Patent application number | Description | Published |
20080278285 | RECORDING DEVICE - When a recording media | 11-13-2008 |
20090019551 | INFORMATION SECURITY DEVICE AND COUNTER CONTROL METHOD - A method is provided for flexibly setting a shared counter shared by a plurality of security modules sharing a counter in tree structures, while curbing the amount of secure memory used. The shared counter is realized by a first counter group having a tree structure managed by a first secure module and a second counter group having a tree structure managed by a second secure module sharing a node in the tree structure of the first counter group and a node in the tree structure of the second counter group. The method of sharing using tree structures enables flexibly addition, deletion and access restriction setting of modules that use the shared counter. | 01-15-2009 |
20090046862 | METHOD AND DEVICE FOR SPEEDING UP KEY USE IN KEY MANAGEMENT SOFTWARE WITH TREE STRUCTURE - In the key management software having a key database with a tree structure, a high-speed data encryption/decryption process is achieved by changing the tree structure without reducing the security strength when deleting or adding a key from/to the tree structure. The key management software | 02-19-2009 |
20090106832 | COMPUTER SYSTEM AND PROGRAM CREATING DEVICE - A mobile telephone | 04-23-2009 |
20090193521 | ELECTRONIC DEVICE, UPDATE SERVER DEVICE, KEY UPDATE DEVICE - The present invention offers an electronic device that reduces the amount of data for communication required when files pertaining to software are to be updated, as compared to the conventional devices, and performs tamper detection. The present invention is an electronic device having an application file pertaining to an operation of application software and updating the application file via a network. The electronic device (i) stores therein the application file including one or more data pieces, (ii) receives, from an external apparatus via the network, update data and location information indicating a location, within the application file, which is for rewrite with the update data, (iii) rewrites only part of the application file by writing over a data piece present at the indicated location with the update data, to update the application file, and (iv) examines whether the updated application file has been tampered with. | 07-30-2009 |
20090204806 | CERTIFYING DEVICE, VERIFYING DEVICE, VERIFYING SYSTEM, COMPUTER PROGRAM AND INTEGRATED CIRCUIT - An authentication system that can show having an authentic computer program, can certify the authenticity of itself, and can verify the certification. The authentication system is composed of a terminal (requesting device) and a card (verifying device). The card stores secret information to be used by the terminal, and an update program for the terminal. The card verifies authenticity of the terminal using information obtained from the terminal. When it judges that the terminal is authentic, the card outputs the secret information to the terminal. When it judges that the terminal is not authentic, the card outputs the update program. With this structure, the terminal is forced to update the program when it attempts to use the secret information. | 08-13-2009 |
20090268905 | ELECTRONIC DEVICE, CONTENT REPRODUCTION CONTROL METHOD, PROGRAM, STORAGE MEDIUM, AND INTEGRATED CIRCUIT - In order to play back a content while managing the right on use of the content, such as a total time of playback of the content, an electronic device stores right information in a right temporary storage unit | 10-29-2009 |
20090307783 | DATA PROCESSING DEVICE, METHOD, PROGRAM, INTEGRATED CIRCUIT, AND PROGRAM GENERATING DEVICE - A data processing apparatus controls execution of debugging of a program performed by a debugger. The program includes a verification value used for judgment on whether to permit the debugging, and an access control list that shows whether to permit an access to each of parts constituting the program. The data processing apparatus acquires a debugger ID of the debugger from the debugger, and the verification value and the access control list included in the program. The data processing apparatus judges whether to permit the debugging, according to the result of comparison between the debugger ID and the verification value. The data processing apparatus permits an access to a part of the program to be debugged when the access control list shows that the access is permitted. The data processing apparatus does not permit the access to the part when the access control list shows that the access is not permitted. | 12-10-2009 |
20090313425 | MEMORY CONTROL APPARATUS, CONTENT PLAYBACK APPARATUS, CONTROL METHOD AND RECORDING MEDIUM - A data storage apparatus is provided that realizes a measure against deterioration of a flash memory in which integrity check data is stored. A content playback apparatus ( | 12-17-2009 |
