Patent application number | Description | Published |
20090125557 | LOG RECORDING APPARATUS - It is possible to leave records with which analysis of a cause can be efficiently performed when a trouble occurs in an observation target system and realize reduction in the size of the records at the time of recording. The present invention is proposed as a log recording apparatus. This log recording apparatus is provided with: a cell number storage unit to store a cell number table with cell numbers, each being data for identifying a cell number from a state/event combination; a cell number generation unit acquiring data indicating an event and a state from an observation target system, to determine a cell number corresponding to the event and the state with the use of the cell number table stored in the cell number table storage unit and the data indicating the event and the state; a log data generation unit to generate log data which includes the cell number determined by the cell number generation unit; and a log data recording unit to record the log data generated by the log data generation unit. | 05-14-2009 |
20120154382 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - According to one embodiment, an image processing apparatus includes a generation module and a controller. The generation module is configured to generate | 06-21-2012 |
20120154383 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - According to one embodiment, an image processing apparatus includes a first generation module, a second generation module, and processor. The first generation module is configured to generate 3D image data. The second generation module is configured to generate 3D graphics data. The processor is configured to make the 3D image data fall within a first display range which has a first depth range in a depth direction, and makes the 3D graphics data fall within a second display range which has a second depth range which does not overlap the first display range in the depth direction. | 06-21-2012 |
20120154538 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - According to one embodiment, an image processing apparatus including background image generator which generates background image, receiver which receives additional information, depth calculator which determines first depth based on additional information, and calculates second depth based on first depth, first three-dimensional image generator which generates first object image based on additional information, and generates first three-dimensional image based on first object image and first depth, second three-dimensional image generator which generates second object image based on additional information, and generates second three-dimensional image based on second object image and second depth, at least part of second three-dimensional image being displayed in area overlapping first three-dimensional image, image composite module which generates video signal by displaying background image, displaying second three-dimensional image in front of displayed background image, and displaying first three-dimensional image in front of displayed second three-dimensional image, and output module which outputs video signal. | 06-21-2012 |
20120154539 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - According to one embodiment, an image processing apparatus including a background image generator which generates a background image, a receiver which receives additional information, a depth memory which stores in advance a depth for each of types of the additional information, a depth decide module which determines a type of the additional information received by the receiver, and reads a depth which is associated with the determined type from the depth memory, a three-dimensional image generator which generates an object image based on the additional information, and generates a three-dimensional image based on the object image and the depth which is read by the depth decide module, an image composite module which generates a video signal by displaying the background image and displaying the three-dimensional image in front of the displayed background image, and an output module which outputs the video signal generated by the image composite module. | 06-21-2012 |
20140139650 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING METHOD - According to one embodiment, an image processing apparatus including a background image generator which generates a background image, a receiver which receives additional information, a depth memory which stores in advance a depth for each of types of the additional information, a depth decide module which determines a type of the additional information received by the receiver, and reads a depth which is associated with the determined type from the depth memory, a three-dimensional image generator which generates an object image based on the additional information, and generates a three-dimensional image based on the object image and the depth which is read by the depth decide module, an image composite module which generates a video signal by displaying the background image and displaying the three-dimensional image in front of the displayed background image, and an output module which outputs the video signal generated by the image composite module. | 05-22-2014 |
Patent application number | Description | Published |
20090327706 | ACCOUNT MANAGEMENT SYSTEM, ROOT-ACCOUNT MANAGEMENT APPARATUS, DERIVED-ACCOUNT MANAGEMENT APPARATUS, AND PROGRAM - A root-account management apparatus generates an electronic signature based on a survival condition and a secret key when an authentication result of a user of a client apparatus is proper, and transmits derived-account credence element information including the survival condition, the electronic signature and a public key certificate to a derived-account management apparatus. The derived-account management apparatus creates derived-account information which becomes valid when the survival condition is satisfied so that the derived-account information includes both the derived-account credence element information which becomes invalid when a validity term of the public key certificate expires and a biometric information template of the user which is valid regardless of this validity term. Accordingly, even if an authentication element as a root (public key certificate) becomes invalid, a derived authentication element (biometric information template) can be prevented from becoming invalid. | 12-31-2009 |
20100043070 | FILE-ACCESS CONTROL APPARATUS AND PROGRAM - In a file-access control system according to an embodiment of this invention, control data in accordance with actions made is imparted, as an obligation-type policy, to a document file. Next, a policy evaluation control unit evaluates and executes the obligation-type policy imparted to the document file in accordance with the action to the document file. The execution of the obligation-type policy includes the controlling of a document application on the basis of an obligation fulfillment action. Therefore, an active control can be performed in accordance with any manipulation made to the document, and the access to the document can be changed. | 02-18-2010 |
20100138662 | DIGITAL SIGNATURE ASSURANCE SYSTEM, METHOD, PROGRAM AND APPARATUS - According to respective embodiments of the present invention, it is possible to verify a security environment of an digital signature and assure validity of the digital signature. For example, in the case of generating the digital signature, the assertion for asserting a key management system and a user authentication system is generated, the conversion processing is applied to both of the digital signature and the assertion, and the acquired digital signature, assertion, and conversion value are outputted. Therefore, it is possible to verify validity of the assertion on the basis of the conversion value and verify the security environment of the digital signature on the basis of the key management system and the user authentication system included in the assertion. Accordingly, the validity of the digital signature can be assured. | 06-03-2010 |
