Abstract:
A processing unit (300) includes a read-only encryption key (394). Loader code image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) from the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a device improved for compressing data. SOLUTION: A method is disclosed for encoding the input data stream of a primary symbol and generating the output sequence of a pointer. A literal string in the input data stream is first loaded into a history buffer. The value of a history buffer pointer is copied to a register, and the starting position of the literal string in the history buffer is shown. A counter is incremented, corresponding to each following literal symbol from the input data stream. Next, the literal string and each following literal symbol from the input data stream are encoded by using values in the register and the counter as literal pointers. Finally, the literal pointer is outputted from a data compressor.
Abstract:
A processing unit (300) includes a read-only encryption key (394). Loader code image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) from the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and system for differential transmission of data on a bus overcoming the limitations of conventional systems. SOLUTION: This differential transitional coding uses a differential bus. Use of differential transition includes a step to divide a differential bus into one or more groups each of which is composed of four bus lines. Use of a differential bus includes a step to assert half of the bus lines in one group during bus data transmission and thereby regulate the asserted and reversely asserted sets of the bus lines. In addition, at least one of the bus lines in the asserted set is reversely asserted and at least one of the bus lines in the reversely asserted set is asserted. Consequently, data are differentially transmitted by driving two bus lines, i.e., one line for one set. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a system capable of giving high maintainability at the time of compressing data. SOLUTION: The system includes interfaces 102, 112, compression/ decompression units 104, 114 and a storage means 120. Each compression/ decompression units compresses/decompresses data sent through its corresponding interface and supplies a data stream. The compression/decompression units 104, 114 mutually monitor respective data streams through an interface 116. When one compression/decompression unit is a master device, the other compression/decompression units compares one data stream with the other.
Abstract:
A processing unit (300) includes a read-only encryption key (394). Loader code image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) from the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a device for enciphering data that are transmitted through a differential transition data bus by overcoming the limits of the conventional system. SOLUTION: A data enciphering method is provided for a differential bus using transition coding. In a prescribed bus transfer cycle, input data are mapped, coded and enciphered as a logic state. The mapping, coding and enciphering of the input data are changed for every bus transfer cycle, and are a function of pseudo-random numbers. The logic state is differentially transmitted from a bus transmitter to a bus receiver, mapped as corresponding output data, deciphered and decoded. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide an improved method and system for compressing data. SOLUTION: An input data stream of a primitive symbol is coded and a method for generating an output sequence of a pointer is disclosed. The initial part of the input data stream is coded as a literal pointer by a compressor. The literal pointer includes at least 1 data byte from the data stream. The succeeding parts of the input data stream are coded as a copy pointer. The copy pointer includes an offset denoting a history buffer in a count and compressor. All succeeding data bytes from the input data stream are alternately coded as the literal pointer and the copy pointer. Thus, a coding output sequence outputted from the compressor includes strings of the pointer where the literal pointer and the copy pointer.
Abstract:
A processing unit (300) includes a read-only encryption key (394). Loader code image (250) is loaded into system memory (205) from non-volatile storage (270). Loader code image (250) includes a prefix value (225) and a suffix value (235). The prefix value (225) is combined with the master key (394) from the processing unit (300) to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.
Abstract:
A method for encoding an input data stream of source symbols to produce an output sequence of pointers is disclosed. An initial part of the input data stream is encoded as a LITERAL_POINTER by a compressor. A LITERAL_POINTER includes at least one data byte from the data stream. A subsequent part of the input data stream is encoded as a COPY_POINTER. The COPY_POINTER includes a count and a displacement pointing to a history-buffer within the compressor. All succeeding data bytes from the input data stream are encoded as LITERAL_POINTERs and COPY_POINTERs in an alternating fashion, such that an encoded output sequence output by the compressor includes a string of pointers alternating between LITERAL_POINTERs and COPY_POINTERs.