1. the method of integration of information resources of heterogeneous computer network, consisting of at least two of the u0441u0435u0431u00a0 u0441u0432u00a0u0437u0438 established network computing u0432u043au0438, at least one of which is provided with different operating system (os), and in the context of this os is the annex of this spot a large installation, u0437u0430u043au043bu044eu0447u0430u044eu0449u0438u0439u0441u00a0 is that:;installed on each computer system installation software (foss) u0434u043bu00a0 u043fu043eu043bu0443u0447u0435u043du0438u00a0 a secure information exchange. and among all processing plants;;provided on each computer installation u043cu0435u0436u043cu0430u0448u0438u043du043du043eu0433u043e unified unified means of information exchange, selling physical u0441u0432u00a0u0437u043du043eu0441u0442u044c u0443u043fu043eu043cu00a0u043du0443 ies of computing facilities in the u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 secure line of information exchange;;provide secure encrypted communication between the u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0u043cu0438 computing facilities in u0443u043fu043eu043cu00a0u043du0443u0442u044bu0435 means u043cu0435u0436u043cu0430u0448u0438u043du043du043eu0433u043e exchange the u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer network through an automatic u0432u0437u0430u0438u043cu043eu0434u0435u0439u0441u0442u0432u0438u00a0 each u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e end u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0, functioning in the context of isps. through the established line u0438u0441u0445u043eu0434u00a0u0449u0438u0445 and u0432u0445u043eu0434u00a0u0449u0438u0445 communications;;create for each u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer installing secure randomized data repository, called personal safe;;u0441u043eu0445u0440u0430u043du00a0u044eu0442 in u0443u043fu043eu043cu00a0u043du0443u0442u043eu043c personal safe each u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer installation line u0438u0441u0445u043eu0434u00a0u0449u0438u0445 and u0432u0445u043eu0434u00a0u0449u0438u0445 messages addressed to the u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computing device u0430u043du043eu0432u043au0438 and functioning at the end u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0, and address other computer installation u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer network;;provide the opportunity to u0441u043eu0437u0434u0430u043du0438u00a0 (publications) in the context of u0444u0443u043du043au0446u0438u043eu043du0438u0440u043eu0432u0430u043du0438u00a0 u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e isps and the possibility of context u0444u0443u043du043au0446u0438u043eu043du0438u0440u043eu0432u0430u043du0438u00a0 u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e u0443u0434u0430u043bu0435u043du0438u00a0 isps information objects, referred to as references, with the possibility of u0440u0430u0437u0440u0435u0448u0435u043du0438u00a0 / u0438u0437u0432u043bu0435u0447u0435u043du0438u00a0 these links to specialized information resources, referred to as wits ins data as u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439,and other computer facilities in u0443u043fu043eu043cu00a0u043du0443u0442u043eu043c personal safe;;provide secure storage u0443u043fu043eu043cu00a0u043du0443u0442u044bu0445 displays data in u0443u043fu043eu043cu00a0u043du0443u0442u043eu043c personal safe as a set of links, called u0434u0430u0442u0430u043cu0430u0440u043au0435u0442 and u043fu0440u0435u0434u0441u0442u0430u0432u043bu00a0u044eu0449u0435u0439 u0441u043eu0431u043e the second u0443u043fu043eu0440u00a0u0434u043eu0447u0435u043du043du044bu0439 heterogeneous data network, which u00a0u0432u043bu00a0u0435u0442u0441u00a0 protected information resource u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer network;;u0441u043eu0445u0440u0430u043du00a0u044eu0442 in u0443u043fu043eu043cu00a0u043du0443u0442u043eu043c personal safe each u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computing installation of confidential data and u043fu043eu043bu043du043eu043cu043eu0447u0438u00a0 any officer authorized to slave fa windows u0434u0430u0442u0430u043cu0430u0440u043au0435u0442 u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer network, in the form of u043fu0440u043eu0444u0438u043bu00a0 access of that person;;provide the mandate and