CONTROL METHOD, CONTROL PROGRAM, AND INFORMATION PROCESSING DEVICE

    公开(公告)号:EP4224784A1

    公开(公告)日:2023-08-09

    申请号:EP20956342.8

    申请日:2020-10-02

    申请人: FUJITSU LIMITED

    IPC分类号: H04L9/32

    摘要: Processing is appropriately executed on data stored in a cloud service.
    An information processing device (10) detects a first data operation for a cloud service (31) executed by an information processing system (30) and notifies an information processing device (20) of content of the first data operation. The information processing device (20) determines first processing on data (D1) that is a target of the first data operation based on the notified content of the first data operation and instructs the information processing device (20) to execute the first processing. When instructed to execute the first processing, the information processing device (10) executes the first processing on the data (D1).

    VERIFICATION METHOD, VERIFICATION PROGRAM, AND INFORMATION PROCESSING DEVICE

    公开(公告)号:EP4224351A1

    公开(公告)日:2023-08-09

    申请号:EP20956267.7

    申请日:2020-09-30

    申请人: FUJITSU LIMITED

    IPC分类号: G06F21/64

    摘要: An information processing device (100) includes a storage unit (110) that stores signature pattern information (111) that represents a feature of one or a plurality of signatures regarding a document acquired in the past in association with a transmission source of the document. The information processing device (100) acquires a transmission source of a target document (101) and first signature pattern information (102) that represents a feature of one or a plurality of signatures regarding the target document (101), from a reception side of the target document (101). The information processing device (100) extracts second signature pattern information (103) associated with the transmission source of the target document (101), from the storage unit (110). The information processing device (100) verifies reliability of the target document (101) based on a result of comparing the acquired first signature pattern information (102) and the extracted second signature pattern information (103).

    ENCRYPTION PROCESSING DEVICE AND ENCRYPTION PROCESSING METHOD
    4.
    发明公开
    ENCRYPTION PROCESSING DEVICE AND ENCRYPTION PROCESSING METHOD 审中-公开
    VERSCHLÜSSELUNGSBEARBEITUNGSVORRICHTUNGUNDVERSCHLÜSSELUNGSBEARBEITUNGSVERFAHREN

    公开(公告)号:EP2555180A1

    公开(公告)日:2013-02-06

    申请号:EP10848844.6

    申请日:2010-03-31

    申请人: Fujitsu Limited

    IPC分类号: G09C1/00

    摘要: A cryptographic processing device includes a private key storage unit which stores a private key d for elliptic curve cryptography, a random number generation unit which generates a b-bit random value s, and a processing unit. A bit string D is the private key d or a bit string obtained by modifying the private key d in such a way that a value of a most significant bit is 0, and a relation u=mk+b holds true for a length u of the bit string D, a window size k, and a positive integer m. The processing unit determines a signed k-bit window value w [i] corresponding to each i where 0≤i≤(m-1), a signed b-bit random value s[i] corresponding to each i, and a correction value g. The processing unit determines the above values under a constraint condition in which D = g + ∑ i = 0 m - 1 2 ki + b ⁢ w i + 2 ki ⁢ s i holds true, while determining each random value s[i] to be +s or -s.

    摘要翻译: 密码处理装置包括存储用于椭圆曲线密码术的专用密钥d的私钥存储单元,生成b位随机值s的随机数生成单元和处理单元。 位串D是通过以最高有效位的值为0的方式修改私钥d而获得的私有密钥d或位串,并且关系u = mk + b对于长度u为 位串D,窗口大小k和正整数m。 处理单元确定对应于每个i的带符号的k位窗口值w [i],其中0‰¤‰¤(m-1),对应于每个i的带符号b位随机值s [i]和 校正值g。 在确定每个随机值s [i]的约束条件下,处理单元确定上述值,其中D = g +'i = 0 m - 1 2 ki + b ¢wi + 2 ki ¢si成立, 为+ s或-s。

    ENCRYPTING APPARATUS
    5.
    发明公开
    ENCRYPTING APPARATUS 审中-公开
    VERSCHLÜSSELUNGSVORRICHTUNG

    公开(公告)号:EP2348499A1

    公开(公告)日:2011-07-27

    申请号:EP08877255.3

    申请日:2008-10-07

    IPC分类号: G09C1/00

    摘要: An encrypting apparatus includes a digest part using a SHA-2 algorithm of which a basic unit of operation is 32*Y (Y=1 or 2) bits. The digest part includes a shift register including a series of registers, and a predetermined number of adders performing an addition operation based on data stored in the shift register. The shift register includes a (32*Y)/X-bit register, where X=2 k (k is an integer such that 1≤k≤4 when Y=1 and 1≤k≤5 when Y=2). Each of the adders has a data width of (32*Y)/X bits and performs the addition operation in each cycle in which the data stored in the shift register is shifted between the registers with the data width of (32*Y)/X bits.

