摘要:
Simultaneously detecting both frame and bit synchronization in a serial bit stream reduces the time required to have a receiver lock up to a transmitted serial data signal. A dual-phase correlator circuit is used to detect frame synchronization while a multiphase commutator circuit detects bit clock synchronization.
摘要:
A self checking electronically erasable programmable array logic (EEPAL) that comprises an input receiver, a programmable array, an error detection code storage array, an error detection circuitry, and error signalling circuitry is disclosed. The self checking EEPAL verifies the storage integrity of each cell within the programmable array during the programming of the EEPAL, after completion of programming the EEPAL, and prior to executing the algorithm stored in the EEPAL.
摘要:
A vehicle authenticates a first prospective component by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key unique to the first prospective component and determining whether the first prospective component is the authentic component based on whether the cryptographic key is successfully utilized in cryptographic communication with the first prospective component. The vehicle authenticates a component class of a second prospective component by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key unique to the component class and determining whether the second prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication with the second prospective component.
摘要:
Blind access (100, 300, 400) to a desired encryption key of a predetermined first group member is provided to a second group. The first group encrypts a plurality of first group member encryption keys using a predetermined algorithm and transfers to the second group, the encrypted plurality of first group member encryption keys with corresponding unencrypted first group member identification fields, IDs, and a list of IDs corresponding to the first group members. The desired ID-free encryption key is selected and encrypted by the second group using a predetermined algorithm. The doubly encrypted key is transferred to the first group, decrypted by the first group and transferred to the second group for decryption. Thus, the encryption key is provided without knowledge to the first group of which member's encryption key is being examined and with knowledge to the second group of only the desired encryption key.
摘要:
A cryptographic apparatus for encrypting and decrypting digital words includes a mechanism that permits a cipher algorithm to be electronically stored after the manufacture of the apparatus. The storing mechanism includes at least one electrically erasable, programmable gate array containing a portion of the cipher algorithm and at least one random access memory device coupled to the array for storing digital data generated by the algorithm. A mechanism which is coupled to the gate array and memory device controls the execution of the algorithm for each digital word thereby decrypting encrypted digital words and encrypting non-encrypted digital words.
摘要:
The identity of a user of a mobile device is verified by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing a feature of the current route to characteristic features of previous routes stored on the mobile device. The user is verified if the feature of the current route matches a characteristic feature of previous routes. The previous routes may be obtained by tracking the location of the mobile device over time to obtain a number of routes, identifying characteristic features of the routes, and storing the characteristic features of the routes.
摘要:
Methods for accessing private and public data via a public terminal are disclosed. With respect to accessing private content, a method for authenticating the identity of a user of the public terminal is disclosed. Unique identifiers are transmitted in a pre-defined area adjacent or nearby the public terminal and are monitored by a receiver. This information is utilized to electronically compile and update in real-time a list of identifiers that have recently been monitored by the receiver, and the list of identifiers is used to electronically create and update in real-time a temporary database including identity verification data corresponding only for identifiers in the list of identifiers. Identity verification data input into the public terminal by the user is compared with the set of identity verification data contained in the temporary database to determine whether or not there is a match of identity verification data. Access to private content via the public terminal is granted to the user if a match is found during the comparison. A method for displaying public data and a system by which these methods can be implemented are also disclosed.
摘要:
The identity of a user of a mobile device is verified by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing a feature of the current route to characteristic features of previous routes stored on the mobile device. The user is verified if the feature of the current route matches a characteristic feature of previous routes. The previous routes may be obtained by tracking the location of the mobile device over time to obtain a number of routes, identifying characteristic features of the routes, and storing the characteristic features of the routes.
摘要:
A method and apparatus for authentication between a subscriber unit and a communication unit is provided. The authentication process includes: maintaining an historic non-arbitrary value in the subscriber unit, generating an authentication message in the subscriber unit as a function of at least part of the historic non-arbitrary value, and transmitting the authentication message to the communication unit. In addition, the authentication process includes: receiving an authentication message at a communication unit, maintaining an historic non-arbitrary value in the communication unit, and determining, in the communication unit, through the use of the received authentication message and the maintained historic non-arbitrary value, whether a received service request is authentic. In another embodiment, the authentication process includes: providing the subscriber unit with at least part of a plurality of dialed digits which uniquely identify a target communication unit, generating an authentication message in the subscriber unit as a function of the at least part of the plurality of dialed digits, and transmitting the authentication message and the at least part of the plurality of dialed digits from the subscriber unit to the communication unit. In addition the other embodiment authentication process includes: receiving an authentication message and at least part of a plurality of dialed digits which uniquely identifies a target communication unit, the authentication message being derived from the received dialed digits, and determining in the communication unit, through the use of the received authentication message and the received dialed digits, whether a received service request is authentic.
摘要:
There is provided a mechanism for error detection comprising: detecting the symmetry of error distributions over adjacent time intervals and muting of a radiotelephone in response to detected loss of substantial symmetry, unless errors are attributable to valid alternative detections. It is further characterized by: detecting the symmetry of error distributions over adjacent time intervals and muting a radiotelephone as a corrective response to detected consequential asymmetry or loss of substantial symmetry (unless errors are attributable to alternative detections of valid synchronization words) and cancelling any such corrective response upon subsequent alternative detections of valid synchronization words.