Secure information transmission method

FIELD: radio engineering, communication.

SUBSTANCE: if the bits of a digital image signal byte and message signal byte coincide, then the logical "1" value is assigned. Otherwise, the logical "0" is assigned. Then, a {F} array is formed to record the logical values. The latter are stored in the {F} array after comparison of the digital image signal and message signal bytes. Afterwards, the logical values are read from the {F} array. Then, a message marker packet is formed with recording the logical values from the {F} array to the information field of the packet. The marker packet and digital image packet are transmitted using different communication channels.

EFFECT: higher security of confidential information transmission.

3 dwg

 

The invention relates to telecommunication and can be used to provide secure communication of sensitive information through open communication channels.

A method of embedding additional information into a digital image in which to counter some analysis methods when recording information using only a portion of least significant bits in bytes of color representation of the original image, the remaining bits are used for the subsequent correction of the most important statistical parameters (See Provos N. Defending Against Statistical Steganalysis, Proceeding of the 10 USENIX Security Symposium, 2001, p.323-335).

The disadvantage of this method is that corrective changes lead to additional distortion of the digital image and reduce the throughput of steganotaenia using part of the space under the corrective information. Besides corrective fixes aimed at countering any of the methods of statistical analysis due to a correction of one of the parameters, can lead to a further distortion of the other parameters and, consequently, more likely to detect the covert channel by other methods of analysis. In particular, the distortion introduced by the introduction of additional information and corrective changes when using this method, can� to be visible when conducting visual analysis of bit layers of the resulting image.

Also known a method of embedding additional information into a digital image according to the patent of Russian Federation №2288544, publ. 27.11.2006, bull. No. 33), namely that the original digital image display on bitmap layers, to record additional information select one of the received bit layers, which is presented as a bit sequence, the entry of additional information is performed by code in the received bit sequence, the bits located at the border of all transitions of the same sequences of zeros and ones, replace in accordance with writable bits of additional information, the remaining bits of the underlying bitmap layers, if necessary, used for correction of the original image or to record other additional information.

The disadvantage of this method is the necessity of correction of the statistical characteristics, which leads to increased processing time of the image and to decrease the amount of embedded information. The increase in the amount of embedded information is achieved through the use of a bit older layers, which leads to a further change in the input image.

The closest in technical essence to the proposed method is a method of embedding messages in digital images�tion according to the patent of Russian Federation №2407216, publ. 20.12.2010 g, bull. No. 35, which consists in replacing the least significant bit in the byte of the source digital image, wherein the least significant bit in the byte of the source digital image is assigned a flag value of "unit" in case of coincidence of a part of bits of the bytes of the digital image signal and bits of the message signal or the flag value "zero" if there is a mismatch, wherein the adjustment of the distribution statistics of the least significant bits produced by the remaining parts thereof, not used as flag values.

The disadvantage of this method is the low secrecy of the transmission of confidential information over public channels. because of the distortions of statistical parameters of a digital image when embedding the message.

The technical result of the claimed technical solution is to increase the secrecy of the transmission of confidential information due to the lack of direct embedding messages in digital images and digital image and the marker packet of the message through various channels of communication.

In the claimed invention the technical result is achieved in that in the known method of embedding messages in digital images is assigned a flag value of "unit" in case of coincidence of a part of bits of the bytes of the digital image signal and a bit signal�La message or flag value "zero" otherwise, additionally formed in the array {F} for storing the flag values. Save the result flag values in the array {F} after comparing the portion of bits of the bytes of the digital image signal and bits of the message signal. Form marker message packet after filling the array {F} flag values, with read flag values from an array {F}, and write them in the information field of the packet. Transmit the token packet and the packet with a digital image through different channels of communication.

A new set of essential features allows to achieve the said technical result due to the lack of direct embedding messages in digital images and digital image and the marker packet of the message through various channels of communication.

The analysis of the level of technology has allowed to establish that the analogues, characterized by a set of signs, identical to all features of the claimed technical solution available, which indicates compliance of the claimed method the condition of patentability "novelty."

Search results known solutions in this and related areas of technology with the purpose of revealing of signs consistent with the distinctive features of the prototype features of the claimed object, showed that they do not follow explicitly from the prior art. The prior art also� not revealed the prominence of distinctive essential features, contributing to the same technical result achieved in the claimed method. Therefore, the claimed invention meets the condition of patentability "inventive step".

