Patent application number | Description | Published |
20080235517 | Update System for Cipher System - There is a demand for a device handling information with the use of encryption technology to safely and simply update the encryption schemes. The present invention offers an information security device having a plurality of encryption schemes and handling information safely and reliably, characterized by selecting one of the plurality of encryption schemes as an application encryption scheme and installing a different encryption scheme from the plurality of encryption schemes based on the application encryption scheme. | 09-25-2008 |
20080263637 | Information Distribution System and Terminal Device - A terminal device that can, when delivering information to an other terminal device, control delivery of the information from a primary delivery destination to a secondary delivery destination is provided. The terminal device stores a primary delivery condition regarding whether delivery of the information to the primary delivery destination is prohibited or permitted, and trustability showing a degree of trust of a user in the primary delivery destination. The terminal device judges whether or not to deliver the information to the primary delivery destination, by using the primary delivery condition. When judging to deliver the information, the terminal device calculates a secondary delivery condition using the trustability and the primary delivery condition, the secondary delivery condition regarding whether delivery of the information from the primary delivery destination to the secondary delivery destination is prohibited or permitted. The terminal device sends the generated secondary delivery condition to the primary delivery destination. | 10-23-2008 |
20080281942 | Data Processing Device - The present invention makes it possible to use data that is held by a given terminal device in another terminal device, even after the given terminal device can no longer be accessed externally. If a terminal device | 11-13-2008 |
20090013193 | Circuit Building Device - The present invention provides an apparatus for securely acquiring a circuit configuration information set corresponding to a new cryptosystem without increasing the number of reconfigurable circuits. A content playback apparatus | 01-08-2009 |
20090055638 | Algorithm update system - A design data storage unit stores a plurality of pieces of design data. A judgment unit | 02-26-2009 |
20090067632 | Circuit updating system - An information processing apparatus is provided with a reconfigurable unit ( | 03-12-2009 |
20090074179 | Information security device and elliptic curve operating device - Resistance against simple power analysis is maintained while a smaller table is used. An IC card | 03-19-2009 |
20090077332 | Content management system - A content management system constructed by a plurality of storage apparatuses that can communicate with one another. A 1st storage apparatus, which is one of the storage apparatuses, stores therein, in correspondence, a content and copy destination information and sends the content and the copy destination information therefrom to a 2nd storage apparatus, which is another one of the storage apparatuses. Yet another one of the storage apparatuses that is indicated by the copy destination information stores therein, in correspondence, the content and copy source information and, after the 1st storage apparatus has sent the content and the copy destination information to the 2nd storage apparatus, rewrite the copy source information such that the copy source information indicates the 2nd storage apparatus. | 03-19-2009 |
20090097641 | MANAGEMENT-APPARATUS CARD, MEASURING APPARATUS, HEALTH CARE SYSTEM, AND METHOD FOR COMMUNICATING VITAL SIGN DATA - The management-apparatus card capable of being attached to a management apparatus receives, from the measuring apparatus, first unique information indicating the measuring apparatus, and identification information indentifying a user of the measuring apparatus; stores second unique information indicating the management-apparatus card; generates a decryption key corresponding to an encryption key, using the first unique information, the second unique information, and the identification information; stores the generated decryption key; receives encrypted vital sign data from the measuring apparatus; decrypts the received vital sign data using the stored decryption key; and obtains the decrypted vital sign data. | 04-16-2009 |
20090099967 | HEALTH CARE SYSTEM, KEY MANAGEMENT SERVER AND METHOD FOR MANAGING KEY, AND ENCRYPTING DEVICE AND METHOD FOR ENCRYPTING VITAL SIGN DATA - Provided is a health care system including a key management server that receives from a server a request for a decryption key, with first identification information identifying a measuring apparatus, second identification information identifying vital sign data, and third identification information identifying the server. The key management server generates the decryption key using the first identification information, and stores fourth identification information identifying a server predetermined as a destination of the decryption key, and fifth identification information indicating the category of the vital sign data in correspondence with the fourth identification information. The key management server transmits the decryption key to the server, when the received third identification information matches the fourth identification information, and the received second identification information matches the fifth identification information. | 04-16-2009 |
