Patent application number | Description | Published |
20080263637 | Information Distribution System and Terminal Device - A terminal device that can, when delivering information to an other terminal device, control delivery of the information from a primary delivery destination to a secondary delivery destination is provided. The terminal device stores a primary delivery condition regarding whether delivery of the information to the primary delivery destination is prohibited or permitted, and trustability showing a degree of trust of a user in the primary delivery destination. The terminal device judges whether or not to deliver the information to the primary delivery destination, by using the primary delivery condition. When judging to deliver the information, the terminal device calculates a secondary delivery condition using the trustability and the primary delivery condition, the secondary delivery condition regarding whether delivery of the information from the primary delivery destination to the secondary delivery destination is prohibited or permitted. The terminal device sends the generated secondary delivery condition to the primary delivery destination. | 10-23-2008 |
20080285743 | Data Encryption Device and Data Encryption Method - A data encryption device that is capable of stopping power analysis attacks and reducing instances of speed drops and memory amount increases in encryption processing more effectively than in the past; the data encryption device performs a predetermined encryption, based on a key, on a plain text, and includes a random number generation unit ( | 11-20-2008 |
20090097641 | MANAGEMENT-APPARATUS CARD, MEASURING APPARATUS, HEALTH CARE SYSTEM, AND METHOD FOR COMMUNICATING VITAL SIGN DATA - The management-apparatus card capable of being attached to a management apparatus receives, from the measuring apparatus, first unique information indicating the measuring apparatus, and identification information indentifying a user of the measuring apparatus; stores second unique information indicating the management-apparatus card; generates a decryption key corresponding to an encryption key, using the first unique information, the second unique information, and the identification information; stores the generated decryption key; receives encrypted vital sign data from the measuring apparatus; decrypts the received vital sign data using the stored decryption key; and obtains the decrypted vital sign data. | 04-16-2009 |
20090099967 | HEALTH CARE SYSTEM, KEY MANAGEMENT SERVER AND METHOD FOR MANAGING KEY, AND ENCRYPTING DEVICE AND METHOD FOR ENCRYPTING VITAL SIGN DATA - Provided is a health care system including a key management server that receives from a server a request for a decryption key, with first identification information identifying a measuring apparatus, second identification information identifying vital sign data, and third identification information identifying the server. The key management server generates the decryption key using the first identification information, and stores fourth identification information identifying a server predetermined as a destination of the decryption key, and fifth identification information indicating the category of the vital sign data in correspondence with the fourth identification information. The key management server transmits the decryption key to the server, when the received third identification information matches the fourth identification information, and the received second identification information matches the fifth identification information. | 04-16-2009 |
20090103735 | TELEMEDICAL SYSTEM - In the telemedical system securely sharing encryption keys for enabling secure exchange of the encrypted biological data between the measurement terminal and the server to prevent the data from being stolen by the malicious third party, a service key is transferred to the second adapter attached to a measurement terminal from the server via the first adapter attached to the management apparatus. First, the first adapter attached to the management apparatus receives the service key from the server. Next, the first adapter is temporarily detached from the management apparatus and is attached to the measurement terminal to store the symmetric key. The first adapter is detached from the measurement terminal, and is attached to the management apparatus again. The service key received in the first adapter is encrypted using the symmetric key, and the encrypted key is transmitted to the second adapter attached to the measurement terminal. | 04-23-2009 |
20090106547 | AUTHENTICATION SYSTEM, AUTHENTICATION DEVICE, TERMINAL, AND VERIFYING DEVICE - An authentication system, including a service use device | 04-23-2009 |
20090136209 | Recording device, system, integrated circuit, program, and recording method - To provide a system that can minimize a time delay caused by one device being unable to access a recording medium until access by another device ends, when transcoding is performed by distributed processing. A main device performs transcoding of each coded piece allocated to itself from among a plurality of coded pieces of a digital stream, and writing of a transcoding result onto the recording medium, in a pipeline. While the recording device is performing the transcoding and the writing, an auxiliary device transcodes each coded piece allocated to itself one by one. Having completed the transcoding of all coded pieces allocated to itself, the auxiliary device transmits its transcoding results to the recording device and has the recording device write the transcoding results onto the recording medium which is a copy destination. | 05-28-2009 |
