, controlled writes the words that appear on the screen of a tablet PC. However, the word "House" appears several times in a reproducible controlled sequence of handwritten words. All controlled should write about 20 test words, reproducing each test word about 10 times. The number of words specified after training, the neural network tablet PC software machine made according to GOST R 52633.5-2011 "information security. The technique of information security. Automatic training of neural network converters biometrics-access code". Next, the trained neural network is tested according to GOST R 52633.3-2011 "information security. The technique of information security. Testing resistance means highly reliable biometric security to attack selection". If the quality of the neural network is sufficient, then the training stops. If it is insufficient, then the examples of handwritten words used for testing, add in a training sample and re-trained artificial neural network.

During the control of the convicted person (suspect) tablet computer generates an alarm signal at a random point in time, the sound of the alarm control Studio strobe, flash is Amy should approach the tablet computer 1, to see the handwritten word on the screen and write it with his own hand on the sensitive screen of a tablet PC. This word is converted artificial neural network code, which must be the same in whole or in part the source of this word, used for training the artificial neural network. Next tablet computer displays another in the word verification and controlled writes the word with his hand on the sensitive screen of a tablet PC - 1. Controlled writes from two to five test words depending on a predetermined threshold probability of errors of the first and second kind. The program is a tablet computer with a predetermined probability is convinced that he is himself controlled.

Next tablet computer 1 communicates with the control center via the modem 2 and transmits to the control center message about the positive result of another biometric authentication controlled (convicted, the suspect) in encrypted form.

If controlled (convicted, the suspect left his apartment, he could not alarming signal to approach the tablet computer 1 and to write his handwriting first, second, third test word. In this case, the biometric authentication device generates an alarm signal and from Rawley it in the control center.

The control center can be sure that is controlled at home (under house arrest) due to the fact that the receiver of the tablet PC - 1 in a pre-selected random points in time receives signals 7, 6, 5 navigation satellites, calculates their position and sends it in encrypted form in the center of the control.

The control center can be sure that is controlled at home (under house arrest) due to the fact that controlled cannot know the time of binding tablet PC - 1 to the satellites and cannot know which satellites are used. That is controlled not have the technical tools emulation signals of navigation satellites.

In addition, a controlled may not push a tablet computer - 1, without breaking the seals, and without triggering motion sensors located in a tablet PC - 1. Additional means of self-control are two video cameras.

External camcorder - 3 is located in such a way as to control the tablet computer 1 and the space surrounding it. This external camcorder - 3 sees tablet PC - 1 and control the approximation to convict him (the suspect) continuously without allowing access alarm sound signal. Tablet computer - 1 remembers his image and constantly compares it to a reference, actually working as a motion detector.

Internal camera with lens - 4 also operates in the mode of movement control, by memorizing above computer - 1 space of the apartment. Any change in the image of this space at the wrong time is perceived tablet computer 1 as an attempt attacks on its integrity.

When controlled is under stress, it cannot reproduce the manuscript presented to him a sequence of test words. The fact negative biometric authentication tablet computer informs the control center. This starts the delayed multi-biometric authentication. In this mode, the computer 1 are asked to respond by voice controlled on the issues, in addition tablet computer asks controlled to move the person's head falls and rises and rotates from right to left and from left to right), while the internal camera with lens 4 and the external camcorder - 3 document data, in addition documented the responses of the controlled microphones these two cameras. Video data and audio data are sent to the control center.

In the control center of the human operator out of line compares the received biometric information similar to the data controlled, removed previously. The operator-controller concludes that the presence of controlled under house arrest or his substitution. In addition, the reviewer may postpone the decision and send the information to the operator controller, who personally knows (seen and heard) controlled. In addition, reviewers can run automated authentication voice biometrics and its controlled three-dimensional portrait on the basis of the obtained data. This automatic authentication performed by different experts (experts voice technologies and experts on automatic recovery of the three-dimensional image of a human face).

