Abstract:
A method for providing a highly-safe and high-speed group key updating method. The method includes a step of executing a part of decoding processing for decoding an encrypted group key used for information decoding in a subscriber terminal before delivery of the group key, a step of delivering the group key and individual decoding information for each terminal device for executing a part of the remaining part of the decoding processing of the group key, and a step of executing in the subscriber terminal a group key decoding processing using the delivered decoding information and the result of the part of the decoding processing executed in advance
Abstract:
A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j>/=0) status value Sj, (b) a step of determining the (j+1)-th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.
Abstract:
PROBLEM TO BE SOLVED: To provide the access of a high security level to data having high secrecy such as registrant's privacy data with high reliability. SOLUTION: An access management system includes an authorization engine 34 for controlling access to a registrant database 44 which stores registrant data including the registrant' privacy data and uses a prescribed privacy policy and condition data designated by a registrant to control the access to the registrant database 44. The authorizing engine 34 includes an authorization determining part 36 for determining an access type from an access request received from the outside and using access authorization data determined previously to the access request in conjunction with the access type with respect to the registrant data to control a reference to the registrant database based on the access request. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide an identification information generating device, and an identification information solving device capable of generating/using a derivative ID wherein an unauthorized server or the like can not discriminate a relationship between a user ID and the derivative ID while providing a relationship between the user ID and the derivative ID which is another ID for identifying a user. SOLUTION: An ID generating device has a derivative value generating part for generating a derivative value, a user ID enciphering part for generating an enciphered ID generated by enciphering information including the user ID and the derivative value, and a derivative ID generating part for generating the derivative ID on the basis of the enciphered ID. An ID solution device has an enciphered ID extracting part for extracting the enciphered ID included in the derivative ID, an enciphered ID deciphering part for deciphering the enciphered ID on the basis of a decipher key with respect to a cipher key to generate a deciphered ID, and an ID determining part for determining that the derivative ID has been generated from the user ID when one part of the deciphered ID matches information generated on the basis of the user ID. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a cipher communication, system high in information security even though plural callers exist for a specific callee by adopting the server, which specifically conducts a decoding having secret keys, along with a transmitter and a receiver. SOLUTION: A transmitter 110 ciphers a message M by an open key ciphering means 112 and open keys P and N generated by a server 130 and a ciphered message M0 is transmitted to a receiver 120 by a ciphered message transmitting means 114. The receiver 120 generates a random number X by a random number generating means 122, the message M0, which is transmitted from the transmitter 110, is further ciphered by the number X in a ciphering means 124 and the ciphered message M1 is transmitted to the server 130. The server 130 decodes the transmitted and ciphered message M1 in a decoding means 136 employing the keys. The decoded message M2 is returned to the receiver 120 by a decoded message transmitting means 138.
Abstract:
PROBLEM TO BE SOLVED: To provide a server for accessing the information of tagged articles which is prevented from being grasped by a tag reader set in a public space without sacrificing traceability. SOLUTION: The server 103 includes a receiving means for receiving an encrypted ID included in the tag related to the articles scanned by using the tag reader, a transmitting means for transmitting a request which includes the encrypted ID and requests the network address of the second server 107 storing the information of the articles related to the tag to the first server 106, a receiving means for receiving the network address of the second server returned by the third server 105 according to the network address request from the first server generated by using article ID obtained by decoding the encrypted ID, and a transmitting means for transmitting the request for requesting the information of the articles to the second server by using the network address of the second server. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an efficient path verification technique, with which the entity which each item followed while each entity changed configurations of an item constellation is changed freely, and the sequence is verifiable, when a large number of items pass a plurality of entities. SOLUTION: The signature device has an item selecting input unit for receiving the selection of an item group which combined an item supplied by one or more contractors and an item which oneself generated further, an updating portion for retrofitting path verification of information about information for path verification, in order to verify the delivery path included in signature information over supplied item, and a signature information transmitter which transmits signature information creator which creates new signature information from signature which is created by itself, and updated information for path verification to the signature verification device. A signature verification device has a signature information receiver which receives new signature information, and a signature information verifier which verifies the delivery path of all items contained in the item constellation chosen from new signature information. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a data base retrieval system high in processing efficiency by ensuring the privacy of a retrieval request or the security of a data base. SOLUTION: This data base retrieval system is provided with a data base server 10i arranged on a network in which predetermined data are stored and a client terminal 20 for making a retrieval request related with the presence/absence of desired data to the data base server 10i by keeping the desired data secret. The data base server 10i is provided with a data base 11 in which predetermined data are stored and a retrieval response message generating part 12 for acquiring a retrieval request for the data wherein the data itself to be retrieved are kept secret through the network, and for retrieving a data base 11 by performing predetermined calculation while keeping secret data items associated with the retrieval request based on the retrieval request and the list of the data stored in the data base 11, and for generating a response to the retrieval request. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To realize encryption communication wherein a decoding right of an encrypted text is easily transferred under a prescribed limit. SOLUTION: An encryption communication system is provided with: a sender terminal 10 for encrypting a message and transmitting the encrypted message; a recipient terminal 20 for receiving and decoding the encrypted message; a proxy terminal 30 for decoding of the message on behalf of the recipient terminal 20; and a conversion server 40 for assisting the decoding of the message by the proxy terminal 30. The sender terminal 10 encrypts the message by using a public key of the recipient terminal 20. The recipient terminal 20 uses the public key of the conversion server 40, a prescribed restriction condition, and a private key for decoding the message to produce an entrusting key, whereby the message can be decoded under the restriction condition, and gives the key to the proxy terminal 30. The conversion server 40 authenticates the decoding right of the message by the proxy terminal 30 on the basis of the information included in the entrusting key from the proxy terminal 30. Then the proxy terminal 30 is authenticated by the conversion server 40 and decodes the message. COPYRIGHT: (C)2004,JPO
Abstract:
PURPOSE: To efficiently composite a precise solid model by using drawing data. CONSTITUTION: Closed areas are detected on the basis of shape drawing data to generate a closed area list 100, a tree structure is detected 200, and the list is converted into a symbol group as a set of symbols of elements of the outlines of the closed areas and symbols of connection relations of the elements 300. When the symbol group has a specific symbol, the symbol group is divided into plural symbol groups on the basis of the symbol 400. The symbol group, matching is performed 500 and the attributes, e.g. area of the closed areas are detected 600. The symbol groups are classified into symbol groups of closed areas of the same shape, and the symbol groups are further classified into symbol groups of closed areas of the same area 700. Symbol groups of closed areas having children of the closed areas of the same area of the same shape are selected out of the symbol groups of the closed areas of the same area of the same shape 800 and the solid model is composited 900.