ENCRYPTION KEY RECOVERY METHOD, INFORMATION PROCESSOR, AND ENCRYPTION KEY RESTORATION PROGRAM

PROBLEM TO BE SOLVED: To provide an encryption key recovery method, an information processor, and an encryption key restoration program capable of restoring an encryption key stored in a secure memory even if usage of the key becomes impossible. SOLUTION: The encryption key recovery method is for th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: RI TAKESHI
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator RI TAKESHI
description PROBLEM TO BE SOLVED: To provide an encryption key recovery method, an information processor, and an encryption key restoration program capable of restoring an encryption key stored in a secure memory even if usage of the key becomes impossible. SOLUTION: The encryption key recovery method is for the information processor 1 which stores an encryption key in a secure memory 11 and stores data encrypted by the encryption key in an internal storage 13. A key management module 21 contained in the information processor 1 has an encryption key check step for checking the authenticity of the encryption key, a restoration key check step for acquiring a key 73 for restoration of the encryption key from outside of the information processor 1 to check the authenticity of the key 73 when there is no authenticity in the encryption key, an encryption key restoration step for storing the key 73 in a secure memory 11 when there is the authenticity in the key 73, and a normal activation instruction step for activating the information processor 1 at a normal mode by restarting. According to the arrangement, the problem to be solved can be solved. COPYRIGHT: (C)2009,JPO&INPIT
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2008236089A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2008236089A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2008236089A3</originalsourceid><addsrcrecordid>eNrjZIh19XMOigwI8fT3U_B2jVQIcnX2D3MNilTwdQ3x8HfRUfD0c_MP8nUEKwgI8nd2DQ72D9JRcPRzUcDQGhziHwRX6R7k6MvDwJqWmFOcyguluRmU3FxDnD10Uwvy41OLCxKTU_NSS-K9AowMDCyMjM0MLCwdjYlSBAClmjO_</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ENCRYPTION KEY RECOVERY METHOD, INFORMATION PROCESSOR, AND ENCRYPTION KEY RESTORATION PROGRAM</title><source>esp@cenet</source><creator>RI TAKESHI</creator><creatorcontrib>RI TAKESHI</creatorcontrib><description>PROBLEM TO BE SOLVED: To provide an encryption key recovery method, an information processor, and an encryption key restoration program capable of restoring an encryption key stored in a secure memory even if usage of the key becomes impossible. SOLUTION: The encryption key recovery method is for the information processor 1 which stores an encryption key in a secure memory 11 and stores data encrypted by the encryption key in an internal storage 13. A key management module 21 contained in the information processor 1 has an encryption key check step for checking the authenticity of the encryption key, a restoration key check step for acquiring a key 73 for restoration of the encryption key from outside of the information processor 1 to check the authenticity of the key 73 when there is no authenticity in the encryption key, an encryption key restoration step for storing the key 73 in a secure memory 11 when there is the authenticity in the key 73, and a normal activation instruction step for activating the information processor 1 at a normal mode by restarting. According to the arrangement, the problem to be solved can be solved. COPYRIGHT: (C)2009,JPO&amp;INPIT</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2008</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20081002&amp;DB=EPODOC&amp;CC=JP&amp;NR=2008236089A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20081002&amp;DB=EPODOC&amp;CC=JP&amp;NR=2008236089A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>RI TAKESHI</creatorcontrib><title>ENCRYPTION KEY RECOVERY METHOD, INFORMATION PROCESSOR, AND ENCRYPTION KEY RESTORATION PROGRAM</title><description>PROBLEM TO BE SOLVED: To provide an encryption key recovery method, an information processor, and an encryption key restoration program capable of restoring an encryption key stored in a secure memory even if usage of the key becomes impossible. SOLUTION: The encryption key recovery method is for the information processor 1 which stores an encryption key in a secure memory 11 and stores data encrypted by the encryption key in an internal storage 13. A key management module 21 contained in the information processor 1 has an encryption key check step for checking the authenticity of the encryption key, a restoration key check step for acquiring a key 73 for restoration of the encryption key from outside of the information processor 1 to check the authenticity of the key 73 when there is no authenticity in the encryption key, an encryption key restoration step for storing the key 73 in a secure memory 11 when there is the authenticity in the key 73, and a normal activation instruction step for activating the information processor 1 at a normal mode by restarting. According to the arrangement, the problem to be solved can be solved. COPYRIGHT: (C)2009,JPO&amp;INPIT</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2008</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZIh19XMOigwI8fT3U_B2jVQIcnX2D3MNilTwdQ3x8HfRUfD0c_MP8nUEKwgI8nd2DQ72D9JRcPRzUcDQGhziHwRX6R7k6MvDwJqWmFOcyguluRmU3FxDnD10Uwvy41OLCxKTU_NSS-K9AowMDCyMjM0MLCwdjYlSBAClmjO_</recordid><startdate>20081002</startdate><enddate>20081002</enddate><creator>RI TAKESHI</creator><scope>EVB</scope></search><sort><creationdate>20081002</creationdate><title>ENCRYPTION KEY RECOVERY METHOD, INFORMATION PROCESSOR, AND ENCRYPTION KEY RESTORATION PROGRAM</title><author>RI TAKESHI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2008236089A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2008</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>RI TAKESHI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>RI TAKESHI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ENCRYPTION KEY RECOVERY METHOD, INFORMATION PROCESSOR, AND ENCRYPTION KEY RESTORATION PROGRAM</title><date>2008-10-02</date><risdate>2008</risdate><abstract>PROBLEM TO BE SOLVED: To provide an encryption key recovery method, an information processor, and an encryption key restoration program capable of restoring an encryption key stored in a secure memory even if usage of the key becomes impossible. SOLUTION: The encryption key recovery method is for the information processor 1 which stores an encryption key in a secure memory 11 and stores data encrypted by the encryption key in an internal storage 13. A key management module 21 contained in the information processor 1 has an encryption key check step for checking the authenticity of the encryption key, a restoration key check step for acquiring a key 73 for restoration of the encryption key from outside of the information processor 1 to check the authenticity of the key 73 when there is no authenticity in the encryption key, an encryption key restoration step for storing the key 73 in a secure memory 11 when there is the authenticity in the key 73, and a normal activation instruction step for activating the information processor 1 at a normal mode by restarting. According to the arrangement, the problem to be solved can be solved. COPYRIGHT: (C)2009,JPO&amp;INPIT</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_JP2008236089A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title ENCRYPTION KEY RECOVERY METHOD, INFORMATION PROCESSOR, AND ENCRYPTION KEY RESTORATION PROGRAM
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T20%3A06%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=RI%20TAKESHI&rft.date=2008-10-02&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2008236089A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true