摘要:
In a time information distribution system for distributing time information from a time distributing station to terminals, the time distributing station gives the electronic signature of the time distributing station to time information to be distributed and distributes the time information to which the electronic signature has been appended to the terminals. The terminals verify the electronic signature given to the time information distributed from the time distributing station and, if a determination has been made that the electronic signature has already been given by the time distributing station, store the time information to which the electronic signature is given in a hardware security module installed in the terminals.
摘要:
A management server calculates a hash value of software for providing a service, generates a first software area from software which is provided a second electronic signature, provides a third electronic signature to user information provided with a first electronic signature transmitted from a terminal, to the hash value, and to user management information, encrypts a second software area generated from the third electronic signature, user information, from hash value, and from user management information using a common key of the management server and service providing server, combines the first software area and encrypted second software area to create a software IC card, encrypts the software IC card using a public key of the terminal, and transmits the encrypted software IC card to the terminal.
摘要:
In a log acquisition system comprising a log collection terminal for collecting log data and a log acquisition terminal for acquiring the log data collected by the log collection terminal from the log collection terminal, the log collection terminal stores a common key between the log collection terminal and the log acquisition terminal in a hardware security module inherently mounted in the log collection terminal, encrypts the collected log data as encrypted log data using the stored common key, and stores the encrypted log data, and the log acquisition terminal stores the common key in a hardware security module inherently mounted in the log acquisition terminal, acquires the encrypted log data from the log collection terminal, and decrypts the acquired encrypted log data with the common key.
摘要:
An electronic data transmission and reception system has n apparatus, a transmitting apparatus, and a receiving apparatus which are connected to a network. The transmitting apparatus transmits first electronic data to a first apparatus. The receiving apparatus receives (n+1)th electronic data from a nth apparatus. A jth (j is an integer satisfying 1≦j≦n) apparatus generates (j+1)th electronic data which comprise jth electronic data with a signature assigned thereto for identifying the jth apparatus, and transmits the (j+1) electronic data to a (j+1)th apparatus. When j is n, an (n+1)th apparatus corresponds to the receiving apparatus. The electronic data transmission and reception system guarantees the first electronic data transmitted by the transmitting apparatus until the first electronic data are received by the receiving apparatus, because of signatures that are generated until the (j+1) electronic data are generated.
摘要:
Provided is a communication system capable of fundamentally preventing an attack from an unspecified counterpart and resolve problem even when a problem occurs in a user terminal or client and a server. A mediation server (1) receives an attack from an outside source on behalf of a server (34) (server A), redirects and receives communication addressed to a node-representative ID, and performs first authentication for the communication. In the case of a reliable user terminal or client (42) (client B), the mediation server (1) provides the device with an intermediary server ID specifying an intermediary server (2). The intermediary server (2) performs second authentication for the user terminal or client (42) (client B) going through the mediation server (1). When it is identified that the user terminal or client (42) (client B) is reliable, the intermediary server (2) asks the server (34) (server A) about an ID and provides the user terminal or client (42) (client B) with traceable ID information acquired from the server (34) (server A).
摘要:
When a client transmits an HTML request to a server (step S5), the server generates HTML texts (step S7), and transmits the generated texts to the client (step S8). A control unit obtains information displayed by a browser (step S11), and determines whether or not confidential information like personal information is displayed by the browser and it is necessary to create a log, and creates the log if necessary (step S12). When creating the log, the control unit transmits the created log to the WWW server (step S13).
摘要:
A server includes a packet monitoring unit for monitoring a packet that is sent from a terminal without a function of automatically allocating an Internet Protocol (IP) address to a destination via an unknown network so as to detect the destined IP address of the packet; and a setting changing unit for setting the destined IP address detected by the packet monitoring unit to a self device.
摘要:
Provided is a communication system capable of fundamentally preventing an attack from an unspecified counterpart and resolve problem even when a problem occurs in a user terminal or client and a server. A mediation server (1) receives an attack from an outside source on behalf of a server (34) (server A), redirects and receives communication addressed to a node-representative ID, and performs first authentication for the communication. In the case of a reliable user terminal or client (42) (client B), the mediation server (1) provides the device with an intermediary server ID specifying an intermediary server (2). The intermediary server (2) performs second authentication for the user terminal or client (42) (client B) going through the mediation server (1). When it is identified that the user terminal or client (42) (client B) is reliable, the intermediary server (2) asks the server (34) (server A) about an ID and provides the user terminal or client (42) (client B) with traceable ID information acquired from the server (34) (server A).