Collection of usage data

FIELD: physics.

SUBSTANCE: invention is related to methods of usage data collection for television broadcast receivers. Method of usage data collection from broadcast receiver is suggested, whereat receiver is arranged to detect and save such usage data. Method involves representation (16, 18) of confidentiality policy to receiver that identifies not only the usage data subjected to collection, but also preset usage of such data. On receiver interactive or automatic determination (22) whether received policy of confidentiality is acceptable is carried out. If yes, receiver picks up (30) usage data identified in confidentiality policy from storage, and sends them (28) to sender of confidentiality policy.

EFFECT: increased confidentiality of usage of information about habits of users viewing.

15 cl, 3 dwg

 

The technical field to which the invention relates

The present invention relates to a method of collecting data relating to the selection performed by the user and the device that supports the mentioned data collection. In particular, although not exclusively, the invention relates to the collection of data for use with receivers for television broadcast.

Prior art

Digital set-top box (or any other TV broadcast receiver) has the ability to record actions of the user, for example, which channels he was watching and when he looks. When this television set is connected to the back channel, this information can be transmitted from set-top boxes the other side.

This information is useful for companies, for example, broadcasters, to analyze the demographics of view and to inform consumers on the offers and services that may be of interest to them. However, for the consumer, there are privacy issues of using information about their viewing habits, and this can lead to reluctance on the part of users to access their information.

The invention

The present invention is at least a partial solution to the above problem.

According to the first aspect of the present invention, nedosmotrel method of data collection use with a broadcast receiver, made with the possibility of discovery and preservation of such data spaces containing phases in which

provide said receiver privacy policy, identifying usage data to be collected and the intended use of such data;

determine at the receiver, is it acceptable privacy policy, and

if acceptable, choose from the store on the receiver data areas identified in the privacy policy, and transmit them to the sender of this privacy policy.

Through delivery of the privacy policy, which indicates the use identified in relation to data, the user is better able (and more reasonable) to take a decision on admissibility. At the same time, the policy provides an indication to the receiver in respect of which the collected data (which may represent only a small subset of all data collected by the receiver) transferable.

The receiver may provide the received privacy policy to the user, and the acceptance or rejection of this policy is determined by user input: in this case, the receiver may format the received privacy policy prior to presentation to the user, for example, to represent simple lists the th information or intended use (uses), to make it more user-friendly. Alternatively, the receiver can save the data preferences privacy policy for a user and used to automatically determine the appropriateness of the received privacy policy. Thanks to the use of such a pre-stored profile preferences does not require interaction with the user each time a request is made for data collection (in the form of a privacy policy).

Because the user may not satisfy the basic information portable privacy policy, the stage of determination of eligibility may include a reconciliation process between the user receiver and the sender's privacy policy, for example, to enable the user to learn more about the intended use and/or destination of data.

Received privacy policy may be partially acceptable, the result is only part of the requested data use. For example, a user may wish to share usage data receiver (e.g., what programs are viewed or recorded), but do not wish to share personal information, such as name, age or gender. To counter such concerns, the receiver can remove the direct identification is ictory user data use to transfer to the sender of this privacy policy. Such removal can be a simple removal or replacement of an alias or other false data.

In one illustrative use of the present invention, the sender's privacy policy provides broadcasting services with conditional access, and access to them depends on the user privacy policy and data use. By providing this incentive, users can encourage to make their data available.

In addition, according to the present invention, a device for data collection use, containing

the broadcast receiver (which may be a receiver of TV broadcasting);

monitoring tools and storage associated with the broadcast receiver and configured to detect and store data use related to operation by the user is referred to the receiver.

an input for receiving a privacy policy that identifies data of the regime to be collected and the intended use of such data;

management tool associated with the said inlet and the said storage medium and configured to determine the acceptability of the received privacy policy; and

output connected to the backward channel to the source of the policy to which a confidential manner,

moreover, the management tool is configured to, when determining that said received privacy policy are acceptable, select data use identified in the privacy policy, of the aforementioned storage means, and transfers this data to the output.

These and other aspects of the present invention set forth in appended claims included in this application by reference and to which the reader is now sent, and/or are described in the following description of embodiments of the invention.

