会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明专利
    • Spreading code calculation device, communicating system, transmitter, receiver, and program
    • 传播代码计算设备,通信系统,发送器,接收器和程序
    • JP2010028668A
    • 2010-02-04
    • JP2008190059
    • 2008-07-23
    • Chaosware Inc株式会社カオスウェア
    • UMENO TAKESHI
    • H04B1/707H04J13/12H04L9/26
    • PROBLEM TO BE SOLVED: To improve communication performance by using a complex spreading code having perfect orthogonal property and excellent autocorrelation characteristics.
      SOLUTION: In a spreading code calculation device 501, a primitive root receiving part 502 receives any of primitive roots to a prime number p as the primitive root q to be assigned to a user, a number receiving part 503 receives any of integers 0, 1, 2, ..., p-1 as a number k of communication channel, and a complex code generating part 504 generates the complex spreading code of length p b(q, k)=(exp(i θ), exp(2πi×q
      0+k /p), exp(2πi×q
      1+k /p), exp(2πi×q
      2+k /p), ..., exp(2πi×q
      (p-2)+k /p)) when k=0, 1, 2, ..., p-2, and generates the complex spreading code of length p b(q, k)=(exp(i θ), 1, 1, ..., 1) when k=p-1. The complex spreading code is suitable for channelization coding and is applicable to primary spread.
      COPYRIGHT: (C)2010,JPO&INPIT
    • 解决的问题:通过使用具有完全正交性和优异的自相关特性的复扩展码来提高通信性能。 解扩:在扩展码计算装置501中,原语根接收部分502接收任何原始根到素数p作为要分配给用户的原语根q,数字接收部分503接收任何整数 0,1,2,...,p-1作为通信信道的数量k,并且复码生成部504生成长度为pb(q,k)=(exp(iθ),exp (2πi×q 0 + k / p),exp(2πi×q 1 + k / p),exp(2πi×q 2 + 当k = 0,1,2,...,p-2时,SP> / p),...,exp(2πi×q (p-2)+ k / p) 并且当k = p-1时产生长度pb(q,k)=(exp(iθ),1,1,...,1)的复扩展码。 复扩展码适用于信道化编码,适用于初级扩频。 版权所有(C)2010,JPO&INPIT
    • 7. 发明专利
    • Stream encryption method and apparatus
    • 流加密方法和装置
    • JP2007060191A
    • 2007-03-08
    • JP2005242051
    • 2005-08-24
    • Kddi CorpKddi株式会社
    • KIYOMOTO SHINSAKUTANAKA TOSHIAKI
    • H04L9/26
    • PROBLEM TO BE SOLVED: To provide a stream encryption method and apparatus for realizing initializing processing securely at a high speed even when stream encryption is used under an environment wherein an initial value is frequently updated. SOLUTION: The stream encryption method respectively independently manages an internal state wherein ordinary initializing processing (S11) is finished and an internal state in the case of encryption processing (S13). Thus, the method executes simple initializing processing (S12) at encryption processing (S13), carries out the encryption processing (S13) after the internal state is updated, the internal state is deleted after the end of the encryption processing (S13) to restore the state to the internal state at the end of the ordinary initializing processing. COPYRIGHT: (C)2007,JPO&INPIT
    • 要解决的问题:即使在频繁更新初始值的环境下使用流加密时,提供用于高速安全地实现初始化处理的流加密方法和装置。 解决方案:流加密方法分别独立地管理其中普通初始化处理(S11)完成的内部状态和在加密处理的情况下的内部状态(S13)。 因此,该方法在加密处理(S13)中执行简单的初始化处理(S12)(S13),在内部状态被更新之后执行加密处理(S13),在加密处理结束之后删除内部状态(S13)以恢复 国家对普通初始化处理结束时的内部状态。 版权所有(C)2007,JPO&INPIT
    • 10. 发明专利
    • Method for protecting portable card
    • 保护便携卡的方法
    • JP2005348453A
    • 2005-12-15
    • JP2005256078
    • 2005-09-05
    • Nokia Corpノキア コーポレーション
    • MULLER FRANKROELOFSEN GERRIT
    • B42D15/10G06F12/14G06F21/06G06K19/073G09C1/00H03K3/84H04L9/10H04L9/12H04L9/26
    • H03K3/84G06K19/07363H04L9/0668H04L9/12
    • PROBLEM TO BE SOLVED: To provide a portable card that is resistant to DPA so as to be safely available.
      SOLUTION: In a method for protecting a portable card, provided with at least an algorithm for enciphering data or authenticating the card, against the deriving of the secret key used from statistical analysis of its information leaking away to the outside world of the portable card in the event of cryptographic operations, such as power-consumption data, electromagnetic radiation and the like, the card is provided with at least a shift register having a linear and a non-linear feedback function for creating cryptographic algorithms. The method includes a step of loading data to be processed and a secret key to the shift register of the portable card and after the secret key has been loaded into the shift register, the shift register clocks on for a certain specific period of time, using at least the linear-feedback function.
      COPYRIGHT: (C)2006,JPO&NCIPI
    • 要解决的问题:提供耐DPA的便携式卡,以便安全可用。 解决方案:在一种用于保护便携式卡的方法中,至少提供了一种用于对数据进行加密或认证卡的算法,抵消了从泄漏到外部世界的信息的统计分析中使用的秘密密钥的导出。 在诸如功耗数据,电磁辐射等的密码操作的情况下,卡提供至少一个具有用于创建加密算法的线性和非线性反馈功能的移位寄存器。 该方法包括将要处理的数据和秘密密钥加载到便携式卡的移位寄存器的步骤,并且在秘密密钥已经被加载到移位寄存器之后,移位寄存器在一定的特定时间段内使用 至少线性反馈功能。 版权所有(C)2006,JPO&NCIPI