摘要:
An image input device which includes a means for inputting image data, a memory for storing a secret information and an operator for carrying out an operation by using the image data and the secret information.
摘要:
An information processing apparatus includes a determining unit adapted to determine a target instruction to be modified to a camouflaged instruction among instructions contained in a processing target program, a camouflaged instruction generating unit adapted to generate the camouflaged instruction corresponding to the target instruction, a restore command generating unit adapted to generate a restore command for restoring the generated camouflaged instruction to the corresponding target instruction, and a unit adapted to modify the target instruction contained in the processing target program with the generated camouflaged instruction and add the restore command to the program, wherein the restore command performs the restoration by referencing a memory storing an output value of a processing command contained in the processing target program and identifying the position of the target instruction in the program or the target instruction based on the referenced value.
摘要:
A host requests a public key certificate from a gateway, and the gateway requests a public key certificate from a Certification Authority (CA). The CA generates a public key certificate, which is sent to the host through the gateway. The host sets an IPv6 address based on information from the gateway. The host requests and receives a new public key certificate whenever necessary, and sends a public key certificate including the IPv6 address to the communication counterpart.
摘要:
In an image input apparatus provided with an image pick-up unit, an image signal generated by the image pick-up unit is converted into digital information. The digital information is then encrypted by using an encryption key. The encryption key is input into the image input apparatus from an external apparatus, such as an IC card. The image input apparatus erases the encryption key after the digital information has been encrypted. With this arrangement, unauthorized users can be prevented from obtaining the encryption key, and different encryption keys can be assigned to a plurality of users. Thus, the privacy and the security of the image information can be enhanced, and the copyright of the image information can be protected more reliably.