The inventive method is illustrated by drawings on which is shown:

Fig.1 is a block diagram of the algorithm that implements the claimed method for hidden information transfer;

Fig.2 is a drawing explaining the process of forming a bit sequence of a marker message {F};

Fig.3 is a block diagram of the algorithm that implements the method of message retrieval from digital images.

The implementation of the inventive method is explained as follows. Form arrays for storing a bit sequence of a digital image {Ci} where i=1, 2...K, the bit sequence of the message {Tj}, where j=1, 2...N, the bit sequence of marker messages {Fj} where i=1, 2...K (Fig.1, block 1). Next is filling the arrays {With} and {T} bit sequences (Fig.1, blocks 2, 3). Make installation of counters in the initial state i=1 and j=1 (Fig.1, block 4). Sequentially read from the respective arrays of the values of Ciand Tjand compare them (Fig.1, blocks 5, 6). If the bit values match, then the flag value Fiset in the "unit" and increase the values of the counters i and j per unit (figs.1,the blocks 7, 9, 10).

If the bit values do not match, the flag value Fiset to "zero" and increase only the value of the counter i (Fig.1, the blocks 8, 10). After the entire bit sequence of the message is reflected in the bit sequence of the digital image (Fig.1, block 11) carry out the formation of a package of marker messages containing data in the array {F} (Fig.1, block 12), which in the information field of the packet network layer sequentially write the data from the array {F}. Next, form the package information message containing the digital image (Fig.1, block 13) in the information field of the packet network layer sequentially write the data from the array {}. After that, realize transmission of packets over different communication channels (Fig.1, unit 14).

Consider the example of forming the bit sequence of a marker message. Fig.2 shows the bit sequence of the message and the digital image. For clarity of the example, the message and the digital image are grouped into two bits. It then compares the two message bits with two bits of a digital image. If the bits are not equal, the array sequence of marker messages {F} write a zero and take for comparison the following two bits of a digital image. If bit� equal, in an array sequence of a marker message {F} write unit, and for comparison we take the following two bits and messages, and digital images. After all bits of the sequence were assigned to the flag value in the array {F}, form a package of marker messages containing the data array.

The process of message retrieval from digital images using marker messages shown in Fig.3 and is explained as follows. Form arrays for storing a bit sequence of a digital image {PQ}, where i=1, 2...K bit sequence of a marker message {PFf}, where i=1, 2...N, the bit sequence of the message {PTj}, where j=1, 2...N (Fig.3, block 1). Next, perform reception of different channels of communication of packets of information messages and marker posts (Fig.3, block 2, 4). These data packets are recorded in the appropriate arrays (Fig.3, block 3, 5). Make installation of counters in the initial state i=1 and j=1 (Fig.1, block 6). Sequentially read from the respective arrays of the values of PQ and PF (Fig.1, unit 7). If the value of the flag PFjequal to one (Fig.1, block 8), the value of a bit sequence PQ is written in the cell of the array PTj(Fig.1, block 9) and increase the per unit values of the counters i and j (Fig.1, block 10, 11). If the value of the flag F jequal to zero, then increase only the value of the counter i (Fig.1, block 11). After all the flag values have been read (Fig.1, block 12) decide on acceptance of the message (Fig.1, block 13).

Thus, the inventive method due to the lack of direct embedding messages in digital images and digital image and the marker packet of the message through different channels of communication can improve the secrecy of the transmission of confidential information, thereby ensuring the achievement of the technical result.

Method of hidden information transmission, namely that assign a flag value of "unit" in case of coincidence of a part of bits of the bytes of the digital image signal and bits of the message signal or a flag value of "zero" for mismatch, characterized in that form the array {F} for storing the flag values, save the result flag values in the array {F} after comparing the portion of bits of the bytes of the digital image signal and bits of the message signal, the read flag values from an array {F}, form marker message packet, what is recorded in the information field of the packet flag values from the array {F}, pass marker package and a package with a digital image through different channels of communication.



 

Same patents:

FIELD: physics, video.

SUBSTANCE: present invention relates to a method of providing a television viewer direct access to universal resource identifiers (URI), associated with television content already viewed by the television viewer. The technical result is achieved by monitoring viewed television content, and URI associated with television content already viewed are automatically determined without human interference and can be accessible for a television viewer through a content service. The content service can be a web server which can be accessed by a television viewer through a browser application operating in the communication terminal of the television viewer. A television viewer can access the content service to call URI which can be used to sample Internet content associated with television content from the corresponding web server through a communication terminal.