Positive technical effect of the above devices is automated biometric verification execution of house arrest. The critical situation of getting controlled in a stressful condition rare. The basic mode of operation of the proposed device is automatic biometric authentication of the convicted person (suspect) on the unique dynamics of handwritten play them a series of random sequence of test words.

Positive technical effect of the application of the proposed device is the possibility of its application to control execution boundary is tions imposed by law enforcement agencies for persons released on his own recognizance, probation and parole and early release with the right of abode only in the prescribed location. In this case, the proposed early warning device controlled on the time following a biometric scan.

Sources of information

1. Application No. 2001111900/12, 27.04.2001 "HANDCUFFS-PAD". Published: 27.11.2003, author Petrov, C. A., the applicant Joint stock company of the closed type Firm "PRETTY".

2. Application No. A GLOBAL SATELLITE POSITIONING SYSTEM TRACKING SYSTEM FOR HANDCUFFS AND FEETCUFFS". Pub. Date: Aug. 18, 2011, U. S. C1. 342/357.25; 342/357.54, Inventor: Charles Chu, Banciao City, TW).

3. Patent No. RU2363048 C2 "METHOD of GENERATING a set of PARAMETERS of the ACCESS KEY AND SYSTEM FOR AUTHENTICATING a PERSON BY FINGERPRINT, the application 2007137718/09 from 11.10.2007. Published: 27.07.2009, author of beeps Vladimir the great.

4. Patent RU 214826 "a Method of automatic identification, priority 17.08.1998, the authors Bochkarev, S. L., Ivanov A. I., Andrianov centuries, Bochkarev C. L., Oskin C. A., the owner of the patent of the FSUE "Penza research Institute of electrical engineering".

5. Patent RU 214827 "Method of identification by the peculiarities of the signature, priority 17.08.1998, the authors Ivanov A. I., Sorokin, I. A., Bochkarev C. L., Oskin C. A., Andrianov centuries, the owner of the patent of the FSUE "Penza research Institute of electrical engineering".

6. http://ru.wikipedia.org/wiki/�__

7. http://ru.wikipedia.org/wiki/__

8. The antidote accurate bombs. Recipe from the Russian company "aviconverter". Journal Of Defense Express No. 5, 2007.

1. The method of controlling the execution of house arrest with biometric authentication controlled, consisting in the use of satellite navigation system that determines the location of the device, which controls its integrity, and authentication is controlled using a means of communication between the device performing the periodic authentication is controlled, and the control center for the periodic report on the results of performance monitoring house arrest in encrypted form, and data integrity of the components of the device authentication, characterized in that the device authentication accumulate data on biometrics controlled by the perception of a sequence of pre-defined handwritten words, reproducible controlled on the tablet, each word report controlled before its reproduction and limit the time allotted to him a manuscript play, then teach the biometric authentication device to recognize handwritten words and fragments, reproduced in a controlled, enter, and then the training is carried out until the moment when the forecast probability of errors of the first and second kind will be reduced to a specified value at a specified beforehand the number of words in the authentication mode report controlled test words in a random sequence, controlled reproduces handwriting each have just communicated to him the word verification in their handwriting, compare the received biometric data with their standards, and assess how similar they are, the sequence presented controlled test words increase until a decision has been taken about the authentication result with the probability of occurrence of errors of the first and second kind, close to a predetermined value.

2. The method according to p. 1, wherein when the automatic biometric authentication in addition use the analysis of the pattern of the fingerprint, and/or analysis of geometrical parameters of the body controlled or part, such as a human face and/or hands and/or analysis of the characteristics of the voice controlled, and/or analysis of the pattern of the iris of the eye is controlled, in addition, data about the ongoing multi-biometric authentication process together, document and transmit them to the control center for further review by the operator of the control.

3. The method according to p. 1, characterized in that the navigation ... the ku to the satellites, the device performs authentication, based on the position of several satellites, the choice of the satellites and time taking into account their data accidentally, in addition, the device authentication controls your vibration and acceleration (motion sensors) and reports this information to the control center, as well as device authentication controls off, changing environmental conditions in the optical range and radio frequency, and controls the surrounding acoustic environment.