discretionary access control u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e official data u0434u0430u0442u0430u043cu0430u0440u043au0435u0442, u0440u0435u0430u043bu0438u0437u0443u00a0 thereby independent mechanisms u0438u0434u0435u043du0442u0438u0444u0438u043au0430 and authentication of official;;provide guaranteed processing links in u0434u0430u0442u0430u043cu0430u0440u043au0435u0442 through u0443u043au0430u0437u0430u043du0438u00a0 non final u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0 - handler, through which the body u0441u043eu043eu0431u0449u0435u043du0438u00a0 with z u0430u043fu0440u043eu0441u043eu043c extraction should be open, and u043eu0442u043fu0440u0430u0432u043bu00a0u044eu0442 in processing the node - u043eu0442u043fu0440u0430u0432u0438u0442u0435u043bu00a0 not only a confirmation of the processing, and the data u0443u0434u0430u043bu0435u043du043du043eu0433 the node is u043fu043eu043bu0443u0447u0430u0442u0435u043bu00a0 in the agreed format.;provide a choice of derived data and u043fu043eu043cu0435u0449u0435u043du0438u00a0 them in specialized analytical express processing module with the possibility of u043fu0440u043eu0432u0435u0434u0435u043du0438u00a0 after and u043cu0430u043du0438u043fu0443u043bu00a0u0446u0438u0439 data;;systematically u043fu0440u043eu0432u0435u0440u00a0u044eu0442 u043fu043eu043bu043du043eu043cu043eu0447u0438u00a0 each official authorized to work with u0434u0430u0442u0430u043cu0430u0440u043au0435u0442 u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer network, and a service to stop u043eu043du043au0440u0435u0442u043du043eu0433u043e officer during the different u0445u043eu0442u00a0 one parameter of the u043fu0440u043eu0444u0438u043bu00a0 access u0445u0440u0430u043du00a0u0449u0435u0433u043eu0441u00a0 personal safe u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 u0432u044bu0447u0438u0441u043bu0438u0442u0435u043bu044cu043du043e floor installation.;2. method for 1, in which:;form the u0443u043fu043eu043cu00a0u043du0443u0442u043eu0435 system software by building each of the u0443u043fu043eu043cu00a0u043du0443u0442u044bu0445 operating systems a base set of transport protocols designed u0434u043bu00a0 addressing hosts and routing packets, as well as a set of format or a format for data exchange application u0443u0440u043eu0432u043du00a0;;form a protected information space u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer network through the information exchange between the u0443u043fu043eu043cu00a0u043du0443u0442u044bu043cu0438 u0443u043fu043eu0440u00a0u0434u043eu0447u0435u043du0438u00a0 u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0u043cu0438 by u043eu0431u0435u0441u043fu0435u0447u0435u043du0438u00a0 intermediate u043fu0435u0440u0435u043du0430u0437u043du0430u0447u0435u043du0438u00a0 information flows, the conversion information u043eu0431u0435u0441u043fu0435u0447u0435u043du0438u00a0 classifiers.automatic u0441u043eu0433u043bu0430u0441u043eu0432u0430u043du0438u00a0 formats derived data u0434u043bu00a0 uniform their u043fu0440u0435u0434u0441u0442u0430u0432u043bu0435u043du0438u00a0 for joint u0444u0443u043du043au0446u0438u043eu043du0438u0440u043eu0432u0430u043du0438u00a0 applications;;the system u043fu0440u0435u0434u0441u0442u0430u0432u043bu0435u043du0438u00a0 and provide a uniform data transfer within the u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computer network, including u0443u0441u043bu043eu0432u0438u00a0u0445 expressed u0440u0430u0437u043du043eu0440 u043eu0434u043du043eu0441u0442u0438 software / hardware of the computing facilities u0443u043fu043eu043cu00a0u043du0443u0442u044bu0445 network;;u043fu0440u043eu0432u043eu0434u00a0u0442 analytical processing of uniform data regardless of the characteristics of the u0444u0443u043du043au0446u0438u043eu043du0438u0440u043eu0432u0430u043du0438u00a0 u0443u043fu043eu043cu00a0u043du0443u0442u044bu0445 end applications on different computer facilities of the network;;provide context sensitive search and u043cu043eu0440u0444u043eu043bu043eu0433u043e - linguistic data analysis u0434u0430u0442u0430u043cu0430u0440u043au0435u0442 through global data sharing within the u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 computing the network.;3. method for 1, in which:;u0443u043fu043eu043cu00a0u043du0443u0442u043eu0435 interaction end applications for the client - server technology u043eu0441u0443u0449u0435u0441u0442u0432u043bu00a0u044eu0442 through