摘要:
In the conventional file management system, there is a problem that even a file assigned permission information can be processed without considering any permission information. Therefore, the system includes a first accumulation device 2 for accumulating files to which permission information is added, and a new file management apparatus 7 for performing an input/output process on files with a request for a process from the application A 10 accessing the file management system taken into account according to the permission information added to the file. The new file management apparatus 7 compares the permission information added to the file in the first accumulation device 2 with the request contents of the process for the file from the application A 10, determines whether or not the process can be performed on the file, inputs the file from the first accumulation device 2 based on the result, and outputs it to the application A 10.
摘要:
The data transmission system can substantially prohibit illegal copy of real data since the encryption key applied to transmitted data is changed depending on copy management information, thereby the real data being decrypted and recorded with a key different from the original key when the copy management information is tampered. Thus, the transmitted data can be further securely protected than in the prior art.
摘要:
A device registration system for registering a terminal device for obtaining and using contents in a server that stores contents. The server stores a contents list indicating contents stored and a registration list for registering specific information to the terminal device. The server receives the specific information and transmits the contents list to the terminal device. The terminal device receives a selection of a content from the contents list according to input by a user and requests the server to transmit the selected content. When the specific information to the terminal device of the request source is not registered in the registration list, the server performs a registration process and transmits the requested content to the terminal device.
摘要:
A device registration system including a server which holds content and a terminal apparatus which uses content, whereby the terminal apparatus is registered in the server if a communication time between the terminal apparatus and the server is less than or equal to a reference value. A measuring unit of the server measures the communication time, being a time period from transmitting measuring information to the terminal apparatus until receiving response information from the terminal apparatus, and repeats the transmission, the reception, and the measurement until the measured communication time is less than or equal to the reference value. An elapsed-time measuring unit measures an elapsed time from when the measuring unit first begins measuring the communication time, and a transmission unit transmits, to the terminal apparatus, status notification information showing a processing status which depends on the elapsed time. A response unit of the terminal apparatus receives measuring information from the server and transmits response information to the server when the measuring information is received, and a display unit displays a message based on status notification information received from the server.
摘要:
A system including a server holding content and a terminal using the content, whereby the terminal is registered in the server if a communication time between the terminal and the server is less than or equal to a reference value. A measuring unit of the server measures a communication time from transmitting measuring information to the terminal until receiving response information from the terminal, and repeats the transmission, the reception, and the measurement until the measured communication time is less than or equal to the reference value. An elapsed-time measuring unit measures an elapsed time from when the measuring unit first begins measuring the communication time, and a transmission unit transmits, to the terminal, status notification information showing a processing status depending on the elapsed time. A response unit of the terminal receives measuring information from the server and transmits response information to the server when the measuring information is received.
摘要:
A management device 200d comprises: a key share generation unit 251d generating a plurality of key shares by decomposing a decryption key, the decryption key being for decrypting an encrypted application program generated as a result of encryption of the application program; and an output unit 252d outputting each of the key shares to a different one of a plurality of detection modules. The detection modules acquire and store therein the key shares. The protection control module 120d comprises: an acquisition unit 381d acquiring the key shares from the detection modules; a reconstruction unit 382d reconstructing the decryption key by composing the key shares; a decryption unit 383d decrypting the encrypted application program with use of the decryption key; and a deletion unit 384d deleting the decryption key, after the decryption by the decryption unit is completed.
摘要:
Provided is a content management device for protecting a content of a provider. A content management device 800 deletes one or more contents shared with and held by a user of another device. The content management device 800 comprises: a sharing unit 801 configured to distribute the contents to the user and thereby share the contents with the user; and a switching unit 802 configured to switch a method of the deletion to another method according to a time elapsed from the distribution.
摘要:
A content reproduction system includes an information processing terminal and a secure device. The information processing terminal receives a copyright protection application program from an application distribution server. The copyright protection application program includes a first program having a first execution format executable in the information processing terminal and a second program having a second execution format different from the first execution format and executable in the secure device. The second program is encrypted with a program key held in the secure device. By extracting and executing the first program, the information processing terminal extracts the second program and transmits the second program to the secure device. The secure device receives the second program from the information processing terminal, decrypts the second program using a program key stored in a key storing unit, and executes the second program.
摘要:
A distributing device for generating private information correctly even if shared information is destroyed or tampered with. A shared information distributing device for use in a system for managing private information by a secret sharing method, including: segmenting unit that segments private information into a first through an nth pieces of shared information; first distribution unit that distributes the n pieces of shared information to n holding devices on a one-to-one basis; and second distribution unit that distributes the n pieces of shared information to the n holding devices so that each holding device holds an ith piece of shared information distributed by the first distribution unit, as well as a pieces of shared information being different from the ith piece of shared information in ordinal position among n pieces of shared information, “i” being an integer in a range from 1 to n.
摘要:
Provided is a tampering monitoring system that can identify a monitoring module that has been tampered with among a plurality of monitoring modules. A management apparatus is provided with an acquisition unit that acquires a new monitoring module that has not been tampered with, a generation unit that generates a decoy monitoring module by modifying the acquired monitoring module, a transmission unit that transmits the decoy monitoring module to the information security device and causes the information security device to install the decoy monitoring module therein, a reception unit that receives from the information security device, after the decoy monitoring module has been installed, monitoring results generated by the monitoring modules monitoring other monitoring modules, and a determination unit that identifies, by referring to the received monitoring results, a monitoring module that determines the decoy monitoring module to be valid and determines the identified monitoring module to be invalid.