摘要:
An unauthorized connection detecting device, which detects whether or not a power storage device is an unauthorized power storage device, includes: a communications unit receiving first charge/discharge information in which first identification information and first connection information are associated each other, the first identification information identifying an encryption key of the power storage device used for mutual authentication between a charge/discharge device and the power storage device, and the first connection information being on the power storage device and obtained when the power storage device is connected to the charge/discharge device; and an unauthorization detecting unit detecting whether or not the power storage device is the unauthorized power storage device, by determining, using the first identification information and the first connection information, whether or not two or more power storage devices associated with a single first identification information item are present.
摘要:
The present invention provides an apparatus for correctly controlling content recorded on an optical disc. An apparatus 600 for using content recorded on an optical disc 601, wherein the optical disc 601 includes a control information area 602 composed of partial areas 603a-603n, each being for recording control information indicating that use of the content is not permitted, the apparatus 600 comprises: a position information holding unit 612 holding therein position information indicating one of the partial areas 603a-603n that is allocated for the apparatus 600 to record the control information; a reading unit 613 reading information within the control information area 602; a judgment unit 614 judging whether use of the content is permitted, with use of the information read by the reading unit 613 and the position information; and a usage control unit 615 using the content when use of the content is judged to be permitted.
摘要:
Provided is a software update apparatus including an install module group (130) composed of a plurality of install modules. Each of the install modules receives, from an external server (200), a replacement protection control module (121) for updating a protection control module (120) having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified, by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations.
摘要:
A smart meter includes: a power supply control unit which causes stoppage of a supply of power passing through the smart meter to an television and so on, when an RD command to stop the supply is received; a first communication unit which performs a first communication through which the RD command is received; a second communication unit which performs a second communication; and a communication control unit which: causes the performance of the first communication before the RD command is received; and prohibit the performance of the first communication and cause only the performance of the second communication, after the RD command is received.
摘要:
The management-apparatus card capable of being attached to a management apparatus receives, from the measuring apparatus, first unique information indicating the measuring apparatus, and identification information indentifying a user of the measuring apparatus; stores second unique information indicating the management-apparatus card; generates a decryption key corresponding to an encryption key, using the first unique information, the second unique information, and the identification information; stores the generated decryption key; receives encrypted vital sign data from the measuring apparatus; decrypts the received vital sign data using the stored decryption key; and obtains the decrypted vital sign data.
摘要:
A signature generating device generating digital signature data for certifying authenticity of information of a person, and obfuscating the information. The signature generating device includes a storage unit storing attribute information concerning the person and a private key corresponding to the attribute information, an obfuscated information generating unit selecting one or more pieces of dummy information in relation to the attribute information, and generating the obfuscated information including the attribute information and the dummy information; and a public key obtaining unit obtaining a public key corresponding to the attribute information and public keys respectively corresponding to the dummy information. The signature generating device also includes a signature generating unit generating digital signature data by performing a ring signature generation process to the obfuscated information, using the private key and the public key corresponding to the attribute information and using the public keys corresponding to dummy information.
摘要:
Tampering monitoring system 10d can detect whether protection control module is tampered with even if some of detection modules are tampered with. Tampering monitoring system 10d includes protection control module 120d, n detection modules, and management device 200d. Protection control module 120d includes: generation unit 310d generating d pieces of distribution data from computer program, n and d being positive integers, d smaller than n; selection unit 311d selecting d detection modules; and distribution unit 302d distributing d pieces of distribution data to d detection modules. Each detection module judges whether received piece of distribution data is authentic to detect whether protection control module is tampered with, and transmits judgment result indicating whether protection control module is tampered with. Management device 200d receives judgment results from d detection modules and manages protection control module with regard to tampering by using received judgment results.
摘要:
Provided is a tampering monitoring system that can identify a monitoring module that has been tampered with among a plurality of monitoring modules. A management apparatus is provided with an acquisition unit that acquires a new monitoring module that has not been tampered with, a generation unit that generates a decoy monitoring module by modifying the acquired monitoring module, a transmission unit that transmits the decoy monitoring module to the information security device and causes the information security device to install the decoy monitoring module therein, a reception unit that receives from the information security device, after the decoy monitoring module has been installed, monitoring results generated by the monitoring modules monitoring other monitoring modules, and a determination unit that identifies, by referring to the received monitoring results, a monitoring module that determines the decoy monitoring module to be valid and determines the identified monitoring module to be invalid.
摘要:
The present invention aims to provide an information security apparatus that counters a simple power analysis attack (SPA) on an information security apparatus such as an RSA cryptosystem. The information security apparatus uses a multiplication with 1 in a Montgomery domain. 1 in the Montgomery domain is determined depending on a modulus and an integer k, which is greater than a number of bits of a modulus p. Therefore, it is hard for attackers who do not know p or k to analyze. Also, even if an analyzer can predict the Hamming weight, it is possible to further improve the safety against the SPA by modifying k or the modulus at random.
摘要:
An information security apparatus (100c) includes a plurality of monitoring modules that monitor for tampering. A management apparatus (200c) includes a reception unit (230c) that receives a plurality of monitoring results each generated by a source monitoring module monitoring a target monitoring module; a detection unit (220c) that detects an abnormality by referring to fewer than all of the received monitoring results; and an identification unit (210c) that identifies, when an abnormality is detected, a monitoring module that has been tampered with from among (i) a monitoring module that generates a monitoring result related to the abnormality, and (ii) one or more monitoring modules identified by tracing back through a chain of monitoring modules consecutively from the target of monitoring to the source of monitoring, starting from the monitoring module that generates the monitoring result related to the abnormality.