METHODS AND APPARATUS FOR OPERATING EMBEDDED INFORMATION TECHNOLOGY APPLICATIONS WITH A SERVICE OPERATING SYSTEM
    111.
    发明申请
    METHODS AND APPARATUS FOR OPERATING EMBEDDED INFORMATION TECHNOLOGY APPLICATIONS WITH A SERVICE OPERATING SYSTEM 审中-公开
    使用服务操作系统操作嵌入式信息技术应用的方法和装置

    公开(公告)号:US20090172768A1

    公开(公告)日:2009-07-02

    申请号:US11966290

    申请日:2007-12-28

    IPC分类号: G06F21/00 G06F9/445

    CPC分类号: G06F11/008

    摘要: A method includes setting a rule policy with an embedded information technology application. The method further includes parsing the policy rule from a policy engine to a context engine. The method further includes determining a computing device condition with the context engine based upon the parsed policy rule. The method further includes notifying the policy engine with the context engine if the computing device condition has changed from a first condition to a second condition. The method further includes, in response to the computing device condition changing from the first condition to the second condition, executing an action according to the parsed policy rule. An associated system and machine readable medium are also disclosed.

    摘要翻译: 一种方法包括使用嵌入式信息技术应用程序设置规则策略。 该方法还包括将策略规则从策略引擎解析为上下文引擎。 该方法还包括基于解析的策略规则来确定具有上下文引擎的计算设备状况。 该方法还包括如果计算设备条件已经从第一条件改变到第二条件,则通过上下文引擎通知策略引擎。 该方法还包括响应于计算设备条件从第一条件改变到第二条件,根据解析的策略规则执行动作。 还公开了一种相关联的系统和机器可读介质。

    Fully scalable encryption for scalable multimedia
    112.
    发明授权
    Fully scalable encryption for scalable multimedia 有权
    用于可扩展多媒体的完全可扩展的加密

    公开(公告)号:US07406176B2

    公开(公告)日:2008-07-29

    申请号:US10405970

    申请日:2003-04-01

    IPC分类号: H04N7/167

    摘要: Subject matter includes exemplary systems and related methods for fully scalable encryption of scalable multimedia. A scalable bitstream encrypted using the subject matter maintains full functionality of scalable features in the encrypted form. The exemplary scalable encryption allows transcoding, rate shaping, and other operations directly on the ciphertext without degradation of scalable compression efficiency and error resiliency.

    摘要翻译: 主题包括用于可扩展多媒体的完全可扩展加密的示例性系统和相关方法。 使用主题加密的可扩展比特率保持加密形式的可扩展特征的完整功能。 示例性的可扩展加密允许直接在密文上进行代码转换,速率整形和其他操作,而不降低可伸缩的压缩效率和错误弹性。

    Scalable, error resilient DRM for scalable media
    113.
    发明授权
    Scalable, error resilient DRM for scalable media 有权
    可伸缩的,具有弹性的DRM可扩展媒体

    公开(公告)号:US07313814B2

    公开(公告)日:2007-12-25

    申请号:US10405973

    申请日:2003-04-01

    摘要: An exemplary digital rights management engine and related methods divides multimedia content into service level layers, encrypts at least some of the layers, and offers access to the encrypted layers by permission. The multimedia content may be layered using multiple different layering approaches simultaneously, and access to the different types of layers may be offered simultaneously. One of the layers may be left unencrypted to allow free browsing of a low quality service level. An exemplary system of key management for digital rights management is also disclosed.

    摘要翻译: 示例性数字版权管理引擎和相关方法将多媒体内容划分为服务级别层,至少对某些层进行加密,并且通过许可提供对加密层的访问。 多媒体内容可以使用多个不同的分层方法同时分层,并且可以同时提供对不同类型的层的访问。 其中一层可能未加密,以允许免费浏览低质量的服务级别。 还公开了一种用于数字版权管理的示例性密钥管理系统。

    Elliptic curve point multiplication
    114.
    发明申请
    Elliptic curve point multiplication 有权
    椭圆曲线点乘法

    公开(公告)号:US20070064931A1

    公开(公告)日:2007-03-22

    申请号:US11173251

    申请日:2005-07-01

    IPC分类号: H04L9/30

    摘要: Systems and methods configured for recoding an odd integer and elliptic curve point multiplication are disclosed, having general utility and also specific application to elliptic curve point multiplication and cryptosystems. In one implementation, the recoding is performed by converting an odd integer k into a binary representation. The binary representation could be, for example, coefficients for powers of two representing the odd integer. The binary representation is then configured as comb bit-columns, wherein every bit-column is a signed odd integer. Another implementation applies this recoding method and discloses a variation of comb methods that computes elliptic curve point multiplication more efficiently and with less saved points than known comb methods. The disclosed point multiplication methods are then modified to be Simple Power Analysis (SPA)-resistant.

