Method of preventing unauthorised use of vehicle equipment

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to computer engineering. A method of preventing unauthorised use of vehicle equipment, based on use of software, the method comprising determining, using a vehicle computer system, that the infotainment system is turned on; receiving a unique identification number of the vehicle from a vehicle network associated with the vehicle in which the infotainment system is installed; comparing the unique identification number of the vehicle with a stored identification number of the vehicle, previously associated with the infotainment system; providing access to the infotainment system only if the unique identification number of the vehicle matches the stored identification number of the vehicle; otherwise blocking use of the infotainment system.

EFFECT: effective prevention of unauthorised use of stolen equipment in another vehicle.

3 cl, 5 dwg

 

The technical field to which the invention relates

The invention essentially relates to a method and apparatus aimed at preventing theft of equipment of the vehicle.

The level of technology

Vehicle safety is one of the main causes of concern for vehicle owners. Over many years, to protect property and to prevent theft have been developed many security measures, ranging from a vehicle alarm to tracking systems for vehicles.

Often security vehicles begin to emit a loud sound or signal tampering or opening of the vehicle. These signals act as a deterrent and can warn the surrounding people about the attempted theft, and can scare the thief, preventing the crime. Such systems can also help lower insurance rates and help to get the most desirable rates.

Some security systems can even notify the owner or the guard about the attempted theft. However, warned that the party may take some time to arrive to a vehicle, theft can be committed up to the time of her arrival.

In �short cases, warning system theft can even track the location of a vehicle. This can help in catching the thief and the return of the vehicle if it was stolen. However, in case of theft of vehicle parts, such as stereos, navigation systems, entertainment systems, etc., the tracking device will not be able to locate them.

In the event of theft of the equipment from the vehicle, the likelihood of his return is very small. This will be possible only if the thief will be caught or found a place of their storage. After the sale and install in another vehicle to detect stolen equipment and to return it becomes almost impossible. Thus, if the thief will act quickly enough, then he will be able to steal some or all of the valuables and get away with crimes. If the alarm is not a sufficient deterrent, it is difficult to do anything else to prevent theft of the equipment.

Disclosure of the invention

The object of the invention is the prevention of theft of equipment from the vehicle.

The technical result of the invention is effective preventing unauthorized use of stolen equipment in another vehicle that is a deterrent against theft of this equipment, because it makes it meaningless.

In the first� presents an embodiment, computer-executable method includes determining was activated infotainment system. The method additionally includes providing network access vehicles containing at least the unique identifier of the vehicle.

In this embodiment, the method additionally includes comparing the unique identifier of the vehicle with the stored identifier of the vehicle. Shows the method further includes providing access to the infotainment system only if the unique identifier of the vehicle coincides with the stored ID of the vehicle.

In the second illustrated embodiment of the invention uses stored on a computer readable media program that, when executed, shall issue to the CPU of a computer system of the vehicle on the way in which determine is enabled infotainment system.

The method additionally includes providing network access vehicles containing at least the unique identifier of the vehicle, and comparing the unique identifier of the vehicle with �unprotected identifier of the vehicle. In addition, the method includes granting access to the infotainment system only if the unique identifier of the vehicle coincides with the stored ID of the vehicle.

In the third illustrated embodiment of the invention the system comprises a computer system of the vehicle and at least one module implemented in a computer system of the vehicle. In this embodiment, the module uses to access the network of the vehicle in order to determine whether the unique identifier of the vehicle. The module is additionally configured to compare the unique identifier of the vehicle with the stored identifier of the vehicle. In addition, the module being configured to provide access to the infotainment system only if the unique identifier of the vehicle coincides with the stored ID of the vehicle.

In the fourth illustrated embodiment of the invention executed by the computer method includes determining whether the requested load information procedure unlock block�the auditors infotainment system of the vehicle. In this embodiment, the method includes authentication requested download information. The method also includes activating the confirmed information download to unlock locked infotainment system of the vehicle.

In addition, in this embodiment the method involves removing as a result of the unlocking identification number VIN of the vehicle associated with blocked the infotainment system of the vehicle. The method additionally includes receiving a new identification number VIN of the vehicle to bind to the infotainment system of the vehicle, and a new identification number VIN of the vehicle are available on the data bus of the vehicle, which is equipped with infotainment system and a corresponding identification number VIN of the vehicle. Furthermore, the method further involves storing the new identification number VIN vehicle identification number VIN of the vehicle, which must be detected at system startup to prevent re-locking information and razvlekatelnyie vehicle.

Brief description of the drawings

Fig.1 shows a variant implementation of the computer system of the vehicle;

Fig.2 shows an embodiment of a method of verification;

Fig.3 shows an embodiment of a method of unlocking;

Fig.4 shows an embodiment of a method of binding an identification number vehicle VIN, and

Fig.5 shows an embodiment of a method of recording an identification number VIN of the vehicle.

