Weighted random pattern testing method.
    1.
    发明公开
    Weighted random pattern testing method. 失效
    Prüfverfahrenmittels gewichteten Zufallsmustergenerators。

    公开(公告)号:EP0206287A2

    公开(公告)日:1986-12-30

    申请号:EP86108463

    申请日:1986-06-20

    Applicant: IBM

    Abstract: A method for testing very large scale integrated circuit devices, most particularly Level Sensitive Scan Design (LSSD) devices, by applying differently configured sequences of pseudo-random patterns in parallel to each of the input terminals of the device under test (DUT), collecting the output responses from each of the output terminals in parallel, combining these outputs to obtain a signature (MISR = Multiple Input Signature Register) which is a predetermined function of all of the sequences of parallel outputs and comparing the test signature with a known good signature obtained by computer simulation. … The input test stimuli are further altered in a predetermined fashion as a function of the structure of the device to be tested, to individually weight the inputs in favor of more or less binary ones or zeros.

    Abstract translation: 一种用于测试非常大规模的集成电路装置,特别是水平敏感扫描设计(LSSD)装置的方法,通过对被测设备(DUT)的每个输入端并行地应用不同配置的伪随机模式序列,收集 来自每个输出端子的输出响应并联,组合这些输出以获得作为所有并行输出序列的预定函数的签名(MISR =多输入签名寄存器),并将测试签名与已知的良好签名进行比较 通过计算机模拟获得。 ...输入测试刺激以预定方式进一步改变为待测试设备的结构的函数,以单独加权输入以有利于更多或更少的二进制或零。

    SECURE CELL PHONE FOR ATM TRANSACTIONS
    3.
    发明申请
    SECURE CELL PHONE FOR ATM TRANSACTIONS 审中-公开
    安全电话用于ATM交易

    公开(公告)号:WO2006092383A9

    公开(公告)日:2007-08-16

    申请号:PCT/EP2006060265

    申请日:2006-02-24

    CPC classification number: G07F19/20 G06Q20/1085 G06Q20/32 G06Q20/4014

    Abstract: A method, secure cell phone and system for securely accessing an automated banking machine using such secure cell phone. The secure cell phone includes a read only memory device in combination with two linear feedback shift registers for generating a unique security transaction code, which includes a cell phone identification concatenated with two pseudo random codes. The automated banking machine is called from the cell phone. One of the pseudo random codes is input into a software emulation of the cell phone circuitry running on the automated banking machine to generate a computed pseudo random code. This computed code is concatenated the input pseudo random code and a determined cell phone identification to generate a computed transaction code. The automated banking machine is securely accessed using the secure cell phone if the computed transaction code matches the unique security transaction code.

    Abstract translation: 一种使用这种安全手机安全访问自动银行机的安全手机和系统的方法。 安全手机包括与两个线性反馈移位寄存器组合的只读存储器装置,用于产生唯一的安全事务代码,其包括与两个伪随机代码连接的蜂窝电话标识符。 自动银行机从手机呼叫。 将伪随机码中的一个输入到在自动银行机上运行的蜂窝电话线路的软件仿真,以生成计算的伪随机码。 该计算的代码将输入的伪随机码和确定的蜂窝电话标识相连以生成计算的交易代码。 如果计算的交易代码与唯一的安全交易代码相匹配,则使用安全手机安全地访问自动银行机。

    METHOD AND SYSTEM FOR PROTECTING RFID TAGS ON PURCHASED GOODS
    4.
    发明申请
    METHOD AND SYSTEM FOR PROTECTING RFID TAGS ON PURCHASED GOODS 审中-公开
    用于保护购买的商品上的RFID标签的方法和系统

    公开(公告)号:WO2008043668A3

    公开(公告)日:2008-06-05

    申请号:PCT/EP2007060255

    申请日:2007-09-27

    CPC classification number: G06Q20/20 G06Q30/06

    Abstract: A method for controlling access to data contained within a radio frequency identification (RFID) tag associated with an item includes reading the RFID tag; receiving a first value from a personal communication device associated with a purchaser of the item; creating a key using the first value received from the personal communication device and a second value associated with the item; and initially transmitting the key to both the RFID tag and the personal communication device. The RFID tag is configured to automatically program one or more electrically programmable fuse devices therein so as to prevent subsequent reading of data therein by an RFID reading device, upon receipt of a valid key initially transmitted thereto. The RFID tag is further configured to automatically program one or more additional fuse devices therein so as to restore read access to the data therein, upon receipt of a valid key subsequently transmitted thereto.