EFFECT: automatic reception and use of URI which can be demonstrated to users along with television content.

31 cl, 11 dwg

FIELD: physics, control.

SUBSTANCE: present invention relates to an odour generating system used to create an olfactory effect in demonstration halls, for example, a cinema. The system consists of a cinema, seats and an odour generating device, which is selectively matched with image information, odour providing pipes, said pipes being located on one side of each seat, wherein the odour generating device comprises: an odour selection unit for obtaining DMX512 odour selection signals and selecting odour such that odour information, suitable for a theme condition which corresponds to the image information, is matched with the image information; a receiver for receiving odour selection signals selected for matching with the image information from the odour selection unit; a main control unit (MCU) for obtaining odour selection signals transmitted from the receiver and controlling switching elements in order to control the strength of odour, a spray mode and a spray period; first through n-th relays for obtaining control signals from the MCU and opening/closing according to whether odour should be generated through the odour providing pipes, depending on input control signals; and first through n-th solenoids for obtaining operating signals for generating odour, transmitted from the first through n-th relays for releasing/blocking odour.

EFFECT: invention enables to produce a separate device which generates material for stimulating the sense of smell to give viewers the sensation of the smell matching the subject-matter of a film.

2 cl, 2 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to wireless communication and particularly to transmission of audio data in wireless networks which transmit digital video and digital audio in high-definition multimedia interface (HDMI) format. The method involves obtaining position information of audio packets within an HDMI frame; transmitting digital audio information including the position information from a data source device to a data sink device via a wireless communication medium. At the data sink device, an HDMI frame is reconstructed by inserting received audio packets into horizontal and vertical blanking periods of the HDMI frame.

EFFECT: data rate reduction by avoiding transmission of blanking information while achieving audio/video synchronisation.

19 cl, 8 dwg

FIELD: information technologies.

SUBSTANCE: system 40 comprises a device 41 for recording onto an HD (hard disc) and a module 42 of display, and it applies a data transfer interface HDMI (high-definition multimedia interface). A source 53 of the HDMI of the device 41 for recording onto an HD sends image data (image signal) in the form of differential signals into a consumer 61 of HDMI of the display module 42 via three channels of TMDS (transition minimised differential signalling). The source 53 of HDMI inserts information of content identification, designed for identification of a type of image data content designed for transfer, into a package of VVI InfoFrame, placed in a period of horizontal blanking. A unit 64 of control of the display module 42 controls operation of a unit 62 of reflection processing, which performs processing of image data reflection on the basis of information on the basis of content identification information (PS, ST1 and STO), received by the consumer 61 of HDMI and the display unit 63 for reflection of the image.

EFFECT: possibility for a reception side to do optimal processing of an image signal depending on content type.

50 cl, 34 dwg

FIELD: physics.

SUBSTANCE: disclosed is a method of detecting a television signal which is embedded in a received signal comprising the television signal and noise. First or second order cyclostationarity of the signals may be employed for detection thereof. When first order cyclostationarity is employed, the following method is employed. The method comprises steps of raising sampling frequency of the received signal by a factor N, performing synchronous averaging of a set of M segments of the received signal with the increased sampling frequency, performing signal autocorrelation, and detecting peaks at the output of the autocorrelation function. When second order cyclostationarity is employed, the method comprises steps of delaying the received signal through a constant delay (symbolic time), multiplying the received signal with the delayed version, finding pitch (single frequency) in the output signal.

EFFECT: high efficiency of identifying television signals deeply buried in noise.

12 cl, 10 dwg

FIELD: information technologies.

SUBSTANCE: reserved tones are identified, and certain reserved tones are used to send a signal with a pulse characteristics, in locations of subcarriers, which are not overlapped with a pilot signal of a preamble in a frame. A signal with a pulse characteristic is sent via reserved tones in a symbol interval, for which a preamble is sent.

EFFECT: improved efficiency of a system due to reduction of peak to average power ratio.

23 cl, 4 dwg

FIELD: information technology.

