Device for examining electronic pocket books
FIELD: forensic examination of electronic information carriers and, in particular, technology for accessing password-protected information, contained in electronic pocket-books.
SUBSTANCE: in accordance to the invention, code generation block generates a code series, which is injected into electronic pocket-book being examined. Visual control block receives and analyzes information from the screen of electronic pocket-book. Signal from visual control block is received at control block. If the signal from visual control block indicates a wrong password, control block outputs a command to code generation block to generate next code series. If the signal from visual control block indicates correct password, control block outputs a signal which is received by indication block.
EFFECT: possible automation of selection of password for accessing information contained in electronic pocket-books which do not have external interface.
The invention relates to criminology and forensics, namely the use of electronic means to improve the effectiveness and objectivity of the examination and expert studies electronic media by automating a number of operations.
The proposed device allows high reliability to quickly gain access to confidential password information stored in the memory admitted to a forensic examination of electronic notebooks (ESC), with quantitative and qualitative characteristics ask not change, which is crucial to ensure the validity of the results of forensic examination.
One of the genera of forensic examination is computer-technical expertise. At this stage of the development of computer-technical expertise - self kind of legal expertise relating to class engineering expertise and conducted in order to: determine the status of the object as computer tools, identifying and examining its trace pattern in the investigated crime, as well as access to computer information on the media data, and then its comprehensive study. These goals are represented by generic tasks CED .
When solving problems of computer-technical expertise often who the hiccups the need for access to information, contained in a closed, password-e memory.
Known software and hardware and software for access to information classified password stored on your computer's hard disks, notebooks, mobile terminals, cellular and organizer:
- software-hardware complex for access to information stored on hard drives PC-3000 ;
- software-hardware complex for access to information stored in the address books of mobile communication terminals Uni box ;
- software complex Encase  and others
Currently, the problem of access to information, closed the password will be solved by connecting studied engineering with the standard means of interfacing to the device (usually a computer)that feed on its input code combinations with the aim to find the password (search method).
However, in some models etc (PIMS) external interface that does not allow you to use standard tools mates.
However, the task of examination such ESC is very serious and in some cases has important social results.
Because during examinations is not permitted to change the quantitative and qualitative characteristics of the evidence, etc can explore the destructive method and, consequently, there is no possibility of retrieval of memory chips to conduct their research outside of ask. Especially that used in ezk chips are custom (non-standard) and die. So the only way is manual search.
The existing technology of access contained in the memory etc information is to generate a set of codes, which presumably password, serial input these codes from the keyboard etc and visual inspection of labels displayed on the screen etc. Assuming mismatch password entered code combination displays type : "PASSWORD is INCORRECT. REPEAT INPUT". After that you enter the following code combination. Provided matches the password entered code combination displays, with the meaning "PASSWORD ACCEPTED". Display labels in the first and second cases for different models etc may differ in content (but not meaning), language, etc. But in any case, the displayed labels in the first and second cases are different from each other and a priori known (see technical description etc, which is public information).
The described technology access to information contained in the memory received for review etc, has a number of disadvantages:<> manual search is associated with the need for long-term engagement expert to unproductive (from the point of view of direct examination);
quality manual operations associated with operator fatigue, i.e. decreases with time;
- documentation of the process difficult.
An object of the invention is the provision of opportunities for automation of the process of selection code combination, which is the password.
The problem is solved in that a device, consisting of:
- block code generation,
block visual control,
- control unit,
- display unit.
The block of code generation is to construct a sequence of code combinations, claiming password to access the information stored in etc. It is a device having a control input, the service exit and n information outputs, where n is the number of buttons on the keyboard etc. The control signal on the control input, the block code generation generates code combination representing a sequence of non-overlapping in time of the pulses on m≤n) information outputs. The sequence of control signals on the control input, leads to the formation of placentas the activity of different code combinations, the order of which is determined by the algorithm code combinations or dictionary code combinations.