List of figures

Embodiments of the present invention will be described by way of example only with reference to the accompanying drawings, in which

Fig. 1 is a diagram of a sequence of interactions between the broadcaster and the receiver according to the present invention;

Fig. 2 is a logical block diagram of the alternative steps that can be performed on the receiver side, of figure 1; and

Fig. 3 is a schematic representation of the functional characteristics of the device conforming to the present invention.

Detailed description of the invention

In this description, the term "broadcaster" will be used, in General, to specify a company or other organization that wants to get the profile information of the viewer. There can be many different the types of companies who may wish to obtain profile information, but the broadcaster is probably the first user, and the use of the term "broadcaster" helps to clarify the following.

In Fig. 1 illustrates the sequence of interactions between the broadcaster (on the left in the figure) and receiver (right). First, the broadcaster transmits 10 one or multiple data streams for broadcast. On the receiver selects 12, usually in accordance with user input which thread (for example, what TV channel to watch or record. On the receiver are registered 14 such election in the non-volatile storage for constructing a picture of the viewing habits of the user, which information is of interest to the broadcaster to provide improved schedules, special offers, etc.

Before the broadcaster will be able to obtain audience information use mode, it should create 16 file privacy policy. File privacy policy describes all the elements that the broadcaster wishes to obtain, and the intended use of this information. The following example uses the standard P3P (Platform for privacy preferences) W3C, described at the address http://www.w3.org/TR/P3P but equally applicable to other preferences

Although a detailed review of the above example is not required, we turn our attention to some part of the purpose of illustration only.

DATA ref=

These references indicate the desired data, such as name and gender of the user, the time and date of viewing a recorded audio/video (AV) content (information meaningful content or viewing or recording AV-real-time content.

DISPUTES resolution-type=

Specifies the matching mechanism or other search data privacy policy/request for the data collection. In the above example, it has the form of e-mail addresses for the service user.

RECIPIENT

The one who receives the data.

RETENTION

How long the recipient will hold the data (endlessly in the above example).

CATEGORIES

Specifies the intended use of the data (in this example, create a demographic profile).

After you create a policy file needs to be transferred 18 on the digital set-top box consumer. Specific details of this transfer are not included in the scope of the invention, but the person skilled in the art known in the art suitable mechanisms for moving data together with the data broadcasting or separately) to the receiver.

After the receiving device 20 of the receiver, p is the consumer was the next step 22 is to determine acceptable whether the requested data and their intended use for the user. In interactive mode privacy policy may be displayed to the user (suitable way reformatted in some easier to understand than the raw XML (extensible markup language)), and user input 24 indicates the acceptability or unacceptability. Alternatively, the system checks 26 software agent or procedure on the device can decide on a policy file on the basis of previous consumer configuration (stored data preferences privacy policy). The determining may include the step of reconciliation or explanation, when the user is in contact with the broadcaster 38, for example, to request additional information regarding the intended use and/or destination of the user data. Arrow 42 indicates that this process allows the broadcaster to revise or modify the privacy policy.

When the background of the viewer 28 is transferred from the consumer to the broadcaster, the policy file is used to filter 30 background view. For example, if you had a policy file that specifies only the information about which programs are viewed, all other information in registriernummer will be removed prior to transfer.

If the purpose of the background view is creating an anonymous profile (target specified in the policy file), digital set-top box can replace 32 with any information that identifies the user (e.g., name, user ID, etc) aliases to ensure that the broadcaster will not be able to use the history view for direct analysis of the viewer.

If the user decides to allow the dissemination of its historical view, he almost certainly will get some privileges. When a consumer subscribes to this privileged service, the broadcaster can transmit your file to the privacy policy to the consumer. Together with the file of confidentiality may involve the transmission of auxiliary information indicating whether the acceptability of this policy, a necessary condition for using this service or not required. According to the system described in the General case, the positions 34 and 36, after receiving the data mode of use, the broadcaster may make available such a privilege, such as access to services with conditional access, for example, subscription broadcast channels.

In Fig. 2 shows the change in the process performed by the receiver of Fig. 1. After acceptance of this privacy policy at stage 28 is the first test for the admissibility of A which may be interactive or automated as described above). This test verifies the acceptability of all specifications (data types, intended use, duration and so on), identified in the privacy policy. If the test is passed, then all the required data from the held by the receiver are selected A 28 and transmitted to the broadcaster. If the test A not passed, then a second test V partial acceptability, for example, to determine whether the user wants to report some of the requested data (which can still be useful to the broadcaster). If the second test V is not passed, the process stops 40, and the broadcaster is not sent any data. If the second test is passed, then the choice 30.THE from the stored data contains only the data that the user is ready to inform, then this data is transmitted 28, as before.