20090103735 | TELEMEDICAL SYSTEM - In the telemedical system securely sharing encryption keys for enabling secure exchange of the encrypted biological data between the measurement terminal and the server to prevent the data from being stolen by the malicious third party, a service key is transferred to the second adapter attached to a measurement terminal from the server via the first adapter attached to the management apparatus. First, the first adapter attached to the management apparatus receives the service key from the server. Next, the first adapter is temporarily detached from the management apparatus and is attached to the measurement terminal to store the symmetric key. The first adapter is detached from the measurement terminal, and is attached to the management apparatus again. The service key received in the first adapter is encrypted using the symmetric key, and the encrypted key is transmitted to the second adapter attached to the measurement terminal. | 04-23-2009 |
20090106547 | AUTHENTICATION SYSTEM, AUTHENTICATION DEVICE, TERMINAL, AND VERIFYING DEVICE - An authentication system, including a service use device | 04-23-2009 |
20090119719 | DEVICE REGISTRATION SYSTEM, SERVER, AND TERMINAL DEVICE - A device registration system for registering a terminal device for obtaining and using contents in a server that stores contents. The server stores a contents list indicating contents stored and a registration list for registering specific information to the terminal device. The server receives the specific information and transmits the contents list to the terminal device. The terminal device receives a selection of a content from the contents list according to input by a user and requests the server to transmit the selected content. When the specific information to the terminal device of the request source is not registered in the registration list, the server performs a registration process and transmits the requested content to the terminal device. | 05-07-2009 |
20090132705 | SERVER, TERMINAL APPARATUS, DEVICE REGISTERING SYSTEM, REGISTERING METHOD, REGISTERING PROGRAM AND RECORDING MEDIUM - A device registration system including a server which holds content and a terminal apparatus which uses content, whereby the terminal apparatus is registered in the server if a communication time between the terminal apparatus and the server is less than or equal to a reference value. A measuring unit of the server measures the communication time, being a time period from transmitting measuring information to the terminal apparatus until receiving response information from the terminal apparatus, and repeats the transmission, the reception, and the measurement until the measured communication time is less than or equal to the reference value. An elapsed-time measuring unit measures an elapsed time from when the measuring unit first begins measuring the communication time, and a transmission unit transmits, to the terminal apparatus, status notification information showing a processing status which depends on the elapsed time. A response unit of the terminal apparatus receives measuring information from the server and transmits response information to the server when the measuring information is received, and a display unit displays a message based on status notification information received from the server. | 05-21-2009 |
20090132821 | INFORMATION SECURITY DEVICE - The present invention provides an apparatus for securely acquire a circuit configuration information set corresponding to a new cryptosystem without increasing the number of reconfigurable circuits. A content playback apparatus | 05-21-2009 |
20090193250 | AUTHENTICATION SYSTEM, SIGNATURE CREATING DEVICE, AND SIGNATURE VERIFYING DEVICE - A signature generating device for generating digital signature data that certifies authenticity of information of a person, and making the information obfuscated. The signature generating device comprises: a storage unit that stores attribute information concerning the person and a private key corresponding to the attribute information; an obfuscated information generating unit that selects one or more pieces of dummy information in relation to the attribute information, and generates the obfuscated information that includes the attribute information and the dummy information; a public key obtaining unit that obtains a public key corresponding to the attribute information and public keys respectively corresponding to the dummy information; and a signature generating unit that generates digital signature data by performing a ring signature generation process to the obfuscated information, using the private key and the public key corresponding to the attribute information and using the public keys corresponding to dummy information. | 07-30-2009 |
20090254988 | EVALUATION APPARATUS, EVALUATION METHOD, EVALUATION PROGRAM AND INTEGRATED CIRCUIT - In a system for transmitting/receiving information, each of users of terminals subjectively determines a direct evaluation value of a party that the user knows personally and so on. Since the direct evaluation value determined in this way changes depending on the subjective evaluation criterion, the direct evaluation value is not generated based on the single evaluation criterion. In view of this, a terminal device | 10-08-2009 |