The implementation of the invention

This document discloses the detailed description of embodiments of the present invention; however, it should be understood that disclosed embodiments of are only examples of the invention that may be implemented in various alternative embodiments. The drawings are not necessarily made to scale; some items may be increased or decreased for more detail to show individual components. Therefore, certain structural and functional features disclosed herein should not be construed as limiting, but merely as a basis for the submission of claims and/or for review to experts in the art with the various ways of implementing the present invention.

Fig.1 shows an example of a modular topology of the computer system 1 of the vehicle for the vehicle 31. An example of such a computer system 1 of a vehicle is the SYNC system of the FORD MOTOR COMPANY. The vehicle installed with the computer system 1 of the vehicle may include external graphics interface 4 located in the vehicle. The user can also interact with this interface, if available, for example, using the touch screen. In another illustrated embodiment of the invention, the interaction is carried out by pressing buttons, voice communication and constructive synthesis of speech.

In an embodiment of the invention shown in Fig.1, a processor 3 controls at least some stages of operation of the computer system 1 of the vehicle. Built-in vehicle CPU 3 allows processing of commands and standard programs directly in the vehicle. Moreover, the processor is connected to the device 5 temporary storage device and 7 long-term storage. In the illustrated embodiment of the invention, the temporary storage device is a random access memory (RAM), and long-term device XP�tion - the hard disk drive (dB AG) or flash memory.

The processor is also equipped with a number of different input devices that allow the user to communicate with the processor. In the illustrated embodiment of the invention, there is provided a microphone 29, an auxiliary device 25 input data (input 33), a USB device 23, 24 GPS device and BLUETOOTH device 15. Also presents the switch 51 of the inputs, which allows the user to switch between different input devices. The signals arriving at the microphone and the auxiliary connector, convert from analog to digital Converter 27 before entering the processor. Although not shown, numerous vehicle components and auxiliary components connected to the computer system of the vehicle can use the network of the vehicle (in particular, such as bus Ethernet controllers) to transfer data to a computer system of the vehicle (or its components) and from her.

The output device system may include, in particular, the display 4, the speaker 13 or the output to stereo. Speaker connected to an amplifier 11 and receives a signal from the processor 3 through a digital to analog Converter 9. The output information can also be implemented on a remote device�tvo BLUETOOTH, such as a personal navigation device 54, or USB device such as the navigation device 60 of the vehicle via two-way flows 19 and 21 of the data, respectively.

In one embodiment of the present invention, the system 1 uses the transceiver 15 BLUETOOTH to establish a connection 17 with the mobile device 53 (MU) of the user (e.g., mobile phone, smartphone, PDA or any other device configured to establish a wireless remote connection). The mobile device may be further used to establish a connection 59 with a network 61 outside the vehicle 31, for example, using channel 55 communication with the tower 57 of cellular communication. In some embodiments, the role of the tower 57 may perform a Wi-Fi hotspot.

Example of connection between the mobile device and the BLUETOOTH transceiver is represented by signal 14.

The command to establish the connection of the mobile device transceiver 53 and 15 BLUETOOTH may be filed by a button 52 or similar input device. In line with this, the Central processing unit (CPU) team serves the connection of the built-in BLUETOOTH transceiver with a BLUETOOTH transceiver on the mobile device.

The data exchange between CPU 3 and network 61 may be implemented using, for example, information transmission on the current frequency of the tariff plan at frequencies above the frequency of the voice or by using dual tone (DTMF) signals associated with the mobile device 53. In an alternative embodiment, can be installed built-in modem 63 to the antenna 18 for the exchange 16 data between CPU 3 and network 61 at frequencies above the frequencies of speech. In this case, the mobile device 53 can be used to establish a connection 59 with a network 61 outside the vehicle 31 through, for example, the connection 55 with 57 tower of cellular communication. In some embodiments, the modem 63 may establish a connection 20 with the HSE 57 to establish a connection with the network 61. As a non-limiting example, the role of the modem 63 may perform cellular USB modem and the connection 20 may be a cellular connection.

In one illustrated embodiment of the invention, the processor is provided with the operating system comprising an application programming interface for communication with application software of the modem. Application software modem can gain access to the embedded module or firmware BLUETOOTH transceiver for wireless communications with a remote BLUETOOTH transceiver (such as in a mobile device). T�hnology Bluetooth is a subset of protocols IEEE 802 PAN (personal area network). Protocols IEEE 802 LAN (local area network) include Wi-Fi and substantially similar functionality with protocols IEEE 802 PAN. Those and other protocols can be used to establish a wireless connection within the vehicle. Other means of communication, which can be used in this field include optical communications in free space (for example, the technology of infrared data transmission via IrDA standards) and not standardized consumer infrared communication protocols.

