会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明专利
    • System and method for ciphered communication computer program, and computer readable recording medium
    • 用于通信计算机程序的系统和方法以及计算机可读记录介质
    • JP2005167608A
    • 2005-06-23
    • JP2003403556
    • 2003-12-02
    • Canon Incキヤノン株式会社
    • KITAWAKI HARUYUKIOISHI KAZUOMITAKAGI TSUNEYOSHI
    • H04L9/36H04L12/46H04L12/66
    • PROBLEM TO BE SOLVED: To suitably perform safe communication over a network. SOLUTION: A security gateway (SG) 2 at the start side blocks communication from a host 1, retrieval is made to find a security gateway (SG) 5 at the answer side using a destination side address (address of a host 4) of the communication as a key, and, if the gateway (SG) 5 at the answer side is found from the retrieval result, a security policy (SP) is set for executing an IPsec tunnel mode between the security gateways (SG) 2, 5. Then an IKE program is started on the security gateways (SG) 2, 5, and, after setting security association (SA), the security gateway (SG) 2 at the start side unblocks the communication from the host 1 to the host 4 to perform communication between the hosts 1, 4. COPYRIGHT: (C)2005,JPO&NCIPI
    • 要解决的问题:适当地执行通过网络的安全通信。 解决方案:起始侧的安全网关(SG)2阻止来自主机1的通信,使用目的地侧地址(主机4的地址)检索在答复侧的安全网关(SG)5 )作为密钥,并且如果从检索结果中找到了答案侧的网关(SG)5,则在安全网关(SG)2之间设置安全策略(SP)以执行IPsec隧道模式 然后,在安全网关(SG)2,5上启动IKE程序,并且在设置安全关联(SA)之后,安全网关(SG)2在起始侧解除从主机1到主机1的通信 主机4执行主机1,4的通信。版权所有(C)2005,JPO&NCIPI
    • 2. 发明专利
    • Data sharing method, program and apparatus
    • 数据共享方法,程序和设备
    • JP2005086330A
    • 2005-03-31
    • JP2003314000
    • 2003-09-05
    • Canon Incキヤノン株式会社
    • OISHI KAZUOMI
    • G09C1/00H04L9/08H04L9/30
    • H04L9/0844H04L9/3013H04L9/3066H04L2209/76
    • PROBLEM TO BE SOLVED: To provide a data sharing method, a program and an apparatus which makes an apparatus having a high computation capacity compute without disclosing secret information, thereby finishing with a reduced quantity of computations to be executed by itself at a high security. SOLUTION: For sharing secret data y_AB with communication parties using the Diffie-Hellman public key distribution system, the data sharing method obtains data y_1st from data r_1st using commission computation, generates data y_A in a y_init*y_1st mod p, and sends the data y_A to the communication parties (steps S102, S106). And it obtains data y_AB from data r_init + r_1st, using commission computation (steps S107, S111) where y_init = g^(r_init) mod p. COPYRIGHT: (C)2005,JPO&NCIPI
    • 要解决的问题:提供一种数据共享方法,程序和装置,其使得具有高计算能力的装置在不公开秘密信息的情况下进行计算,由此完成在自动执行的计算量减少 高安全性 解决方案:为了与使用Diffie-Hellman公开密钥分发系统的通信方共享秘密数据y_AB,数据共享方法使用佣金计算从数据r_1st获得数据y_1st,生成y_init * y_1st mod p中的数据y_A,并发送 数据y_A发送给通信方(步骤S102,S106)。 并且使用佣金计算(步骤S107,S111)从数据r_init + r_1st获得数据y_AB,其中y_init = g ^(r_init)mod p。 版权所有(C)2005,JPO&NCIPI
    • 3. 发明专利
    • Method for setting parameter for cryptocommunication
    • 用于确定CRYPTOCOMMUNICATION的参数的方法
    • JP2005033520A
    • 2005-02-03
    • JP2003196346
    • 2003-07-14
    • Canon Incキヤノン株式会社
    • OISHI KAZUOMI
    • H04L9/08
    • PROBLEM TO BE SOLVED: To provide a method for setting a parameter for cryptocommunication which is intuitive, intelligible and highly reliable.
      SOLUTION: This method for setting a parameter uses a device having a communication means provided with a terminal for performing connection by physical contact and a means for recording parameters such as identification information obtained by collecting the following data: cryptographic algorithm, authentication algorithm, a key and the identifier of the opposite communication party. The method comprises a step in which the device connected to one opposite communication party receives the parameters from the one communication party and records the parameters, a step for transmitting the parameters recorded by the device connected to the other opposite communication party to the other opposite communication party, and a step for using the transmitted parameters to perform communication between the one opposite communication party and the other opposite communication party and confirming that the parameters are correctly shared.