20100180124 | VERIFICATION APPARATUS AND PROGRAM - According to one embodiment of the present invention, the first authentication context includes the template certificate indicative of the validity of a template and the first apparatus evaluation certificate indicative of the validity of the first apparatus evaluating information whilst the second authentication context includes the second apparatus evaluating certificate indicative of the validity of the second apparatus evaluating information. And the template certificate and the first and second evaluation certificates are verified when verifying the first and second authentication contexts. Thus, the validity of the template used for authentication or the apparatus evaluating information included in the authentication context can be verified. | 07-15-2010 |
20100191967 | CLIENT APPARATUS, SERVER APPARATUS, AND PROGRAM - A client apparatus receives a message including a random number from a server apparatus during the handshake of agreement process, creates a biometric negotiation message including the biometric authentication method information and sends the biometric negotiation message to the server apparatus. Then, the client apparatus executes a biometric authentication based on biometric authentication method information notified from the server apparatus and encrypts the random number based on the private key. In addition, the client apparatus generates an authenticator from a result of the biometric authentication, the biometric authentication method information, the encrypted random number, and the client certificate, and sends to the server apparatus an authentication context including these. The server apparatus verifies the authentication context and establishes a secure session in one handshake. | 07-29-2010 |
20100281517 | System, Apparatus, Program, and Method for Authentication - According to an aspect of the invention, a management of each authentication subprocess assures the each authentication subprocess, and assurance contents can be verified by verification side, so that trustworthiness of the whole authentication process can be improved. An authentication system includes authentication entity devices which separately execute authentication subprocesses P | 11-04-2010 |
20110185413 | SYSTEM, APPARATUS, AND PROGRAM FOR BIOMETRIC AUTHENTICATION - A client apparatus transmits environmental information acquired from an environmental information acquisition device as well as a biometric authentication information matching result to a server apparatus. The server apparatus verifies the validity of the environmental information such as a luminance as well as the validity of the biometric authentication information matching result. If an environment is problematic, the server apparatus notifies the client apparatus that the environmental information is problematic. The client apparatus overcomes the problem of the environment such as the luminance based on the notification from the server apparatus and then retries a biometric authentication. The possibility of re-failure due to the environmental problem can be reduced during a retry of the biometric authentication. | 07-28-2011 |
20120016907 | METHOD AND APPARATUS FOR CONTROLLING REPLICATION PROCESSING OF OBJECT - According to one embodiment, the resource access unit accesses a first resource including a replication target object and policy data assigned to the object. The policy data includes base policy data including a first condition and assertion policy data including a second condition. The first retrieval unit obtains first attribute data for accessing the first resource. The first policy evaluation unit determines whether the first attribute satisfies the first condition. When the first condition is satisfied, the copy processing unit executes the copy processing for copying the object. The second retrieval unit obtains the second attribute data for accessing the second resource. The second policy evaluation unit determines whether the second attribute data satisfies the second condition. When the second condition is satisfied, the paste processing unit executes paste processing for pasting the object to the second resource. | 01-19-2012 |
20120162688 | ACCESS CONTROL SYSTEM, APPARATUS, AND PROGRAM - According to one embodiment, a deriving operation control device obtains derivation control information and a derivation attribute. A deriving operation propriety determination unit extracts the number of times of previously-performed derivation from the derivation attribute. The deriving operation propriety determination unit extracts the upper limit number of times enabling derivation from the derivation control information and determines that a deriving operation is possible when the number of times of previously-performed derivation is equal to or below the upper limit number of times enabling derivation. A deriving operation execution unit executes the deriving operation. | 06-28-2012 |
20130097665 | ACCESS CONTROL APPARATUS AND STORAGE MEDIUM - According to one embodiment, an access control apparatus suspends the resource access event prior to access of the resource access device when the resource access event is started. The access control apparatus acquires attribute information from the attribute management device by using the deny-type policy in the access control policy and decides the permission or the denial of the access based on this attribute information and the deny-type policy. The access control apparatus releases the suspension when a result of decision in the supplied access decision result is indicative of the permission and no obligation-type policy is present in the access decision response. | 04-18-2013 |
20130246281 | SERVICE PROVIDING SYSTEM AND UNIT DEVICE - According to one embodiment, the verifying device sends, to the service providing device, the user identification information in the user identification information certificate and the execution result that indicates properness when all the verification results are proper. the service providing device reads service user identification information associated with the user identification information in response to user identification information and a verification result. The service providing device sends the service information to the user terminal in accordance with the read service user identification information. | 09-19-2013 |
20130247142 | AUTHENTICATION FEDERATION SYSTEM AND ID PROVIDER DEVICE - According to one embodiment, the ID provider device stores pieces of policy information for each service provider ID. The ID provider device outputs a policy evaluation request including the user ID used in the log-in processing and the service provider ID in the authentication federation request when the log-in processing is successful. The ID provider device reads the policy information in accordance with the service provider ID in the policy evaluation request. The ID provider device judges whether to permit the transmission of the service data in accordance with whether environmental conditions of the user for the execution of a service conform to the read policy information. | 09-19-2013 |
20130250335 | ACCESS CONTROL SYSTEM, APPARATUS, AND PROGRAM - According to one embodiment, a deriving operation control device obtains derivation control information and a derivation attribute. A deriving operation propriety determination unit extracts the number of times of previously-performed derivation from the derivation attribute. The deriving operation propriety determination unit extracts the upper limit number of times enabling derivation from the derivation control information and determines that a deriving operation is possible when the number of times of previously-performed derivation is equal to or below the upper limit number of times enabling derivation. A deriving operation execution unit executes the deriving operation. | 09-26-2013 |
20140259120 | Authentication Entity Device, Verification Device and Authentication Request Device - A verification device transmits challenge information to a first entity device, and for each authentication context received in return, verifies that challenge information identical to the challenge information transmitted in advance is described, to thereby confirm that the authentication context is the current one. As a result, a repetitive attack in which the past authentication context is repeatedly used is prevented and the security against repetitive attacks is improved. | 09-11-2014 |