In Fig. 3 schematically shows the functional features of the device suitable for implementing the present invention and support the above-described method of data collection use. Basic requirements for the device are that it should be made capable of receiving data broadcast (in this example, signals of a television broadcast), must include a sustainable repository of historical use and should be connected to the reverse channel (e.g., via modem or broadband Internet is rnet connection) for data delivery using the broadcaster or other source of this privacy policy.

In the device according to Fig. 3 receiver 50 broadcast has an input 52 for receiving TV broadcast signals. This input 52 may be an antenna, as shown, or may, for example, be a satellite dish or a connection to ground cable television network. Block 54 monitoring together with its associated non-volatile storage (e.g., local hard drive) 56 connected to the receiver 50. While using block 54 monitoring detects information of view, what channel and what program is viewed, and stores the usage data in the storage 56. The device has an input for receiving privacy policy: in the shown example, the privacy policy is delivered by the same means and data broadcasting, so using input 52. When the privacy policy uses a different delivery mechanism, may be provided with a separate inlet (not shown).

The control unit 58 (which appropriately may be provided by a microcontroller or other processing device) is connected to the input 52 to the privacy policy (in this example through the receiver 50). The control unit 58 is also connected to the storage 56 and operates to determine the appropriateness of the received privacy policy, and,if so, to select from the storage 56 data areas identified in the privacy policy. The external interface 60, associated with the control unit 58 provides an output that is connected to the backward channel to the source of this privacy policy.

The device 62 is output in the form of a display (which may be combined with the receiver device or externally connected) allows the block 58 management to present the received privacy policy to the user, after appropriate reformatting to make it easier to understand for an inexperienced user. The device 64 user input (OLA) provides the means by operation of which the user determines the acceptability or unacceptability of policy in the interactive test for eligibility, which is described above. For automated test acceptability store 56 supports these preferences privacy policy for a user, and based on them, block 58, the control automatically determines the appropriateness of the received privacy policy.

The above-described method of data collection use with a receiver of a broadcast, made with the possibility of discovery and preservation of such data use, which contains the stages, which provide the receiver's privacy policy, not identifying t is like data use mode, be collected, but also the intended use of such data. On the receiver perform interactive or automated determination of acceptable received the privacy policy; and, if Yes, the receiver selects from the storage usage data identified in the privacy policy, and sends them to the sender's privacy policy. Provided the device of the receiver, configured to support the aforementioned method.

After having read this disclosure, the experts in this field can offer other modifications. Such modifications may involve other features which are already known in the field of data collection, methods and devices that support it, and that you can use instead of the already described here signs or work together with them.

1. The way we collect from the receiver of the broadcast data use related to operation by the user of the above-mentioned receiver, and the receiver is arranged to detect and maintain such data areas, the method contains the steps that

provide (16, 18) referred to the receiver's data privacy policy, identifying usage data to be collected and the intended use of these data areas, from data source policy conference is dentiality,

define (22) at the receiver, is it acceptable received privacy policy, and

if acceptable, choose (30) on the receiver from the storage usage data, identified data privacy policy, and transmit (28) these data use the data source of this privacy policy.

2. The method according to claim 1, in which the receiver is obtained (20) privacy policy the user, and the acceptability or unacceptability of policy are determined by user input (24).

3. The method according to claim 2, in which the receiver formats the received privacy policy prior to presentation to the user.

4. The method according to claim 1, wherein the receiver stores the data preferences privacy policy for a user and based on them (26) automatically determines (22), it is acceptable if the received privacy policy.

5. The method according to claim 1, in which at the stage of determination of eligibility (22) perform the reconciliation process (38) between the user receiver and the source of the data privacy policy.

6. The method according to claim 1, in which the received acceptance of this privacy policy may be partial (V), resulting in a transmit (28) of a portion (30) of the requested data use.

7. The method according to any one of claims 1 to 6, in which the receiver removes (32) PR the appropriate user IDs of data use to transfer (28) source of data privacy policy.

