[go: up one dir, main page]

Talmi et al., 2016 - Google Patents

NUVOTON TECHNOLOGY CORPORATION

Talmi et al., 2016

View PDF
Document ID
12771109638112950477
Author
Talmi Y
Heller G
Publication year

External Links

Snippet

This section contains document management and overview information. The Security Target (ST) identification provides the labelling and descriptive information necessary to identify, catalogue, register, and cross-reference a ST. The ST overview summarizes the ST in …
Continue reading at www.commoncriteriaportal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • G06K9/2054Selective acquisition/locating/processing of specific regions, e.g. highlighted text, fiducial marks, predetermined fields, document type identification
    • G06K9/2063Selective acquisition/locating/processing of specific regions, e.g. highlighted text, fiducial marks, predetermined fields, document type identification based on a marking or identifier characterising the document or the area
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06187Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with magnetically detectable marking
    • G06K19/06196Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • G06K9/2018Identifying/ignoring parts by sensing at different wavelengths
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30011Document retrieval systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00154Reading or verifying signatures; Writer recognition
    • G06K9/00161Reading or verifying signatures; Writer recognition based only on signature image, e.g. static signature recognition

Similar Documents

Publication Publication Date Title
Tomlinson Introduction to the TPM
Bittau et al. Wedge: Splitting applications into reduced-privilege compartments
Wang et al. Enabling security-enhanced attestation with Intel SGX for remote terminal and IoT
US20030041250A1 (en) Privacy of data on a computer platform
Paverd et al. Hardware security for device authentication in the smart grid
WO2020107104A1 (en) Personalized and cryptographically secure access control in operating systems
US20050021968A1 (en) Method for performing a trusted firmware/bios update
US20050283826A1 (en) Systems and methods for performing secure communications between an authorized computing platform and a hardware component
US9015454B2 (en) Binding data to computers using cryptographic co-processor and machine-specific and platform-specific keys
US20110131420A1 (en) Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms
England et al. Authenticated operation of open computing devices
Wang et al. Towards secure runtime customizable trusted execution environment on fpga-soc
Berbecaru et al. Counteracting software integrity attacks on IoT devices with remote attestation: a prototype
Crăciun et al. Malware in the SGX supply chain: Be careful when signing enclaves!
Sisinni Verification of software integrity in distributed systems
Talmi et al. NUVOTON TECHNOLOGY CORPORATION
Gopalan et al. Policy driven remote attestation
Menda-Shabat Security Target
Module Trusted Computing Group Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2; Level 2
Lioy et al. Trusted computing
Karch et al. Security Evaluation of Smart Cards and Secure Tokens: Benefits and Drawbacks for Reducing Supply Chain Risks of Nuclear Power Plants
Noller Security Target
Bravi et al. Implementation of the TCG DICE Specification into the Keystone TEE Framework
Romani Standard-Based Remote Attestation
Bruno Design and Implementation of Trusted Channels in the Keystone Framework