会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 82. 发明申请
    • PROGRAM ANALYSIS AS CONSTRAINT SOLVING
    • 程序分析作为约束解
    • US20090326907A1
    • 2009-12-31
    • US12147908
    • 2008-06-27
    • Sumit GulwaniSaurabh SrivastavaRamarathnam Venkatesan
    • Sumit GulwaniSaurabh SrivastavaRamarathnam Venkatesan
    • G06F9/45G06F7/60
    • G06F8/49
    • Described is a technology by which program analysis uses rich invariant templates that may specify an arbitrary Boolean combination of linear inequalities for program verification. Also described is choosing a cut-set that identifies program locations, each of which is associated with an invariant template. The verification generates second-order constraints, converts second-order logic formula based on those constraints into first-order logic formula, then converts the first-order logic formula into a quantifier-free formula, which is then converted into a Boolean satisfiability formula. Off-the-shelf constraint solvers may then be applied to the Boolean satisfiability formula to generate program analysis results. Various templates may be used to convert the second-order logic formula into the first-order logic formula. Further described are interprocedural analysis and the determination of weakest precondition and strongest postcondition with applications to termination analysis, timing bounds analysis, and generation of most-general counterexamples for both termination and safety properties.
    • 描述了一种技术,程序分析使用丰富的不变模板,可以为程序验证指定线性不等式的任意布尔组合。 还描述了选择一个标识程序位置的剪辑,每个程序位置与不变模板相关联。 验证产生二阶约束,将基于这些约束的二阶逻辑公式转换为一阶逻辑公式,然后将一阶逻辑公式转换为无量词的公式,然后将其转换为布尔可满足公式。 现在可以将现成的约束求解器应用于布尔可满足公式以生成程序分析结果。 可以使用各种模板来将二阶逻辑公式转换成一阶逻辑公式。 进一步描述的是过程间分析以及最弱前提条件和最强后置条件的确定,适用于终止分析,时序界限分析,以及针对终端和安全属性生成大多数一般的反例。
    • 86. 发明申请
    • LOW DIMENSIONAL SPECTRAL CONCENTRATION CODES AND DIRECT LIST DECODING
    • 低维频谱浓度代码和直接列表解码
    • US20080126910A1
    • 2008-05-29
    • US11772049
    • 2007-06-29
    • Ramarathnam VenkatesanAdi Akavia
    • Ramarathnam VenkatesanAdi Akavia
    • H03M13/03G06F11/00
    • H03M13/3746H03M13/45H03M13/63
    • Systems and methods provide an optionally keyed error-correcting code that is spectrally concentrated. Each codeword of the low dimensional spectral concentration code (LDSC code) typically has very few coefficients of large magnitude and can be constructed even with limited processing resources. Decoding can be performed on low power devices. Error-correcting code is constructed around a key using basic computer arithmetic for computations instead of finite field arithmetic, thus saving energy. A recipient who possesses the key enjoys correction of a relatively high percentage of noise errors. In one implementation, a direct list-decoder iteratively estimates a list of message words directly, instead of a list of codewords. In variations, a unique message word is selected from the list either by applying a randomness test or by using message passing.
    • 系统和方法提供了光谱集中的可选密钥纠错码。 低维频谱浓度码(LDSC码)的每个码字通常具有非常少的大幅度系数,并且甚至可以在有限的处理资源的情况下构造。 可以在低功耗设备上进行解码。 使用计算的基本计算机算术而不是有限域算术来构造纠错码,从而节省能量。 具有密钥的接收者可以修正相对较高百分比的噪声误差。 在一个实现中,直接列表解码器直接迭代地估计消息字列表,而不是码字列表。 在变体中,通过应用随机性测试或使用消息传递从列表中选择唯一的消息字。
    • 87. 发明授权
    • Stealthy secret key encoding and decoding
    • 隐秘秘密密钥编码和解码
    • US07302079B2
    • 2007-11-27
    • US10716993
    • 2003-11-19
    • Mustafa KesalM. Kivanc MihcakRamarathnam Venkatesan
    • Mustafa KesalM. Kivanc MihcakRamarathnam Venkatesan
    • H04K1/00
    • G06T1/0042G06F21/16G06T1/005G06T2201/0065G06T2201/0083G10L19/018H04L9/32H04L2209/34H04L2209/608H04N1/32149H04N2201/3235H04N2201/3236H04N2201/3269
