System for manufacturing, counting and verifying protective marks and protected documents

FIELD: engineering of systems for marking and verifying objects, possible use for marking and identification of products, valuable papers and documents.

SUBSTANCE: system consists of verification center, data input stations, similar number of corporative databases of corporative control centers, n verification stations, system has blanks of protective marks with applied counting numbers, and cancelled marks, indexes show number of corporative control center acting as data provider. System provides for high protection of information applied onto protective mark.

EFFECT: possible marking of objects in several corporative subsystems and with reliable confirmation of authenticity of marked objects present in industrial circulation.

11 cl, 13 dwg

 

The invention relates to systems of marking and identification authentication of controlled objects and can be used when marking and identification products, securities and documents.

Known automated manufacturing and accounting documents for drivers (patent RF №2128856, CL G 06 F 17/60, 1999)containing the block forming information of the liner ID, block reception of personal data, the operator's console, monitor, printer.

The disadvantage of this system is the limited scope of application, high technological complexity of obtaining the identification features of interest, and low reliability of the identification of the authenticity of the documents in the process of their use.

Also known automated object identification and registration of its status under the patent of the Russian Federation No. 2107943, CL G 06 F 17/60, 17/40, 1998, computing machine contains main information base, the N channels of input and processing of information, the communication unit and switching, two block registration.

The disadvantages of this device is the difficulty in the formation and use of external information systems, as well as the high probability of errors in identification due to the presence of subjective factors in the formation of the identification characteristics of the operator.

Known similar system is avci WO No. 91, 10202, CL G 06 F 15/46, 1991, including the position of the marking on the product, the device recording marks in the database, the reader marks on remote positions, lines of communication between the database and readers of the marking device, comparing the read marking stored in the database and a decision on the future movement of products.

This system has the disadvantages that are associated with a very limited sphere of its application, does not allow its use for identification of products due to the lack of technical means to identify the authenticity of products in their illicit production and use.

Also known by the system (EP application No. 0112944, CL G 07 F 7/10, 1984), including the Central point with the main database, a network of remote terminals with their databases, communication lines to connect remote terminals to a Central point, a set of credit cards and devices for their marks.

The disadvantages of this system include low reliability of determining the legality of using a credit card if its illegal owner enters an identification number that matches the number stored in the database of the Central point.

A known system for identifying a registered isdel the second RF patent No. 2106689, CL G 06 K 17/00, G 06 F 17/60, 1998, containing the reference database, at least one production database, at least one device access databases, communication lines connecting the reference database at least one device access databases, at least one comparator connected to the corresponding device access databases, at least one marking device, at least one input device for inputting information about manufactured the product in the reference database, at least one point of data entry to enter information about the product, marketed in at least one production database through the appropriate device access databases, and at least one device to a decision.

This system is in contrast to the previously considered analogues allows you to label and identify the registered product, however, is narrow in scope and does not provide centralized production and protection of marks marking. In addition, there is no possibility of marking and registration of products manufactured outside of this system.

Closest to the technical nature of the claimed system is a system for marking and identification products for Eurasian p. the tent No. 002696, CL G 06 K 1/12, 9/00, 2002, which is chosen for the prototype. The known system includes a Central control and monitoring, Central database, the input device, peripheral k databases, k peripheral workstations print trademarks and k points of the input data, n production databases, n devices for the treatment to work databases n identification and marking m devices, where k, n and m can be any integer non-negative numbers.

The system prototype in contrast to the previously considered analogues allows you to label products protective signs and identify them in business. However, the system prototype has drawbacks:

- narrow scope. The system prototype are considered protective labels, produced in the framework of only one system. There are no means to identify protective signs produced in other similar systems and located in the economic turnover;

low security of the information printed on the sign of protection, due to the lack in the system-the prototype of the mechanisms for centralized generation of signature keys, to guarantee their reliability and delivery (shipping) to devices verification of signature key certificates, and timely replacement of the compromised key signature. It is possible false the paths (substitution) information on the sign of protection and the formation of a digital signature using a false private key signature when included in a bar code corresponding public key, use when checking to confirm the authenticity of the digital signature and, therefore, will not enable the detection of the fact of the substitution information;

- the inability reliable reading and confirming the account number blank protective sign. The system prototype alphanumeric text and bar code are applied to the unrecorded form a protective sign and verification of protective sign there is no reliable confirmation of the account number blank. The system prototype does not exclude subjective operator error when entering the account number blank protective sign in the composition of the bar code.

The technical result of the claimed system is to expand the scope of its application and the increased security of the information on the sign of protection through centralized software system elements key information and automate the entry of the account number blank protective sign part a barcode, excluding subjective operator error.

To achieve the above technical result in the famous production system, accounting and verification of protective signs and security documents, including k data entry points, where k=1, 2, ..., k corporate databases, k corporate control centers and control, the first output of each of the k corporate control centers and control connection is with the input of the corresponding item of the input data, the output of which is connected to the input of write data corresponding to the corporate database. The third output and the third input of each of the k corporate control centers and control respectively connected with the control input and the information output of the corresponding corporate database. The first input of each of the k corporate control centers and control is the corresponding input of the system. The fourth output of each of the k corporate control centers and control is the corresponding output of the system. Added certification center and n points verification, where n=1, 2, .... the Output of the certifying center is connected to the second input of each of the corporate centre management and control and to the second input of each item verification. The entrance of the certifying center is connected to the second output of each of the corporate centre management and control and to the second output of each item of verification. The first input of each of the p points of verification is appropriate control input of the system. Forms a protective signs printed account numbers coming into the corporate control centers and control, and protective signs are received at the control inputs of the system.

Repaid protective signs are collected by the relevant corporate control centers and control points from verify the promotion.

Corporate centre management and control consists of data devices, remote control devices accessing the corporate database monitor, the device verification unit aggregation and the print unit, the first input connected to the fifth output devices accessing the corporate database, the first output of which is connected with the second input of the verification, the first input which is the input of the read bar code. The output device verification connected to the first input device accessing the corporate database, a second input connected to the third output of the operator control, the second output of which is connected to the input of the monitor. The first sign of operator control is the first entry of the corporate centre management and control. The first output and second input of the operator control connected respectively with the second input and the first output data device, the first input and the third output are, respectively, the second input and second output of the corporate centre management and control. The second output and the third input device accessing the corporate database are respectively the third output and the third input of the corporate centre management and control. The third output device is tion of access to corporate database is connected with the third input data device, the second output is the first output of the corporate centre management and control. The fourth output devices access corporate database connected to the input unit of the aggregation, the output of which is the fourth release of the corporate centre management and control. Protective signs come from the output of the print unit. The fourth output data device connected to the third input of the verification, and forms a protective signs printed account numbers proceed to the second input of block printing.

Repaid protective signs are sent to the input of the read bar code device verification.

Item verification device verification device maturity, the device appeals to the working database working database. The output device verification connected with the third input device appeals to the working database. The third output device access production database is connected with the second input of the verification, a third input connected to the fourth output of the appeal to the working database. The input device repayment connected to the first input device verification and is the first entry point verification. The second output and the second input device appeals to the working database are respectively first the m output and a second input point of verification. The first output device access production database is connected with the control input of the production database, the information output of which is connected to the first input device appeals to the working database. The second exit point verification is the output of maturity. Repaid protective signs come from the output of maturity.