20090320110 | SECURE BOOT WITH OPTIONAL COMPONENTS METHOD - A method is executed which is for managing the optional trusted components that are active within a device, such that the device itself controls the availability of trusted components. The device includes: a storing unit which stores a plurality of pieces of software and a plurality of certificates; a receiving unit which receives the certificates; and a selecting unit which selects one of the certificates. The device further includes an executing unit which verifies an enabled one of the plurality of pieces of software using the selected and updated one of the certificates. | 12-24-2009 |
20100162352 | FALSIFICATION DETECTING SYSTEM, FALSIFICATION DETECTING METHOD, FALSIFICATION DETECTING PROGRAM, RECORDING MEDIUM, INTEGRATED CIRCUIT, AUTHENTICATION INFORMATION GENERATING DEVICE AND FALSIFICATION DETECTING DEVICE - A tamper detection device detects tampering with a program loaded to memory, at high speed and without compromising the safety. Prior to loading of a program, a dividing-size determining unit | 06-24-2010 |
20100174919 | PROGRAM EXECUTION APPARATUS, CONTROL METHOD, CONTROL PROGRAM, AND INTEGRATED CIRCUIT - Information processing apparatus | 07-08-2010 |
20100180346 | OBFUSCATION ASSISTING APARATUS - To provide, in order that proper obfuscation of a source code ( | 07-15-2010 |
20100185845 | SECURE BOOT TERMINAL, SECURE BOOT METHOD, SECURE BOOT PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted. The terminal comprises a CPU, a software module storage unit, a certificate storage unit, an updating unit for updating the software module and certificate, a security device provided with a configuration information storage unit for storing the configuration information of the software module, an alternate configuration information storage unit for storing the configuration information of a software module in the configuration before the update, and a boot control unit for verifying and executing the software module by using the certificate. The terminal verifies the certificate of the software module by comparing the configuration information stored by the configuration information storage unit with the configuration information stored by the alternate configuration information storage unit. | 07-22-2010 |
20100229168 | DATA PROCESSING DEVICE, DATA PROCESSING METHOD, DATA PROCESSING PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - When notifying virtual machines of a change to shared data, it is impossible to realize power saving for the apparatus if always notifying a virtual machine in the power-saving state. | 09-09-2010 |
20100268936 | INFORMATION SECURITY DEVICE AND INFORMATION SECURITY SYSTEM - Provided is a migration system considering security authentication levels and data protection strength levels of the both security devices between which data is migrated. | 10-21-2010 |
20100318781 | SECURE BOOT WITH OPTIONAL COMPONENTS METHOD - A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may not be present, not correctly authorized, or not correctly operating. | 12-16-2010 |
20100322413 | ELECTRONIC DEVICE, CONTENT REPRODUCTION CONTROL METHOD, PROGRAM, STORAGE MEDIUM, AND INTEGRATED CIRCUIT - To play back a content while managing the right of use of the content, such as a total time of playback of the content, an electronic device stores right information in a right temporary storage unit | 12-23-2010 |
20100325628 | INFORMATION PROCESSING DEVICE - A terminal having a plurality of virtual machines in one-to-one correspondence with a plurality of stakeholders is enabled to activate in compliance with the trust dependency relation among the virtual machines and a virtual machine monitor. The terminal includes: the plurality of virtual machines in one-to-one correspondence with the plurality of stakeholders; a plurality of tamper-resistant modules in one-to-one correspondence with the virtual machines, and a management unit controlling the virtual machines and the tamper-resistant modules in mutually related manner. Each virtual machine securely boots with reference to a certificate having a trust dependency with one or other virtual machines. | 12-23-2010 |
20100332820 | INFORMATION SECURITY DEVICE AND INFORMATION SECURITY SYSTEM - The present invention provides a migration apparatus that realizes safe migration of data between devise that use different encryption algorithms and different security authentication levels. The fourth electronic terminal device | 12-30-2010 |
20110004771 | ELECTRONIC TERMINAL, CONTROL METHOD, COMPUTER PROGRAM AND INTEGRATED CIRCUIT - An electronic terminal performs early detection of unauthorized analysis thereon and prevents unauthorized acquisition and falsification of confidential information that is not to be released to a third party. The electronic terminal stores confidential information that is protected by consecutive application of a plurality of protection measures for defense against an attack from a third party. The electronic terminal monitors for attacks to the protection measures from an external source, and upon detecting an attack on one protection measure, updates a protection state of the confidential information to a new protection state in which either a new protection measure has been added to a protection path from the one attacked protection means to the confidential information, or the one protection measure on the path has been updated to a higher defense level. | 01-06-2011 |
