[ / / / / / / / / / / / / / ] [ dir / bflo / games / hisrol / imouto / leftpol / rel / research / sapphic ]

/qresearch/ - Q Research Board

Research and discussion about Q's crumbs
Name
Email
Subject
Comment *
File
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options

Allowed file types:jpg, jpeg, gif, png, webm, mp4
Max filesize is 16 MB.
Max image dimensions are 15000 x 15000.
You may upload 5 per post.


Attention newfags: Leave the Name/Email field blank for your safety/anonymity. Do not create new threads. You may post in any thread already created. Thank you.

File: 5517ebc7d67eec2⋯.png (432.79 KB, 2048x1536, 4:3, IMG_0847.PNG)

15c7b4 No.1371484

F9 algorithm = Fast 9 algorithm?

"CORNER detection is used as the first step of many vision tasks such as tracking, localisation, SLAM (simultaneous localisation and mapping), image matching and recognition."

http://www.edwardrosten.com/work/fast.html

d22a7f No.1378750

http://www.3gpp.org/specifications/60-confidentiality-algorithms

https://en.wikipedia.org/wiki/KASUMI

http://www.tech-invite.com/3m35/tinv-3gpp-35-201.html

https://patents.google.com/patent/US7869590B2/en

http://www.heliontech.com/downloads/3gpp_kasumi_xilinx.pdf

https://www.cse.wustl.edu/~jain/cse574-06/ftp/cellular_security/

http://www.algorithminc.com/blog/bid/340800/Upgrade-to-Infor-F9-Version-5-For-Improved-Financial-Reporting


cbc1d9 No.1380768

Found this at the PTO. Relevant?

Method and system for hardware accelerator for implementing f9 integrity algorithm in WCDMA compliant handsets

http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN/7869590


1f80a1 No.1381326

Overview

The Helion 3GPP KASUMI cores perform the f8 confidentiality and f9 integrity algorithms required to provide data security within the GSM/EDGE and UMTS mobile communication standards. Both algorithms are based on the KASUMI 64-bit block cipher which uses a 128-bit key. The KASUMI algorithm was designed by the Security Algorithms Group of Experts (SAGE) within ETSI, and is an optimised version of the MISTY1 block cipher originally developed by Mitsubushi Electric Corporation of Japan. Within ETSI, the f8 and f9 algorithms are now known as UEA1 and UIA1 respectively.

http://www.heliontech.com/downloads/3gpp_kasumi_asic.pdf


1f80a1 No.1381334

F9 Microkernel

This is F9, an experimental microkernel used to construct flexible embedded systems inspired by famous L4 microkernel. The motivation of F9 microkernel is to deploy modern kernel techniques to support running real-time and time-sharing applications (for example, wireless communications) for ARM Cortex-M series microprocessors with efficiency (performance + power consumption) and security (memory protection + isolated execution) in mind.

….

..

……

https://github.com/f9micro/f9-kernel


1f80a1 No.1381684

US Patent US7869590B2

…..

The f9 integrity function generator 102 may be utilized in applications that may require the generation of an authentication code, MAC-I, for verifying the integrity of signaling data that may be utilized when a user equipment (UE), such as a mobile phone, transmits to a base station (BS) via a physical layer, for example. Moreover, the f9 integrity function generator 102 may also be utilized in applications that may require the generation of an authentication code when a radio network controller (RNC) transmits to a set of base stations via a physical layer, for example. An RNC may generally be adapted to control a set of base stations and may also be adapted to control other radio resources, for example. The UE or the RNC may generate the authentication code that is appended to the signaling data transmitted to a BS.

[in other words, as this anon reads it, the F9 algorithm as embedded in the hardware IC can connect itself to the network to transmit data]

https://patents.google.com/patent/US7869590


1f80a1 No.1381733

Facebook Patent #20150269212

..

Current data-logging techniques generally require a framework for logging data. If a system executes multiple applications, then each of the applications can have their own framework. For example, each of the applications would create tables or files that can store data in one or more formats, and the formats can differ between applications. Moreover, different applications can use different names for logging identical or similar data. For example, one application may log a user's name whereas a different application may log the user's identifier. Applications may also use different fieldnames for data. For example, an application, “App A” in the system can log an identification (ID) of a user as “ID No.” and another application, “App B” can log the same user ID as “User ID.” Conversely, the applications can use the same names to log data that can mean different things. For example, the “App A” can log an ID of a device as “ID No.” and the “App B” can log a user ID as “ID No.”. These inconsistencies can create problems in analyzing and understanding the logged data.

[as this anon reads it, a way to bundle and recognize identities across multiple network services]

http://www.freshpatents.com/-dt20150924ptan20150269212.php




[Return][Go to top][Catalog][Nerve Center][Cancer][Post a Reply]
[]
[ / / / / / / / / / / / / / ] [ dir / bflo / games / hisrol / imouto / leftpol / rel / research / sapphic ]