Item verification device verification, device access production database and a production database. The output device verification connected with the third input device appeals to the working database. The third output device access production database is connected with the second input of the verification, a third input connected to the fourth output of the appeal to the working database. The first input device verification is the first entry point verification. The second output and the second input device appeals to the working database are respectively the output and the second input point of verification. The first output device access production database is connected with the control input of the production database, the information output of which is connected to the first input device appeals to the working database.

As a protective signs of use documents.

The system contains m marking devices, where m C is white non-negative number (m≥ k), and protective signs come on the marking device from corporate control centers and control.

Device verification consists of a reader, cryptographic block, the block comparison operator control and monitor an input connected to the first output of the operator control input connected to the output of the Comparer, the first and second inputs which are connected respectively with the first and second outputs of the cryptographic unit, the first input connected to the output of the reader. The second output of the remote control operator is the output device verification. The first and second inputs of the device verification are respectively the input block is read and the third input of the comparator. Second input of the cryptographic unit is the third input of the verification.

The print unit consists of printer, media, key signatures, shaper text driver service information, driver control and accounting information, the reader and shaper of electronic digital signature, the first input connected to the output media key signature. The input of the shaper text is the first input of the print unit. The printer output is the output of the print unit. The output of the reader is connected with the second whodo the shaper service information, first input connected to the input of the shaper text. The output of shaper service information connected with the second input of the shaper electronic digital signature, the output of which is connected to the first input of the shaper control and accounting information, a second input connected to the output of the shaper text. The output of the shaper control and accounting information connected to the first input of the printer. The second input of the printer connected to the input of the reader and is the second input of the print unit. Forms a protective signs printed account numbers proceed to the second input of the print unit. Protective signs come from the printer output.

The cryptographic block contains the selector of the electronic digital signature, the selector information, the drive of the signature key certificates and ID digital signature, a second input connected to the output of the selector digital signature, an input connected to the input of the selector information is first input of the cryptographic unit. The output of the identifier of the electronic digital signature is the first output of the cryptographic unit. The output of selector information connected with the third input of the identifier of the electronic digital signature and the second output of the cryptographic unit. Output drive CE is the value of certificates of signature keys connected to the first input of the identifier of the electronic digital signature. The entrance drive of signature key certificates is the second input of the cryptographic unit.

Thanks to the new essential features expands the scope of application of the system and increases the security of the information on the sign of protection through centralized software system elements the key information. Bringing up points verification of signature key certificates of all corporate control centers and control allows you to securely verify digital signature and to identify any protective sign, produced in any enterprise Central management and control, as well as to detect with high reliability falsified protective signs. Information security on the sign of protection also increases due to the introduction of the bar code account number form a protective sign. Automation read and input the account number blank protective sign excludes subjective operator error.

The analysis of the level of technology has allowed to establish that the analogues, characterized by a set of characteristics that are identical to all features of the claimed technical solution is available, which indicates compliance of the device to the condition of patentability "novelty".

Search results known solutions in this and related areas is the beautiful techniques to identify signs, match the distinctive features of the prototype of the features of the declared object, showed that they do not follow explicitly from the prior art. The prior art also revealed no known effect provided the essential features of the claimed invention transformations on the achievement of the technical result. Therefore, the claimed invention meets the condition of patentability "inventive step".

The claimed system is illustrated by schemes:

figure 1 - block diagram of the claimed system;

figure 2 - block diagram of the corporate centre management and control (CMC);

figure 3 - block diagram of point verification (option 1);

4 is a block diagram of point verification (option 2);

5 is a block diagram of a device verification;

6 is a block diagram of the print unit;

7 is a block diagram of a cryptographic unit;

Fig - appearance of the form of the fuel ticket (TT);

figure 9 is an external view of the fuel card control account information;

figure 10 is an external view of the secure certificate of conformity of the medicinal product;

11 is an external view of regional special stamps for marking alcoholic beverages;

Fig - appearance form protective sign for marking of audio and video;

Fig - appearance protective sign for the labelling of medicines.

production System, accounting and verification trademarks and protected documents, shown in figure 1, consists of a certifying centre 1, k items of data entry 21...2kwhere k can be any integer non-negative number, the same number of corporate databases (DB) 31...3kcorporate control centers and control (CMC) 41...4kn points verification 51...5nwhere n can be any nonnegative integer number. In addition, the system contains forms protective signs printed account numbers, protective marks 81...8kand repaid protective marks 91...9kand the quantity of protective signs and repaid protective characters can be any integer, and the indices 1...k indicate the number of corporate CMC, made the data protection labels.

Under the protective sign means an accounting control mark, an identification mark or document with comprehensive protection against fraud and carrying control and accounting information about the protected object. Form protective sign a document of strict accountability with a user number and a field for the application of accounting control information performed by printing method and has several levels of protection.

The first output of each of the k corporate CMC 41...4kconnected to the input of the corresponding entry point is data 2 1...2kwhose output is connected to the input recording data corresponding corporate database 31...3k. The third output and the third input of each of the k corporate CMC 41...4kconnected respectively with the control input and the information output of the corresponding corporate database 31...3k. The first input of each of the k corporate CMC 41...4kis the corresponding input of the system. The fourth output of each of the k corporate CMC 41...4kis the corresponding output of the system. The output of the certifying center 1 is connected to the second input of each corporate CMC 41...4kand to the second input of each paragraph 51...5nthe verification. Input ID center 1 is connected to the second output of each corporate CMC 41...4kand to the second output of each paragraph 51...5nthe verification. The first input of each of the n points 51...5nverification is the corresponding control input of the system. Forms 71...7kprotective signs printed account numbers coming into the corporate CMC 41...4k. Protective marks 81...8kgo to the control inputs of the system. Repaid protective marks 91...9kenter the appropriate corporate control centers and control the which outputs points 5 1...5nthe verification.

In the case of protection of objects by their labeling system may include m marking device 61...6mwhere m non-negative integer (m≥k). The marking device 61...6mdesigned for the application of protective signs on the protected (marked) objects, including documents, product packaging, bottles, CDs and cassettes, audio and video products, packaging of medicines and other Protective signs 81...8kcome on the marking device 61...6mfrom corporate CMC 41...4k.

The system can be made, to be considered protected documents.

Corporate CMC 41...4kare the main elements of the system and are designed to control the entry of data in the corporate database 31...3k, production (printing) and the protection of marks, their verification and acceptance repaid trademarks. Corporate CMC 4 (figure 2) consists of the device 4.1 data exchange, remote 4.2 operator control device 4.3 access to corporate databases, unit 4.4 print, monitor, 4.5, 4.6 device verification and block 4.7 statistical processing. The first output and the first input device 4.3 accessing corporate databases are connected respectively with the second inlet and outlet condition the device 4.6 verification. The first input device 4.6 verification is the entrance reading a barcode. The fourth and fifth outputs of the device 4.3 accessing corporate databases are connected respectively to the input unit 4.7 statistical processing and to the first input unit 4.4 printing. The third output 4.3 accessing corporate databases connected to the third input of the device 4.1 data exchange. The second input device 4.3 access to corporate databases is connected with the third output 4.2 remote operator control. The first output and second input of the console 4.2 operator control connected respectively with the second input and the first output 4.1 data exchange. The second output of 4.2 remote operator control connected to the input of the monitor 4.5. The first input of the remote 4.2 operator control is the first sign of corporate CMC 4 and simultaneously the Central entrance system. The second output of the device 4.1 data exchange is the first corporate CMC 4. The first input and the third output 4.1 data exchange are, respectively, the second input and second output corporate CMC 4. The second output and the third input device 4.3 access to corporate databases is respectively the third output and the third input of corporate CMC 4. The output of block 4.7 statistical processing is the fourth corporate CMC 4 and at the same time in the course of the system. The fourth output 4.1 data exchange is connected to the third input device 4.6 verification. To the second input unit 4.4 printing act forms a protective signs printed account numbers. Protective signs come from the output of the block 4.4 printing at the first input of the read bar code devices 4.6 verification and corporate CMC 4, as shown in figure 2 by the dotted line arrow, similar to figure 2 shows that repaid protective signs also receives at the first input of the read bar code devices 4.6 verification from paragraphs 51...5nthe verification.