    • An implementation is described herein facilitates certification of goods and/or identifications of the source of such goods. At least one implementation, described herein, embeds a watermark into a relatively small amount of data in a deterministic manner. At least one implementation, described herein, generates an authentication transformation matrix based, at least in part, upon an authentication watermark and a pre-defined humanly perceptible authentication pattern (e.g., image, audio). With this implementation, it obtains subject goods that may have the authentication watermark embedded therein. It generates a humanly perceptible resultant pattern (e.g., image, audio) based, at least in part, upon the watermark detected in subject goods and the transformation matrix. If the detected watermark is the authentication watermark, then the resultant pattern and the pre-defined authentication pattern will match (or nearly so). At least one implementation, described herein, hides a secret key around the periphery of watermarked goods. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    • 这里描述的实施方式有助于对这些货物的来源的货物和/或标识的认证。 本文描述的至少一个实施方案以确定性方式将水印嵌入相对少量的数据。 至少一个本文描述的实施方案至少部分地基于认证水印和预定义的人为可感知的认证模式(例如,图像,音频)来生成认证转换矩阵。 通过这种实现,它获得可以将认证水印嵌入其中的对象商品。 至少部分地,基于在主题货物和变换矩阵中检测到的水印产生人为可感知的合成图案(例如,图像,音频)。 如果检测到的水印是认证水印,则所得到的模式和预定义的认证模式将匹配(或几乎相同)。 本文描述的至少一个实现在水印商品的周围隐藏秘密密钥。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。
    • 88. 发明申请
    • Cryptosystem Based on a Jacobian of a Curve
    • 基于雅可比曲线的加密系统
    • US20070192397A1
    • 2007-08-16
    • US11275215
    • 2005-12-19
    • Kristin LauterPeter MontgomeryRamarathnam Venkatesan
    • Kristin LauterPeter MontgomeryRamarathnam Venkatesan
    • H04L9/28H04L9/00G06F12/14G06F7/38H04L9/32H04K1/00G06F11/30
    • H04L9/302H04L9/32H04L2209/20H04L2209/30
    • A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.
    • 密码系统具有基于曲线雅可比的一组点的顺序的秘密。 在某些实施例中,密码系统用于生成对应于特定产品的产品标识符。 产品标识符是通过初始接收与产品的副本(或副本)相关联的值来生成的。 使用可识别的图案填充接收的值,并且将填充值转换为由特定位数表示的数字。 然后将该数字转换为曲线的雅可比元素,然后将元素升高到特定的功率。 然后将元件升高到特定功率的结果被压缩并作为产品标识符输出。 随后,可以反转加密处理,并且解密的值用于指示产品标识符的有效性和/或真实性。
    • 89. 发明授权
    • Watermark-based goods authentication
    • 基于水印的货物认证
    • US07257234B2
    • 2007-08-14
    • US10641684
    • 2003-08-14
    • Mustafa KesalM. Kivanc MihcakRamarathnam Venkatesan
    • Mustafa KesalM. Kivanc MihcakRamarathnam Venkatesan
    • H04K1/00
    • G06T1/0042G06F21/16G06T1/005G06T2201/0065G06T2201/0083G10L19/018H04L9/32H04L2209/34H04L2209/608H04N1/32149H04N2201/3235H04N2201/3236H04N2201/3269
    • An implementation is described herein facilitates certification of goods and/or identifications of the source of such goods. At least one implementation, described herein, embeds a watermark into a relatively small amount of data in a deterministic manner. At least one implementation, described herein, generates an authentication transformation matrix based, at least in part, upon an authentication watermark and a pre-defined humanly perceptible authentication pattern (e.g., image, audio). With this implementation, it obtains subject goods that may have the authentication watermark embedded therein. It generates a humanly perceptible resultant pattern (e.g., image, audio) based, at least in part, upon the watermark detected in subject goods and the transformation matrix. If the detected watermark is the authentication watermark, then the resultant pattern and the pre-defined authentication pattern will match (or nearly so). At least one implementation, described herein, hides a secret key around the periphery of watermarked goods. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    • 这里描述的实施方式有助于对这些货物的来源的货物和/或标识的认证。 本文描述的至少一个实施方案以确定性方式将水印嵌入相对少量的数据。 至少一个本文描述的实施方案至少部分地基于认证水印和预定义的人为可感知的认证模式(例如,图像,音频)来生成认证转换矩阵。 通过这种实现,它获得可以将认证水印嵌入其中的对象商品。 至少部分地,基于在主题货物和变换矩阵中检测到的水印产生人为可感知的合成图案(例如,图像,音频)。 如果检测到的水印是认证水印,则所得到的模式和预定义的认证模式将匹配(或几乎相同)。 本文描述的至少一个实现在水印商品的周围隐藏秘密密钥。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。