    Abstract translation: 用于控制对包含在与项目相关联的射频识别(RFID)标签内的数据的访问的方法包括读取RFID标签; 从与所述项目的购买者相关联的个人通信设备接收第一值; 使用从个人通信设备接收的第一值创建密钥和与该项目相关联的第二值; 并且首先将密钥发送到RFID标签和个人通信设备两者。 RFID标签被配置为在其中自动编程一个或多个电可编程熔丝器件,以便在接收到最初传送到其上的有效键时,防止RFID读取装置随后读取数据。 RFID标签还被配置为在其中自动编程一个或多个附加保险丝装置,以便在接收到随后传送到其上的有效密钥时恢复其中的数据的读取访问。

    METHOD AND SYSTEM FOR DEFEATING THE MAN IN THE MIDDLE COMPUTER HACKING TECHNIQUE
    5.
    发明申请
    METHOD AND SYSTEM FOR DEFEATING THE MAN IN THE MIDDLE COMPUTER HACKING TECHNIQUE 审中-公开
    在中间计算机黑客技术中保护人的方法和系统

    公开(公告)号:WO2009147049A3

    公开(公告)日:2010-02-25

    申请号:PCT/EP2009056500

    申请日:2009-05-28

    CPC classification number: H04L63/0428 H04L63/083 H04L63/1466

    Abstract: A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with a client device linear feedback shift register (LFSR) with a defined cycle count; building a transaction consisting of the IPPW, defined cycle count, and userid; transmitting the transaction and form via a network towards the secure web site; wherein in response the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address.

    Abstract translation: 一种用于构建安全因特网事务的方法,所述方法包括:在客户端设备上接收用户标识(用户ID)和用户密码,以填写由安全网站生成的表单; 将用户的因特网协议(IP)地址与在用户正在认证的安全网站上维护的单独密码连接起来; 加密连接的用户IP和单独的密码以形成Internet协议密码(IPPW); 其中所述加密是利用具有定义的周期计数的客户端设备线性反馈移位寄存器(LFSR)来执行的; 构建由IPPW,定义的循环计数和userid组成的事务; 通过网络向安全网站传送交易和表单; 其中作为响应,安全网站执行以下操作:解密IPPW,并确定解密的IPPW的IP部分是否等于用户的IP地址。

    MULTIPLE USE SECURE TRANSACTION CARD
    6.
    发明申请
    MULTIPLE USE SECURE TRANSACTION CARD 审中-公开
    多用途安全交易卡

    公开(公告)号:WO2006092393A2

    公开(公告)日:2006-09-08

    申请号:PCT/EP2006060325

    申请日:2006-02-28

    Abstract: Diverse and or multiple functions are performed in a secure manner using a secure transaction card which validates a holder of the secure transaction card in accordance with a Personal Identification Number (PIN), generates, encrypts and transmits a pair of pseudo-random number sequences through a card reader to validate the card and generates, encrypts and transmits control signals or other information corresponding to a function comprising at least one of personal identity data, passport data, equipment control signals, an entry request to a secure area, medical records or access data therefor, note pad access data and secure telephone entry data in accordance with a protocol suitable for each function. One or more such functions can thus be performed in a secure manner from a single secure transaction card and selection, if needed, can be performed by a menu included in the secure transaction card.

    Abstract translation: 使用安全交易卡执行不同的或多个功能,该安全交易卡根据个人识别号码(PIN)验证安全交易卡的持有者,通过以下方式生成,加密和发送一对伪随机数序列: 用于验证所述卡并生成,加密和传输对应于包括个人身份数据,护照数据,设备控制信号,到安全区域的入境请求,医疗记录或访问中的至少一个的功能的控制信号或其他信息 数据,便笺本身访问数据和安全电话录入数据,按照适用于每个功能的协议。 因此,可以以安全的方式从单个安全交易卡执行一个或多个这样的功能,如果需要,可以通过包括在安全交易卡中的菜单执行选择。

    METHOD FOR PREVENTING MALICIOUS SOFTWARE INSTALLATION ON AN INTERNET-CONNECTED COMPUTER
    8.
    发明申请
    METHOD FOR PREVENTING MALICIOUS SOFTWARE INSTALLATION ON AN INTERNET-CONNECTED COMPUTER 审中-公开
    在互联网连接的计算机上防止恶意软件安装的方法

    公开(公告)号:WO2007090719A3

    公开(公告)日:2007-10-11

    申请号:PCT/EP2007050442

    申请日:2007-01-17

    CPC classification number: G06F21/53 G06F21/565 G06F21/566 G06F2221/2149

    Abstract: A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.