In another embodiment, the mobile device 53 includes a modem for data communication voice frequency or broadband data exchange. In an embodiment, in which the communication occurs at frequencies above the frequencies of the voice can be used technique, known as frequency division multiplexing, in which the mobile device user can use the device to talk directly during data transmission. In other cases, when the user uses the device, for data transfer can be used the entire frequency range (e.g., from 300 Hz to 3.4 kHz). Although frequency multiplexing is usually used for setting analog cellular communication between the vehicle and the Internet, and it is used to with�x then, to establish a digital cellular communication it is widely replace the hybrid technology that combines multiple access code division multiplexing (CDMA), multiple access with time division multiplexing (TDMA), multiple access with spatial division multiplexing (SDMA). All these technologies are compatible with the standards of the ITU IMT-2000 (3G) and provides data transmission speeds up to 2 Mbps for stationary or walking users, and 385 Kbps for users in a moving vehicle. The 3G standards currently replace standards IMT-Advanced (4G), which provide data rates of 100 Mbps for users in the vehicle and 1 Gbps for stationary users. If the user has the possibility of information transmission on the current frequency data plans for mobile devices, maybe this tariff plan provides data in a wide range of frequencies and the system will be able to use a much wider range of frequencies (increasing the data rate). In another embodiment, the mobile device 53 is replaced by the cellular communication device (not shown) installed in the vehicle 31. In yet another embodiment the role of the mobile device 53 can perform a wireless local area network(LAN), configured to establish a connection, in particular, the 802.11 g network (e.g., WiFi) or a WiMax network.

In one embodiment, the input data can be transferred through a mobile device at a frequency above the frequencies of transmission of the speech or at this frequency the tariff plan via built-in BLUETOOTH transceiver in the internal CPU 3 of the vehicle. In case the data are temporary data can be stored, for example, on the hard disk drive (dB AG) or other storage media 7 until such time as they are needed.

Additional sources that can interact with the vehicle include a personal navigation device 54 (PTU) containing, for example, a USB connection 56 and/or an antenna 58, the navigation device 60 vehicle (NUTS) containing a USB 62 or other connection, built-in GPS device 24, or remote navigation system (not shown) connected to the network 61. USB Protocol is in the class of network protocols serial transmission. IEEE 1394 (FireWire firewire), protocols serial communication EIA (standard of the electronic industries Association), IEEE 1284 (eight-port standard Centronics parallel interface, S/PDIF (digital interface Sony/Philips and USB-IF (forum on implementing USB) form the basis of standards for serial data transmission between devices. Most protocols can be implemented both in electrical and optical connection.

Moreover, the CPU can connect to a variety of other auxiliary devices 65. The connection of the devices may be established via a wireless connection 67 or wired connection 69. Auxiliary device 65 may be a particularly personal media players, wireless medical devices, laptop computers and other similar devices.

Also or alternatively, embodiments of the CPU can be connected is installed in the vehicle wireless router 73, for example, using the transceiver 71 Wi-Fi. This allows the CPU to connect to remote networks in range of the local router 73.

Besides presenting the example methods performed by a computer system of the vehicle, in some embodiments, these methods may be performed by a computer system connected to a computer system of the vehicle. Such a system may contain, in particular, a wireless device (e.g. mobile phone) or a remote computer system (in particular, the server), the connection which is established via wireless LAN�e device. Together, these systems can be named by computer systems connected to a vehicle (VACS). In some embodiments, the individual components of computer systems connected to the vehicle, can perform certain steps of the method, depending on the specific implementation of the system. As a non-limiting example, if in the framework of implementation of the method has the step of sending or receiving information from the connected wireless device, most likely the wireless device is not involved in the implementation of the method, since the wireless device is communicating with itself. Specialist in the art it is clear, when it is inappropriate to apply specific computer system that is connected to the vehicle for implementation of this decision. In all decisions, it is assumed that at least the computer system of the vehicle (VCS), located inside the vehicle, made with the possibility of implementation are given as examples of the ways.

In the illustrated example embodiments, the component of the vehicle, such as, in particular, a computer system of the vehicle and/or information and razvleka�individual system of the vehicle, contains at least one module mounted therein, adapted to ensure the security of the module. Since the vehicle has a unique identification number, known as the VIN, the module can be protected by a key, allowing the system to operate only when installed in the vehicle, VIN which the module can recognize.

Thus, if the module is stolen, and then installed in a new vehicle, it will not recognize another VIN and will lock the infotainment system. This should be a theft deterrent systems, as they can only work in those vehicles for which they are intended.

Of course, there is the possibility that the system can be removed or recovered from the vehicle is beyond repair, and placed in a new vehicle with the permission of the system owner. In this case, the module may take the system in the lock mode. When the system is in lock mode, an authorized service provider may return the system to normal mode and connect to a new vehicle. Thus, the system is not disabled completely when properly installed in another vehicle.

Fig.2 shows an example of a method to perform�Ki. In this shown embodiment, at some point of time after turning on the vehicle, for example when you insert the ignition key, the infotainment system is operated. This can lead to the start of the security module (or similar software) (step 201).

