H04L9/34

SEMICONDUCTOR DEVICE AND SECURITY SYSTEM
20180083788 · 2018-03-22 ·

A semiconductor device is provided. The semiconductor device includes a unique-information generation portion, a detection portion, a memory portion, and a readout portion. The unique-information generation portion operates in a plurality of operation environments to generate unique information. The unique information includes stable information and unstable information. The stable information is constant in the plurality of operation environments, and the unstable information is different in at least two of the plurality of operation environments. The detection portion detects the unstable information. The memory portion stores the unique information and identification information for identifying the unstable information. The readout portion reads out the unique information and the identification information and outputs the unique information and the identification information to an external portion.

TRANSMISSION CIRCUIT, TRANSMISSION APPARATUS, AND METHOD FOR THE SAME
20180083789 · 2018-03-22 · ·

A transmission circuit includes: a transmission-side generation circuit configured to extract data at a predetermined byte position from user data to be transmitted, and to generate a transmission random pattern having a predetermined bit length by performing predetermined calculation processing using a value of the extracted data; a calculation circuit configured to generate transmission byte scrambled data by performing calculation on each byte of the user data and the generated transmission random pattern; a transmission-data coupling circuit configured to generate transmission scrambled data by coupling the generated transmission byte scrambled data and the data extracted by the transmission-side generation circuit; and a data-generation circuit configured to generate, from the transmission scrambled data, transmission data to be transmitted from the transmission circuit.

TRANSMISSION CIRCUIT, TRANSMISSION APPARATUS, AND METHOD FOR THE SAME
20180083789 · 2018-03-22 · ·

A transmission circuit includes: a transmission-side generation circuit configured to extract data at a predetermined byte position from user data to be transmitted, and to generate a transmission random pattern having a predetermined bit length by performing predetermined calculation processing using a value of the extracted data; a calculation circuit configured to generate transmission byte scrambled data by performing calculation on each byte of the user data and the generated transmission random pattern; a transmission-data coupling circuit configured to generate transmission scrambled data by coupling the generated transmission byte scrambled data and the data extracted by the transmission-side generation circuit; and a data-generation circuit configured to generate, from the transmission scrambled data, transmission data to be transmitted from the transmission circuit.

Transmitting a hidden communication

A first communication element is received on a communicating device. A defined mapping is identified based on an identification of a recipient device. The first communication element is mapped to a second communication element based on the defined mapping. The mapped communication element is provided to the recipient device.

Transmitting a hidden communication

A first communication element is received on a communicating device. A defined mapping is identified based on an identification of a recipient device. The first communication element is mapped to a second communication element based on the defined mapping. The mapped communication element is provided to the recipient device.

Systems and methods for storing and sharing transactional data using distributed computing systems
09794074 · 2017-10-17 · ·

A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactionsone between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.

Systems and methods for storing and sharing transactional data using distributed computing systems
09794074 · 2017-10-17 · ·

A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactionsone between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.

METHOD AND DEVICE FOR THE PROTECTION OF DATA INTEGRITY THROUGH AN EMBEDDED SYSTEM HAVING A MAIN PROCESSOR CORE AND A SECURITY HARDWARE MODULE
20170126701 · 2017-05-04 ·

A method for protecting data integrity through an embedded system having a main processor core and a security hardware module. The method includes the following: the main processor core generates transmit data, the security hardware module calculates a transmit message authentication code from the transmit data, the main processor core links the transmit data and the transmit message authentication code to form a transmit message, and the main processor core transmits the transmit message to a receiver.

Allocating mass storage to a logical server

Mass storage is allocated to a logical server. The logical server is deployed to a real server.

Allocating mass storage to a logical server

Mass storage is allocated to a logical server. The logical server is deployed to a real server.