Certification authority 1 is designed to store registration data corporate CMC 4, formation and storage of signature keys, public key certificates, certificate revocation, and to interact with corporate CMC 41...4kand paragraphs 51...5nverification to ensure their key information.

Paragraph 5 of the verification is designed for reading service information, applied in the form of a bar code, verifying the digital signature and comparing the read service information with the information stored in the corporate database 31...3k. In the first embodiment, paragraph 5, of the verification also provides for the repayment of protective marks 81...8k.

Paragraph 5 of the verification by the first is arianto (figure 3) consists of devices 5.1 verification device 5.2 appeals to the working database working database 5.3 and 5.4 device repayment. Output and the second input device 5.1 verification respectively connected with the third input and third output devices 5.2 access production database. The third input device 5.1 verification connected to the fourth output 5.2 access production database. Input devices 5.4 repayment connected to the first input device 5.1 verification and is the first entrance, paragraph 5, of the verification. The second output and the second input device 5.2 access production database are, respectively, the first output and a second input, paragraph 5, of the verification. The first output device 5.2 access production database is connected with the control input of the production database 5.3, the information output of which is connected to the first input device 5.2 access production database. A second output, paragraph 5, of the verification is output 5.4 maturity and redeemed protective marks 91...9kcome with an exit device 5.4 maturity.

Paragraph 5 of the verification by the second option (figure 4) consists of devices 5.1 verification device 5.2 appeals to the working database working database 5.3. Output and the second input device 5.1 verification respectively connected with the third input and third output devices 5.2 access production database. The third input device is istwa 5.1 verification connected to the fourth output 5.2 access production database. The first input device 5.1 verification and is the first entrance, paragraph 5, of the verification. The second output and the second input device 5.2 access production database are respectively the output and second input, paragraph 5, of the verification. The first output device 5.2 access production database is connected with the control input of the production database 5.3, the information output of which is connected to the first input device 5.2 access production database.

The device 4.6 verification intended for reading service information, applied in the form of a bar code, verifying the digital signature, and compare 1 read the service information with the information stored in the corporate database 31...3k. The device 4.6 verification (figure 5) consists of devices 4.6.1 reading, cryptographic unit 4.6.2, block 4.6.3 comparison, 4.6.4 remote operator control and monitor 4.6.5. The output of block 4.6.1 reading connected to the first input of the cryptographic unit 4.6.2. The first and second outputs of a cryptographic unit 4.6.2 connected respectively with the first and second inputs of the block 4.6.3 comparison. The output of block 4.6.3 comparison is connected to the input of the remote 4.6.4 control operator. The first output 4.6.4 remote operator control connected to the input of the monitor 4.6.5. The second output 4.6.4 remote control operator is the output 4.6 verification. The input device 4.61 reading is a sign reading bar code - the first input device 4.6 verification. The third input unit 4.6.3 comparison is the second input device 4.6 verification. Second input of the cryptographic unit 4.6.2 simultaneously is the third input device 4.6 verification. Protective signs are sent to the input of the reading device 4.6 verification. Repaid protective marks 91...9kfed to the input of the reading device 4.6 verification, as shown in figure 5 by the dotted line.

Appointment and composition of the device 5.1 verification is identical to the device 4.6 verification.

Unit 4.4 printing is designed to automatically read the account number from the form 7 protective sign, formation control of accounting information and its application on form 7 protective sign. Accounting control information represents a set of consumer and service information. Consumer information is applied to the protective mark 8 alphanumeric text and contains information about consumer properties of products (goods) and Kodo-numeric numbering of the manufacturer (supplier) and the protected instance of product (goods). Consumer properties of products (goods) are parameters monitored visually, by touch, by weight (volume), by color and smell. Kodo-numbers may contain administrative region code, manufacturer code (set the ICA) application number, the manufacturer of the party trademarks, the number of the protection of the mark in the party, etc.

The service information contains consumer information and the set of identifiers (codes)defining accounting products in a corporate database 3. Service information is applied to the protective character in the form of a two-dimensional bar code.

Unit 4.4 printing (6) consists of devices 4.4.1 reading shaper 4.4.2 text, shaper 4.4.3 service information, media 4.4.4 key signatures, shaper 4.4.5 electronic digital signature (EDS), shaper 4.4.6 control and accounting information, printer 4.4.7. The first input of the shaper 4.4.3 service information connected to the input of the shaper 4.4.2 text and is the first input unit 4.4 printing. The second input of the shaper 4.4.3 service information connected to the output 4.4.1 reading. The first and second inputs of the former (4.4.5 EDS are connected to the outputs respectively of the shaper 4.4.3 service information and media 4.4.4 key signature. The output of shaper 4.4.5 EDS is connected to the first input of the shaper 4.4.6 control and accounting information. The output of shaper 4.4.2 text is connected with the second input of the shaper 4.4.6 control and accounting information, the output of which is connected to the first input of the printer 4.4.7. The second input of the printer 4.4.7 connected input device can and is the second input unit 4.4 printing. Forms 7 protective signs printed account numbers received on the second input unit 4.4 printing. The output of the printer 4.4.7 is the output of the block 4.4 printing from which proceed protective signs 8.

The cryptographic unit 4.6.2 designed for verifying the digital signature, is (7) from the drive 4.6.2.1 certificate signature keys, selector 4.6.2.2 EDS, selector 4.6.2.3 information and ID 4.6.2.4 EDS. The inputs of highlighters 4.6.2.2 and 4.6.2.3 United and are the first input of the cryptographic unit 5.6.2. The output of the selector 4.6.2.2 EDS is connected with the second input ID 4.6.2.4 EDS. The output of the selector 4.6.2.3 information connected with the third input ID 4.6.2.4 EDS and is the second output of the cryptographic unit 4.6.2. Output ID 4.6.2.4 EDS is the first output of the cryptographic unit 5.6.2. Output drive 4.6.2.1 of signature key certificates connected to the first input ID 4.6.2.4 EDS. The entrance drive 4.6.2.1 of signature key certificates is the second input of the cryptographic unit 4.6.2.

Certification authority (CA) 1 can be implemented in a known architecture "CryptoPro TC" (publ. "Certification authority "CryptoPro", Form, GTI-01 90 03 CryptoPro. General description. http://www.CryptoPro.ru.") and includes in its membership the CA, at least one registration center, at least one of auto servanne the administrator's workstation, user interaction with the TC and software interface for communication with the CA. Elements of CA are interconnected by LAN. In addition, the composition of the CA may include a modem equipment (modem pool) to communicate with users. CA can be used software module support network authentication "CryptoPro TLS", which implements the Transport Layer Security Protocol (TLS 1.0, RFC 2246). This Protocol provides cryptographic means authentication of the sender (client) and destination (server).

