会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Public key cryptosystem key management based on control vectors
    • 基于控制向量的公钥关键CRYPTOSYSTEM密钥管理
    • US5200999A
    • 1993-04-06
    • US766260
    • 1991-09-27
    • Stephen M. MatyasDonald B. JohnsonAn V. LeRostislaw PrymakWilliam C. MartinWilliam S. RohlandJohn D. Wilkins
    • Stephen M. MatyasDonald B. JohnsonAn V. LeRostislaw PrymakWilliam C. MartinWilliam S. RohlandJohn D. Wilkins
    • G09C1/00G06F9/30H04L9/08
    • H04L9/0844G06F9/30007G06F9/30018H04L9/088H04L2209/12H04L2209/38
    • A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and further generating a second public key and a second private key as a second pair in the data processing system, for use with a second public key algorithm. The method then continues by assigning a private control vector for the first private key and the second private key in the data processing system, for defining permitted uses for the first and second private keys. Then the method continues by forming a private key record which includes the first private key and the second private key in the data processing system, and encrypting the private key record under a first master key expression which is a function of the private control vector. The method then forms a private key token which includes the private control vector and the private key record, and stores the private key token in the data processing system.At a later time, the method receives a first key use request in the data processing system, requiring the first public key algorithm. In response to this, the method continues by accessing the private key token in the data processing system and checking the private control vector to determine if the private key record contains a key having permitted uses which will satisfy the first request. The method then decrypts the private key record under the first master key expression in the data processing system and extracts the first private key from the private key record. The method selects the first public key algorithm in the data processing system for the first key use request and executes the first public key algorithm in the data processing system using the first private key to perform a cryptographic operation to satisfy the first key use request.
    • 13. 发明授权
    • Provision of circuit reset without a dedicated I/O pin
    • 提供没有专用I / O引脚的电路复位
    • US5149987A
    • 1992-09-22
    • US747892
    • 1991-08-19
    • William C. Martin
    • William C. Martin
    • H03K17/22
    • H03K17/223H03K17/22
    • An electronic device is reset using a reset line internal to the electronic device. The electronic device includes internal logic circuitry which performs logic operations. An internal logic power signal input to the electronic device is connected to an internal logic power signal line. The internal logic power signal line is used to deliver an internal logic power signal to the internal logic circuitry. The electronic device also includes a plurality of outputs. A plurality of output drivers buffer output signals generated by the internal logic circuitry. The output drivers place the output signals on the plurality of outputs. The electronic device additionally includes an output power signal input connected to an output power signal line. The output power signal line is used to deliver an output power signal from the output power signal input to the output drivers. A reset line, connected to the output power signal line and to the internal logic circuitry, is used to reset the internal logic circuitry. A reset cycle is begun by placing the internal logic power signal on the internal logic power signal line while placing a ground signal on the output power signal line. The reset cycle is completed by placing the output power signal on the output power signal line.
    • 电子设备使用电子设备内部的复位线进行复位。 电子设备包括执行逻辑操作的内部逻辑电路。 输入到电子设备的内部逻辑电源信号连接到内部逻辑电源信号线。 内部逻辑电源信号线用于将内部逻辑电源信号传递给内部逻辑电路。 电子设备还包括多个输出。 多个输出驱动器缓冲由内部逻辑电路产生的输出信号。 输出驱动器将输出信号放在多个输出上。 电子设备还包括连接到输出功率信号线的输出功率信号输入。 输出功率信号线用于将输出功率信号从输出功率信号输入输出到输出驱动器。 连接到输出电源信号线和内部逻辑电路的复位线用于复位内部逻辑电路。 通过将内部逻辑电源信号置于内部逻辑电源信号线上,同时在输出电源信号线上放置接地信号来开始复位周期。 通过将输出功率信号放在输出功率信号线上来完成复位周期。
    • 18. 发明授权
    • Method and apparatus for reading multiple matched addresses
    • 读取多个匹配地址的方法和装置
    • US6118682A
    • 2000-09-12
    • US110872
    • 1998-07-07
    • William C. Martin
    • William C. Martin
    • G11C15/00
    • G06F7/74G11C15/00
    • The present invention is directed to providing a storage device, such as a content addressable memory, which enables multiple matches to be simply and efficiently examined during a multiple match cycle, regardless of the size of the storage device. For example, where two matched entries in a content addressable memory correspond to a search address, exemplary embodiments reduce the task of examining the locations of these matches to processing only two matched addresses as opposed to having to match all entries of the content addressable memory. By providing an efficient access to multiple matched entries of a memory, the multiple matches can actually be used in an ordered manner to access different branches of a secondary memory. The use of a relatively simple control scheme enables the control logic to be implemented on a single integrated circuit chip with the memory device itself (e.g., a content addressable memory). Moreover, in contrast to conventional content addressable memories, exemplary embodiments of the present invention enable the user to reset an original multiple matched condition, thereby allowing the user to perform several examinations of the data/address. Thus, if an error occurs during processing of multiple matches, the user can easily restart the examination process.
