摘要:
The present invention makes it possible to use data that is held by a given terminal device in another terminal device, even after the given terminal device can no longer be accessed externally. If a terminal device 100a detects an event wherein one's own terminal will no longer be externally accessible, then the data held by one's own terminal 100a is transferred to another device 200 that can be accessed externally. Another terminal device 100b, which acquires and uses data, acquires data from the device 200, and uses such.
摘要:
A personal information management device aims to save troubles of inputting passwords and deleting personal information, to prevent others from viewing the personal information, and to maintain confidentiality of the personal information even when a mobile device is lost. Personal information storage unit 201 holds encrypted personal information, key distribution unit 204 distributes a decryption key used for decrypting the encrypted personal information into a first and a second distributed keys based on a secret sharing scheme, distributed key storage unit 205 stores thereon the first distributed key, stores the second distributed key on home device 30, and deletes the decryption key. Upon decryption, link judgment unit 210 judges link establishment. Key recovery unit 207 acquires the second distributed key from home device 30, and recovers the decryption key using the first and the second distributed keys. Decryption unit 208 decrypts the encrypted personal information using the decryption key.
摘要:
An image processing apparatus enables image data to be handled easily after photography. A server apparatus pattern images and control information in correspondence with user identifiers. A digital camera photographs a subject, obtains a pattern image and a piece of control information from the server apparatus, and judges whether a portion of the image data obtained by photography matches the obtained pattern image. If a matching portion exists, the digital camera operations in accordance with an operation instruction included in the piece of control information. If the operation instruction is mosaic processing, the digital camera performs mosaic processing to the matching portion. If the operation instruction is image replacement, the digital camera replaces the matching portion with a predetermined image or performs CG processing on the matching portion. If the operation instruction is frame deletion, the digital camera deletes the image data.
摘要:
An image processing apparatus enables image data to be handled easily after photography. A server apparatus patterns images and controls information in correspondence with user identifiers. A digital camera photographs a subject, obtains a pattern image and a piece of control information from the server apparatus, and judges whether a portion of the image data obtained by photography matches the obtained pattern image. If a matching portion exists, then the digital camera operates in accordance with an operation instruction included in the piece of control information. If the operation instruction is mosaic processing, then the digital camera performs mosaic processing to the matching portion. If the operation instruction is image replacement, then the digital camera replaces the matching portion with a predetermined image or performs CG processing on the matching portion. If the operation instruction is frame deletion, then the digital camera deletes the image data.
摘要:
An authentication system that permits the user to use a function by authenticating the user in a more reliable manner than conventional technologies. The authentication system 1 includes a user terminal 10, an authentication recording medium 20, and wireless ID tags 31, 32, 33, 34, 35, . . . 36. Upon receiving from a user an instruction to activate a function provided by the authentication system for which the access by the user is limited, the user terminal 10 collects ID codes from the wireless ID tags 31, 32, 33, 34, 35, . . . 36, and judge whether or not a level of match between the collected ID codes and the ID codes stored beforehand in the authentication recording medium 20 satisfies a predetermined condition. If the level of match satisfies the predetermined condition, the user terminal 10 activates the designated function.
摘要:
A management device 200d comprises: a key share generation unit 251d generating a plurality of key shares by decomposing a decryption key, the decryption key being for decrypting an encrypted application program generated as a result of encryption of the application program; and an output unit 252d outputting each of the key shares to a different one of a plurality of detection modules. The detection modules acquire and store therein the key shares. The protection control module 120d comprises: an acquisition unit 381d acquiring the key shares from the detection modules; a reconstruction unit 382d reconstructing the decryption key by composing the key shares; a decryption unit 383d decrypting the encrypted application program with use of the decryption key; and a deletion unit 384d deleting the decryption key, after the decryption by the decryption unit is completed.
摘要:
Provided is a content management device for protecting a content of a provider. A content management device 800 deletes one or more contents shared with and held by a user of another device. The content management device 800 comprises: a sharing unit 801 configured to distribute the contents to the user and thereby share the contents with the user; and a switching unit 802 configured to switch a method of the deletion to another method according to a time elapsed from the distribution.
摘要:
A content reproduction system includes an information processing terminal and a secure device. The information processing terminal receives a copyright protection application program from an application distribution server. The copyright protection application program includes a first program having a first execution format executable in the information processing terminal and a second program having a second execution format different from the first execution format and executable in the secure device. The second program is encrypted with a program key held in the secure device. By extracting and executing the first program, the information processing terminal extracts the second program and transmits the second program to the secure device. The secure device receives the second program from the information processing terminal, decrypts the second program using a program key stored in a key storing unit, and executes the second program.
摘要:
A distributing device for generating private information correctly even if shared information is destroyed or tampered with. A shared information distributing device for use in a system for managing private information by a secret sharing method, including: segmenting unit that segments private information into a first through an nth pieces of shared information; first distribution unit that distributes the n pieces of shared information to n holding devices on a one-to-one basis; and second distribution unit that distributes the n pieces of shared information to the n holding devices so that each holding device holds an ith piece of shared information distributed by the first distribution unit, as well as a pieces of shared information being different from the ith piece of shared information in ordinal position among n pieces of shared information, “i” being an integer in a range from 1 to n.
摘要:
Provided is a tampering monitoring system that can identify a monitoring module that has been tampered with among a plurality of monitoring modules. A management apparatus is provided with an acquisition unit that acquires a new monitoring module that has not been tampered with, a generation unit that generates a decoy monitoring module by modifying the acquired monitoring module, a transmission unit that transmits the decoy monitoring module to the information security device and causes the information security device to install the decoy monitoring module therein, a reception unit that receives from the information security device, after the decoy monitoring module has been installed, monitoring results generated by the monitoring modules monitoring other monitoring modules, and a determination unit that identifies, by referring to the received monitoring results, a monitoring module that determines the decoy monitoring module to be valid and determines the identified monitoring module to be invalid.