Similar certification center is deployed in the branch of the FSUE STC "Atlas" in St. Petersburg) and provides a system of mandatory certification of medicines and corporate systems manufacturing, accounting and control of fuel coupons.

The certification authority and registration authority certification center 1 may be implemented on computers (servers) and to function in the operating system Microsoft Windows 2000/2003 Server. Database registration authority can be based on Microsoft SQL Server 2000.

Workstation administrator CA is designed to carry out organizational and technical measures related to corporate registrations CMC 41...4kthe formation of signature keys and the respective certificates key of the signature, and to manage the registration center. Implemented on a personal computer and can be run under the operating system Microsoft Windows 2000 Professional/XP.

Interaction of DCS with 1 corporate CMC 41...4kand the posts 51...5nverification can be provided through SOAP interface (Simple Object Access Protocol), which is provided to the user by the registration authority. The specified Protocol can be implemented, for example, using software Microsoft Internet Information Server 5.0.

Corporate DB 31...3kimplemented on the hard disks of computers (servers) using the appropriate software database management system (DBMS)such as SQL server 7.0, developed by Microsoft, publ. in Spenik M, Sledge Acting "administrator's Guide database", Per. s angl., M. : publishing house "Williams", 1999, or Oracle DBMS. These DBMS are software tools delineating the rights of users and allow you to administer your corporate database in accordance with security policy. For reliability and integrity of databases, the hardware part of the computer (server) can include two or more processor platform memory 256 MB or more, with a set of hard drives and special controllers, RAID type, ensure the surrounding multiple duplication of stored databases. Working DB 5.3 can be implemented using a DBMS, such as SQL server 7.0 version deskop edition, publ. ibid, s-861.

Communication between corporate CMC 41...4kand paragraphs 51...5nverification is carried out through the device 4.1 exchange of data over communication lines, such as a dedicated digital communication channel mode dial-up or on public networks such as INTERNET or INTRANET supporting protocols TCP/IP. As the device 4.1 data exchange can be used a modem connected to a PC via a network card. To protect information transmitted over communication channels, the device of the communication software can be used cryptographic protection of information, for example "CryptoPro CSP", commercially produced jointly LLC CRYPTO-PRO and STC "Atlas" in Moscow).

Forming a digital signature is carried out by standard cryptographic algorithm, for example according to the Russian standard GOST R 34.10-2001, allowing both software and hardware implementation. In the case of a software implementation shaper 4.4.5 EDS may be implemented using known software cryptographic protection of information, such as "Crypto Pro", "Verba-O" (development of the Penza NII) or CryptonArcMail" (firm ANKAD, , Moscow).

Driver 4.4.2 text and shape Novatel 4.4.3 service information are implemented in software by processing the relevant information in digital form with the subsequent merger of the former 4.4.6 control and accounting information in a single image. Shaper 4.4.6 control and accounting information will also be implemented in software, for example, by a software module Anex Tools for PDF 417 ("Anx 417") version 1.61 developed by Anex Technologies Inc., Canada.

As the carrier 4.4.4 key signatures can be used in smart cards (smart cards) or media such as USB flash. The required memory allocation for storing the signing key is not less than two kilobytes.

As the printer 4.4.7 you can use industrial thermal transfer printers, bar code type Datamax I-4208, Datamax W-6208 (firm DataMax Inc. USA), or Zebra-105, -104, you can print a two-dimensional bar code and alphanumeric text on forms 71...7kprotective signs, picked at the tape rolls.

As the printer 4.4.7 may also be used in a laser printer type SOLD80e, produced by firm MICROPLEX and deliver enterprise POS GroupDistributor of Japan CBM. (g Moscow). Laser printer provides high print quality and speed when printing on a continuously fed paper.

For applying two-dimensional bar code and alphanumeric text on the documents of A4 or A5 may be used commercially available laser printer HEWLETT PACKARD (HP LaserJet 1100, -1300, -2100, -2200) or similar printer, by CANON. Use an inkjet printer.

As the e devices 4.6.1, 4.4.1 reading can be used a specialized reading device, such as scanners manufactured by Symbol or WelchAllyn that reads the bar code and converting it into digital form. When reading or recognition of account numbers printed in alphanumeric form, as the reader may apply the device OCR-Optical Character Recognition, supplied by the Russian company ABBYY.

The marking device 6, as in the prototype, can have any design, providing a secure application (fixing) protective mark on each product (document) is in the process of its manufacture or after manufacture. In particular, a marking device may consist of an automatic applicator of a type LA 3115 CE, LA 2015 RH ST, LA 1015 CE, etc. (producer - Corporation LABEL-AIRE).

The device functions 5.2 access desktop database and devices 4.3 accessing corporate databases are implemented in the computer using a software interface, such as ADO (ActiveXData Objects), developed by Microsoft, publ. guide for creating applications Microsoft SQL Server Building Applications", ed. Microsoft Corporation, 1998, c.379-419.

In the claimed system, the number of points 51...5nverification is not less than the number of corporate CMC 41...4k(n≥k) and dependent on the development of client networks cor is orationi systems, the quantity of protective signs, as well as the required completeness of verification (control) in economic turnover.

Paragraph 5 of verification may also have a portable (mobile) version and implemented on a personal computer, such as notebook type Roverbook, equipped with built-in network card and internal modem for communication with the CA 1 and corporate CMC 4, and to have the reader (scanner) two-dimensional bar code and the device repayment trademarks. Mobile item can be a tool of control of an authorized officer of inspector or be interested organizations (individuals). In that case, if the protective signs are topographic protective elements with hidden images, micron texts, special tags that are deposited using substances with anti-Stokes coupling high resolution (ASBR), and visible under IR irradiation, mobile, point to advanced, can be combined optical control means, such as laser and infrared Visualizer "Atlas 3/1" (produced by FSUE STC "Atlas", Moscow) and/or a device for reading the micron texts, for example the microscope pin 30-fold produced by Mikko.

Unit 4.7 statistical processing is rednaznachen for reporting certificates and implemented in computer software, for example using application programs OLAP server and Microsoft Office-2000, developed by Microsoft and published in the guide to creating applications Microsoft SQL Server Building Applications", ed. Microsoft Corporation, 1998, c.883-1292. For display and outputs the results of statistical processing can be enabled output device such as printer and monitor are included in the corporate CMC 4.

Remote 4.2 operator control and remote 4.6.4 operator control can be implemented based on the workstation PC operator or to have a standard keyboard for a set of control signals and data input and/or panel set of formal commands and switching equipment for connection to the respective units (devices).

The highlighters 4.6.2.2, 4.6.2.3 and ID 4.6.2.4 EDS is realized with software based on well-known cryptographic protection of information, for example CryptoPro, CryptonArcMail or "Verba-On."

Drive 4.6.2.1 of signature key certificates can be implemented on the computer's hard disk by allocating the necessary memory resources, decorated in a separate directory (folder). Memory allocation depends on the number of stored certificates and can be determined based 0,9...1,2 kBit, one of the signature key certificate.

The claimed system works as follows.

The aim of the invention is the creation of a unified system, which identifies objects in multiple corporate subsystems and with high reliability to confirm the authenticity of the marked objects in the economic turnover.

The basis for the development of manufacturing, accounting and verification of protective signs properly integrated use of bar coding, cryptography and information security technologies, as well as objective and automated accounting and control authentication protective signs throughout the life cycle (business turnover) of objects of protection. The essence of the proposed system is to create an ordered set of technical tools and information technologies that use computer equipment and communications and implementing information support for the process of manufacturing, accounting and verification of protective signs, as well as control over their movement and use in business.

