-
公开(公告)号:JPH1063183A
公开(公告)日:1998-03-06
申请号:JP12452497
申请日:1997-05-14
Applicant: KOREA ELECTRONICS TELECOMM , KOREA TELECOMMUN AUTHORITY
Inventor: JIYANUON RII , HIYUNSUUKU CHIYOO , JIYONSEOOKU CHIYAE , KIYOON HO
IPC: G09C1/00 , H04B1/38 , H04H20/00 , H04L9/06 , H04N21/2347 , H04N21/266 , H04H1/00 , H04N7/16
Abstract: PROBLEM TO BE SOLVED: To make a data encryption method not inferior in terms of execution speed as well while maintaining high safety and confidentiality, by adding a byte shift function and dynamic allocation transform scheme to conventional data encryption standard algorithm. SOLUTION: The bit shift function(BSF) is executed before a right side block (32 bit)) is applied to the next round to deal with a linear cryptoanalysis. Namely, the bit shift function(BSF) is a method for comparing the input and output of an S box, analyzing the correlative relation thereof and determining a linear approximation equation relating to the nonlinear S box. The input of the bit shift function(BSF) is shifted by using a module path as an element for dealing with relating to the linear cryptoanalysis method. The dynamic allocation transform (DATA) is executed by using the round key (Ki) formed in order to intensify the function of an (f) function after the bit shift function(BSF) is executed. The confidentiality of the data is improved by proving the method with the element relating to differential cryptoanalysis.
-
公开(公告)号:JP2004129303A
公开(公告)日:2004-04-22
申请号:JP2003419910
申请日:2003-12-17
Applicant: Korea Telecommun Authority , コリア テレコミュニケーション オーソリティ
Inventor: PARK ILL HWAN , JANG CHUNG RYONG
CPC classification number: H04L9/3257 , H04L2209/60
Abstract: PROBLEM TO BE SOLVED: To prevent forgeries involved in recovery-type, appendix-type, recovery-type public and blind electronic signature methods and key-exchange method.
SOLUTION: The methods are blind electronic signature method, wherein a signer A selects an arbitrary number r between 1 and q to calculate a remainder x (x≡mg
-r mod p), obtained by multiplying g by -r and then by multiplying the product, g
-r by a message m and dividing the resultant product by p. The signer A inputs x and the signer's identification number ID
A to the hash function to obtain h(x,ID
A ). Then, the signer multiplies the obtained result by the signer's secret key a, adding r to the product, then divides by q to obtain the remainder y (y≡r+ah(x,ID
A )mod q). Thereby, (x, y) becomes the recovery type electronic signature for the message m. The verifier confirms the contents of the message restored, as a result of the verification and verifies the validity of the signature. Reliability of a system can be enhanced, by exchanging shared secret keys between two users, without the knowledge of a third party.
COPYRIGHT: (C)2004,JPO-
公开(公告)号:JPH10150452A
公开(公告)日:1998-06-02
申请号:JP14413597
申请日:1997-06-02
Applicant: KOREA ELECTRONICS TELECOMM , KOREA TELECOMMUN AUTHORITY
Inventor: JOHNG-WOO KIM , YON-UKU CHA , KUYUUHO RI , JOHNG-AMU CHONG , IKU-KUYUN KIM
Abstract: PROBLEM TO BE SOLVED: To remove a flow cell through the use of a general flow control field existing in a header by transmitting/receiving a signal cell, retrieving the general flow control field against a maintenance cell and removing the floating cell. SOLUTION: The general flow control processing logic 31a of a processor part 31 inspects the general flow control field of the transmitted cell, generally processes the maintenance cell when it is the normal cell and abolishes it when it is the floating cell. Remote defect recognition cells and continuity inspection cells, which are generated from respective terminals, are treated in the same way as remote relay cells. The continuity inspection cell and the remote defect recognition cell among signal/meter signal cells, an inter-subscriber communication cell, remote relay cells and the maintenance cells between the subscriber and a network by a cell relay and an add/drop function part 32. A processing for a warning recognition signal cell and a system management cell in the maintenance cells is executed by an ATM hierarchy processing part 34 and the processor part 31.
-
公开(公告)号:JPH1132368A
公开(公告)日:1999-02-02
申请号:JP33303797
申请日:1997-12-03
Applicant: KOREA TELECOMMUN AUTHORITY
Inventor: RI SHUHYON , RI TAKUGEN , HOAN INKAN , KIN KIKYO
Abstract: PROBLEM TO BE SOLVED: To increase the execution ratio of a mobile transaction by inspecting the coincidence of overlapped data at the time of storing changed content, of data. SOLUTION: A system is provided with central processing units 11 and 18, main memories 12 and 17, hard disks 13 and 19, data base management system 14, communication module 15, and radio communication module 16. Then, when all time values at the time of correcting data received from a mobile terminal equipment the most recently are coincident with all time values at the time of correcting data stored in the mobile data processing system at present the most recently, the executed results received from the mobile terminal equipment are stored in the data of a mobile data base, and otherwise, an execution failure message is transmitted to the mobile terminal equipment. Thus, when a response message is received within a constant time from the mobile terminal equipment, transition to the first process is attained, and when any response message is not received within a constant time, an error message is printed on a system manager.
-
公开(公告)号:JPH10107811A
公开(公告)日:1998-04-24
申请号:JP14232597
申请日:1997-05-30
Applicant: KOREA ELECTRONICS TELECOMM , KOREA TELECOMMUN AUTHORITY
Inventor: SAN HO LEE , HYOPU-CHON KIM
Abstract: PROBLEM TO BE SOLVED: To provide a low-cost circuit by operating a negotiation violation detection circuit for virtual connection to pertinent connection for which the cell of a specified connection is inputted. SOLUTION: A cell counting means 3 receives reception, abandonment and tags in input, counts reception cells and violation cells and stores them in a first storage means 1 for storing a traffic parameter, a variable and the value of cell counting for each connection. A negotiation violation detection means 4 detects the cells exceeding a negotiated traffic rate and an input cell filtering means 5 provides a cell length error detection function and a cell slot mode. Then, an output cell filtering means 7 receives a negotiation violation result in the input, is connected to a CPU matching means 2 while receiving cell data from a second storage means 6 for storing cell data to the input, controls abandonment and tag operations as a measure for a negotiation violation and outputs the reception, the abandonment and the tag to the cell counting means 3.
-
公开(公告)号:JPH10124658A
公开(公告)日:1998-05-15
申请号:JP17062596
申请日:1996-06-10
Applicant: KOREA ELECTRONICS TELECOMM , KOREA TELECOMMUN AUTHORITY
Inventor: KIM JE HAN
Abstract: PROBLEM TO BE SOLVED: To easily and efficiently correct image distortion by finding out mapping relation among a correction point in the three-dimensional(3D) space, a correction point projected onto a two-dimensional(2D) image plane and an irradiation angle by a neural network, storing the relational values in a table and correcting image distortion by using the table. SOLUTION: The system is provided with a camera 50, an angle adjusting device 60 for plane light, a video processing computer 70 for obtaining the angular information between plane light and a reference line and executing image processing, and a monitor 80 for outputting 3D distance information as plural hardware elements. In this case, mapping relation between the actual coordinate values of an optional correction point in the 3D coordinate space and the projected point on a 2D image plane corresponding to the correction point is found by supplementing the irradiation angle θ of irradiation light to the reference line. The found mapping function is converted into the connection strength of the neural network and stored in a table. After finding the distance of video information by inversely projecting an obtained camera image, a table value corresponding to the distance is inputted to the neural network to correct image distortion.
-
-
-
-
-