Patent application number | Description | Published |
20100175061 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM - To aim provide a software update apparatus including an install module group ( | 07-08-2010 |
20100180343 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, ALTERATION VERIFICATION METHOD AND ALTERATION VERIFICATION PROGRAM - To aim provide a software update apparatus including an install module group ( | 07-15-2010 |
20100185859 | SOFTWARE UPDATE SYSTEM, MANAGEMENT APPARATUS, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - An update server | 07-22-2010 |
20110225653 | MONITORING SYSTEM, PROGRAM-EXECUTING DEVICE, MONITORING PROGRAM, RECORDING MEDIUM AND INTEGRATED CIRCUIT - To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules | 09-15-2011 |
20110239297 | TAMPERING MONITORING SYSTEM, CONTROL DEVICE, AND TAMPERING CONTROL METHOD - A management device detects whether any normal monitoring module that has not been tampered with exists by referring to monitoring results received from an information security device and selects, when existence is detected, one of the monitoring modules and assumes that the selected monitoring module has been tampered with. The monitoring device then successively applies a procedure to monitoring modules other than the selected monitoring module by referring to the monitoring results, starting from the selected monitoring module, the procedure being to assume that any monitoring module determining that a monitoring module assumed to have been tampered with is normal has also been tampered with. As a result of the procedure, when all of the monitoring modules are assumed to have been tampered with the management device determines the selected monitoring module to be a normal monitoring module that has not been tampered with. | 09-29-2011 |
20110246783 | INFORMATION PROCESSING DEVICE, MANAGEMENT DEVICE, ILLEGAL MODULE DETECTION SYSTEM, ILLEGAL MODULE DETECTION METHOD, RECORDING MEDIUM ON WHICH ILLEGAL MODULE DETECTION PROGRAM IS RECORDED, MANAGEMENT METHOD, RECORDING MEDIUM AND INTEGRATED CIRCUIT ON WHICH MANAGEMENT METHOD IS RECORDED - The present invention aims to perform tamper detection on a protection control module without having detection modules come to know the key data and functions thereof. The detection modules of the present invention perform tamper detection by verifying whether or not the correspondence between the input and output data of the application decryption process performed by the protection control module is correct. Furthermore, the present invention offers improved security against leaks of the application output data by the detection modules by having a plurality of detection modules verify different data blocks. | 10-06-2011 |
20110265180 | TAMPERING MONITORING SYSTEM, MANAGEMENT APPARATUS, AND MANAGEMENT METHOD - An information security apparatus ( | 10-27-2011 |
20110271344 | ILLEGAL MODULE IDENTIFYING DEVICE, INFORMATION PROCESSING DEVICE, ILLEGAL MODULE IDENTIFYING METHOD, ILLEGAL MODULE IDENTIFYING PROGRAM, INTEGRATED CIRCUIT, ILLEGAL MODULE DISABLING SYSTEM, AND ILLEGAL MODULE DISABLING METHOD - A malicious-module identification device ( | 11-03-2011 |
20120084557 | TAMPERING MONITORING SYSTEM, CONTROL DEVICE, AND TAMPERING CONTROL METHOD - Provided is a tampering monitoring system that can identify a monitoring module that has been tampered with among a plurality of monitoring modules. A management apparatus is provided with an acquisition unit that acquires a new monitoring module that has not been tampered with, a generation unit that generates a decoy monitoring module by modifying the acquired monitoring module, a transmission unit that transmits the decoy monitoring module to the information security device and causes the information security device to install the decoy monitoring module therein, a reception unit that receives from the information security device, after the decoy monitoring module has been installed, monitoring results generated by the monitoring modules monitoring other monitoring modules, and a determination unit that identifies, by referring to the received monitoring results, a monitoring module that determines the decoy monitoring module to be valid and determines the identified monitoring module to be invalid. | 04-05-2012 |
20120098518 | DETECTION APPARATUS AND DETECTION SYSTEM - A detection apparatus ( | 04-26-2012 |
20120246490 | TAMPERING MONITORING SYSTEM, PROTECTION CONTROL MODULE, AND DETECTION MODULE - Tampering monitoring system | 09-27-2012 |
20130039491 | TAMPERING MONITORING SYSTEM, MANAGEMENT DEVICE, PROTECTION CONTROL MODULE, AND DETECTION MODULE - A management device | 02-14-2013 |
20130103355 | BATTERY HISTORY INFORMATION MANAGEMENT DEVICE, BATTERY HISTORY INFORMATION MANAGEMENT METHOD, BATTERY HISTORY INFORMATION MANAGEMENT SYSTEM, AND POWER STORAGE DEVICE - A battery history information management device for managing history information of a secondary battery includes: a connection determination unit which determines whether a charge/discharge device connected to the secondary battery is (i) a first charge/discharge device connected via a communication network to a server which manages the history information or (ii) a second charge/discharge device not connected to the server; a battery history recording unit which records, when it is determined that the charge/discharge device is the second charge/discharge device, charge/discharge history for second charge/discharge device into battery history data; and a history upload control unit which transmits, when it is determined that the charge/discharge device is the first charge/discharge device, the battery history data to the server via the first charge/discharge device. | 04-25-2013 |
20130198361 | CONTENT DISTRIBUTION SYSTEM, CONTENT MANAGEMENT SERVER, CONTENT-USING DEVICE, AND CONTROL METHOD - A content management server comprises: a first connection detection unit that detects whether or not the content management server is connected with the content-using device; a content management unit that manages the content according to a result of the detection by the first connection detection unit and holds information on how the content-using device controls the use of the content. A content-using device comprises: a second connection detection unit that detects whether or not the content-using device is connected with the content management server; a second selection unit that specifies a method for controlling the use of the content according to a result of the detection by the second connection detection unit; and a content control unit that controls the use of the content according to the method specified by the second selection unit. | 08-01-2013 |