After the module is activated, it may first check whether a system is in lock mode (step 203). May be indicator is set and cannot be changed independently confirming that the last time was locked, causing the module detects that the system is already in the lock state (step 203). In this case, the owner of the vehicle is displayed on the screen information (or buzzer) that the system is currently locked and is in extremely limited functionality (step 205). The screen can be displayed, in particular, information about secondary lock play during the cycle of on-off ignition message that the module is not genuine, etc.

In at least one case, the functionality is limited by the output of a lockout and the need to see a dealer to unlock. In at least one alternative� embodiment, the original owner of the system or the new authorized owner, may be granted the ability to unlock the system by entering a password or by booting into the main system software provided on request by the manufacturer. From the user who requires the unlocking system, may be required to provide some form of verification before they will be able to unlock the phone.

If the system is not in lock mode, the module can receive access to a vehicle, in particular such as bus Ethernet controllers (CAN-bus) (step 207). Information about the vehicle, in particular an identification number VIN of the vehicle can be obtained via bus Ethernet controllers (CAN-bus). Access to the bus of the vehicle can give the module the possibility of obtaining identification numbers VIN of the vehicle (step 209).

In the absence of the identification number VIN of the vehicle (step 211), the module may retry the detection of the identification number VIN of the vehicle. Due to a system error identification number VIN of the vehicle may be unavailable (temporarily or permanently), and the vehicle manufacturer may have to determine whether the result of a lack of identification number VIN t�ansporting tools locking system or gaining access to the system. May provide for the issuance of alternative messages, such as error message identification number VIN of the vehicle, to inform the user about what to resolve the error identification number VIN of the vehicle you should contact the dealer. In at least one case, the module can grant access to the system a limited number of times if an error occurs before you put the system in the lock mode. This will allow an authorized user to use the system on the way to the dealer to correct the problem.

In another case, the user may have the possibility of putting a temporary authorization code for a specific system. This code can be obtained, for example, the manufacturer or the dealer. Temporary code can allow for limited use of the system prior to going into lock mode, giving the user time for the planned visit to the dealer. In addition, if a temporary authorization code obtained by entering the user credentials, the user can be sure that the thief will not be able to use the stolen code to authorize the use of the system. To prevent the operation of such systems, the input time code may be limited to one or more requests to switch to blocking mode.

If�Eugenie identification number VIN of the vehicle occurs via a network of the vehicle (step 211), the module may then determine whether the detected identification number VIN of the vehicle is correct (step 213). In at least one case are binding module/system to an identification number VIN of the vehicle after the vehicle manufacture or during its production. It may be preferable to bind at the end of the process, the vehicle is guaranteed to have passed any quality control, however, the binding process can be carried out earlier.

After binding module/system to an identification number VIN of the vehicle is completed, the module/system can only be operated with the vehicle with the same identification number VIN of the vehicle to which it is bound. This prevents the possibility of stolen modules in other vehicles. Modules/system may also have an alternative option when they are working with a secondary identification numbers VIN of the vehicle, for example from a test or other identification numbers VIN of the vehicle, viewed in the present description an implementation option module allows you to work with only one identification VIN vehicle.

If the identification number VIN of the vehicle is correct, the module provides the driver with access to the system in the usual manner (step 217). Otherwise, the module may take the system in the lock mode (step 215). As previously noted, the output from the lock mode in at least one embodiment of the invention can be carried out by an authorized service provider. Even if the buyer accidentally purchased the stolen module, to use it will be banned, and a visit to the dealer to correct the problem will result in the return of this module the host.

Fig.3 shows an embodiment of a method of unlocking. In this illustrated embodiment, is detected by the module that included the mode lock (step 301), and that running the execute disable access to the system simultaneously with the notification on the lock (step 303). Limited functionality of the system may also include access to the list of local authorized technicians repair vehicles, as well as the opportunity to establish contact or to direct the driver to one of the regional technical specialists for repair. This can help in the case of accidental locking when the driver can attend a technical repair technician to unlock�to the module/system.

After the driver got to the place of repair, such as the dealer or an authorized technician, the service tool can be connected to the vehicle, for example, via the ODB port or USB port. In at least one case, the module is signed with an electronic serial number (ESN) that contains specific identification serial number of the module.

The technician connected via a service tool or other server-level system can trigger the generation of the signed application unlock signed specifically for its specific recognition by the module installed in the serviced vehicle. In other words, the app can only be used in a particular vehicle (in this case) and cannot be used to unlock many vehicles, if it is stolen at the dealer.

The server-level system generates a signed application unlock and provides it to a technician for installation in the vehicle. The module receives the service request tool unlocking (step 307) and verifies the signature unlock app that you want to install (step 309). This can be done, for example, by comparing the electronic serial number (ESN), s�data module, electronic serial number (ESN) associated with the application unlock.

If unlock app was identified as suitable for this particular vehicle, this, presumably, is sufficient in this case to determine the provider's application as authorized to unlock the module/system. If necessary, can be used a different security Protocol.

