FIELD: controlling.
SUBSTANCE: invention relates to tools for radio monitoring of electronic equipment and can be used for the purpose of detecting bugs (in particular, hardware, software, acoustic, telephone bugs, etc.) using covert information leakage paths, in technical means for reception, processing, storage and transmission of information (TMRI). Substance: a database on the spectral components of the emitted reference electromagnetic signals of the TMRI and the schedule of operation thereof is preformed, as well as a database on the spectral components of the emitted reference electromagnetic signals of known bugs, threshold levels are set according to the amplitude of the spectral components. Electromagnetic signals are recorded during operation, amplified, and spectral components exceeding the preset threshold levels are isolated. The isolated spectral components are compared with the preformed data on the spectral components of the TMRI and the schedule of operation thereof, as well as with the spectral components of the reference electromagnetic signals from the bugs. A conclusion is made about the presence or absence of a bug and the type thereof. The radio electronic components included in the TMRI and configured to connect with power circuits separately from the entire item are therein examined for the presence of bugs using covert information leakage paths at the stage of preparing radio electronic components for assembling the TMRI. Power is therefor supplied to the component, ensuring the transition of the component to the operating mode, the electromagnetic signals emitted by the component are recorded, the spectral components thereof are isolated, the spectral components of the recorded electromagnetic signals are compared with the spectral components of the reference electromagnetic signals required to be emitted by a component confirmed to contain no bugs, a conclusion is made about the absence of bugs and about a possibility of using the component for assembling the TMRI. The functional units of the TMRI, assembled from several examined radio electronic components, as well as assemblies from several functional units of the TMRI, are examined at the stage of assembling the TMRI. Power is therefor supplied to the functional units (assemblies thereof) of the TMRI and the units transition into the operating mode, the electromagnetic signals emitted by the functional units (assemblies thereof) are recorded, the spectral components thereof are isolated, the spectral components of the recorded electromagnetic signals are compared with the spectral components of the reference electromagnetic signals required to be emitted by functional units (assemblies thereof) confirmed to contain no bugs, a conclusion is made about the absence of bugs and about a possibility of using the functional units (assemblies thereof) for assembling the TMRI. After assembling the TMRI from radio electronic components and functional units (assemblies thereof) successfully examined for the absence of bugs using covert information leakage paths, the electromagnetic signals of the TMRI in all modes of operation at various points of the space around the assembled TMRI are recorded as reference spectral components, followed by isolating the spectral components thereof and recording thereof in the electronic database of the TMRI. At the stage of operation of the TMRI the data on the spectral components of the reference electromagnetic signals of the TMRI in all modes of operation at various points of the space around the TMRI in operation is periodically updated, as well as the data on the spectral components of the reference electromagnetic signals known at the moment of updating the bugs.
EFFECT: increased probability of detecting bugs using covert information leakage paths in the TMRI, a possibility to assess the current technical state of the TMRI.
1 cl, 1 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR DETECTING ELECTRONIC BOOKMARKS IN A RECEIVED ELECTRONIC PRODUCT THAT EMITS ELECTROMAGNETIC SIGNALS WHEN CONNECTED TO A POWER SOURCE | 2021 |
|
RU2792684C1 |
METHOD FOR DYNAMIC DETECTION OF SMALL-SIZE HIDDEN FACILITIES THAT FACILITATE INFORMATION LEAKAGE AND ARE INSTALLED ON MOBILE OBJECT WITHOUT AUTHORISATION | 2010 |
|
RU2503023C2 |
DETECTION METHOD OF UNAUTHORIZED INSTALLED RADIO-ELECTRONIC MEANS ON SUBSCRIBER COMMUNICATION LINES | 2016 |
|
RU2621455C1 |
METHOD FOR RAPID DETECTION OF SMALL HIDDEN MEANS, WHICH FACILITATE INFORMATION LEAKAGE, UNAUTHORIZED INSTALLED ON MOBILE OBJECT | 2020 |
|
RU2746300C1 |
METHOD OF DETECTION AND IDENTIFICATION OF ELECTRONIC DEVICES MOUNTED ONTO OBJECT WITHOUT AUTHORIZATION | 2006 |
|
RU2309416C1 |
METHOD OF PROTECTING ELECTRONIC MULTIFUNCTIONAL MOBILE DEVICE FROM UNAUTHORIZED ACCESS | 2022 |
|
RU2817264C2 |
PROTECTION SYSTEM OF OPERATING STATIONS AND INFORMATION SERVERS OF COMPUTER SYSTEMS AND NETWORKS | 1999 |
|
RU2169941C2 |
SYSTEM AND METHOD FOR FORMING OPTIMAL SET OF TESTS FOR IDENTIFYING SOFTWARE BUGS | 2020 |
|
RU2744438C1 |
METHOD TO IDENTIFY MULTI-PARAMETRE OBJECTS | 2008 |
|
RU2395817C1 |
PROTECTIVE SYSTEMS OF WORKSTATIONS, INFORMATION AND FUNCTIONAL SERVERS OF COMPUTER SYSTEMS AND NETWORKS WITH DYNAMIC LISTS OF AUTHORIZED EVENTS | 1999 |
|
RU2166792C1 |
Authors
Dates
2021-07-26—Published
2020-06-29—Filed