摘要:
Various apparatuses, methods and systems for protecting a driver from electrostatic discharge are disclosed herein. For example, some exemplary embodiments provide a driver, including a buffer, a leakage path blocking transistor connected to an output of the buffer, and an output driver connected to an output of the leakage path blocking transistor. Current from the output driver to the buffer is substantially blocked by the leakage path blocking transistor.
摘要:
If a user loses his password or pass phrase required for a computer or communication system, he must have some way of obtaining a new one. Typically, new passwords are provided to users manually, by another human, an approach that is expensive and insecure. The invention provides an automated solution which allows recovery of secure access. The invention does this by complementary encryption of the user's pass phrase and responses to personal questions, the reference responses being encrypted with the pass phrase and the pass phrase being encrypted with the reference responses. When a user loses his pass phrase, he can provide answers to the personal questions and the system will recover both the reference responses and the pass phrase, so the account can be re-initialized by entering a new pass phrase. The invention also allows “approximate matching”, so biometric data can be used for identification.
摘要:
The present invention relates generally to computer software, and more specifically, to a method and system of making computer software resistant to tampering and reverse-engineering. “Tampering ” occurs when an attacker makes unauthorized changes to a computer software program such as overcoming password access, copy protection or timeout algorithms. Broadly speaking, the method of the invention is to increase the tamper-resistance and obscurity of computer software code by transforming the data flow of the computer software so that the observable operation is dissociated from the intent of the original software code. This way, the attacker can not understand and decode the data flow by observing the execution of the code. A number of techniques for performing the invention are given, including encoding software arguments using polynomials, prime number residues, converting variables to new sets of boolean variables, and defining variables on a new n-dimensional vector space.
摘要:
A device for epitaxially growing objects of for instance SiC by Chemical Vapor Deposition on a substrate has a first conduit (24) arranged to conduct substantially only a carrier gas to a room (18) receiving the substrate and a second conduit (25) received in the first conduit, having a smaller cross-section than the first conduit and extending in the longitudinal direction of the first conduit with a circumferential space separating it from inner walls of the first conduit. The second conduit is adapted to conduct substantially the entire flow of reactive gases and it ends as seen in the direction of the flows, and emerges into the first conduit at a distance from said room.
摘要:
The present invention discloses a method for indicating client signal fail in an optical transport network, including: adding CSF indication bits to an Optical Channel Payload Unit k (OPUk) or/and OPUk-Xv multiframe to indicate whether a client signal is failed; detecting the CSF indication bits of a PSI in the received OPUk or/and OPUk-Xv multiframe, and when the number of continuously detected CSF indications exceeds a preset threshold, indicating to perform a link protection switch. The present invention also discloses an apparatus for implementing the above method. The present invention can avoid the case of APS fail due to the too long CSF time delay; the indication method is simple and the implementation is convenient; and a plurality of CSF indications are used in the multiframe, thus the indication is more flexible.
摘要:
Attacks by computer viruses, worm programs, and other hostile software (‘malware’), have become very serious problems for computer systems connected to large communication networks such as the Internet. One potential defence against such attacks is to employ diversity—that is, making each copy of the attacked software different. However, existing diversity techniques do not offer sufficient levels of protection. The invention provides an effective diversity solution by applying tamper resistant software (TRS) encoding techniques, to the communications that take place between software components, with corresponding changes to the code handling those communications. These communications may include, for example, data passed between software routines via parameters or mutually accessible variables, light-weight messages, signals and semaphores passed between threads, and messages passed between software processes. Effective TRS encoding techniques include data-flow encoding and mass-data encoding techniques.
摘要:
A method for controlling an arc welding equipment (21) used in a welding operation and adjustable by varying at least one welding parameter value, comprising the steps of determining said at least one welding parameter while using a theoretical model (24) of the welding process associated with the welding operation, and controlling the operation of the welding equipment and the welding process associated therewith by using said at least one welding parameter for adjusting the welding equipment and a device comprising an arc welding equipment (21) used in a welding operation and adjustable by varying at least one welding parameter and an arrangement (22) for controlling the operation of the arc welding equipment, said control arrangement including a means (23) adapted to determine the value of said at least one welding parameter while using a theoretical model (24) of the welding process, and a member (25) adapted to control the operation of the welding equipment and the welding process associated therewith by using said at least one welding parameter value for adjusting the welding equipment.
摘要:
An amplifier is provided that includes an output portion that sources and sinks current associated with an output load and an amplification portion that is biased by a relatively small bias current with respect to an output current of the amplifier. The amplification portion provides an amplified output signal to the output portion. The amplifier further comprises at least one impedance component coupled between the output portion and the amplification portion to alter at least one pole associated with the amplifier to mitigate instability of the amplifier related to the relatively small bias current.
摘要:
A device for epitaxial growth of objects by Chemical Vapor Deposition on a substrate comprises a susceptor adapted to receive the substrate and members for heating walls of the susceptor surrounding the substrate and thereby the substrate and a gas mixture fed to the substrate for the growth. The device comprises also members for holding the substrate in the path of the gas mixture through the susceptor at a distance from internal walls thereof.
摘要:
Attacks by computer viruses, worm programs, and other hostile software (‘malware’), have become very serious problems for computer systems connected to large communication networks such as the Internet. One potential defence against such attacks is to employ diversity—that is, making each copy of the attacked software different. However, existing diversity techniques do not offer sufficient levels of protection. The invention provides an effective diversity solution by applying tamper resistant software (TRS) encoding techniques, to the communications that take place between software components, with corresponding changes to the code handling those communications. These communications may include, for example, data passed between software routines via parameters or mutually accessible variables, light-weight messages, signals and semaphores passed between threads, and messages passed between software processes. Effective TRS encoding techniques include data-flow encoding and mass-data encoding techniques.