Unlock app then installed/performed by the module (step 311), and the module switches to the unlock condition. During the unlocking module remove the binding module to an identification number VIN of the vehicle (step 313), so that the module is not immediately locks the system again after unlocking. Next, the module, without having attached to it an identification number VIN of the vehicle can be re-bound to an identification number VIN of the vehicle on which it is installed (step 315).

Fig.4 shows an example of a method reference to an identification number VIN of the vehicle. This method, which can be performed several times during the process of system functioning, in particular after completion of the proceedings, authorized the sale of the system, the system recovery from a damaged vehicle, and �.etc.

After powering up the vehicle module can be activated (step 401) and determines whether the identification number VIN of the vehicle and whether it is tied to the module at the moment (step 403). If the identification number VIN of the vehicle is present, the module can then move on to the next stage of authentication (step 203).

If the binding identification number VIN of the vehicle is missing, the module can determine whether a system is in suitable condition for binding to a new identification number VIN of the vehicle. Since the module can be run several times during the production, while the computer system of the vehicle is still available, it may be preferable determining whether a system is in the activation mode before attempting the binding identification number VIN of the vehicle (step 405). This should help prevent accidental binding module/system that can be moved to a new vehicle before leaving the factory, and should also help to prevent the attempt to connect the system in a state where the identification number VIN of the vehicle may not be available on the system bus.

If the system is not in the activation mode (step 405), the module can�t further checking moved the system in infotainment mode (step 407). This means that the system operates in standard mode, the end-user and is not in any diagnostic mode or another mode in which the binding may be undesirable.

If you meet the prerequisites (which may include conditions not listed in this document), the module gets access to the bus of the vehicle or another source of information can be obtained identification number VIN of the vehicle (step 409). The module may then search for the identification number VIN of the vehicle in the form of electronic data (step 411).

If the identification number VIN of the vehicle is not detected (step 413), the module can re-implement the search procedure an identification number VIN of the vehicle until such time as the identification number VIN of the vehicle will not be available. After finding identification number VIN of the vehicle can be made binding module to an identification number VIN of the vehicle and the transition module in the operational mode for use only with this identification number VIN of the vehicle. At this stage, any attempt to place the system in a newly� the vehicle will lock the system until it is received by the module team search for a new identification number VIN of the vehicle and unlock the module by authorized persons.

Fig.5 shows an example of a method of recording an identification number VIN of the vehicle. In at least one of the featured examples of identification number VIN of the vehicle to which attached the module is recorded in the archive of the source in order to receive future information about tied the identification numbers VIN of the vehicle. This contributes to the maintenance of archive records about vehicles has been bound to this module, and to report on any unauthorized unlocking of the system. Information from the archive can also be used to determine which vehicle module must be attached when returning the stolen equipment.

In at least one embodiment of the invention, as a maximum, stored ten identification numbers VIN of the vehicle, although this number may be changed by manufacturer. After the discovery of a new identification number VIN of the vehicle to bind (step 413) can be verified by existing module history to determine which identification number VIN of the vehicle were previously tied to the system (step 501). The story may be part of a special record, which essentially�t in the module and has the ability to save after rewriting hardware preventing clear the history.

If the story is complete (step 503), the method may move to a stage of binding to the current identification number VIN of the vehicle (step 415). Although the new identification number VIN of the vehicle may not be recorded in the file history, it can be accessed via the path to the file that stores data about tied at the moment, identification number vehicle VIN. In addition, this method can be checked, stored identification number VIN for the current vehicle in the history list (step 505).

If, for example, a module fault has caused the lock system, then perhaps there is no reason to re-save the identification number VIN of the vehicle after unlocking and re-binding. In the present embodiment, in the binding process will be saved only new, not the stored identification number VIN of the vehicle.

If in the file there is free space and the identification number VIN of the vehicle has not yet written to the file, the module may store the identification number VIN of the vehicle to a file (step 507) and to continue the binding process (step 415).

At measures� in one case, some components of the module can be stored on the storage device information on the device parameters (DPS). DPS - special region of flash memory, which persists after flashing the image module and the corresponding values. This is useful to prevent Erasure module criminals with flashing the device. Since identification number VIN of the vehicle and the lock state is stored in DPS, overwrite the module will continue to use these variables to define the functionality of the system and prevent misuse of the system.

In some cases, such a system may be incorporated in the software to be installed, but deactivated during production. Only if the system will be activated after production, it will function, otherwise, the respective modules can be switched off. In at least one embodiment, additional modules hardware/software of the vehicle may be disabled by the system.

Above described embodiments of the invention are not intended to cover all possible methods of implementation of the invention. This description is of a descriptive rather than a limiting character, and it is obvious that without deviation from the substance and scope of the invention can be made various modifications. Furthermore, symptoms of different variants of the invention can be combined into new embodiments of the invention.

