SECURITY AND AUTHENTICATION OF INFORMATION PROCESSING APPARATUS

Security of an information processing apparatus (1) is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus (1). The information processing apparatus (1) transmits the collected environment information to a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: KOTANI, Seigo
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator KOTANI, Seigo
description Security of an information processing apparatus (1) is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus (1). The information processing apparatus (1) transmits the collected environment information to a first authentication apparatus (2). An electronic certificate issued by a second authentication apparatus (3) and information encrypted with a secret key issued by the second authentication apparatus (3) are transmitted to the first authentication apparatus (2). The first authentication apparatus (2) acquires the public key of the second authentication apparatus (3) and the public key of the information processing apparatus (1) so as to decrypt the encrypted information, and judges whether or not the decrypted information is proper. The first authentication apparatus (2) refers to an environment information database and the transmitted information, and judges whether or not the transmitted environment information is proper. When all the authentications by the biological information authentication, environment information authentication and electronic certificate authentication are successful, the information processing apparatus (1) is judged to be safe.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3336652A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3336652A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3336652A13</originalsourceid><addsrcrecordid>eNrjZLAPdnUODfIMiVRw9HNRcAwN8XD1C_F0dgzx9PdT8HdT8PRz8w_yhXADgvydXYODPf3cFRwDAhyDHENCg3kYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSbxrgLGxsZmZqZGjoTERSgBmyCp6</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SECURITY AND AUTHENTICATION OF INFORMATION PROCESSING APPARATUS</title><source>esp@cenet</source><creator>KOTANI, Seigo</creator><creatorcontrib>KOTANI, Seigo</creatorcontrib><description>Security of an information processing apparatus (1) is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus (1). The information processing apparatus (1) transmits the collected environment information to a first authentication apparatus (2). An electronic certificate issued by a second authentication apparatus (3) and information encrypted with a secret key issued by the second authentication apparatus (3) are transmitted to the first authentication apparatus (2). The first authentication apparatus (2) acquires the public key of the second authentication apparatus (3) and the public key of the information processing apparatus (1) so as to decrypt the encrypted information, and judges whether or not the decrypted information is proper. The first authentication apparatus (2) refers to an environment information database and the transmitted information, and judges whether or not the transmitted environment information is proper. When all the authentications by the biological information authentication, environment information authentication and electronic certificate authentication are successful, the information processing apparatus (1) is judged to be safe.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180620&amp;DB=EPODOC&amp;CC=EP&amp;NR=3336652A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76293</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180620&amp;DB=EPODOC&amp;CC=EP&amp;NR=3336652A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>KOTANI, Seigo</creatorcontrib><title>SECURITY AND AUTHENTICATION OF INFORMATION PROCESSING APPARATUS</title><description>Security of an information processing apparatus (1) is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus (1). The information processing apparatus (1) transmits the collected environment information to a first authentication apparatus (2). An electronic certificate issued by a second authentication apparatus (3) and information encrypted with a secret key issued by the second authentication apparatus (3) are transmitted to the first authentication apparatus (2). The first authentication apparatus (2) acquires the public key of the second authentication apparatus (3) and the public key of the information processing apparatus (1) so as to decrypt the encrypted information, and judges whether or not the decrypted information is proper. The first authentication apparatus (2) refers to an environment information database and the transmitted information, and judges whether or not the transmitted environment information is proper. When all the authentications by the biological information authentication, environment information authentication and electronic certificate authentication are successful, the information processing apparatus (1) is judged to be safe.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLAPdnUODfIMiVRw9HNRcAwN8XD1C_F0dgzx9PdT8HdT8PRz8w_yhXADgvydXYODPf3cFRwDAhyDHENCg3kYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSbxrgLGxsZmZqZGjoTERSgBmyCp6</recordid><startdate>20180620</startdate><enddate>20180620</enddate><creator>KOTANI, Seigo</creator><scope>EVB</scope></search><sort><creationdate>20180620</creationdate><title>SECURITY AND AUTHENTICATION OF INFORMATION PROCESSING APPARATUS</title><author>KOTANI, Seigo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3336652A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2018</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>KOTANI, Seigo</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>KOTANI, Seigo</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SECURITY AND AUTHENTICATION OF INFORMATION PROCESSING APPARATUS</title><date>2018-06-20</date><risdate>2018</risdate><abstract>Security of an information processing apparatus (1) is ensured by performing biological information authentication and collecting the environment information about the information processing apparatus (1). The information processing apparatus (1) transmits the collected environment information to a first authentication apparatus (2). An electronic certificate issued by a second authentication apparatus (3) and information encrypted with a secret key issued by the second authentication apparatus (3) are transmitted to the first authentication apparatus (2). The first authentication apparatus (2) acquires the public key of the second authentication apparatus (3) and the public key of the information processing apparatus (1) so as to decrypt the encrypted information, and judges whether or not the decrypted information is proper. The first authentication apparatus (2) refers to an environment information database and the transmitted information, and judges whether or not the transmitted environment information is proper. When all the authentications by the biological information authentication, environment information authentication and electronic certificate authentication are successful, the information processing apparatus (1) is judged to be safe.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3336652A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title SECURITY AND AUTHENTICATION OF INFORMATION PROCESSING APPARATUS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T08%3A58%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=KOTANI,%20Seigo&rft.date=2018-06-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3336652A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true