Soluzioni Standard in presenza di un Software

La mimetizzazione

Un additivo di colori diversi e / o fosforescenti (S3) riveste due corpi interagenti (S1, S2) mimetizzandoli.

Allo stesso modo, un sistema (S1, S2) riceve un additivo estraneo (S3) per acquisire certe proprietà richieste.

Se è necessario migliorare l'effetto positivo e le condizioni non contengono alcuna limitazione all'introduzione di additivi in ​​determinate sostanze (S1, S2), il problema deve essere risolto introducendo nelle sostanze (S1, S2) additivi estranei (S3) che migliorano la controllabilità o conferiscono le proprietà richieste al modello di sistema.

CREATING AND IMPROVING INTERACTIONS

Il ruolo di questi additivi estranei (S3) è di "potenziare" o "amplificare" l'effetto dell'interazione esistente tra le due sostanze (S1, S2) nell'ambito del presente campo, o aumentare il grado di controllo sull'interazione.

A system and method for disguising and de-identifying data (S1) is provided.

One or more data transformation algorithms (S3) for disguising

specific types of data (S1), including first names, last names, company names, telephone numbers, addresses, social security numbers, and e-mail addresses, in addition to generic data,

are applied to the records to disguise or “scrub” confidential information therefrom.

The transformation algorithms (S3) retrieve substitute information from one or more lookup tables, or generate substitute information using in-memory manipulation rules, and produce output records containing the substitute information.

A computer-implemented method of camouflaging an application specific integrated circuit (ASIC) defined by camouflaged interconnected functional logic configured to perform an ASIC logical function, comprising the steps of:

generating, in the computer, a first logical description describing a first plurality of interconnected logical cells (S1) together performing the ASIC logical function, wherein at least one of the first plurality of logical cells performs a cell logical function;

generating, in the computer, a second logical description describing a second plurality of interconnected logical cells (S2) wherein the second plurality of interconnected logical cells includes a functionally inert camouflage element;

generating, in the computer, a logical description of the camouflaged interconnected functional logic by associating the second logical description with the cell logical function to insert the second plurality of logical cells into the at least one of the interconnected first plurality of logical cells performing the cell logical function without modifying the ASIC logical function of the first plurality of logical cells; and

generating, in the computer, a camouflaged ASIC design from the logical description of the camouflaged interconnected functional logic.