Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information processing apparatus, control method for the same, program and storage medium

a technology of information processing and control method, applied in the field of setting private information, can solve the problems of inability to maintain security in preventing falsification, inability to modify, and inability to really be modified

Inactive Publication Date: 2011-05-19
CANON KK
View PDF10 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention aims to provide a way to set private information in an apparatus with higher security than conventional methods. The apparatus includes a storage unit for key information, an input unit for inputting calculation target information, a calculating unit for performing a calculation based on the key information, a detecting unit for identifying a predetermined event, and a control unit for generating the private information by performing the calculation and making the key information unusable if an event is detected. This technique ensures that private information is only accessible to authorized users and prevents unauthorized access.

Problems solved by technology

However, the disadvantages of digitization have also been pointed out.
Although modifying images is not impossible even with silver halide photography, modification is not really viable given that either the costs of performing modification greatly outweigh the benefits obtained by modification, or the results of modifying images are unnatural, thereby providing grounds for adopting silver halide images as evidence.
As mentioned above, key data is used in this configuration when generating verification data, although security in terms of preventing falsification cannot be maintained if this key data is leaked.
However, with these methods, private information is compromised if key information in the apparatus is leaked as a result of unauthorized analysis or the like.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing apparatus, control method for the same, program and storage medium
  • Information processing apparatus, control method for the same, program and storage medium
  • Information processing apparatus, control method for the same, program and storage medium

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

Apparatus Configuration

[0045]FIG. 1 is a block diagram showing an exemplary system configuration that includes an information processing apparatus according to the present embodiment. As shown in FIG. 1, in the present embodiment there exists an image generating apparatus 11 as an information processing apparatus according to the present embodiment, a private information generating mechanism 12, and a private information setting mechanism 13.

[0046](Image Generating Apparatus 11)

[0047]The image generating apparatus 11 basically has the functional configuration of an image processing unit 14, a verification data generating unit 15, a ROM 16, and a decrypting & private information deleting unit 17.

[0048]The image processing unit 14 has a function of generating / shooting image data, a function of generating auxiliary parameters, and a function of generating image files with verification data. Incidentally, in the case where the image generating apparatus 11 is a camera, auxiliary paramet...

second embodiment

[0130]In the first embodiment, the confirmation of the validity of a password or biological information input externally was shown as an example of an action that triggers the execution of the decrypting & private information deleting unit 17 in the camera 11. However, it is conceivable that usability is impaired because of the operations for inputting passwords or the like differing from normal operations. Note that verification data cannot be created as long as decryption and private key deletion has not been executed, as mentioned above. Thus, in the configuration according to the present embodiment, an operation that is definitely performed on the camera 11 is made the trigger for executing decryption and private key deletion, given that it is sufficient if verification data can created before the user first takes a shot. This enables usability to be improved.

[0131]Since the configuration according to the present embodiment is largely similar to the configuration according to th...

third embodiment

[0140]Firstly, an outline of the processing of the configuration according to the first and second embodiments is summarized with reference to FIG. 12. FIG. 12 is a block diagram schematically showing an outline of the processing of the configuration according to the first and second embodiments.

[0141]As described above, the generating apparatus 12 generates the private information K by inputting the public information I and the private key P′ into the function E( ) and encrypts the generated K using the private key P to create the private information EK. Next, the generating apparatus 12 delivers EK to the setting apparatus 13 via a channel whose security is not guaranteed.

[0142]The setting apparatus 13, on receipt of the encrypted private information EK, sets EK in the camera 11.

[0143]Finally, the camera 11, when triggered by a prescribed action, performs controls to decrypt EK using the private key P and acquire the private information K, and to delete the private key P from memo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An information processing apparatus that generates private information used as one of an encryption key for encrypting data or a generation key for generating falsification detection information used in detecting falsification of data, comprises a storage unit adapted to prestore key information, an input unit adapted to input calculation target information, a calculating unit adapted to perform a calculation on targeted information based on the key information held in the storage unit, a detecting unit adapted to detect a predetermined event, and a control unit adapted, when triggered by detection of the event by the detecting unit, to perform controls to generate the private information by making the calculating unit perform the calculation with the input calculation target information as the targeted information, and to place the key information stored in the storage unit in an unusable state.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is continuation of application Ser. No. 11 / 621,785, filed Jan. 10, 2007, the entire disclosures of which is hereby incorporated by reference.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to a technique for setting private information in an apparatus.[0004]2. Description of the Related Art[0005]The use of digital cameras has rapidly become widespread in recent years. Images taken with a digital camera can be stored as electronic image data. This not only eliminates the hassle of developing and printing associated with conventional silver halide photography, but also allows for easy storage and retrieval of images without degradation over time, and for data to be sent to remote locations using communication lines. For this reason, digital cameras are used in many business fields.[0006]Take the accident insurance industry, for example, in which images of damaged vehicles are ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F12/14
CPCH04L9/0894H04L9/0861
Inventor NAKAMOTO, YASUHIROHAYASHI, JUNICHI
Owner CANON KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products