SUBSTANCE: coded information content is received, at least one pre-processed set of watermarks is received and a certain number of bits is directly replaced with an alternative value, starting with a certain position in the coded information content. Said alternative value contains embedded watermark signals, wherein said alternative value is selected from a plurality of alternative values determined by at least one of said set of watermarks. The invention also describes a device and a method of creating a set of watermarks, which involves selecting positions, where the value in the coded information content must be replaced by an alternative value, and calculating a plurality of alternative values for each selected position.

EFFECT: creating watermarks in coded information content by embedding watermarks into selected positions in the coded information content without deterioration of quality.

18 cl, 4 dwg

FIELD: information technologies.

SUBSTANCE: method is based on series of information bits match with bits in bytes of colour presentation, with change of least significant bits in initial image and requiring minimum correction of statistical characteristics of only least significant bits, as a result of accidental nature of matches. Least significant bit is replaced in bytes in initial digital image, besides, flag value "one" is assigned to least significant bit in bytes of initial digital image, if part of digital image signal byte bits and message signal bits match, or flag value "zero" is assigned in case of non-match, at the same time correction of statistics of distribution of least significant bits is made by their remaining part, which is not used as flag values.

EFFECT: possibility to store and transfer large volumes of confidential information.

3 dwg

FIELD: information technologies.

SUBSTANCE: video subject to protection is desynchronised, and therefore, one or more videos are created with inserted digital distinction marks. In one realisation, the video to be protected, is exposed to time desynchronisation and space desynchronisation. Copy of video is created with distinction marks as modified by means of time and space desynchronisation.

EFFECT: improved resistance to collective attacks of culprits, for use when inserting distinction marks into digital video to be protected.

20 cl, 17 dwg, 2 tbl

FIELD: information technologies.

SUBSTANCE: creation of watermarks in release print (12) of a movie is done by provision of at least one tone of specific frequency on at least one sound track (16) in at least one location, which is unique for this release print. In the typical case arrangement of tone of specific frequency is carried out in location (locations), where tone will have minimum impact at existing sound of sound track. Record of location (locations), in which the tone of certain frequency is found in release print, is saved to provide for the possibility of comparison to tones detected in audio/video record, to identify, whether the sound of illegal carrier was recorded from this particular release print.

EFFECT: easier tracking of illegal copies, besides property of a watermark in a release print should not be noticeable to a potential pirate, and watermark detection should not be so burdensome to make its implementation impractical, and watermark availability shall not affect the copy preview by cinema spectators.

16 cl, 4 dwg

FIELD: physics, optics.

SUBSTANCE: protection device is designed to prevent unauthorised probing of protected segments of optical cable systems and networks for various purposes. Controlled neutralisation of probing radiation in an optical cable is carried out by raising the noise level to the information-bearing signal power level or higher using a fibre-optic noise generator. The fibre-optic noise generator is connected in the optical network (1) on a Mach-Zehnder interferometer scheme (1), which is formed by asymmetrically connected two coupling devices (5, 6). One arm of the interferometer includes the fibre-optic noise generator, formed by a fire-optic modulator (7) and a noise generator (8). Power supply (9) and control of the device is carried out on the protected optical network via a channel (10). The protection device (2) is connected to the optical network (1) by detachable or permanent connections (3, 4). The device does not affect light flux in a switched off state and, when turned on, has optical nonreciprocity on noise induced in transmitted signals.

EFFECT: high efficiency of protecting information using optical channel noise masking methods.

13 cl, 7 dwg

FIELD: radio-engineering, communication.

SUBSTANCE: method of secret information transmission by the object means emission of the electromagnetic energy, where object is exposed by receiving-transmitting antennal (RTA1) of radar station (RS1)by continuous signal with frequency modulation under one-side saw-toothed linear law (NLFM signal) that is received by RTA2 of RS2 of the object, directed via two channels, and in one channel NLFM signal is delayed for time tz, and in another channel it passes through the coder generating different NLFM radio pulses with different width corresponding, for example, to dot, hyphen and pause from Morse alphabet, then NLFM signals are summed, reinforced as per power. And via RTA2 are re-transmitted towards RS1, where they are multiplied with the emitted LNLFM signal for further separation at RS1 of two signals with frequencies: Fpi=2DiFmdfm/C±2Vif/C and Fpj=2DiFmdfm/C±2Vif/C+B, where C and Vi are light velocity and speed of approach or divergence of RS1 and RS2; f, Fm and dfm are frequency, modulation frequency and frequency deviation of NLFM signal; B is part of frequency of difference signal due to delay of NLFM signal; Di is distance between radar , and separation of definite difference Δ=Fpi-Fpj=B upon which identification it is assumed that the object transmits the secret information.

