摘要:
A method authenticates di identities in parallel using two prime numbers p and q such that q|p−1. Each identity includes a private key si and a public key vi, and a publicly known generator is α such that αq≡1 (mod p). A verifier is provided with an ordered list of the public keys vi. A prover selects uniformly at random a non-negative number r less than q. A number x=αr (mod p) is sent from the prover to a verifier. The verifier selects uniformly at random a non-negative number e less than 2(t+logd), where log is base 2, and a number t is a predetermined security parameter. The prover receives from the verifier the number e. A number y=r+Σi si*ei (mod q) is generated by the prover, and the number Y is sent to the verifier, who then determines if an equality x=αy*Πi(vi)ei (mod p) is true. The prover is accepted as having the di identities if and only if the equality is true. In a preferred embodiment the communications between the prover and the verifier is via a low-bandwidth optical channel.
摘要翻译:一种方法使用两个素数p和q并行地验证d i个体的身份,使得q | p-1。 每个身份包括一个私人密钥和一个公共密钥v i i,,,,,(((≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡ mod p)。 验证者被提供有公钥的有序列表v SUB>。 证明者随机选择小于q的非负数r。 数字x =α SUP>(mod p)从证明者发送到验证者。 验证者随机选择小于2(t + logd) SUP>的非负数e,其中log为基数2,数t为预定的安全参数。 证明者从验证者那里收到数字e。 由证明者产生数字y = r +Σi(i mod i)(mod q),并且发送号码Y 到验证者,然后他们确定是否相等x =α SUP> (mod p)为真。 当且仅当相等是真的时,证明者被接受为具有d i> i SUB>身份。 在优选实施例中,证明者和验证者之间的通信是经由低带宽光信道。
摘要:
An angular displacement of an object is measured interferometrically by splitting a laser beam into a reference beam and a measuring beam. The reference beam is directed at a stationary reference retroreflector and then a phase shift detector. The measuring beam is directed at a rotatable reflective surface of the object and then a stationary measuring retroreflector and then back to the rotatable reflective surface and then to the phase shift detector such that the phase shift detector measures an angular displacement of the rotatable reflective surface when the length of the path of the measuring beam changes when the rotatable reflective surface is displaced.
摘要:
A system and method for quickly determining whether a requested object is an ancestor of a particular object where both objects are contained in a single inheritance type hierarchy. The system encodes each object in memory with a binary pattern that indicates the ancestry of the object and a mask which indicates which bits of the binary pattern are significant for determining ancestry. This allows a system, upon receiving a request for an object, to determine in only two steps whether any particular object in memory can satisfy the request as a sub-type of the requested object.
摘要:
A new expert system that facilitates beta-token partitioning of rules in a RETE network. The expert system includes a beta opinion value generating portion that generates, for each node in the RETE network, an opinion value in response to processing statistics. A beta decision value generating portion generates a beta-token partition opinion value for a rule in response to the beta opinion values for nodes in the RETE network defining a rule.
摘要:
A laser cutting machine includes a platform and a motion system. The motion system includes a first prismatic joint facilitating a first motion of the platform along a first direction and a second prismatic joint facilitating a second motion of the platform along a second direction. A galvano arranged on the platform, such that a motion of the platform causes a motion of the galvano, the galvano including a first mirror, wherein a third motion of the first mirror positions the laser beam along a third direction, and a second mirror, wherein a fourth motion of the second mirror positions the laser beam along a fourth direction. A control module controls concurrently the motion system and the galvano, such that a position of the laser beam on the workpiece is a vector sum of the first motion, the second motion, the third motion, and the fourth motion.
摘要:
An apparatus is configured to perform secure processing of confidential information. The apparatus comprises a secure disk configured to store confidential information arranged inside a lockable container; a processor configured to process the confidential information arranged inside the lockable container; an insecure network arranged outside the lockable container; and means for connecting the processor only to the secure disk or alternatively to the insecure network at any one time, but not to both the secure disk and the insecure network at the same time.
摘要:
A display device includes a display screen, and horizontal and vertical display signals. The horizontal and vertical display signals are to render an image on the display screen. A first and second accelerometers are directly coupled to the display screen. First and second compensation circuits convert acceleration in horizontal and vertical directions respectively to x- and y-compensation signals. First and second adders combine the x- and y-compensation signals with the horizontal and vertical display signals to dynamically adjust a location of the image on the display screen while the display device is subject to movement.
摘要:
A method and apparatus determining an intensity of light flux. First, a photodiode or LED is charged by reverse-biasing to a fixed voltage. The fixed voltage is a sum of a threshold voltage and a predetermined offset voltage. Then, a time to discharge the photodiode to the threshold voltage by a photo current is measured to determine an intensity of light producing the photocurrent.
摘要:
A recticular discrimination network utilized in an expert system that permit read procedural attachments on working memory element slots using a gamma memory. The gamma memory is associated with one- or two- input nodes and stores references to the attached WME slot, use of which minimizes computation and interaction among data elements in a RETE-net.
摘要:
A method for operating a parallel processor system implements a beta-partitioning algorithm. According to that method, groups of working memory elements are identified which satisfy each of the conditions of all of several production rules. Then, sequences of sets are formed each corresponding to one of the production rules. The sets represent combinations of working memory elements which satisfy some or all of the conditions for the corresponding production rule. At some point during the formation of sets, the sets are subdivided into relatively equal-size subsets, each of which is assigned to a different processor. Each processor, which previously had been performing the same operations as the other processors, continues processing only its assigned subset.