摘要:
A technique of managing public keys updated by a certificate authority and a plurality of hash algorithms is provided.Identifiers, each of which is uniquely determined by a pair of a public key updated by a certificate authority and a hash algorithm, are stored in an identifier information storage area (131b). A verification processing part (132c) cross-checks a received validation request and the identifiers stored in the identifier information storage area (131b). When there is an identifier corresponding to the received validation request, the verification processing part (132c) judges that the verification can be performed, and continues the verification processing.
摘要:
To reduce a load inflicted on a network by peer-to-peer communication between terminals, the present invention provides a network system having a communication destination machine and a communication source machine, in which: the communication destination machine includes a unit which registers its own location information in a peer-to-peer network; and the communication source machine includes: a unit which searches the peer-to-peer network for the location information of the communication destination machine and obtains the location information; and a unit which uses the obtained information to establish peer-to-peer communication. The location information contains communication path information which enables the communication source machine to communicate with a desired machine beyond a path controller, and a parameter necessary for communication. The communication source machine may include a unit which accumulates location information or similar data of multiple communication destination machines.
摘要:
A validation server using HSM, which reduces required process time from receiving a validation request to responding with a validation result, and comprises a first software cryptographic module 142 and a second software cryptographic module 143 on a validation server 130 whose HSM is coupled with an I/F part 148. According to the validation server, load states of HSM, the first software cryptographic module 142 and the second software cryptographic module 143 are monitored by a cryptographic module monitor unit 141, and when cryptographic calculations in a validation process of certificates are conducted, the cryptographic calculations are executed by using the least loaded cryptographic module selected at a cryptographic module selector unit 140.
摘要:
On the basis of revocation information of a certificate, information of a certification authority and of the certificate issued by the certification authority from a terminal device, and information of a cryptographic algorithm, validity of the certificate from the terminal device is determined. If the certificate is valid, a validation result treating the certificate as valid is created, and using information of the cryptographic algorithm from the terminal device and information of the cryptographic algorithm used for the signature of the certification authority which has been imparted to the revocation information of the certificate, a selection list of cryptographic algorithms used for the response signature to impart to the verification result of the certificate is created to determine the cryptographic algorithm used for the response signature to impart the verification result of the certificate on the basis of the created list and the cryptographic algorithms capable of being accommodated by the verification server.
摘要:
The present invention provides a vehicle communication system by which even when the number of other vehicles around a traffic line is increased, it is possible to prevent occurrence of a situation that there are located vehicles the number of which is larger than the capacity of a communicable network, and it is possible to secure communications with the other vehicles. Even when it is determined that a host vehicle enters in a traffic line and a plurality of other vehicles the number of which is larger than a threshold value are located in front and rear virtual regions of the host vehicle, a transmission power is reduced to the extent that communications between the host vehicle and one of the other vehicles that is located furthest in the virtual regions can be secured.
摘要:
The validation server obtains information related to a first cryptographic method from a certificate which is contained in a certificate validation request from a terminal device. When the information related to the first cryptographic method is not stored in a storage unit of the validation server as valid information, the validation server determines that the information related to the first cryptographic method is invalid. When the information related to the first cryptographic method is stored in the storage unit as valid information and also the information related to a second cryptographic method listed in the certificate in the certification path is not stored in the storage unit during the certification path validation, the validation server determines that the information related to the second cryptographic method is invalid.
摘要:
When a document creation unit 1 is started, it calculates a hash value of each software piece therein and stores the hash value in a hash value holder 71 and a measurement log document holder 44. The document creation unit 1 accesses a time distribution unit plural times to receive time information therefrom, and records the time information in a log document and a measurement log document. The document creation unit 1 transmits the log document, the measurement log document, and digital signature-embedded hash value information (measurement auxiliary document) in a tamper-resistant device 63 to a document reception device. The document reception device verifies matching of the hash values or digital signature in the document group, confirms software operating environments in the document creation unit 1 from the hash values, and determines whether the time information is correctly managed within the unit 1.
摘要:
A monitoring method for moving vehicles allows the presence of danger to be determined from the magnitude of an optical flow vector. The optical flow vector is detected as a movement of a single point on an object taken over two images, with one image taken at a preceding time and the other image taken at succeeding time in a series of images. A long and narrow window set in a radial direction from a focus of expansion (FOE) of the earlier image is moved in the same direction on the latter image. An optical flow vector of a target point is defined by a vector connecting the midpoint of a location of a subsequent window and the midpoint of a location at which the long and narrow window is set in the earlier image. The location of the subsequent window is determined by minimizing the sum of absolute values of differences in luminance between the long and narrow window and an area of the latter image overlapping such long and narrow window. The optical flow calculation area is limited to areas in which a difference in luminance between the earlier and latter images exceeds a predetermined threshold, and any influence from scenes outside the road boundaries and from lane-dividing lines or other symbols drawn on the road surface is removed in calculating the optical flow.
摘要:
On the basis of revocation information of a certificate, information of a certification authority and of the certificate issued by the certification authority from a terminal device, and information of a cryptographic algorithm, validity of the certificate from the terminal device is determined. If the certificate is valid, a validation result treating the certificate as valid is created, and using information of the cryptographic algorithm from the terminal device and information of the cryptographic algorithm used for the signature of the certification authority which has been imparted to the revocation information of the certificate, a selection list of cryptographic algorithms used for the response signature to impart to the verification result of the certificate is created to determine the cryptographic algorithm used for the response signature to impart the verification result of the certificate on the basis of the created list and the cryptographic algorithms capable of being accommodated by the verification server.
摘要:
In response to a validation request that includes second information identifying the certificate authority, key information of the certificate authority at issuance of the public key certificate, and information identifying the public key certificate, if the second information identifying the certificate authority included in the validation request corresponds to the first information identifying the certificate authority included in the authority certificate, and the information identifying the public key certificate included in the validation request does not exist in the revocation information, the validation server creates a validation result indicating that the public key certificate corresponding to the information identifying the public key certificate included in the validation request is valid.