会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 152. 发明专利
    • Portable electronic equipment
    • 便携式电子设备
    • JP2008244929A
    • 2008-10-09
    • JP2007083382
    • 2007-03-28
    • Kddi CorpKddi株式会社
    • KIYOMOTO SHINSAKUTANAKA TOSHIAKI
    • H04M1/02H04M1/667
    • PROBLEM TO BE SOLVED: To provide portable electronic equipment in which a transmissive type biometrics authentication element of high detection precision is accurately assembled at a low cost.
      SOLUTION: In the portable electronic equipment constituted of an upper case and a lower case connected via a first hinge portion, the upper case comprises a light source for detecting biometrics information and the lower case comprises a detection means for detecting the biometrics information using transmission light, thereby accurately assembling a transmissive type biometrics authentication element of high detection precision at a low cost.
      COPYRIGHT: (C)2009,JPO&INPIT
    • 要解决的问题:提供以低成本准确组装高检测精度的透射型生物识别元件的便携式电子设备。 解决方案:在由通过第一铰链部连接的上壳体和下壳体构成的便携式电子设备中,上壳体包括用于检测生物识别信息的光源,下壳体包括用于检测生物特征信息的检测装置 使用透射光,从而以低成本精确地组装高检测精度的透射型生物测定认证元件。 版权所有(C)2009,JPO&INPIT
    • 153. 发明专利
    • Threshold secret sharing apparatus, threshold secret sharing method, secret information restoring method and program
    • THRESHOLD秘密共享装置,阈值共享共享方法,秘密信息恢复方法和程序
    • JP2008203720A
    • 2008-09-04
    • JP2007041954
    • 2007-02-22
    • Kddi CorpKddi株式会社
    • KURIHARA ATSUSHIKIYOMOTO SHINSAKUTANAKA TOSHIAKI
    • G09C1/00
    • H04L9/085
    • PROBLEM TO BE SOLVED: To provide a threshold secret sharing apparatus, a threshold secret sharing method, a secret information restoring method, and a program, wherein high-speed operation is attainable by using an XOR, and a common (k, n) threshold secret sharing scheme can be constituted. SOLUTION: Secret information K is divided into (n p -1) pieces of partial secret information K q (n p is a prime number satisfying n p ≥n with respect to the number of distributions n); dummy secret information K o is generated; mutually independent random numbers R are generated; partial distribution information is generated by an exclusive OR (XOR) operation by using the dummy secret information K o , the partial secret information K q , and the random numbers R; n pieces of distribution information S i are generated by linking the partial distribution information; and the (k, n) threshold secret sharing scheme is constituted. COPYRIGHT: (C)2008,JPO&INPIT
    • 要解决的问题:提供一种阈值秘密共享装置,阈值秘密共享方法,秘密信息恢复方法和程序,其中可以通过使用XOR来实现高速操作,并且公共(k, n)阈值秘密共享方案可以构成。

      解决方案:秘密信息K被分成(n p -1)个部分秘密信息K (n p 相对于分布数n)满足n p ≥n的素数; 生成伪秘密信息K o 产生相互独立的随机数R; 通过使用伪秘密信息K o ,部分秘密信息K q 和随机数R,通过异或(XOR)操作来产生部分分发信息。 通过链接部分分布信息来生成n个分发信息S i 并且构成(k,n)阈值秘密共享方案。 版权所有(C)2008,JPO&INPIT

    • 155. 发明专利
    • System, method and program for managing information
    • 管理信息的系统,方法和程序
    • JP2008098894A
    • 2008-04-24
    • JP2006277477
    • 2006-10-11
    • Kddi CorpKddi株式会社
    • KURIHARA ATSUSHIKIYOMOTO SHINSAKUTANAKA TOSHIAKI
    • H04L9/08G06F21/24
    • PROBLEM TO BE SOLVED: To provide an information management system dispensing with a large amount of calculation for restoration when composing a hierarchical authorization structure for dispersing information secretly. SOLUTION: Secret information F1 is dispersed to a plurality of pieces of dispersion information (shares S0-S2) by secret dispersion by a threshold method using XOR. The share S0 is dispersed to a plurality of pieces of dispersion information (S00-S02) by the secret dispersion by the threshold method using the XOR to create a hierarchical tree structure for the dispersion information. The dispersion information of the tree structure is distributed to a manager for each hierarchy. The dispersion information of the tree structure is generated by the secret dispersion with the threshold method using XOR, thus performing restoration speedily. COPYRIGHT: (C)2008,JPO&INPIT
