会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 172. 发明专利
    • Encryption state verification system, encryption state verification method, and program
    • 加密状态验证系统,加密状态验证方法和程序
    • JP2014146951A
    • 2014-08-14
    • JP2013013956
    • 2013-01-29
    • Kddi CorpKddi株式会社
    • KIYOMOTO SHINSAKUNAKANO ARITAKAMIYAKE MASARU
    • H04L9/32G06F21/64
    • PROBLEM TO BE SOLVED: To properly protect data on a cloud, and also verify an encryption state of data in the cloud.SOLUTION: A cloud server encrypts data G in which a file F is encrypted, and transmits the encrypted data G to a user terminal. The user terminal receives the encrypted data G, generates a secret key, converts the received data G into H by using the generated secret key, and calculates a hash value I from the H generated by the conversion. Also, the user terminal transmits the H generated by the conversion to the cloud server, stores the calculated hash value I, and transmits a challenge c to the cloud server. The cloud server derives r from the received H and the challenge c, and transmits the derived r to the user terminal. The user terminal restores the H by using the challenge c and the received r, calculates the hash value I' from the restored H, and determines whether the stored I and the derived I' match with each other or not.
    • 要解决的问题:正确保护云上的数据,并验证云中数据的加密状态。解决方案:云服务器加密文件F被加密的数据G,并将加密数据G发送给用户 终奌站。 用户终端接收加密数据G,生成秘密密钥,通过使用生成的秘密密钥将接收到的数据G转换为H,并根据转换生成的H计算哈希值I. 此外,用户终端将通过转换生成的H发送给云服务器,存储计算出的散列值I,并向云服务器发送质询c。 云服务器从接收到的H和挑战c导出r,并将导出的r发送给用户终端。 用户终端通过使用质询c和接收到的r来恢复H,从恢复的H计算散列值I',并确定所存储的I和导出的I'是否彼此匹配。
    • 173. 发明专利
    • Program conversion device and program
    • 程序转换设备和程序
    • JP2014109641A
    • 2014-06-12
    • JP2012263229
    • 2012-11-30
    • Kddi CorpKddi株式会社
    • FUKUSHIMA KAZUHIDEKIYOMOTO SHINSAKUMIYAKE MASARU
    • G09C1/00
    • PROBLEM TO BE SOLVED: To provide a conversion device for converting a program so as to reduce dangers that may leak information to be concealed from function arguments.SOLUTION: The conversion device of a function to be a program includes: definition means for defining a relational expression of arguments to be converted in a target function and encoded arguments which are more than the number of arguments to be converted; and argument conversion processing adding means for adding a code for converting the arguments to be converted into the encoded arguments to an access function for accessing the target function in accordance with the relational expression and adding a code for converting the encoded arguments into the arguments to be converted to the target function.
    • 要解决的问题:提供一种用于转换程序的转换装置,以减少可能泄露从功能参数中隐藏的信息的危险。解决方案:作为程序的功能的转换装置包括:用于定义关系的定义装置 表达要在目标函数中转换的参数和编码参数,该参数大于要转换的参数数量; 以及参数转换处理添加装置,用于将用于将要转换的参数转换为编码参数的代码添加到根据关系表达式访问目标函数的访问函数,并将用于将编码参数转换为参数的代码 转换为目标函数。
    • 174. 发明专利
    • Database complementation system, database complementation method, data complementation server, and program
    • 数据库补充系统,数据库补充方法,数据补充服务器和程序
    • JP2014016872A
    • 2014-01-30
    • JP2012154606
    • 2012-07-10
    • Kddi CorpKddi株式会社
    • NAKAMURA TORUKIYOMOTO SHINSAKUWATANABE TATSUMIYAKE MASARU
    • G06F17/30
    • PROBLEM TO BE SOLVED: To complement deficit values in a possessed database while keeping secret mutually possessed information on users which may be privacy information.SOLUTION: Statistical information generation means of an information providing server generates, as statistical information, the total of differences in value between each pair of items and the number of samples when the total is calculated with respect to pairs of all items on a first axis in a possessed database. Statistical information transmission means transmits the generated statistical information to a database complementing server. Statistical information reception means of the database complementing server receives the statistical information. Complementing means complements deficit values in the possessed database using the received statistical information.
