第一范文网 - 专业文章范例文档资料分享平台

Intellectual property metering(9)

来源:用户分享 时间:2021-06-02 本文由过分伤痛 分享 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:xxxxxx或QQ:xxxxxx 处理(尽可能给您提供完整文档),感谢您的支持与谅解。

From a more global point of view, intellectual property protection schemes, such as hardware metering, are traditionally treated within computational security. Cryptography is the study of techniques related to aspects of information security such as confidentiality, data integrity and entity authentication [34]. Computational security has even more broad scope and includes privacy protection, password protection, denial of service, and content usage measuring.

Modern cryptography started with introduction of one-way trapdoor function-based public-key cryptographical communication protocols by Diffie and Hellman [11]. In 1978, Rivest, Shamir and Adleman discovered the first practical sound public key encryp-tion and signature scheme based on exponential computational difficulty of factoring numbers which are the products of two large prime numbers. A number of excellent cryp-tographical textbooks are available [35, 34, 25].

Intellectual property protection of audio and video artifacts and hardware and soft-ware components and systems recently attracted a great deal of attention. For example, the Virtual Socket Interface Alliance has been making progress on standardizing SoC design and IP protection [38].

Multimedia watermarking schemes are utilizing minute alternations of audio or video so that the signature is embedded while human perceived quality of artifact is fully pre-served. For survey, see [18], Protecting design (hardware and software) IP is a broad and complex issue.

One method to enable design IP protection is based on the constraint manipulation. The basic idea is to impose additional author-specific constraints on the original IP speci-fication during its creation and/or synthesis. The copyright detector checks whether a syn-thesized IP block satisfies the author-specific constraints. The strength of the proof of authorship is proportional to the likelihood that an arbitrary synthesis tool incidentally sat-isfies all the added constraints [19, 32]. Similarly, to protect legal users of the IP, finger-prints are added to the IP as extra constraints [5]. Finally, copy detection techniques for VLSI CAD applications have been developed to find and prove improper use of the design IP [7,20]. These techniques are effective for authentication. However, since they make each design unique, it becomes ill-suited for mass-production and cannot be applied, at least not directly, and without significant modification, to hardware metering.

搜索“diyifanwen.net”或“第一范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,第一范文网,提供最新初中教育Intellectual property metering(9)全文阅读和word下载服务。

Intellectual property metering(9).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.diyifanwen.net/wenku/1204118.html(转载请注明文章来源)
热门推荐
Copyright © 2018-2022 第一范文网 版权所有 免责声明 | 联系我们
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:xxxxxx 邮箱:xxxxxx@qq.com
渝ICP备2023013149号
Top