Abstract:
PROBLEM TO BE SOLVED: To provide a security system, an information processing system, a control method of the security system, a control method of the information processing system, a program capable of implementation in system for performing the control method, and a ticket system. SOLUTION: The security system 12 includes: a non-volatile type storing unit 22 for storing correctness inspection unit including a counter, which is renewed every time a signature function means 30 is called; a non-volatile type storing unit 24 for reading a counter array from an outer non-volatile storing unit for storing the counter array, in which a hash value generated for each signature key and a number-of-signature counter for counting the number of signature formed with the signature key are arranged in pairs, and storing the counter array; and a hash function unit 28 for reading the counter array from the non-volatile storing unit 24, generating a hash value, and feeding the hash value to the correctness inspection unit for correctness checking. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a system for minimizing procedures required for updating a cryptographic key by structuring the cryptographic key into tree structure. SOLUTION: First of all, plural keys more than the number of recipients are generated 710, and the plural keys are hierarchically arranged 720 in the form of tree structure. Next, the plural recipients are made correspondent to the keys hierarchically arranged in the form of tree structure, and the cryptographic keys of the respective recipients are generated as a key stream having keys from the root of tree structure to positions corresponding to the said recipients in the tree structure. Thus, after the cryptographic key is generated 730, the generated cryptographic key is distributed 740 to the correspondent recipient.
Abstract:
PURPOSE:To navigate a user who is unfamiliar with data base retrieval to the retrieval result that the user desires by dynamically applying a prepared view for itemized number display. CONSTITUTION:A retrieval execution part retrieves a book information data base 2004 at a request to retrieve book information. A book information retrieval mechanism 2018 consists of a key word retrieval mechanism 2020 which retrieves not only a key word list 2008, but also a synonym dictionary 2006 and a key word document correspondence table 2010 at a request for key word retrieval and an entire-text retrieval mechanism 2022 which retrieves indexes 2012 for entire-text retrieval at a request for entire-text retrieval. Then plural views which classify stored information by individual fixed viewpoints and display the number of constituent elements by the viewpoints are prepared. The views dynamically change associatively with one another in a process of retrieval according to the number of corresponding retrieval results and user's view selection processing.
Abstract:
PURPOSE:To convert an original sentence in a first language to a translated sentence in a second language with a high precision by flexibly selecting word meanings and translated words in the unit of word and phrase so that the original sentence and the translated sentence correspond to each other most suitably. CONSTITUTION:An input sentence in the first language is analyzed to a graph structure having nodal points and branches by an input analysis part 14. In a translated word selector 20, a variable introducing part 22 introduces variables in parts having ambiguity in the graph structure. Restrictions of these variables are propagated to the other parts by a restriction carcelling part 24 to obtain solutions of translated word determination in the other parts, and a contradictionless solution is locally obtained at every part. A variable materializing part 26 locally obtains a solution at every contradictionless part in accordance with the pattern of variables. An output sentence generating part 36 generates a sentence in the second language from a set of these solutions. Consequently, the combination explosion of original words and translate word which can occur at the time of analysis is avoided, and determination of words in the second language in ambiguous parts is delayed till the time just before sentence generation to utilize maximum information.
Abstract:
PROBLEM TO BE SOLVED: To reduce the communication number of a resource managing system by distributed servers by requesting the transmission of resources to at least, one servers among plural servers to gather the resources to transmit in the case that resources more than a requested one do not exist in a home server. SOLUTION: The system optimizes the number of transmission between the plural servers. Namely, it is first judged whether all the servers to which money has been transferred before are inspected or not (S420). In the case of judging that all of them are not inspected, increment is executed and a transmitting request is sent to a server of an i-numbered largest remainder in a remainder written estimate (S430, S440). Then, an answer from a server is waited (S450). When the answer comes from the server, the remainder of the i-numbered server of the remainder written estimate is updated to be a sent transmission amount (S460). The reason is that as the server sends a half of the possessed money of the server to a home server, the same amount is left on a sending side. Then, whether the money amount was sufficient is judged (S470) and when it is sufficient, the processing is finished.
