摘要:
The authentication system has a signing station and a certifying station. The signing station divides the data to be transmitted into a plurality of data, a hash unit creates a plurality of authenticators by applying a different one-way function to each of the data. In the certifying station, a separating unit divides the data into a plurality of data, a hash unit creates a plurality of authenticators by applying a different one-way function to each data, and a comparing unit compares the authenticators prepared anew with the authenticators separated from the received data and checks the authentication of the data from the comparison.
摘要:
In a signature creating apparatus, a clock generates a time stamp and in which time can be set only by a computer installed in a certificate authority center. Further, connecting sections connects an apparatus ID for specifying an apparatus and the time stamp and personal identification information for identifying an implementor to a plain-text so as to create data for the signature. A signature creating circuit encrypts the data for the signature using a signature creating key or the like and generates the signature. A connecting section connects the signature to the data for the signature and transmits the data as data after signature.
摘要:
An information management method restoring electronic data using backup information upon the loss of electronic data stored on a recording medium. Information stored in a predetermined area of the recording medium having medium-specific information is encrypted using medium-specific information or a key generated therefrom and is derived outside the predetermined area.
摘要:
Before accepting a setting request from a predetermined manager in a plurality of date-and-time managers capable of issuing a date-and-time setting request, a setting request from any manager can be accepted. After accepting a setting request from a predetermined manager, only the setting request from the predetermined manager can be accepted. A date and time can be set in response to an accepted date-and-time setting request.
摘要:
A file processing unit comprises a first signature information producing unit that produces first signature information in accordance with a predetermined rule utilizing the data of a file designated by a file close request issued in an application used in a computer system, and a signature information storage control unit that stores the first signature information, correlated with the file designated by the file close request, in a storage unit.
摘要:
A cryptographic communication method is provided in which a cryptographic communication is performed by an easy operation even if both enciphered data and unenciphered data are mixed to be handled. In the transmission side, a communication key is used for enciphering data to be transmitted, and in the reception side the same communication key as in the transmission side is used for decoding received data. In the transmission side, an individual key that is different from the communication key is used for enciphering the data to be transmitted, the enciphered data are decoded by using the individual key first, and then the decoded data are enciphered by using the communication key so that the enciphered file can be transmitted.
摘要:
A command authorization method that prevents a command issued by a third party from impersonating a command issued by a legitimate user, thereby maintaining high security. An authorization code stored in a command transmitted from a host is collated in a command authorization code parser. If the authorization code coincides with collating information therein, a command parser generates a predetermined access command, which is executed by a command controller.
摘要:
A device management system is configured with a target device including at least one unit that includes a tamper-resistant chip, a management apparatus that manages or uses the target device, and an authentication apparatus including a database for authentication, connected via a network in a communicable manner. In the target device, each unit is equipped with the tamper-resistant chip that collects device information specific to a unit, stores collected device information, and stores a confidential-key.
摘要:
A method for sharing content between clients at a common trust level in a trust hierarchy associated with a network implementing policy-based management includes making a first request for delivery of content, receiving the requested electronic content, receiving a second request for delivery of the electronic content, communicating the second request, receiving a decision, and delivering the electronic content if the second request is granted. The first request is made to a policy enforcement point in the network for delivery of content to a first client, and includes a trust level of the first client. The second request is for delivery of the content to a second client at the trust level of the first client and includes integrity information about the second client, and is communicated to the policy enforcement point. If the second request is granted, the content is delivered from the first client to the second client.
摘要:
An information processing apparatus includes a chip implemented therein to independently perform a predetermined process. The chip includes a storage unit that stores user unique information in which biometric information of a user and unique information for use when a unique process corresponding to the user is performed are associated with each other, and an information processing unit that retrieves, when biometric information of the user is obtained, unique information corresponding to the obtained biometric information from the user unique information and performs a predetermined process by using the retrieved unique information.