G09C1/00

IDENTIFICATION ESTIMATE RISK EVALUATION APPARATUS, IDENTIFICATION ESTIMATE RISK EVALUATION METHOD, AND PROGRAM

An identification-estimation risk assessment apparatus includes a first calculation unit for calculating a first value Σ.sub.γPr[Δ(t)=t′∘γ], which is a sum related to all shuffles of a probability Pr[Δ(t)=t′∘γ] that a table Δ(t) obtained by anonymizing the original table t through randomization Δ coincides with a table t′∘γ represented as a composite of a shuffle γ and the anonymized table t′; a second calculation unit for calculating a second value Σ.sub.γ(r)=r′Pr[Δ(t)=t′∘γ], which is a sum related to a shuffle that satisfies γ(r)=r′ of the probability Pr[Δ(t)=t′∘γ]; and a third calculation unit for calculating a third value Σ.sub.γ(r)=r′Pr[Δ(t)=t′∘γ]/Σ.sub.γPr[Δ(t)=t′∘γ] as a risk assessment value of a risk that a record number r is identified and estimated as corresponding to a record number r′, based on the first value and the second value.

IDENTIFICATION ESTIMATE RISK EVALUATION APPARATUS, IDENTIFICATION ESTIMATE RISK EVALUATION METHOD, AND PROGRAM

An identification-estimation risk assessment apparatus includes a first calculation unit for calculating a first value Σ.sub.γPr[Δ(t)=t′∘γ], which is a sum related to all shuffles of a probability Pr[Δ(t)=t′∘γ] that a table Δ(t) obtained by anonymizing the original table t through randomization Δ coincides with a table t′∘γ represented as a composite of a shuffle γ and the anonymized table t′; a second calculation unit for calculating a second value Σ.sub.γ(r)=r′Pr[Δ(t)=t′∘γ], which is a sum related to a shuffle that satisfies γ(r)=r′ of the probability Pr[Δ(t)=t′∘γ]; and a third calculation unit for calculating a third value Σ.sub.γ(r)=r′Pr[Δ(t)=t′∘γ]/Σ.sub.γPr[Δ(t)=t′∘γ] as a risk assessment value of a risk that a record number r is identified and estimated as corresponding to a record number r′, based on the first value and the second value.

ENCRYPTED DATA ANALYSIS DEVICE, ENCRYPTED DATA ANALYSIS METHOD, AND PROGRAM

The encrypted data analysis device includes a sorting unit that sorts by [Time Information] and then sorts by [User ID] an encrypted data set group including a plurality of encrypted data sets, each of the plurality of encrypted data sets including a [Location ID], the [User ID], and the [Time Information], an encoding unit that generates a [Flow], and encoding the [Location ID] extracted, and an equal sign determination unit that determines whether a [User ID] and another [User ID] adjacent to each other are equal, and when not equal, replaces a corresponding [Flow] with a [predetermined value that represents invalid].

IMAGE ENCRYPTION METHOD BASED ON IMPROVED CLASS BOOSTING SCHEME

The present invention discloses an image encryption method based on an improved class boosting scheme, which comprises the following steps: acquiring parameters of a hyperchaotic system according to plaintext image information: generating weights required by class perceptron networks through the plain text image information: bringing the parameters into the hyperchaotic system to obtain chaotic sequences, and shuffling the chaotic sequences by a shuffling algorithm: pre-processing the chaotic sequences after shuffling to obtain a sequence required by encryption: and bringing a plaintext image and the sequence into an improved class boosting scheme to obtain a ciphertext image, wherein the improved class boosting scheme is realized based on the class perception networks. The method solves the problems that update and prediction functions in an original boosting network are too simple and easy to predict or the like, so as to obtain the ciphertext image with higher information entropy.

IMAGE RECOGNITION SYSTEM, IMAGE RECOGNITION SERVER, AND IMAGE RECOGNITION

An object of the present invention is to provide an image recognition system, an image recognition server, and an image recognition method having a new high security framework that can achieve utilization of multi-device diversity. The image recognition system according to the present disclosure includes a computationally non-intensive encryption algorithm based on random unitary transformation and achieves a high level of security. In addition, the image recognition system achieves high recognition performance by using ensemble learning to integrate recognition results based on the dictionaries of 4 different devices.

COMPUTATION SYSTEM AND COMPUTATION METHOD

A computation system according to the present disclosure includes: shuffling secure computation means for executing secure computation processing by shuffling; random bit sharing means for generating, as security parameters, K pieces of random data; and unauthorized action detecting secure computation means for determining that an exclusive OR operation of values for all rows obtained by multiplying the exclusive OR operation of each row of the tables before the shuffling processing for each data designated by the i-th random data by the i-th random bit of each row is the same as an exclusive OR operation of values for all rows obtained by multiplying the exclusive OR operation of each row of the tables after the shuffling processing for each data designated by the i-th random data by the i-th random bit of each row.

Physically unclonable function device, method and apparatus
11611444 · 2023-03-21 · ·

A physically unclonable function (PUF) device 1 capable of exhibiting a unique quantum mechanical effect as a result of quantum mechanical confinement exhibited by the device 1. The device 1 comprises a group IV semiconductor heterostructure. The group IV semiconductor heterostructure may comprise Silicon/Germanium. The device 1 may comprise a group IV semiconductor resonant tunnelling diode (RTD). A Si-integrated circuit, method, use, and apparatus are also provided.

Comprehensive framework for protecting intellectual property in the semiconductor industry

Methods and integrated circuit architectures for assuring the protection of intellectual property between third party IP providers, system designers (e.g., SoC designers), fabrication entities, and assembly entities are provided. Novel design flows for the prevention of IP overuse, IP piracy, and IC overproduction are also provided. A comprehensive framework for forward trust between 3PIP vendors, SoC design houses, fabrication entities, and assembly entities can be achieved, and the unwanted modification of IP can be prevented.

Comprehensive framework for protecting intellectual property in the semiconductor industry

Methods and integrated circuit architectures for assuring the protection of intellectual property between third party IP providers, system designers (e.g., SoC designers), fabrication entities, and assembly entities are provided. Novel design flows for the prevention of IP overuse, IP piracy, and IC overproduction are also provided. A comprehensive framework for forward trust between 3PIP vendors, SoC design houses, fabrication entities, and assembly entities can be achieved, and the unwanted modification of IP can be prevented.

CRYPTOGRAPHIC MRAM AND METHODS THEREOF
20220343030 · 2022-10-27 · ·

The present disclosure is drawn to, among other things, a storage device. The storage device may include a magnetic tunnel junction (MTJ)-based storage array and a communication interface. The MTJ-based storage array may be configured to be damaged by a shorting voltage based on detection of a tamper event.