摘要:
A microprocessor-assisted sewing machine control equipment is flexibly applicable for controlling the sewing machine driving motor and further electric motors which are controlled independently of or in dependence on the rotary position. To this end, a control system is allocated to each electric motor, comprising an open-loop control unit for rotary-position-independent controlling, a closed-loop control unit for controlling the electric motor in dependence on the rotary position, and a selection unit. The selection unit couples for control either the closed-loop control unit or the open-loop control unit with the electric motor, depending on whether the electric motor is controlled by closed-loop control in dependence on the rotary position or by open-loop control independently of the rotary position.
摘要:
A method for recognizing a manipulation of at least one electrical line includes determining a parameter that is dependent on a resistance and a capacity, a resistance and an inductivity, or a resistance, a capacity, and an inductivity of the electrical line; comparing the determined parameter to a reference parameter to provide a comparison result; and recognizing a manipulation of the electrical line based on the provided comparison result.
摘要:
A method and system for accelerated decryption of a cryptographically protected user data unit, wherein a transmitter initially generates a cryptographic key that is provided with a related key identification. The transmitter then performs asymmetrical encryption of the generated cryptographic key using a public cryptographic key and encryption of at least one user data unit using the generated cryptographic key. The encrypted user data unit, the asymmetrically encrypted cryptographic key and the related key identification of the cryptographic key are transported to a receiver that decrypts the received asymmetrically encrypted key using a private key, if verification of the received related key identification of the cryptographic key indicates the cryptographic key is not present in a decrypted state in the receiver. The receiver then decrypts the received cryptographically encrypted user data unit using the cryptographic key in the receiver or with the cryptographic key decrypted using the private key.
摘要:
The method for implementing a characteristic-2-multiplication of at least two input bit strings each having a number N of bits by means of a processor unit suitable for carrying out an integer multiplication, having the following steps: a) generating at least one sequence of a number K of zero bits, using Kε{1, . . . , N}, by means of a first transformation of the respective input bit string to at least one predetermined position in the respective input bit string for generating at least one first intermediate bit string; b) linking the at least two first intermediate bit strings by means of the integer multiplication of the processor unit for generating at least one second intermediate bit string; and c) transforming the at least one second intermediate bit string by means of a second transformation for generating a result bit string.
摘要:
The embodiments relate to a method for the encrypted data exchange between subscribers of a communication system using cryptography based on elliptical curves, wherein upon a query by a first subscriber a scalar multiplication is calculated by the second subscriber, wherein merely part of the result of the scalar multiplication is returned to the first subscriber as a response. The invention relates to a communication system.
摘要:
An apparatus for generating a random bit sequence has a ring oscillator which includes inverting digital devices and on which an oscillator signal can be tapped. An intermediate storage element monitors and stores fluctuating levels of the oscillator signal. At least two controllable switch devices for simultaneously exciting at least two harmonic wave edges of the ring oscillator are provided in a signal path of the ring oscillator. The phasing of the two harmonic wave edges and a potential convergence thereof are subject to statistical fluctuations, which are used as a basis for the random bit generation. A corresponding random number generator can be used in particular as an FPGA for security applications, such as cryptographic methods. The apparatus has substantially digital components, which are easy to produce in a standardized manner. A dedicated regulating circuit is not necessary. The apparatus is also robust toward exterior influences.
摘要:
A random source for generating a random number r with a bit length k, r=r0, . . . , rk-1, a memory for storing a threshold value state variable s, which is represented by a number with a bit length n≧k, s=s0, . . . , sn-1, and a comparator to compare two numbers with a bit length k, i.e. from r with a subset of the bits from s are provided. Two calculation rules R1 and R2, which are able to change the content of the memory for the threshold value state variable s (i.e. functions from s to s), are defined for a method of generating random wait states.
摘要:
A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different software component manufacturers (OEM) that manufacture and encrypt software components with the respective cryptographic key, wherein when a naming conflict occurs during the integration of encrypted software components, at least one of the encrypted software components in which the naming conflict occurred is expanded by a naming conflict resolution rule to thereby allows for the resolution of naming conflicts in encrypted software components that can originate from different software component manufacturers without the source code of the software components becoming visible to third parties.
摘要:
The invention relates to a method for providing postal items with postal prepayment impressions, characterized in that data are generated in the customer system that are encrypted in such a manner that the value transfer center is able to decrypt them. To this end, the data are transmitted from the customer system to the value transfer center. The value transfer center then decrypts the data and re-encrypts them with a code not known to the customer system and transmits the encrypted data to the customer system.
摘要:
The invention concerns a process for the production of carbonaceous adsorption agents doped with elementary sulfur, in which sulfur is mixed with the adsorption agent, the mixture is heated to a temperature of between 120° C. and 150° C. and the temperature is maintained over a period of about an hour. The process is distinguished in that heating of the mixture is effected under a controlled oxygen-bearing atmosphere. The invention further concerns a process for waste gas cleaning using carbonaceous absorption agents doped with elementary sulfur. Preferably brown coal coke is used as the adsorption agent.