摘要:
A Josephson integrated circuit includes a Josephson logic processor operated at a first clock rate, and a latch circuit formed of Josephson devices operated at the first clock rate for receiving output data from the Josephson processor together with a status signal for holding the output data. The latch circuit is supplied with a clear signal for resetting the output data therefrom. In addition, the invention includes therefrom a data output circuit formed of Josephson devices operated in response to a second clock rate that is slower than the first clock rate, wherein the data output circuit has an output terminal and supplied with the output data held in the latch means for passing the output data to the output terminal at the second clock rate. Further, the data output means produces the clear signal at the second clock rate.
摘要:
In certain embodiments, processors may operate to establish trust with trust point systems by performing a user authentication, a platform authentication, and an environment authentication. The processors may communicate information with the trust point systems in response to establishing trust. In certain embodiments, the trust point systems may cooperate to provide a variety of services, such as escorting, battery charging, vehicle security, and/or emissions reporting services.
摘要:
A TPM chip installed in an image reading apparatus records an operation log, and encrypts recorded operation log with a secret key. The image reading apparatus transmits encrypted operation log to an evaluation apparatus. The evaluation apparatus receives the encrypted operation log, decrypted received operation log, and evaluates an operation performed on the image reading apparatus based on decrypted operation log.
摘要:
A data managing device with a single chip that includes: first hardware that authenticates security of communication performed by a data processing apparatus that houses the data managing device; second hardware that performs different processing from processing performed by the first hardware; and third hardware that receives an update program for a program executed by any one of the first hardware and the second hardware, from a data providing apparatus with which security of communication is authenticated by the first hardware, and updates the program by the update program.
摘要:
A method for sharing content between clients at a common trust level in a trust hierarchy associated with a network implementing policy-based management includes receiving integrity information from a first client at a first trust level in the trust hierarchy at a second client at the first trust level, requesting permission to receive electronic content from the first client, receiving a determination regarding the requested permission, and communicating the determination to the first client. The first client obtained content from a policy enforcement point in the network. The request for permission is made to the policy enforcement point and the request includes the integrity information. The determination is received from the policy enforcement point and is based in part on the integrity information about the first client. The second client communicates to the first client the determination of whether the second client receives the content from the first client.
摘要:
A system for performing remote maintenance an electronic network serving a plurality of clients may comprise a central server, a first client system hosting first virtual machine, and a receiver associated with the first client system. The central server may broadcast a list of updated software modules available for delivery to the plurality of client systems. The first client system may including a plurality of nodes, each one of the plurality of processing resources having a respective set of processing instructions stored on an respective associated computer readable memory. The receiver may be operable to receive the list broadcast by the central server. The first virtual machine may be operable to determine whether to request any of the updated software modules on the received list based at least in part on the identity of the plurality of nodes of the first client system. The receiver may be operable to receive any updated software module requested by the first virtual machine. The first virtual machine may be operable to install any updated software module delivered to the client system.
摘要:
A system for performing remote maintenance in an electronic network configured to serve a plurality of clients may comprise a client, a database, and a virtual machine. The client may include a plurality of processing resources. Each one of the plurality of processing resources may have a respective set of processing instructions stored on an respective associated computer readable memory. The database may include information correlating a list of processing resources with a respective set of processing instructions. The virtual machine may be operable to access the database and perform calculations simulating proposed combinations of processing resources and their respective set of processing instructions before approving a software update requested for the client.
摘要:
A method for identity verification includes receiving a request for proof of identity from a service provider and receiving biometric information associated with a user of a communication device. The method also includes determining that the received biometric information matches a biometric profile that contains biometric information associated with a registered user of the communication device. The method also includes unlocking a private key associated with the registered user in response to determining that the received biometric information matches a biometric profile and sending a request for a digital certificate that is signed with the private key associated with the registered user. The method further includes receiving the digital certificate that includes a public key associated with the registered user and satisfies the request for proof of identity. The method also includes with forwarding the digital certificate to the service provider.
摘要:
This invention is to provide a technique to appropriately authenticate the requesting side and the diagnosis side in the remote diagnosis system. In this invention, an authentication server communicating with a diagnosis requesting side terminal and a diagnosis side terminal carries out: at the beginning of a remote diagnosis, judging whether or not an image obtained in the diagnosis requesting side terminal satisfies a first condition; at the beginning of the remote diagnosis, judging whether or not an image obtained by the diagnosis side terminal satisfies a second condition; and upon detection that affirmative judgments are obtained in the first and second judgings, generating authentication data including information concerning the diagnosis requesting side terminal, information concerning the diagnosis side terminal and a diagnosis time. Accordingly, it is possible to guarantee that both terminals have an appropriate capability and etc.
摘要:
A data managing device with a single chip that includes: first hardware that authenticates security of communication performed by a data processing apparatus that houses the data managing device; second hardware that performs different processing from processing performed by the first hardware; and third hardware that receives an update program for a program executed by any one of the first hardware and the second hardware, from a data providing apparatus with which security of communication is authenticated by the first hardware, and updates the program by the update program.