readjustment of interfaces each of these end appli data exchange with the other end of the u0434u043bu00a0 u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0u043cu0438 by u043fu0435u0440u0435u043du0430u043fu0440u0430u0432u043bu0435u043du0438u00a0 information flows between the u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0u043cu0438 through appropriate proxy - u0441u043eu0435u0434u0438u043du0435u043du0438u00a0, u0438u043cu0435u044eu0449u0438u0435u0441u00a0 in the u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e isps.;implement a mechanism independent u0438u0437u0432u043bu0435u0447u0435u043du0438u00a0 data u0430u0431u0441u0442u0440u0430u0433u0438u0440u043eu0432u0430u043du0438u0435u043c on the mode of u043fu043eu043bu0443u0447u0435u043du0438u00a0 these data on the node's owner information resource, including t the pa program handler at this node in the so-called ordered depth, sir information resource from the u0434u0430u0442u0430u043cu0430u0440u043au0435u0442;;u0443u043fu043eu043cu00a0u043du0443u0442u0443u044e reconfigure interfaces end applications in the operating system u043eu0441u0443u0449u0435u0441u0442u0432u043bu00a0u044eu0442 by u043fu0435u0440u0435u043du0430u043fu0440u0430u0432u043bu0435u043du0438u00a0 information flows through the u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0u043cu0438 through appropriate mechanisms u043cu0435u0436u0437u0430u0434u0430u0447u043du043eu0433u043e u0432u0437u0430u0438u043cu043eu0434u0435u0439u0441u0442u0432u0438u00a0, u0438u043cu0435u044eu0449u0438u0435u0441u00a0 in the u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e isps.;implement mechanism of information u0432u0437u0430u0438u043cu043eu0434u0435u0439u0441u0442u0432u0438u00a0 end applications through intermediate storage when the means of u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e isps control with u0441u0442u043eu00a0u043du0438u0435 file (s) exchange and automatically start the shipping / loading u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e (s) of the file (s) for the other end u043fu0440u0438u043bu043eu0436u0435u043du0438u00a0.;4. method for 1, in which:;implement the system of distributed u0445u0440u0430u043du0435u043du0438u00a0 data in the form of all links on the protected information resources published in the u0434u0430u0442u0430u043cu0430u0440u043au0435u0442 u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 u0432u044bu0447u0438u0441u043bu0438u0442u0435u043bu044cu043d ow network and u0445u0440u0430u043du00a0u0449u0438u0435u0441u00a0 in u0443u043fu043eu043cu00a0u043du0443u0442u043eu043c personal safe isps at each computer installation, with the possibility of u0438u0437u0432u043bu0435u0447u0435u043du0438u00a0 published data on regulation, on the request of or, in fact, u043du0430u0441u0442u0443u043fu043bu0435u043du0438u00a0 a u0441u043eu0431u044bu0442u0438u00a0;;provide guaranteed the possibility of u0438u0437u0432u043bu0435u0447u0435u043du0438u00a0 heterogeneous data u0445u0440u0430u043du00a0u0449u0438u0445u0441u00a0 under various u0443u043fu0440u0430u0432u043bu0435u043du0438u00a0 database systems (dbms), u0444u0443u043du043au0446u0438u043eu043du0438u0440 in the context of u0443u044eu0449u0438u043cu0438 u0443u043fu043eu043cu00a0u043du0443u0442u043eu0433u043e isps, and in the context of each operating system u0443u043fu043eu043cu00a0u043du0443u0442u043eu0439 network computing systems.;provide opportunities for personalized analysis of recovered data based on u0441u043eu0437u0434u0430u043du0438u00a0 user models processing, including quality (neco u043bu0438u0447u0435u0441u0442u0432u0435u043du043du044bu0445) data.;5. how to choose 1, in which the information resources from the group including at least u0441u0435u0431u00a0: data files, queries referring to the data u0438u0437u0432u043bu0435u0447u0435u043du0438u00a0 scenarios. u0438u0441u043fu043eu043bu043du00a0u0435u043cu044bu0435 modules.;6. method for 1, in which u0432u044bu043fu043eu043bu043du00a0u044eu0442 u0443u043fu043eu043cu00a0u043du0443u0442u044bu0435 subsequent u043cu0430u043du0438u043fu0443u043bu00a0u0446u0438u0438 data u0434u043bu00a0 u043eu0441u0443u0449u0435u0441u0442u0432u043bu0435u043du0438u00a0 action from the group including u0441u0435u0431u00a0: u0432u044bu00a0u0432u043bu0435u043du0438u0435 reliable z u0438u0441u0438u043cu043eu0441u0442u0435u0439, statistical processing, the projections, the creation of models processing, an analytical reports.
展开▼