    • 要解决的问题:补充所拥有的数据库中的缺陷值,同时保持秘密相互拥有的可能是隐私信息的用户的信息。解决方案:信息提供服务器的统计信息生成装置生成作为统计信息的价值差异的总和 在相对于拥有的数据库中的第一轴上的所有项目的对计算总计时,在每对项目之间以及样本数量。 统计信息发送装置将生成的统计信息发送到数据库补充服务器。 数据库补充服务器的统计信息接收装置接收统计信息。 补充意味着使用收到的统计信息补充拥有数据库中的赤字值。
    • 175. 发明专利
    • Mobile communication terminal, data communication detection device, data communication detection method, and program
    • 移动通信终端,数据通信检测设备,数据通信检测方法和程序
    • JP2013247664A
    • 2013-12-09
    • JP2012122516
    • 2012-05-29
    • Kddi CorpKddi株式会社
    • FUKUSHIMA KAZUHIDEKIYOMOTO SHINSAKUMIYAKE MASARU
    • H04M1/00
    • PROBLEM TO BE SOLVED: To detect data communication which may lead to data leakage to the outside, on the basis of a log in which operation of an application is recorded, to prevent data stored in a mobile communication terminal from being leaked to the outside.SOLUTION: A mobile communication terminal 10 having an application 610 and an operating system 400 required for operation of the application installed comprises: a log storage part 630 for storing an operation log which is created by the installed application and indicates the operation of the application; and a detection part 640 for detecting presence/absence of data communication having a possibility which may lead to data leakage to the outside depending on whether or not a system call log for performing data communication between applications is included in the operation log stored in the log storage part 630.
    • 要解决的问题:为了检测可能导致数据泄漏到外部的数据通信,基于记录应用的操作的日志,以防止存储在移动通信终端中的数据泄漏到外部。 解决方案:具有安装应用程序操作所需的应用程序610和操作系统400的移动通信终端10包括:用于存储由所安装的应用程序创建并指示应用程序的操作的操作日志的日志存储部分630; 以及检测部640,其用于根据在应用程序之间执行数据通信的系统呼叫记录是否包括在存储在日志中的操作日志中,检测是否存在可能导致数据泄漏到外部的可能性的数据通信 存储部分630。
    • 176. 发明专利
    • Storage device, storage medium, access pattern concealing method, and program
    • 存储设备,存储介质,访问模式隐蔽方法和程序
    • JP2013246678A
    • 2013-12-09
    • JP2012120685
    • 2012-05-28
    • Kddi CorpKddi株式会社
    • NAKANO ARITAKAKIYOMOTO SHINSAKUMIYAKE MASARU
    • G06F12/14G06F21/62
    • PROBLEM TO BE SOLVED: To enable execution in a built-in system and the like, dispense with dedicated hardware, and conceal an access pattern.SOLUTION: A storage device randomly rearranges data in a non-access area just once in an initial state; selects data in the non-access area according to a memory size in an access area and moves it to the access area; and, when there is an access to one data item, exchanges data between the access area and the non-access area, accesses another data item in the access area, and exchanges the data between the access area and the non-access area. When the access processing to the data to be accessed is finished, the storage device writes necessary data in the access area.
    • 要解决的问题:为了能够在内置系统等中执行,省略专用硬件,并隐藏访问模式。解决方案:存储设备在初始状态中随机重新排列非访问区域中的数据一次; 根据访问区域中的存储器大小选择非访问区域中的数据,并将其移动到访问区域; 并且当访问一个数据项时,在访问区域和非访问区域之间交换数据,访问访问区域中的另一个数据项,并且在访问区域和非访问区域之间交换数据。 当要访问的数据的访问处理完成时,存储装置在访问区域中写入必要的数据。
    • 177. 发明专利
    • Position information anonymity apparatus, position information anonymity method and program
    • 位置信息无关装置,位置信息无关方法和程序
    • JP2013232068A
    • 2013-11-14
    • JP2012102996
    • 2012-04-27
    • Kddi CorpKddi株式会社
    • KIYOMOTO SHINSAKUMIYAKE MASARU
    • G06F21/60G06F21/62
    • PROBLEM TO BE SOLVED: To effectively protect privacy of an owner of data by anonymizing time information and position information simultaneously.SOLUTION: A position information anonymity apparatus corresponds to an n-dimensional coordinate system (n is an integer of two or more) indicating true position information to generate a random number, and adds the generated random number to the n-dimensional coordinates system indicating the true position information, to generates perturbed coordinate information. True coordinate information, when the generated coordinate information is defined as central coordinates and a radius is defined as r, is included in the solid formed by such a condition, and a radius r according to required degree of anonymity is determined. On the basis of a value according to the degree of anonymity requiring time information in which the true position information is acquired, perturbed time information is generated by adding a time width to the time information.
