-
公开(公告)号:CA1234599A
公开(公告)日:1988-03-29
申请号:CA501728
申请日:1986-02-12
Applicant: IBM
Inventor: MOTIKA FRANCO , WAICUKAUSKI JOHN A
IPC: G01R31/28 , G01R31/3181 , G01R31/3183 , G01R31/3185 , G06F17/50
Abstract: Weighted Random Pattern Testing Apparatus and Method A method and apparatus for testing very large scale integrated circuit devices, most particularly Level Sensitive Scan Design (LSSD) devices, by applying differently configured sequences of pseudo-random patterns in parallel to each of the input terminals of the device under test, collecting the output responses from each of the output terminals in parallel, combining these outputs to obtain a signature which is a predetermined function of all of the sequences of . parallel outputs and comparing the test signature with a known good signature obtained by computer simulation. The input test stimuli are further altered in a predetermined fashion as a function of the structure of the device to be tested, to individually weight the inputs in favor of more or less binary ones or zeros. FI9-85-026
-
公开(公告)号:CA2599908C
公开(公告)日:2014-09-09
申请号:CA2599908
申请日:2006-02-24
Applicant: IBM
Inventor: KELLEY EDWARD , MOTIKA FRANCO
Abstract: A method, secure cell phone and system for securely accessing an automated banking machine using such secure cell phone. The secure cell phone includes a read only memory device in combination with two linear feedback shift registers for generating a unique security transaction code, which includes a cell phone identification concatenated with two pseudo random codes. The automated banking machine is called from the cell phone. One of the pseudo random codes is input into a software emulation of the cell phone circuitry running on the automated banking machine to generate a computed pseudo random code. This computed code is concatenated the input pseudo random code and a determined cell phone identification to generate a computed transaction code. The automated banking machine is securely accessed using the secure cell phone if the computed transaction code matches the unique security transaction code.
-
公开(公告)号:BRPI0707531A2
公开(公告)日:2012-07-10
申请号:BRPI0707531
申请日:2007-01-17
Applicant: IBM
Inventor: KELLEY EDWARD , MOTIKA FRANCO , WILBRINK TIJS
IPC: G06F21/00
Abstract: A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.
-
公开(公告)号:DE60320314T2
公开(公告)日:2009-06-25
申请号:DE60320314
申请日:2003-02-20
Applicant: IBM
Inventor: GATTIKER ANNE , GROSCH DAVID A , KNOX MARC D , MOTIKA FRANCO , NIGH PHIL , VAN HORN JODY , ZUCHOWSKI PAUL S
-
公开(公告)号:AT391926T
公开(公告)日:2008-04-15
申请号:AT03713598
申请日:2003-02-20
Applicant: IBM
Inventor: GATTIKER ANNE , GROSCH DAVID , KNOX MARC , MOTIKA FRANCO , NIGH PHIL , VAN HORN JODY , ZUCHOWSKI PAUL
-
公开(公告)号:CA2599908A1
公开(公告)日:2006-09-08
申请号:CA2599908
申请日:2006-02-24
Applicant: IBM
Inventor: MOTIKA FRANCO , KELLEY EDWARD
IPC: G06Q20/00
Abstract: A method, secure cell phone and system for securely accessing an automated banking machine using such secure cell phone. The secure cell phone includes a read only memory device in combination with two linear feedback shift registers for generating a unique security transaction code, which includes a cell phone identification concatenated with two pseudo random codes. The automated banking machine is called from the cell phone. One of the pseudo random codes is input into a software emulation of the cell phone circuitry running on the automated banking machine to generate a computed pseudo random code. This computed code is concatenated the input pseudo random code and a determined cell phone identification to generate a computed transaction code. The automated banking machine is securely accessed using the secure cell phone if the computed transaction code matches the unique security transaction code.
-
公开(公告)号:CA1241375A
公开(公告)日:1988-08-30
申请号:CA501737
申请日:1986-02-12
Applicant: IBM
Inventor: EICHELBERGER EDWARD B , LANGMAID ROGER N , LINDBLOOM ERIC , MOTIKA FRANCO , SINCHAK JOHN L , WAICUKAUSKI JOHN A
Abstract: Weighted Random Pattern Testing Apparatus and Method A method and apparatus for testing very large scale integrated circuit devices, most particularly Level Sensitive Scan Design (LSSD) devices, by applying differently configured sequences of pseudo-random patterns in parallel to each of the input terminals of the device under test, collecting the output responses from each of the output terminals in parallel, combining these outputs to obtain a signature which is a predetermined function of all of the sequences of parallel outputs and comparing the test signature with a known good signature obtained by computer simulation. The input test stimuli are further altered in a predetermined fashion as a function of the structure of the device to be tested, to individually weight the inputs in favor of more or less binary ones or zeros.
-
-
-
-
-
-