摘要:
Content (120) is divided (401) into a of partial contents (500). Next, each of the partial contents (500) is encrypted (403) using a browsing-control-use secret key (508). Also, an editing-control-use secret key (506) and a partial-content validation key (507) are generated (402), then generating the feature value (505) for each of the partial content (500). Moreover, key-encrypted data (503) is generated (405) by encrypting the browsing-control-use secret key (508) and the editing-control-use secret key (506) corresponding to each of the browsable and editable partial contents, using the public key (511) of a user. Finally, encrypted content (121) is generated (407) from the key-encrypted data (503), encrypted partial contents (504), and the partial-content validation key (507).
摘要:
A reliably safe storage system is provided which makes provable the status of a file stored in a storage server at a time specified by a user and creates evidence information that will be effective in future. In response to a file status fixing request from the user (102) over a network (101), a storage server (103) generates file fixing guarantee data (1050), including data (1051) publicized by a publication server (105), and saves the generated data with the file associated with the generated data.
摘要:
An encryption processing part of a controller of each of user devices specifies components of content as encryption target parts, creates an encryption key creation key by reading out a public key, for each of the encryption target parts, of a second user who is allowed to view the encryption target part, raising a secret key of an administrator of the content data to the power of the public key thus read out, and calculating a remainder, encrypts random numbers each corresponding to each of the encryption target parts by using the encryption key creation key, creates an encryption key for each of the encryption target parts, and encrypts, by using the encryption key created for each of the encryption target parts, each of the encryption target parts corresponding to the encryption key.
摘要:
A network system capable of preventing the leakage of a confidential file (107) by an inadvertent act of a transmitting party and capable of meeting the requirement for an arbitrary file format is disclosed. A label indicating a security level (202; 1402) ("confidential" or "unclassified") is attached to the file (107) in a client terminal (101), which transmits the labeled file (107) outside. A transmission management program (119) on a gateway server (118) checks the label of the file (107), and in the case where the security level (202; 1402) is "unclassified", transmits the file (107) to an external network (121). Also, a label management program (109) manages the labeled file (107) in the client terminal (101).
摘要:
Techniques of improving the safety of an information processing system (1001) at low cost are provided, the information processing system having an OS provided with an access control function based upon discretionary access control for preventing illegal accesses to files. A method and apparatus for providing the information processing system with functions and areas (1007) usable only by a specific user different from a system administrator. The areas are provided with an access control function in order to prevent the access control function from being tampered.
摘要:
The present invention provides an electronic document authenticity assuring method in which a series of procedures concerning redactable signature are divided into procedures dependent on a document to be signed and procedures dependent on a redactable signature method. Further, the present invention provides program codes that realize the divided procedures and a system comprising apparatuses for implementing those program codes. According to the present invention, even when type of electronic document to be signed is changed or added to, it is sufficient to add a procedure dependent on a document to be signed, without changing procedures dependent on redactable signature methods. Similarly, even when a redactable signature method is to be changed or added, it is sufficient to add a procedure dependent on the redactable signature method without changing procedures dependent on document to be signed.
摘要:
According to the present invention, techniques, including a method and system, for restoring and/or validating data and/or associated signature log entries are provided. One embodiment of the present invention provides a method for validating a restored message, having an entry generated in a signature log for a message, where the entry includes cryptographic information associated with the message; Next, when message is lost, the restored message is generated responsive to a request; and the restored message is validated using the signature log. In another embodiment a method for validating a selected log entry by using a signature log having a plurality of recorded log entries is provided. The method includes: computing a cryptographic value for the selected log entry; and determining if the cryptographic value is part of another recorded log entry.
摘要:
To provide a verification record preservation function for keeping for a long time an evidential property of a verified signature to a user side apparatus (101-103) and to provide services for insuring reliability of a signature of a user. A verification record preservation program creates a verification log recording a verification object signature, a signature log and a deposited publication signature log entry that are used for verification. A publishing organization side apparatus (104) provides services that can reliably execute chain verification with reliability while taking convenience of users into consideration, such as a publication reminder service for preventing forgetfulness of publication, a publication notice for notifying publication of other user, verification vicarious execution for a user, and so forth.