8. The method according to any one of claims 1 to 6, in which the source data privacy policy provides (34) of the broadcasting services with conditional access, and access to them depends on the user privacy policy and data use.

9. The data capture device use, containing

the broadcast receiver (50),

monitoring means (54) and (56)associated with the said receiver (50) broadcasting and configured to detect and store data use related to operation by the user of the above-mentioned receiver,

input (52) for receiving data privacy policy, identifying usage data to be collected and the intended use of such data use from the data source privacy policy

tool (58) of the control associated with the said inlet (52) and said means (56) for the storage and configured to determine acceptable privacy policy, and

output (60)connected to the backward channel to the data source privacy policy

moreover, the tool (58) of the control is configured to, when determining that the received privacy policy are acceptable, select data use identifiable data policy to which a confidential manner, of the above-mentioned means (56) for the storage and transfer of these data use on output.

10. The device according to claim 9, further containing device (62) o the tool (58) of the control is obtained privacy policy to the user, and means (64) user input using the operation which the user determines the acceptability or unacceptability of these policies.

11. The device according to claim 10, in which the tool (58) of the control is configured to format the received privacy policy to view through the device (62) of the output.

12. The device according to claim 9, in which means (56) supports data storage preferences privacy policy for a user and, based on them, the tool (58) of the control automatically determines the appropriateness of the received privacy policy.

13. The device according to claim 9, in which means (58) control is additionally configured to determine a partial admissibility received privacy policy and selection of the above-mentioned means (56) storing only part of the requested data use.

14. Device according to any one of PP-13, in which the tool (58) is a control that you can remove direct identifiers of the user from the data of use to output.

15. Arrange the creation according to any one of PP-13, in which the receiver (50) of the broadcast receiver is a television broadcast.



 

Same patents:

FIELD: information technology.

SUBSTANCE: invention belongs to the area of broadcasting and personified advertising, as well as creating "virtual" television channels. The receiver-decoder consists of the multi-programme receiver unit receiving the programmes through the same or different channels; the storage unit for multiple programmes received; and the selector unit to choose one of the stored programmes for playback. The selector unit can be fed with instructions to playback a stored programme within a certain time interval, by the means of messages received by the receiver-decoder from the broadcast stream, which contain the timing information of the mentioned time interval.

EFFECT: providing the receiver-decoder unit for the digital television system, as well as operation method for the programmes in the mentioned receiver-decoder.

9 cl, 18 dwg, 8 tbl

FIELD: information technology.

SUBSTANCE: invention belongs to the field of data transfer on the basis of peer-to-peer principle and includes the data protection method where the data decrypted by one of the users becomes useless for others. The essence of the method is that the request for a certain content (CT) is sent by the user device (D1, D2,..., Dn) to the request control centre (10), the unique identifier (UA1, UA2,..., UAn) , which unequivocally determines the user device that has sent the request, is also sent to the request control centre, the key (Kn) relating to the specific user device that has sent the request is obtained from the database (14) connected with the request control centre, the sending content (CT)-related check word(s) are defined; the content to be sent (CT) is additionally encrypted by unique methods for each individual user. The encrypted content is then sent to the user request-sending device that has sent the request, and the encrypted check words are also sent to the user request-sending device.

EFFECT: enhancement of the encrypted data transfer protection level.

5 cl, 10 dwg

FIELD: data transfer.

SUBSTANCE: invention relates to TV and radio broadcasting systems and to data transfer systems using cables, communication lines and networks with user access control systems for transmitted information. From transmitting side, system is comprised of multiplexer, scrambler, modulator, access right encipherer, keyword encipherer, keyword generator, and content data server. From receiving side, the system includes tuner, demodulator, descrambler, de-multiplexer, central control unit, keyword decoder, access right decoder, authorisation system, administering system, protection processor. Upon administering system fault, access to services for all broadcasting system users is not terminated.

EFFECT: improvement of system reliability.

4 cl, 3 dwg

FIELD: digital broadcasting, in particular, method for providing information when switching channels in digital broadcasting receiver, made with possible provision of information during the delay caused by switching of channels.

SUBSTANCE: method contains stages, at which: user is shown a menu for selecting type of replacement information, subject to indication during switching of channel from current channel to new channel; background image, applicable for replacement information, is selected; conditions of displaying of replacement information type selected by user are received; channel switching event is detected; and replacement information is indicated on background image in accordance with selected conditions for displaying during switching of channel.