20110066838 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM AND INTEGRATED CIRCUIT FOR THE REALIZATION THEREOF - The present invention provides an information processing apparatus that is capable of continuously performing secure boot between module groups in the case where software of a terminal device consists of module groups provided by a plurality of providers, while keeping independence between the providers. The information processing apparatus is provided with a linkage certificate that contains a first configuration comparison value | 03-17-2011 |
20110072266 | INFORMATION PROCESSING DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - The present invention provides an information processing device, an authentication system, etc. that save a server the trouble of updating a database, etc., even when a software module in a client device is updated, and that are capable of verifying whether software modules that have been started in the client device are valid. The terminal device A | 03-24-2011 |
20110081017 | KEY MIGRATION DEVICE - Provided is a key migration device which can securely and reliably control the migration of keys. A migration authority ( | 04-07-2011 |
20110099362 | INFORMATION PROCESSING DEVICE, ENCRYPTION KEY MANAGEMENT METHOD, COMPUTER PROGRAM AND INTEGRATED CIRCUIT - For the keys in a key tree group composed of root keys for each of multiple stakeholders, a shared key is generated between the multiple stakeholders, and access restrictions with respect to the generated shared key are flexibly set. A shared key control unit and a tamper-resistant module are provided for each of the multiple stakeholders. The shared key is set based on stakeholder dependency relationships. After the shared key is set, access to the shared key is controlled so that access is not possible by malicious stakeholders, so as to maintain the security level. | 04-28-2011 |
20110126284 | CONTENT REPRODUCTION DEVICE, CONTENT REPRODUCTION DEVICE CONTROL METHOD, CONTENT REPRODUCTION PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A content playback device of the present invention includes a playback unit | 05-26-2011 |
20110173460 | INFORMATION PROCESSING DEVICE, METHOD, PROGRAM, AND INTEGRATED CIRCUIT - The aim is to provide high-speed data synchronization. To achieve the aim, in data synchronization using a plurality of key databases with respect to same data pieces, a key for one key database, which has been determined in advance, is used for updating the data piece managed under the other key database. This reduces the number of key decryption operations. A key management software | 07-14-2011 |
20110173643 | USING TRANSIENT PCRs TO REALISE TRUST IN APPLICATION SPACE OF A SECURE PROCESSING SYSTEM - A method to allow programs running within the application space of a device with a secure processor and a trusted computing base to flexibly use certificates that describe the required system state. An information processing device including PSC database ( | 07-14-2011 |
20110185165 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING PROGRAM, AND INTEGRATED CIRCUIT - It is possible to update and re-seal sealed data having a usability condition of matching with predetermined terminal environment information during a secure boot without rebooting a terminal when a program using the sealed data is updated. An information processing terminal ( | 07-28-2011 |
20110238324 | BIOLOGICAL INFORMATION MEASURING DEVICE AND CONTROL METHOD THEREOF - A biological information measuring device including: a finger insertion part ( | 09-29-2011 |
20110276795 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - A method to allow a value to be written into one PCR domain, only if values from a second PCR domain are valid, thus ensuring the extension of the chain of trust between domains. | 11-10-2011 |
20110289294 | INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: a CPU ( | 11-24-2011 |
20110314280 | HEALTH CARE SYSTEM - A measurement device ( | 12-22-2011 |
20120060008 | INFORMATION PROCESSING TRMINAL, METHOD, PROGRAM, AND INTEGRATED CIRCUIT FOR CONTROLLING ACCESS TO CONFIDENTIAL INFORMATION, AND RECORDING MEDIUM HAVING THE PROGRAM RECORDED THEREON - An information processing terminal ( | 03-08-2012 |
20120098518 | DETECTION APPARATUS AND DETECTION SYSTEM - A detection apparatus ( | 04-26-2012 |
20120102313 | SECURE BOOT METHOD AND SECURE BOOT APPARATUS - A method to allow a device to boot in a secure fashion, even though some of the components within the secure device's firmware may be not present, not authorised, or not correctly operating. | 04-26-2012 |
20120117566 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM DISTRIBUTION SYSTEM - Provided is an information processing device which is capable of preventing data leakage caused by a malicious application or malicious device driver and of allowing cooperation among virtual machines. The information processing device ( | 05-10-2012 |
20120117658 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - The information processing apparatus includes: a tampering determination unit ( | 05-10-2012 |
