摘要:
A picture display device comprising a cathode ray tube (1) with an elongated display screen (8) and a deflection system (9) is described. The deflection power is reduced by two means. The deflection system (9) is arranged to scan the lines in the direction of the short axis (22) of the display screen (8), and the cone portion (3) of the cathode ray tube (1) has an elongated cross-section (54) whose aspect ratio is larger than or equal to the aspect ratio of the display screen (8), thereby enabling the deflection system (9), and in particular the line deflection subsystem (12), to be positioned closer to the electron beam envelope (51), which reduces magnetic losses.
摘要:
The invention relates the executing of computer readable instructions on a hardware platform (301) comprising a reconfigurable hardware component (311), such as a field-programmable gate array (FPGA). The reconfigurable hardware component is reconfigured in accordance with a reconfiguration set, and a first application is executed at least partly on the reconfigured hardware component, thereby generating an output. The invention provides a way of obfuscating and tamper-proofing software to be executed on a hardware platform.
摘要:
The invention relates to an information carrier containing a non-clonable optical identifier (2) having an optical scattering medium (3) for being challenged by a light beam (5) and for scattering said light beam (5). In order to provide a secure information carrier (1), it is proposed that it further comprises a light absorbing means (3, 4) for reducing the intensity of said light beam (5) so that an integration time for obtaining a response signal by integrating the scattered light beam (8) is extended.
摘要:
An optical arrangement of at least a coherent light source (1), a strongly scattering object (5) (the PUF), and a pixe-lated photo-detector (6), wherein the pixels are comparable in size with the bright and dark patches of the speckle pattern produced by coherent radiation traversing the scattering object (5). Quantitively, the pixel size should be roughly λ/NA, where λ is the wave-length, and (i) NA=a/z for free-space geometry, with a being the beam radius and z being the distance between the exit surface of the PUF (5) and the pixelated detector (6), or (ii) NA is the numerical aperture of a lens (7) in an imaging geometry. In a preferred embodiment of the invention, there are tentative requirements that the pixels should be at least smaller than ηmaxλNA and preferably larger than ηmaxλ/NA, where (in an exemplary embodiment) ηmax=5 and ηmin=0.05, say. It will be understood by a person skilled in the art that the present invention is concerned with the optical arrangement of the PUF (5) and the photo-detector (6), rather than the photo -detector (6) per se.
摘要:
The present invention relates to a content protection method and system as well as to a reproduction method and device providing copy protection of electronic content. In order to provide protection against illicit copying by consumers as well as by authoring and formatting facilities content-dependent encryption of the content is proposed. In an encryption step the content (C0) is encrypted using an application key (AK) and/or a disc key (DK). Further, a content-dependent content mark (AK′, H, MAC) is generated using said content (C0), which content mark is to be evaluated during decryption of said encrypted content (C2).
摘要:
A transponder (1) comprises at least one memory (MEM1, MEM2) for storing encrypted information (E_k(EPC, PI)) that has been encrypted by use of a key (k) and for storing the key (k) associated with the encrypted information (E_k(EPC, PI)). The transponder (1) is adapted to send the key (k) slower response than the encrypted information (E_k(EPC, PI)) in response to queries of a reading device (2), which is preferably done by delaying the transmission of the key (k) or by limiting the response rate at which the key (k) is transmitted. In particular the invention is related to RFID systems.
摘要:
A physical uncloneable function (PUF) pattern is used for verifying a physical condition of an item. The PUF pattern is arranged to be damaged in the event that said item is exposed to a predetermined environmental condition. Verification of the physical condition of the item, is carried out by obtaining a measured response from the PUF pattern, and comparing the measured response with a stored response in respect of the PUF.
摘要:
The present invention relates to a method for communicating from a primary station to a plurality of secondary station, comprising the step of at the primary station allocating a resource to the secondary stations over the time on the basis of a hash function, wherein the hash function is such that the probability that two secondary stations are allocated common resources in two sub frames substantially equals the product of the probability that the two secondary stations are allocated a common resource in the first subframe and the probability that the two secondary stations are allocated a common resource in the second subframe.
摘要:
A system 100 for increasing data security comprises predetermined system data 104 to be protected. A cryptographic unit 108 is used for cryptographic processing of respective blocks of the content data in dependence on respective keys. A key provider 106 determines the respective key used for the processing of a respective block of the content data in dependence on a respective portion 112 of the predetermined system data 104, the portion not including all the predetermined system data, wherein different respective portions of the predetermined system data are selected for the respective blocks of content data. A server system 200 for increasing data security comprises an output 202 for providing processed content data 110 to a client system 100, the client system comprising predetermined system data 104 to be protected. The server system 200 also comprises a cryptographic unit 208 and a key provider 206.
摘要:
The present invention relates to a method and a device (11) using a physical token (14), which provides measurable parameters, to derive at least one data set. A plurality of values of one or more of the parameters are measured. From these measured values, a measure of variance is calculated. Quantization intervals into which a measured value is to be quantized are then determined. A possible value of a data set, which subsequently can be derived from a measured value provided by the physical token, is associated with each quantization interval. Further, information which subsequently enables determination of these quantization intervals is stored. Hence, an enrolling phase has been completed. When the preparing phase has been completed, a deriving phase may commence. When a data set is to be derived, for example to be used as a cryptographic key, a value of any one of the parameters provided by the PUF is measured. This measured value is quantized into a determined quantization interval, and a data set may be derived from the quantization interval into which the measured value is quantized.