The system is applicable for manufacturing, accounting and control of fuel coupons, certificates of compliance of medicines, protection of excisable goods (alcohol and tobacco), audio and video products and other products (goods) and the securities.

We illustrate the operation of the system is and example of manufacturing, accounting and control (verification) of the fuel coupons (TT), which are declared in the system function as trademarks.

In each of the k corporate fuel companies, where k may be any integer, deployed corporate CMC 4, corporate DB 3 and the device 2 of the input data. The fuel companies have a network of n filling stations (NPP), where n≥k may be any integer. At each gas station is equipped with paragraph 5 of verification.

Fuel companies receive from manufacturers (printers, factories) semi-finished products in the form of blanks TT (Fig.7), put (print) they control and accounting information, take into account corporate DB 3 number and range is fabricated TT 8, which sell to consumers, such as trucking companies. The last use of TPS in the calculations at the gas station for fuel and lubricants (POL), including gasoline, diesel fuel, motor oil, etc.

At the gas station vacation POL after verification TT 8 and in accordance with the amount and type of fuel specified on the TT in the control and accounting information. Tested (verified), and adopted by TT 8 is taken into account in paragraph 5 verification of NPP in the working DB 5.3 settled through the device 5.4 maturity and returned (sent) by the fuel companies for subsequent accounting write-offs implemented tons of the fuel, treatment and disposal (archive).

The work of each of the corporate CMC 41...4kis independent from the others and begin after receipt at the input 1 of the application in the form of a formal list of data from consumers for the supply of an appropriate number of TT (fuel range). The application refers to data containing information about the user (name, code, legal and actual address, taxpayer identification number, and the like), range (marks) of fuel and amount requested parties TT.

Production TT in corporate CMC 4 can also be carried out on credit applications from its own sales of the fuel company in order to gain a minimum reserve of TT and increase responsiveness of customer service.

In corporate CMC 4 is made an administrative decision to manufacture the requested party TT. In case of positive decision the request assigns the current number (the batch number TT) and determine the range of unique (individual) non-TT (lot size). Then the data on the application is introduced into the system from the remote control 4.2 operator control corporate CMC 4 (figure 2). Processing and data entry is displayed on the monitor 4.5. Since then, the application receives the status "approved". Output 1 remote control 4.2 operator control approved request is and is fed to the input 2 of the device 4.1 data exchange in which it is converted into the format suitable for recording in the corporate database 3. Output 2 device 4.1 data exchange application is written on the input recording data in the corporate database 3 through paragraph 2 of the input data. Access to the corporate database 3 is allowed by password strictly limited circle of persons and is provided with a two-tier system of access control that restricts access to the computer and to the corporate database 3.

Print (application) control of accounting information on the TT is in corporate CMC 4 only when there is "approved" applications in the corporate database 3. The number of printed TT is as specified in the approved proposal. Accounting control information on the fuel card contains fuel, the tank refills in litres, the date of issuance of the card, the name of the fuel company that issued the card, expiry date of card, account number of the form TT.

Printing begins on the control signal output 3 4.2 remote control (figure 2) to the input 2 of the device 4.3 accessing the database. The output signal 2 of the device 4.3 access to corporate databases, input management corporate database 3, information in digital form is read on the information output from the corporate database 3 and is fed from the output 5 of the device 4.3 accessing corporate databases 3 input 1 block 4.4 printing. In the Torah the input unit 4.4 printing forms do 7 TT coated with account numbers. Forms 7 can be supplied in rolls of 2000 pieces each. Account number on the form TT (Fig) duplicated in a linear bar code, which is applied in the form of TPS in its manufacture in the printing. Linear bar code makes it easy to read the account number of the form TT by scanning, reduces labor costs and eliminates subjective operator errors when reading and entering the account number blank.

Forms 71...7kTT in order to protect against forgery and copying can be done on special paper using printing methods of protection, such as watermarks, micron texts, etc. Holographic security elements and hidden labels protect the fuel passes from copying and counterfeiting.

Consider a block 4.4 printing. Another form 7 fuel pass linear bar code with the account number read by the device 4.4.1 read, converted to digital form and fed to the second input of the shaper 4.4.3 service information (6) and together with the data from the corporate database, coming to the first input of the shaper 4.4.3, is included in the service information. Then, the service information is signed by the digital signature in the driver 4.4.5 digital signature using the signature key, the input from the media 4.4.4 key signature.

The introduction of the service inform the tion (bar code) account number of the form TT increases the security of the TT and preclude the use of unrecorded (falsified) forms.

The cryptographic strength EDS guaranteed-known algorithm of its formation and the length of the signing key, which can be different and can be, for example, 512 or 1024 bits.

Service information in digital form that is signed with a digital signature, from the output of the shaper 4.4.5 EDS (6) is fed to the input 1 of the shaper 4.4.6 control and accounting information, which is converted in a two-dimensional bar code type PDF417 and combined with an alphanumeric text input 2 output driver 4.4.2 text in a single image, which is applied to a thermal transfer printer 4.4.7 on the form TT. The appearance made thus secure the fuel card is shown in Fig.9.

Fuel the company sells fuel passes to the automobile companies and other consumers. At the gas station released the appropriate amount of fuel for this card after you confirm its authenticity, in paragraph 5 of verification. Misrepresentation or falsification of any, at least one character to the protected information or bar code on the fuel card will be revealed after reading two-dimensional bar code and verifying the digital signature.

Alphanumeric text allows the user to read from TT the necessary information without the use of special technical means and to control the authenticity of the TT. The information in the letter is about-digital text is duplicated in the two-dimensional bar code, a secure digital signature, thereby also ensured its protection. Any misrepresentation, including attempted tampering with alphanumeric text, will also be identified in paragraph 5 verification after reading two-dimensional bar code, verifying the digital signature and comparing the read information with the alphanumeric text on the fuel card.

The quality of the coating on the TT two-dimensional bar code is checked in device 4.6 verification (figure 5). Verification TT is instrumental in checking the read two-dimensional bar code and the correct formation of the EDS. A positive result of the verification to ensure the correct application (printing) a two-dimensional bar code and eliminates the release of TT with poor quality caused to control and account information. Two-dimensional bar code is read by the device 4.6.1 reading is converted to digital form and supplied to the cryptographic unit 4.6.2 (Fig.7), which is allocated EDS, control and account information and verifies digital signature using the signature key certificate. For this cryptographic unit 4.6.2 is composed of the drive 4.6.2.1 of signature key certificates, the selector 4.6.2.2 EDS, the selector 4.6.2.3 control and accounting information, and the ID 4.6.2.4 EDS. In the last using the signature key certificate and accounting control information is in digital form is checked by EDS on the well-known algorithm validation for example, according to the standard GOST R 34.10-2001. The result of verifying the digital signature and the correct application of the bar code is displayed on the monitor of the operator control. The control device verification is carried out with the remote 4.6.4 control operator.

