SMARTCARD INTERFACE CONVERSION DEVICE, EMBEDDED SYSTEM HAVING THE SAME DEVICE AND METHOD FOR TRANSFERRING DATA SIGNAL USED IN THE SAME DEVICE
    1.
    发明申请
    SMARTCARD INTERFACE CONVERSION DEVICE, EMBEDDED SYSTEM HAVING THE SAME DEVICE AND METHOD FOR TRANSFERRING DATA SIGNAL USED IN THE SAME DEVICE 有权
    具有相同设备的智能卡接口转换设备,嵌入式系统以及用于传送在相同设备中使用的数据信号的方法

    公开(公告)号:US20150106648A1

    公开(公告)日:2015-04-16

    申请号:US14243089

    申请日:2014-04-02

    CPC classification number: G06F13/385 Y02D10/14 Y02D10/151

    Abstract: The present invention relates to an apparatus and a method for transferring a data signal between a smartcard interface and an interface of a processor within an embedded system.According to an exemplary embodiment of the present invention, an interface conversion device communicating between a processor and a smartcard IC chip includes: an input/output signal conversion logic configured to transfer a signal between a first interface of the processor and a second interface of the smartcard IC chip; a clock generator configured to generate a clock signal driving the smartcard IC chip depending on a first control signal received from the processor and provide the generated clock signal to the smartcard IC chip; and a reset controller configured to generate a reset signal depending on a second control signal received from the processor and provide the generated reset signal to the smartcard IC chip.

    Abstract translation: 本发明涉及一种用于在智能卡接口和嵌入式系统内的处理器的接口之间传送数据信号的装置和方法。 根据本发明的示例性实施例,在处理器和智能卡IC芯片之间通信的接口转换装置包括:输入/输出信号转换逻辑,被配置为在处理器的第一接口和第二接口之间传送信号 智能卡IC芯片; 时钟发生器,被配置为根据从处理器接收的第一控制信号产生驱动智能卡IC芯片的时钟信号,并将所生成的时钟信号提供给智能卡IC芯片; 以及复位控制器,被配置为根据从处理器接收到的第二控制信号产生复位信号,并将产生的复位信号提供给智能卡IC芯片。

    Apparatus and method for detecting malicious device based on swarm intelligence

    公开(公告)号:US10798115B2

    公开(公告)日:2020-10-06

    申请号:US15920114

    申请日:2018-03-13

    Abstract: Disclosed herein are an apparatus and method for detecting a malicious device based on swarm intelligence. The method includes detecting a malicious device by causing at least one exploration ant to access a device swarm along movement routes in which pheromone trail values are taken into consideration, wherein the exploration ant is generated in response to a detection request received from a security management server, when the at least one exploration ant detects a suspicious device that is suspected to be a malicious device, causing the exploration ant to return along the movement routes in reverse order, and returning pheromone trail values generated by devices on the return movement routes to a malicious device detection apparatus, and identifying whether the suspicious device is the malicious device by calculating an optimal solution based on a local information set generated by aggregating the pheromone trail values returned for movement routes.

Patent Agency Ranking