摘要:
A data processing apparatus includes an address bus, a scramble unit, and a data bus. The address bus outputs address data to be given to a memory apparatus. The scramble unit scrambles write-in data into a storage position in the memory apparatus identified by the address data to obtain confidential data. The data bus outputs the confidential data. The scramble unit includes a first scrambler, a first converter and a second scrambler. The first scrambler XORs first mask data corresponding to the address data and the write-in data for each bit and makes it first scrambled data. The first converter performs one-to-one substitution conversion of the first scrambled data. The second scrambler XORs second mask data corresponding to the address data and data after the conversion of the first scrambled data by the first converter and outputs obtained second scrambled data as the confidential data.
摘要:
An encrypted ID takes as its initial value a tag ID that constitutes an original ID of a wireless tag, and is encrypted using an encryption key each time an ID inquiry is received from a reader/writer. Another encrypted ID also takes the tag ID as its initial value, and is encrypted using an encryption key each time an ID inquiry is received. The wireless tag gives confidential variability to the ID by transmitting a combination of the encrypted ID and the another encrypted ID in reply. The reader/writer can obtain the original ID merely by decoding the two encrypted values until they match, and the decoding load does not increase even if the number of wireless tags that are reading targets increases.
摘要:
A computer divides a target electronic document into a plurality of document segments. Then, the computer generates a signature (s, t) that includes a set of two values having a signature value s forming a signature on the electronic document and a deletion signature value t used for deletion, the signature value s which serves as a body of the signature being formed by a superposition of signature information on the individual document segments. Then, in a case where one of the plurality of document segments obtained by the division is to be extracted, the computer superimposes deletion information of a document segment to be deleted on the deletion signature value t to generate a new signature value t′, and produces an updated signature (s, t′).
摘要:
In a saddle-ride electric vehicle equipped with an electric motor generating power for rotatively driving a rear wheel, a main battery supplying electric power to the electric motor is disposed in a first space S1 that is surrounded by a down frame connected to a head pipe or a front end portion of a main frame and extending downward, a pivot frame connected to the rear end portion of the main frame and extending downward, and the main frame, and a sub-battery that can supply electric power to the electric motor instead of the main battery is disposed in a second space S2 surrounded by seat rails connected to the rear portion of the main frame to support an occupant seat and the main frame. The electric motor is disposed at a position different from the first and second spaces S1 and S2.
摘要:
To dispose a large battery in a saddle-ride electric vehicle equipped with a head pipe steerably supporting a front fork with the front wheel journaled to a lower end portion and a steering handlebar, a main frame extending downward and rearward from the head pipe, and an electric motor generating power for rotatively driving a rear wheel. The battery supplying electric power to an electric motor is disposed in a space S1 that is surrounded by a down frame connected to the head pipe or a front end portion of the main frame 14 and extending downward, a pivot frame connected to the rear end portion of the main frame and extending downward, and the main frame. The electric motor is disposed on a side of the rear wheel rather than in the space S1.
摘要:
Certification/verification of authenticity and integrity of a digital document can be achieved, using meta information and content information and third-party certification thereof is achieved.A digital information verification program stored in a recording medium according to the present invention allows a computer to determine presence/absence of any change made to the digital information and identify the changed part by the following steps: generating the feature amount information with respect to the digital information to be verified and registering it in association with the digital document; in the case where any operation is made to the digital information, acquiring the feature amount information (meta information related parameters and content information related parameters) of the meta information and content information concerning the operation, the feature amount information including the same items (meta information and content information) as those of the feature amount information related to the digital information before being operated; and comparing the feature amount information before and after the operation.
摘要:
A cryptographic processing device, comprising: a storage unit; initial setting unit for setting a value to be stored in the storage unit; Montgomery modular multiplication operation unit for performing a Montgomery modular multiplication operation plural times for a value set by the initial setting unit; and fault attack detection unit for determining whether or not a fault attack occurred for each of at least some parts of the Montgomery modular multiplication operations performed plural times.
摘要:
A data processing apparatus includes an address bus, a scramble unit, and a data bus. The address bus outputs address data to be given to a memory apparatus. The scramble unit scrambles write-in data into a storage position in the memory apparatus identified by the address data to obtain confidential data. The data bus outputs the confidential data. The scramble unit includes a first scrambler, a first converter and a second scrambler. The first scrambler XORs first mask data corresponding to the address data and the write-in data for each bit and makes it first scrambled data. The first converter performs one-to-one substitution conversion of the first scrambled data. The second scrambler XORs second mask data corresponding to the address data and data after the conversion of the first scrambled data by the first converter and outputs obtained second scrambled data as the confidential data.
摘要:
An apparatus for digital signature authentication includes a dividing unit that divides streaming data into plural pieces of partial data in a predetermined unit; a first creating unit that creates a hash value string including plural hash values corresponding to the pieces of partial data; a second creating unit that creates a first binary tree using the hash value string; and a third creating unit that creates a digital signature of a signer using a root value of the first binary tree.
摘要:
A computer program, apparatus, and method for managing access to documents, capable of identifying the exact events of document access on the basis of given access logs even when access policies are modified in the middle of operations. Upon receipt of an access policy setup request from a first client, an access policy manager adds a new access policy to the access policy database or modifies an existing access policy in an access policy database according to the request. A policy log collector then stores the records of such a new access policy or modified existing access policy in a policy log database. Afterwards an access log collector receives an access log for the document 5 from the second client 3 and saves it in the access log database 1c. When a third client issues a log request with a specific search keyword, a log searcher retrieves relevant policy log records and access log records that match with the specified search keyword.