Functions for centralized generation of signature keys and the corresponding signature key certificates executed by the certification centre 1. The certification centre 1, operating under the well-known algorithms, provides corporate registration CMC 41...4k, development And key signatures and distribution of signature key certificates registered corporate CMC 41...4kat the request of paragraphs 51...5nthe verification. Registration corporate CMC 41...4kby data with their second outputs using devices 4.1 data exchange. This may be provided as a dial-up connection and data transmission over the public network Internet. Centralized system software key information allows you to expand the scope of the system and eliminates fraud control and account information by using a false key signature - the signature key certificate". At any nuclear power plant can be verified fuel passes made in any of the k fuel companies (corporate CMC)

Upon confirmation of the EDS output 1 cryptographic unit 4.6.2 input 1 block 4.6.3 comparison (figure 5) corresponding signal. Simultaneously with output 2 cryptographic unit 4.6.2 accounting control information in digital form is fed to the input 2 block 4.6.3 comparison. In the presence confirmation signal EDS at the entrance 1 block 4.6.3 comparison, it compares the information read from the bar code and received via the input 2, input 3, coming from the corporate database 3. The signal of the comparison result output unit 4.6.3 comparison goes to the remote 4.6.4 operator controls and displays on the monitor 4.6.5. In case of positive result of the comparison card is printed correctly and output 2 4.6.4 remote operator control through the device 4.3 accessing the database (figure 2), the device 4.1 data exchange and device 2 input data in the corporate database 3 contains the mark made about the pass, which is a permissive signal to the print (verification) on the next pass.

When no signal confirmation EDS output 1 cryptographic unit 4.6.2, or when the presence of a signal on the confirmation of EDS, but if there is a mismatch of information received on input 2, with the information read from the Central database 1 and received via the input 3 block 4.6.3 comparison to 4.6.4 remote operator control pic is there is a signal about unoriginality control and account information on the card. On a given signal the printed card is discarded. The output signal 2 4.6.4 remote operator control through the device 4.3 accessing the database (figure 2), the device 4.1 data exchange and device 2 input data in the corporate database 3 contains the mark of number rejected Blanca and is a re-print of the coupon. Data on the number and the non-defective forms are stored in the corporate database 3 and used by staff in the following, for example, when placing documents on the destruction of rejected forms.

Information about the end of print party TT according to the approved application is also recorded in the corporate database 3 and, in particular, may contain information about the number of approved applications, the place and date of printing, and the number of printed coupons indicating the account numbers of the forms. Since then, the application stored in the corporate database 3, changes its status and is considered "full".

Upon receipt of TT at the gas station are subject to review in paragraph 5 verification and entry into the working database 5.3 read control and accounting information. In paragraph 5 of verification (figure 3) transactions for reading two-dimensional bar code, the allocation of control and accounting information, and digital signature and verification of a cryptographic algorithm. The operation of the device 5.1 verification is similar to the operation of the device 4.6 corporate, University, the effective CMC 4. At the gas station, in paragraph 5 of verification authenticates any fuel card 81...8kissued by any of the k corporate CMC 41...4k. Identification of the authenticity of the coupons 81...8kcan be conducted across the full range of protective elements (topographic, printing and physico-chemical) using appropriate devices, such as "Atlas 3/1", microscopes, etc.

After dispensing fuel fuel card is subject to damping in the device 5.4 maturity by mechanical punching of the card in the prescribed place. The device 5.4 maturity can be implemented in the form of a manual or automatic composter. Mark (punching, punch) must not violate the integrity of the barcode on the TT and make it difficult to read in future.

Redeemed coupons 91...9kwith outputs of 5 points1...5nverification coming into the corporate CMC 41...4kand after reading the bar code and write the data to the appropriate corporate database 31...3kdisposed (archived). Thus the cycle from the production of fuel pass to its repayment and write-off.

The system allows to perform the aggregation and consolidation of data that can be represented in the form of accounting documents, reference tables, etc. P the control signal output 3 4.2 remote control (figure 2) information from the information output corporate database 3 is read and output 4 4.3 device access to corporate databases is fed to the input of block 4.7 statistical processing, where generalized, is converted to a form convenient for analysis, and output of the system in the form of accounting documents, reference tables, histograms, etc. the Composition of the reporting documents and certificates may be different and is determined by the control operator, on the basis of administrative requirements. At the disposal of the fuel company enters all statistical information about issued, redeemed coupons and on the number and type of sold fuel for any time interval (week, month, quarter etc). Using block 4.7 statistical processing on the output of the system can be obtained all necessary reporting forms turnover TT and on the implementation of fuel as at each power plant and fuel company in General. Comprehensive online information on the implementation of fuel can be used by service management and marketing fuel company with the purpose of increase of efficiency of management of business processes.

Such a technical solution has been tested in the fuel company, St. Petersburg and confirmed its effectiveness.

Features of the system in the manufacture, registration and verification of certificates of conformity of drugs are as follows. Certificates of conformity are executed on paper A4 (figure 10). Forms of certificates are executed and the printing method is the label of the corresponding degrees of protection and have the account number. Protected variable part of the information certificate, which is converted into digital form, signed by a digital signature and is converted into two-dimensional bar code. On the form of the certificate two-dimensional bar code is printed by the printer 4.4.7 simultaneously with variable information. In this case, as the printer 4.4.7 can be used in a laser printer, for example, HEWLETT PACKARD. Paragraphs 51...5nverification performed on option 2, can be deployed at the enterprises of wholesale and retail sale of drugs or in the mobile version to be used by employees of inspections or other interested organizations.

Protection of excise goods (alcohol, tobacco), audio and video products, medicines is carried out by labeling products suitable protective signs (11-13). Application of protective marks by marking devices 61...6m. Protective marks 81...8kfrom corporate CMC 41...4ktransmit (take, bring) on the marking device 61...6mthat is placed on the manufacturer or authorized bases suppliers. The number m of marking devices is not less than k and depends on the needs of production (supply). In the marking device 8 protective signs nano the Yat (fix) product so as specified in the prototype, the main requirements are reliability application (fixation) of the protective signs and the possibility of an instrumental reading of a bar code. Reliability application (fixation) protective mark on the product must be such as to prevent the removal of the protective sign without damaging it. The presence of a protective character alphanumeric text allows staff to visually monitor the type of marked products information recorded in alphanumeric text. The number and type of labeled products (production batches) corresponds to the number of trademarks entered in the marking device 61...6m. Marked protective signs the products come in wholesale (retail) sales network and sold to consumers. The system allows by incorporating issued protective signs to keep records marked products coming onto the market (in the economic turnover).

The system is based on a system-wide principles of logical and physical implementation of hardware and software, protocols, and interfaces, as well as build local and geographically distributed information systems.

1. System manufacturing, accounting and verification of protective signs marking, including k data entry points k corporate databases, k corporate control centers and control designed to control the entry of data in corporate databases, production and printing by the print unit protective signs marking the first output of each of the k corporate control centers and control is connected to the input of the corresponding item of the input data, the output of which is connected to the input of write data corresponding to the corporate database, the third output and the third input of each of the k corporate control centers and control respectively connected with the control input and the information output of the corresponding corporate database, characterized in that the system certification center, designed to store registration data corporate centers management and control, formation and storage of signature keys, public key certificates, certificate revocation lists and to interact with corporate control centers and control and verification points, and n points verification, designed to perform the operation for reading two-dimensional bar code, separation of control and user information, identification of the authenticity of the coupons for protective elements, damping used coupons, data about them in corporate control centers and control, the output of odostomia the future of the centre, designed to provide key information that is connected to one input of each of the corporate centre management and control of each item of verification, the input of the certifying center is connected to the second output of each of the corporate centre management and control designed to transfer data to register the certification centre and to the output of each item of verification intended for the production of signature keys and distribution of signature key certificates registered corporate control centers and control, one of the inputs of each of the n points of verification is the control input of the system intended for the receipt of protective signs, and the print unit corporate control centers and control is intended for receipt by him forms a protective signs printed account numbers.

