摘要:
An information security device is provided that, when information is circulated through a chain, permits changing of a usage rule for the information or collection (deletion) of the information after the circulation.An information security device (200) includes: a receiving unit (201) that receives a content and a collection command; a content storing unit (202) that stores a content and its usage rule; a collection command confirmation unit (203) that checks the validity of a received collection command; a content deletion unit (204) that deletes a content; a chain information storage unit (205) that stores chain information containing sending and receiving information of a content; a destination list storage unit (206); a sending unit (207) that sends a content and a collection command; and a control unit (208) that controls the processing for a collection command. When a collection command is sent after content distribution, the content can be collected (deleted) in the destination of circulation.
摘要:
A portable data sensor tag (2), includes a memory (24), a data communication circuit (20) which receives a wireless activation signal from an external terminal, and, in an operation using electromotive force generated by the received activation signal, receives an encryption key from the external terminal and stores the received encryption key into the memory (24), a power source (23) which supplies power, an insulator (27) which switches a power supply from the power source (23) from off to on; and a sensor circuit (22) which reads the encryption key from the memory (24), encrypts measured data using the read encryption key, and stores the encrypted measurement data into the memory (24), the sensor circuit operating using the power supplied from the power source (23) after the power supply from the power source (23) is switched on.
摘要:
A distributing device for generating private information correctly even if shared information is destroyed or tampered with. A shared information distributing device for use in a system for managing private information by a secret sharing method, including: segmenting unit that segments private information into a first through an nth pieces of shared information; first distribution unit that distributes the n pieces of shared information to n holding devices on a one-to-one basis; and second distribution unit that distributes the n pieces of shared information to the n holding devices so that each holding device holds an ith piece of shared information distributed by the first distribution unit, as well as a pieces of shared information being different from the ith piece of shared information in ordinal position among n pieces of shared information, “i” being an integer in a range from 1 to n.
摘要:
An update server 200 acquires, from an apparatus 100, a result of verifications relating to tampering of a protection control module 120 and each of install modules included in an install module group 130. The update server 200 determines a processing procedure of the apparatus 100 depending on the acquired result of verifications. Specifically, if it is judged that the protection control module 120 and each of the install module are unauthentic, the update server 200 transmits, to the apparatus 100, an instruction to perform updating of the unauthentic protection control module 120 in preference to revocation of the unauthentic install module.
摘要:
To aim provide a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server (200), a replacement protection control module (121) to be used for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations. If any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility.
摘要:
Conventional pet robots have the ability to distinguish users and take a different behavior pattern per each different user, and conventional pet robots have the ability to phase their behavior patterns based on their own behavior history to stage a growth process. The present invention provides an improvement to the conventional pet robots by, when in contact with a user in possession of a memory card, acquiring various types of information from the memory card, such as identification information of the memory card, information regarding the user, and history information regarding contact between the user and the robot. This provides the user a high degree of satisfaction by performing behavior that reflects the acquired information.
摘要:
An information security device is provided that, when information is circulated through a chain, permits changing of a usage rule for the information or collection (deletion) of the information after the circulation.An information security device (200) includes: a receiving unit (201) that receives a content and a collection command; a content storing unit (202) that stores a content and its usage rule; a collection command confirmation unit (203) that checks the validity of a received collection command; a content deletion unit (204) that deletes a content; a chain information storage unit (205) that stores chain information containing sending and receiving information of a content; a destination list storage unit (206); a sending unit (207) that sends a content and a collection command; and a control unit (208) that controls the processing for a collection command. When a collection command is sent after content distribution, the content can be collected (deleted) in the destination of circulation.
摘要:
Provided are a utilization apparatus, a server apparatus, and a key utilization system which enable the utilization apparatus to control deletion of the old key without using a secure clock and allow encrypted communications irrespective of whether the accessed server has updated its key or not. In key utilization system 1, one or more server apparatuses 5-1 to 5-n each provide service to an apparatus having an apparatus key corresponding with a server key. Update apparatus 2 distributes an update server key to each server apparatus and a new apparatus key to key utilization apparatus 3. CRL distribution apparatus 4 distributes to key utilization apparatus 3 a CRL indicating one or more server apparatuses which have completed key-updating. Key utilization apparatus 3 holds both the old and new apparatus key, judges whether the server apparatuses monitored using the CRL have completed key-updating, and if affirmative, deletes the old apparatus key.
摘要:
A copyright protection system includes a recording device and a reproduction device. The recording device writes encrypted content, an encrypted content key for decrypting the encrypted content, and license information on a recording medium on which a unique media number has been recorded in an unrewritable state. The license information is generated using both the media number and the encrypted content key, and therefore reflects both values. The reproduction device reads the media number, the encrypted content key, and the license information from the recording medium, and judges whether the license information reflects both the media number and the encrypted content key. The reproduction device decrypts the encrypted content key, and decrypts the encrypted content using the content key only if the license information reflects both values. Thus, the copyright protection system allows only original recording media to be reproduced, and prohibits reproduction of copy recording media.
摘要:
An information processing apparatus is provided with a reconfigurable unit (101) in which a circuit can be reconfigured. The provision of a generation unit (103) enables the generation of design data of a circuit configured by the reconfigurable unit (101), and enables a reduction in the amount of design data to be held by a design data storage unit (102).