Update System for Cipher System
First Claim
1. An information security device having a plurality of encryption schemes and handling information safely and reliably, characterized byselecting one of the plurality of encryption schemes as an application encryption scheme and installing a different encryption scheme from the plurality of encryption schemes based on the application encryption scheme.
2 Assignments
0 Petitions
Accused Products
Abstract
There is a demand for a device handling information with the use of encryption technology to safely and simply update the encryption schemes. The present invention offers an information security device having a plurality of encryption schemes and handling information safely and reliably, characterized by selecting one of the plurality of encryption schemes as an application encryption scheme and installing a different encryption scheme from the plurality of encryption schemes based on the application encryption scheme.
39 Citations
19 Claims
-
1. An information security device having a plurality of encryption schemes and handling information safely and reliably, characterized by
selecting one of the plurality of encryption schemes as an application encryption scheme and installing a different encryption scheme from the plurality of encryption schemes based on the application encryption scheme.
-
16. An information security system including an information security device that has a plurality of encryption schemes and handles information safely and reliably and a server device that supplies a different encryption scheme from the plurality of encryption schemes, wherein
the server device comprises a supply unit operable to supply the different encryption scheme, and the information security device comprises: -
an obtaining unit operable to obtain an installation direction to install the different encryption scheme; a selecting unit operable to select one of the plurality of encryption schemes as an application encryption scheme; an installation unit operable to install the different encryption scheme based on the application encryption scheme; and an encryption processing unit operable to process the information safely based on at least one encryption scheme from among the plurality of encryption schemes and the installed different encryption scheme.
-
-
17. An encryption scheme installation method used in an information security device that has a plurality of encryption schemes, handles information safely and reliably, and installs a different encryption scheme from the plurality of encryption schemes based on an application encryption scheme, which is one of the plurality of encryption schemes, the encryption scheme installation method comprising the steps of:
-
obtaining an installation direction to install the different encryption scheme; selecting the one of the plurality of encryption schemes as the application encryption scheme; and installing the different encryption scheme based on the application encryption scheme.
-
-
18. An encryption scheme installation program used in an information security device that has a plurality of encryption schemes, handles information safely and reliably, and installs a different encryption scheme from the plurality of encryption schemes based on an application encryption scheme, which is one of the plurality of encryption schemes, the encryption scheme installation program causing a computer to execute the steps of:
-
obtaining an installation direction to install the different encryption scheme; selecting the one of the plurality of encryption schemes as the application encryption scheme; and installing the different encryption scheme based on the application encryption scheme.
-
Specification