20090271860 | AUTHENTICATOR APPARATUS - An authenticator apparatus which makes it difficult for an unauthorized user to masquerade and enhances safety includes an authenticating information holding unit ( | 10-29-2009 |
20090316909 | UTILIZATION APPARATUS, SERVICER APPARATUS, SERVICE UTILIZATION SYSTEM, SERVICE UTILIZATION METHOD, SERVICE UTILIZATION PROGRAM, AND INTEGRATED CIRCUIT - Provided are a utilization apparatus, a server apparatus, and a key utilization system which enable the utilization apparatus to control deletion of the old key without using a secure clock and allow encrypted communications irrespective of whether the accessed server has updated its key or not. In key utilization system | 12-24-2009 |
20100002871 | DEVICE PROVIDED WITH REWRITABLE CIRCUIT, UPDATING SYSTEM, UPDATING METHOD, UPDATING PROGRAM AND INTEGRATED CIRCUIT - A problem to be solved is that a conventional device is not equipped with a unit that enables efficient circuit update taking into consideration an unconfigured area in the reconfigurable circuit in the device. A data using device | 01-07-2010 |
20100014677 | GROUP SUBORDINATE TERMINAL, GROUP MANAGING TERMINAL, SERVER, KEY UPDATING SYSTEM, AND KEY UPDATING METHOD THEREFOR - Provided is a group subordinate terminal in a key updating system that includes a server and a group of terminals including: a group managing terminal; and group subordinate terminals including the group subordinate terminal, the group subordinate terminal comprising: a group withdrawal request processing unit which transmits a group withdrawal request to the group managing terminal in response to an instruction to update its apparatus-unique key, the group withdrawal request requesting for withdrawal of the group subordinate terminal from the group; an update apparatus-unique key requesting unit which requests for another apparatus-unique key by transmitting to the server a group withdrawal certificate indicating that the withdrawal of the group subordinate terminal from the group of terminals is completed through invalidation of its group key; and an update processing unit which updates the apparatus-unique key held in an apparatus-unique key holding unit to the another apparatus-unique key obtained from the server. | 01-21-2010 |
20100023774 | INFORMATION SECURITY DEVICE - An information security device is provided that, when information is circulated through a chain, permits changing of a usage rule for the information or collection (deletion) of the information after the circulation. | 01-28-2010 |
20100031065 | INFORMATION SECURITY APPARATUS - Provided is an information security apparatus ( | 02-04-2010 |
20100064142 | INFORMATION SECURITY DEVICE, INFORMATION SECURITY METHOD, COMPUTER PROGRAM, COMPUTER-READABLE RECORDING MEDIUM, AND INTEGRATED CIRCUIT - The present invention aims to provide an information security apparatus that counters a simple power analysis attack (SPA) on an information security apparatus such as an RSA cryptosystem. The information security apparatus uses a multiplication with 1 in a Montgomery domain. 1 in the Montgomery domain is determined depending on a modulus and an integer k, which is greater than a number of bits of a modulus p. Therefore, it is hard for attackers who do not know p or k to analyze. Also, even if an analyzer can predict the Hamming weight, it is possible to further improve the safety against the SPA by modifying k or the modulus at random. | 03-11-2010 |
20100175061 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM - To aim provide a software update apparatus including an install module group ( | 07-08-2010 |
20100177886 | INFORMATION SECURITY DEVICE - To aim to provide an information security device capable of reducing a period necessary for performing a power operation used for secret communication or authentication. The information security device performs secret communication or authentication by calculating an exponentiation X̂d based on target data X and a secret value d using the window method. In the process of calculating the exponentiation X̂d, immediately after square of a random value R acquired for multiplication is repeatedly performed a predetermined number of times, for example 256 times, a result of square of the random value R is cancelled using a cancellation value S (=R̂(−2̂256)). This makes it unnecessary to perform cancellation processing that has been conventionally performed. | 07-15-2010 |
20100180343 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, ALTERATION VERIFICATION METHOD AND ALTERATION VERIFICATION PROGRAM - To aim provide a software update apparatus including an install module group ( | 07-15-2010 |
20100185859 | SOFTWARE UPDATE SYSTEM, MANAGEMENT APPARATUS, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - An update server | 07-22-2010 |
20100235588 | SHARED INFORMATION DISTRIBUTING DEVICE, HOLDING DEVICE, CERTIFICATE AUTHORITY DEVICE, AND SYSTEM - A distributing device for generating private information correctly even if shared information is destroyed or tampered with. A shared information distributing device for use in a system for managing private information by a secret sharing method, including: segmenting unit that segments private information into a first through an n | 09-16-2010 |