EFFECT: provision of information during channel switching in digital broadcasting receiver.

2 cl, 3 dwg

FIELD: multimedia processing systems, in particular, system for multimedia reproduction in a portable device having inbuilt controller.

SUBSTANCE: multimedia system for reproduction of multimedia content in portable data reproduction device contains inbuilt processor for controlling multimedia content reproduction resources, and portable device contains one or more reproduction resource. Multimedia system is made with possible realization of operations for generation of multimedia object on basis of multimedia content, possible association of format processor with multimedia object and possible control of selected reproduction resource with usage of format processor for reproduction of multimedia content from multimedia object.

EFFECT: creation of the system which allows reproduction of new formats of multimedia content on different portable devices without necessity for its adaptation with consideration of different reproduction resources present in each device.

3 cl, 5 dwg

FIELD: communications engineering.

SUBSTANCE: the claimed system consists of central station, which contains a non-directional antenna and head receiving station of reverse channel; and sets of client stations, each one of which contains an antenna, connected to reverse channel transmitter. Central station is additionally equipped with a data transfer shaft of direct channel, transmitting shaft of analog broadcasting, transmitting shaft of digital broadcasting, receiving sector antennas of reverse channel, reverse channel access server, connected to center for providing information services, which consists of servers of services combined in local network; and each client station is equipped with a server connected to computer, digital-analog tuner and television receiver.

EFFECT: provision of inexpensive and quality access of users to information resources.

3 cl, 1 dwg

FIELD: television, in particular, devices for client receipt of signals of digital interactive television broadcasting, may be used during introduction of digital television broadcasting in Russia.

SUBSTANCE: device includes central processor, system bus controller, system bus, demultiplexer, video decoder, audio decoder, first interface block, processor for controlling electronic home devices, block for generating commands, first memory block, second interface block, second memory block, third memory block, third interface block, fourth interface block, command generation block, fifth interface block and radio-modem.

EFFECT: possible control over electronic home appliances of home or office, in other words, possible programming of aforementioned devices with setting of program and mode of operation for them for any time span with usage of "smart home" technology.

1 dwg

FIELD: engineering of client receiving systems for multi-channel digital television, in particular, automated system for setup and demonstration of personally preferred television broadcasts.

SUBSTANCE: in accordance to method, on basis of combined consideration of one or several available information sources - user preferences concerning viewing of television broadcasts, measurements of actual viewings of television broadcast, recommendations of broadcaster concerning the viewing of television broadcasts - a set of broadcasts is continuously created with denoting of numeric preference value for each broadcast, while for consideration of actual television broadcast viewings a viewing history database is created. On basis of data about preferred program schedule, digital television broadcast receiver under control of module for setting up personal channels continuously records most interesting broadcasts to hard disk. Personal channel is created - an automatically updated video buffer containing broadcasts of the last few hours which are most interesting for the user. At any time by means of friendly interface the user may choose a personal channel for viewing preferred broadcasts.

EFFECT: improved setup quality of preferred program schedule.

4 dwg

FIELD: engineering of systems for transmission and reproduction of media files.

SUBSTANCE: in accordance to invention, media broadcast system is integrated with interactive aspects into existing infrastructure for provision of mobile communication with usage of its transport streams, while data being transferred are formed in form of minimal size data, containing header of content or its description with possible activation on receipt of positive opening signal.

EFFECT: increased efficiency of provision of media content to consumers.

3 dwg, 1 tbl

FIELD: telecommunications, informational technologies and mass media, in particular, interaction of all these in process of organization of mass interactive events.

SUBSTANCE: method includes broadcast of informational block in direct broadcasting channel of company with reproduction by receivers of users of a hint for voting at the beginning moment Ti of interactive period during interval of duration of interactive period Tp, simultaneously with broadcast of information block, on screen of mobile terminals of users, a sub-item of item for voting of mass interactive menu, which item appears at the moment Ti of interactive period beginning, while aforementioned sub-item disappears from screens of mobile terminals of users when aforementioned time period Tp expires, simultaneously with disappearance of hint on user receivers.

EFFECT: increased transfer speed, decreased volume of transferred information.

