会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 82. 发明授权
    • Information processing apparatus and method
    • 信息处理装置和方法
    • US07958361B2
    • 2011-06-07
    • US11458175
    • 2006-07-18
    • Junichi HayashiYuji Suga
    • Junichi HayashiYuji Suga
    • H04L9/32H04N7/167G06F17/00
    • G06F21/64H04L9/3242H04L9/3247H04L2209/68
    • An information processing method enables verification of validity of signed data using received partial signed data parts, even when all the signed data is not received. According to the information processing method, signature data including a signature value and digests of a plurality of partial signed data parts is received. Then, the signature data is verified by using the signature value and the digests of a plurality of partial signed data parts. Subsequently, the partial signed data is received according to a result of verifying the signature data. Then, the partial signed data is verified using the partial signed data and the digest of the partial signed data.
    • 信息处理方法即使在没有接收到所有签名数据的情况下,也能够使用接收到的部分签名数据部分来验证签名数据的有效性。 根据信息处理方法,接收包括签名值的签名数据和多个部分签名数据部分的摘要。 然后,通过使用多个部分签名数据部分的签名值和摘要来验证签名数据。 随后,根据验证签名数据的结果接收部分签名数据。 然后,使用部分签名数据和部分签名数据的摘要来验证部分签名数据。
    • 83. 发明授权
    • Key information processing method, device thereof, and program
    • 关键信息处理方法,装置及程序
    • US07706530B2
    • 2010-04-27
    • US11329037
    • 2006-01-11
    • Yuji SugaJunichi Hayashi
    • Yuji SugaJunichi Hayashi
    • H04L9/00
    • H04L9/0643H04L9/0836H04L2209/60
    • It is possible to safely constitute a key management method having an access structure equivalent to the hierarchical key management method with a small amount of calculations. The method includes: a setting step for setting a set (,) of the number of times a one-way hash function is executed for each of the elements of the rank i; a key generation step for generating two separate keys for the elements as the value of the number of times the one-way function has been executed corresponding to the set of the number of times which has been set for the elements of the two original keys for each of the elements; and a key delivery step for delivering the two separate keys for the elements to each of the elements. Furthermore, the method includes an initial key generation step for calculating N keys with a route node positioned at the most significant node when generating a key at each node from a parent node and performing key delivery according to the hierarchical relationship expressed in a directed graph having no cycle; and a node key generation step for generating the value of the number of predetermined times the one-way function is executed according to the execution specification for M keys (M≦N) among the N initial keys in each node, as the M node keys for the node.
    • 可以安全地构成具有与分级密钥管理方法等同于具有少量计算的访问结构的密钥管理方法。 该方法包括:设置步骤,用于设置针对秩i的每个元素执行单向散列函数的次数的集合(,); 密钥生成步骤,用于为元素生成两个单独的密钥作为执行单向功能的次数的值,对应于为两个原始密钥的元素设置的次数集合, 每个元素; 以及用于将元件的两个单独的键递送到每个元件的关键递送步骤。 此外,该方法包括:初始密钥生成步骤,用于当从父节点生成每个节点处的密钥并且根据在有向图中表示的分层关系执行密钥递送时,利用位于最重要节点处的路由节点计算N个密钥, 没有循环; 以及节点密钥生成步骤,用于根据每个节点中的N个初始密钥中的M个密钥(M&NlE; N)的执行规范,生成执行单向功能的预定次数的值,作为M个节点密钥 为节点。
    • 84. 发明授权
    • Network access terminal, network system, method of network system, storage medium, and program code
    • 网络接入终端,网络系统,网络系统方法,存储介质和程序代码
    • US07546464B2
    • 2009-06-09
    • US10170707
    • 2002-06-14
    • Junichi HayashiKeiichi Iwamura
    • Junichi HayashiKeiichi Iwamura
    • H04L9/00H04N7/16
    • H04N1/00127G06Q30/06H04L63/12H04N1/00244H04N2201/3249
    • When image data in which a digital watermark is embedded accesses a server, particularly, a Web server, via a network, the server is appropriately selected and accessed via the network in accordance with the environments of the clients that access the server. A network access terminal includes an extraction unit for extracting first information from an image that includes the first information, which is multi-valued, an acquisition unit for acquiring from a predetermined storage device the first information extracted by the extraction unit and address information specified by second information different from the first information, from among a plurality of address information stored in the predetermined storage device, and a communication unit for accessing an address based on the address information obtained by the acquisition unit.