    • 要解决的问题:提供一种信息管理系统,当组合用于分散信息的分层授权结构时,不需要大量的恢复计算。 解决方案:秘密信息F1通过使用XOR的阈值方法的秘密色散被分散到多个色散信息(份数S0-S2)。 通过使用XOR的阈值方法的秘密色散将共享S0分散到多个色散信息(S00-S02),以创建用于色散信息的分层树结构。 树结构的分散信息被分配给每个层级的管理者。 通过使用XOR的阈值法的秘密色散生成树结构的色散信息,从而快速进行恢复。 版权所有(C)2008,JPO&INPIT
    • 156. 发明专利
    • Key management system, key management method and program
    • 关键管理系统,关键管理方法与程序
    • JP2008022122A
    • 2008-01-31
    • JP2006190197
    • 2006-07-11
    • Kddi CorpKddi株式会社
    • FUKUSHIMA KAZUHIDEKIYOMOTO SHINSAKUTANAKA TOSHIAKI
    • H04L9/08
    • PROBLEM TO BE SOLVED: To increase the efficiency of key management by using a logical key management structure having a correlation with an actual network configuration.
      SOLUTION: Subgroups are formed on a network from user terminals existing in the neighbor, the user terminal with the highest computing capability is selected from among the user terminals belonging to each subgroup, a tree structure of personal keys where the personal key possessed by the user terminal with the highest computing capability is used for an apex is built in a key management server, and when a new user terminal utilizes a service, the key management server arranges the personal key possessed by the new user terminal at an optional end node of the tree structure, updates all the personal keys and shared keys arranged at nodes located in a higher-order of the nodes with the personal keys arranged therein, encrypts the updated personal keys and the updated shared keys by using the personal keys and the shared keys before subjected to update, and transmits each of the encrypted personal keys and encrypted shared keys to the user terminals.
      COPYRIGHT: (C)2008,JPO&INPIT
    • 要解决的问题:通过使用与实际网络配置相关的逻辑密钥管理结构来提高密钥管理的效率。 解决方案:从存在于邻居中的用户终端在网络上形成子组,从属于每个子组的用户终端中选择具有最高计算能力的用户终端,个人密钥所拥有的个人密钥的树结构 具有最高计算能力的用户终端被建立在密钥管理服务器中,并且当新用户终端利用服务时,密钥管理服务器将新用户终端拥有的个人密钥排列在可选端 树结构的节点更新布置在位于节点的更高阶节点处的所有个人密钥和共享密钥,其中布置有个人密钥,通过使用个人密钥对更新的个人密钥和更新的共享密钥进行加密,并且 在进行更新之前的共享密钥,并将每个加密的个人密钥和加密的共享密钥发送到用户终端。 版权所有(C)2008,JPO&INPIT
    • 157. 发明专利
    • Hash function processing apparatus, hash function generation method in same apparatus, and program
    • HASH功能处理设备,相同设备中的HASH功能生成方法和程序
    • JP2007293147A
    • 2007-11-08
    • JP2006122945
    • 2006-04-27
    • Kddi CorpKddi株式会社
    • KIYOMOTO SHINSAKUTANAKA TOSHIAKI
    • G09C1/00
    • PROBLEM TO BE SOLVED: To provide a hash function processing apparatus wherein calculation time is shortened and safety is enhanced.
      SOLUTION: The hash function processing apparatus comprises: a message data input section for inputting message data; a hash value input section for inputting the hash value in the previous round; a stream enciphering means 1 for generating stream cipher according to the massage data input from the message data input section and the hash value in the previous round input from the hash value input section; and a logic circuit 2 which obtains the exclusive OR of the generated stream cipher, the input message data, and the hash value in the previous round, and outputs the hash value.