2 cl, 9 dwg

FIELD: physics.

SUBSTANCE: invention is related to method for data recording for memory of portable terminal and to memory carrier. Method for recording data for memory of portable terminal contains a stage of reading, at which data is read that is saved on memory carrier of portable terminal; stage of data comparison, at which identifying data are compared, which are individual for user of portable terminal and read from memory carrier, with user registration data registered earlier, and a record command is brought to device of data reading/recording, only when data is approved; recording stage involving recording applied data required for portable terminal to memory carrier under the condition that at the stage of data comparison a record command is sent; stage of activation involving activation of portable terminal, to which memory carrier is connected. Memory carrier contains program, by means of which actions of the said method are enabled.

EFFECT: safety of saving data required for activation of portable telephone.

2 cl, 44 dwg

FIELD: information technology.

SUBSTANCE: registration page with the interface for user mandate input is available on the client system and the entered mandate is sent to the server. As a response to receipt of the user mandate, the server generates a unique session identifier for the client system. The server also receives a digital signature for the user mandate based on the current key in the memory of cyclically changed keys and unique session identifier. Then the server encrypts the digital signature and the user mandate based on the encryption key obtained from the current key and unique session identifier. The encrypted mandate being received with the client system, the keys from the memory of cyclically changed keys are used for checking validity of the mandate. With the user mandate not approved, the user is again transferred to the registration page.

EFFECT: provision of encrypted user mandate processing.

12 cl, 7 dwg

FIELD: information technology.

SUBSTANCE: publishing user is provided with the publication certificate from the DRM server, creates the content, ciphers it with the content key (CK), creates a rights mark for this content with open key of the DRM-server (PU-DRM), for generation (PU-DRM(CK)), restores (PU-ENTITY(PR-OLP)) from the publication certificate, applies secret key (PR-ENTITY) of the corresponding (PU-ENTITY) to the (PU-ENTITY(PR-OLP)) for obtaining (PR-OLP), sign the created rights mark using (PR-OLP), connects SRL and the publication certificate with encrypted content for creation a content package distributed to another user, that must connect with the DRM-server for obtaining a license with CK for playback of the content, creates the license data corresponding with the content package, with (CK), encrypted (PU-ENTITY) for generation of (PU-ENTITY(CK)), signs the license data using (PR-OLP) and attaches the publication certificate to the publication license.

EFFECT: possibility of the content publishing without initial receipt of permission from the server and license issuing for playback of the published content without permission from the server.

20 cl, 17 dwg

FIELD: technological processes.

SUBSTANCE: invention is related to the sphere of cryptographic devices and methods of checking electronic digital signature (EDS). In the method the secret key (SK) is formed, which includes three prime many-digit binary numbers ρ, q and γ. The open key (OK) is formed, which contains three many-digit binary numbers n, α and β, where n=Eρq+l, E - even number, α - number, which is related to index q by module n, and β - number, which is related to index γ by module q. Electronic document (ED) is accepted in the form of many-digit binary number H, electronic digital signature (EDS) Q is formed depending on values of SK, OK and many-digit binary number H, the first checking many-digit binary number A is formed depending on Q, intermediate many-digit binary number W is formed depending on OK and many-digit binary number H, the second checking many-digit binary number B is formed depending on W, and numbers A and B are compared. In case parameters of numbers A and B match, conclusion is drawn about authenticity of electronic digital signature.

EFFECT: reduces size of electronic digital signature without reduction of its resistance level.

8 cl

FIELD: technological processes.

SUBSTANCE: invention is related to the sphere of electrical communication, namely to the sphere of cryptographic devices and methods of electronic digital signature (EDS) check. In the method the secret key (SK) is formed, which includes three many-digit binary numbers (MDN) p, q and γ, where p, q are prime numbers and γ is composite number. The open key (OK) is formed in the form of two many-digit binary numbers n and α, where n = pq and α - number, which is related to index q by module n. Electronic document (ED) is accepted in the form of many-digit binary number H. Electronic digital signature (EDS) Q is formed depending on values of SK, OK and many-digit binary number H. The first checking many-digit binary number A is formed depending on Q. The intermediate many-digit binary number W is generated depending on OK and many-digit binary number H. The second checking many-digit binary number B is formed depending on W, and numbers A and B are compares. In case parameters of A and B numbers match, conclusion is drawn about authenticity of electronic digital signature.

