ENCRYPTED COMMUNICATION SYSTEM, KEY DELIVERY SERVER THEREOF, TERMINAL DEVICE, AND KEY SHARING METHOD
    1.
    发明公开
    ENCRYPTED COMMUNICATION SYSTEM, KEY DELIVERY SERVER THEREOF, TERMINAL DEVICE, AND KEY SHARING METHOD 审中-公开
    加密通信系统,钥匙落客服务器确保终端设备和密钥共享处理

    公开(公告)号:EP1501237A4

    公开(公告)日:2005-06-29

    申请号:EP03720980

    申请日:2003-04-28

    Applicant: IBM

    CPC classification number: H04L9/0833 H04L9/0822 H04L9/0891

    Abstract: A method for providing a highly-safe and high-speed group key updating method. The method includes a step of executing a part of decoding processing for decoding an encrypted group key used for information decoding in a subscriber terminal before delivery of the group key, a step of delivering the group key and individual decoding information for each terminal device for executing a part of the remaining part of the decoding processing of the group key, and a step of executing in the subscriber terminal a group key decoding processing using the delivered decoding information and the result of the part of the decoding processing executed in advance

    DATA HIDING METHOD AND DATA EXTRACTING METHOD
    2.
    发明申请
    DATA HIDING METHOD AND DATA EXTRACTING METHOD 审中-公开
    数据隐藏方法和数据提取方法

    公开(公告)号:WO9749235A8

    公开(公告)日:2001-07-26

    申请号:PCT/JP9700395

    申请日:1997-02-13

    Applicant: IBM JAPAN IBM

    Abstract: A data hiding method for hiding message data in media data and a data extracting method for extracting message data hidden in the media data. In the data hiding method, the message data are dispersedly hidden in the media data so that no third person can alter the message data. Specifically, the array elements of a message array are dispersedly hidden in a media array based on a status value S designating a specific array element in the media array when the media data and message data are expressed as the media array and the message array, respectively. The hiding method includes (a) a step of determining the j-th (j>/=0) status value Sj, (b) a step of determining the (j+1)-th status value Sj+1 based on the value Sj, the array element of the media array designated by the value Sj and the above-mentioned array element of the message array, and (c) a step of hiding data to be hidden in the array element of the media array designated by the value Sj+1.

    Abstract translation: 用于在媒体数据中隐藏消息数据的数据隐藏方法和用于提取隐藏在媒体数据中的消息数据的数据提取方法。 在数据隐藏方法中,消息数据被分散地隐藏在媒体数据中,使得没有第三人可以改变消息数据。 具体地说,当媒体数据和消息数据被分别表示为媒体数组和消息数组时,消息数组的数组元素基于指定媒体阵列中的特定数组元素的状态值S而被分散地隐藏在媒体数组中 。 隐藏方法包括(a)确定第j(j> / = 0)状态值Sj的步骤,(b)基于该值确定第(j + 1)状态值Sj + 1的步骤 Sj,由值Sj指定的媒体阵列的数组元素和消息数组的上述数组元素,以及(c)隐藏要由值指定的媒体阵列的数组元素中隐藏的数据的步骤 SJ + 1。

    Access management system and method, computer executable program for making computer implement the access control management method, and computer readable storage medium with the program stored therein
    3.
    发明专利
    Access management system and method, computer executable program for making computer implement the access control management method, and computer readable storage medium with the program stored therein 有权
    访问管理系统和方法,用于制作计算机执行访问控制管理方法的计算机可执行程序和存储有程序的计算机可读存储介质

