摘要:
It is possible to achieve the protection of software with reduced overhead. For example, a memory for storing an encrypted code prepared in advance and a decryptor module for decrypting the code are provided. The decryptor module includes, for example, a three-stage pipeline and a selector for selecting one output from the outputs of each stage of the pipeline. When a branch instruction is issued and subsequent inputs of the pipeline are in the order of CD′1, CD′2, . . . , the decryptor module outputs a first decrypted code by performing a one-stage pipeline process to CD′1. Next, the decryptor module outputs a second decrypted code by performing a two-stage pipeline process to CD′2, and the decryptor module outputs a third decrypted code by performing a three-stage pipeline process to CD′3 (and subsequent codes). Therefore, in particular, the overhead to CD′1 can be reduced.
摘要:
A front-end processing unit provided in a document processing system receives a request in relation to document processing from an image forming apparatus, and produces a divided job by dividing the document processing job into a unit capable of parallel processing in response to the received request details. The front-end processing unit determines an execution order for each of the divided jobs, and then stores the divided jobs in a plurality of queues. The back-end processing unit obtains a divided job from the queue according to the determined execution order of divided jobs, and executes document processing by executing the obtained divided job, and then returns the document processing result to the image forming apparatus.
摘要:
A moving apparatus includes a cylindrical cam barrel provided with a cam groove; a moving member configured to be rotated relative to the cam barrel and moved in a perpendicular direction that is an axis direction of the cam barrel; and a bearing for supporting a support shaft fixed on the moving member in the cam groove, wherein when viewed from the axis direction of the support shaft, a contact position F between the bearing and the cam groove is located closer to the side of the rotation center axis of the moving member than the axis line of the support shaft.
摘要:
A moving apparatus includes a cylindrical cam barrel provided with a cam groove; a moving member configured to be rotated relative to the cam barrel and moved in a perpendicular direction that is an axis direction of the cam barrel; and a bearing for supporting a support shaft fixed on the moving member in the cam groove, wherein when viewed from the axis direction of the support shaft, a contact position F between the bearing and the cam groove is located closer to the side of the rotation center axis of the moving member than the axis line of the support shaft.
摘要:
An increase in safety from attacks by use of hardware-like methods by small-sized hardware is achieved. An encryption processing device includes a logical circuit capable of programmably setting logics for executing cipher processing, a memory that stores plural pieces of logical configuration information corresponding to an identical cipher processing algorithm, and a CPU that selectively sets plural logics corresponding to an identical cipher processing algorithm in the logical circuit. Even in processing using an identical cipher key, by changing the logic of the logical circuit for each processing, power consumption in cipher processing can be varied, and places a timing in which malfunctions occur can be varied. Moreover, an increase in the scale of hardware for realizing plural logics can be curbed.
摘要:
A management application refers to an application management table, and acquires the operation states of all VMs included in an additional application of which the priority related to the execution of a job that has requested from the image forming apparatus. The management application detects the additional application including only VM that is not executing processing based on the operation states of the acquired VMs, and deletes the VM included in the detected additional application.
摘要:
An increase in safety from attacks by use of hardware-like methods by small-sized hardware is achieved. An encryption processing device includes a logical circuit capable of programmably setting logics for executing cipher processing, a memory that stores plural pieces of logical configuration information corresponding to an identical cipher processing algorithm, and a CPU that selectively sets plural logics corresponding to an identical cipher processing algorithm in the logical circuit. Even in processing using an identical cipher key, by changing the logic of the logical circuit for each processing, power consumption in cipher processing can be varied, and places a timing in which malfunctions occur can be varied. Moreover, an increase in the scale of hardware for realizing plural logics can be curbed.
摘要:
A management application refers to an application management table, and acquires the operation states of all VMs included in an additional application of which the priority related to the execution of a job that has requested from the image forming apparatus. The management application detects the additional application including only VM that is not executing processing based on the operation states of the acquired VMs, and deletes the VM included in the detected additional application.
摘要:
The data processor includes: a memory device for storing a program compiled by a compiler; and CPU operable to fetch an instruction code included by a program stored in the memory device. Further, the data processor has a filter for judging an instruction code which the compiler never outputs to limit, in action, CPU in case that CPU fetches the instruction code, which limits, in action, CPU in the case where the program is rewritten by not only an undefined instruction, but also an instruction other than an undefined instruction. The level of security is increased by limiting, in action, CPU.
摘要:
A program to be executed by a computer is divided into a plurality of code blocks, and, a unique code block ID is allotted to each code block. At the moment when the execution of the program is started, the code block ID corresponding to the execution start address is written in a memory, and in the case when the control transits from the code block to other code block, by use of code block operation values obtained beforehand from these two code block IDs thereof, the code block ID in the memory is updated, and it is judged whether the updated code block ID in the memory and the code block ID allotted to the code block as the execution objective are identical or not so that a control flow error is detected.