20140059350 | UNAUTHORIZED CONNECTION DETECTING DEVICE, UNAUTHORIZED CONNECTION DETECTING SYSTEM, AND UNAUTHORIZED CONNECTION DETECTING METHOD - An unauthorized connection detecting device, which detects whether or not a power storage device is an unauthorized power storage device, includes: a communications unit receiving first charge/discharge information in which first identification information and first connection information are associated each other, the first identification information identifying an encryption key of the power storage device used for mutual authentication between a charge/discharge device and the power storage device, and the first connection information being on the power storage device and obtained when the power storage device is connected to the charge/discharge device; and an unauthorization detecting unit detecting whether or not the power storage device is the unauthorized power storage device, by determining, using the first identification information and the first connection information, whether or not two or more power storage devices associated with a single first identification information item are present. | 02-27-2014 |
20140059352 | KEY MANAGEMENT SYSTEM, KEY MANAGEMENT METHOD, AND COMMUNICATION DEVICE - In a key management system, a RFID tag decrypts a first key encrypted by a master key and stores the decrypted first key to a service key storage region, then decrypts a second key encrypted by the first key in a third party server, then, encrypts the decrypted second key by the master key and transmits the second key encrypted by the master key to an application of a mobile information terminal, and then decrypts the encrypted second key returned from the application and stores the decrypted second key to the service key storage region. | 02-27-2014 |
20140059679 | SOFTWARE UPDATING APPARATUS, SOFTWARE UPDATING SYSTEM, INVALIDATION METHOD, AND INVALIDATION PROGRAM - To aim provide a software update apparatus including an install module group composed of a plurality of install modules. Each of the install modules has a function of receiving, from an external server, a replacement protection control module to be used for updating a protection control module having a function of verifying whether a predetermined application has been tampered with. Each of the install modules simultaneously running is verified by at least another one of the install modules simultaneously running, as to whether the install module has a possibility of performing malicious operations. If any of the install modules is verified as having the possibility of performing the malicious operations, any another one of the install modules that is verified as not having the possibility revokes the any install module verified as having the possibility. | 02-27-2014 |
20140082716 | ACCESS CONTROL METHOD, ACCESS CONTROL SYSTEM, COMMUNICATION TERMINAL, AND SERVER - An access control method including: receiving a log information item indicating use history of electrical equipment that is used together with an intended product; receiving product information including information for identifying the intended product; storing the log information item received in the receiving of a log information item and the product information received in the receiving of product information, in association with each other; and controlling whether or not to allow access to the log information item based on the product information associated with the log information item when access to the log information item is attempted. | 03-20-2014 |
20140090087 | METHOD OF MANAGING MAP INFORMATION, NAVIGATION SYSTEM, INFORMATION TERMINAL, AND NAVIGATION DEVICE - A method of managing map information including: attaching a retrieval identifier, according to input information, to map information which is obtained by retrieval based on the input information, the retrieval identifier indicating whether the map information is personal data or public data; storing the map information as the personal data into a storage device, the map information being indicated to be the personal data by the retrieval identifier attached in the attaching, and storing the map information as the public data into the storage device, the map information being indicated to be the public data by the retrieval identifier; and executing a navigation process using at least one of the personal data and the public data which are stored in the storage device. | 03-27-2014 |
20140129829 | UNAUTHORIZED CONNECTION DETECTING DEVICE, UNAUTHORIZED CONNECTION DETECTING SYSTEM, AND UNAUTHORIZED CONNECTION DETECTING METHOD - An unauthorized connection detecting device which detects an unauthorized charge/discharge device includes: a time information obtaining unit obtaining, as time information, information from a first charge/discharge device, the information indicating at least one of an issuing date of a first certificate which is a public key certificate and an issuing date of a certificate revocation list held by the first charge/discharge device; an expiration date obtaining unit obtaining expiration date information from a second charge/discharge device, the expiration date information indicating an expiration date of a second certificate which is a public key certificate held by the second charge/discharge device; and an unauthorization detecting unit detecting whether or not the second charge/discharge device is the unauthorized charge/discharge device by comparing the time information with the expiration date information. | 05-08-2014 |
