サイドチャネル攻撃に対する安全性評価の研究動向とEMVカード固有の留意点

Size: px
Start display at page:

Download "サイドチャネル攻撃に対する安全性評価の研究動向とEMVカード固有の留意点"

Transcription

1 EMV IC IC 20 IC EMV IC EMV IC EMV / /

2 1. IC IC IC ATM ATM IC IC IC IC IC IC IC SEPA 1 IC SEPA IC IC 2 1 IC Single Euro Payments Area EU 34 2SEPA IC IC IC IC 108 /

3 EMV European Payment Council: EPC [2011] 1 VISA IC VISA [2011] IC IC IC Kocher [1995] 2000 Eisenbarth et al. [2008] Oswald and Paar [2011] CMVP JCMVP ISO/IEC Common Criteria Liability Shift IC IC IC 4 VISA [2011] IBM µ ABYSS Anderson [2008] Chap.4 6CMVP Cryptographic Module Validation Program JCMVP Japan Cryptographic Module Validation Program URL CMVP JCMVP 109

4 CMVP JCMVP 1 7 Common Criteria 8 IC IC EMV 9 IC EMV EMV 2. IC Covert channel attack 8 Joint Interpretation Library [2013]. 9EMV Europay International MasterCard International Visa International 2011 EMV 4.3 EMVCo [2011a, b, c, d] /

5 EMV 2 1 IC IC Anderson [2008] Chap. 4 4 IC IC invasive attack non-invasive attack

6 3 IC IC Skorobogatov [2005] Bellcore [1996] Boneh, DeMillo, and Liption [1997] /

7 EMV IC Kocher [1995, 1996] PC 113

8 A 1 B a 14 RSA 7 b A 1 2 B /

9 EMV 8 B IC 8 a CMOS 8 b AES 8 c r t+1 r t t

10 9 IC DES Kocher, Jaffe, and Jun [1999] Kocher, Jaffe, and Jun [1998, 1999] Gandolfi, Mourtel, and Olivier [2001] Kocher [1996] trace 16 Genkin, Shamir, and Tromer [2014] 116 /

11 EMV Common Criteria a 0 A B 12 b

12 11 Joint Interpretation Library [2013] /

13 EMV 3. IC N 13 i ii

14 N N Goodwill, Jun, Jaffe, and Rohatgi [2011], Jaffe and Rohatgi [2011]. 120 /

15 EMV Mizuno et al. [2014] 15 S Z S+Z S Z C = 1 ( 2 log S ) [bit/sample] Z

16 /

17 EMV Step 1. 2 Step 2. Step 3. Step 4. Step ,

18 4. EMV EMV EMV EMV 1 EMV POS ATM MAC MAC 18 SK 1 PK 1 EMV 22 RSA SK 1 /PK 1 PK 1 SK 2 /PK Message Authentication Code EMV Application Cryptogram Generation 21 MAC EMV 22 Dynamic Data Authentication EMV Static Data Authentication 23 EMV SK 1 /PK 1 SK 2 /PK /

19 EMV 18 PIN PK 2 SK 2 PIN EMV PIN RSA MAC 1 MAC MAC SK 3 MAC MAC SK 3 MAC MAC SK 3 3 SK 3 MAC EMV MAC AES 125

20 2 EMV 19 EMV SK 1 /PK 1 SK 2 /PK 2 SK 3 /PK 3 PIN 3 MAC POS SK 1 POS PIN POS POS Murdoch et al. [2010] /

21 EMV PIN POS PIN MAC SK 3 MAC MAC SK 1 SK 2 SK 3 PIN MAC MAC ATM IC Box Box ATM IC IC PIN ATM IC PIN 3 1 IC IC 2 Match on Card ATM PIN 3 PIN ATM ATM PIN PIN 2 IC PIN 127

22 3 EMV EMV 3 SK 1 SK 2 SK 3 SK 1 POS 25 SK 1 SK 2 MAC MAC MAC MAC SK 3 SK 3 SK 3 EMV SK 3 EMV SK 3 26 SK 3 SK 3 POS 1 MAC ,536 = 2 16 EMV SK 3 MAC SK Man-in-the-Middle 26 EMV Application Transaction Counter 128 /

