Access control system, access controller, access control method, program and recording medium
    21.
    发明专利
    Access control system, access controller, access control method, program and recording medium 有权
    访问控制系统,访问控制器,访问控制方法,程序和记录介质

    公开(公告)号:JP2005182707A

    公开(公告)日:2005-07-07

    申请号:JP2003426485

    申请日:2003-12-24

    CPC classification number: G06F21/6227 Y10S707/99931 Y10S707/99939

    Abstract: PROBLEM TO BE SOLVED: To effectively use a database while protecting privacy of a data provider.
    SOLUTION: This access control system controls access to the database which stores open information and confidential information of the data provider by associating them with each other. The system is provided with an output request acquisition part which acquires an output request for requesting output of information generated by accessing the database, a multiple item output permission part which inhibits output of information generated by combining the open information and the confidential information among pieces of output information the output of which is requested by the output request and permits output of information generated using the confidential information and without using the open information and an output part which outputs the information the output of which is permitted by the multiple item output approval part among the pieces of output information.
    COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:有效地使用数据库,同时保护数据提供者的隐私。

    解决方案:该访问控制系统通过将数据提供者彼此相关联来存储数据库的存储,该数据库存储数据提供者的公开信息和机密信息。 该系统设置有输出请求获取部分,其获取用于请求输出通过访问数据库生成的信息的输出请求;多项目输出许可部分,其禁止通过将打开信息和机密信息组合而产生的信息的输出 输出信息,其输出由输出请求请求,并允许使用机密信息生成的信息的输出,而不使用打开的信息;以及输出部,其输出由多项目输出许可部分允许的信息的输出部分 输出信息。 版权所有(C)2005,JPO&NCIPI

    ACCESS CONTROL SYSTEM, ACCESS CONTROL METHOD, STORAGE MEDIUM, AND PROGRAM TRANSMITTING DEVICE

    公开(公告)号:JP2001184264A

    公开(公告)日:2001-07-06

    申请号:JP35817899

    申请日:1999-12-16

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To make the permission of a conditional access possible to be evaluated in access control. SOLUTION: This access control system 100 is provided with a resource document 40 for storing policy description, a policy evaluating module 10 for accepting an access request 110 for performing access from the outside part to a data file and for extracting and evaluating policy description related with data to be accessed of the access request 110 from the resource document 40 and for deciding whether or not the access request 110 should be permitted, an executing function verifying module 20 for judging whether or not the evaluation or realization of a condition which can not be evaluated only from the information of the policy evaluating module 10 is possible when the condition is present in the extracted policy description, and an executing module 30 for executing the evaluation or realization of the condition whose evaluation or execution is determined as possible by the executing function verifying module 20.

    DEVICE AND METHOD FOR SYNTHESIZING SOLID MODEL

    公开(公告)号:JPH07110872A

    公开(公告)日:1995-04-25

    申请号:JP24538493

    申请日:1993-09-30

    Applicant: IBM JAPAN

    Abstract: PURPOSE:To synthesize a solid model from one plan view and one or plural cross-sectional drawings by combining resective closed areas solidified by a closed area solidifying means based upon the positional information of respective closed areas. CONSTITUTION:A drawing sorting means 600 sorts inputted two-dimensional drawing data into plan data and sectional drawing data. A closed area recognizing means 700 groups closed areas having the same attribute based upon the attributes of detected closed areas. An area solidifying means 800 divides the sectional drawing data based upon the data of each detected closed area, solidifies the closed area based upon, the divided sectional drawing data and solidifies a closed area other than the solidified closed area and belonging to the same group as the solidified closed area by the same method as the solidified closed area. A solid model synthesizing means 900 synthesizes a solid model by combining respective solidified closed areas based upon the positional information of respective detected closed areas.

    SOLID MODEL SYNTHESIZING DEVICE AND METHOD THEREFOR

    公开(公告)号:JPH0749960A

    公开(公告)日:1995-02-21

    申请号:JP18424493

    申请日:1993-07-26

    Applicant: IBM JAPAN

    Abstract: PURPOSE:To produce a solid model based on plural incomplete drawings. CONSTITUTION:The segments and curves of three drawings are calculated from the two-dimensional data on these drawings, and a wire frame model is produced based on those calculated segments and curves. The edge line of the wire frame model is compared with the segments or curves for correction of the frame model. Then the corrected wire frame model is converted into a sell division model. The conditions that correct at least one of three drawings are set by a Boolean equation, and a solid model is synthesized based on the combination of cells, i.e., the solution of the equation. When no solution is obtained from the equation, the candidate models are synthesized based on the optional combinations of cells. These candidate models are displayed in the order of higher resemblance. Meanwhile a candidate model is selected by an operator as a solid model when plural combinations of cells are obtained as the solutions. Then, three drawings are newly produced for the acquired solid model, and the original three drawings are completed based on these new drawings.

