摘要:
A mobile information processing device (200) obtains specific information of a user in response to an operation by the user, authenticates the user based on the specific information, establishes the first wireless communication mode, and then transmits authentication information to an information processing terminal. The information processing terminal (100) receives the authentication information from the mobile information processing device in the first wireless communication mode (A), verifies the received authentication information, generates an identification based on the resultant verification, transmits, in the first wireless communication mode, the identification to the mobile information processing device, then changes from the first wireless communication mode into the second wireless communication mode (B), and iteratively performs polling of the mobile information processing device. The mobile information processing device receives the identification from the information processing terminal in the first wireless communication mode, then changes from the first wireless communication mode to the second wireless communication mode, and transmits, in response to the polling from the information processing terminal, a reply containing the identification back to the information processing terminal in the second wireless communication mode. Thus the presence of the mobile information processing device is managed.
摘要:
A mobile information processing device (200) obtains specific information of a user in response to an operation by the user, authenticates the user based on the specific information, establishes the first wireless communication mode, and then transmits authentication information to an information processing terminal. The information processing terminal (100) receives the authentication information from the mobile information processing device in the first wireless communication mode (A), verifies the received authentication information, generates an identification based on the resultant verification, transmits, in the first wireless communication mode, the identification to the mobile information processing device, then changes from the first wireless communication mode into the second wireless communication mode (B), and iteratively performs polling of the mobile information processing device. The mobile information processing device receives the identification from the information processing terminal in the first wireless communication mode, then changes from the first wireless communication mode to the second wireless communication mode, and transmits, in response to the polling from the information processing terminal, a reply containing the identification back to the information processing terminal in the second wireless communication mode. Thus the presence of the mobile information processing device is managed.
摘要:
An information access system comprises a reader/writer for continually transmitting an ID request signal at a first frequency and being continuously ready to receive an RF signal at a second frequency, and an active contactless information storage device having a receiver for sensing a carrier of an RF signal at the first frequency, and a transmitter for transmitting a response signal at the second frequency when the ID request signal is received. When the receiver senses a carrier of an RF signal at the first frequency in a particular predetermined period, the receiver receives further the ID request signal, and, in response to the ID request signal, the transmitter transmits a response signal at the second frequency carrying an ID of the storage device stored. In the carrier sensing, the controller causes the receiver to be in an active state and the transmitter to be in an inactive state in the predetermined periods. When the receiver attempts to sense a carrier of the RF signal at the first frequency in a particular predetermined period but detects no carrier, the controller controls the receiver and the transmitter to maintain the inactive state during a sleep period between the particular predetermined period and the subsequent predetermined period.
摘要:
An information access system comprises a reader/writer for continually transmitting an ID request signal at a first frequency and being continuously ready to receive an RF signal at a second frequency, and an active contactless information storage device having a receiver for sensing a carrier of an RF signal at the first frequency, and a transmitter for transmitting a response signal at the second frequency when the ID request signal is received. When the receiver senses a carrier of an RF signal at the first frequency in a particular predetermined period, the receiver receives further the ID request signal, and, in response to the ID request signal, the transmitter transmits a response signal at the second frequency carrying an ID of the storage device stored. In the carrier sensing, the controller causes the receiver to be in an active state and the transmitter to be in an inactive state in the predetermined periods. When the receiver attempts to sense a carrier of the RF signal at the first frequency in a particular predetermined period but detects no carrier, the controller controls the receiver and the transmitter to maintain the inactive state during a sleep period between the particular predetermined period and the subsequent predetermined period.
摘要:
An information processing apparatus includes a TPM, a key management module for managing a key database, a memory, and a file processing module for encrypting and decrypting a file. The TPM stores a first TPM key therein and encrypts a third TPM key. The key management module stores and manages the third TPM key in the database. When the information processing apparatus starts communicating with the tamper-proof device, the key management module receives, from the TPM, a parameter for generating a second TPM key, provides the received parameter to the tamper-proof device, receives from the tamper-proof device the second TPM key which has been encrypted using the first TPM key, and provides the TPM with the second TPM key and with the third TPM key which has been encrypted using the second TPM key. When the second TPM key contains password check information, the TPM receives from the tamper-proof device a password associated with the password check information, and verifies the received password using the password check information. When it is verified that the password is correct, the TPM decrypts the second TPM key using the first TPM key, decrypts the third TPM key using the decrypted second TPM key, and decrypts, using the decrypted third TPM key, an encrypted encryption key for decrypting the file. The file processing module decrypts the file using the decrypted encryption key.
摘要:
An information processing apparatus includes a TPM, a key management module for managing a key database, a memory, and a file processing module for encrypting and decrypting a file. The TPM stores a first TPM key therein and encrypts a third TPM key. The key management module stores and manages the third TPM key in the database. When the information processing apparatus starts communicating with the tamper-proof device, the key management module receives, from the TPM, a parameter for generating a second TPM key, provides the received parameter to the tamper-proof device, receives from the tamper-proof device the second TPM key which has been encrypted using the first TPM key, and provides the TPM with the second TPM key and with the third TPM key which has been encrypted using the second TPM key. When the second TPM key contains password check information, the TPM receives from the tamper-proof device a password associated with the password check information, and verifies the received password using the password check information. When it is verified that the password is correct, the TPM decrypts the second TPM key using the first TPM key, decrypts the third TPM key using the decrypted second TPM key, and decrypts, using the decrypted third TPM key, an encrypted encryption key for decrypting the file. The file processing module decrypts the file using the decrypted encryption key.
摘要:
An information processing device disclosed includes a plurality of executing units for executing various processes. The information processing device and method thereof acquire setting information that indicates an operating condition with respect to each executing unit from information an operation of a main process executed by the plurality of executing units, and sets an operating state of each of the executing units based on the acquired setting information.
摘要:
An information processing device having an activation verification function comprises: a module recording portion which stores plural system programs, a security chip having the function of checking the validity of the system programs and a verification portion which inspects the activation states of the system programs. The security chip executes validity checking processing using verification data provided by the system programs. If the security chip cannot confirm the validity of the system programs, the verification portion acquires activation-state information about activated system programs from the activated system programs. If pre-stored verification-information initial values for valid system programs and the acquired activation-state information match with each other, the verification portion determines that the current activation states of the system programs are valid, and the subsequent activation processing for the system programs is advanced.
摘要:
An information processing unit is an unit which has an information division recording function in which a file is divided and stored. The information processing unit includes a first storage section for storing a first partial file of a file divided, a second storage section for storing a second partial file, a state detection section for checking an operating state of the information processing unit and detecting that the operating state has changed in a specific manner, and a control section for performing a lock processing in accordance with the state detected to the second partial file stored on the second storage section when the state detected by the state detection section is determined as a risky state in which unauthorized access can be performed.
摘要:
A non-transitory computer-readable medium for recording a program allowing a computer to execute: determining whether first identification information of the computer matches with second identification information stored in the computer-readable medium connected to the computer; executing a process stored in the computer-readable medium upon the determining that the first identification information and the second identification information do not match; selecting a communication unit from one or a plurality of communication units included in the computer; and transmitting third information regarding the execution of the process using the selected communication unit.