20120246470 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING SYSTEM, SOFTWARE ROUTINE EXECUTION METHOD, AND REMOTE ATTESTATION METHOD - Techniques for protecting memory locations within a stakeholder's engine according to the Multi-Stakeholder Model, and a protocol for remote attestation to a device supporting the Multi-Stakeholder Model that provides extra evidence of the identity of the three actors. | 09-27-2012 |
20120260250 | INFORMATION PROCESSING DEVICE, VIRTUAL MACHINE CREATION METHOD, AND APPLICATION DISTRIBUTION SYSTEM | 10-11-2012 |
20120291138 | INFORMATION PROCESSING APPARATUS AND METHOD FOR PREVENTING UNAUTHORIZED COOPERATION OF APPLICATIONS - An information processing terminal ( | 11-15-2012 |
20120297485 | INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - To improve the responsiveness of a system call process without compromising safety, an information processing device according to the present invention includes: an application identification unit configured to identify a program being executed in the information processing device, by acquiring the application identifier; a caller identification unit configured to identify a caller indicating a portion of the program from which a program code is called when the identified program calls the program code; a checked-application management unit configured to manage a check result which is information including a result of previous check for safety of executing the identified program; and an attack check determination unit configured to determine, based on the identified caller and the check result, whether a check if the identified program is under attack is to be made. | 11-22-2012 |
20130015716 | SMART METER, SUPPLY CONTROL METHOD, OPERATING METHOD, INTEGRATED CIRCUIT, SYSTEM, AND PROGRAMAANM Matsushima; HidekiAACI OsakaAACO JPAAGP Matsushima; Hideki Osaka JPAANM Matsuzaki; NatsumeAACI OsakaAACO JPAAGP Matsuzaki; Natsume Osaka JPAANM Haga; TomoyukiAACI NaraAACO JPAAGP Haga; Tomoyuki Nara JP - A smart meter includes: a power supply control unit which causes stoppage of a supply of power passing through the smart meter to an television and so on, when an RD command to stop the supply is received; a first communication unit which performs a first communication through which the RD command is received; a second communication unit which performs a second communication; and a communication control unit which: causes the performance of the first communication before the RD command is received; and prohibit the performance of the first communication and cause only the performance of the second communication, after the RD command is received. | 01-17-2013 |
20130103355 | BATTERY HISTORY INFORMATION MANAGEMENT DEVICE, BATTERY HISTORY INFORMATION MANAGEMENT METHOD, BATTERY HISTORY INFORMATION MANAGEMENT SYSTEM, AND POWER STORAGE DEVICE - A battery history information management device for managing history information of a secondary battery includes: a connection determination unit which determines whether a charge/discharge device connected to the secondary battery is (i) a first charge/discharge device connected via a communication network to a server which manages the history information or (ii) a second charge/discharge device not connected to the server; a battery history recording unit which records, when it is determined that the charge/discharge device is the second charge/discharge device, charge/discharge history for second charge/discharge device into battery history data; and a history upload control unit which transmits, when it is determined that the charge/discharge device is the first charge/discharge device, the battery history data to the server via the first charge/discharge device. | 04-25-2013 |
20130111605 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD | 05-02-2013 |
20130145477 | CONTENT REPRODUCTION SYSTEM, INFORMATION PROCESSING TERMINAL, MEDIA SERVER, SECURE DEVICE, AND SERVER SECURE DEVICE - A content reproduction system includes an information processing terminal and a secure device. The information processing terminal receives a copyright protection application program from an application distribution server. The copyright protection application program includes a first program having a first execution format executable in the information processing terminal and a second program having a second execution format different from the first execution format and executable in the secure device. The second program is encrypted with a program key held in the secure device. By extracting and executing the first program, the information processing terminal extracts the second program and transmits the second program to the secure device. The secure device receives the second program from the information processing terminal, decrypts the second program using a program key stored in a key storing unit, and executes the second program. | 06-06-2013 |
20130185816 | INFORMATION PROCESSING APPARATUS, METHOD, PROGRAM, AND INTEGRATED CIRCUIT - A content display apparatus which processes protected information configured, with an aim to prevent access from any unauthorized program, to include: a process managing unit which manages a plurality of processes operable in the content display apparatus; and an access detecting unit configured to detect access to the protected-information access detecting unit which detects access to the protected information. The process managing unit includes an application execution control unit which temporarily stops the operation of each of at least one process other than a process which accesses the protected information among the plurality of processes when the access to the protected information is detected by the protected-information access detecting unit. | 07-18-2013 |
