摘要:
An information generating unit generates identification information for an equipment based on environment information of the equipment. A search-result transmitting unit searches, when an information output request for equipment information generated based on the identification information is received, a database for the equipment information corresponding to the identification information, and transmits a search result as information indicating whether the equipment is allowed to receive a service.
摘要:
A data acquiring unit acquires electronic data. A tamper-resistant chip includes a storing unit that stores a confidential key specific to a device, and a collecting unit that collects device information that is internal information of the device. An attaching unit attaches collected device information to acquired electronic data. An encrypting unit encrypts the electronic data with the device information attached, using the confidential key stored in the storing unit.
摘要:
An authentication method of performing authentication for an information processing device connected via a communication network by an authentication device, including: receiving information related to biometric authentication concerning the information processing device; receiving information related to identification information for identifying the information processing device; receiving information related to environment of the information processing device; receiving an electronic signature by a secret key which is paired with an electronic certification transmitted from the information processing device; and determining, by a control unit, a biometric level based on the received information related to biometric authentication, a device level based on the received information related to identification information and an environment level based on the received information related to environment; correcting, by the control unit, the determined level based on validity of the received electronic signature.
摘要:
In certain embodiments, processors may operate to establish trust with trust point systems by performing a user authentication, a platform authentication, and an environment authentication. The processors may communicate information with the trust point systems in response to establishing trust. In certain embodiments, the trust point systems may cooperate to provide a variety of services, such as escorting, battery charging, vehicle security, and/or emissions reporting services.
摘要:
A client supported by remote maintenance in an electronic network configured to serve a plurality of clients may comprise a plurality of nodes, a first virtual machine (VM), a second virtual machine, and a virtual machine manager (VMM). The first VM may handle data associated with an external data center. The second VM may be associated with one of the plurality of nodes. The VMM may be configured to manage data transfer between the first VM and the second VM. The first VM may be configured to assess a state of the client system and identify a software update for installation on the one of the plurality of nodes. The software update may be configured to maintain identity between the data in the one of the plurality of nodes and the data center. The VMM may manage an attestation process prior to delivering or installing the software update on the client system using the first VM.
摘要:
A recording unit records an operation log. A storing unit included in a temper-resistant chip stores therein a secret key unique to an image reading apparatus. An encrypting unit included in the temper-resistant chip encrypts recorded operation log with stored secret key. A transmitting unit transmits information including encrypted operation log to a server.
摘要:
A network connection terminal authenticating method that authenticates a terminal device demands communication with other terminal device in a computer network. The network connection terminal authenticating method include authenticating the terminal device outside a communication path between the terminal device and the other terminal device in response to a demand for communication of the terminal device with the other terminal device and determining whether communication with the other terminal device is permitted, and starting data transmission from the terminal device to the other terminal device when the terminal device is authenticated in the authenticating.
摘要:
An apparatus for granting electronic signature to a data includes an identification-data acquiring unit that acquires identification data for identifying an owner of a secret key that is used to create the electronic signature, an authorization-data acquiring unit that acquires authorization data corresponding to the identification data acquired, and a signature-granting determining unit that determines whether to grant the electronic signature to the data based on the authorization data acquired.
摘要:
A contents utilization control apparatus includes an input unit for inputting a) contents with control module that consist of contents and a control module, and b) a license with control module that consists of a license prepared from contents utilization approval information and a control module. The control module in the contents with control module and the control module in the license with control module cooperate with each other to carry out a control relating to the utilization of the contents.
摘要:
Security of an information processing apparatus is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus. The information processing apparatus transmits the collected environment information to a first authentication apparatus. An electronic certificate issued by a second authentication apparatus and information encrypted with a secret key issued by the second authentication apparatus are transmitted to the first authentication apparatus. The first authentication apparatus acquires the public key of the second authentication apparatus and the public key of the information processing apparatus so as to decrypt the encrypted information, and judges whether or not the decrypted information is proper. The first authentication apparatus refers to an environment information database and the transmitted information, and judges whether or not the transmitted environment information is proper. When all the authentications by the biological information authentication, environment information authentication and electronic certificate authentication are successful, the information processing apparatus is judged to be safe.