The algorithm code combinations can implement any of the known methods full or truncated search. The exhaustive search involves the formation of a sequence of code combinations containing all possible code combinations with a length not more than the maximum password length in the investigated model etc. The truncated search involves the formation of a sequence of code combinations containing all possible combinations under the given constraints, for example: the length of the combination, the composition used for password characters, and other typical variant of a truncated brute - force search various combinations of initials and dates of birth of the owner etc.
The dictionary can contain an arbitrary number of set of code combinations.
The connection unit is designed to provide a physical connection information output unit generating code outputs keyboard etc and agreeing levels of stress. In the simplest case, the connection unit is a set of conductors connecting the information outputs of the block code generation with pads keyboard etc without compromising their integrity or contacts of the keyboard connector, available from many is their models etc.
The control unit is designed to generate control signals for generating block codes. It is a device with two inputs and two outputs, performing the function of the shaper pulse-triggered inputs.
Block visual control is designed to monitor the status indicator ESC and represents a sensitive element that distinguishes the intensity (brightness) of a glow or color (for example, photodiode with lens). He must distinguish between the indicator etc corresponding to display messages about right and wrong password.
The display unit is designed to generate a signal (sound and/or light) about the end of the process of guessing a password and is a device that generates an audible and/or visual signal on the trigger signal received at its input from the output of the control unit.
The proposed solution can be used for all kinds of ask, however, due to the fact that the problem is the most difficult to resolve in the field etc without interface, particular importance is a practical solution concerning ESC types:
|Citizen||ED-87PCL, ED-7200RX, ED-7600RX, ED-7700RX, ED-8700RX, ED-9000, ED-6200SP EDT-6800, RX-2700II, RX-3200, RX-3400II, RX-4100, RX-5000, RX-5500, RX-5640, RX-5740,RX-6600, RX-7000, RX-9600, RX-7000, MB-165RA, AX-1200, AX-200|
|Casio||BN 10, 20 BN, SF-3990, SF-4300 (A, B), SF-4600 (RS, B, C), SF-4900 (RS, B, C), SF-4980ER, SF-4985ER, SF-4990, SF-5580, SF-5780, SF-5800RS, SF-5980, SF-6990, SF-7100SY, SF-7200SY, SF-7990, SF-8000, SF-8350R, CSF-4450 (A), CSF-4650 (A), CSF-7950, DC-7500RS, DC-7800RS, DC-8500RS, DC-9500RS|
|Sharp||ZQ-150, ZQ-170, ZQ M202R, ZQ M402R, ZQ-470, ZQ-570, Language Teacher EGR 3300, EGR 5300T|
|Ectaco||ER-486T, ER-586T, ER-586HT, EGR-5300T, ER-2200T, ER-3000|
Variant of practical implementation of the device shown in figure 1, where we have introduced the following notation:
1 is a block mates
2 - block code generation,
3 is a block visual control,
4 is a control block
5 is a block display.
Information outputs (n) block code generation 2 is connected to the inputs of the connection unit 1, the service exit a block of code generation 2 is connected to the second input of the control unit 4, to the first input of which is connected the output of block visual control 3, the first and second outputs of the control unit 4 is connected to the input of the display unit 5 and unit-code generation 2, respectively, the outputs of the connection unit 1 is designed to connect to the analyzed digital notebook, and the input unit visual inspection 3 is an optical element that takes an image from the screen of the indicator studied etc.<> The proposed device operates as follows.
After power etc on her screen displays "ENTER PASSWORD". Manually ESC enter any code combination. If it is a password (an unlikely event), the screen displayed some attesting to the label "A", and further the procedure of expert research already does not require a password; if you entered the code combination is not a password, the screen displays some attesting to the label "B". The content and appearance of the labels "a" and "B" for different types etc may be different, but known from the technical description (instructions) to ask, which is public (can be found in the shop or on the manufacturer's website). Block visual inspection 3 is positioned relative to the screen etc so that when the first label of the output signal was absent, and when the second - attended. Then no signal at the output of block visual inspection 3 after the filing of a code combination from the output generating block codes 2 through the interface unit 1 on ESC will meet the goals of access to confidential password information stored in the memory etc. Therefore, no signal at the output of block visual inspection 3 after the filing of a code combination with the ode generating block codes 2 through the interface unit 1 on ask is for the control unit 4 a command to the completion of the generation procedure codes.