23 EMV 20 EMV 21 EMV MAC 2 1 EMV 1 Issuer Script 5. IC IC 129

24 20 IC IC IC 130 /

25 EMV enc/cryptrec/fy15/doc/c02_2.pdf IC LSI IC topics_37.html download/inv_05_ pdf IC jdm.pdf Vol. 64, No Vol. 57, No Vol. 49, No A Anderson, Ross, Security Engineering Second Edition, Wiley,

26 Bellcore, Now, Smart Cards Can Leak Secrets, Bellcore Media Advisory, 25 Sept Boneh, Dan, Richard A. DeMillo, and Richard J. Liption, On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT 97, Lecture Notes in Computer Science (LNCS), Vol. 1233, 1997, pp Eisenbarth, Thomas, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani, On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme, CRYPTO 2008, LNCS, Vol. 5157, 2008, pp EMVCo, EMV 4.3 Book 1 Application Independent ICC to Terminal Interface Requirements, EMVCo, 2011a., EMV 4.3 Book 2 Security and Key Management, EMVCo, 2011b., EMV 4.3 Book 3 Application Specification, EMVCo, 2011c., EMV 4.3 Book 4 Cardholder, Attendant, and Acquirer Interface Requirements, EMVCo, 2011d. European Payments Council (EPC), Resolution: Preventing Card Fraud in a mature EMV Environment, Doc EPC424-10, 31 Jan., Gandolfi, Karine, Christophe Mourtel, and Francis Olivier, Electromagnetic analysis: concrete results, Cryptographic Hardware and Embedded Systems (CHES) 2001, LNCS, Vol. 2162, 2001, pp Genkin, Daniel, Adi Shamir, and Eran Tromer, RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, CRYPTO 2014, LNCS, Vol. 8616, 2014, pp Goodwill, Gilbert, Benjamin Jun, Josh Jaffe, and Pankaj Rohatgi, A Testing Methodology for Side-channel Resistance Validation, Non-Invasive Attack Testing Workshop (NIAT), Jaffe, Josh, and Pankaj Rohatgi, Efficient side-channel testing for public key algorithms: RSA case study, NIAT, Joint Interpretation Library, Application of Attack Potential of Smartcards, version 2.9, Kocher, Paul C., Crytptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using Timing Attacks, extended abstract, 1995., Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO 96, LNCS, Vol. 1109, 1996, pp , Joshua Jaffe, and Benjamin Jun, Introduction to Differential Power Analysis and Related Attacks, 1998.,,and, Differential Power Analysis, CRYPTO 99, LNCS, Vol. 1666, 1999, pp /

27 EMV Mizuno, Hiroaki, Keisuke Iwai, Hidema Tanaka, and Takakazu Kurokawa, Analysis of Side-Channel Attack Based on Information Theory, IEICE Transactions on Fundamentals of Electromics, E97-A 7, 2014, pp Murdoch, Steven J., Saar Drimer, Ross Anderson, and Mike Bond, Chip and PIN is Broken, 2010 IEEE Symposium on Security and Privacy, Oswald, David, and Christof Paar, Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World, CHES 2011, LNCS, Vol. 6917, 2011, pp Skorobogatov, Sergei P., Semi-invasive attacks A new approach to hardware security analysis, University of Cambridge Computer Laboratory Technical Report, UCAM-CL- TR-630, VISA, Visa Announce U.S. Participation in Global Point-of-Sale Counterfeit Liability Shift, VISA BULLETIN, 9 Aug.,

28 134 /

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策 IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: [email protected] E-mail: [email protected] / /2015.10

More information

ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策

ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策 IC IC EMV EMV ICIC IC IC EMV IC EMV IC... E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] //2012.7 107 1 IC EMV 1 EMV EMVCo IC 36% 10 IC 65% 1,540 2009

More information

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて 1999 IC IC 2008 2 5 10 E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008

More information

リテール・バンキング・システムのICカード対応に関する現状とその課題

リテール・バンキング・システムのICカード対応に関する現状とその課題 IC IC IC ATM IC IC ATM IC IC IC IC E-mail: [email protected] E-mail: [email protected] IC IC MS IC IC IC IC IC IC IC MS IC IC IC IC IC ICIC ICATM ATMIC IC IC ATMMS IC MS IC IC IC IC ATM IC ICIC

