Abstract:
PROBLEM TO BE SOLVED: To effectively use a database while protecting privacy of a data provider. SOLUTION: This access control system controls access to the database which stores open information and confidential information of the data provider by associating them with each other. The system is provided with an output request acquisition part which acquires an output request for requesting output of information generated by accessing the database, a multiple item output permission part which inhibits output of information generated by combining the open information and the confidential information among pieces of output information the output of which is requested by the output request and permits output of information generated using the confidential information and without using the open information and an output part which outputs the information the output of which is permitted by the multiple item output approval part among the pieces of output information. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To make the permission of a conditional access possible to be evaluated in access control. SOLUTION: This access control system 100 is provided with a resource document 40 for storing policy description, a policy evaluating module 10 for accepting an access request 110 for performing access from the outside part to a data file and for extracting and evaluating policy description related with data to be accessed of the access request 110 from the resource document 40 and for deciding whether or not the access request 110 should be permitted, an executing function verifying module 20 for judging whether or not the evaluation or realization of a condition which can not be evaluated only from the information of the policy evaluating module 10 is possible when the condition is present in the extracted policy description, and an executing module 30 for executing the evaluation or realization of the condition whose evaluation or execution is determined as possible by the executing function verifying module 20.
Abstract:
PURPOSE:To synthesize a solid model from one plan view and one or plural cross-sectional drawings by combining resective closed areas solidified by a closed area solidifying means based upon the positional information of respective closed areas. CONSTITUTION:A drawing sorting means 600 sorts inputted two-dimensional drawing data into plan data and sectional drawing data. A closed area recognizing means 700 groups closed areas having the same attribute based upon the attributes of detected closed areas. An area solidifying means 800 divides the sectional drawing data based upon the data of each detected closed area, solidifies the closed area based upon, the divided sectional drawing data and solidifies a closed area other than the solidified closed area and belonging to the same group as the solidified closed area by the same method as the solidified closed area. A solid model synthesizing means 900 synthesizes a solid model by combining respective solidified closed areas based upon the positional information of respective detected closed areas.
Abstract:
PURPOSE:To produce a solid model based on plural incomplete drawings. CONSTITUTION:The segments and curves of three drawings are calculated from the two-dimensional data on these drawings, and a wire frame model is produced based on those calculated segments and curves. The edge line of the wire frame model is compared with the segments or curves for correction of the frame model. Then the corrected wire frame model is converted into a sell division model. The conditions that correct at least one of three drawings are set by a Boolean equation, and a solid model is synthesized based on the combination of cells, i.e., the solution of the equation. When no solution is obtained from the equation, the candidate models are synthesized based on the optional combinations of cells. These candidate models are displayed in the order of higher resemblance. Meanwhile a candidate model is selected by an operator as a solid model when plural combinations of cells are obtained as the solutions. Then, three drawings are newly produced for the acquired solid model, and the original three drawings are completed based on these new drawings.
Abstract:
PROBLEM TO BE SOLVED: To enable a data processing apparatus that uses data on a database by replication to efficiently detect an update on the database. SOLUTION: The data processing apparatus comprises a cache part for acquiring and caching a single cluster of data elements and cluster update information about the single cluster from a data management apparatus for storing a plurality of data elements by classification into a plurality of clusters, a cluster group update information acquisition part for acquiring cluster group update information about a cluster group of two or more clusters from the data management apparatus, a cluster group update information calculation part for calculating cluster group update information about the cluster group from two or more pieces of cluster update information, and an update determination part for, if the calculated cluster group update information matches the cluster group update information acquired from the data management apparatus, determining that the cached data elements in the cluster group is the latest. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide an information delivery system, in which the address of a receiver is not specified directly but is specified on the condition of combination of attributes and information can be received only by a person satisfying that condition. SOLUTION: The information delivery system comprises a server 10 managing a private key and a public key for specified attribute values, a user terminal 30 accessing the attribute management server 10 and acquiring an attribute private key corresponding to its own attributes created based on the private key, and a provider terminal 20 creating encrypted contents which can be decrypted by a user terminal 30 having an attribute private key for specified attributes using the public key. The provider terminal 20 delivers the encrypted contents, and the user terminal 30 decrypts the encrypted contents using its own attribute private key. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system capable of safely detecting the additional information electronically embedded, at many and unspecified places. SOLUTION: A server reads the data where the additional information is embedded and then asks an anti-tamper device including a secret key to judge the embedding of the additional information. At the same time, the server reads a mask pattern out of the mask data, calculates the inner product of the mask pattern and the data including the embedded additional information and sends this inner product to the anti-tamper device. The anti-tamper device adds the inner product value sent from the server at the time of judging the embedding of the additional information and judges the threshold using the secret key. When the threshold is judged, a detecting mask pattern is produced from the secret key included in the anti-tamper device and the embedding of the additional information is judged based on the inner product value of the detecting mask pattern and the data received form the server.
Abstract:
PROBLEM TO BE SOLVED: To make it possible to safely disperse and generate secret keys to plural servers. SOLUTION: Random numbers are exchanged among the plural servers and the secret keys are generated in accordance therewith. By exchanging the random numbers between the two servers among the plural servers, the secret keys of the individual servers are no longer provided with periodicity but the period over the entire part of the system is maintained. Public keys for the plural secret keys are generated and are opened to public. The secret keys for the fresh public keys formed by the combination of the plural public keys are calculated by the secret keys of the individual servers. Key updating periods (by the sizes of secret key registers) are introduced to the respective servers so that decryption key information is made to appear only in the certain period. Time keys are generated by the periodic system. A plurality of the periodic systems are prepd. and are autonomously operated, and the safer time keys are generated.
Abstract:
PROBLEM TO BE SOLVED: To obtain the system that is able to decode encryption data only when a decoding condition is satisfied by adopting the method where a user B requests issue of a time key certificate including disclosure time information to a time key certificate management device, the user B sends data encrypted by the acquired encryption public key to a user A, and the user A that requests a decoding key can acquire the decoding key only when the decoding condition is satisfied. SOLUTION: An information user requests service of information to an information server. The information server receiving the request of the information service from the information user requests provision of a time key certificate including encryption public key KEt to a time key certificate management device. The time key certificate management device sends G time key certificate including the encryption public key KEt the information server. The information user requests a decoding key to the time key certificate management device, receives the decoding key sent after a disclosure time, decodes the encrypted information M by using the decoding key to obtain the object information M.
Abstract:
PROBLEM TO BE SOLVED: To provide a new system capable of supplying authentication information in a form which is inseparable from an image data. SOLUTION: An image is halved and authentication information to hide in one image is obtained from the other image itself. Objective image data photographed by a digital camera is divided into an area D1 for generating a hush value and an area D2 for hiding a hush value H. A digest-calculating part calculates H from data of D1 and ciphers it by a secret key different for each digital camera, etc., to hide D2 , hiding can be executed by operating a pixel value in a real space or a frequency space to a degree of not being recognized visually. In D2 , additional information such as a time stamp, positional information of GPS can be hidden before hiding data from D1 .