20130191927 | CONTENT MANAGEMENT DEVICE AND CONTENT MANAGEMENT METHOD - Provided is a content management device for protecting a content of a provider. A content management device | 07-25-2013 |
20130198361 | CONTENT DISTRIBUTION SYSTEM, CONTENT MANAGEMENT SERVER, CONTENT-USING DEVICE, AND CONTROL METHOD - A content management server comprises: a first connection detection unit that detects whether or not the content management server is connected with the content-using device; a content management unit that manages the content according to a result of the detection by the first connection detection unit and holds information on how the content-using device controls the use of the content. A content-using device comprises: a second connection detection unit that detects whether or not the content-using device is connected with the content management server; a second selection unit that specifies a method for controlling the use of the content according to a result of the detection by the second connection detection unit; and a content control unit that controls the use of the content according to the method specified by the second selection unit. | 08-01-2013 |
20130212575 | INFORMATION PROCESSOR AND METHOD FOR CONTROLLING THE SAME - It is an object of the present invention to provide an information processing device that verifies the authorization of an application that has issued an access request to access a device. For the present invention to fulfill the above object, when an application | 08-15-2013 |
20130312064 | PROGRAM EXECUTION DEVICE - A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an execution unit, a first protection unit, and a second protection unit. The execution unit executes a first program and a second program, and is connected with an external device that is capable of controlling the execution. The first protection unit disconnects the execution unit from the external device while the execution unit is executing the first program. The second protection unit protects the first program while the execution unit is executing the second program. | 11-21-2013 |
20140082716 | ACCESS CONTROL METHOD, ACCESS CONTROL SYSTEM, COMMUNICATION TERMINAL, AND SERVER - An access control method including: receiving a log information item indicating use history of electrical equipment that is used together with an intended product; receiving product information including information for identifying the intended product; storing the log information item received in the receiving of a log information item and the product information received in the receiving of product information, in association with each other; and controlling whether or not to allow access to the log information item based on the product information associated with the log information item when access to the log information item is attempted. | 03-20-2014 |
20140277798 | DATA PROCESSING METHOD, TRANSMITTING APPARATUS, AND ANOMALY DETECTION SYSTEM - A data processing method for processing usage history data of at least one electrical device used by a user, including: obtaining first usage history data indicating a usage history of at least one electrical device used by the user; obtaining second usage history data indicating a fixed dummy usage history; generating third usage history data by combining the first usage history data and the second usage history data; and transmitting the third usage history data from a first apparatus to a second apparatus. | 09-18-2014 |
20140344054 | INFORMATION PROVIDING METHOD AND INFORMATION PROVIDING DEVICE - A first user among a plurality of users is associated with a second user having an evaluation tendency similar to evaluation data of the first user for management. Further, a third user is selected by a terminal device of the first user as a user having preference information that suits preference of the first user. The third user is associated with the first user and the second user for management. This configuration makes it possible to select not only a user automatically selected by a system but also another user whom a targeted user is interested in as a similar user, allowing provision of information that better suits hobby and preference of the targeted user. | 11-20-2014 |
20140380503 | PROGRAM EXECUTION DEVICE - A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an execution unit, a first protection unit, and a second protection unit. The execution unit executes a first program and a second program, and is connected with an external device that is capable of controlling the execution. The first protection unit disconnects the execution unit from the external device while the execution unit is executing the first program. The second protection unit protects the first program while the execution unit is executing the second program. | 12-25-2014 |