EFFECT: reduces size of electronic digital signature without reduction of its resistance level.

10 cl, 6 ex

FIELD: digital rights control system.

SUBSTANCE: system contains first user device designed for query message setup and transfer, indicating transaction to be run in relation to digital content of at least one object of digital rights (OR), rights issuer aimed to receive query message from first user device, to identify transaction and to process this transaction and to provide access rights to digital content conjointly with server for second user device designed to receive information on stated access right concession. Receive of mentioned information by second user device on digital content access right concession is confirmation of execution of this right to second user device. Method describes operation of mentioned system.

EFFECT: ability of authorized user to transfer partially used or unused object of right to another user and return of OR.

49 cl, 15 dwg, 2 tbl

FIELD: portable electronic devices.

SUBSTANCE: portable electronic device includes memory to store a secret code in the form of pre-defined character sequence; rotating device with touch surface providing for user tactile impact and installed in such a manner as to provide for rotation around its axis; feedback tools separated from the rotating device to provide for feedback to user when turning the rotating device; conversion tool to convert each turn in sequence of turns of the rotating device to a character of corresponding ordered test character sequence, and verification tool to verify the test character sequence by comparing it with pre-defined character sequence.

EFFECT: user convenience during input of test character sequence along with provision of security and restriction of access to the device or to its individual functions.

33 cl, 7 dwg

FIELD: cryptography.

SUBSTANCE: in accordance to the method, cryptographic module is provided with two types of data, which may be received even from a communication partner who is not cryptographically reliable, and which either remain in cryptographic module, or are connected to the document. The information, which remains in cryptographic module, is used to protect the information in the document by generation of a check value, and information which is transferred to document, is used to confirm the fact that the document is protected by a cryptographic module, during the check of document authenticity in a control device.

EFFECT: the contact between cryptographically reliable contact device and document creator is realized directly.

2 cl, 3 dwg

FIELD: infrastructure of public keys (PKI), namely, registration and activation of PKI functions in infrastructures of public keys in SIM-cards.

SUBSTANCE: in accordance to the method, reference code and corresponding activation code are recorded in a table at protection server integrated in PKI or connected to PKI. The user inputs reference code or number in record form together with his personal data, after that the form is sent to PKI and to protection server. After registration is confirmed from the side of PKI, the confirmation information is transmitted to user and supplemented with a request to input activation code at user terminal. Simultaneously, the activation code associated with reference code in the table and identification data of smart-card of user are transmitted to activation module in PKI, then activation code together with identification data of smart-card is transmitted from terminal to activation module and on receipt thereof the activation module determines whether the data coincides with activation code and identification data, provided in advance by protection server, and in case they do, the module performs command of activation of PKI-component of smart-card.

EFFECT: reduced processing time.

13 cl

FIELD: methods and system for processing visualized digital information.

SUBSTANCE: the system for protecting visualized digital data contains a set of computing devices, where at least one of them is the main device, and at least another one is a remote computing device, where each one of aforementioned devices contains one or more processing components, configured for usage in data processing chain, consisting of components for processing protected information, subject to visualization for user, individual processing components which support one or more of such interfaces, such as authentication interface and intermediary authentication interface, where the intermediary authentication interface ensures reading of authentication identifiers and recording of authentication identifiers, and authentication identifier uses for each one of one or more lists for checking each component in each one of aforementioned one or more lists, to determine authorized components, where an authorized component may receive non-encrypted data. Methods describe operation of the system.

EFFECT: protection from unsanctioned access or duplication of unprotected information immediately after that information reaches visualization device, such as a user computer.

20 cl, 8 dwg

FIELD: information protection.

SUBSTANCE: method for transferring messages while providing for confidentiality of identification signs of communication system objects with interaction of devices of communication system subscribers through central device for each communication session cryptographic conversion of subscriber device identifier is performed using encryption key of current subscriber device, while during said cryptographic conversion symmetrical cryptographic algorithm is used and two message transfer modes are taken in consideration, on initiative from subscriber device to central device and vice versa.

EFFECT: protection from unsanctioned access to identifiers of devices of system subscribers transferred via communication channels, in particular when providing for confidentiality of messages identification signs in communications systems with multiple subscriber devices.

6 dwg

Up!