20110004771 | ELECTRONIC TERMINAL, CONTROL METHOD, COMPUTER PROGRAM AND INTEGRATED CIRCUIT - An electronic terminal performs early detection of unauthorized analysis thereon and prevents unauthorized acquisition and falsification of confidential information that is not to be released to a third party. The electronic terminal stores confidential information that is protected by consecutive application of a plurality of protection measures for defense against an attack from a third party. The electronic terminal monitors for attacks to the protection measures from an external source, and upon detecting an attack on one protection measure, updates a protection state of the confidential information to a new protection state in which either a new protection measure has been added to a protection path from the one attacked protection means to the confidential information, or the one protection measure on the path has been updated to a higher defense level. | 01-06-2011 |
20110022851 | DATA ENCRYPTION DEVICE - A portable data sensor tag ( | 01-27-2011 |
20110033046 | ENCRYPTION DEVICE AND ENCRYPTION SYSTEM - The present invention provides an encryption apparatus that prevents plaintext data from leaking even if accumulated data is analyzed, while preventing the size of encrypted data from increasing. An encryption apparatus for encrypting a data piece that is smaller than a unit length for encryption performs the following: storing management information indicating a used area within an encryption area defined based on the unit length, the used area being an area already used for encryption; when encrypting a new data piece that is smaller than the unit length, generating encrypted data by adding the new data piece to an unused area within the encryption area with reference to the management information, the unused area being an area not used for encryption; and updating the management information to include an area for the new data piece into the used area, after generating the encrypted data. | 02-10-2011 |
20110093210 | MEASUREMENT DEVICE AND METHOD OF CONTROLLING THE SAME - A measurement device includes: a first measurement unit ( | 04-21-2011 |
20110119458 | RELAY DEVICE - In order to allow a user to backup data, a backup system is used to transfer data from an information terminal to a backup device via a relay device. The information terminal includes a storing unit storing the data to be backed up, and includes a communication unit transmitting the data to the relay device and transferring condition information indicating a condition to be satisfied by the relay device. Further, the relay device includes (i) a storing unit storing information relating to transfer destination devices, (ii) a receiving unit receiving the data and the transfer condition information, and (iii) a transfer control unit selecting a transfer destination device that satisfies the condition indicated by the transfer condition information, and controlling transfer of the received data in accordance with the selection. The backup device includes a receiving unit receiving the data transferred by the relay device, and a storing unit storing the received data. | 05-19-2011 |
20110225653 | MONITORING SYSTEM, PROGRAM-EXECUTING DEVICE, MONITORING PROGRAM, RECORDING MEDIUM AND INTEGRATED CIRCUIT - To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules | 09-15-2011 |
20110238324 | BIOLOGICAL INFORMATION MEASURING DEVICE AND CONTROL METHOD THEREOF - A biological information measuring device including: a finger insertion part ( | 09-29-2011 |
20110239297 | TAMPERING MONITORING SYSTEM, CONTROL DEVICE, AND TAMPERING CONTROL METHOD - A management device detects whether any normal monitoring module that has not been tampered with exists by referring to monitoring results received from an information security device and selects, when existence is detected, one of the monitoring modules and assumes that the selected monitoring module has been tampered with. The monitoring device then successively applies a procedure to monitoring modules other than the selected monitoring module by referring to the monitoring results, starting from the selected monitoring module, the procedure being to assume that any monitoring module determining that a monitoring module assumed to have been tampered with is normal has also been tampered with. As a result of the procedure, when all of the monitoring modules are assumed to have been tampered with the management device determines the selected monitoring module to be a normal monitoring module that has not been tampered with. | 09-29-2011 |
20110246783 | INFORMATION PROCESSING DEVICE, MANAGEMENT DEVICE, ILLEGAL MODULE DETECTION SYSTEM, ILLEGAL MODULE DETECTION METHOD, RECORDING MEDIUM ON WHICH ILLEGAL MODULE DETECTION PROGRAM IS RECORDED, MANAGEMENT METHOD, RECORDING MEDIUM AND INTEGRATED CIRCUIT ON WHICH MANAGEMENT METHOD IS RECORDED - The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks. | 10-06-2011 |
20110265180 | TAMPERING MONITORING SYSTEM, MANAGEMENT APPARATUS, AND MANAGEMENT METHOD - An information security apparatus ( | 10-27-2011 |
20110271344 | ILLEGAL MODULE IDENTIFYING DEVICE, INFORMATION PROCESSING DEVICE, ILLEGAL MODULE IDENTIFYING METHOD, ILLEGAL MODULE IDENTIFYING PROGRAM, INTEGRATED CIRCUIT, ILLEGAL MODULE DISABLING SYSTEM, AND ILLEGAL MODULE DISABLING METHOD - A malicious-module identification device ( | 11-03-2011 |
20110314280 | HEALTH CARE SYSTEM - A measurement device ( | 12-22-2011 |
20120060008 | INFORMATION PROCESSING TRMINAL, METHOD, PROGRAM, AND INTEGRATED CIRCUIT FOR CONTROLLING ACCESS TO CONFIDENTIAL INFORMATION, AND RECORDING MEDIUM HAVING THE PROGRAM RECORDED THEREON - An information processing terminal ( | 03-08-2012 |
