INFORMATION MANAGEMENT METHOD

PROBLEM TO BE SOLVED: To provide an information management method that makes data such as an information encryption key difficult to be taken out so as to protect the information to be kept secret. SOLUTION: This invention provides an information management method, in a system where secure managemen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: ITO SUSUMU, TADAUCHI MITSUHARU, ISHII TATSUE
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator ITO SUSUMU
TADAUCHI MITSUHARU
ISHII TATSUE
description PROBLEM TO BE SOLVED: To provide an information management method that makes data such as an information encryption key difficult to be taken out so as to protect the information to be kept secret. SOLUTION: This invention provides an information management method, in a system where secure management of information needing security is a requirement and the information is encrypted by using an encryption key, that inputs the encryption key and encryption processing to one information safe so as to execute processing for a job needing an authentication encryption key without the need for extracting the key information to the outside of the information safe even when the processing to need the authentication encryption key is implemented as a job and even the center or the like with the information safe installed therein cannot extract the key information in the information safe without permission.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2002368734A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2002368734A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2002368734A3</originalsourceid><addsrcrecordid>eNrjZJD19HPzD_J1DPH091PwdfRzdHf1dfULUfB1DfHwd-FhYE1LzClO5YXS3AxKbq4hzh66qQX58anFBYnJqXmpJfFeAUYGBkbGZhbmxiaOxkQpAgDfBSGi</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>INFORMATION MANAGEMENT METHOD</title><source>esp@cenet</source><creator>ITO SUSUMU ; TADAUCHI MITSUHARU ; ISHII TATSUE</creator><creatorcontrib>ITO SUSUMU ; TADAUCHI MITSUHARU ; ISHII TATSUE</creatorcontrib><description>PROBLEM TO BE SOLVED: To provide an information management method that makes data such as an information encryption key difficult to be taken out so as to protect the information to be kept secret. SOLUTION: This invention provides an information management method, in a system where secure management of information needing security is a requirement and the information is encrypted by using an encryption key, that inputs the encryption key and encryption processing to one information safe so as to execute processing for a job needing an authentication encryption key without the need for extracting the key information to the outside of the information safe even when the processing to need the authentication encryption key is implemented as a job and even the center or the like with the information safe installed therein cannot extract the key information in the information safe without permission.</description><edition>7</edition><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2002</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20021220&amp;DB=EPODOC&amp;CC=JP&amp;NR=2002368734A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25563,76318</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20021220&amp;DB=EPODOC&amp;CC=JP&amp;NR=2002368734A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>ITO SUSUMU</creatorcontrib><creatorcontrib>TADAUCHI MITSUHARU</creatorcontrib><creatorcontrib>ISHII TATSUE</creatorcontrib><title>INFORMATION MANAGEMENT METHOD</title><description>PROBLEM TO BE SOLVED: To provide an information management method that makes data such as an information encryption key difficult to be taken out so as to protect the information to be kept secret. SOLUTION: This invention provides an information management method, in a system where secure management of information needing security is a requirement and the information is encrypted by using an encryption key, that inputs the encryption key and encryption processing to one information safe so as to execute processing for a job needing an authentication encryption key without the need for extracting the key information to the outside of the information safe even when the processing to need the authentication encryption key is implemented as a job and even the center or the like with the information safe installed therein cannot extract the key information in the information safe without permission.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2002</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJD19HPzD_J1DPH091PwdfRzdHf1dfULUfB1DfHwd-FhYE1LzClO5YXS3AxKbq4hzh66qQX58anFBYnJqXmpJfFeAUYGBkbGZhbmxiaOxkQpAgDfBSGi</recordid><startdate>20021220</startdate><enddate>20021220</enddate><creator>ITO SUSUMU</creator><creator>TADAUCHI MITSUHARU</creator><creator>ISHII TATSUE</creator><scope>EVB</scope></search><sort><creationdate>20021220</creationdate><title>INFORMATION MANAGEMENT METHOD</title><author>ITO SUSUMU ; TADAUCHI MITSUHARU ; ISHII TATSUE</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2002368734A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2002</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>ITO SUSUMU</creatorcontrib><creatorcontrib>TADAUCHI MITSUHARU</creatorcontrib><creatorcontrib>ISHII TATSUE</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>ITO SUSUMU</au><au>TADAUCHI MITSUHARU</au><au>ISHII TATSUE</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>INFORMATION MANAGEMENT METHOD</title><date>2002-12-20</date><risdate>2002</risdate><abstract>PROBLEM TO BE SOLVED: To provide an information management method that makes data such as an information encryption key difficult to be taken out so as to protect the information to be kept secret. SOLUTION: This invention provides an information management method, in a system where secure management of information needing security is a requirement and the information is encrypted by using an encryption key, that inputs the encryption key and encryption processing to one information safe so as to execute processing for a job needing an authentication encryption key without the need for extracting the key information to the outside of the information safe even when the processing to need the authentication encryption key is implemented as a job and even the center or the like with the information safe installed therein cannot extract the key information in the information safe without permission.</abstract><edition>7</edition><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_JP2002368734A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title INFORMATION MANAGEMENT METHOD
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T13%3A55%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=ITO%20SUSUMU&rft.date=2002-12-20&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2002368734A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true