Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

265 results about "Code space" patented technology

In computing, Code space may refer to: In memory address space: code space, where machine code is stored. For a character encoding: code space (or codespace), the range of code points.

Method of and system for testing equipment during manufacturing

A platform system for a mobile terminal for a wireless telecommunications system includes a mobile-terminal platform assembly. The mobile-terminal platform assembly includes a software services component having at least one functional software unit, a hardware component having at least one hardware unit associated with and controlled by the at least one functional software unit, and an interface component having at least one interface for providing access to the mobile-terminal platform assembly. The platform system also includes test application software loaded, installed, and run on the mobile-terminal platform assembly via the interface component. The test application software tests both software and hardware of the mobile terminal during both production testing and testing performed during a lifecycle of the mobile terminal. The test application software may be located in an unprotected code space of the mobile terminal in order to allow the test application software to be overwritten as needed to make space for other applications.
Owner:UNWIRED PLANET

Method of rate matching for link adaptation and code space management

A method of symbol combining and incremental redundancy for link adaptation and code space management was proposed. In order to reduce constraints on the Walsh codes allocation, MCS level change, as well as frame duration change for the initial transmission and re-transmissions, a “rate matching” stage is proposed between the Turbo encoder and block interleaver on the transmitter. In the initial transmission, the Turbo encoded symbols are interleaved with or without any puncturing or repeating (i.e. puncture/repeat factor is set to 1). The coded symbols are also stored in the memory for possible retransmissions. In the re-transmission, the transmitter first determines the number of Walsh codes available for this user and MCS level and frame duration according to the C/I feedback values from MS. The stored coded symbols are then punctured or repeated according to “rate matching factors”. On the receiver side, “rate matching factors” can be derived from the number of code channels, MCS level and frame duration of current re-transmissions and initial transmission. Then, de-puncturing/de-repeating is performed before coded symbol combining. A similar rate matching based IR/symbol combining scheme can be used to design different IR using different rate matching algorithms. It has low implementation complexity and is easily made backward compatible.
Owner:TEXAS INSTR INC

Processor extensions and software verification to support type-safe language environments running with untrusted code

Processor extensions and software verification to support type-safe language environments running with untrusted code. Code and data spaces are partitioned into trusted and untrusted regions. Type-safe code is loaded into the trusted region of the code space, while non-type-safe code is loaded into the untrusted region of the code space. The trusted region of the data space is allocated to the type-safe code. The untrusted region of the data space is allocated to the non-type-safe code. Hardware-based truth tables are employed for defining allowable and disallowable code sequences and memory access operations. For code sequences, allowable operations are based on the location (i.e., region) of a code sequence including a current instruction and a prior instruction. For memory access, the location of the requesting instruction and data requested are considered. Disallowed code sequence or memory access operations cause the processor to generate a safe access protection trap. In response to the safe access protection trap, a software-based dynamic verifier applies a security policy to determine whether to allow the operation to proceed.
Owner:INTEL CORP

Two-dimension code coding and decoding method and device based on local color verification

The invention discloses a two-dimension code coding and decoding method and devices based on local color verification. The coding method comprises the following steps of: generating coloring region data randomly according to a predefined coloring region coding and decoding table, and taking the generated coloring region data as a secret key to perform encryption so as to obtain two-dimension code generation information; generating two-dimension code black-and-white images by a two-dimension code generation algorithm; and finally coloring the generated two-dimension code black-and-white images according to the coloring region data to obtain local colored two-dimension code images. The decoding method comprises the following steps of: reading the coloring region data on the two-dimension code images, and using a standard two-dimension code decoding algorithm to decode; and performing decryption on the decoded information by taking the coloring region data as the secret key via a decipherment algorithm to obtain original information of the two-dimension cod images. By using the invention based on original black and white colors, the coloring region information is increased, coding space of two-dimension codes can be expanded, and counterfeited difficulty is increased.
Owner:SOUTH CHINA AGRI UNIV

Instruction optimization method and processor for AES (Advanced Encryption Standard) symmetric encryption algorithm

