Abstract:
There is provided a signature generation apparatus capable of preventing transcript attack on signature data. The signature generation apparatus for generating signature data for message data (i) acquires, according to a predetermined acquisition method, a private key, which is different from a private key used in a previous digital signature operation, from among a plurality of private keys generated using a key generation method of a signature scheme in which the plurality of private keys correspond to a single public key, and (ii) performs, using the acquired private key, a digital signature operation on the message data according to a signature method of the signature scheme to generate the signature data.
Abstract:
To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules 131 to 133 included in an apparatus 100 each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server 200. The monitoring patterns are restructured by the update server 200 such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.
Abstract:
Tampering monitoring system 10d can detect whether protection control module is tampered with even if some of detection modules are tampered with. Tampering monitoring system 10d includes protection control module 120d, n detection modules, and management device 200d. Protection control module 120d includes: generation unit 310d generating d pieces of distribution data from computer program, n and d being positive integers, d smaller than n; selection unit 311 d selecting d detection modules; and distribution unit 302d distributing d pieces of distribution data to d detection modules. Each detection module judges whether received piece of distribution data is authentic to detect whether protection control module is tampered with, and transmits judgment result indicating whether protection control module is tampered with. Management device 200d receives judgment results from d detection modules and manages protection control module with regard to tampering by using received judgment results.
Abstract:
The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks.
Abstract:
To aim provide a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server (200), a replacement protection control module (121) to be used for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations.
Abstract:
There is provided a signature generation apparatus capable of preventing transcript attack on signature data. The signature generation apparatus for generating signature data for message data (i) acquires, according to a predetermined acquisition method, a private key, which is different from a private key used in a previous digital signature operation, from among a plurality of private keys generated using a key generation method of a signature scheme in which the plurality of private keys correspond to a single public key, and (ii) performs, using the acquired private key, a digital signature operation on the message data according to a signature method of the signature scheme to generate the signature data.
Abstract:
PROBLEM TO BE SOLVED: To provide an alteration monitoring system with which an altered monitoring module can be identified without having increased amount of operations.SOLUTION: An information security apparatus 100c has a plurality of monitoring modules monitoring the alteration. A management device 200c includes a reception part 230c receiving monitoring results with respect to other monitoring modules by each monitoring module from the information security apparatus 100c, a detection part 220c detecting the abnormality using a part of monitoring results from the monitoring results received, a monitoring module of generation source of the monitoring results relating to the abnormality detected in the case in which the abnormality is detected, and a identification part 210c identifying the altered monitoring module from the monitoring modules identified by successively tracking the monitoring results from the corresponding monitoring module as the starting point to the generation source.
Abstract:
PROBLEM TO BE SOLVED: To provide a software update system for updating software more securely by enhancing reliability to software update processing in an apparatus. SOLUTION: An update server 200 obtains from the apparatus 100 a verification result relating to alteration of each update module included in a protection control module 120 and an update module group 130. The update server 200 determines a processing sequence of the apparatus 100 in accordance with an obtained verification apparatus. Concretely, when it is determined that both the protection control module 120 and the update module are improper, the update server 200 transmits an instruction to update the improper protection control module 120 to the apparatus 100 giving priority to the invalidation of the improper update module. COPYRIGHT: (C)2010,JPO&INPIT