    Abstract translation: 计算机随机存取存储器分为第一和第二分区。 每个分区都有自己的操作系统(OS)。 第一个分区具有传统的操作系统,并被指定用于非互联网使用。 第二个分区被指定用于安全的Internet访问,并且具有专用于Internet使用的操作系统。 第二个分区中的软件不能写入或复制第二个分区中的文件。 第二个分区的大小是固定不变的,而第二个分区是打开的。 第二个分区中的每个软件应用程序都分配了一个无法更改的内存区域,从而防止内存溢出攻击。 安全内存被指定用于临时存储第二个分区中使用的软件。 计算安全存储器中所有文件的循环冗余校验(CRC)值。 要检测未经授权的文件更改,将计算第二个分区中使用的所有文件的CRC值,并根据存储在安全存储器中的值进行检查。 第二分区可以使用诸如密码保护之类的安全装置或独立于第一分区的下载存储器仅写入安全存储器以允许通过在存储之前从第一分区扫描和测试来检查存储在下载存储器中的文件 电脑中的其他地方。

    SECURE CELL PHONE FOR ATM TRANSACTIONS
    9.
    发明申请
    SECURE CELL PHONE FOR ATM TRANSACTIONS 审中-公开
    安全电话用于ATM交易

    公开(公告)号:WO2006092383A3

    公开(公告)日:2006-12-14

    申请号:PCT/EP2006060265

    申请日:2006-02-24

    CPC classification number: G07F19/20 G06Q20/1085 G06Q20/32 G06Q20/4014

    Abstract: A method, secure cell phone and system for securely accessing an automated banking machine using such secure cell phone. The secure cell phone includes a read only memory device in combination with two linear feedback shift registers for generating a unique security transaction code, which includes a cell phone identification concatenated with two pseudo random codes. The automated banking machine is called from the cell phone. One of the pseudo random codes is input into a software emulation of the cell phone circuitry running on the automated banking machine to generate a computed pseudo random code. This computed code is concatenated the input pseudo random code and a determined cell phone identification to generate a computed transaction code. The automated banking machine is securely accessed using the secure cell phone if the computed transaction code matches the unique security transaction code.

    Abstract translation: 一种使用这种安全手机安全访问自动银行机的安全手机和系统的方法。 安全手机包括与两个线性反馈移位寄存器组合的只读存储器装置,用于产生唯一的安全事务代码,其包括与两个伪随机代码连接的蜂窝电话标识符。 自动银行机从手机呼叫。 将伪随机码中的一个输入到在自动银行机上运行的蜂窝电话线路的软件仿真,以生成计算的伪随机码。 该计算的代码将输入的伪随机码和确定的蜂窝电话标识相连以生成计算的交易代码。 如果计算的交易代码与唯一的安全交易代码相匹配,则使用安全手机安全地访问自动银行机。

    SECURE CREDIT CARD EMPLOYING PSEUDO-RANDOM BIT SEQUENCES FOR AUTHENTICATION
    10.
    发明申请
    SECURE CREDIT CARD EMPLOYING PSEUDO-RANDOM BIT SEQUENCES FOR AUTHENTICATION 审中-公开
    使用PSEUDO随机比特序列进行认证的安全信用卡

    公开(公告)号:WO2005101332A8

    公开(公告)日:2006-08-17

    申请号:PCT/EP2005051535

    申请日:2005-04-07

    Abstract: A secure credit card has a pair of linear feedback shift registers (LFSRs) for generating a pair of random numbers. The LFSRs each have a unique initial state and feedback tap configuration. Hence, they each produce a unique sequence of numbers. When a financial transaction occurs, the LFSRs are operated for a random number of clock cycles, to create a pair of matched random numbers. Each card issued has unique LFSR settings, and so will produce characteristic random numbers. At a financial institution, the LFSR settings are known, so the financial institution can determine by calculation if the pair of random numbers is authentic. There are many variations, including a credit card with a secret security code for activation, and 2-way "handshake" com­munication with the financial institution. Also, one of the LFSRs may be replaced with a binary, or similar counter.

    Abstract translation: 一个安全的信用卡有一对用于产生一对随机数的线性反馈移位寄存器(LFSR)。 LFSR每个都具有唯一的初始状态和反馈抽头配置。 因此,它们各自产生唯一的数字序列。 当金融交易发生时,LFSR以随机数的时钟周期运行,以创建一对匹配的随机数。 发行的每个卡都具有独特的LFSR设置,因此会产生特征随机数。 在金融机构,LFSR设置是已知的,所以金融机构可以通过计算确定一对随机数是否可信。 有许多变化,包括具有激活的秘密安全码的信用卡和与金融机构的双向“握手”通信。 此外,其中一个LFSR可以被替换为二进制或类似的计数器。

Patent Agency Ranking