    摘要翻译: 公开了用于重新编码奇整数和椭圆曲线点乘法的系统和方法,其具有一般实用性,并且还具体应用于椭圆曲线点乘法和密码系统。 在一个实现中,通过将奇数整数k转换成二进制表示来执行重新编码。 二进制表示可以是例如表示奇整数的两个幂的系数。 然后将二进制表示配置为梳状位列,其中每个位列是带符号的奇整数。 另一种实现方式应用这种重新编码方法,并且公开了一种梳理方法的变体,它们比已知的梳理方法更有效地计算椭圆曲线点乘积并且具有较少的保存点。 然后将所公开的点乘法方法修改为抗电阻简单功率分析(SPA)。

    Locally interative encryption generating compliant ciphertext for general syntax specifications
    115.
    发明申请
    Locally interative encryption generating compliant ciphertext for general syntax specifications 有权
    本地迭代加密生成符合一般语法规范的密文

    公开(公告)号:US20060227965A1

    公开(公告)日:2006-10-12

    申请号:US11095048

    申请日:2005-03-31

    IPC分类号: H04K1/06

    摘要: A fast and secure syntax compliant encryption schema, “locally iterative encryption,” can produce compliant ciphertext for a general syntax specification. In one implementation, an engine partitions a data stream into blocks, and encrypts each block iteratively until syntax compliance conditions are met. A system using the schema can utilize either stream ciphers or block ciphers in different modes. Locally iterative encryption methods are fast and remain at approximately the same speed even as the length of the data stream to be encrypted increases. Besides providing superior processing speed, the locally iterative encryption schema is also more robust to errors in the resulting ciphertext and in the resulting decrypted plaintext than conventional syntax compliant encryption techniques. Locally iterative encryption is secure as long as an underlying encryption cipher selected for use in the schema is secure.

    摘要翻译: 快速和安全的语法兼容加密模式“本地迭代加密”可以为通用语法规范提供符合规定的密文。 在一个实现中,引擎将数据流分割成块,并且迭代地对每个块进行加密,直到满足语法符合条件。 使用该模式的系统可以利用不同模式的流密码或块密码。 即使要加密的数据流的长度增加,本地迭代加密方法也是快速且保持大致相同的速度。 除了提供优越的处理速度之外,本地迭代加密模式对于所生成的密文中的错误以及生成的解密明文也比传统的符合法规的加密技术更加鲁棒。 只要选择用于模式的底层加密密码是安全的,本地迭代加密就是安全的。

    Fuel cell
    116.
    发明授权
    Fuel cell 失效
    燃料电池

    公开(公告)号:US06991867B1

    公开(公告)日:2006-01-31

    申请号:US09719234

    申请日:1999-06-11

    申请人: Bin Zhu

    发明人: Bin Zhu

    摘要: A fuel cell for production of electrical energy, such as a fuel cell, comprising a fuel chamber (1), an anode (2a), a cathode (2b), an electrolyte (3) disposed between said anode and said cathode, an oxidant chamber (4), wherein said chambers (1 and 4) enclose said anode, cathode and electrolyte, wherein a fuel flowing from the fuel chamber is oxidized at the anode, thereby producing electrical energy, wherein said electrolyte (3) is a ceramic composite electrolyte comprising at least one salt and at least one oxide in mixture.

    摘要翻译: 一种用于生产电能的燃料电池,例如燃料电池,包括燃料室(1),阳极(2a),阴极(2b),设置在所述阳极和所述阴极之间的电解质(3) 氧化剂室(4),其中所述室(1和4)包围所述阳极,阴极和电解质,其中从所述燃料室流出的燃料在所述阳极处被氧化,从而产生电能,其中所述电解质(3)为 包含至少一种盐和至少一种混合物的氧化物的陶瓷复合电解质。

    Scalable layered access control for multimedia
    117.
    发明申请
    Scalable layered access control for multimedia 有权
    可扩展分层访问控制多媒体

