Patent classifications
G06F21/6218
INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD AND PROGRAM
An information processing system includes a linkage database in which a person is linked with a property; a person database in which the person is associated with a role of the person and one or more functions that can be used by the person; a property database in which the property is associated with one or more functions used in the property; a first permission management unit configured to manage one or more functions that can be used by the person in the property, by using the person database and the property database; and a second permission management unit configured to manage one or more properties whose information can be accessed by the person, by using the linkage database.
CONFIDENTIAL DATA PROVIDED TO A SECURE GUEST VIA METADATA
A secure guest of a computing environment requests confidential data. The confidential data is included in metadata of the secure guest, which is stored in a trusted execution environment of the computing environment. Based on the request, the confidential data is obtained from the metadata of the secure guest that is stored in the trusted execution environment.
RANDOM MEDIA ACCESS CONTROL ADDRESS WITH FAST RECONNECTION MECHANISM
The present invention provides a wireless communication method of an access point. The wireless communication method comprises the steps of: establishing a cache table comprising a plurality of reference MAC and corresponding PMKs and reference PMKIDs; receiving an association request from a station; reading a MAC address of the station and a PMKID from the association request; if the MAC address of the station and the PMKID do not match items of the cache table, performing a calculation on the PMKID to obtain an original PMKID; determining if the original PMKID matches any one of the reference PMKIDs within the cache table; and if the original PMKID matches one reference PMKID within the cache table, determining that the reference MAC recorded in the cache table and the MAC address belong to the same station.
CONTROL APPARATUS, SYSTEM, VEHICLE, AND CONTROL METHOD
A control apparatus includes a controller configured to select, depending on a type of vehicle data obtained by monitoring a state of a vehicle, a driver or an owner of the vehicle as an authorized party who grants permission to provide the vehicle data to a third party other than the driver and the owner, and notify the selected authorized party of information prompting for the permission.
SERVER, METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A server includes a controller that repeatedly acquires history data for a vehicle, and limits data items acquired as the history data in a case in which an age of the vehicle is greater than or equal to a first threshold.
DISTRIBUTED VEHICLE COMPUTING
A vehicle identifier and a nonfungible token (NFT) associated with the vehicle identifier are stored on an electronic ledger. The electronic ledger is a distributed electronic ledger shared between at least a computer and a remote computer. Upon transitioning a vehicle to an on state, the electronic ledger is queried to identify programming instructions associated with the NFT. Upon retrieving the identified programming instructions from the electronic ledger, the vehicle is actuated based on the retrieved programming instructions.
Data access control system and data access control method
A predetermined access control policy is generated with reference to a lineage table and a metadata table to be stored in a policy table, and an access control policy which should be applied or recommended to treated data is provided with reference to the policy table.
Scalable formal security verification of circuit designs
A security verification system performs security verification of a circuit design. The security verification system simplifies formal security verification of the circuit design by replacing circuit blocks of the circuit with black box circuit blocks. The security verification system instruments the circuit design so that black-boxing can be performed for security verification without changing the security decision over the data paths. The security verification system uses dependence information of the inputs and outputs of the black box to connect inputs of the circuit block with outputs of the circuit block. The black-box circuit block keeps the logic inside the cone of influence of clocks and resets. The system performs security verification of the circuit design by proving a non-interference property of the instrumented circuit design.
Unlocking a data storage device
Disclosed herein is a data storage device comprising a data path and an access controller. The data path comprises a data port configured to transmit data between a host computer and the data storage device. The data storage device is configured to register with the host computer as a block data storage device. A non-volatile storage medium stores encrypted user content data and a cryptography engine is connected between the data port and the storage medium and uses a cryptographic key to decrypt the encrypted user content data. The access controller generates a challenge for an authorized device; sends the challenge to the authorized device; receives a response to the challenge from the authorized device over the communication channel; calculates the cryptographic key based on the response; and provides the cryptographic key to the cryptography engine to decrypt the encrypted user content data stored on the storage medium.
Information processing apparatus and non-transitory computer readable medium storing information processing program
An information processing apparatus includes an access controller that performs control for enabling a content to be accessed on a second terminal in a case where an icon storing the content is presented and the content is opened in a first terminal.