The block code generation 2 generates codes either by brute force or a truncated search, constraints which can be the maximum or the fixed-length code combination, the register used symbols can also be used brute force and dictionary.
The completion of the search (rules stop are: 1) the end of the dictionary, 2) selection of the password) may be accompanied by a sound or light signal generated by the display unit 5 by the command of the control unit 4.
Figure 2 presents the timing diagram explaining the operation of the device, where u1signals at the output 2 of the control unit 4, u21-u2nsignals on the information output unit generating codes 2, u3signals at the service entrance generating block codes 2, u4signals at the output of block visual inspection 3, u5signals on output 1 control unit 4.
At time t1corresponding to the beginning of the operation of the device, at the output 2 of the control unit 4 is formed pulse (see figure u1(t)), whose potential for generating block codes 2 is a command to start forming the code sequence. The block code generation 2 generates a sequence of pulses, which with its information outputs via the connection unit 1 is supplied to ask and provides the procedure n the Bohr first code combination (see graphics u21(t)-u2n(t)). The pulse code sequence received at the i-th output of the keyboard etc from the i-th information output generating block codes 2 through the interface unit 1, in the information sense is equivalent to a single pressing of the corresponding i-th key of the keyboard etc. For example, if the 1st information output unit generating code 2 is connected via the connection unit 1 with the output of the keyboard etc corresponding to the key "A", then the pulse on the chart u21(t) is equivalent to pressing "A" on the keyboard etc. Latest pulse code sequence (pulse "INPUT") corresponds to pressing the "ENTER" on the keyboard etc. The result on the screen ask the message "INCORRECT PASSWORD. REPEAT INPUT", resulting in output block visual control, a signal is generated indicative of the status indicator in the controlled area (see graph u4(t)). The rear edge of the pulse, the INPUT at time t2provides forms a short gate pulse at the service entrance of a block code generation 2 (see figure u3(t)), during which the control unit 4 analyzes the level of the signal received at its first input from the output of block visual inspection 3. The high level signal at the output of block visual inspection 3 leads to the formation of at the moment time is Yeni t 3at the output 2 of the control unit 4 of the pulse (see graphs u1(t) and u4(t)), runs the block of code generation 2 on the formation of the following sequence of pulses, which through the connection unit 1 is supplied to ask and provides the procedure of the second set of code combinations. The procedure is repeated up until the moment of existence stranovogo pulse at the second output generating block codes 2 will not be read from the output of block visual control 3 signal low level (time t4), resulting in a first output control unit 4 will be formed as a triggering signal for the display unit 5 (see graph u5(t)), status (enable sound and/or light signal) to indicate the completion of the procedure of selection of the password.
The algorithm of the control unit shown in figure 3.
The proposed device will provide a radical improvement potential expertise:
- by automating the recovery process increases the efficiency of the process;
- performance of an expert search using technical devices provides related work elements of the supply chain and the ability to document the action.
1. Subaha B.C., Usov A.I., Saenko, GV, wolf GA, S.L., White, Semikolenova A.I. General p the provisions on the appointment and the production of computer-technical expertise: Methodical recommendations. - M.: state forensic science center of the Russian interior Ministry, 2000. - 65 C., 6 ill., the bibliography., ADJ.
A device for providing access to confidential password information contained in electronic notebooks (ESC), characterized in that it contains the interface block, the outputs of which are connected to the studied etc, and the inputs to the data outputs of the generating block codes, with the official release of which to the second input control unit receives the gate pulse during which the control unit analyzes the signal received at its first input block visual inspection, which contains an optical element that takes an image from the screen etc, the control unit generates a second output pulse at the input generating block codes and which is the command for forming a code sequence, if the signal from block visual inspection indicates an incorrect password, and generates a first output signal at the input of the display unit, if the signal from block visual inspection indicates the correct password.
