摘要:
The present invention provides an electronic wallet having a higher level of anonymity, security and convenience, which is capable of efficient electronizing of value information as well as which allows the user to efficiently manage the electronic value information. A presentation card 801 indicating the fixed property of an electronic value is digitally signed by the service provider; a variable property 802 is digitally signed with the private key of that electronic value. A service control 803, security information 804, representation control 805 and representation resource 806 are digitally signed by the service provider. These digital signature will be authenticated each time an electronic value object is generated.
摘要:
A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted. The terminal comprises a CPU, a software module storage unit, a certificate storage unit, an updating unit for updating the software module and certificate, a security device provided with a configuration information storage unit for storing the configuration information of the software module, an alternate configuration information storage unit for storing the configuration information of a software module in the configuration before the update, and a boot control unit for verifying and executing the software module by using the certificate. The terminal verifies the certificate of the software module by comparing the configuration information stored by the configuration information storage unit with the configuration information stored by the alternate configuration information storage unit.
摘要:
Provided is a migration system considering security authentication levels and data protection strength levels of the both security devices between which data is migrated. A first terminal includes a mechanism for protecting data by a private key in the public key method held by TPM, and a second terminal includes a key in the private key method encrypted by the private key in the public key method held by TPM and a mechanism for protecting the data by the key. A Migration Authority holds a security policy table describing a security policy and judges whether data movement from the first terminal to the second terminal is enabled according to the security policy table.
摘要:
A power control system is provided with a plurality of electric appliances and a power control apparatus that controls the operation of the plurality of electric devices. The plurality of electric devices are grouped into one or a plurality of groups, each group containing a plurality of electric devices, and on the basis of state information of the electric devices, the power control apparatus controls the operation of each electric device by group according to a plurality of sets of control contents prepared ahead of time.
摘要:
In the key management software having a key database with a tree structure, a high-speed data encryption/decryption process is achieved by changing the tree structure without reducing the security strength when deleting or adding a key from/to the tree structure. The key management software having the key database with the tree structure, when deleting or adding a key from/to the tree structure, refers to the encryption strength comparison table and the process time comparison table to change the tree structure without reducing the security strength. This reduces the number of times an encrypted key is loaded onto the encryption/decryption processing device during the data encryption/decryption process, thus achieving a high-speed data encryption/decryption.
摘要:
A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may be not present, not authorised, or not correctly operating.
摘要:
The objective of the present invention is to provide a mobile electronic commerce system that is superior in safety and usability. The mobile electronic commerce system comprises an electronic wallet 100, supply sides 101, 102, 103, 104 and 105, and a service providing means 110 that is connected by communication means. The service providing means installs a program for an electronic ticket, an electronic payment card, or an electronic telephone card. The electronic wallet employs the installed card to obtain a product or a service or entrance permission. The settlement process is performed by the electronic wallet and the supply side via the communication means, and data obtained during the settlement process are managed by being transmitted to the service providing means at a specific time. A negotiable card can be easily obtained, and when the negotiable card is used the settlement process can be quickly and precisely performed.
摘要:
Provided is a key migration device which can securely and reliably control the migration of keys. A migration authority (101) fetches a generation level which is the security level of a first electronic terminal (3011) and an output destination level which is the security level of a third electronic terminal (3013), decides whether the relationship between the generation level and the output destination level satisfies a predetermined condition when a request for fetching a collection of keys is received from the third electronic terminal (3013), outputs the key generated by the first electronic terminal (3011) among the collection of keys to the third electronic terminal (3013) if the predetermined condition is fulfilled, and restricts output to the third electronic terminal (3013) of the key generated by the first electronic terminal (3011) among the collection of keys if the predetermined condition is not fulfilled.
摘要:
The present invention provides an information processing device, an authentication system, etc. that save a server the trouble of updating a database, etc., even when a software module in a client device is updated, and that are capable of verifying whether software modules that have been started in the client device are valid. The terminal device A100 holds private keys 1 and 2, and performs authentication processing with the terminal device B101 using the private key 2. The private key 1 has been encrypted such that the private key 1 is decryptable only when secure boot is completed. The private key 2 has been encrypted such that the private key 2 is decryptable using the private key 1 only when the application module X that has been started is valid. When the authentication processing is successful, the terminal device B101 verifies that the terminal device A100 has completed secure boot and the application module X that has been started in the terminal device A100 is valid. Also, the terminal device B101 performs the authentication processing using the same private key 2, regardless of whether a program pertaining to the secure boot of the terminal device A100 is updated or not.
摘要:
To make an electronic value usable for both service on a network and service in the real world while ensuring security, convenience and economical efficiency, the electronic value issued for a user is controlled on an electronic wallet of a private electronic value bank, the electronic value controlled on the electronic wallet of a bank is cached in a mobile electronic wallet on a smart card of a user's portable terminal 5, and the electronic wallet is linked such that it is operated via the network when the mobile electronic wallet is operated. When the electronic value on the smart card is used for the service provided in a real environment such as a ticket gate of a train station, on-line transaction does not occur every time it is used, but the electronic wallet of the bank is updated when the portable terminal and the bank communicate later.