摘要:
To delegate authority for cryptographic communication without increasing the risk of leaking a device key. A system and method including a first communication apparatus and a managing apparatus allowing the first communication apparatus to perform cryptographic communication with an external at least one second communication apparatus. The managing apparatus includes: storing a first device key shared with the second communication apparatus; generating a computation by passing the first device key read from the stored keys to a keyed one-way function, to generate a computed result as a second device key; and outputting the second device key and a key of the one-way function to the first communication apparatus. The first communication apparatus transmits a key of a one-way function to the second communication apparatus causing the second communication apparatus to perform a computation which generates a second device key, and which performs a cryptographic communication with a second communication apparatus.
摘要:
To delegate authority for cryptographic communication without increasing the risk of leaking a device key. A system and method including a first communication apparatus and a managing apparatus allowing the first communication apparatus to perform cryptographic communication with an external at least one second communication apparatus. The managing apparatus includes: storing a first device key shared with the second communication apparatus; generating a computation by passing the first device key read from the stored keys to a keyed one-way function, to generate a computed result as a second device key; and outputting the second device key and a key of the one-way function to the first communication apparatus. The first communication apparatus transmits a key of a one-way function to the second communication apparatus causing the second communication apparatus to perform a computation which generates a second device key, and which performs a cryptographic communication with a second communication apparatus.
摘要:
To delegate authority for cryptographic communication without increasing the risk of leaking a device key. A system and method including a first communication apparatus and a managing apparatus allowing the first communication apparatus to perform cryptographic communication with an external at least one second communication apparatus. The managing apparatus includes: storing a first device key shared with the second communication apparatus; generating a computation by passing the first device key read from the stored keys to a keyed one-way function, to generate a computed result as a second device key; and outputting the second device key and a key of the one-way function to the first communication apparatus. The first communication apparatus transmits a key of a one-way function to the second communication apparatus causing the second communication apparatus to perform a computation which generates a second device key, and which performs a cryptographic communication with a second communication apparatus.
摘要:
To delegate authority for cryptographic communication without increasing the risk of leaking a device key. A system and method including a first communication apparatus and a managing apparatus allowing the first communication apparatus to perform cryptographic communication with an external at least one second communication apparatus. The managing apparatus includes: storing a first device key shared with the second communication apparatus; generating a computation by passing the first device key read from the stored keys to a keyed one-way function, to generate a computed result as a second device key; and outputting the second device key and a key of the one-way function to the first communication apparatus. The first communication apparatus transmits a key of a one-way function to the second communication apparatus causing the second communication apparatus to perform a computation which generates a second device key, and which performs a cryptographic communication with a second communication apparatus.
摘要:
An image of a sample print printed to obtain parameters is picked up by using “a parameter obtaining device” that meets the standards of an instrument for the invention of “the electronic scrap system.” Then, the picked-up image is captured by a DTP system, and color data of a needed position are imported to a parameter DB. Thereby, parameters for simulation to be used in an invisible code printing support system can be easily inputted. Use of this method eliminates the necessity of figuring out parameters through experiments and the like, and of inputting these parameters as numerical values. In addition, since this method uses a physical medium and inks to be actually used, as they are, their optical characteristics, an influence of a blue component of invisible light emitted from an ultraviolet LED, and the like can be inputted all together as a picked-up image. Accordingly, it becomes possible to input parameters capable of accurately reproducing actual printed conditions, and thereby to produce printed materials providing high reading accuracy.
摘要:
To provide lossless embedding of a visible watermark in compressed motion picture data.The present invention includes a quantization/dequantization operation part 10 for dequantizing motion picture data that has been subjected to compression including frequency transformation and quantization, and a watermark embedding/removing operation part 30 for generating and embedding a pattern of a visible watermark corresponding to a motion compensated prediction in motion picture data dequantized by the quantization/dequantization operation part 10. The quantization/dequantization operation part 10 quantizes motion picture data with a watermark embedded by the watermark embedding/removing operation part 30.
摘要:
A computer program product to implement a method for manufacturing a physical medium configured to store data. A layout design of visible information to be printed with visible ink in a book is generated, the visible information including an article. A layout design of invisible information to be printed with invisible ink in a book is generated, the invisible information including a Universal Resource Locator (URL) of an address of a web server at which additional information is located, the URL being encoded in a code within the invisible information, the additional information being associated with the article.
摘要:
A system and method of decrypting is provided. The method includes grouping domain data of the domain for authorized parties, encrypting a group of leaves in the grouped data having a tree structure using a common key, generating first public data, obtaining a common key by decrypting the first public data using a secret key of a link creator and decrypt the groups using the common key and the secret key, generating a, propagating records, generating second public data by encrypting the table using a common key, obtaining a common key by decrypting the first public data and the second public data using a secret key and generating a view by decrypting data received from a method for the link creator using the common key obtained by decrypting the first public data and the second public data using the secret key.
摘要:
Method and system for embedding a unique and different digital watermark in digital contents for each access without increasing the overhear or load at the contents server. The contents server has a digital watermark-embedded contents storage unit for storing a plurality of digital contents where a different digital watermark is embedded, and a fingerprint performing unit for, adding to the digital contents the information specified using a bit row that is formed by a digital watermark being embedded for each part of the digital contents.
摘要:
A method of manufacturing a physical medium configured to store data. A layout design of visible and invisible information to be printed in a book with visible and invisible ink, respectively, is generated. The visible information includes an article. The invisible information includes a URL of an address of a web server at which additional information associated with the article is located. Print data of the visible and invisible information based on the generated layout design of the visible and invisible information are generated. The generated print data of the visible and invisible information are stored on the physical medium. A book containing the article in visible ink and the invisible information in invisible ink is produced. A cellular phone is used to obtain the additional information by identifying the URL via illuminating and photographing the invisible information in the book using a light-emitting element in the cellular phone.