EFFECT: expansion of assortment of devices used for information transmission.

2 cl

FIELD: electricity.

SUBSTANCE: information hiding device comprises: a signal attenuation unit, two key memory units, a masking signal shaping unit, a subtracting unit, six adder units, four multiplier units, an information transfer device unit, a factor shaping unit, a divider unit.

EFFECT: improvement of security and accuracy of recovery of the secured signal.

8 dwg

FIELD: information technologies.

SUBSTANCE: method of secure information transmission based on addition of the secured signal and the signal being a function of the secured signal and the masking signal, differing by that, for the purpose of increase of hiding and accuracy of recovery of the secured signal, the stego-container containing two components is formed, for this purpose the first signal is allocated which is equal to a half of the secured signal, and the second signal equal to a difference of the value of the first key and the first signal, the first component of the container is defined by the first signal, to which the product of masking signal and the sum of value of the second key and the first signal is added, the second component of the container is defined by the second signal, to which the product of masking signal and the sum of value of the third key and the second signal is added, to recover the secured signal four coefficients are determined, the first coefficient is equal to the doubled sum of values of the first and third keys, the second coefficient is equal to the doubled value of the second key, the third coefficient is equal to the doubled product of values of the first and second keys, the fourth coefficient is equal to the sum of values of the second and third keys, the readings of the secured signal are found by adding of the third coefficient to the product of the first container components and the first coefficient, and subtracting the product of the second container components and the second coefficient, the obtained result is divided by the sum of the first and second components of the container and the fourth coefficient.

EFFECT: improvement of security and accuracy of recovery of the secured signal.

11 dwg

FIELD: radio engineering, communication.

SUBSTANCE: method for transliteration conversion of information and transmission thereof over communication channels includes receiving a structured message and breaking down said method into parts. A first part is broken down into two different data units, to which control information is added to obtain transliteration matrix row and column coordinates, from which a matrix cell corresponding to the first part of the message is selected. A semantic expression is extracted and transmitted, from the selected cell, to a communication channel, the semantic expression being used to determine cells available for converting the second part of the message. The second part is broken down into two different data units with addition of control information to obtain row and column coordinates for selecting a matrix cell from which a semantic expression is extracted, which corresponds to the second part of the message, and said expression is transmitted to a communication channel. The selected semantic expression is used to determine cells which are available for converting the third part of the message, wherein the third and subsequent parts are converted in the same manner as the second part.

EFFECT: high reliability of transmitting structured messages, achieved by validation of transmission of structured units.

1 dwg

FIELD: information technologies.

SUBSTANCE: method to code a data unit represented as a bit string consisting in formation of a secret key in the form of subkeys K and Q, which represent bit strings, formation of an auxiliary n-bit string T, formation of an n-bit auxiliary cryptogram CM by performance of operation of E coding on the data unit M depending on K according to the formula CM=EK(M), formation of an n-bit auxiliary cryptogram CT by performance of operation of E coding on the n-bit string T depending on Q according to the formula CT=EQ(T), formation of 2n-bit cryptogram C depending on subkeys K and Q and auxiliary cryptograms CM and CT, differing by the fact that the subkey K is formed as a 2n-bit string, representing concatenation o two n-bit strings k1 and k2, the subkey Q is formed as a 2n-bit string, representing concatenation of two n-bit strings q1 and q2, the (n+1)-bit string m is formed, and the 2n-bit cryptogram C is formed as concatenation of two binary polynomials of degree n-1, being the solution to the system of two linear equations k1C1+k2C2=CM mod m and q1C1+q2C2=CT mod m with two unknown binary polynomials C1 and C2, in which m is an additionally formed polynomial of degree n, and n-bit strings k1, k2, q1, q2, CM, CT are considered as binary polynomials of degree n-1, and (n+1)-bit string m is considered as a binary polynomial of degree n.

EFFECT: increased level of protection of coded information.

2 cl

FIELD: information technologies.