FIELD: hydrology, possible use for determining thickness of ice cover over freezing water areas on basis of data of remote measurement instruments, installed on meteorological Earth satellites.
SUBSTANCE: in accordance to the invention, provided mathematical formulas are used to a priori calculate a set of standards of nonlinear similarity coefficients between relief of true ice thickness and relief of temperature field of ice cover. Then similarity coefficients are determined on basis of data of infrared image being analyzed, where test sections are selected, surface temperature of which corresponds to sections of water at freezing temperature and to sections of "thick" (thickness > 120 cm) snow-covered ice. Under identical hydro-meteorological conditions from a set of standard values for data for the time of image receipt, similarity coefficients are selected which are equal to the calculated ones, and temperature intervals, which correspond to selected discrete intervals of ice thickness, are determined. On the image of ice cover, sections with given ice thickness intervals are singled out using a color pattern. As test sections on the infrared image which correspond to surface temperature or brightness of pixels of "thick" snow-covered ice, sections of image of snow-covered earth surface, which is positioned closely to ice cover being examined, are selected.
EFFECT: creation of monitoring over thickness of ice in freezing water areas on basis of images in heat channel of infrared range of frequencies of meteorological Earth satellites, which is automated in interactive mode.
3 cl, 1 dwg
FIELD: digital television microscopy, possible use for automation of processes of detailed object examination.
SUBSTANCE: in accordance to the invention, known method for producing a broach image of side surface of deformed object having shape close to that of a cylinder, is supplemented with: analysis of selected image sections of each frame; determining of object radius in each object point and computation of width of frame fragment which takes part in broach synthesis and its original position in terms of focusing system position; correction, when necessary, of broach fragment limits in the frame.
EFFECT: increased quality and increased trustworthiness when reading information about surface of cylindrical objects independently on degree of deformation thereof.
FIELD: methods for removing noise in an image, possible use for improving quality of image.
SUBSTANCE: in accordance to the invention, effect is achieved due to conversion of brightness of image pixels with noise by means of solving the diffusion equation in non-divergent form, which ensures simultaneous suppression of noise and preservation of image edges.
EFFECT: simplified noise removal and increased quality of resulting digital image.
4 cl, 1 dwg
FIELD: safety and control systems.
SUBSTANCE: as main mechanism, detection of living human face and detection of unsanctioned users present closely to registered user, are used. In invention, methods for tracking a three-dimensional object are used, where object is brought to first normalized face shape, while fast method is used for measuring and comparing facial mimics to a template, and also methods are used for detection of local features and representation of face in three different normalized forms. Also, fast method for measuring and comparing to a template is used for such a behavioral biometric characteristic as phonemic signature, produced as a result of execution of system commands by the user.
EFFECT: increased reliability and speed when detecting an attempt of unsanctioned access to an object.
2 cl, 8 dwg
FIELD: observation of moving objects.
SUBSTANCE: method includes using movement sensors, capable of recording two-dimensional distributions of intensity in form of images, where sensors are positioned with known spatial orientation, making it possible to perform simultaneous observation of one and the same scene, periodical query of sensors is performed during whole time period after their enabling, processing and analysis of data received from sensors is performed, which constitutes series of images, and output signal is generated in case of detection of three-dimensional moving object and determining of its spatial position, which signal is injected into output device.
EFFECT: increased trustworthiness when determining spatial position of a moving object.
3 cl, 1 dwg
FIELD: optic-electronic tool-making, possible use in scanning devices of modern automated ballistic identification complexes for recording images of micro-relief of side surfaces of fired bullets and bottom of fired shells and inputting these images into system.