1. A method of preventing unauthorized use of vehicle equipment based on the use of the software in which:
determined using the computer system of the vehicle that the infotainment system has been included;
receive a unique identification number of the vehicle from the vehicle associated with the vehicle in which installed infotainment system;
compare the unique identification number of the vehicle with the stored identification number of the vehicle, previously linked to infotainment system;
provide access to the infotainment system only if the unique identification number of the vehicle coincides with the stored identification number of the vehicle; and
if the unique vehicle identification number does not coincide with the stored identification number of the vehicle, block the use of the infotainment system, the infotainment system has limited options�onalmost while blocking, including the ability to provide contacts and/or address at least one person authorized to unlock the infotainment system.

2. A method according to claim 1, wherein the unique vehicle identification number is a vehicle identification number.

3. A method according to claim 1, wherein the lock to retain until the authorised person will not hold the unlock procedure.



 

Same patents:

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to computer engineering. A method for electronic notary certification of text information, which includes preliminary registration of a contractor in an "electronic notary" system; when sending information by electronic mail, indicating in the "copy" field the address of the automatic "electronic notary" system; upon receiving a copy of the sent information, the automatic mail enters the copy into the personal accounts of the sender and the receiver with indication of the time of sending, the sender, the addressee of the information and all attachments comprising the information, wherein the automatic mail further notifies the addressee on the sending of information and storage of the certified copy of the sent information on the website in the personal account of the contractor.

EFFECT: confirming the sending of a document or file with indication of the date and time of sending via electronic mail.

4 cl

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to data processing. A data processing system has a browser with scripting engine means for executing a script. The scripting engine means implements a public scripting engine and a private scripting engine. The browser is configured to have the script executed by the public scripting engine if the script does not require access to a pre-determined resource at the system. The browser is configured to have the script executed by the private scripting engine if the script requires access to the pre-determined resource. Only the private scripting engine has an interface for enabling the script to access the predetermined resource. The scripting engine means is configured to prevent the private scripting engine from communicating data to the public scripting engine or to a server external to the data processing system if said data communication is not confirmed.

EFFECT: protecting private user data.

5 cl, 1 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to data memory method for storage of software product and to devices for secure data transmission. The device contains the assignment unit (2) for assigning of connections of data (DV) from various initial components (SK) through, respectively, at least, one intermediate component (ZK) to the common target component (ZK), the combining unit (3) for combining of intermediate components (ZK) depending on cryptographic information (KI) in one intermediate component (ZK) by means of, at least, one exchange of messages, and the exchange of messages is performed according to a method with a shared key, to Http-Digest-Authentication method, a request-answer method, key hash method, hash function, to Diffie-Hellman method and/or to the digital signature method and the data transmission unit (4) for data transmission (D) from initial components (SK) through the integrated intermediate component (ZK) to the target component (ZK).

EFFECT: improvement of security of data transmission.

14 cl, 12 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to activation of services using algorithmically configured keys. The method of user subscription to the service comprises: identification in the computer of issuer of the user who is authorized for subscription to a service on the basis of a criteria determined by an issuer; extraction by a computer of the issuer of data associated with the user and shared data element which is shared by the issuer computer and the service provider computer; formation of the first activation code by the issuer computer and sending the first activation code to the user; and the user sends the first activation code and data associated with the user to the service provider computer; and the service provider computer forms the second activation code and authorizes the user for subscription to service, if the first and the second activation codes are identical.

EFFECT: prevention of violation of security of data processing system.

20 cl, 9 dwg

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to a media device and a system for controlling access of a user to media content. Disclosed is a device (100, 200) for controlling access of a user to media content, the device comprising: an identification code output (102, 103, 202) for providing an identification code to the user, the identification code identifying the media device; a control code generator (104, 204) for generating a control code depending on the identification code and an access right; an access code input (106, 107, 206) for receiving an access code from the user. The access code is generated depending on the identification code and the access right by a certain access code device, and an access controller (108, 208) enables to compare the access code to the control code, and when the access code matches the control code, grants the user access to the media content in accordance with the access right.

EFFECT: managing user access to media content, wherein access is granted specifically on the selected media device.

14 cl, 6 dwg

FIELD: radio engineering, communication.

SUBSTANCE: invention relates to means of enabling one communication device to obtain access to data, such as a set of media items, accessible through another communication device. The method includes transmitting identification code information between a first communication device, a second communication device and a server; associating the identification code with the first communication device or providing said identification code with a set of media items accessible through the first communication device, wherein the set of media items is associated with access rules; sending, by the first communication device, information relating to said set of media items to the server, wherein the information includes access rules; receiving, by the server, the information relating to said set of media items; generating, by the server, account data relating to said set of media items and associated access rules; sending, by the server, the account data to the second communication device; receiving the account data by the second communication device, which enables the second communication device to access said set of media items.

EFFECT: obtaining access to a set of media items accessible through a different communication device.

39 cl, 9 dwg

FIELD: physics, computation hardware.

SUBSTANCE: invention relates to antivirus software and hardware, particularly to emulator state retention and its further recovery. File is received for emulation. Check for first-time emulation is executed. Emulator state image is defined including at least the image of emulating system to be loaded in emulator for further file emulation. File is emulated. Emulator state images are created. Note here that every said image comprises at least the image of emulating system. Incorrect file emulation termination is tested. Required emulator state image is selected for continuation of emulation in the case of incorrect file emulation termination. Selected emulator state image is loaded for file emulation continuation.