4. The method according to p. 3, characterized in that the navigation receivers reference to the companions of the device authentication synchronize in a random order, and then control center jointly process the results of binding of coordinates to a map, updating them, and restoring the map of the intensity of the current noise and errors due to them, then identify possible inconsistencies in this map data of each of the multiple devices with biometric authentication.



 

Same patents:

FIELD: physics.

SUBSTANCE: invention can be used when employing detection means with an extended linear part, which are based on a wave-conduction or vibration detection principle, for signalling coverage of a four-way road intersection and detours thereof. The method includes deploying, at a four-way road intersection and the adjacent area, two detection means with an extended linear part such that the extended linear part of each means overlaps two different roads, one twice and other once, with the ratio between the distances from the centre of the intersection to the intersection points of 1:2:1 and using an output algorithm which determines the direction of movement from a sequence of one to four alarm signals coming from the detection means over a set time for accumulation thereof, and the ratio between time intervals of delay between the arrival of signals. The method includes a preparatory step with deployment based on a developed scheme of the extended linear part of two detection means on an area and a main step which begins from the moment an offender enters the detection area of one of the detection means, during which the offender is detected, and the direction of movement of the offender is determined.

EFFECT: high probability of detection and accuracy of indicating the direction of an offender during signalling coverage of a road intersection and detours thereof using only two detection means.

13 dwg

FIELD: transport.

SUBSTANCE: proposed system comprises carrier motion parameter analyser, analyser signal receiver, unit to transmit data on permissible parameters of carrier motion in the zone of definite traffic sing and light, generator of permissible parameters of carrier motion in the zone of said definite traffic sing and indicator of pedestrian and cyclist location.

EFFECT: expanded range of controlled parameters, possibility to reconstruct traffic accidents.

1 dwg

FIELD: transport.

SUBSTANCE: cargo control device includes main device, video signal output device and video signal input facilities. The main device and video signal output device are located in vehicle cabin. Video signal input facility is located in vehicle basket and intended to receive cargo image. The main device includes the following: computing device in the form of PC, high-capacity accumulator, control panel, video signal output converter, signal receive multiplier, device providing connection to network (3G modem).

EFFECT: improved cargo control.

4 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to a satellite security-search system, which relates to systems for monitoring, tracking and controlling ground, water, sea or air-borne vehicles, which can be used for centralised monitoring of the state and location of serviced vehicles, remote control of units and assemblies of vehicles, and for searching for a vehicle and assisting a driver (owner) and passengers in emergency situations, for example, in case of vehicle theft or hijacking. A system for controlling a vehicle, facilitating search and identifying a hijacked/stolen vehicle in a central control unit 6 of a security/anti-theft subsystem 4 of a user system 1 includes a detachable identifier 21 of the security/anti-theft subsystem, exchange of output and input signals with the central control unit of which occurs in the infrared region based on an asymmetric coding algorithm with key length of more than 65 bytes, initiation of the detachable identifier is carried out with at least three secrete PIN codes, wherein the first PIN code is the working PIN code, the second PIN code is the alarm PIN code and the third PIN code is a service PIN code; PIN codes are entered into the detachable identifier using a key chain 22, also operating in the infrared region based on an asymmetric coding algorithm with a key length of more than 64 bytes. Correct entry of PIN codes should be confirmed by a brief light (sound) signal on the display of the key chain; the central control unit 6 of the security/anti-theft subsystem of the user system comprises a PIN code identification unit 23; the working PIN code is entered every time the identifier of the security/anti-theft subsystem of the user system is installed; the alarm PIN code is entered if the vehicle is hijacked and if the life and wellbeing of the user and passengers is under threat; the service PIN code is entered if there is need for authorised dismantling of the satellite security-search system. The detachable identifier of the security/anti-theft subsystem, key chain and PIN code identification unit are made using technologies which prevent unauthorised access, copying of information using devices and visual analysis of printed-circuit boards.