      COPYRIGHT: (C)2005,JPO&NCIPI
    • 要解决的问题:提供直观,可理解和高度可靠的用于设置用于密码通信的参数的方法。 解决方案:用于设置参数的方法使用具有设置有用于通过物理接触进行连接的终端的通信装置的装置和用于记录诸如通过收集以下数据获得的识别信息之类的参数的装置:密码算法,认证算法 ,一个密钥和对方通信方的标识符。 该方法包括一个步骤,其中连接到一个相对的通信方的设备从一个通信方接收参数并记录参数;将与由另一个相对的通信方连接的设备记录的参数传送到另一个相对通信的步骤 以及使用所发送的参数来执行一个相对的通信方和另一个相对的通信方之间的通信并确认参数被正确共享的步骤。 版权所有(C)2005,JPO&NCIPI
    • 5. 发明专利
    • Information processor and its method, program, and recording medium
    • 信息处理器及其方法,程序和记录介质
    • JP2009104589A
    • 2009-05-14
    • JP2008222793
    • 2008-08-29
    • Canon Incキヤノン株式会社
    • OISHI KAZUOMI
    • G06F21/22G06F21/06
    • PROBLEM TO BE SOLVED: To provide a technique which can make analysis and alteration of a program more difficult. SOLUTION: An information processor determines object instructions used as an object for reprogramming to camouflage instructions within instructions contained in the program of a processing object, creates the camouflage instructions corresponding to the object instructions, creates restore instruction for restoring the created camouflage instructions to the corresponding object instructions, rewrites the object instructions contained in the program of the processing object by the created camouflage instructions, and adds the restore instruction to this program. Wherewith, the restore instruction refers to a memory in which an output value of the processing instruction contained in the program of the processing object is stored, specifies a location or the object instructions in this program of the object instructions based on the referred value concerned or the object instructions, and performs the restoration. COPYRIGHT: (C)2009,JPO&INPIT
    • 要解决的问题:提供可以使程序的分析和改变更困难的技术。 解决方案:信息处理器确定用作重新编程的对象的对象指令,以伪装在处理对象的程序中的指令内伪装指令,创建与目标指令相对应的伪装指令,创建用于恢复所创建伪装指令的恢复指令 通过创建的伪装指令重写包含在处理对象的程序中的对象指令,并将恢复指令添加到该程序。 因此,恢复指令是指存储处理对象的程序中包含的处理指令的输出值的存储器,基于所涉及的值指定对象指令的该程序中的位置或对象指令,或者 对象指令,并执行恢复。 版权所有(C)2009,JPO&INPIT
    • 6. 发明专利
    • Interrupter, and anonymous public key certificate issuing apparatus, system, and program
    • 中断和公开发行的关键证书发行设备,系统和程序
    • JP2005191646A
    • 2005-07-14
    • JP2003427050
    • 2003-12-24
    • Canon Incキヤノン株式会社
    • OISHI KAZUOMIKITAWAKI HARUYUKI
    • H04L9/36H04L9/08H04L12/66H04L12/70H04L12/56
    • PROBLEM TO BE SOLVED: To provide an interrupter and an anonymous public key certificate issuing apparatus capable of efficiently and surely issuing a disposable anonymous public key certificate to an apparatus using an anonymous address when a subnet prefix in x bits (x is less than 64) is assigned to a user. SOLUTION: When a host 210 transmits a certificate request packet including the anonymous address to a CA 201, the interrupter 204 interrupts a different certificate request having the same sender address. Further, when the CA 201 transmits a packet including a certificate to the host 210, the interrupter 204 interrupts the different certificate packet having the same destination address and a certificate packet whose destination is an address not received before. COPYRIGHT: (C)2005,JPO&NCIPI
    • 要解决的问题:提供一种中断器和匿名公开密钥证明书发行装置,当x位(x较少)的子网前缀时,能够有效且可靠地向一个使用匿名地址的设备发出一次性匿名公钥证书 比64)被分配给用户。 解决方案:当主机210向CA 201发送包括匿名地址的证书请求分组时,中断器204中断具有相同发送方地址的不同证书请求。 此外,当CA 201向主机210发送包含证书的分组时,中断器204中断具有相同目的地址的不同证书分组和目的地是以前未被接收到的地址的证书分组。 版权所有(C)2005,JPO&NCIPI
    • 9. 发明专利
    • Control unit, method, and program for executing control based upon identification information for communication
    • 基于通信标识信息执行控制的控制单元,方法和程序
    • JP2003333122A
    • 2003-11-21
    • JP2002141623
    • 2002-05-16
    • Canon Incキヤノン株式会社
    • OISHI KAZUOMIKITAWAKI HARUYUKI
    • G06F15/00G06F13/00H04L29/08
    • PROBLEM TO BE SOLVED: To solve a problem that it is convenient to perform original processing at high speed for communication between specific devices, such as communication between the devices of the same kind or between devices of specific combination, but there is an overhead of the communication since IPv6 is rules of a network layer and it is preferable to realize a function like a mutual authentication of devices on its host layer.
      SOLUTION: A host 202 identifies an address of a communicating party and when the address of the communicating party contains a prescribed value (a prescribed production vender code, for example), an original protocol (authenticating processing with the communicating party, for example) is started. When a host 203 within a local link sends router solicitation in order to acquire information required for determining a site local address and a global address from a router, the host 203 receives this and decides whether an address of the host 202 contains the prescribed value or not.
      COPYRIGHT: (C)2004,JPO
    • 要解决的问题:为了解决在特定设备之间进行高速进行原始处理(例如,相同设备之间的通信或特定组合的设备之间的通信)的方便的问题,但是存在 因为IPv6是网络层的规则,所以通信的开销,优选地实现诸如其主机层上的设备的相互认证的功能。 解决方案:主机202识别通信方的地址,并且当通信方的地址包含规定值(例如规定的生产代理商代码)时,原始协议(与通信方的认证处理,用于 示例)启动。 当本地链路内的主机203发送路由器请求以便从路由器获取确定站点本地地址和全局地址所需的信息时,主机203接收到该请求,并且确定主机202的地址是否包含规定值,或者 不。 版权所有(C)2004,JPO