20120084557 | TAMPERING MONITORING SYSTEM, CONTROL DEVICE, AND TAMPERING CONTROL METHOD - Provided is a tampering monitoring system that can identify a monitoring module that has been tampered with among a plurality of monitoring modules. A management apparatus is provided with an acquisition unit that acquires a new monitoring module that has not been tampered with, a generation unit that generates a decoy monitoring module by modifying the acquired monitoring module, a transmission unit that transmits the decoy monitoring module to the information security device and causes the information security device to install the decoy monitoring module therein, a reception unit that receives from the information security device, after the decoy monitoring module has been installed, monitoring results generated by the monitoring modules monitoring other monitoring modules, and a determination unit that identifies, by referring to the received monitoring results, a monitoring module that determines the decoy monitoring module to be valid and determines the identified monitoring module to be invalid. | 04-05-2012 |
20120098518 | DETECTION APPARATUS AND DETECTION SYSTEM - A detection apparatus ( | 04-26-2012 |
20120246490 | TAMPERING MONITORING SYSTEM, PROTECTION CONTROL MODULE, AND DETECTION MODULE - Tampering monitoring system | 09-27-2012 |
20130015716 | SMART METER, SUPPLY CONTROL METHOD, OPERATING METHOD, INTEGRATED CIRCUIT, SYSTEM, AND PROGRAMAANM Matsushima; HidekiAACI OsakaAACO JPAAGP Matsushima; Hideki Osaka JPAANM Matsuzaki; NatsumeAACI OsakaAACO JPAAGP Matsuzaki; Natsume Osaka JPAANM Haga; TomoyukiAACI NaraAACO JPAAGP Haga; Tomoyuki Nara JP - A smart meter includes: a power supply control unit which causes stoppage of a supply of power passing through the smart meter to an television and so on, when an RD command to stop the supply is received; a first communication unit which performs a first communication through which the RD command is received; a second communication unit which performs a second communication; and a communication control unit which: causes the performance of the first communication before the RD command is received; and prohibit the performance of the first communication and cause only the performance of the second communication, after the RD command is received. | 01-17-2013 |
20130039491 | TAMPERING MONITORING SYSTEM, MANAGEMENT DEVICE, PROTECTION CONTROL MODULE, AND DETECTION MODULE - A management device | 02-14-2013 |
20130103355 | BATTERY HISTORY INFORMATION MANAGEMENT DEVICE, BATTERY HISTORY INFORMATION MANAGEMENT METHOD, BATTERY HISTORY INFORMATION MANAGEMENT SYSTEM, AND POWER STORAGE DEVICE - A battery history information management device for managing history information of a secondary battery includes: a connection determination unit which determines whether a charge/discharge device connected to the secondary battery is (i) a first charge/discharge device connected via a communication network to a server which manages the history information or (ii) a second charge/discharge device not connected to the server; a battery history recording unit which records, when it is determined that the charge/discharge device is the second charge/discharge device, charge/discharge history for second charge/discharge device into battery history data; and a history upload control unit which transmits, when it is determined that the charge/discharge device is the first charge/discharge device, the battery history data to the server via the first charge/discharge device. | 04-25-2013 |
20130145477 | CONTENT REPRODUCTION SYSTEM, INFORMATION PROCESSING TERMINAL, MEDIA SERVER, SECURE DEVICE, AND SERVER SECURE DEVICE - A content reproduction system includes an information processing terminal and a secure device. The information processing terminal receives a copyright protection application program from an application distribution server. The copyright protection application program includes a first program having a first execution format executable in the information processing terminal and a second program having a second execution format different from the first execution format and executable in the secure device. The second program is encrypted with a program key held in the secure device. By extracting and executing the first program, the information processing terminal extracts the second program and transmits the second program to the secure device. The secure device receives the second program from the information processing terminal, decrypts the second program using a program key stored in a key storing unit, and executes the second program. | 06-06-2013 |
20130191927 | CONTENT MANAGEMENT DEVICE AND CONTENT MANAGEMENT METHOD - Provided is a content management device for protecting a content of a provider. A content management device | 07-25-2013 |
20130198361 | CONTENT DISTRIBUTION SYSTEM, CONTENT MANAGEMENT SERVER, CONTENT-USING DEVICE, AND CONTROL METHOD - A content management server comprises: a first connection detection unit that detects whether or not the content management server is connected with the content-using device; a content management unit that manages the content according to a result of the detection by the first connection detection unit and holds information on how the content-using device controls the use of the content. A content-using device comprises: a second connection detection unit that detects whether or not the content-using device is connected with the content management server; a second selection unit that specifies a method for controlling the use of the content according to a result of the detection by the second connection detection unit; and a content control unit that controls the use of the content according to the method specified by the second selection unit. | 08-01-2013 |