    • 本发明旨在提供诸如内容可寻址存储器的存储设备,其使得能够在多个匹配周期期间简单且有效地检查多个匹配,而与存储设备的大小无关。 例如,在内容可寻址存储器中的两个匹配的条目对应于搜索地址的情况下,示例性实施例减少了检查这些匹配的位置以仅处理两个匹配地址的任务,而不是必须匹配内容可寻址存储器的所有条目。 通过提供对存储器的多个匹配条目的有效访问,实际上可以以有序的方式使用多个匹配以访问辅助存储器的不同分支。 使用相对简单的控制方案使得控制逻辑能够在具有存储器件本身的单个集成电路芯片(例如,内容可寻址存储器)上实现。 此外,与常规内容可寻址存储器相比,本发明的示例性实施例使得用户能够重置原始多重匹配条件,从而允许用户对数据/地址进行多次检查。 因此,如果在多个匹配的处理期间发生错误,则用户可以容易地重新开始检查过程。
    • 19. 发明授权
    • Secure key management using programable control vector checking
    • 使用可编程控制向量检查实现安全密钥管理
    • US5007089A
    • 1991-04-09
    • US506319
    • 1990-04-09
    • Stephen M. MatyasDonald B. JohnsonAn V. LeWilliam C. MartinRostislaw PrymakJohn D. Wilkins
    • Stephen M. MatyasDonald B. JohnsonAn V. LeWilliam C. MartinRostislaw PrymakJohn D. Wilkins
    • G06F21/22G09C1/00H04L9/08
    • H04L9/088
    • The invention includes a control vector checking code respository located either within the same system as the crytographic facility or alternately remotely from the system containing the cryptographic facility. The control vector checking code repository will be linked to the cryptographic facility by one of several means. A first means for linking the repository to the cryptographic facility would include a physically secure data communications link. A second means for connecting the repository to the cryptographic facility would be by using an insecure channel with authentication, wherein either a modification detection code or alternately a message authentication code would be transmitted to the cryptographic facility and then the desired control vector checking code would be transmitted over the link. The cryptographic facility will include a code authorization mechanism to compare the transmitted MAC or MDC with a corresponding value computed from the received control vector checking code. If the two values of the MDC or the MAC compare, then the control vector checking code is authenticated and loaded into the control vector checking unit for carrying out the control vector checking operations desired. The control vector checking code repository can be located in a remote system connected by means of the communications link to the crypto facility, or alternately the repository can reside in the same system as the crypto facility. This provides for the dynamic updating of control vector checking code, where improvements or alterations are made to the control vector checking sequence. This also provides for a reduced memory size in the crypto facility, being sufficiently large to accommodate subsidiary control vector checking applications, with alternate control vector checking applications requiring the reloading of the control vector checking unit from the repository.
    • 20. 发明授权
    • Compression tool
    • 压缩工具
    • US4337635A
    • 1982-07-06
    • US165774
    • 1980-07-03
    • William C. MartinStephen V. Hoydic, Jr.
    • William C. MartinStephen V. Hoydic, Jr.
    • H01R43/058B21D7/06B21D37/10
    • H01R43/058
    • A compression tool for compressing a generally tubular workpiece, comprises a tool head having an open, workpiece-receiving end. A plurality of generally parallel, spaced apart movable compressing members are carried by the tool head. A stationary compression surface also carried by the tool head opposingly faces the movable compressing members. Guides are provided in the tool head for slidably mounting the movable compressing members. A ram drives the movable compressing members towards their respective maximum compressed positions, which are defined by the ram and a ram-carrying channel. This maximum compressed position generally increases in a predetermined sequence from the workpiece-receiving end of the tool head toward an interior portion of the tool head.
    • 用于压缩大致管状工件的压缩工具包括具有打开的工件接收端的工具头。 多个大致平行的间隔开的可移动压缩构件由工具头承载。 由工具头承载的固定压缩表面相对地面对可动压缩构件。 在工具头中设置有可滑动地安装可移动压缩构件的引导件。 柱塞将可移动的压缩构件驱动到它们各自的最大压缩位置,这些最大压缩位置由压头和压头承载通道限定。 该最大压缩位置通常以预定顺序从工具头的工件接收端朝向工具头的内部部分增加。