2. The system according to claim 1, characterized in that repaid protective signs are collected by the relevant corporate control centers and control from points of verification.

3. The system according to claim 1, characterized in that the corporate centre management and control, consists of data devices, remote control devices accessing the corporate database monitor, the device verification unit aggregation and the print unit, the first input of which is connected to the fifth output devices accessing the corporate database the first output of which is connected with the second input of the verification, the first input which is the input of the read bar code output device verification connected to the first input device accessing the corporate database, a second input connected to the third output of the operator control, the second output of which is connected to the input of the monitor, the first input of the remote operator control is the first entry of the corporate centre management and control, the first output and second input of the operator control connected respectively with the second input and the first output data device, the first input and the third output are, respectively, the second input and second output corporate Central management and control, the second output and the third input device accessing the corporate database are respectively the third output and the third input of the corporate centre management and control, third output devices accessing the corporate database is connected with the third input data device, the second output is the first output of the corporate centre management and control, fourth exit devices access corporate database connected to the input unit of the aggregation, the output of which is the fourth is hodom corporate centre management and control, protective signs come from the output of the print unit, the fourth output data device connected to the third input of the verification, and forms a protective signs printed account numbers proceed to the second input of block printing.

4. The system according to claim 3, characterized in that repaid protective signs are sent to the input of the read bar code device verification.

5. The system according to claim 1, characterized in that paragraph verification device verification device maturity, the device appeals to the working database working database, the output device verification connected with the third input device appeals to the working database, the third output device access production database is connected with the second input of the verification, a third input connected to the fourth output of the appeal to the working database, the input device repayment connected to the first input device verification and is the first entry point verification, the second output and the second input device appeals to the working database are respectively the first output and the second input point of the verification, the first output device access production database is connected with the control input of the production database, the information output of which is connected to the first input device clicks the lated to the production database, the second exit point verification is the output of maturity and redeemed protective signs come from the output of maturity.

6. The system according to claim 1, characterized in that paragraph verification device verification, the device appeals to the working database working database, the output device verification connected with the third input device appeals to the working database, the third output device access production database is connected with the second input of the verification, a third input connected to the fourth output of the appeal to the working database, the first input device verification is the first entry point verification, the second output and the second input device appeals to the working database are respectively the output and the second input point of the verification, the first output device access production database is connected with the control input of the production database, the information output of which is connected to the first input device appeals to the working database.

7. The system according to claim 1, characterized in that as a protective signs of use documents.

8. The system according to claim 1, characterized in that additionally introduced m marking devices, where m non-negative integer (m≥k), a protective signs come on the marking device is and from corporate control centers and control.

9. System according to one of claim 2, 5 or 6, characterized in that the device verification consists of a reader, cryptographic block, the block comparison operator control and monitor an input connected to the first output of the operator control input connected to the output of the Comparer, the first and second inputs which are connected respectively with the first and second outputs of the cryptographic unit, the input connected to the output of the block is read, the second output of the remote control operator is the output device verification, and first and second inputs of the device verification are respectively the input block is read and the third input block comparison, the third input of the verification, is both a second input of the cryptographic unit.

10. The system according to claim 3, characterized in that the print unit consists of printer, media, key signatures, shaper text driver service information, driver control and accounting information, the reader and shaper of electronic digital signature, the first input connected to the output media, the signature key, the input of the shaper text is the first input of block printing, the printer output is the output of the print unit, the output of the reader, is connected with the second input of the shaper with ogibnoe information first input connected to the input of the shaper text output driver service information connected with the second input of the shaper electronic digital signature, the output of which is connected to the first input of the shaper control and accounting information, a second input connected to the output of the shaper text, the output of the shaper control and account information is connected with the first input of the printer, the second input of the printer connected to the input of the reader and is the second input of the print unit, and forms a protective signs printed account numbers proceed to the second input of the print unit, and protective signs come from the printer output.

11. The system according to claim 9, characterized in that the cryptographic unit contains the selector of the electronic digital signature, the selector information, the drive of the signature key certificates and ID digital signature, a second input connected to the output of the selector digital signature, an input connected to the input of the selector information is first input of the cryptographic unit, the output of the identifier of the electronic digital signature is the first output of the cryptographic unit, and the output of selector information connected with the third input of the identifier of the electronic digital signature and is the second vyhoda the cryptographic unit, the output drive of the signature key certificates connected to the first input of the identifier of the electronic digital signature, and the entrance drive of signature key certificates is the second input of the cryptographic unit.



 

Same patents:

FIELD: recognition methods, possible use in industrial branches suffering from unsanctioned copying of serial products.

SUBSTANCE: method for protecting unique individual symbolic marking of serial product includes applying onto serial product of unique individual marking, visually recognizable and machine-readable, forming of interactive electronic database with unique symbolic machine-readable identifier, fully corresponding to symbolic value of unique individual marking on serial product and meant for positive authentication of serial product marking in aforementioned database, sending query for authentication of current marking of serial product in interactive electronic database, identification of aforementioned marking of serial product, automatic receipt of response about positive or negative authentication, automatic deletion of identifier corresponding to requested one from aforementioned database in case of and simultaneously with first positive authentication.

EFFECT: improved level of protection of serial product from unsanctioned access.

FIELD: computer science, in particular, engineering of information effect system of information-marketing centers in integrated electronic trading infrastructure.

SUBSTANCE: system has three registration devices, two adders, block for selecting supporting recording address, block for selecting supporting reading address, block for selecting query source address, block for selecting current record address, block for forming temporal period address, block for forming database addresses, block for controlling recording and reading of data and data dispensing block.

EFFECT: improved system speed of operation by excluding renewable data search across whole database of electronic trading and localizing search only by temporal and individual signs of goods identifiers.

9 dwg

FIELD: engineering of computerized information-analytic trading means, possible use for negotiating orders for buying and selling during performing of trade operations with cashless payment using communication network.

SUBSTANCE: system has authorization and registration block, roles block, block for controlling price offers, price forming block, block for controlling formulas, logistics block, block for controlling agreements, block for finding goods and making agreements, ordering block, block for accepting, block for forming goods movement graphs, display block, block for forming characteristics of goods and goods batches, block for controlling goods, block for purchasing goods, payment block, block for registering goods at warehouses, balances block, notifications block, documents registration block, block for payments and determining payments, automatic procedures block, activation block, analytics block, goods card block, marketing block, participants block, sells block.

EFFECT: expanded functional capabilities due to control over deliveries and quality of goods and services.

1 dwg

FIELD: engineering of equipment for processing documents.

SUBSTANCE: device has detector system for detecting characteristic signs of documents, controlling system for realization functions, connected to information, received by detector system and/or to documents processing method, aforementioned system includes memorizing device for storing a set of codes, each of which corresponds to appropriate function, and is made with possible permission of function use, if it is confirmed that transferred permitting code corresponds to one of stored function codes.

EFFECT: simplified adjustment processes of software-hardware equipment complex.

3 cl, 6 dwg

FIELD: engineering of information accumulation system, in particular - technology for performing an interactive game.