      COPYRIGHT: (C)2008,JPO&INPIT
    • 要解决的问题:提供一种其中缩短计算时间并提高安全性的散列函数处理装置。 解决方案:散列函数处理装置包括:消息数据输入部分,用于输入消息数据; 哈希值输入部,用于输入前一轮的哈希值; 流加密装置1,用于根据从消息数据输入部分输入的按摩数据和从哈希值输入部分输入的前一轮中的哈希值产生流密码; 以及逻辑电路2,其在前一轮中获得所生成的流密码,输入消息数据和散列值的异或,并输出散列值。 版权所有(C)2008,JPO&INPIT
    • 158. 发明专利
    • Authentication system and authentication information transfer method in the same system and security device
    • 相同系统和安全设备中的认证系统和认证信息传输方法
    • JP2007206961A
    • 2007-08-16
    • JP2006024687
    • 2006-02-01
    • Kddi CorpKddi株式会社
    • KIYOMOTO SHINSAKUTANAKA TOSHIAKI
    • G06F21/20H04L9/32
    • PROBLEM TO BE SOLVED: To suppress the increase of the size of data to be transferred in hierarchization by hierarchically transferring authentication information from secondary information to third order and fourth order information. SOLUTION: This authentication system is configured to generate Digest x (x is 1, 2 and so on) by a hash arithmetic operation based on a hash function value k_auth1 with key included in SI generated from PI, and inputs electronic ticket information and validity term information, and generates a hash function value k_auth x+1 with key by using Digest x as a key. The Digest x , k_auth x , electronic ticket information and validity term information are transferred as temporary authentication information. COPYRIGHT: (C)2007,JPO&INPIT
    • 要解决的问题:通过将认证信息从次级信息分层传送到第三级和第四级信息来抑制分级中要传送的数据的大小的增加。 解决方案:该认证系统被配置为通过基于散列函数值k_auth1的散列算术运算来生成Digest x (x为1,2等等),其中包括在SI中的密钥包括在SI中 PI,并输入电子票信息和有效期信息,并通过使用Digest x 作为关键字生成具有密钥的散列函数值k_auth x + 1 。 Digit x ,k_auth x ,电子票据信息和有效期限信息作为临时认证信息传送。 版权所有(C)2007,JPO&INPIT
    • 160. 发明专利
    • Program evaluation method and device and evaluation program
    • 程序评估方法与设备与评估方案
    • JP2007080026A
    • 2007-03-29
    • JP2005268105
    • 2005-09-15
    • Kddi CorpKddi株式会社
    • FUKUSHIMA KAZUHIDEKIYOMOTO SHINSAKUTANAKA TOSHIAKI
    • G06F21/22G06F11/36
    • PROBLEM TO BE SOLVED: To provide a program evaluation method and device and an evaluation program for applying quantitative evaluation to safety. SOLUTION: A program evaluation device allocates variables to the nodes of a graph, and when a value to be calculated by referring to a variable allocated to a certain node is substituted in variables to be allocated to the other nodes, the program evaluation device generates the dependence graph of variables to which a branch extending from a certain node to the other nodes is added, and sets an initial evaluation value "1" at the node corresponding to the variable in which an initial value is substituted, and sets an initial evaluation value "0" at the nodes corresponding to the other variables. Regarding each of nodes where any evaluation value other than "0" is set, and any flag showing that evaluation has been ended is not set, the program evaluation device adds the evaluation values of the adjacent nodes to update its own evaluation value, and calculates the total sum of the updated evaluation values of all the nodes, and generates and outputs the evaluation value of the program. COPYRIGHT: (C)2007,JPO&INPIT
    • 要解决的问题:提供一种应用定量评估对安全性的程序评估方法和设备以及评估程序。 解决方案:程序评估装置将变量分配给图的节点,并且当通过参考分配给某个节点的变量计算的值被替换为要分配给其他节点的变量时,程序评估 设备生成从特定节点向其他节点延伸的分支添加到的变量的依赖图,并且在与替换初始值的变量对应的节点处设置初始评估值“1”,并设置 在与其他变量对应的节点处的初始评估值为“0”。 关于设定了除了“0”以外的评价值的各节点,并且没有设定表示评价结束的任何标志,则节目评价装置将相邻节点的评价值相加来更新其自身的评价值, 所有节点的更新评估值的总和,并生成并输出程序的评估值。 版权所有(C)2007,JPO&INPIT