摘要:
Various embodiments of the present invention provide a method and an interaction system. A first set of information related to a user is received from a personal communication device with or without an embedded secure element, or from an independent secure element at a service outlet. The personal communication device and the secure element are associated with the user. Further, a trust is established between the service outlet and the secure element by a process of mutual authentication. If a personal communication device is used, a communication channel is established between the personal communication device and the service outlet. Thereafter, the user is provided access to multiple services offered by the service provider over the communication channel through the personal communication device. If a personal communication device is not used, the services are provided through the access point of the service outlet.
摘要:
Electronic system functionality can be initially implemented as software code (e.g., in programming languages such as C, C++ or Pascal) and selectively converted to a hardware representation such as in hardware description language (e.g., VHDL, Verilog, HandelC, BachC, SpecC and System Verilog). In one aspect, software code representations comprising memory dereferencing operations (e.g., related to pointers, arrays and structs) may also be converted to a hardware representation. The newly converted hardware representation may be given control of a main communications network (e.g., system bus) of the electronic system to control the execution of the memory dereferencing operations (e.g., related to pointers, arrays and structs). In one embodiment, bus control may be via a bus control interface adapted for a particular kind of communications network (e.g., a processor bus, a system bus, a hierarchical bus, a cross bar, a multiplexer bus, a switch network and a point to point network). In another embodiment, a software memory dereferencer for executing memory dereferencing operations may be provided.
摘要:
Various embodiments of the present invention provide a method and an interaction system. A first set of information related to a user is received from a personal communication device with or without an embedded secure element, or from an independent secure element at a service outlet. The personal communication device and the secure element are associated with the user. Further, a trust is established between the service outlet and the secure element by a process of mutual authentication. If a personal communication device is used, a communication channel is established between the personal communication device and the service outlet. Thereafter, the user is provided access to multiple services offered by the service provider over the communication channel through the personal communication device. If a personal communication device is not used, the services are provided through the access point of the service outlet.
摘要:
An access system in one embodiment that first determines that someone has correct credentials by using a non-biometric authentication method such as typing in a password, presenting a Smart card containing a cryptographic secret, or having a valid digital signature. Once the credentials are authenticated, then the user must take at least two biometric tests, which can be chosen randomly. In one approach, the biometric tests need only check a template generated from the user who desires access with the stored templates matching the holder of the credentials authenticated by the non-biometric test. Access desirably will be allowed when both biometric tests are passed.
摘要:
An access system in one embodiment that first determines that someone has correct credentials by using a non-biometric authentication method such as typing in a password, presenting a Smart card containing a cryptographic secret, or having a valid digital signature. Once the credentials are authenticated, then the user must take at least two biometric tests, which can be chosen randomly. In one approach, the biometric tests need only check a template generated from the user who desires access with the stored templates matching the holder of the credentials authenticated by the non-biometric test. Access desirably will be allowed when both biometric tests are passed.
摘要:
A tool is described herein for optimizing the design of a hardware-software system. The tool allows a designer to evaluate the potential improvement in system performance that may be realized by moving selected software components of the system to a hardware implementation. In one aspect, the tool automatically generates a performance profile of an original form of the system. The performance profile of the original form of the system may be used to select software components of the system to be moved to hardware. In another aspect, the tool generates an estimated performance profile of a repartitioned form of the system by modifying the performance profile of the system. The estimated performance profile of the repartitioned system is compared to the performance profile of the original form of the system to verify benefits, if any, of repartitioning. Such verification is accomplished without the need to actually repartitioning the system or measuring the performance of the entire repartitioned system.
摘要:
Electronic system functionality can be initially implemented as software code (e.g., in programming languages such as C, C++ or Pascal) and selectively converted to a hardware representation such as in hardware description language (e.g., VHDL, Verilog, HandelC, BachC, SpecC and System Verilog). In one aspect, software code representations comprising memory dereferencing operations (e.g., related to pointers, arrays and structs) may also be converted to a hardware representation. The newly converted hardware representation may be given control of a main communications network (e.g., system bus) of the electronic system to control the execution of the memory dereferencing operations (e.g., related to pointers, arrays and structs). In one embodiment, bus control may be via a bus control interface adapted for a particular kind of communications network (e.g., a processor bus, a system bus, a hierarchical bus, a cross bar, a multiplexer bus, a switch network and a point to point network). In another embodiment, a software memory dereferencer for executing memory dereferencing operations may be provided.
摘要:
Described herein are methods and systems for optimizing area related to hardware implementation of algorithms. The algorithms may be related to functionality of an embedded system, for instance. System functionality may be initially implemented in software and converted to hardware implementation. Prior to implementing system functionality in actual hardware, algorithms for selected system functionality or desirable all system functionality may be evaluated to determine values attained by selected variables or desirably all the variables comprised therein. In one embodiment, a probe may applied to the original software code to determine a maximum value and a minimum value corresponding to each of the variables of the algorithm (or at least one such variable) may be tracked across one or more invocations of functions (or other code components) of the algorithm comprising such variables. Based on such tracked values, a minimum size (e.g., in bit-width), for each of the variables, needed to express the various values attained by the variables may be determined. The original software code implementing system functionality may then be modified to declare or otherwise specify an optimal (e.g., the minimum bit-width needed to express values attained) bit-width, which can result in reduced area for a hardware implementation.