    • 当其中嵌入有数字水印的图像数据经由网络访问服务器,特别是Web服务器时,根据访问服务器的客户端的环境,通过网络适当地选择和访问服务器。 网络接入终端包括:提取单元,用于从包括多值的第一信息的图像中提取第一信息;获取单元,用于从预定的存储设备获取由提取单元提取的第一信息和由 从存储在预定存储装置中的多个地址信息中的与第一信息不同的第二信息和用于基于由获取单元获得的地址信息访问地址的通信单元。
    • 89. 发明申请
    • IMAGE PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS, AND METHODS THEREOF
    • 图像处理装置,信息处理装置及其方法
    • US20070150962A1
    • 2007-06-28
    • US11615128
    • 2006-12-22
    • Junichi Hayashi
    • Junichi Hayashi
    • H04L9/32
    • G06F21/10G06F21/6209H04L9/0844H04L2209/603H04N1/00204H04N1/32101H04N1/4486H04N2201/001H04N2201/3246
    • Upon applying a DRM protection process to an image which is generated by an image processing apparatus, which doesn't have any communication means that allows direct communications with a PC, without any alteration, encryption of the image in the apparatus and that of the image in the PC as an internal process of the DRM are required, resulting in poor efficiency. The apparatus executes a part of the DRM protection process for the image, and outputs the encrypted image. The PC receives the image which has undergone the part of the DRM protection process, executes the remaining part of the DRM protection process, and outputs the image which has undergone the DRM protection process. In this case, the PC transmits use condition of the input image to a license server, receives signed use condition from the server, and combines the signed use condition with the input encrypted image.
    • 在对由图像处理装置生成的图像应用DRM保护处理的情况下,不进行与PC直接通信的任何通信手段,而不进行任何改变,图像在图像中的加密和图像的加密 在PC中作为DRM的内部过程是必需的,导致效率差。 该装置执行图像的DRM保护处理的一部分,并输出加密图像。 PC接收经过DRM保护处理的部分的图像,执行DRM保护处理的剩余部分,并输出已经经过DRM保护处理的图像。 在这种情况下,PC将输入图像的使用条件发送到许可证服务器,从服务器接收签名使用条件,并将签名的使用条件与输入的加密图像组合。
    • 90. 发明申请
    • Key information processing method, device thereof, and program
    • 关键信息处理方法,装置及程序
    • US20060149762A1
    • 2006-07-06
    • US11329037
    • 2006-01-11
    • Yuji SugaJunichi Hayashi
    • Yuji SugaJunichi Hayashi
    • G06F7/00
    • H04L9/0643H04L9/0836H04L2209/60
    • It is possible to safely constitute a key management method having an access structure equivalent to the hierarchical key management method with a small amount of calculations. The method includes: a setting step for setting a set (,) of the number of times a one-way hash function is executed for each of the elements of the rank i; a key generation step for generating two separate keys for the elements as the value of the number of times the one-way function has been executed corresponding to the set of the number of times which has been set for the elements of the two original keys for each of the elements; and a key delivery step for delivering the two separate keys for the elements to each of the elements. Furthermore, the method includes an initial key generation step for calculating N keys with a route node positioned at the most significant node when generating a key at each node from a parent node and performing key delivery according to the hierarchical relationship expressed in a directed graph having no cycle; and a node key generation step for generating the value of the number of predetermined times the one-way function is executed according to the execution specification for M keys (M≦N) among the N initial keys in each node, as the M node keys for the node.
    • 可以安全地构成具有与分级密钥管理方法等同于具有少量计算的访问结构的密钥管理方法。 该方法包括:设置步骤,用于设置针对秩i的每个元素执行单向散列函数的次数的集合(,); 密钥生成步骤,用于为元素生成两个单独的密钥作为执行单向功能的次数的值,对应于为两个原始密钥的元素设置的次数集合, 每个元素; 以及用于将元件的两个单独的键递送到每个元件的关键递送步骤。 此外,该方法包括:初始密钥生成步骤,用于当从父节点生成每个节点处的密钥并且根据在有向图中表示的分层关系执行密钥递送时,利用位于最重要节点处的路由节点计算N个密钥, 没有循环; 以及节点密钥生成步骤,用于根据每个节点中的N个初始密钥中的M个密钥(M <= N)的执行规范,生成执行单向功能的预定次数的值,作为M个节点 节点的键。