SUBSTANCE: method for scanning images of micro-relief of side surfaces of fired bullets and shells includes scanning by means of video camera with charge-coupled matrix of individual rectangular fragments of side surface of object, further processing of received information and following synthesis of full scan, where focusing of objective of video camera with charge-coupled matrix on surface object element selected for scanning is performed by progressive motion of the camera along optical axis of objective, and on side surface of the object two light strokes are formed simultaneously, which are shown of charge-coupled matrix as two lengths of curved shape, positioned on different sides of best focusing line, where top points of aforementioned lengths are at A and B distances from aforementioned line, then value X is determined from values of A and B using a derived formula, β is computed - angle of inclination of deformed element of scanned surface, after that defocusing value is determined and position of focusing carriage is corrected once until coincidence of top points of aforementioned lengths is reached, further, focusing process is repeated for other positions of side surface of object. Device for scanning images of micro-relief of side surfaces of fired bullets and shells of automated ballistic identification complex contains illuminants, object holder, mechanisms of longitudinal scanning, object rotation and focusing unit, focusing system, video camera with charge-coupled matrix, analog-digital converter and computer. Device is provided with an additional slit illuminant, which is positioned oppositely to main slit illuminant relatively to optical axis of video camera objective, where video camera with charge-coupled matrix and illuminant, main and additional slit illuminants mounted on it, is installed with possible longitudinal movement along optical axis of video camera objective.
EFFECT: increased precision and reduced time of automatic focusing of optical system on surface element of cylindrical or flat object (fired bullets and shells) selected for scanning.
2 cl, 6 dwg, 1 tbl
FIELD: systems for automatic video surveillance of an object.
SUBSTANCE: system for automatic detection and tracking of individuals on basis of images and biometric identity recognition based on target list, realizes following operations: on basis of three-dimensional data about scene and two-dimensional data, characterizing optical flow, detection of objects-noises of scene is performed, static background objects are selected, and regular dynamic object-noises; on basis of comparison of two-dimensional and two-dimensional data about the scene in current frame with reference data on previous frames and a map of object-noises changes are determined on a scene, in three-dimensional zones of interest, preliminary check of presence of human-like objects is performed, zones of interest are determined more precisely and their changes are tracked: a contour of separate elements of human body is singled out, zones of interest are divided onto a set of sub-zones of interest for elements, detection of three-dimensional head of individual is performed and it is tracked in each zone of interest; face of individual is tracked in each zone of interest; images of detected face are normalized in terms of dimensions, angles and brightness; recognition is performed.
EFFECT: objectivity and stability of system operation.
FIELD: encoding of inventions and, in particular, encoding of video frame blocks.
SUBSTANCE: method and device are suggested, meant for encoding digital image with usage of prediction block in internal mode, where the list of prediction modes is produced for each combination of prediction modes of adjacent blocks. Modes, meant for each combination of prediction modes, may be divided on two groups. First group has m most probable prediction modes, and second group has (n-m) prediction modes, where n is common number of available prediction modes. Modes in the first group are ordered in accordance to their probability. Aforementioned order may be set as a list of modes, ordered from most probable one to least probable one. Modes, belonging to the second group, may be ordered using a certain given method, which may be set depending on information which is already available in the decoder.
EFFECT: reduced memory volume with minimal loss of encoding efficiency.
6 cl, 6 tbl, 8 dwg
FIELD: methods for digital processing of images, possible use for classification of underlying surface in multi-channel systems for remote probing.
SUBSTANCE: method includes forming an image of underlying surface in q spectral channels with various location sensors, performing geometrical correction and presentation of component images in unified system of spatial coordinates, density of brightness value probability is transformed to gauss form of those component images in which it is different from gauss form, class number of underlying surface is determined for each element of multi-channel image, and when generating component images of underlying surface for every element of component image, a posteriori probabilities of association of given element of component image with k class of underlying surface (k=1,2,...,K) are determined, for every element of multi channel image a posteriori probabilities of association of that element with k class of underlying surface are determined by addition of corresponding a posteriori probabilities of component image and their normalization to number of channels q, class number of underlying surface is determined for each element of multi-channel image on basis of maximum value of a posteriori probability of association of given element of multi-channel image with k class of underlying surface.