Abstract:
PROBLEM TO BE SOLVED: To provide a mechanism which enables a digital ID to be used as a letter of attorney in a specific period for a specific purpose by using the temporary digital ID signed with an individual secret key. SOLUTION: A user (client 310) uses a temporary key generated temporarily by using his secret key for a signature requested by application on a server 320 instead of using his secret key (1). A temporary certificate of the temporary key is signed with the secret key of the user (2). Here, the temporary certificate contains information on a term of validity of use as the temporary certificate and information on the purpose of the use. When the application makes a request 330 to sign a document, the client 310 sends the document 340 signed with the temporary key, temporary certificate 40, and the certificate 360 of the user to the server 320. The server 320 confirms the signature first (3), confirm whether or not the temporary certificate is valid (whether the term of validity has expired and whether the certificate is for other applications) (4), and then confirms whether or not the temporary certificate has been signed by the correct user (5). Lastly, the validity of the certificate of the user is confirmed (6).
Abstract:
PURPOSE: To provide translation patterns for machine translation which a user can easily generate and efficiently retrieve. CONSTITUTION: A translation pattern 18 consists of an original language pattern 18A, a variable 18B obtained by substituting this original language pattern with one character, and an objective language pattern 18C as a translation corresponding to the original language pattern. The original language pattern includes a nest 19 where another original language pattern can be incorporated as a variable. A translation is generated based on the collation result between an input text and translation patterns. If there is no coincident translation patterns, the input text is translated by a general machine translation device based on grammar. Since the nest structure 19 is adopted, the user can easily generate many translation patterns based on a peculiar expression method, and customization is simplified. Further, indexes of a tree structure is generated to quickly perform the pattern collation.
Abstract:
PURPOSE: To provide a graph search method for discovering plural pieces of solutions of which the optimum characteristic is warranted, at a high speed. CONSTITUTION: The shortest cost between the arbitrary vertexs of a directed graph attached with the costs of the real values on the side between the vertexes and an end point t is calculated. Route development is executed sequentially toward the end point t the like a, a+1, while the low order is pruned according to set analysis conditions in accordance with the sum f(Xi) of the cumulation g(Xi) of the costs from the beginning point s and the shortest cost h(Xi) of the remaining routes with the partial routes from the beginning point s of the directed graph G. The high-order N-pieces of the optimum routes held at the point of the time when the search ends, are outputted. The shortest cost of the remaining routes is previously calculated and the development is performed for the plural routes in accordance with the analysis conditions while the cumulation of the cost from the beginning point is added thereto and, therefore, the plural characteristic and optimum characteristic of the solution are assured. In addition, the development is sequentially executed while the routes of the low-order cost values are pruned and, therefore, the high-speed characteristic of the processing is assured as well.
Abstract:
PROBLEM TO BE SOLVED: To provide techniques that allow indicating that a platform is reliable, without providing an attacker with information for attacks. SOLUTION: A device for measuring the configuration of a platform includes a configuration register; a means for performing a predetermined operation on the content of the configuration register using given additional values, then applying predetermined hash functions to values obtained from the operation to obtain hash values, and using the hash values as the new content of the configuration register; and measurement expansion means (step S1-S4) for making predetermined measurements on predetermined component elements that constitute the platform to obtain measurements that correspond to the component elements, and for implementing an expansion process using an expansion process means while using the measurements as additional values. The device is provided with a random expansion means (step S5) for implementing an expansion process using the expansion process means while using random values as additional values. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To prevent an input password from being stolen by an illegal authentication device. SOLUTION: An authentication device 10 for authenticating an inputting person in accordance with an input password received from the inputting person is provided with a first inputting part 110 for receiving a first part of the input password, a confirmation information outputting part 120 for outputting to a legal inputting person prenotified confirmation information showing the legal inputting person an effect that the authentication device 10 is legal, a second inputting part 130 for receiving a second part after the first part of the input password, and a determining part 140 for determining the inputting person to be legal when the first part and the second part are legal. COPYRIGHT: (C)2004,JPO&NCIPI