摘要:
There is disclosed an image transmission system for transmitting MPEG data through a transmission path, capable of setting frames for the MPEG data to be transmitted, according to the traffic in the transmission path, and effecting an accounting process with a charge system corresponding to thus set frames.
摘要:
A key management method, an encryption system, and a sharing digital signature system are provided, which are designed to hierarchically manage the degrees of contribution of members to a digital signature operation and the like so as to be suitably used for a group having a hierarchical structure. In an information communication system including a plurality of information processing apparatuses connected to each other through a communication line, a first member (11a) holding a secret key K and a plurality of second members (11b-11d) holding pieces of partial information K.sub.1i (i=1, 2, . . . ) generated by secret sharing of the secret key K are provided. The first member can use the secret key K as a key for the information communication system, but the second members can obtain a key for the information communication system only by collecting a predetermined number t.sub.1 or more of pieces of partial information K.sub.1i.
摘要:
A communication system and accounting apparatus are provided capable of easy management of accounting a use of information by a user in multi-media networks while protecting privacy of the user. As a user input money information to an PPC input unit of a user terminal, the money information including cash, a pre-paid card, an IC card, and the like, a discrimination unit judges a use permission of provided information in accordance with the money amount indicated by the money information and/or charge information added to the information provided by an information provider. In response to a user permission signal, a signal processing unit processes the provided information and supplies it to the user.
摘要:
Respective processes of decoding in error correction are subjected to parallel processing using a plurality of processing elements (PEs) each having the same configuration. At any given time, when processing of one process has been terminated, processing proceeds to a PE having the highest priority among PEs waiting for processing. The PE which has received data recognizes and executes the next process for that data.
摘要:
A verification information generation system includes first and second data processing apparatuses. The first data processing apparatus has a unit holding first secret information, a unit receiving information associated with the second secret information from the second apparatus, a unit generating key information on the basis of the first secret information and the information associated with the second secret information, a unit generating key derivation auxiliary information allowing the key information to be derived from the second secret information, a unit generating verification information on the basis of information to be verified and the key information, and a unit outputting the information to be verified, the verification information, and the key derivation auxiliary information. The second secret information is information which is set in advance in the second data processing apparatus.
摘要:
A data-processing system and method for controlling synthesizing digital-signature information. The system and method include holding first private-key information, inputting second private-key information, generating third private-key information based on the first private-key information and the second private-key information, holding the third private-key information, generating signature information based on information to be verified and the third private-key information, and outputting the information to be verified and the signature information.
摘要:
A data-processing system and method for controlling synthesizing digital-signature information. The system and method include holding first private-key information, inputting second private-key information, generating third private-key information based on the first private-key information and the second private-key information, holding the third private-key information, generating signature information based on information to be verified and the third private-key information, and outputting the information to be verified and the signature information.
摘要:
An apparatus receives a document image and digital-watermark information and determines an embedding capacity based on a number of the letters in the document image. The apparatus determines whether or not the entire digital-watermark information is capable of being embedded in the document image based on the determined embedding capacity and embeds the digital-watermark information in the document image based on a result of the determination of whether or not the entire digital-watermark information is capable of being embedded in the document image.
摘要:
An apparatus for embedding a digital watermark in a document image detects circumscribing outer shapes of characters in the document image and sets a plurality of reference lines that extend in the column direction and are spaced apart in the row direction by a basic pitch. The outer shapes include a first outer shape, a second outer shape that neighbors the first outer shape, and a third outer shape that neighbors the second outer shape, and the reference lines include a first reference line located between the first outer shape and the second outer shape, and a second reference line located between the second outer shape and the third outer shape. Control is performed for at least one of the second and third outer shapes so that a distance between the first reference line and an edge of the second outer shape is different from a distance between the second reference line and an edge of the third outer shape, in accordance with digital watermark information to be embedded.
摘要:
The secret data is acquired externally by making an arithmetic operation between unique information of an apparatus and the first information managed secretly, and secretly held as key data in a key holding part. A MAC generation part generates the authentication data based on a hash value obtained from the data to be protected and the key data held in the key holding part 21. An image file generation part generates an image file to provide the unique information and the authentication data together with the data to be protected.