EFFECT: increased precision of underlying surface classification on basis of multi-channel image.
FIELD: automatic reading and recognition of linear barcodes by means of a system, working with video image.
SUBSTANCE: in the method during processing of digitized image, finding of absolute values is performed for components of gradient of image along four directions, turned relatively to each other for 45 degree angle, two-dimensional low frequency filtration, thinning of images, element-wise absolute differences are determined for two pairs of mutually perpendicular directions of components and brightness of points is compared, and also linear barcodes are localized on basis of placement of elementary figures in resulting image.
EFFECT: increased barcode reading speed, increased resistance to interference and non-integrity of image, increased reliability when separating barcode from high contrast objects, such as text.
3 cl, 5 dwg, 1 tbl
FIELD: protocols for interaction of peer entities of network structure and, in particular, concerns protective infrastructures for protocols of interaction of peer entities.
SUBSTANCE: methods are provided, which suppress capability of malicious node to disrupt normal operation of peer-to-peer network. Claimed methods allow nodes to use both protected and unprotected data about identity, ensuring self-check thereof. Then necessary or comfortable, association of ID is checked by "enclosing" a trustworthiness checking procedure into appropriate messages. Probability of connection to malicious node is initially reduced due to random selection of node with which connection is established. Also, information from malicious nodes is identified and may be discarded by recording information about previous connections, which will require a response in the future.
EFFECT: creation of protection infrastructure for a system with peer-to-peer network structure.
4 cl, 6 dwg
FIELD: protection and management of information access in automated control systems.
SUBSTANCE: in accordance to the invention, commutators for enabling power for individual functional modules of computer are introduced into system, which are determined during setting of electronic key according to identification information, recorded in it.
EFFECT: increased efficiency of information protection, more reliable control of information access.
4 cl, 5 dwg
FIELD: electric communications and computer engineering, in particular, method for ensuring information protection, possible use when it is necessary to protect computer networks from unsanctioned intrusion and access to confidential information.
SUBSTANCE: method for processing network traffic datagrams for delimiting access to informational and computing resources of computer networks is based on such processing of network packets, during which inter-network screen checks network datagrams in accordance to a list of computer network access rules set by operator, records marks in datagrams, which marks correspond to access rules, and then performs transparent relaying of correct datagrams, and at receiver side it lets through or blocks network datagrams in accordance with aforementioned marks provided inside.
EFFECT: creation of mechanism for block actions of malefactor including faking of computer addresses of sender and receiver of network datagrams with simultaneous reduction of computing resources needed to solve the problem of delimiting access to informational and computing resources.
FIELD: engineering of devices meant for protecting informational resources of computer network connected to external information network from unsanctioned access of users and from transmission of messages.
SUBSTANCE: claimed device contains servers with memory blocks, intermediate memory, commutators, connectors, data exchange lines, control block. Aforementioned servers are made in form of a server of computing network and a server of external computing network, which contain additionally introduced checking blocks.
EFFECT: increased degree of protection afforded to interaction of external and local networks and realized registration of all messages transmitted between networks for purposes of logging the exchange of information.
FIELD: protected devices provided with means to prevent unauthorized usage of content.
SUBSTANCE: device has memory blocks with different levels of protection, software receipt block, which receives the software and corresponding additional information, which is used to determine memory block for storage of received software, finding block for finding memory blocks with free space among memory blocks having level of protection not below the required level of protection, determining block for determining a memory block among found blocks which corresponds to the highest protection level. The data is stored in determined memory block.
EFFECT: ensured capability of loading a software, size of which exceeds capacity of memory area, while ensuring the level of protection required by administrator of the software.
8 cl, 7 dwg
FIELD: devices and methods for controlling content reproduction.