EFFECT: effective prevention of unauthorised access.

5 dwg

FIELD: fire safety.

SUBSTANCE: device of simulation of protection of group of controlled objects consists of a control unit comprising a management unit, a unit of generating of codegram of the next step, the generator of first pseudo-random sequence (generator of PRS-1), the modulator unit, the generator of second pseudo-random sequence (generator of PRS-2), the switchboard comprising a switching unit with N lines of communication, N units of comparison on the number of the controlled objects, each of which consists of a memory element of the value of the generator PRS-2 of the control unit (ME of the value of the generator PRS-2 of the control unit), the unit of logical operations XOR (logical operation "exclusive OR") consisting of n units XOR, on the number of bits in the binary representation of the codegrams of the first and second pseudo-random sequences, the memory element of the value of the generator PRS-2 of the controlled objects (ME of the value of the generator PRS-2 of the controlled objects), control unit of serviceability of the object and the controlled object, consisting of a unit of memory of the next step, the comparison unit, the demodulator, the memory unit, the matching device, the modulator, the generator PRS-2.

EFFECT: providing simultaneous protection of group of controlled objects connected independently from each other on the star topology, simplification of the technical implementation and improvement of the data processing rate.

2 dwg

FIELD: physics.

SUBSTANCE: invention can be used in cases where detection means with an extended detachable linear part are used at a location which intersects with a road (highway) network where the speed range of an offender is known. The method involves deploying on a local area of the location of a signalling boundary with given geometric dimensions, which includes two detection means with an extended detachable linear part, followed by determining the direction of movement using an algorithm which establishes the identity of the obtained delay time interval between successive arrival of alarm signals from the detection means to one of three ranges of time intervals, calculated analytically for each direction of movement, taking into account the possible speed range of the offender at the given location and individual distances between detachable linear parts on said areas.

EFFECT: determining direction without deploying additional detection means.

14 dwg

FIELD: information technology.

SUBSTANCE: method consists in analytical calculation of the direction of movement of an intruder based on the a priori known speed of the intruder and the recorded time delay in arrival of alarm signals from three detachable linear parts deployed on an area as a single signalling secure boundary with given geometric dimensions. The method includes a preparatory step for deploying linear parts of detachable means of detection with orientation thereof on the area and relative each other on a set scheme and practical determination of the probable speed of the intruder through the secure boundary and the main step which begins from the moment the intruder crosses the secure boundary. During the main step, time intervals between alarm signals when the linear parts are broken are recorded. Based on said time intervals and the a priori known speed of the intruder, the direction of movement of the intruder is calculated and indicated on the scheme.

EFFECT: less time spent on determining the direction of movement of an intruder, remote, automatic and real-time determination of the direction of movement of the intruder.

7 dwg

FIELD: information technology.

SUBSTANCE: method consists in analytical calculation of the point of intrusion based on the recorded time delay in arrival of alarm signals from three detachable linear parts deployed on an area as a single secure boundary with given geometric dimensions. The method includes a preparatory step for deploying linear parts of detachable means of detection with orientation thereof on the area and relative each other on a set scheme and the main step which begins from the moment an intruder crosses the secure boundary. During the main step, time intervals between alarm signals when the linear parts are broken are recorded, and the point of intrusion is calculated with indication thereof on the scheme based on relationships between the measured time intervals and known geometric dimensions of the secure boundary.

EFFECT: high accuracy of determining the point of intrusion with detachable means of detection in real time, remotely and automatically.

9 dwg

FIELD: mechanics.