EFFECT: accelerated emulation.

14 cl, 6 dwg

Monitoring system // 2552182

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to means of monitoring system status data. The method comprises emulating and/or using a modified presence service to obtain information on monitored subjects in order to determine system status as modified presence status in a modified presence service; Adding, from at least one database using an output value of at least one dynamic monitored subject, data/information on monitored subjects in order to determine system status thereof for the dynamic monitored subject; integrating said output value with system status distribution for presentation of the system status of said dynamic monitored subject; accessing the system status for at least one dynamic monitored subject; reading as input data a portion of information relating to the health of an individual or other confidential information; recognising an individual data field from information distribution for said individual based on a set of criteria; recording into a database said portion of information relating to the health of an individual or other confidential information, which does not include individual data of said individual.

EFFECT: easy access to unclassified information.

13 cl, 27 dwg, 7 ex

FIELD: physics, computation hardware.

SUBSTANCE: invention relates to computer engineering, particularly, to printed data relaying hardware that controls data on imager. Proposed system allow data exchange with print services system controlled by manufacturer which releases specs for data exchange with imagers. This system comprises means to define request for registration of the user's imager. It includes means to instruct which defines if second record entry and data are not registered in association. Then, second record entry and data on print function are registered.

EFFECT: ruled data leaks.

8 cl, 24 dwg

FIELD: radio engineering, communication.

SUBSTANCE: if the bits of a digital image signal byte and message signal byte coincide, then the logical "1" value is assigned. Otherwise, the logical "0" is assigned. Then, a {F} array is formed to record the logical values. The latter are stored in the {F} array after comparison of the digital image signal and message signal bytes. Afterwards, the logical values are read from the {F} array. Then, a message marker packet is formed with recording the logical values from the {F} array to the information field of the packet. The marker packet and digital image packet are transmitted using different communication channels.

EFFECT: higher security of confidential information transmission.

3 dwg

FIELD: transport.

SUBSTANCE: vehicle control system (100) comprises the first set of vehicle functions set (V-CAP). Vehicle (100) user interface (101) receives personal data (D-ID) designating the vehicle (100) drive identity. Communication device (105) transmits personal data (D-ID) and vehicle data (V-ID) to data processor module (120). The later analyses if the user identified by personal data (D-ID) is the authorized user of vehicle (100). If so, vehicle description (D-CERT) is compared with said first set of vehicle data (V-CAP). Then, activation message (MSG-A) is generated to indicate the necessity of activation of the driver authorized functions included in the first set of vehicle (100) functions (V-CAP). Invention covers also the method of vehicle control.

EFFECT: vehicle control by authorized drive only.

8 cl, 2 dwg

FIELD: transport.

SUBSTANCE: invention relates to automotive industry, particularly, to antitheft devices. Antitheft interlock comprises thrust or thrust shoe with limiter interacting with wheel inner side surface while L-like pin is fitted in the disc vent opening or between spokes and locked at thrust shoe at point corresponding to wheel appropriate width. This interlock this interlock suits most forged and cast light-alloy discs. To prevent wheel removal wheel nits securities are used.

EFFECT: simplified design and fitting in place.

2 dwg

FIELD: radio engineering, communication.

SUBSTANCE: method of protecting a car security system from unauthorised use includes a receiving device mounted on a car and a portable transmitting user device, wherein the transmitting device creates a code package using an encryption key and transmits the package to the receiving device. When reprogramming the system, particularly in case of real or imaginary malfunction of the system, communication between the portable transmitting device and the receiving device is carried out through an information transmission channel which does not use a radio signal.

EFFECT: low risk of information interception.

5 cl, 1 dwg

FIELD: transport.

SUBSTANCE: auxiliary interlocking mechanism is proposed which mechanism locks interlocking element (6) in steering column locking position. In the auxiliary interlocking element, its sliding plate (91) is engaging with auxiliary catching section (95) of interlocking element (6) being in steering column locked position, so that engagement between holding element (21) and holding/receiving section (93) could disengage. Closer to the side of interlocking element (6) rear end relative to relative to auxiliary catching section (95), fragile section (74) is fitted permissible loading on which is less than loading which can sliding plate (91) can withstand. In case when loading of specified or greater value is applied to interlocking element (6), the latter (6) breaks in fragile section (74).

EFFECT: enhanced antitheft protection.

11 cl, 14 dwg

Vehicle terminal // 2537892

FIELD: physics, navigation.

