Unlock instant, AI-driven research and patent intelligence for your innovation.
Computing device for iterative applications of tabular networks
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
一种计算设备、表格的技术,应用在计算机程序领域
Inactive Publication Date: 2020-02-07
KONINKLIJKE PHILIPS NV
View PDF6 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
The resulting algorithm only works for one specific key
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0046] While admitting of many different forms of embodiments, it is the understanding that the disclosure is to be considered as illustrative of the principles of the invention and that there has been shown in the drawings and will be described in detail herein. It is not intended that the invention be limited to the particular embodiment shown and described.
[0047] Figure 1a is a schematic block diagram of a synthetic tabular network 100 .
[0048] Computing devices may be protected against attacks by performing all or a portion of the computing device's computations over a network of tables. Table networks can be secured by encoding variables and tables. Regardless, attack remains a concern. One possible attack vector is to modify the table, run the calculation and see what effect the modification has. In this way, an attacker can gain insight into the encryption used. To cope with this, state variables can be introduced in addition to data variables. A state variab...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
A computing device (500) comprising an electronic storage device (510) and an electronic processor (550) coupled to the storage device, the storage device storing a sequence of a network of tables (110, T 1 , T 2 ), the processor is configured by applying the tabular network of the tabular network sequence to the global data input (121,w 0 ) and the global state input (121,s 0 ) on computed iterated functions, ‑sequences of tabular networks (112, 114, T i ) configured for the corresponding data function (f i ) and the state function (g i ), and configured according to the corresponding data function (f i ) to feed the data into (121, 122, w i‑1 ) maps to the data output (122, 123, w i ) and at the same time according to the state function (g i ) puts the state into (121, 122, s i‑1 ) is mapped to the state output (122, 123, s i ), ‑ the electronic processor is configured to iteratively feed the global data input (w 0 ) and the global state input (s 0 ) to apply a sequence of tabular networks (T 1 ,T 2 ,T 1 ,T 2 ), the tabular network in the iteratively applied tabular network (T 1 ), and successive tabular networks of the iteration applying the iteration to the data output and state output of the previous tabular network of the sequence (T 2 ,T 1 ,T 2 ), the iterative application of the sequence determines the global data function on the global data input and the global state function on the global state input, thereby obtaining the intermediate data output (w inter =f(w 0 )) and intermediate state output (s inter =g(s 0 )), - the electronic storage device also stores a protected table network (150) configured to cooperate with the sequence of table networks for modifications made to the sequence of table networks, the protected table network configured to receive as input: intermediate status output (126, s inter ) and the global state input (131, s 0 ), the protection tabular network is configured to verify that it is applied to the global state input (s 0 ) of the global state function (g) produces an intermediate state output (s inter =g(s 0 )?).
Description
technical field [0001] The invention relates to a computing device comprising an electronic storage device storing a network of tables and an electronic processor coupled to the storage device, the processor being configured to compute a function by applying the table network. [0002] The invention also relates to computing methods, compilers and corresponding computer programs. Background technique [0003] In traditional cryptography, it is typically assumed that an attacker only gains access to the input and output values of the secure system. For example, an attacker would be able to observe plain text going into the system and observe encrypted text coming out of the system. Although an attacker may try to gain an advantage by analyzing such input / output pairs, possibly even using computationally intensive methods, he is not considered to have direct access to the system implementing the input / output behavior. [0004] More recently, it has become necessary to cons...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.