SUBSTANCE: module for connection system (100) includes base (152) and sealing element (170) that is arranged on base (152) and intended to seal the gap between module (150) and other module (110) of connection system (100). Sealing element is bistable sealing element (170) that can receive the first spatial configuration and the second spatial configuration that differs from the first one. Connection zone is released in the first spatial configuration so that module (110) can be connected to module (150) and/or disconnected from it without interference on the side of sealing element (170). Sealing element (170) seals the gap between both modules (150, 110) in the second spatial configuration. Also, connection system (100) containing the above modules (150, 110), as well as the sealing method, are described. Besides, the peripheral unit and the building control system, which contain the above connection system, are described.

EFFECT: possibility of detachable mechanical connection of two different modules.

11 cl, 3 dwg

FIELD: information technology.

SUBSTANCE: interface is set up between an IMS network and a call processing system using a parameter temporary storage - data base.

EFFECT: possibility of transmitting additional information fields of signalling IMS SIP between an IMS network and a call processing system, which are separated by a signalling network which does not support transmission of these information fields.

3 cl, 3 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to computer engineering and can be used in video analysis and processing systems. The apparatus for automated facial recognition when processing a group photograph comprises a unit for searching for regions containing faces, a decision unit, wherein the output of a unit for localising facial regions (1) is connected to the input of a unit for separating the image into a background and an object (2), the output of which is connected to the first input of an image normalisation unit (3); the output of a control unit (9) is connected to the second input of the image normalisation unit (3), the output of which is connected to the input of a unit for generating vectors of facial features (4), the output of which is connected to the input of a buffer unit (5), the output of which is connected to the first input of a comparator unit (6); the output of a delay unit (7) is connected to the input of a unit for generating vectors of facial features (8), the output of which is connected to the second input of the comparator unit (6), the output of which is the data output of the apparatus.

EFFECT: automated facial recognition when processing a group photograph.

1 dwg

FIELD: physics.

SUBSTANCE: device comprises P units for selecting a maximum signal, P units for calculating an activation function, P groups of multiplier units, P groups of decoders and P groups of units for generating membership function values.

EFFECT: high accuracy of recognition when recognising objects in conditions without or with strong distortion of separate areas of an image, broader functional capabilities.

1 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to a method of identifying and classifying an object. The method comprises the following steps: detecting an object using at least one physical detector disposed on said object; using the output signal of the detector, by forming a threshold value, and an analysing device to detect at least one object defined as a singly-connected region having defined physical properties which uniquely distinguish the object from other objects; identifying and/or classifying the object from the output signal based on predetermined properties; using the output signal for the object to deduce multiple different physical features; based on the selected physical features, associating the object with at least one of N predetermined base classes; ordering the N base classes in a predetermined sequence into an N-dimensional vector V, which is associated with the object, wherein elements v1…vN of the vector V indicate the identity of the object to the corresponding base class; depending on the vector V, associating the object with an arbitrary class selected from a reference database, wherein if the object belongs to the corresponding base class, the vector element v1…vN is assigned a binary value "1", otherwise the binary value "0" is assigned.

EFFECT: faster identification and classification of objects by predefining N base classes ordered by an N-dimensional vector V.

2 cl, 2 tbl

FIELD: physics.

SUBSTANCE: database of users allowed to access a system is formed from sampled and quantised readings of handwriting samples of a matrix of two-dimensional discrete Haar transform coefficients. When allowing a new user into the system, a matrix of two-dimensional discrete Haar transform coefficients similar to the reference sample is formed from the sampled and quantised readings of handwriting samples of that user. Comparison is carried out and a decision is made to associate the obtained record to one of the reference records.

EFFECT: high reliability of authorised access in systems requiring use of personal identification means.

2 cl, 4 dwg

FIELD: information technology.

SUBSTANCE: device comprises the pretreatment units of first and second images, the recording units of first and second images, the conversion units of first and second images into a color space YIQ, the enhancing units of the real component of first and second images, the image forming units as a result of rotation of the first and second image, the units of image forming in changing the angle of inclination of the first and second images, the units of storage of simulated images for the first and second images, the unit of application of the method SIFT, the calculation unit of quantity of equal descriptors, the unit of storage of the found pair of duplicates.