SUBSTANCE: content reproduction device contains an accumulator block, meant for storing a list of source ID and system recognition information, block for taking the decision about reproduction control system, first block for determining possibility of reproduction, meant for taking the decision that reproduction control system represents a first system, about possible reproduction of content, on basis of whether the source ID added to content is present in source ID list, second block for determining reproduction possibility, meant for taking decision in case if it is determined that reproduction control system represents a second system, about possibility of content reproduction, on basis of information about conditions of license usage, enclosed with content, and reproduction realization block, for which a decision was taken about possibility of its reproduction.
EFFECT: control of content reproduction in accordance to a set of methods for controlling copyright.
2 cl, 63 dwg
FIELD: game devices, such as game machines, in particular for methods for ensuring authenticity of game software.
SUBSTANCE: safe smart-card or different safe memory device is inserted into port of controller board positioned inside the game machine. Smart-card is programmed for detection of encrypted "request" from CPU host processor and for dispensing an encrypted "response". If host processor determines that response matches expected characteristics, CPU considers the software to be authentic and game begins. Request-response exchange may be performed before beginning of each game on a machine or at any other time. If the response is wrong, host CPU outputs a command to stop the game. Control of access to appropriately programmed smart-card allows prevention of execution of unauthorized copies of game software by game machine.
EFFECT: prevented unsanctioned changing, copying and unsanctioned usage of game software.
2 cl, 13 dwg
FIELD: methods and systems for checking authenticity of components when using a graphical system, which ensures cryptographic protection of content dispatched through graphic conveyer.
SUBSTANCE: in accordance to the invention, graphic board authentication methods are ensured in relation with the system, which ensures cryptographic protection of content dispatched through graphic conveyer, this way application or device may show to high reliability graphic platform that the application or the device are highly reliable users of graphic platform. Graphic platform may send a message to highly reliable application or device, that application or device may trust the graphic platform.
EFFECT: ensured authentication with usage of highly reliable graphic platform.
4 cl, 18 dwg, 2 tbl
FIELD: protected transmission of data and provision of services in open or closed network options.
SUBSTANCE: in accordance to the invention, safe, stable network connections and efficient network transactions among a set of users are supported by open and distributed client-server architecture. Datagram model is adapted for provision of dynamic commutation of datagrams to support a set of network applications and services. Mobile intellectual data carriers are provided, which make realization of authentication and encoding model possible. Intellectual data carriers are made with possible targeted delivery of applications to authorized users. Authentication and encoding model in one variant of realization is based on physical or working biometry. Methods and systems are meant for usage in network environment of an enterprise for support of broad spectrum of business, research and administrative operations.
EFFECT: increased reliability and flexibility of data transmission in a network.
5 cl, 8 dwg, 3 ann
FIELD: device, software and method for processing a license.
SUBSTANCE: license source block contains a message creation block, meant for creating a message, including a license, manipulation type which determines license processing type between license source block and license assignment block, and block attribute, which determines attribute autonomously. License assignment block for receiving a message, including a license, manipulation type, determining type of license processing between license source block and license allocation block, and block attribute, determining attribute of license source block, and also license processing block, meant for processing of license, received from message receipt block, on basis of manipulation type and block attribute. Methods describe operation of license source block and license assignment block.
EFFECT: expanded functional capabilities due to possible transfer of content during content exchange for limited use of content.
6 cl, 38 dwg
FIELD: engineering of devices and methods for using server for access to processing server, which performs given processing.
SUBSTANCE: for this in accordance to method reservation is requested, reservation is confirmed, authentication information included in reservation information is stored, service is requested on basis of authentication information, server utilization is authenticated and server is utilized on basis of authentication result, while on stage of reservation confirmation device for controlling reservation transfers reservation setting information, and on stage of authentication server utilization is only confirmed when authentication information matches authentication information transferred from user terminal. Device contains receiving means, information generation device and transmitting means.
EFFECT: creation of method for using server, device for controlling server reservation and means for storing a program, capable of providing multiple users with efficient utilization of functions of processing server with simultaneous decrease of interference from unauthorized users without complicated processing or authentication operations.
6 cl, 51 dwg