System setup phase Clause Samples

The System Setup Phase clause defines the initial period during which the necessary systems, equipment, or software are installed, configured, and tested before full operations begin. This clause typically outlines the responsibilities of each party, the timeline for setup activities, and any requirements for acceptance testing or verification of proper installation. Its core practical function is to ensure that all foundational elements are properly established and functioning before the main obligations of the contract commence, thereby reducing the risk of operational issues later on.
System setup phase. The server chooses an elliptic curve equation Ep (a, b) with the order n , which is defined in Section 3.
System setup phase. System setup is performed by GWN as follows, 1. GWN chooses a non-singular elliptic curve Ep(a, b) over a prime finite Zp, where p is a large prime. Let G be an elliptic curve group. Then, GWN chooses a generator P of order q over Ep. GWN selects its private key dGWN and computes the public key QGWN = dGWN P in accordance with dGWN. } 2. GWN selects three collision-resistant one-way hash functions h, H1, H2 : {0, 1}∗ → Zq. 3. Finally, the system parameters params = Ep(a, b), P, p, q, h, H1, H2, QGWN is published while the private key dGWN is kept secretly by GWN.
System setup phase. Given a security parameter k, the server S generates the system parameters as follows. (1) Choose a finite field Fp, where p is a k-bit prime. (2) Define an elliptic curve E : y2 ≡ x3 + ax + b mod p over Fp, where a, b ∈ Fp, p ≥ 3, 4a3 + 27b2 /= 0 mod p. (3) Choose a public point P with prime order q over E, and generate a cyclic additive group G of order q by point (4) Choose a random number s ∈ Z∗ as the master key and set Ppub = sP as the system public key. (5) Choose four cryptographic hash functions H1 : {0, 1}∗ × G → Z∗, H2 : {0, 1}∗ × G3 → {0, 1}k, H3 : {0, 1}∗ × G4 → {0, 1}k and H4 : {0, 1}∗ × G5 → {0, 1}k. (6) Publish the system parameters params = (Fq, E, G, P, Ppub, H1, H2, H3, H4) while keeping s secret.
System setup phase. Initially, the SA determines a large prime p and a
System setup phase. The server chooses an elliptic curve equation Ep (a, b) with the order n , which is defined in Section 3. Step S 2: The server selects a base point P with the order n over Ep (a, b) , where n is a large number of the security considerations. Then, the server chooses a random integer s ∈ Z * as a secret key and computes the public key P = sP .

Related to System setup phase

  • System Upgrades The Connecting Transmission Owner shall procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement. To the extent that design work is necessary in addition to that already accomplished in the Class Year Interconnection Facilities Study for the Interconnection Customer, the Connecting Transmission Owner shall perform or cause to be performed such work. If all the Parties agree, the Interconnection Customer may construct System Upgrade Facilities and System Deliverability Upgrades. 5.2.1 As described in Section 32.3.5.3 of the SGIP in Attachment Z of the ISO OATT, the responsibility of the Interconnection Customer for the cost of the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement shall be determined in accordance with Attachment S of the ISO OATT, as required by Section 32.3.5.3.2

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.