摘要:
A character recognition process is executed for image data written with text information, and a digital signature is given to the character recognition results and image data. The digital signature is given to data coupling both digest values of the character recognition results and image data. The digital signature is verified, a character recognition process is executed for the image data, and further a digest value of the character recognition results is calculated and compared with the digest value of the stored character recognition results. The location where both the digest values are incoincident is identified as an alteration position.
摘要:
A character recognition process is executed for image data written with text information, and a digital signature is given to the character recognition results and image data. The digital signature is given to data coupling both digest values of the character recognition results and image data. The digital signature is verified, a character recognition process is executed for the image data, and further a digest value of the character recognition results is calculated and compared with the digest value of the stored character recognition results. The location where both the digest values are incoincident is identified as an alteration position.
摘要:
Data protection techniques for preventing deletion, alteration, and leakage of data due to carelessness of a user and other programs (including a computer virus) and for preventing alteration of a program that uses the data are provided using a multi-OS control program, a host OS directly used by the user and a guest OS for managing files to be protected are run. A communication control program (110) determines whether access from a signature request program (107) can be performed or not, based on an access control list (119). In the case of access being authorized, a signature generation program (108) is executed. The signature generation program (108) generates a signature using a private-key (117). The communication control program (110) sends back the generated signature to a requesting source through an inter-OS communication program (111).
摘要:
Data protection techniques for preventing deletion, alteration, and leakage of data due to carelessness of a user and other programs (including a computer virus) and for preventing alteration of a program that uses the data are provided using a multi-OS control program, a host OS directly used by the user and a guest OS for managing files to be protected are run. A communication control program (110) determines whether access from a signature request program (107) can be performed or not, based on an access control list (119). In the case of access being authorized, a signature generation program (108) is executed. The signature generation program (108) generates a signature using a private-key (117). The communication control program (110) sends back the generated signature to a requesting source through an inter-OS communication program (111).
摘要:
To provide a verification record preservation function for keeping for a long time an evidential property of a verified signature to a user side apparatus (101-103) and to provide services for insuring reliability of a signature of a user. A verification record preservation program creates a verification log recording a verification object signature, a signature log and a deposited publication signature log entry that are used for verification. A publishing organization side apparatus (104) provides services that can reliably execute chain verification with reliability while taking convenience of users into consideration, such as a publication reminder service for preventing forgetfulness of publication, a publication notice for notifying publication of other user, verification vicarious execution for a user, and so forth.
摘要:
A reliably safe storage system is provided which makes provable the status of a file stored in a storage server at a time specified by a user and creates evidence information that will be effective in future. In response to a file status fixing request from the user (102) over a network (101), a storage server (103) generates file fixing guarantee data (1050), including data (1051) publicized by a publication server (105), and saves the generated data with the file associated with the generated data.
摘要:
A reliably safe storage system is provided which makes provable the status of a file stored in a storage server at a time specified by a user and creates evidence information that will be effective in future. In response to a file status fixing request from the user (102) over a network (101), a storage server (103) generates file fixing guarantee data (1050), including data (1051) publicized by a publication server (105), and saves the generated data with the file associated with the generated data.