    公开(公告)号:JP2004295763A

    公开(公告)日:2004-10-21

    申请号:JP2003090138

    申请日:2003-03-28

    CPC classification number: G06F21/6227 G06F21/6245 G06F2221/2141

    Abstract: PROBLEM TO BE SOLVED: To provide the access of a high security level to data having high secrecy such as registrant's privacy data with high reliability. SOLUTION: An access management system includes an authorization engine 34 for controlling access to a registrant database 44 which stores registrant data including the registrant' privacy data and uses a prescribed privacy policy and condition data designated by a registrant to control the access to the registrant database 44. The authorizing engine 34 includes an authorization determining part 36 for determining an access type from an access request received from the outside and using access authorization data determined previously to the access request in conjunction with the access type with respect to the registrant data to control a reference to the registrant database based on the access request. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:提供高安全级别对具有高度可靠性的注册人隐私数据的高度保密性的数据的访问。 解决方案:访问管理系统包括授权引擎34,用于控制对注册者数据库44的访问,该注册者数据库存储包括注册人隐私数据的注册人数据,并使用注册人指定的规定的隐私策略和条件数据来控制访问权限 授权引擎34包括授权确定部分36,用于根据从外部接收到的访问请求来确定访问类型,并且使用先前对访问请求确定的访问授权数据以及相对于注册者的访问类型 数据以根据访问请求来控制对注册人数据库的引用。 版权所有(C)2005,JPO&NCIPI

    CIPHER COMMUNICATION METHOD AND SYSTEM THEREFOR

    公开(公告)号:JPH10301491A

    公开(公告)日:1998-11-13

    申请号:JP11082297

    申请日:1997-04-28

    Applicant: IBM JAPAN

    Inventor: NUMAO MASAYUKI

    Abstract: PROBLEM TO BE SOLVED: To provide a cipher communication, system high in information security even though plural callers exist for a specific callee by adopting the server, which specifically conducts a decoding having secret keys, along with a transmitter and a receiver. SOLUTION: A transmitter 110 ciphers a message M by an open key ciphering means 112 and open keys P and N generated by a server 130 and a ciphered message M0 is transmitted to a receiver 120 by a ciphered message transmitting means 114. The receiver 120 generates a random number X by a random number generating means 122, the message M0, which is transmitted from the transmitter 110, is further ciphered by the number X in a ciphering means 124 and the ciphered message M1 is transmitted to the server 130. The server 130 decodes the transmitted and ciphered message M1 in a decoding means 136 employing the keys. The decoded message M2 is returned to the receiver 120 by a decoded message transmitting means 138.

    Method of accessing information of tagged goods, local server, ons proxy, program, method of making tag, apparatus equipped with tag writer, tag, and control program of apparatus equipped with tag writer
    6.
    发明专利
    Method of accessing information of tagged goods, local server, ons proxy, program, method of making tag, apparatus equipped with tag writer, tag, and control program of apparatus equipped with tag writer 有权
    标签商品信息的获取方法,本地服务器,代理程序,程序,制作标签的方法,装有TAG标签的装置,标签,以及用TAG WRITER装备的装置的控制程序

    公开(公告)号:JP2010191978A

    公开(公告)日:2010-09-02

    申请号:JP2010086889

    申请日:2010-04-05

    CPC classification number: G06K17/0022 H04L63/0428 H04L63/0492 H04L63/08

    Abstract: PROBLEM TO BE SOLVED: To provide a server for accessing the information of tagged articles which is prevented from being grasped by a tag reader set in a public space without sacrificing traceability. SOLUTION: The server 103 includes a receiving means for receiving an encrypted ID included in the tag related to the articles scanned by using the tag reader, a transmitting means for transmitting a request which includes the encrypted ID and requests the network address of the second server 107 storing the information of the articles related to the tag to the first server 106, a receiving means for receiving the network address of the second server returned by the third server 105 according to the network address request from the first server generated by using article ID obtained by decoding the encrypted ID, and a transmitting means for transmitting the request for requesting the information of the articles to the second server by using the network address of the second server. COPYRIGHT: (C)2010,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种用于访问被标记物品的信息的服务器,其被阻止被设置在公共空间中的标签读取器所掌握,而不牺牲可追溯性。 服务器103包括:接收装置,用于接收与通过使用标签读取器扫描的文章相关的标签中包含的加密ID;发送装置,用于发送包括加密ID的请求,并请求网络地址 第二服务器107将与标签有关的文章的信息存储到第一服务器106;接收装置,用于根据第一服务器生成的网络地址请求接收由第三服务器105返回的第二服务器的网络地址 使用通过解码加密的ID获得的文章ID;以及发送装置,用于通过使用第二服务器的网络地址向第二服务器发送请求文章的信息的请求。 版权所有(C)2010,JPO&INPIT

    Traceability signature system, signature method and program
    7.
    发明专利
    Traceability signature system, signature method and program 有权
    可追溯性签名系统,签名方法和程序