20140250183 | HOME APPLIANCE INFORMATION MANAGEMENT APPARATUS, HOME APPLIANCE INFORMATION SHARING METHOD, AND HOME APPLIANCE INFORMATION SHARING SYSTEM - A management apparatus which collects, from a home appliance, home appliance information which is information related to the home appliance and provides a user with to-be-provided information which is information obtained from the collected home appliance information, includes: a managing unit which manages the home appliance information; and a home appliance information holding unit which holds, in association with each other, (i) the home appliance information and (ii) share information which is for sharing the home appliance information and is associated with the user. The managing unit refers to data held by the home appliance information holding unit when a request for to-be-provided information is issued by the user, obtains the home appliance information held in association with share information identical to the share information associated with the user, and provides the user with to-be-provided information obtained from the obtained information. | 09-04-2014 |
20140277798 | DATA PROCESSING METHOD, TRANSMITTING APPARATUS, AND ANOMALY DETECTION SYSTEM - A data processing method for processing usage history data of at least one electrical device used by a user, including: obtaining first usage history data indicating a usage history of at least one electrical device used by the user; obtaining second usage history data indicating a fixed dummy usage history; generating third usage history data by combining the first usage history data and the second usage history data; and transmitting the third usage history data from a first apparatus to a second apparatus. | 09-18-2014 |
20140325592 | INFORMATION MANAGEMENT METHOD AND INFORMATION MANAGEMENT SYSTEM - An information management method includes: receiving, from a manufacturer server via a network, device history information indicating a history of an operation of a device used by a first user and first anonymized user information generated by anonymizing, according to a predetermined rule, first user information including attribute information which allows identification of the first user; receiving, from a service provider server different from the manufacturer server via the network, service history information indicating a history of service used by a second user and second anonymized user information generated by anonymizing, according to the predetermined rule, second user information including attribute information which allows identification of the second user; and associating the device history information and the service history information and managing them as composite information, when the first anonymized user information and the second anonymized user information are determined to be identical or similar. | 10-30-2014 |
20140344054 | INFORMATION PROVIDING METHOD AND INFORMATION PROVIDING DEVICE - A first user among a plurality of users is associated with a second user having an evaluation tendency similar to evaluation data of the first user for management. Further, a third user is selected by a terminal device of the first user as a user having preference information that suits preference of the first user. The third user is associated with the first user and the second user for management. This configuration makes it possible to select not only a user automatically selected by a system but also another user whom a targeted user is interested in as a similar user, allowing provision of information that better suits hobby and preference of the targeted user. | 11-20-2014 |
20140365345 | INFORMATION-PROVIDING METHOD, AND INFORMATION-PROVIDING SYSTEM - An information-providing method provides a notification relating to an item owned by a user in accordance with change in condition of the item. The information-providing method is implemented on a computer system that stores therein notifications that are each linked to one of a plurality of levels expressing possible conditions of the item. In the information-providing method, condition information is acquired which indicates change in condition of the item resulting from aging or use. Judgment is performed as to whether a current time is a provision time at which a notification is to be provided to the user. Upon judging affirmatively, a level matching condition of the item at the provision time is selected from among the levels, based on the condition information, and a notification linked to the selected level is determined to be the notification that is provided. | 12-11-2014 |
20150046580 | INFORMATION NOTIFICATION METHOD, INFORMATION NOTIFICATION SYSTEM, AND SERVER DEVICE - An information notification method for providing information from a server device to a plurality of devices connected to a network, including: reading notification information stored in association with information indicating a particular action of a user; acquiring operation histories of the plurality of devices; estimating, based on operation histories of one or more devices owned by the user among the plurality of devices, a no-operation period during which the user is unlikely to operate the one or more devices; determining, based on current operation state of the one or more devices, whether the particular action has been performed outside the no-operation period; and transmitting, when outcome of the determining is affirmative, the notification information associated with the particular action to a destination device among the one or more devices owned by the user. The destination device provides the user with the notification information. | 02-12-2015 |
20150074237 | METHOD FOR CONTROLLING INFORMATION TERMINAL APPARATUS - A control method causes a computer of an information terminal apparatus to perform a process including: receiving, from a first server, first display data causing a user of the information terminal apparatus to confirm the purpose of use of recipe information and asking for the permission to collect the recipe information; accessing a second server and receiving selected recipe information and control data for a cooker for preparation based on the selected recipe information; and when it is selected to permit collecting the recipe information for a purpose of use related to health care, and it is determined that selected recipe information corresponding to the set control data has an identifier indicating that the recipe is for food related to a specific constitution, disorder, disease, or allergy, transmitting the selected recipe information with the identifier, in association with a user ID of the information terminal apparatus, to the first server. | 03-12-2015 |