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

内閣官房情報セキュリティセンター(NISC)

内閣官房情報セキュリティセンター(NISC) ( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13

More information

生体認証システムにおける情報漏洩対策技術の研究動向

生体認証システムにおける情報漏洩対策技術の研究動向 ATM 1 IC ATM ATM IC IC ATM E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] //2010.4 229 1. 2004 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM

More information

2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション 第 14 回 情 報 セキュリティ シンポジウム 多 様 化 するリテール 取 引 の 安 全 性 モバイル 化 を 支 える 情 報 セキュリティ 技 術 を 中 心 に - 講 演 1- リテール 取 引 システムにおける ICキャッシュカード 機 能 の 活 用 と 将 来 の 発 展 2012-12-20 日 本 銀 行 金 融 研 究 所 情 報 技 術 研 究 センター テクニカル アドバイザー

More information

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding

More information

Microsoft PowerPoint - RCIS2008_Satoh_ok

Microsoft PowerPoint - RCIS2008_Satoh_ok ハードウェアセキュリティ技術の動向 情報セキュリティ研究センターハードウェアセキュリティ研究チーム佐藤証 1 ハードウェアセキュリティ研究チーム 暗号モジュールの安全性評価 暗号回路の高性能実装技術 暗号回路IPマクロ 標準評価環境の整備 暗号モジュール評価制度への 貢献とガイドライン策定 ISO/IEC標準暗号LSI 組み込みセキュリティ 2 ネットワークセキュリティ アプリケーション開発 暗号モジュールの安全性に関する研究

More information

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC

2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC H.264 CABAC 1 1 1 1 1 2, CABAC(Context-based Adaptive Binary Arithmetic Coding) H.264, CABAC, A Parallelization Technology of H.264 CABAC For Real Time Encoder of Moving Picture YUSUKE YATABE 1 HIRONORI

More information

1.0 15 2 10

1.0 15 2 10 1.0 15 2 10 1... 3 2... 4 3 DSRC... 5 3.1... 5 3.2... 6 3.2.1 EMV 2 EMV 1... 6 3.2.2... 6 3.2.3 PIN... 6 3.2.4... 6 3.2.5 I/F... 6 3.2.6 ICCR/W... 6 3.2.7 HMI... 6 3.3 DSRC... 7 3.4... 8 3.4.1... 8 3.4.2...

More information

電子マネーと通信産業の戦略

電子マネーと通信産業の戦略 No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

2

2 Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/

More information

中田真佐男 323‐352/323‐352

中田真佐男 323‐352/323‐352 IT FinTech Finance Technology e SNS (AI) (2013) (2015) ATM IC EMV VISA MasterJCB VISA Master (Union Pay) VISA Master JCB J-Debit J-Debit VISA IC Alipay QR POS nanaco WAON EdyJR Suica PASMO au Master au

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

量子暗号通信の仕組みと開発動向

量子暗号通信の仕組みと開発動向 RSA AES 1 BB84Y-00 E-mail: [email protected] //2009.10 107 1. 2008 10 9 20 km 1.02 Mbps 100 km 10.1 kbps 1 Gbps 10 Gbps VPN 7 km 2. 1 3 2 1 2 108 /2009.10 1 2 2 109 2 ID IC KEELOQ 1 1 EUROCRYPT2008

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応

クラウド・コンピューティングにおける情報セキュリティ管理の課題と対応 E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] / /2011.1 227 1. 1 1 2010 1 2 2 3 1 2010 2010 2 1 1 3 multi-tenancy 228 /2011.1 SaaS 4 Vamosi [2008] 1 CPU CPU

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

RFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html

RFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html RFID LSI [email protected] RFID Radio Frequency mm 0.5 5m 2m 1 64k IC http://www.tij.co.jp/jmc/docs/tiris/goods/index.html RF http://www.hitachisemiconduct or.com/sic/jsp/japan/jpn/gain/1 35/next/