    公开(公告)号:US20050276416A1

    公开(公告)日:2005-12-15

    申请号:US10869280

    申请日:2004-06-15

    IPC分类号: H04N7/167

    摘要: A flexible framework for generating “scalable layered access” codestreams allows a bitstream architect to select the number of access types and the number of access layers within each access type. At least some of the access layers are encrypted (or scrambled). Some of the access layers may be left unencrypted or unscrambled to allow free access to those layers. The framework facilitates simultaneous access of multimedia content by different users enjoying selective decryption of different access types and different access layers. An exemplary key schema for the framework sends only one or only a few keys to an end user for a given access layer, from which decryption keys for the content can be derived by hashing and then combining under a Group Diffie-Hellman key agreement. In one implementation, only one key is sent in a license to an end user and other partial key information for Group Diffie-Hellman combination with the licensed key is included in the publicly distributed codestream.

    摘要翻译: 用于生成“可分级分层访问”码流的灵活框架允许比特流架构师选择每种访问类型中的访问类型的数量和访问层数。 至少一些接入层被加密(或加扰)。 一些访问层可以保持未加密或解扰,以允许对这些层的自由访问。 该框架便于不同用户同时访问多媒体内容,享受不同接入类型和不同接入层的选择性解密。 用于框架的示例性关键模式仅向给定访问层的最终用户发送一个或仅几个密钥,通过散列然后根据Group Diffie-Hellman密钥协议来组合内容的解密密钥。 在一个实现中,只有一个密钥在许可证中发送给最终用户,并且用于具有许可密钥的组Diffie-Hellman组合的其他部分密钥信息被包括在公开分发的码流中。

    Multimedia data embedding
    118.
    发明授权
    Multimedia data embedding 有权
    多媒体数据嵌入

    公开(公告)号:US06442283B1

    公开(公告)日:2002-08-27

    申请号:US09228224

    申请日:1999-01-11

    IPC分类号: G06K900

    摘要: Multimedia data embedding, such as video, image or audio data watermarking. In one embodiment, a computer-implemented method first receives a vector x of N data samples, where X=[x(0)x(1) . . . x(N−1)] and represents multimedia. Next, the method receives a vector p, where P=[p(0)p(1) . . . p(N−1)] and represents a pseudo-random sequence. Finally, the method generates a new vector x′ in which the vector p is embedded in the vector x, such that x′=[x′(0)x′(1) . . . x′(N−1)] and x′=x+aq, where a comprises a perception-based scaling factor and the vector q comprises a perceptually weighted pseudo-random sequence based on the vector p.

    摘要翻译: 多媒体数据嵌入,如视频,图像或音频数据水印。 在一个实施例中,计算机实现的方法首先接收N个数据样本的向量x,其中X = [x(0)x(1))。 。 。 x(N-1)]并表示多媒体。 接下来,该方法接收向量p,其中P = [p(0)p(1))。 。 。 p(N-1)]并且表示伪随机序列。 最后,该方法生成一个向量x',其中向量x嵌入到向量x中,使得x'= [x'(0)x'(1))。 。 。 x'(N-1)]和x'= x + aq,其中a包括基于感知的缩放因子,并且向量q包括基于向量p的感知加权的伪随机序列。

    Digital watermarking to resolve multiple claims of ownership
    119.
    发明授权
    Digital watermarking to resolve multiple claims of ownership 失效
    数字水印以解决多个所有权要求

    公开(公告)号:US06272634B1

    公开(公告)日:2001-08-07

    申请号:US08918126

    申请日:1997-08-27

    IPC分类号: H04L900

    摘要: A method and apparatus for digital watermarking to resolve multiple claims of ownership is disclosed. According to one embodiment of the invention, a first watermark requiring the host data for detection is embedded into the host data. A second watermark is also embedded into the host data. According to another embodiment of the invention, a pseudo-random sequence acting as a watermark is generated based on two random keys. One of the two random keys is related to the author of the host data into which the watermark is to be embedded, whereas the other of the two random keys is dependent on the host data itself.

    摘要翻译: 公开了用于解决多个所有权要求的数字水印的方法和装置。 根据本发明的一个实施例,将要检测的主机数据的第一水印嵌入到主机数据中。 第二个水印也嵌入到主机数据中。 根据本发明的另一实施例,基于两个随机密钥生成充当水印的伪随机序列。 两个随机密钥之一与要嵌入水印的主机数据的作者相关,而两个随机密钥中的另一个依赖于主机数据本身。