    摘要翻译: 加密装置包括使用基本操作单元为32 * Y(Y = 1或2)位的SHA-2算法的摘要部分。 摘要部分包括一个包括一系列寄存器的移位寄存器和一个预定数量的加法器,它们基于存储在移位寄存器中的数据执行加法运算。 移位寄存器包括一个(32 * Y)/ X位寄存器,其中X = 2 k(k是一个整数,当Y = 1时为1‰¤k‰,Y = 1时为1‰¤k‰¤5) 2)。 每个加法器具有(32×Y)/ X位的数据宽度,并且在存储在移位寄存器中的数据在数据宽度为(32 * Y)/ X位置的寄存器之间移位的每个周期中执行相加操作, X位。

    ENCODING DEVICE, ENCODING METHOD AND PROGRAM
    6.
    发明公开
    ENCODING DEVICE, ENCODING METHOD AND PROGRAM 有权
    CODIERUNGSEINRICHTUNG,CODIERUNGSVERFAHREN UND PROGRAMM

    公开(公告)号:EP2237246A1

    公开(公告)日:2010-10-06

    申请号:EP08702793.4

    申请日:2008-01-18

    申请人: Fujitsu Limited

    IPC分类号: G09C1/00

    摘要: When processing a data conversion function of a MISTY structure, such as the FO function of MISTY1, the logical calculation result t3 of the exclusive OR 614 of the process result of the FI function 602 of the MISTY structure in the second stage and a logical calculation result t1 of an exclusive OR 612 of the MISTY structure in the first stage is not stored in a register. The logical calculation result t3 and the logical calculation result of respective exclusive OR 642 and 643 are subject to a direct exclusive OR with the respective exclusive OR 642 and 643.

    摘要翻译: 在处理MISTY结构的数据转换功能(例如MISTY1的FO功能)时,第二级的MISTY结构的FI功能602的处理结果的异或614的逻辑计算结果t3和逻辑计算 第一级的MISTY结构的异或612的结果t1不存储在寄存器中。 逻辑计算结果t3和各异或642和643的逻辑计算结果与各自的异或642和643进行直接异或。

    CONTROL METHOD, INFORMATION PROCESSING DEVICE, AND CONTROL PROGRAM

    公开(公告)号:EP4236191A1

    公开(公告)日:2023-08-30

    申请号:EP20958706.2

    申请日:2020-10-22

    申请人: FUJITSU LIMITED

    IPC分类号: H04L9/08

    摘要: Since distributed IDs do not have a control tower like a CA compared to centralized IDs, when a public key is compromised, the problematic public key remains in a repository for a long time, creating a risk of spoofing occurring in secure communication using the key. An information processing device executes processing of: detecting a risk to a first public key managed by a public key repository; performing update restriction of the first public key in response to the detection of the risk; authenticating an authenticator associated with the first public key; and releasing, in a case where the authentication of the authenticator succeeds, the update restriction. With this configuration, in one aspect, it is possible to suppress key update by a third party.

    PROCESSOR OF DATA CONVERSION FUNCTION
    9.
    发明公开
    PROCESSOR OF DATA CONVERSION FUNCTION 有权
    处理器的数据实施的作用

    公开(公告)号:EP2237245A1

    公开(公告)日:2010-10-06

    申请号:EP08702792.6

    申请日:2008-01-18

    申请人: Fujitsu Limited

    IPC分类号: G09C1/00 H04L9/06

    摘要: In a MISTY1 FI function, an exclusive OR 102 to which a round key KIij2 is inputted is arranged between an exclusive OR 101 arranged on a 9-bit critical path 100a in a first MISTY structure and a zero-extend conversion 120U connected to the branching point 301 of a 7-bit right system data path 110a. Then, a 9-bit round key KIij1 is truncate-converted to seven bits, the exclusive OR of the seven bits and the round key KIij1 is calculated by an exclusive OR 113 and the calculation result is inputted to an exclusive OR 112 arranged on the right system data path 110a in the second stage MISTY structure.

    VERIFICATION SYSTEM, INFORMATION PROCESSING DEVICE, VERIFICATION METHOD, AND VERIFICATION PROGRAM

    公开(公告)号:EP4280536A1

    公开(公告)日:2023-11-22

    申请号:EP21919319.0

    申请日:2021-01-14

    申请人: FUJITSU LIMITED

    IPC分类号: H04L9/32

    摘要: A verification system according to an aspect includes: a server configured to generate a hash value according to a first algorithm by using a public key associated with a user and a first message; and a terminal including a generation unit configured to generate a collision generation value by a second algorithm based on the first message, a second message, and a private key that is paired with the public key so that the hash value is generated in a case where the collision generation value is input to the first algorithm together with the public key and the second message, and a transmission unit configured to transmit the collision generation value and the second message to another terminal that is to be guaranteed that the second message has been provided by the user.