20090193250 | AUTHENTICATION SYSTEM, SIGNATURE CREATING DEVICE, AND SIGNATURE VERIFYING DEVICE - A signature generating device for generating digital signature data that certifies authenticity of information of a person, and making the information obfuscated. The signature generating device comprises: a storage unit that stores attribute information concerning the person and a private key corresponding to the attribute information; an obfuscated information generating unit that selects one or more pieces of dummy information in relation to the attribute information, and generates the obfuscated information that includes the attribute information and the dummy information; a public key obtaining unit that obtains a public key corresponding to the attribute information and public keys respectively corresponding to the dummy information; and a signature generating unit that generates digital signature data by performing a ring signature generation process to the obfuscated information, using the private key and the public key corresponding to the attribute information and using the public keys corresponding to dummy information. | 07-30-2009 |
20090254988 | EVALUATION APPARATUS, EVALUATION METHOD, EVALUATION PROGRAM AND INTEGRATED CIRCUIT - In a system for transmitting/receiving information, each of users of terminals subjectively determines a direct evaluation value of a party that the user knows personally and so on. Since the direct evaluation value determined in this way changes depending on the subjective evaluation criterion, the direct evaluation value is not generated based on the single evaluation criterion. In view of this, a terminal device | 10-08-2009 |
20090271860 | AUTHENTICATOR APPARATUS - An authenticator apparatus which makes it difficult for an unauthorized user to masquerade and enhances safety includes an authenticating information holding unit ( | 10-29-2009 |
20090316909 | UTILIZATION APPARATUS, SERVICER APPARATUS, SERVICE UTILIZATION SYSTEM, SERVICE UTILIZATION METHOD, SERVICE UTILIZATION PROGRAM, AND INTEGRATED CIRCUIT - Provided are a utilization apparatus, a server apparatus, and a key utilization system which enable the utilization apparatus to control deletion of the old key without using a secure clock and allow encrypted communications irrespective of whether the accessed server has updated its key or not. In key utilization system | 12-24-2009 |
20100014677 | GROUP SUBORDINATE TERMINAL, GROUP MANAGING TERMINAL, SERVER, KEY UPDATING SYSTEM, AND KEY UPDATING METHOD THEREFOR - Provided is a group subordinate terminal in a key updating system that includes a server and a group of terminals including: a group managing terminal; and group subordinate terminals including the group subordinate terminal, the group subordinate terminal comprising: a group withdrawal request processing unit which transmits a group withdrawal request to the group managing terminal in response to an instruction to update its apparatus-unique key, the group withdrawal request requesting for withdrawal of the group subordinate terminal from the group; an update apparatus-unique key requesting unit which requests for another apparatus-unique key by transmitting to the server a group withdrawal certificate indicating that the withdrawal of the group subordinate terminal from the group of terminals is completed through invalidation of its group key; and an update processing unit which updates the apparatus-unique key held in an apparatus-unique key holding unit to the another apparatus-unique key obtained from the server. | 01-21-2010 |
20100023774 | INFORMATION SECURITY DEVICE - An information security device is provided that, when information is circulated through a chain, permits changing of a usage rule for the information or collection (deletion) of the information after the circulation. | 01-28-2010 |
20100031065 | INFORMATION SECURITY APPARATUS - Provided is an information security apparatus ( | 02-04-2010 |
20100150346 | DATA ENCRYPTION APPARATUS, DATA CONVERTING METHOD, DATA CONVERTING PROGRAM, RECORDING MEDIUM AND INTEGRATED CIRCUIT - A data encryption apparatus reduces a hardware gate scale over that of conventional technology which uses substitution tables, and realizes high scrambling performance. The data encryption apparatus includes a data converting unit that splits 256-bit input data into 32-bit data blocks A | 06-17-2010 |
20100175061 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM - To aim provide a software update apparatus including an install module group ( | 07-08-2010 |
20100177886 | INFORMATION SECURITY DEVICE - To aim to provide an information security device capable of reducing a period necessary for performing a power operation used for secret communication or authentication. The information security device performs secret communication or authentication by calculating an exponentiation X̂d based on target data X and a secret value d using the window method. In the process of calculating the exponentiation X̂d, immediately after square of a random value R acquired for multiplication is repeatedly performed a predetermined number of times, for example 256 times, a result of square of the random value R is cancelled using a cancellation value S (=R̂(−2̂256)). This makes it unnecessary to perform cancellation processing that has been conventionally performed. | 07-15-2010 |
20100180343 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, ALTERATION VERIFICATION METHOD AND ALTERATION VERIFICATION PROGRAM - To aim provide a software update apparatus including an install module group ( | 07-15-2010 |
20100185859 | SOFTWARE UPDATE SYSTEM, MANAGEMENT APPARATUS, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - An update server | 07-22-2010 |