The invention discloses an instruction optimization method and an instruction processor for AES (Advanced Encryption Standard) symmetric encryption algorithm, wherein the instruction processor mainly comprises four parts of: a data memory, a code memory, a register file and an assembly line, wherein the assembly line comprises an addressing unit, a decoding unit, an execution unit and an assembly line controller. With the instruction optimization method, in the aspect of execution efficiency is reduced by 57.3x% relative to an ARM (Advanced RISC Machines) processor in a way that the clock periodicity required for AES_ASIP performing AES encryption algorithm is counted through periodic emulation, so that the execution efficiency of the algorithm is greatly improved; and in the aspect of code space, the instruction code occupies 783 bytes of memory space on the ARM processor, while the instruction code on the AES_ASIP just occupies 416 bytes of memory space, so that 46.6x% of code memory space is saved.
Owner:SHANDONG UNIV

Site sensing communication method of ad hoc wireless network

The invention discloses a site sensing communication method of an ad hoc wireless network, which comprises the following steps that: 1) all mobile and fixed entities in the communication process are equipped with wireless terminals and set as an ad hoc mode, and directly communicate in a point-to-point peer mode without needing a base station or center to transfer; 2) when the entity terminals encounter, the identity is recognized through neighbor discovery, and if the restriction stipulated by the route is met, mutual communication is triggered; otherwise, the entity terminals can delay the transfer and cache the held information until the restriction is met or time is up to discard the information; and 3) a node of each entity terminal can issue the public information thereof or the place thereof; and when the entity terminals encounter, data information interaction is performed according to the communication process so as to realize mutual sensing and recognition of the entities on the site. The method disclosed by the invention has a small code space, a high information transfer submission rate and high expandability and invulnerability, realizes point-to-point direct sensing communication, can obtain the site information around the actual environment of each terminal, and can be applied to the induction of traffic information.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Wireless network equipment upgrading program and communication data encryption method

The invention discloses a wireless network equipment upgrading program and communication data encryption method. Through simple grouping, XOR, shifting, interpolation processing and an SHA256 hash algorithm, encryption of an embedded upgrading program is realized; and high-reliability encryption of data blocks of the upgrading program is realized by using a cryptographic digest algorithm. When thegrouping, the XOR, the shifting and the interpolation processing are carried out in a program data encryption process each time, numerous random numbers are used; the random numbers and other key data form a cryptographic digest; a ciphertext of the upgrading program can be decrypted only through the cryptographic digest; and encrypted ciphertexts and cryptographic digests generated by encryptingthe same data in different encryption processing devices at different moments are different. According to the method, relatively few code spaces of a CPU of wireless network equipment are occupied; the requirement on the operation speed of the CPU is relatively low; the encryption of the upgrading program and the communication data can be realized by adopting the cheap CPU; and the security of equipment communication and the integrity of the data are ensured.
Owner:叶毅嵘

Biometric fingerprint authentication method based on quantum fuzzy commitment

InactiveCN102750529AStrengthen privacy and security protectionObvious superiorityCharacter and pattern recognitionStorage securityBiometric data
The invention discloses a biometric fingerprint authentication method based on a quantum fuzzy commitment, which comprises a registration phase and an authentication phase. The registration phase comprises the following steps of: firstly, constructing a fuzzy commitment set to produce code words required for the commitment phase by using a quantum error correcting code space without self-dual constraint, and applying a noise addition transformation used for fuzzy proving to the code word; and then, constructing a quantum hash algorithm, and mixing, diffusing and encrypting a random quantum sequence so as to realize the security of using one key at one time in the sense of information theory. The authentication phase comprises the following step of opening the fuzzy commitment set by using a quantum fuzzy commitment to obtain random information for decrypting keys Messa. A new quantum fuzzy commitment system is constructed by combing the quantum hash algorithm on the basis of entangling assistant quantum error correcting codes. Compared with other similar fingerprint authentication methods, the biometric fingerprint authentication method based on a quantum fuzzy commitment has prominent advantages in the aspects of storage security and authentication security of biometric data, and the quantum biometric performance and the security of biological template information storage and transmission can be increased.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products