摘要:
A storage apparatus includes a key management unit for managing an individual key unique to the apparatus and a common key shared with other storage apparatuses, and an encryption unit for performing an encrypting process or verifying data for performing the encrypting process on electronic data stored in the apparatus to which the unit belongs using the individual key, and performing the encrypting process or verifying the data on the electronic data transmitted to or received from another apparatus using the common key. Thus, the apparatus communicates data using an applicable common key in a local environment and a global environment, appropriately manages a key in each environment, and guarantees the security of the electronic data.
摘要:
By storing an authenticator created from a data file in a secure area usually unaccessible, the alteration of the data file can be detected. Furthermore, by designating the data file as a main-file and creating authenticators from various kinds of sub-files related to the main-file, the size of the secure area where the authenticators are stored, can be reduced.
摘要:
An information storage device in which a plurality of storage media having different accessibility is provided with a unit for controlling the retrieval of a portable storage medium which can be retrieved from an information storage device by selecting, at a request to retrieve the portable storage medium, the storage medium either as storing the body of a file and the data for use in accessing the file or as storing only the body of the file. The information storage device stores in and moves to a storage medium at an appropriate level the data for use in accessing a file depending on the situation.
摘要:
An electronic data storage apparatus includes a data storage unit for storing electronic data; an authentication information generation unit for generating authentication information used in detecting an amendment made to the stored electronic data; and an authentication information data output unit for outputting the electronic data after adding to the electronic data the authentication information generated for the electronic data. When an authorization unit authorizes the electronic data storage apparatus after it is determined that the specification of the electronic data satisfies a predetermined condition, or when mutual authentication is performed between electronic data storage apparatuses, the electronic data storage apparatus stores the data. Thus, the electronic data can be protected from being illegally amended or deleted, and can be safely stored in a format in which sufficient legal evidence can be maintained on the electronic data.
摘要:
By storing an authenticator created from a data file in a secure area usually unaccessible, the alteration of the data file can be detected. Furthermore, by designating the data file as a main-file and creating authenticators from various kinds of sub-files related to the main-file, the size of the secure area where the authenticators are stored, can be reduced.
摘要:
An electronic document is registered as electronic original data in an apparatus different from the computer environment of a user. At this time, a registration certificate for uniquely identifying the electronic original data is issued, and the user accesses the electronic original data using the issued registration certificate.
摘要:
In an authentication system for companies, a server appends suitable verification data to an electronic document to be circulated through terminal units for persons in charge. Each terminal is allocated a unique function in advance and applies it to the verification data in turn when receiving the document. Upon receipt of the document that has been circulated through the persons in charge, the server examines the function-applied value appended to the document to determine whether the document has been circulated correctly through the persons in charge, or via the correct route.
摘要:
The digital signatures of users A and B are created for a transaction document which states the contents of a transaction between the users A and B, and they are sent to a transaction proof device of a notary public being a third party, together with the transaction document. Thus, the users A and B and the notary public share information, and the notary public can objectively prove the transactional contents, etc.
摘要:
A computer-system fixed-priority process scheduler that is supported by an operating system (OS) and establishes fixed priorities respectively corresponding to a plurality of processes to be scheduled. Further, the priorities can be changed by designation from the user processes. The process scheduler allocates a central processing unit (CPU) to executable ones of the processes in the descending order of the priorities thereof. Moreover, a user-level process scheduler is provided in a fixed-priority process scheduler space, namely, in a real-time class process scheduler space. The user-level process scheduler has a first priority of a real time class. Furthermore, the user-level process scheduler performs the scheduling of a group of other user processes, which have priorities lower than the first priority, and causes the group of such user processes to operate or run. Namely, the user-level process scheduler determines the allocation of the CPU to such user processes and requests the OS to execute such user processes.
摘要:
A computer-system fixed-priority process scheduler that is supported by an operating system (OS) and establishes fixed priorities respectively corresponding to a plurality of processes to be scheduled. Further, the priorities can be changed by designation from the user processes. The process scheduler allocates a central processing unit (CPU) to executable ones of the processes in the descending order of the priorities thereof. Moreover, a user-level process scheduler is provided in a fixed-priority process scheduler space, namely, in a real-time class process scheduler space. The user-level process scheduler has a first priority of a real time class. Furthermore, the user-level process scheduler performs the scheduling of a group of other user processes, which have priorities lower than the first priority, and causes the group of such user processes to operate or run. Namely, the user-level process scheduler determines the allocation of the CPU to such user processes and requests the OS to execute such user processes.