20100235588 | SHARED INFORMATION DISTRIBUTING DEVICE, HOLDING DEVICE, CERTIFICATE AUTHORITY DEVICE, AND SYSTEM - A distributing device for generating private information correctly even if shared information is destroyed or tampered with. A shared information distributing device for use in a system for managing private information by a secret sharing method, including: segmenting unit that segments private information into a first through an n | 09-16-2010 |
20110022851 | DATA ENCRYPTION DEVICE - A portable data sensor tag ( | 01-27-2011 |
20110033046 | ENCRYPTION DEVICE AND ENCRYPTION SYSTEM - The present invention provides an encryption apparatus that prevents plaintext data from leaking even if accumulated data is analyzed, while preventing the size of encrypted data from increasing. An encryption apparatus for encrypting a data piece that is smaller than a unit length for encryption performs the following: storing management information indicating a used area within an encryption area defined based on the unit length, the used area being an area already used for encryption; when encrypting a new data piece that is smaller than the unit length, generating encrypted data by adding the new data piece to an unused area within the encryption area with reference to the management information, the unused area being an area not used for encryption; and updating the management information to include an area for the new data piece into the used area, after generating the encrypted data. | 02-10-2011 |
20110093210 | MEASUREMENT DEVICE AND METHOD OF CONTROLLING THE SAME - A measurement device includes: a first measurement unit ( | 04-21-2011 |
20110119458 | RELAY DEVICE - In order to allow a user to backup data, a backup system is used to transfer data from an information terminal to a backup device via a relay device. The information terminal includes a storing unit storing the data to be backed up, and includes a communication unit transmitting the data to the relay device and transferring condition information indicating a condition to be satisfied by the relay device. Further, the relay device includes (i) a storing unit storing information relating to transfer destination devices, (ii) a receiving unit receiving the data and the transfer condition information, and (iii) a transfer control unit selecting a transfer destination device that satisfies the condition indicated by the transfer condition information, and controlling transfer of the received data in accordance with the selection. The backup device includes a receiving unit receiving the data transferred by the relay device, and a storing unit storing the received data. | 05-19-2011 |
20110119493 | UNAUTHORIZED CONTENTS DETECTION SYSTEM - Processing load on an executing device for conducting playback is high during the playback of contents since the executing device performs verification of the contents validity in parallel with the contents playback, and therefore the executing device has to be equipped with a highly efficient processor. The present invention reduces the processing load involved in the verification by using, for the verification, only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on the DVD. In addition, the present invention is capable of improving the accuracy of detecting unauthorized contents to some extent by randomly selecting a predetermined number of encrypted units every time the verification is performed. | 05-19-2011 |
20110225653 | MONITORING SYSTEM, PROGRAM-EXECUTING DEVICE, MONITORING PROGRAM, RECORDING MEDIUM AND INTEGRATED CIRCUIT - To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules | 09-15-2011 |
20110238324 | BIOLOGICAL INFORMATION MEASURING DEVICE AND CONTROL METHOD THEREOF - A biological information measuring device including: a finger insertion part ( | 09-29-2011 |
20110239297 | TAMPERING MONITORING SYSTEM, CONTROL DEVICE, AND TAMPERING CONTROL METHOD - A management device detects whether any normal monitoring module that has not been tampered with exists by referring to monitoring results received from an information security device and selects, when existence is detected, one of the monitoring modules and assumes that the selected monitoring module has been tampered with. The monitoring device then successively applies a procedure to monitoring modules other than the selected monitoring module by referring to the monitoring results, starting from the selected monitoring module, the procedure being to assume that any monitoring module determining that a monitoring module assumed to have been tampered with is normal has also been tampered with. As a result of the procedure, when all of the monitoring modules are assumed to have been tampered with the management device determines the selected monitoring module to be a normal monitoring module that has not been tampered with. | 09-29-2011 |
20110271344 | ILLEGAL MODULE IDENTIFYING DEVICE, INFORMATION PROCESSING DEVICE, ILLEGAL MODULE IDENTIFYING METHOD, ILLEGAL MODULE IDENTIFYING PROGRAM, INTEGRATED CIRCUIT, ILLEGAL MODULE DISABLING SYSTEM, AND ILLEGAL MODULE DISABLING METHOD - A malicious-module identification device ( | 11-03-2011 |
20110314280 | HEALTH CARE SYSTEM - A measurement device ( | 12-22-2011 |
20120060008 | INFORMATION PROCESSING TRMINAL, METHOD, PROGRAM, AND INTEGRATED CIRCUIT FOR CONTROLLING ACCESS TO CONFIDENTIAL INFORMATION, AND RECORDING MEDIUM HAVING THE PROGRAM RECORDED THEREON - An information processing terminal ( | 03-08-2012 |
20120098518 | DETECTION APPARATUS AND DETECTION SYSTEM - A detection apparatus ( | 04-26-2012 |