SUBSTANCE: invention relates to the field of navigating, namely to vehicle terminals. The vehicle terminal includes the master microcontroller, antenna GPS/GLONASS, SIM-chip, housing. The housing contains the standby power supply and printed circuit board. The printed circuit board has flash memory, three-axial accelerometer, GPS/GLONASS receiver, power supply control unit, GSM module with antenna, LED indicators, interface unit connection module, slot for installation of SIM-card of mobile communication operator, external power supply module. The output of GPS/GLONASS antenna is connected to the input of GPS/GLONASS receiver. The master microcontroller contains minimum 7 inputs-outputs. SIM-chip and slot for installation of SIM-card are connected to GSM-module. The power control module is connected with the external power supply module and standby power supply module. The acceleration sensor is designed with additional function of determination of acceleration values by three coordinate axes. The standby power supply terminal contains the lithium - polymeric battery.

EFFECT: improvement of reliability of obtaining operating and reliable monitoring information at simultaneous decrease of the sizes of the vehicle terminal.

8 cl, 1 dwg

FIELD: radio engineering, communication.

SUBSTANCE: control points are placed on motorways and are provided with receivers for detecting a source of interference for GPS and GSM signals. Photographic and video capturing of vehicles on the motorway is performed upon detecting interference and the data are transmitted to a remote server. Data received at the server from multiple control points are processed to detect licence plate matches. Data on said licence plates and direction of movement are transmitted to road patrol service posts nearest to the last point where the interference was detected.

EFFECT: high efficiency of detecting stolen vehicles.

2 dwg

FIELD: transport.

SUBSTANCE: steering wheel interlocking device consists of rod, braces rigidly fixed on it, grip installed on steering wheel and locked by lock mechanism. Lock mechanism is made as separate unit with key. The grip is made as levers with pin. The braces are made as plate with holes in butt ends and in base. In one of butt end holes, rod is installed, and in the other butt end hole pin is installed on which pin levers are fixed opposite to each other with possibility to rotate around this pin for specified angle. In the hole in plate base, lock mechanism is installed.

EFFECT: improved protective properties and reduced dimensions of steering wheel interlocking device.

5 dwg

FIELD: physics, computer engineering.

SUBSTANCE: group of inventions relates to public information systems and intelligent transport systems. The method comprises installing an intelligent transport system on vehicle, completely adapting the system to the electrical system of the vehicle, using the system continuously in automatic and manual mode together with cellular communication means, the Internet and navigation satellite systems, and performing video surveillance and monitoring of the vehicle at a distance using cellular equipment which supports 3G technology. The intelligent transport system consists of the following basic interlinked structural components: a video surveillance system, a video recorder, a touch screen display, a processor board with a SIM module, a transceiver, an emergency unit with an antitheft system module, a uninterrupted power supply, a multimedia device, a distance meter and a preventive security system.

EFFECT: achieving comprehensive protection of a vehicle, the driver, passengers, pedestrians and creating favourable traffic conditions overall.

4 cl

FIELD: transport.

SUBSTANCE: group of inventions relates to automotive industry. Proposed device comprises valve (7) to reciprocate in antitheft device (1) for locking the steering column. Lock is fixed to antitheft device (1) to displace said valve (7). Locking means displace when lock gets disengaged from antitheft device (1) between inactive position and working position whereat locking means lock said valve (7). Antitheft device (1) comprises extra retainers of locking means to lock the latter at working position. Said retainers comprises clip and second spring means to act thereat in direction of the position whereat said clip retains said locking means at working position.

EFFECT: higher reliability.

12 cl, 6 dwg

FIELD: physics; control.

SUBSTANCE: invention relates to automated systems for monitoring road traffic and is intended for automatic identification of vehicles and generating an algorithm of actions with respect to further use thereof, and for real-time notification of the driver on all remarks relating to use of a vehicle as a road traffic participant. The vehicle monitoring system includes an electronic device mounted on the vehicle and capable of storing the identification number of the vehicle and information necessary and sufficient for mutual authentication of said device and devices at control points of the system, which are connected via a single telecommunication network to a distributed data base in which the obtained information is processed. To improve protection from unauthorised access, broadcast data are encrypted and accuracy of obtained information is further verified.

EFFECT: designing a reliable system for informing a driver on use of a vehicle as a road traffic participant.

8 cl, 3 dwg

FIELD: transport engineering; security systems.

SUBSTANCE: invention relates to radio-electronic systems used for monitoring immovable property objects and vehicles. Proposed system contains one or several dispatcher centers, personal information centers, stationary and carry-on alarm complexes. System is provided with over-territory distributed retransmission-radio direction finding network with retransmitters-radio direction finders made for reception of signals containing code messages from carry-on alarm complexes, measuring power of received signals and bearings of sources of radiation and transmission of said code messages and results of measurements to dispatcher center. Said dispatcher centers and at least part of personal information centers are made with possibility of access to external information sources. Stationary and carry-on alarm complexes are made for transmission of voice and text messages and video pictures by cellular mobile communication network. Dispatcher centers and personal information centers are made for reception of said voice, test messages and video pictures by cellular mobile communication network.

EFFECT: reduced level of false alarms at revealing of facts of unauthorized action onto objects under protection, improved reliability of location of hi-jacked vehicle.

3 cl, 6 dwg

Up!