Unlock instant, AI-driven research and patent intelligence for your innovation.

Security module and information processing device

A security module and technology at the device, applied in the direction of electronic digital data processing, image communication, user identity/authority verification, etc., can solve the problem of disabling the scanning function, etc., and achieve the effect that it is not easy to be disabled by crackers

Active Publication Date: 2015-09-09
FUJITSU LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Here, the USB-compatible software on the PC is in danger of being tampered with illegally, disabling the scanning function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security module and information processing device
  • Security module and information processing device
  • Security module and information processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Preferred embodiments of the present invention will be described with reference to the accompanying drawings. The information processing apparatus is, for example, a computer (such as a personal computer), a stationary video game console, a television, a hard disk recorder, a mobile terminal (mobile phone, smart phone, portable video game machine, electronic dictionary, tablet terminal) and the like.

[0029] figure 1 It is a block diagram of the hardware configuration of the information processing device. Information processing device 100 comprises processor 101, north bridge 102, memory (RAM103, ROM104), display 105, south bridge 106, hard disk drive (HDD) 107, communication interface (I / F) 108, input device 109 and safety module 110, They are respectively connected through the bus.

[0030] The processor 101 controls the information processing device 100 and executes calculation processing. The Northbridge 102 is connected to and forms a bridge between the process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A secure module (110) includes a generating unit (GP) that executes generation processing of generating a scanning program (SP) that causes scan processing, which generates unique code (R1, R2) for a program under test (TP), to be executed at a connected device (101) and further executes update processing of randomly updating contents of the scanning program (SP); a storage device (204, 206) storing therein the unique code (R1) for the program under test (TP); and an authenticating unit (AP) that if the scanning program (SP) is executed by the connected device (101) and executed with respect to the program under test (TP) stored at a designated storage area in the connected device (101), authenticates validity of the program under test (TP) stored at the designated storage area, based on the unique code (R1) stored in the storage device (204, 206) and execution results (R2) of the scanning program (SP) executed at the connected device (101).

Description

technical field [0001] Embodiments discussed herein relate to security modules and information processing devices that protect information. Background technique [0002] As broadband Internet and digital broadcasting become more common, copyright protection technologies that ensure the security of delivered content, mainly digital audiovisual (AV) content, have emerged. In particular, personal computers (PCs) with an open architecture make security difficult because programs (software) stored in memory and that process AV content exist in an environment where anyone can view, analyze, and rewrite the programs. [0003] In other words, when AV content exists on the Internet or on a broadcast network, although the AV content is encrypted and thus secure, when the AV content is received and processed by a PC, the AV content must be decrypted and the decrypted AV content may be Illegal copy. In the case where the programs are on the memory of the PC, anyone can view and rewrit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/10G06F21/14G06F21/54H04N21/414H04N21/418H04N21/443H04N21/4627H04N21/81G06F21/12
CPCH04N21/4181H04N21/443G06F21/10G06F21/14H04N21/8173G06F21/54G06F2221/0797H04N21/4143G06F2221/2153H04N21/4627G06F21/109H04L9/32
Inventor 小桧山清之高楠昌和川上达郎吉武敏幸
Owner FUJITSU LTD