摘要:
Disclosed is an accident/near-miss factor area specifying device capable of specifying accident/near-miss factor areas, the presentation of which is highly required. The accident/near-miss factor area specifying device (100) is used for specifying accident/near-miss factor areas which a driver of a vehicle should. be aware of in order to prevent an accident, and the device comprises a viewing area specifying unit (151) for specifying a viewing area of a driver of a vehicle which had a near-miss, immediately before the near-miss occurs, and an unnoticed area specifying unit (152) wherein, when a near-miss object is located in a viewing area, an area corresponding to the position of the object is treated as an unnoticed area which is one of the accident/near-miss factor areas.
摘要:
The present invention intends to hold safely string information such as secret information, or the like, and also to lessen user's burden of storing the information in connection to the string information. In registering the secret information, a coding section 16 synthesizes input correct secret information SD and individual characteristic information under a predetermined rule, and produces a code word S16. A check symbol for error correction is produced in the course of the coding of the coding section 16, and this check symbol is stored in a storing section 20. In reproducing the secret information, an error correcting section 22 applies an error correcting process using the check symbol stored in the storing section 20 to a code word, which is produced by the coding section 16 based on the input secret information SD and the individual characteristic information, as the object. Accordingly, the correct secret information is reproduced.
摘要:
Provided is a transmitting terminal capable of sharing an encryption key among a number of specific apparatuses using fewer resources and securely. A transmitting terminal (400) has an inquiry ID generation unit (420) which embeds an encryption key in logical results of an XOR between an ID of a receiving terminal and random blocks according to predetermined key embedding rules in order to generate an inquiry ID. The key embedding rules are stipulations for inverting the values of bit positions corresponding to each bit value of the encryption key, in the block position correspondence relationships between the bit positions of the encryption key and the positions of the blocks into which the logical result of the XOR have been partitioned and the bit position correspondence relationships between the bit values of the encryption key and the bit positions within the blocks, which have been predefined.
摘要:
Provided is a transmitting terminal capable of sharing an encryption key among a number of specific apparatuses using fewer resources and securely. A transmitting terminal (400) has an inquiry ID generation unit (420) which embeds an encryption key in logical results of an XOR between an ID of a receiving terminal and random blocks according to predetermined key embedding rules in order to generate an inquiry ID. The key embedding rules are stipulations for inverting the values of bit positions corresponding to each bit value of the encryption key, in the block position correspondence relationships between the bit positions of the encryption key and the positions of the blocks into which the logical result of the XOR have been partitioned and the bit position correspondence relationships between the bit values of the encryption key and the bit positions within the blocks, which have been predefined.
摘要:
With respect to a secure device 10 for executing a data storing operation and a data calculating operation under secrecy condition, a first application program 15 and a second application program 11 are retained. The program 15 causes an information processing terminal 30 mounted thereon this secure device 10 to execute a process operation by utilizing a resource of this information processing terminal 30. The program 11 causes the secure device 10 to execute such a process operation under secrecy condition in conjunction with the process operation of this information processing terminal 30. When this secure device 10 is mounted on the information processing terminal 30, this secure device 10 loads the program 15 to the information processing terminal 30 so as to install this loaded first application program therein. Then, a terminal application program required to execute a service is automatically installed to the information processing terminal 30.
摘要:
An information storage apparatus capable of setting the number and sizes of partitioned areas resulting from partitioning a memory area based on a user's intention is provided. For this purpose, an information storage apparatus having a plurality of partitioned areas of different security levels in a memory area is provided with an area control section that controls addresses of partitioned areas in the memory area, an area update condition control section that controls update conditions when the number or sizes of partitioned areas are updated, an area update decision section that decides whether a partition request requesting updating of the number or sizes of partitioned areas satisfies the update conditions and an area update section that executes, when the partition request satisfies the update conditions, updating of the partitioned areas in the memory area according to the partition request. The partitioned areas in the memory area of this information storage apparatus are updated at a partition request reflecting the user's intention in accordance with the user's intention.
摘要:
The present invention has an object to provide a communication terminal, a secure device, and an integrated circuit, by which before data is transmitted by a transmission-sided communication terminal, a security process operation is carried out under environment of a communication terminal having a possibility of using the data with respect to threats caused by computer viruses and the like, which are operated in an illegal manner and are operable in correspondence with various sorts of platforms, and thus, safety characteristics with respect to the data can be assured.When a portable telephone 101 transmits data, a data analyzing unit 113 extracts identification information of a communication counter terminal 103 described in transmission data, and selects a predetermined verifying operation in response to an environment of the communication counter terminal 103 by referring to a permission information database 114. The selected security process operation is carried out by a data verifying unit 116, and the transmission data is notified to the communication counter terminal 103 in combination with security process information.
摘要:
When a special relationship is present between IC card owners, authority of one of the IC card owners cannot be easily given to the other owner of the IC card. However, an IC card of a second owner can issue a public key certificate of the IC card of a first owner so that the IC card of the first owner can be recognized as a child card of the IC card of the second owner. Thus, the first generation card authenticated by a route authentication station is set as an ancestor which can generate a descendent card which receives the authentication. By checking which parent card has issued the public key authentication owned by the child card, it is possible to given the authority of the parent card to the child card.
摘要:
In a server that communicates with a large number of pieces of information equipment, a communication schedule between the server and the information equipment is created in an appropriate and efficient manner. Provided is an apparatus in a client-server system, having a scheduler embodied on a computer readable medium for creating a schedule, which comprises: a means for calculating a table of maximum values respectively for the number of processes for each time slot, which calculates the table of maximum respectively for the number of processes for each time slot, which is obtained by finding the respective maximum value of the number of processes performed in each time slot in a cycle of N days; and a means for calculating a time slot, which finds a time slot having the minimum value out of the maximum values obtained in the foregoing manner, in order to find a time slot in which the number of processes performed in the same time slot is brought to the minimum under the rule that the processes including communication are performed in the same time slot every N days.
摘要:
Provided is a biometric authentication system capable of preventing spoofing attacks even if leakage of key information and a registration conversion template occurs. A communication terminal device (300) calculates secret key information k′ which is exclusive OR of key information k of the registration biological information and masked value c′ which is randomly selected from a predetermined error correction code group, and calculates verified information c′″ which is exclusive OR of sent information c″ and value c′. A biometric authentication device (500) calculates exclusive OR of authentication biological information, information k′, and registration conversion template w, as information c″, wherein the template w is exclusive OR of information x, information k, and authentication parameter c randomly selected from the code group; and performs biometric authentication on the basis of a degree of matching between information c′″ corresponding to information c″, and the parameter c.