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

モバイルプリペイド決済の実現モデルの調査研究

モバイルプリペイド決済の実現モデルの調査研究 ECOM 2005 Gift 1...1 2...4 2.1... 4 2.2... 5 2.2.1... 5 2.2.2... 7 2.2.3... 8 2.2.4... 9 2.3... 10 2.3.1... 10 2.3.2... 12 2.3.3... 14 3... 16 3.1... 17 3.1.2... 18 3.1.3... 20 3.1.4... 21 3.1.5... 23

More information

完成卒論.PDF

完成卒論.PDF LAN 4 9920449 2 0 LAN Bluetooth LAN 1 LAN LAN LAN LAN 2 LAN Bluetooth LAN Bluetooth 3 Bluetooth 4 Bluetooth 5 Bluetooth Bluetooth 6 LAN Bluetooth LAN LocalAreaNetwork 1 LAN LAN LAN LAN Ethernet Ethernet

More information

VHDL-AMS Department of Electrical Engineering, Doshisha University, Tatara, Kyotanabe, Kyoto, Japan TOYOTA Motor Corporation, Susono, Shizuok

VHDL-AMS Department of Electrical Engineering, Doshisha University, Tatara, Kyotanabe, Kyoto, Japan TOYOTA Motor Corporation, Susono, Shizuok VHDL-AMS 1-3 1200 Department of Electrical Engineering, Doshisha University, Tatara, Kyotanabe, Kyoto, Japan TOYOTA Motor Corporation, Susono, Shizuoka, Japan E-mail: [email protected] E-mail:

More information

(MIRU2008) HOG Histograms of Oriented Gradients (HOG)

(MIRU2008) HOG Histograms of Oriented Gradients (HOG) (MIRU2008) 2008 7 HOG - - E-mail: [email protected], {takigu,ariki}@kobe-u.ac.jp Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.5 Histograms of Oriented Gradients D Human

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

IBM Presentations: Smart Planet Template

IBM Presentations: Smart Planet Template PCI DSS PCI DSS ITS IAS. PCI QSA PCI DSS PCI DSS PCI DSS 2 PCI DSS VISA AIS MasterCard SDP AMEX DSOP DISCOVER DISC JCB DSP PCI SSC (Payment Card Industry Security Standards Council) PCI URL https://www.pcisecuritystandards.org/index.shtml

More information

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z +

1 Kinect for Windows M = [X Y Z] T M = [X Y Z ] T f (u,v) w 3.2 [11] [7] u = f X +u Z 0 δ u (X,Y,Z ) (5) v = f Y Z +v 0 δ v (X,Y,Z ) (6) w = Z + 3 3D 1,a) 1 1 Kinect (X, Y) 3D 3D 1. 2010 Microsoft Kinect for Windows SDK( (Kinect) SDK ) 3D [1], [2] [3] [4] [5] [10] 30fps [10] 3 Kinect 3 Kinect Kinect for Windows SDK 3 Microsoft 3 Kinect for Windows

More information

DEIM Forum 2010 D Development of a La

DEIM Forum 2010 D Development of a La DEIM Forum 2010 D5-3 432-8011 3-5-1 E-mail: {cs06062,cs06015}@s.inf.shizuoka.ac.jp, {yokoyama,fukuta,ishikawa}@.inf.shizuoka.ac.jp Development of a Large-scale Visualization System Based on Sensor Network

More information

第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169

第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169-8555 3-4-1,169-8555 3-4-1 E-mail: s [email protected], [email protected] Wolf

More information

2016 5 1....3 1.1....3 1.2. 2020...3 1.3....3 2....4 2.1....4 2.2....4 2.2.1....4 2.2.2....5 2.3....5 3....6 3.1....6 3.1.1....6 3.1.2....6 3.1.3....6 3.1.4. API...7 3.1.5....7 3.2....7 3.3. ISO20022:...7

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

Tf9-1-07-7168.dvi

Tf9-1-07-7168.dvi /Review 1 1 1 1 2 Innovation Process Technology Hideyasu KARASAWA 1, Katsuro SAGANE 1, Hidenaga KARASAWA 1, Akira KURIYAMA 1, and Minoru KOBAYASHI 2 Abstract We propose a methodology for Innovation Process