EFFECT: ensuring the ability to compare the descriptors applied to the task of searching image duplicates.

5 dwg

FIELD: physics.

SUBSTANCE: device additionally includes a register of criteria codes, a unit of memory of criteria codes, a decoder of criteria codes and a unit of result memory.

EFFECT: increased efficiency of a device due to reduced quantity of requested criteria of recognition for instances, when the result becomes available in advance by the current situation of recognition.

5 dwg, 2 tbl

FIELD: radio engineering, communication.

SUBSTANCE: image recognition device contains a multichannel switch, an ADC, a marker associativity coefficient memory unit, a logical AND unit, a shift register unit, a control unit, a logical OR element, an address register, an address selection memory unit, a buffer register.

EFFECT: device performance improvement.

4 dwg, 4 tbl

FIELD: textiles, paper.

SUBSTANCE: invention relates to a paper sheet processing device. A paper sheet processing device in accordance with the present invention comprises: a unit of image formation, made with the ability to capture an image of a paper sheet and to generate an image of a paper sheet; an identification unit made with the ability to identify symbol of each digital position included in the serial number from the serial number area of the image of the paper sheet; an output unit made with the ability to output an image of the part corresponding to the serial number part of the paper sheet image, when there is a digital position which symbol can not be identified by the identification unit; a display unit made with the ability to display each symbol identified by the identification unit, and the image output from the output unit; and the input unit made with the ability to receive input of each symbol corresponding to the digital position which symbol can not be identified by the identification unit.

EFFECT: improving performance in identification of the symbol.

13 cl, 12 dwg

FIELD: physics.

SUBSTANCE: method includes: estimating a statistical model of positions of anatomical points; training an anatomical point detector; obtaining a three-dimensional image of the region of interest; detecting a plurality of anatomical point candidates; searching for the best configuration of anatomical points among the candidates; constructing view planes based on the found configuration of anatomical points; estimation of parameters of said statistical model is carried out using an annotated plurality of three-dimensional images; the anatomical point detector is trained using energy of said statistical model as parts of a loss function; detection of the plurality of anatomical point candidates is carried out with an anatomical point detector which is trained using said algorithm; the search for the best configuration of anatomical points is carried out using a greedy iterative search of a configuration which minimises said energy of the statistical model. System realises method's actions.

EFFECT: high efficiency of automatic planning of two-dimensional views in three-dimensional medical images.

11 cl, 5 dwg

FIELD: physics.

SUBSTANCE: method for comprehensive inspection of people at checkpoints includes identification based on hand shape and an access code and gas analytical detection of trace amounts of hazardous substances, wherein the beginning of inspection includes personal identification based on a digital code, performing biometric verification of the identity based on hand shape while simultaneously inspecting the hand position on a sampling plate, which includes reading hand parameters and comparing hand parameters obtained from scanning with reference values stored in the database of an inspection and access control system; after removing the hand from the sampling plate, before the beginning of gas analysis, the region where the hand was located is insulated with a protective cover; a gas analyser then automatically moves towards the sampling plate, after which the sampling plate is heated to a certain temperature, and the vapour of the left traces enters the gas analyser; the comprehensive inspection result is sent to the inspection and access control system.

EFFECT: automation and high efficiency of detecting trace amounts of controlled substances on hands, high sensitivity and reliability of detecting trace amounts of substances coupled with biometric verification of a person from hand shape.

FIELD: automated recognition of symbols.

SUBSTANCE: method includes following stages: tuning, forming symbols models, recognition, recording background model together with background of read image, separating model of registered background from elementary image of background, combining for each position of symbol of model of letters and/or digits with elementary displaying of appropriate background, forming of combined models, comparison of unknown symbols to combined models, recognition of each unknown symbol as appropriate symbol, combined model of which is combined with it best in accordance to "template comparison" technology.

EFFECT: higher efficiency.

10 cl, 10 dwg

Up!