20130236018 | DATA PROTECTION SYSTEM THAT PROTECTS DATA BY ENCRYPTING THE DATA - A data protection system includes terminals, and an encryption device that encrypts distribution data distributed to each terminal. Each terminal corresponds with one node on a lowest level of a tree structure having hierarchies. A data protection system excludes nodes on the lowest level, determines a plurality of combination patterns that include combinations of two or more of all four nodes that are reached one level below the node, decides an individual decryption key for each determined combination pattern, and decides an individual decryption key for each node on the lowest level. The data protection system prescribes nodes that are reached from the node on the lowest level and a terminal to the node on the highest level that is an invalid node. For invalid nodes, the data protection system designates an encryption key that corresponds to the decryption key determined in correspondence with the combination pattern that combines all nodes, excluding invalid nodes, and encrypts distribution data that uses each of the designated encryption keys. | 09-12-2013 |
20140059350 | UNAUTHORIZED CONNECTION DETECTING DEVICE, UNAUTHORIZED CONNECTION DETECTING SYSTEM, AND UNAUTHORIZED CONNECTION DETECTING METHOD - An unauthorized connection detecting device, which detects whether or not a power storage device is an unauthorized power storage device, includes: a communications unit receiving first charge/discharge information in which first identification information and first connection information are associated each other, the first identification information identifying an encryption key of the power storage device used for mutual authentication between a charge/discharge device and the power storage device, and the first connection information being on the power storage device and obtained when the power storage device is connected to the charge/discharge device; and an unauthorization detecting unit detecting whether or not the power storage device is the unauthorized power storage device, by determining, using the first identification information and the first connection information, whether or not two or more power storage devices associated with a single first identification information item are present. | 02-27-2014 |
20140059352 | KEY MANAGEMENT SYSTEM, KEY MANAGEMENT METHOD, AND COMMUNICATION DEVICE - In a key management system, a RFID tag decrypts a first key encrypted by a master key and stores the decrypted first key to a service key storage region, then decrypts a second key encrypted by the first key in a third party server, then, encrypts the decrypted second key by the master key and transmits the second key encrypted by the master key to an application of a mobile information terminal, and then decrypts the encrypted second key returned from the application and stores the decrypted second key to the service key storage region. | 02-27-2014 |
20140059679 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM - To aim provide a software update apparatus including an install module group composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server, a replacement protection control module to be used for updating a protection control module having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations. If any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility. | 02-27-2014 |
20140082716 | ACCESS CONTROL METHOD, ACCESS CONTROL SYSTEM, COMMUNICATION TERMINAL, AND SERVER - An access control method including: receiving a log information item indicating use history of electrical equipment that is used together with an intended product; receiving product information including information for identifying the intended product; storing the log information item received in the receiving of a log information item and the product information received in the receiving of product information, in association with each other; and controlling whether or not to allow access to the log information item based on the product information associated with the log information item when access to the log information item is attempted. | 03-20-2014 |
20140090087 | METHOD OF MANAGING MAP INFORMATION, NAVIGATION SYSTEM, INFORMATION TERMINAL, AND NAVIGATION DEVICE - A method of managing map information including: attaching a retrieval identifier, according to input information, to map information which is obtained by retrieval based on the input information, the retrieval identifier indicating whether the map information is personal data or public data; storing the map information as the personal data into a storage device, the map information being indicated to be the personal data by the retrieval identifier attached in the attaching, and storing the map information as the public data into the storage device, the map information being indicated to be the public data by the retrieval identifier; and executing a navigation process using at least one of the personal data and the public data which are stored in the storage device. | 03-27-2014 |