SUBSTANCE: each user is provided with means for identification as game participant, provided with a mark. As a mark, optical signal source is used. Positioning of device for receiving optical signals is performed relatively to multiple users. Source position of identification means of game participant is held relatively to means for receiving optical signals in accordance to game conditions. Game objects and rules are given to participants and game start signal is given. User targets his mark to appropriate means for receiving optical signals. Optical signals are received from game participants and received optical signals are registered in registration device. Signals are processed in accordance to given program and results are outputted on an information carrier.

EFFECT: possible polling of large group of participants and detection of winners, while maintaining anonymousness of results.

6 dwg

FIELD: engineering of systems for producing individually optimized products in accordance to request from client.

SUBSTANCE: device is made for producing care products for house pets in accordance to client requests, including food for house pets, wherein integrated client interface is used, based on the Internet, and controlling process for a series of actions, device is configured for receipt of individual data about house pets, receipt of orders for appropriate care product for house pets for each buyer, controlling equipment operation during production for processing each request, care products for house pets in accordance to requirements of each client, and for tracking product delivery through delivery system to house of client.

EFFECT: possible processing of orders from clients for food for house pets and presentation of care scheme data in accordance to individual data pertaining to house pets.

7 cl, 3 dwg

FIELD: engineering of educational equipment, in particular, technology for performing exams with use of computer-based equipment.

SUBSTANCE: method includes forming on machine-readable carrier of database of simplified informative-mathematical models of operation of industries or organizations, aforementioned carrier is given to examinee with notification of variant, data are selected from database for forming more precise model of operation of organization or industry. From server along Internet network information about current values of macro- and micro-economical coefficients of country and the world are received, on basis of which examinee develops dependencies, allowing process calculations pertaining to financial and managing activities of organization or industry in given time interval, recording aforementioned dependencies on machine-readable carrier and checking these by examiner.

EFFECT: improved objectivity of estimation of knowledge of examinees.

3 cl

FIELD: method and system for data exchange for facilitating upholding of laws and standards on information transfers and confidentiality of individuals.

SUBSTANCE: method includes stages: transferring from system to user computer a notification, that object confirmed agreement to sanctioned confidentiality and data protection rules; receipt by system of confirmation of individual of receipt of object by server or confirmation, that object will receive and use personal data in accordance to laws active in the country where individual or object is located; transferring by system to server of data object about agreement of individual to aforementioned receipt; receipt of data object from server, containing personal data of individual; periodical check of agreement of object.

EFFECT: improved reliability of information exchanges.

2 cl, 15 dwg

FIELD: commerce.

SUBSTANCE: method involves selling goods by way of selling system comprising stores, distributing center and selling terminal chain; transmitting signals from buyer communication means to store communication means, said signals containing information on goods ordered by buyers, and transmitting signals from buyer communication means to store and/or distributing center, said signals containing information on selling terminals selected by buyers; preparing in stores ordered goods for sending and sending said goods to distributing center and further from distributing center to selling terminals selected by buyers; also transmitting signals from store communication means to selling terminal communication means, said signals containing information on buyers orders, and/or transmitting information carriers from stores to selling terminals, said information carriers containing information on buyers orders, with goods being stored in selling terminals and dispensed therefrom to buyers. Also disclosed is goods remote selling system.

EFFECT: reduced time and costs, increased turnover of merchandize and simplified construction of delivery means.

4 cl, 3 dwg

FIELD: technologies for realization of an additional useful effect during purchase of consumer goods.

SUBSTANCE: method for realization of additional useful effect includes dispensing an individual code to consumer, providing access to commonly accessed data transfer network by means of appropriate data processing device, while wherein a software storage is present. Access to storage is performed by means of individual code, launched selected software remains accessible for a certain time, and after anticipated number of accesses individual code is blocked for any further access.

EFFECT: expanded functional capabilities and range of technical means of communication network for users, purchasing goods.

3 cl

FIELD: recognition methods, possible use in industrial branches suffering from unsanctioned copying of serial products.

SUBSTANCE: method for protecting unique individual symbolic marking of serial product includes applying onto serial product of unique individual marking, visually recognizable and machine-readable, forming of interactive electronic database with unique symbolic machine-readable identifier, fully corresponding to symbolic value of unique individual marking on serial product and meant for positive authentication of serial product marking in aforementioned database, sending query for authentication of current marking of serial product in interactive electronic database, identification of aforementioned marking of serial product, automatic receipt of response about positive or negative authentication, automatic deletion of identifier corresponding to requested one from aforementioned database in case of and simultaneously with first positive authentication.

EFFECT: improved level of protection of serial product from unsanctioned access.

FIELD: ATMs.

SUBSTANCE: device has storage for storing banknotes and dispensing gear. Said gear has gear 654 for placing in a stack. Stack gear provides placement of banknotes in form of stack of for example banknotes meant for dispensing from ATM to client, after that stack is given to client from ATM. Stack gear has element 668 serving as support for stack, flexible element 692 and distanced support elements 694. In case of rotation of element serving as support or stack, in first direction of rotation banknotes are engaged with element, serving as support for stack, their holding therein is provided for. After collection of stack element serving as support for stack is rotated in opposite rotation direction, to extract stack from stack gear.

EFFECT: higher efficiency.

2 cl, 68 dwg

FIELD: technologies for marking objects.

SUBSTANCE: method includes local irradiation of objects by coherent radiation source, encoding applied mark signs and recording encoded signs by pulse signals of coherent radiation with additional local coherent irradiation of object volume, following examination of transfer process and determination on basis of transfer process acceleration curve of optimal treatment parameters with research of starting state return criteria. Functional multilevel objects system is formed of marked objects if a condition is met for their structural and informational integrity and information connections of system elements on atomic-molecular level are induced with single informational base, resilient to external energy-informational effects, while current state of system is determined by using control of information links of elements and its identification with consideration of possible change of system structure, examination of basic state return criteria and analysis of system elements encoding.

EFFECT: higher trustworthiness.

6 dwg

FIELD: holograms protection technologies.

SUBSTANCE: method includes recording a hidden image on hologram in form of two-dimensional matrix of light optical points, wherein individual check code is set in predetermined angles of matrix; also, for positioning protective hologram an image of point object is recorded on it, outside limits of mask aperture, and during reading of hidden image protective hologram is displaced until restored image of point object placed outside mask aperture, fits point aperture in micro-diaphragm, and until an electric signal with maximal amplitude is detected at output of positioning control photo-detector, which shows correctness of positioning of protective hologram.

EFFECT: higher efficiency.

2 cl, 7 dwg

The invention relates to a method and apparatus for authentication marking provided in the form of a color marking on objects, in particular printed on the documents, securities, etc

The invention relates to a method of detection of counterfeit products

The invention relates to systems of marking and verification of objects and can be used when marking and authentication, notary, financial, documents of title and securities

The invention relates to the identification of a subject using a plastic card
The invention relates to the field of excise control and/or identification marks applied for certification of passage of excise taxes, as well as the quality of the product, preferably, wine beverage and tobacco products

FIELD: holograms protection technologies.

SUBSTANCE: method includes recording a hidden image on hologram in form of two-dimensional matrix of light optical points, wherein individual check code is set in predetermined angles of matrix; also, for positioning protective hologram an image of point object is recorded on it, outside limits of mask aperture, and during reading of hidden image protective hologram is displaced until restored image of point object placed outside mask aperture, fits point aperture in micro-diaphragm, and until an electric signal with maximal amplitude is detected at output of positioning control photo-detector, which shows correctness of positioning of protective hologram.

EFFECT: higher efficiency.

2 cl, 7 dwg

Up!