会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • BIT GENERATION APPARATUS AND BIT GENERATION METHOD
    • 位生成装置和位生成方法
    • US20130293274A1
    • 2013-11-07
    • US13978598
    • 2011-01-13
    • Koichi ShimizuDaisuke SuzukiTomomi Kasuya
    • Koichi ShimizuDaisuke SuzukiTomomi Kasuya
    • H03K3/02H03K19/003
    • H03K3/02G09C1/00H03K5/1252H03K19/003H03K19/00361H04L9/3278
    • A bit generation apparatus includes a glitch generation circuit that generates glitch signals which include a plurality of pulses, and T-FF bit generation circuits which input the glitch signals, and based on either rising edges or falling edges of the plurality of pulses included in the glitch signals, generate a bit value of either 0 or 1. Each of the T-FF bit generation circuits generates a respective bit value based on either the parity of the number of rising edges or the parity of the number of falling edges of the plurality of pulses. As a result of employment of the T-FF bit generation circuits, circuits that are conventionally required but not essential for the glitch become unnecessary. This serves to prevent expansion in circuit scale and increase in processing time of bit generation for the bit generation circuit.
    • 位产生装置包括产生包括多个脉冲的毛刺信号的毛刺产生电路和输入毛刺信号的T-FF位产生电路,并且基于包括在多个脉冲中的多个脉冲的上升沿或下降沿 毛刺信号,产生0或1的位值.T-FF位产生电路中的每一个基于上升沿的奇偶性或多个下降沿的奇偶校验产生相应的位值 的脉冲。 作为使用T-FF位产生电路的结果,不需要通常需要但不是毛刺所必需的电路。 这用于防止电路规模的扩展,并增加位产生电路的位产生的处理时间。
    • 4. 发明授权
    • Electronic device, key generation program, recording medium, and key generation method
    • 电子设备,密钥生成程序,记录介质和密钥生成方法
    • US08533492B2
    • 2013-09-10
    • US13319550
    • 2009-05-22
    • Tomomi Kasuya
    • Tomomi Kasuya
    • G06F11/30
    • H04L9/3278H04L9/0866H04L9/3242
    • An electronic device 100 executes a key-using process that uses a key. A physical quantity generation part 190 generates a physical quantity intrinsic to the electronic device and having a value which is different from one electronic device to another and different each time the physical quantity is generated. A key generation part 140 generates the same key for each key-using process, based on the physical quantity generated by the physical quantity generation part 190, each time the key-using process is to be executed, immediately before the key-using process is started. A key-using process execution part 1010 executes the key-using process such as generation of a keyed hash value, by using the key generated by the key generation part 140. A control program execution part 180 deletes the key generated by the key generation part 140, each time the key-using process is ended.
    • 电子设备100执行使用密钥的密钥使用过程。 物理量生成部190生成电子装置固有的物理量,并且具有与每个电子装置不同的值,并且每当产生物理量时,该物理量不同。 密钥生成部140在密钥使用处理之前,每当密钥使用处理被执行时,基于由物理量生成部190生成的物理量,对每个密钥使用处理生成相同的密钥 开始了 密钥使用处理执行部分1010通过使用由密钥生成部分140生成的密钥来执行诸如生成密钥哈希值的密钥使用过程。控制程序执行部分180删除密钥生成部分生成的密钥 140,每次密钥使用过程结束。
    • 5. 发明授权
    • Encrypting apparatus
    • 加密设备
    • US07333609B2
    • 2008-02-19
    • US10473879
    • 2001-04-03
    • Tomomi KasuyaTakeshi ChikazawaTakao WakabayashiShinsuke Uga
    • Tomomi KasuyaTakeshi ChikazawaTakao WakabayashiShinsuke Uga
    • H04L9/00
    • H04L9/0662H04L9/3242H04L2209/122H04L2209/125H04L2209/34H04L2209/80H04W12/02H04W12/10
    • A random number sequence is previously generated by the function f8 for data confidentiality processing, which generates a random number sequence, and stored in a random number sequence memory (buffer). When data (message) is input, the random number sequence stored in the random number sequence memory is obtained, and the data (message) is encrypted by an XOR circuit to generate ciphertext data. In case of decrypting data, a random number sequence is also previously generated by the function f8 for data confidentiality processing and stored in the random number sequence memory (buffer). When the ciphertext data is input, by the XOR circuit, the random number sequence stored in the random number sequence memory is read and the ciphertext data is decrypted into the data (message).
    • 先前由用于数据机密性处理的函数f 8生成随机数序列,其生成随机数序列,并存储在随机数序列存储器(缓冲器)中。 当输入数据(消息)时,获得存储在随机数序列存储器中的随机数序列,并通过异或电路对数据(消息)进行加密,生成密文数据。 在对数据进行解密的情况下,随机数序列也预先由用于数据机密处理的函数f 8生成并存储在随机数序列存储器(缓冲器)中。 当输入密文数据时,由异或电路读出存储在随机数序列存储器中的随机数序列,并将密文数据解密成数据(消息)。
    • 7. 发明申请
    • ELECTRONIC DEVICE, KEY GENERATION PROGRAM, RECORDING MEDIUM, AND KEY GENERATION METHOD
    • 电子设备,关键生成程序,记录介质和关键生成方法
    • US20120066515A1
    • 2012-03-15
    • US13319550
    • 2009-05-22
    • Tomomi Kasuya
    • Tomomi Kasuya
    • G06F12/14
    • H04L9/3278H04L9/0866H04L9/3242
    • An electronic device 100 executes a key-using process that uses a key. A physical quantity generation part 190 generates a physical quantity intrinsic to the electronic device and having a value which is different from one electronic device to another and different each time the physical quantity is generated. A key generation part 140 generates the same key for each key-using process, based on the physical quantity generated by the physical quantity generation part 190, each time the key-using process is to be executed, immediately before the key-using process is started. A key-using process execution part 1010 executes the key-using process such as generation of a keyed hash value, by using the key generated by the key generation part 140. A control program execution part 180 deletes the key generated by the key generation part 140, each time the key-using process is ended.
    • 电子设备100执行使用密钥的密钥使用过程。 物理量生成部190生成电子装置固有的物理量,并且具有与每个电子装置不同的值,并且每当产生物理量时,该物理量不同。 密钥生成部140在密钥使用处理之前,每当密钥使用处理被执行时,基于由物理量生成部190生成的物理量,对每个密钥使用处理生成相同的密钥 开始了 密钥使用处理执行部分1010通过使用由密钥生成部分140生成的密钥来执行诸如生成密钥哈希值的密钥使用过程。控制程序执行部分180删除密钥生成部分生成的密钥 140,每次密钥使用过程结束。