摘要:
An apparatus, method, system, computer program and product for generating a protected document image having a visible verification image. Using the visible verification image, the integrity of the protected document image can be visually checked without requiring machine intervention.
摘要:
In a signature generating method where not necessarily all of a plurality of signature generating devices work together each time to generate signatures, the present invention seeks to correctly and securely reflect data relating to previous signatures. When generating signatures, the data used for the next signature is sent beforehand to the other signature generating devices. Also, when generating signatures, at least one of the devices is used consecutively, thus allowing history data to be shared during signature generation.
摘要:
A cryptographic communication system constituted by a first communication device, and a second communication device that stores a master key serving as an encryption key, the cryptographic communication system being characterized in that said first communication device has a common key storing unit configured to store a key pair constituted by a first key serving as a common key used to communicate with said second communication device and a second key obtained by encrypting said first key by using said master key held by said second communication device, and also has a common key transmitting unit configured to transmit said second key to said second communication device, and said second communication device has common key obtaining unit configured to receive said second key and obtaining said first key by decrypting said received second key by using said master key.
摘要:
According to the invention, techniques for authenticating that a digitally signed document is genuine. Specific embodiments according to the present invention can determine whether a digital signature was generated by a digital signature generator, or if the digital signature was generated by a third party posing as the digital signature generator. Specific embodiments can provide independent verification of digital signer identity based upon prior signed messages, time/date stamps, and the like. Techniques according to the present invention can be embodied in methods, apparatus, computer software and systems.
摘要:
An electronic document authenticity assurance technique and an information disclosure system both of which can compatibly realize the assurance of the authenticity of disclosure documents and the deletion of information inappropriate for disclosure. An electronic document is divided into constituent elements and an electronic signature is affixed to an arbitrary subset of a set including all the constituent elements. Otherwise, an electronic signature is affixed to data obtained by binding each of the constituent elements to information specifying the relationship between a respective one of the constituent elements and the structure of the electronic document. Otherwise, the hash values of the respective constituent elements are calculated and an electronic signature is affixed to data obtained by binding the calculated hash values together. Otherwise, random numbers generated for the respective constituent elements are bound together, then the hash values of the respective random-numbered constituent elements are calculated, and then an electronic signature is affixed to data obtained by binding the calculated hash values together.
摘要:
When an LPP (land pre-pit) is formed between shallow grooves or shallow pits, the LPP is formed on a land existing between the shallow grooves or the shallow pits. Further, the LPP is formed in a position displaced from a centerline of the land in the radial direction by a predetermined amount. Furthermore, a laser beam power utilized for forming a shallow groove or a shallow pit adjacent to the LPP is reduced so as to be lower than a regular laser beam power.
摘要:
A plurality of round processing parts (38) are provided each of which contains a nonlinear function part (304), and each nonlinear function part (304) comprises: a first key-dependent linear transformation part (341) which performs a linear transformation based on a subkey; a splitting part (342) which splits the output from the first key-dependent linear transformation part into n pieces of subdata; a first nonlinear transformation part (343) which nonlinearly transforms those pieces of subdata, respectively; a second key-dependent linear transformation part (344) which linearly transforms those nonlinearly transformed outputs based on a subkey and outputs n pieces of transformed subdata; a second nonlinear transformation part (345) which nonlinearly transforms those transformed subdata; and a combining part (346) which combines the nonlinearly transformed outputs. An n×n matrix, which represents the linear transformation in the second key-dependent linear transformation part (344), is formed by n vectors whose Hamming weights are equal to or larger than T−1 for a security threshold T, thereby increasing the invulnerability against differential cryptanalysis and linear cryptanalysis.
摘要:
A card settlement method using a mobile information terminal provided with an IC card read/write function and a wireless communication function for the settlement of a transaction in a business establishment, comprising a step of having a customer using a business establishment wirelessly connect to an authorization server through a network by the mobile information terminal, a step of having the customer load his or her IC card in the mobile information terminal, read the information stored in this IC card, and send it to the authorization server, a step of having the authorization server decide on the authorization of the current transaction from authentication information stored in the IC card and proving the legitimacy of the card, settlement information containing at least a card number, and personal identification information input from the customer and proving the legitimacy of the customer, a step of sending a temporary password issued from a settlement server to the mobile information terminal for display after the authorization of the current transaction, a step of inputting the temporary password and the current transaction information from a business establishment side settlement terminal and sending it to the settlement server, and a step of having the settlement server settle the transaction with the password and the transaction information satisfying the settlement conditions.
摘要:
According to the invention, techniques for authenticating that a digitally signed document is genuine. Specific embodiments according to the present invention can determine whether a digital signature was generated by a digital signature generator, or if the digital signature was generated by a third party posing as the digital signature generator. Specific embodiments can provide independent verification of digital signer identity based upon prior signed messages, time/date stamps, and the like. Techniques according to the present invention can be embodied in methods, apparatus, computer software and systems.
摘要:
An angle detection device that accurately detects a rotational angle even if the ratio of an detection voltage relative to an excitation voltage of a resolver fluctuates. The angle detection device includes an angle detector and a controller connected to the angle detector. The angle detector includes an excitation coil, which is arranged on a predetermined rotary shaft and supplied with excitation voltage, and a pair of detection coils. Each detection coil is arranged near the excitation coil to induce detection voltage when excitation voltage excites the excitation coil. The detection voltages of the detection coils have different phases. A controller calculates the rotational angle of the excitation coil with the detection voltages induced to the detection coils. Further, the controller includes a correction unit for correcting the amplitude of the excitation voltage to maintain each of the induced detection voltages at a predetermined value.