Abstract:
PROBLEM TO BE SOLVED: To provide a high-speed carry skip adder of two or more stages. SOLUTION: Plural ripple adders are provided, at least a part of the ripple adders among the plural ripple adders are grouped and carry signals are transmitted to a certain group or the group of a one higher order. Then, this adder is provided with a circuit for calculating C=C2+F.C1 by using the carry signals C1 from the certain group to the group of the one higher order, signals F for indicating whether or not the output of a full adder within the group of the one higher order is present as 1 and the carry signals C2 relating to the ripple adder of a highest order within the group of the one higher order.
Abstract:
PROBLEM TO BE SOLVED: To non-specifically execute the exposure/non-exposure mode of a secret key by outputting a presumable bit string, in response to the input of an initial bit string and performing the switching between the enciphering processing and the output processing of input bit strings, when the output of a prescribed trap bit string is detected. SOLUTION: When an initial bit string is loaded into an LFSR(linear feedback shift register) 1, a trap decoder 3 starts its operation to monitor the bit of the LFSR 1. When a trap bit string is detected, the decoder 3 outputs a switch signal and a toggle switch 5 inverts its own output. Then the output of the LFSR 1 continuously serves as the input of an exclusive OR circuit 19, until the decoder 3 outputs a switch signal. At the same time, the output of a shift register 11a undergoes the exclusive OR processing (enciphering processing) by means of a pseudo-random number, i.e., the output of the LFSR 1. Meanwhile, the output of the register 11a is used as it is, when the decoder 3 outputs a switch signal.
Abstract:
PURPOSE:To write and read data fast through simple constitution. CONSTITUTION:This disk storage device is equipped with two data buses 100 and 200 for data transfer and an HDD 0 and an HDD 1 are connected fixedly to the data buses 100 and 200, respectively, and an MCU 32 outputs a specific signal to a DPC 10 according to a command from a host, and then multiplexers 20 and 22 connect the HDD 2 and HDD 3 to either of the data buses 100 and 200. Thus, the HDD 2 and HDD 3 are connected to one of the data buses 100 and 200 and data are written on and read out of HDDs 0-3.
Abstract:
PROBLEM TO BE SOLVED: To distinguish between an attack with unauthorized access and a change of behavior resulted from an authorized software update to information processing units.SOLUTION: An inspection apparatus is used for inspecting an information processing unit to which software updates are applied. The inspection apparatus includes a collection component configured to collect behavior, for each of a plurality of software updates, of the information processing unit to which one software update is applied. The apparatus also includes a determination component configured to compare the behaviors collected for each of the plurality of software updates to one another to determine whether the behavior of the information processing unit after the one software update is applied thereto is normal.
Abstract:
PROBLEM TO BE SOLVED: To more efficiently control access to secret information. SOLUTION: The system stores an expected value for each hash value of a plurality of components included in the system. Further, the system stores the expected value of certification information which serves as a condition for allowing access to secret information, by associating it with the secret information. The system has a register for storing the certification information for certifying completeness of the plurality of components. First, the system stores a value calculated by inputting each expected value further into a hash function as the certification information before the plurality of components are started. Then, the hash value of a newly started component is calculated, and with the condition that the calculated hash value is different from the expected value, the certification information of the register is updated. Then access to the secret information is allowed with the condition that the expected value of the certification information and the certification information of the register match. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide techniques that allow indicating that a platform is reliable, without providing an attacker with information for attacks. SOLUTION: A device for measuring the configuration of a platform includes a configuration register; a means for performing a predetermined operation on the content of the configuration register using given additional values, then applying predetermined hash functions to values obtained from the operation to obtain hash values, and using the hash values as the new content of the configuration register; and measurement expansion means (step S1-S4) for making predetermined measurements on predetermined component elements that constitute the platform to obtain measurements that correspond to the component elements, and for implementing an expansion process using an expansion process means while using the measurements as additional values. The device is provided with a random expansion means (step S5) for implementing an expansion process using the expansion process means while using random values as additional values. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide protection against unauthorized access.SOLUTION: A system comprises: a detection unit configured to detect unauthorized access to an information processing apparatus; and a control unit configured to shift modes of the information processing apparatus. A computer executes a first virtual machine and a second virtual machine. When the system is operating normally, the control unit causes the information processing apparatus implemented by the first virtual machine to operate in a normal mode, and causes the information processing apparatus implemented by the second virtual machine to operate in a standby mode. If the unauthorized access is detected, the control unit shifts the information processing apparatus implemented by the first virtual machine into a decoy mode, and shifts the information processing apparatus implemented by the second virtual machine into the normal mode.
Abstract:
PROBLEM TO BE SOLVED: To shorten restoration time when a failure is generated in a plurality of memories or the like having multiplex configuration/redundant configuration and to simplify also functions of an IO controller. SOLUTION: There is provided a connection system from a host or the like to a plurality of storage devices by optical link, in more details, concerned with an optical connection system or an optical wiring system for achieving multiplication/redundancy by using the branching of the optical link and one-way directivity of the branching. When optically connecting the host or the like to a plurality of storage devices such as memories via two or more optical couplers, a loop is formed between the two optical couplers by using the branching of the optical couplers and one-way directivity of the branching. According to the loop configuration, a configuration for allowing an IO controller to select a plurality of operation modes is adopted. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a security system, an information processing system, a control method of the security system, a control method of the information processing system, a program capable of implementation in system for performing the control method, and a ticket system. SOLUTION: The security system 12 includes: a non-volatile type storing unit 22 for storing correctness inspection unit including a counter, which is renewed every time a signature function means 30 is called; a non-volatile type storing unit 24 for reading a counter array from an outer non-volatile storing unit for storing the counter array, in which a hash value generated for each signature key and a number-of-signature counter for counting the number of signature formed with the signature key are arranged in pairs, and storing the counter array; and a hash function unit 28 for reading the counter array from the non-volatile storing unit 24, generating a hash value, and feeding the hash value to the correctness inspection unit for correctness checking. COPYRIGHT: (C)2005,JPO&NCIPI