-
公开(公告)号:JP2002312190A
公开(公告)日:2002-10-25
申请号:JP2002042057
申请日:2002-02-19
Applicant: IBM
Inventor: HOFSTEE HARM P , NAIR RAVI
Abstract: PROBLEM TO BE SOLVED: To provide a multiprocessing system, operating in a high reliability mode to detect computational errors. SOLUTION: This multiprocessing system includes a first processor, a second processor, and a compare logic. The first processor is operable to compute first results responsive to instructions, the second processor is operable to compute second results responsive to the instructions, and the compare logic is operable to check at check points for matching of the results. Each of the processors has a first register for storing one of the processor's results, and the register has a stack of shadow registers. The processor is operable to shift a current one of the processor's results from the first register into the top shadow register, so that an earlier one of the processor's results can be restored from one of the shadow registers to the first register, responsive to the compare logic determining that the first and second results mismatch.
-
公开(公告)号:DE112012004873T5
公开(公告)日:2014-08-21
申请号:DE112012004873
申请日:2012-11-12
Applicant: IBM
Inventor: AGARWAL KANAK B , JAMSEK DAMIR A , HOFSTEE HARM P , MARTIN ANDREW K
IPC: H03M7/40
Abstract: Es werden Mechanismen bereitgestellt zum Entschlüsseln eines mit variabler Länge verschlüsselten Datenstroms. Eine Entschlüsselungseinheit eines Datenverarbeitungssystems empfängt eine Daten-Eingabezeile. Die Daten-Eingabezeile ist ein Abschnitt des mit variabler Länge verschlüsselten Datenstroms. Die Entschlüsselungseinheit ermittelt eine Bit-Überlaufmenge der Daten-Eingabezeile auf eine nächste Daten-Eingabezeile; Die Entschlüsselungseinheit richtet die nächste Daten-Eingabezeile aus, sodass sie auf der Grundlage der ermittelten Bit-Überlaufmenge an einer Grenze eines verschlüsselten Symbols beginnt. Die Entschlüsselungseinheit zerlegt die Daten-Eingabezeile in Token, um einen Satz von Token zu erzeugen. Jedes Token entspricht einem verschlüsselten Symbol in der ausgerichteten nächsten Daten-Eingabezeile. Die Entschlüsselungseinheit erzeugt ein Daten-Ausgabewort auf der Grundlage des Satzes von Token. Das Daten-Ausgabewort entspricht einem Datenwort in dem ursprünglichen Satz von Daten.
-
公开(公告)号:GB2512762A
公开(公告)日:2014-10-08
申请号:GB201409981
申请日:2012-11-12
Applicant: IBM
Inventor: AGARWAL KANAK B , HOFSTEE HARM P , JAMSEK DAMIR A , MARTIN ANDREW K
IPC: H03M7/40
Abstract: Mechanisms are provided for decoding a variable length encoded data stream. A decoder of a data processing system receives an input line of data. The input line of data is a portion of the variable length encoded data stream. The decoder determines an amount of bit spill over of the input line of data onto a next input line of data. The decoder aligns the input line of data to begin at a symbol boundary based on the determined amount of bit spill over. The decoder tokenizes the aligned input line of data to generate a set of tokens. Each token corresponds to an encoded symbol in the aligned next input line of data. The decoder generates an output word of data based on the set of tokens. The output word of data corresponds to a word of data in the original set of data.
-
公开(公告)号:AU2003282981A1
公开(公告)日:2005-01-28
申请号:AU2003282981
申请日:2003-10-20
Applicant: IBM
Inventor: HOFSTEE HARM P , BROKENSHIRE DANIEL A , PEYRAVIAN MOHAMMAD , CRAFT DAVID J
Abstract: A method and system for encrypting and verifying the integrity of a message using a three-phase encryption process is provided. A source having a secret master key that is shared with a target receives the message and generates a random number. The source then generates: a first set of intermediate values from the message and the random number; a second set of intermediate values from the first set of values; and a cipher text from the second set of values. At the three phases, the values are generated using the encryption function of a block cipher encryption/decryption algorithm. The random number and the cipher text are transmitted to the target, which decrypts the cipher text by reversing the encryption process. The target verifies the integrity of the message by comparing the received random number with the random number extracted from the decrypted cipher text.
-
-
-