Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret information setting device and secret information setting method

A technology for secret information and setting device, applied in key distribution, can solve the problem of no consideration, and achieve the effect of maintaining security and preventing leakage of secret information

Inactive Publication Date: 2007-01-10
PANASONIC CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the above-mentioned examples of the prior art, only attention is paid to simply setting confidential information for the machine, and the point of limiting the setting range of each machine is not considered at all.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret information setting device and secret information setting method
  • Secret information setting device and secret information setting method
  • Secret information setting device and secret information setting method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 Embodiment approach

[0102] Figure 11 It is a diagram showing a configuration example of a communication system to which the secret information setting method according to the first embodiment of the present invention is applied. exist Figure 11 In the above, it is assumed that there are the following mobile dedicated terminals, etc., equipped with a home gateway connected to the home network 303 - the network home appliance terminal 301; equipped with a network camera connected to the home network 303 - the network home appliance terminal 302; The secret information setting device 100 is an LSI programmed in the function of generating and setting secret information.

[0103] in addition, figure 1 It is a functional block diagram showing the configuration of the confidential information setting device 100 employed in the first embodiment of the present invention.

[0104] exist figure 1 Among them, the confidential information setting device 100 has: an interface 111 for sending and receiv...

no. 2 Embodiment approach

[0135] Next, a second embodiment of the present invention will be described.

[0136] In the first embodiment described above, a configuration is adopted in which confidential information is automatically generated inside the confidential information setting device 100 when the generation command button 103 is pressed. In contrast, in the second embodiment, an information input unit 113 for inputting confidential information or elements of the confidential information is further provided, receives external information input from the outside, and generates confidential information based on the external information.

[0137] image 3 It is a functional block diagram showing the configuration of the confidential information setting device 100 according to the second embodiment of the present invention. image 3 shown in the functional block diagram, with figure 1 The functional block diagram shown is different in that an information input unit 113 is provided. other constitue...

no. 3 Embodiment approach

[0151] Next, a third embodiment of the present invention will be described.

[0152] As described above, in the first embodiment, after the predetermined upper limit time expires, the confidential information is deleted. On the other hand, in the third embodiment, the upper limit time can be extended.

[0153] Figure 5 It is a functional block diagram showing the configuration of the confidential information setting device 100 according to the third embodiment of the present invention. Figure 5 shown in the functional block diagram, with figure 1 The illustrated functional block diagram differs in that an extension command button 114 is provided. other constituent elements, and figure 1 same, so yes and figure 1 The same constituent elements are given the same symbols, and will not be repeated here.

[0154] exist Figure 5 Among them, the confidential information setting device 100 has: an interface 111, a confidential information generating unit 101, a storage un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A secret information setting device includes a generation instruction receiving unit receiving a secret information generation instruction from a user; a secret information generation unit generating the secret information in response to the secret information generation instruction received with the generation instruction receiving unit; a secret information storage unit storing the secret information generated by the secret information generation unit; a secret information transfer unit transferring the secret information stored in the secret information storage unit to the plurality of appliances; and a secret information deleting unit deleting the secret information stored in the secret information storage unit when a predetermined condition is satisfied. Thus, the present invention provides a device capable of setting secret information easily and safely for appliances connected with the network without complicating the system structure, also provides service ensuring the network appliance only in a limited area able to communicate.

Description

technical field [0001] The present invention relates to a security information setting device and a security information setting method for setting security information for a system in which common security information is required when a plurality of equipment communicates via a network. Background technique [0002] In recent years, the Internet-centered IP (Internet Protocol) network has developed rapidly. In addition to personal computers, various home appliances such as AV equipment, surveillance cameras, and IP phones tend to be connected to the IP network. . In addition, opportunities to establish an IP network in the home and provide communication services between home appliances are also increasing. However, in general, when communicating between home appliances through the network as a medium, it is necessary to take measures against the danger of counterfeiting and eavesdropping. [0003] As a security technology for protecting information from these dangers, met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 中野育惠生驹达郎横田博史辻敦宏山内实
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products