    公开(公告)号:JP2007013745A

    公开(公告)日:2007-01-18

    申请号:JP2005193237

    申请日:2005-07-01

    Abstract: PROBLEM TO BE SOLVED: To provide an efficient path verification technique, with which the entity which each item followed while each entity changed configurations of an item constellation is changed freely, and the sequence is verifiable, when a large number of items pass a plurality of entities.
    SOLUTION: The signature device has an item selecting input unit for receiving the selection of an item group which combined an item supplied by one or more contractors and an item which oneself generated further, an updating portion for retrofitting path verification of information about information for path verification, in order to verify the delivery path included in signature information over supplied item, and a signature information transmitter which transmits signature information creator which creates new signature information from signature which is created by itself, and updated information for path verification to the signature verification device. A signature verification device has a signature information receiver which receives new signature information, and a signature information verifier which verifies the delivery path of all items contained in the item constellation chosen from new signature information.
    COPYRIGHT: (C)2007,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种有效的路径验证技术,每个项目跟随的实体随着每个实体改变项目星座的配置而自由地改变,并且该序列是可验证的,当大量的项目通过时 多个实体。 解决方案:签名装置具有项目选择输入单元,用于接收组合由一个或多个承包商提供的项目和进一步生成的项目的项目组的选择,用于改编关于 用于路径验证的信息,以验证包含在所提供项目中的签名信息中的传递路径;以及签名信息发送器,其发送签名信息创建者,其从通过其自己创建的签名生成新的签名信息,以及用于路径验证的更新信息, 签名验证设备。 签名验证装置具有接收新的签名信息的签名信息接收器,以及验证从新的签名信息中选择的项目星座中包含的所有项目的传递路径的签名信息验证器。 版权所有(C)2007,JPO&INPIT

    Encryption communication system, terminal apparatus and server therefor, and decoding method

    公开(公告)号:JP2004015241A

    公开(公告)日:2004-01-15

    申请号:JP2002163510

    申请日:2002-06-04

    CPC classification number: H04L9/3013 H04L2209/76

    Abstract: PROBLEM TO BE SOLVED: To realize encryption communication wherein a decoding right of an encrypted text is easily transferred under a prescribed limit.
    SOLUTION: An encryption communication system is provided with: a sender terminal 10 for encrypting a message and transmitting the encrypted message; a recipient terminal 20 for receiving and decoding the encrypted message; a proxy terminal 30 for decoding of the message on behalf of the recipient terminal 20; and a conversion server 40 for assisting the decoding of the message by the proxy terminal 30. The sender terminal 10 encrypts the message by using a public key of the recipient terminal 20. The recipient terminal 20 uses the public key of the conversion server 40, a prescribed restriction condition, and a private key for decoding the message to produce an entrusting key, whereby the message can be decoded under the restriction condition, and gives the key to the proxy terminal 30. The conversion server 40 authenticates the decoding right of the message by the proxy terminal 30 on the basis of the information included in the entrusting key from the proxy terminal 30. Then the proxy terminal 30 is authenticated by the conversion server 40 and decodes the message.
    COPYRIGHT: (C)2004,JPO

    DEVICE AND METHOD FOR COMPOSITING SOLID MODEL

    公开(公告)号:JPH0896164A

    公开(公告)日:1996-04-12

    申请号:JP23369594

    申请日:1994-09-28

    Applicant: IBM JAPAN

    Abstract: PURPOSE: To efficiently composite a precise solid model by using drawing data. CONSTITUTION: Closed areas are detected on the basis of shape drawing data to generate a closed area list 100, a tree structure is detected 200, and the list is converted into a symbol group as a set of symbols of elements of the outlines of the closed areas and symbols of connection relations of the elements 300. When the symbol group has a specific symbol, the symbol group is divided into plural symbol groups on the basis of the symbol 400. The symbol group, matching is performed 500 and the attributes, e.g. area of the closed areas are detected 600. The symbol groups are classified into symbol groups of closed areas of the same shape, and the symbol groups are further classified into symbol groups of closed areas of the same area 700. Symbol groups of closed areas having children of the closed areas of the same area of the same shape are selected out of the symbol groups of the closed areas of the same area of the same shape 800 and the solid model is composited 900.

Patent Agency Ranking