摘要:
The present invention relates to digital signature operations using public key schemes in a secure communications system and in particular for use with processors having limited computing power such as ‘smart cards’. This invention describes a method for creating and authenticating a digital signature comprising the steps of selecting a first session parameter k and generating a first short term public key derived from the session parameter k, computing a first signature component r derived from a first mathematical function using the short term public key, selecting a second session parameter t and computing a second signature component s derived from a second mathematical function using the second session parameter t and without using an inverse operation, computing a third signature component using the first and second session parameters and sending the signature components (s, r, c) as a masked digital signature to a receiver computer system. In the receiver computer system computing a recovered second signature component s′ by combining a third signature component with the second signature component to derive signature components (s′, r) as an unmasked digital signature. Verifying these signature components as in a usual ElGamal or ECDSA type signature verification.
摘要:
A support structure for thin screenplates utilized for fine screens in Fibresaving applications for pulp fiber suspensions or the like wherein a support structure having a screen support in minimum screen contact positioned by a support reinforcement and positioning device, assembled to form an integral structure which reduces the stresses and deflections in the thin screenplates occurring in operation.
摘要:
A method and apparatus for multi-channel control of a multiple input, multiple output, servo-driven plant utilizes finite impulse response (FIR) filters to model the inverse of the plant. Each channel includes a servo FIR filter that generates a servo command to drive the plant's servo controller, a valve current FIR filter that bypasses the PID stage of the servo controller to avoid undesirable effects of the PID loop, and a cross FIR filter for each of the remaining channels that compensates for physical coupling in the plant between the channels. The servo FIR filter is calculated by an adaption routine that involves applying an identification signal to the plant, applying the plant's response to the filter and then updating the filter's coefficients using the error that exists between the identification signal and the filter output. To reduce the convergence time, the identification signal is separated into parts in accordance with the amplitude spectral response of the plant and the parts are applied sequentially. The valve current and cross FIR filters are calculated using a forward drive adaption routine in which the identification signal is applied to the filter and the filter output to the plant. The forward drive adaption routine utilizes the phase response of the plant which is provided by way of another FIR filter that includes the inverse a plitude frequency response of the plant. Non-linear error correction is provided via an error store that provides an error correction that is added to the desired command.
摘要:
A screening apparatus removes a fluid borne pulp fiber slurry from knots which have been concentrated from a pulp processing stream. A rotating radially symmetrical screen provides centrifugal screening to accept a pulp fiber slurry while an integrally connected spiral flight conveyor transports knots from the inner surface of the screen to a knot discharge chamber located axially above the screening chamber. Above the screening chamber but below the liquid level in the housing, a fiber free wash liquor is provided through a tangentially oriented nozzle in the direction of rotation of the spiral flight conveyor to release fibers from the knot surfaces thereby enabling them to pass through the screen. The screening apparatus also provides for removal of heavy tramp materials, for maintaining liquid level control, for minimizing air entrainment and foam formation, and for preventing clogging of the screen apertures and knot discharge outlet.
摘要:
Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention. Complex scenarios such as encrypted mail box, session protection, file protection, ciphertext translation center, peer-to-peer ciphertext translation, message authentication, message authentication with non-repudiation and many others can be easily implemented by a system designer using the control vectors, in accordance with the invention.
摘要:
A pulp feeder feeds the pulp from the pulp feeder housing to the pump impeller. The impeller is provided with vanes specially constructed to provide channels of sufficient dimension to permit the flow of the pulp through the channels. The impeller also has helical flights for feeding the pulp to the channels. The end of the pulp feeder is spaced close enough to the impeller to feed the pulp to the impeller flights but far enough away from the impeller to not interfere with the removal of air. An air removal pipe may also be included in the pulp feeder housing.
摘要:
A method for communicating information between at least a pair of correspondents, the method comprising the steps of each of the correspondents selecting a plurality of cryptographic algorithms known to each of the correspondents. One of the correspondents applies the algorithms in a predetermined manner to a message for producing a set of processed information. The set of processed information is transmitted to the other correspondent. The other correspondent applies complimentary operations of the cryptographic schemes in accordance with the predetermined manner for deriving information related to the message from the processed information.
摘要:
A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.
摘要:
A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value; encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.
摘要:
A system and method for validating digital information transmitted by one correspondent to another in a data communication system. The method comprising the steps of generating a public key in accordance with a predetermined, generating a public key in accordance with a predetermined cryptographic scheme having predetermined arithmetic properties and system parameters. The verifying said public key conforms to said arithmetic properties of said scheme, transmitting said verified public key to a recipient.