20120164944 | COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A terminal apparatus (M | 06-28-2012 |
20120178367 | NEAR FIELD COMMUNICATION DEVICE AND METHOD OF CONTROLLING THE SAME - An NFC device according to the present invention includes the following units. An antenna unit receives radio waves from a reader/writer by NFC. A first power source unit generates power from the radio waves. A second power source unit is a drive power source. A power-supply state holding unit holds information indicating a power-supply state of the second power source unit. An NFC unit performs NFC via the antenna unit to transmit the information indicating the power-supply state of the second power source unit. A power source switch unit switches the second power source unit to the first power source unit according to the power-supply state of the second power source unit, in order to supply power to activate at least the NFC unit and the power-supply state holding unit. | 07-12-2012 |
20120290846 | UNAUTHORIZED CONTENTS DETECTION SYSTEM - A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed. | 11-15-2012 |
20140059679 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM - To aim provide a software update apparatus including an install module group composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server, a replacement protection control module to be used for updating a protection control module having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations. If any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility. | 02-27-2014 |
20140065971 | TERMINAL DEVICE, CONTROL DEVICE, FAULT DIAGNOSIS SYSTEM, AND FAULT DIAGNOSIS METHOD - A state updating unit updates first information stored in a storage unit whenever the state of a control unit transitions from an idle state to an active state or from the active state to the idle state. A second power supply unit induces electric power from radio waves received by the antenna unit. An information acquiring unit operates after receiving the supply of electric power from the second power supply unit, acquires second information indicating whether electric power is supplied from the first power supply unit, acquires the first information from the storage unit, and transmits the acquired first and second information to the control device. A diagnosing unit diagnoses faults in the terminal device based on the first and second information transmitted from the information acquiring unit of the terminal device. | 03-06-2014 |
20140095684 | TERMINAL CONTROL METHOD, TERMINAL CONTROL SYSTEM, AND SERVER DEVICE - In a system that centrally manages a terminal device group composed of a plurality of terminal devices in a home, a method allows for: determining an instruction to be transmitted to one of the terminal devices according to an operation status acquired from a different one of the terminal devices; specifying, from among the terminal devices, a terminal device as a transmission destination of the instruction, with use of pieces of connection source information specifying the respective terminal devices in a network, and acquisition times of the pieces of connection source information; and transmitting the instruction to the specified terminal device. Upon receiving the instruction, the specified terminal device performs an operation based on the received instruction. The operation is in coordination with the operation status acquired from the different terminal device. | 04-03-2014 |
20140129842 | UNAUTHORIZED CONTENTS DETECTION SYSTEM - A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed. | 05-08-2014 |
20140250284 | COMMUNICATION DEVICE AND MANAGEMENT METHOD FOR IDENTIFICATION INFORMATION ITEM USING COMMUNICATION DEVICE - In a case where an identification information item determination section ( | 09-04-2014 |
20140330833 | DEVICE CLASSIFICATION METHOD, DEVICE CLASSIFICATION SYSTEM, AND DEVICE - A device classification method that includes: receiving a first action performed on a first device in the device group, for classifying the first device as belonging to the coordinated operation group; setting, when the first action is received, each of one or more devices in the device group other than the first device to a classifiable state in which the device is classifiable as belonging to the coordinated operation group; receiving a second action performed on a second device in the device group that is set to the classifiable state, for classifying the second device as belonging to the coordinated operation group; and classifying, when the second action is received, the first device and the second device as belonging to the coordinated operation group. | 11-06-2014 |
20150066169 | COORDINATION PROCESSING EXECUTION METHOD AND COORDINATION PROCESSING EXECUTION SYSTEM - A user-friendly cooperative process execution method for causing household electric devices that are registered to a server to execute cooperative processes. The server stores correspondence information associating a particular operation to be executed by a particular household electric device with one or more groups each composed of one or more household electric devices, and indicating, for each of the household electric devices in each of the groups, a control signal to be transmitted to the household electric device. The method includes: detecting whether or not the particular operation is executed; selecting one of the groups that is composed of one or more household electric devices that are registered to the server by referring to the correspondence information when the execution of the particular operation is detected; and transmitting the control signal to each of the household electric devices in the selected group. | 03-05-2015 |