20140129829 | UNAUTHORIZED CONNECTION DETECTING DEVICE, UNAUTHORIZED CONNECTION DETECTING SYSTEM, AND UNAUTHORIZED CONNECTION DETECTING METHOD - An unauthorized connection detecting device which detects an unauthorized charge/discharge device includes: a time information obtaining unit obtaining, as time information, information from a first charge/discharge device, the information indicating at least one of an issuing date of a first certificate which is a public key certificate and an issuing date of a certificate revocation list held by the first charge/discharge device; an expiration date obtaining unit obtaining expiration date information from a second charge/discharge device, the expiration date information indicating an expiration date of a second certificate which is a public key certificate held by the second charge/discharge device; and an unauthorization detecting unit detecting whether or not the second charge/discharge device is the unauthorized charge/discharge device by comparing the time information with the expiration date information. | 05-08-2014 |
20140196134 | VERIFICATION METHOD FOR VERIFYING VALIDITY OF PROGRAM, AND VERIFICATION SYSTEM - A verification method pertaining to the present invention is executed by a terminal device and is used for determining the validity of a control program used for remotely controlling an appliance via a server. Verification data generated from: a unique identifier which is assigned to a user of the terminal device; a parameter which is generated by the server device and is assigned to the control program; and partial data which is at least a portion of the control program, is compared with comparison data generated from: the ID of the user stored in the server device; the parameter; and a portion of a program corresponding to the partial data of the control program. When a mismatch occurs, the remote control of the appliance will be prohibited. | 07-10-2014 |
20140250183 | HOME APPLIANCE INFORMATION MANAGEMENT APPARATUS, HOME APPLIANCE INFORMATION SHARING METHOD, AND HOME APPLIANCE INFORMATION SHARING SYSTEM - A management apparatus which collects, from a home appliance, home appliance information which is information related to the home appliance and provides a user with to-be-provided information which is information obtained from the collected home appliance information, includes: a managing unit which manages the home appliance information; and a home appliance information holding unit which holds, in association with each other, (i) the home appliance information and (ii) share information which is for sharing the home appliance information and is associated with the user. The managing unit refers to data held by the home appliance information holding unit when a request for to-be-provided information is issued by the user, obtains the home appliance information held in association with share information identical to the share information associated with the user, and provides the user with to-be-provided information obtained from the obtained information. | 09-04-2014 |
20140277798 | DATA PROCESSING METHOD, TRANSMITTING APPARATUS, AND ANOMALY DETECTION SYSTEM - A data processing method for processing usage history data of at least one electrical device used by a user, including: obtaining first usage history data indicating a usage history of at least one electrical device used by the user; obtaining second usage history data indicating a fixed dummy usage history; generating third usage history data by combining the first usage history data and the second usage history data; and transmitting the third usage history data from a first apparatus to a second apparatus. | 09-18-2014 |
20140317410 | NETWORK SERVICE INTERMEDIATION METHOD AND INTERMEDIATION SYSTEM - An intermediation method used in an intermediation system that includes an intermediation device determining a permission for application services requiring user authentication on a network, where in response to a user request, a first account used for a first service and a second account used for a second service, and a registration request for using the linking service linking the first application service and the second application service are associated with each other, when the two accounts are valid, as accounts usable in a linking service, an association between the first and second services is stored in the intermediation device, and when the user makes a request to use the linked services, that use is controlled by a query to the intermediation device regarding whether the account is associated as able to use the linking service. | 10-23-2014 |
20140344054 | INFORMATION PROVIDING METHOD AND INFORMATION PROVIDING DEVICE - A first user among a plurality of users is associated with a second user having an evaluation tendency similar to evaluation data of the first user for management. Further, a third user is selected by a terminal device of the first user as a user having preference information that suits preference of the first user. The third user is associated with the first user and the second user for management. This configuration makes it possible to select not only a user automatically selected by a system but also another user whom a targeted user is interested in as a similar user, allowing provision of information that better suits hobby and preference of the targeted user. | 11-20-2014 |
20140347173 | METHOD USED IN A SYSTEM FOR REMOTELY CONTROLLING AN APPLIANCE - A method used in a remote control system for remotely controlling an appliance by execution of a remote control command contained in a control program stored in an operation terminal device, by which: a first identifier is acquired at a first time point (S | 11-27-2014 |