SUBSTANCE: method to code a message represented as a multidigit binary number, which consists in the fact that a secret key is generated (p, q) in the form of two simple multidigit binary numbers p and q, an open key is generated in the form of a multi-digit binary number n=pq, a cryptogram C is generated depending on the message M and open key n, and the message M is recovered from the cryptogram C according to the secret key (p, q), differing by the fact that additionally they generate an auxiliary multidigit binary number R<n, the cryptogram C is formed as a pair (A, B) of multidigit binary numbers A and B depending on the message M, the open key n and the multidigit binary number R, and the message M is recovered by solving the equation x2-Ax+B=0 mod n relative to the unknown x and calculation of the message M from one of the solutions of the specified equation.

EFFECT: increased level of protection of coded information.

4 cl

FIELD: radio engineering, communication.

SUBSTANCE: method of encrypting a binary data (M) unit comprises generating a secret key which includes subkeys Q and R, generating an auxiliary n-bit unit of binary data T, generating an in-bit auxiliary cryptogram CM by performing, over M, a block encryption E operation depending on Q using the formula CM=EQ(M), generating an n-bit auxiliary cryptogram CT by performing, over T, a block encryption E operation depending on R using the formula CT=ER(T), generating a cryptogram C depending on the secret key and the auxiliary cryptograms CM and CT, characterised by that subkey Q is generated in the form of a 2n-bit line which is a concatenation of two n-bit binary numbers q1 and q2, the subkey R is generated in the form of a 2n-bit line which is a concatenation of two n-bit binary numbers r1 and r2, generating a (n+1)-bit binary number p and generating a cryptogram C in the form of a concatenation of two multi-bit binary numbers C1 and C2, which are the solution of a system of two linear equations q1C1+q2C2=CM mod p and r1C1+r2C2=CT mod p with two unknowns C1 and C2.

EFFECT: higher level of security of encrypted information.

3 cl

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to communication systems. Disclosed versions provide methods and systems for generating arbitrary channel switching patterns, frequent update of patterns, generating different patterns for different cells/sectors and generating patterns of adjacent frequency subcarriers for block channel switching.

EFFECT: efficient design of arbitrary channel switching patterns in a communication system.

34 cl, 7 dwg

FIELD: physics, computer engineering.

SUBSTANCE: Invention relates to data transmission in digital TCP/IP data networks via HTTP. The method of transmitting data in digital TCP/IP data networks via HTTP is realised by a system which includes network modules integrated into a client computer and a server computer and which facilitate a connection between the client computer and the server computer; receiving and transmitting network packets in the connection between the client and the server; encrypting the network packets for the established connection; tunneling the network packets; wherein between the client and the server there are at least two proxy servers connected to the client and the server; the method comprises establishing, by the network modules, a connection between the client and the server, wherein the connection is established through at least two proxy servers; creating a tunnel message in the client network module; transmitting the tunnel message to the server; selecting a delay T value based on maximum transmission speed of the tunnel message between the client and the server by carrying out the following procedures: establishing a time T variation interval and a time increment; measuring the transmission speed of the tunnel message for each value of T in the interval; selecting a value of T corresponding to the maximum transmission speed; determining the volume of a packet with false data Q; sending from the client a packet with false data with volume Q, T seconds after last transmission of false data via an HTTP tunnel; receiving the tunnel message at the server; disconnecting the Nagle algorithm for a TCP connection in network modules of the client and the server; disconnecting the TCP delayed acknowledgment algorithm in network modules of the client and the server.

EFFECT: high speed of transmitting data between a client and a server.

FIELD: physics, computation hardware.

SUBSTANCE: invention relates to info safety. PCB is a form factor of micro ATX to be fitted in table top cases and those to be installed in cabinets. Processor is a system made on chip and provided with a set of data protection means. This set includes the means of cryptographic control over integrity/authenticity of loaded software and protected memory for data store. Said memory comprises cryptographic keys, physical pickup of random numbers to generate said keys and subsystem of monitoring of processor mode of operation and responses to attempts to fail it. Said PCB comprises external interfaces mounted along its edges. Said interfaces include network interfaces, serial RS232C interface for connection of control console and USB interfaces. Besides, there are internal connectors including interfaces for connection of add-on boards, interfaces for connection of storages, interface for connection of smart-card read-off, connector for connection of power supply and RAM slot.

EFFECT: higher efficiency of protection.

2 cl, 2 dwg

Up!