    • 要解决的问题:通过同时处理匿名时间信息和位置信息来有效保护数据所有者的隐私。解决方案:位置信息匿名装置对应于表示真实的n维坐标系(n为2以上的整数) 位置信息以生成随机数,并将生成的随机数添加到指示真实位置信息的n维坐标系中,以产生扰动的坐标信息。 将所生成的坐标信息定义为中心坐标并将半径定义为r时的真实坐标信息被包含在由这种条件形成的实体中,并且确定根据所需的匿名程度的半径r。 根据要求获取真实位置信息的时间信息的匿名程度的值,根据时间信息增加时间宽度来生成扰动时间信息。
    • 178. 发明专利
    • Stream encryption processing system, anti-tamper device, and stream encryption processing method
    • 流加密处理系统,防篡改装置和流加密处理方法
    • JP2013191907A
    • 2013-09-26
    • JP2012054412
    • 2012-03-12
    • Kddi CorpKddi株式会社Dainippon Printing Co Ltd大日本印刷株式会社
    • KIYOMOTO SHINSAKUTANAKA TOSHIAKIOKI SHUICHIFUKUNAGA MASATAKEJINRIKI TETSUO
    • H04L9/18
    • PROBLEM TO BE SOLVED: To execute initialization processing for stream encryption in an anti-tamper device, to perform subsequent encryption/decryption processing by another device, and to make stream encryption algorithm hierarchical in the initialization processing.SOLUTION: An anti-tamper device includes hash function processing means of receiving a held secrete key and an initial value output from a terminal and outputting a corresponding hash value as an initial key, and initialization processing means of performing initialization processing of stream encryption on the basis of the initial key and the initial value output from the terminal, and outputting an initial status after the initialization processing to the terminal. The terminal includes stream encryption processing means of receiving the internal status input from the anti-tamper device and performing encryption or decryption processing of stream encryption.
    • 要解决的问题:在防篡改设备中执行流加密的初始化处理,执行另一设备的后续加密/解密处理,并在初始化处理中使流加密算法分层。解决方案:防篡改设备包括 散列函数处理装置,用于接收保持的分离密钥和从终端输出的初始值,并输出相应的哈希值作为初始密钥;以及初始化处理装置,用于根据初始密钥和初始密钥进行流加密的初始化处理 从终端输出的值,并且在初始化处理之后向终端输出初始状态。 终端包括流加密处理装置,用于接收来自反篡改装置的内部状态输入,并执行流加密的加密或解密处理。
    • 180. 发明专利
    • Arithmetic processing method of encryption function, arithmetic processing method of decryption function, encryption device, and decryption device that use fibe method; and program
    • 加密函数的算术处理方法,分解函数的算术处理方法,加密装置和使用FIBE方法的分解装置; 和计划
    • JP2013148641A
    • 2013-08-01
    • JP2012007716
    • 2012-01-18
    • Kddi CorpKddi株式会社
    • NAKANO ARITAKAKIYOMOTO SHINSAKUMIYAKE MASARU
    • G09C1/00
    • PROBLEM TO BE SOLVED: To execute arithmetic processing for Lagrange interpolation coefficient Δ, which is used in an encryption function, in parallel using GPU in FIBE encryption processing in order to achieve high speed encryption processing.SOLUTION: Arithmetic processing for a Lagrange interpolation coefficient Δby interpolation coefficient calculation means, which is provided for an encryption device that executes the FIBE encryption processing, includes the steps of: generating a block, in which arithmetic processing on the right side of an expression that is used to obtain the Lagrange interpolation coefficient Δ, for each variable i (S41); generating a thread, in which (x-j)/(i-j) in the expression is executed, for each variable j within the block (S42); executing (x-j)/(i-j) in the expression, which is processed by each thread, in parallel by using GPU (S43); and executing total product processing of an arithmetic result of (x-j)/(i-j), which is obtained for each variable j, in parallel by using GPU within each block (S44).
    • 要解决的问题:为了实现高速加密处理,在FIBE加密处理中并行使用加密函数中使用的拉格朗日插值系数&Dgr的算术处理。解决方案:拉格朗日内插系数的算术处理 &Dgr;对于执行FIBE加密处理的加密装置提供的内插系数计算装置包括以下步骤:生成一个块,其中用于获得拉格朗日插值的表达式右侧的算术处理 系数&Dgr,对于每个变量i(S41); 对于块内的每个变量j生成表达式中的(x-j)/(i-j)的线程(S42); 通过使用GPU并行处理每个线程的表达式执行(x-j)/(i-j)(S43); 并且通过使用每个块内的GPU来并行地执行对于每个变量j获得的(x-j)/(i-j)的算术结果的总产品处理(S44)。