    DATA PROCESSING APPARATUS, DATA MANAGEMENT APPARATUS, DATA PROCESSING METHOD, DATA MANAGEMENT METHOD, DATA PROCESSING PROGRAM, DATA MANAGEMENT PROGRAM AND INFORMATION SYSTEM

    公开(公告)号:JP2006185220A

    公开(公告)日:2006-07-13

    申请号:JP2004378629

    申请日:2004-12-28

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To enable a data processing apparatus that uses data on a database by replication to efficiently detect an update on the database. SOLUTION: The data processing apparatus comprises a cache part for acquiring and caching a single cluster of data elements and cluster update information about the single cluster from a data management apparatus for storing a plurality of data elements by classification into a plurality of clusters, a cluster group update information acquisition part for acquiring cluster group update information about a cluster group of two or more clusters from the data management apparatus, a cluster group update information calculation part for calculating cluster group update information about the cluster group from two or more pieces of cluster update information, and an update determination part for, if the calculated cluster group update information matches the cluster group update information acquired from the data management apparatus, determining that the cached data elements in the cluster group is the latest. COPYRIGHT: (C)2006,JPO&NCIPI

    METHOD AND SYSTEM FOR DETECTION OF ADDITIONAL INFORMATION

    公开(公告)号:JP2000132513A

    公开(公告)日:2000-05-12

    申请号:JP30231998

    申请日:1998-10-23

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide a method and a system capable of safely detecting the additional information electronically embedded, at many and unspecified places. SOLUTION: A server reads the data where the additional information is embedded and then asks an anti-tamper device including a secret key to judge the embedding of the additional information. At the same time, the server reads a mask pattern out of the mask data, calculates the inner product of the mask pattern and the data including the embedded additional information and sends this inner product to the anti-tamper device. The anti-tamper device adds the inner product value sent from the server at the time of judging the embedding of the additional information and judges the threshold using the secret key. When the threshold is judged, a detecting mask pattern is produced from the secret key included in the anti-tamper device and the embedding of the additional information is judged based on the inner product value of the detecting mask pattern and the data received form the server.

    SECRET KEY FORMING SYSTEM
    28.
    发明专利

    公开(公告)号:JP2000066589A

    公开(公告)日:2000-03-03

    申请号:JP23454598

    申请日:1998-08-20

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To make it possible to safely disperse and generate secret keys to plural servers. SOLUTION: Random numbers are exchanged among the plural servers and the secret keys are generated in accordance therewith. By exchanging the random numbers between the two servers among the plural servers, the secret keys of the individual servers are no longer provided with periodicity but the period over the entire part of the system is maintained. Public keys for the plural secret keys are generated and are opened to public. The secret keys for the fresh public keys formed by the combination of the plural public keys are calculated by the secret keys of the individual servers. Key updating periods (by the sizes of secret key registers) are introduced to the respective servers so that decryption key information is made to appear only in the certain period. Time keys are generated by the periodic system. A plurality of the periodic systems are prepd. and are autonomously operated, and the safer time keys are generated.

    TIME RESTRICTION ENCRYPTION SYSTEM
    29.
    发明专利

    公开(公告)号:JPH11136230A

    公开(公告)日:1999-05-21

    申请号:JP32282597

    申请日:1997-11-25

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To obtain the system that is able to decode encryption data only when a decoding condition is satisfied by adopting the method where a user B requests issue of a time key certificate including disclosure time information to a time key certificate management device, the user B sends data encrypted by the acquired encryption public key to a user A, and the user A that requests a decoding key can acquire the decoding key only when the decoding condition is satisfied. SOLUTION: An information user requests service of information to an information server. The information server receiving the request of the information service from the information user requests provision of a time key certificate including encryption public key KEt to a time key certificate management device. The time key certificate management device sends G time key certificate including the encryption public key KEt the information server. The information user requests a decoding key to the time key certificate management device, receives the decoding key sent after a disclosure time, decodes the encrypted information M by using the decoding key to obtain the object information M.

    SYSTEM FOR HIDING IN AUTHENTICATION INFORMATION IS IMAGE AND IMAGE AUTHENTICATION SYSTEM

    公开(公告)号:JPH10164549A

    公开(公告)日:1998-06-19

    申请号:JP31752696

    申请日:1996-11-28

    Applicant: IBM JAPAN

    Abstract: PROBLEM TO BE SOLVED: To provide a new system capable of supplying authentication information in a form which is inseparable from an image data. SOLUTION: An image is halved and authentication information to hide in one image is obtained from the other image itself. Objective image data photographed by a digital camera is divided into an area D1 for generating a hush value and an area D2 for hiding a hush value H. A digest-calculating part calculates H from data of D1 and ciphers it by a secret key different for each digital camera, etc., to hide D2 , hiding can be executed by operating a pixel value in a real space or a frequency space to a degree of not being recognized visually. In D2 , additional information such as a time stamp, positional information of GPS can be hidden before hiding data from D1 .

Patent Agency Ranking