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

,,,,., C Java,,.,,.,., ,,.,, i

,,,,., C Java,,.,,.,., ,,.,, i 24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children

More information

fiš„v5.dvi

fiš„v5.dvi (2001) 49 2 293 303 VRML 1 2 3 2001 4 12 2001 10 16 Web Java VRML (Virtual Reality Modeling Language) VRML Web VRML VRML VRML VRML Web VRML VRML, 3D 1. WWW (World Wide Web) WWW Mittag (2000) Web CGI Java

More information

i ii iii 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 1 x = n n x i i= 1 2 s X = s X n ( x x) i 2 2 i= 1 s X = n 1 g 1 n = ( n 1)( n 2) n i= 1 x i x s 3 24 g 2 n n( n + 1) x = ( n 1)( n

More information

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp

More information

Innovation Linked Open Data Resource Description Framework Uniform Resource Identifier Open Government 25 5 23 2011 25 2013 6 26 2014 3 ...1 ICT 2...4...4.....5..6..9..9 13 15 15 22 24 26 26 27 29 32 43

More information

取引法の観点からみた資金決済に関する諸問題

取引法の観点からみた資金決済に関する諸問題 1 / /2010.1 105 1. 1 1 1 2008 5 2 2008 10 3 1 4 2007 8 1 2008 32 2 2008 5 12 2009 1 2009 2009 3 6 2008 12 2008 3 1842 32 4 2006 10 2009 4 2009 http://www.shojihomu.or.jp/saikenhou/indexja.html 2005 11

More information

Key Words: probabilisic scenario earthquake, active fault data, Great Hanshin earthquake, low frequency-high impact earthquake motion, seismic hazard map 3) Cornell, C. A.: Engineering Seismic

More information

Japanese.PDF

Japanese.PDF 2002 11 2 3 Part I 4 5 6 3.1WTO/TBT 2 3 6 3.2ISO/IEC 7 3.3 7 3.4 7 3.5 8 3.6 8 9 4.1 9 4.2 9 4.3 10 12 Part II 13 1.1 13 1.2 13 1.3 14 1.4 14 1.5 14 2 14 3 15 3.1 15 3.2 16 3.3 17 3.4 17 3.5 18 3.6 18

More information

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS 2 3 4 5 2. 2.1 3 1) GPS Global Positioning System Vol. 52 No. 1 257 268 (Jan. 2011) 1 2, 1 1 measurement. In this paper, a dynamic road map making system is proposed. The proposition system uses probe-cars which has an in-vehicle camera and a GPS receiver.

More information

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server a) Change Detection Using Joint Intensity Histogram Yasuyo KITA a) 2 (0 255) (I 1 (x),i 2 (x)) I 2 = CI 1 (C>0) (I 1,I 2 ) (I 1,I 2 ) 2 1. [1] 2 [2] [3] [5] [6] [8] Intelligent Systems Research Institute,

More information

°Å¹æµ»½Ñ¤Î¿ôÍý¤È¤·¤¯¤ß --- ¥á¡¼¥ë¤Ç¤¸¤ã¤ó¤±¤ó¡©¤¹¤ëÊýË¡ ---

°Å¹æµ»½Ñ¤Î¿ôÍý¤È¤·¤¯¤ß  --- ¥á¡¼¥ë¤Ç¤¸¤ã¤ó¤±¤ó¡©¤¹¤ëÊýË¡ --- .... 1 22 9 17 1 / 44 1 (9/17) 2 (10/22) P2P 3 (11/12) 2 / 44 ogawa is.uec.ac.jp http://www.quest.is.uec.ac.jp/ogawa/ http://www.is.uec.ac.jp/ 3 / 44 ARPANet (1969) 4 / 44 M. Blum ( ), Coin Flipping by

More information

スライド 1

スライド 1 IPA 2010 3 25 1 1 / / 2 (DRBG) DRBG NIST SP800-90 2 1 3 JCMVP 2009 1 JCATT AES 15 4 5 OK/NG OK ( ) ( ) 6 JCMVP JCATT JCATT http://www.ipa.go.jp/security/jcmvp/open_documents.html 7 332 (DES, Triple-DES,

More information