{"updated":"2025-01-20T06:36:21.927590+00:00","links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00174662","sets":["581:8417:8427"]},"path":["8427"],"owner":"11","recid":"174662","title":["多値セル型二次元コードでの多分割領域への複数ユーザのアクセス制御"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-09-15"},"_buckets":{"deposit":"353e83ec-e74f-47ee-a5d8-f6ee0a80495d"},"_deposit":{"id":"174662","pid":{"type":"depid","value":"174662","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"多値セル型二次元コードでの多分割領域への複数ユーザのアクセス制御","author_link":["360359","360360","360361","360358"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"多値セル型二次元コードでの多分割領域への複数ユーザのアクセス制御"},{"subitem_title":"Multi-user Access Control to the Divided Area on Multi-value Cell Two-dimensional Code","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[特集:社会の変革に挑戦するセキュリティ技術とプライバシー保護技術] 二次元コード,多値型セル,データ領域分割,アクセス制御","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2016-09-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"株式会社テララコード研究所/九州大学社会人博士課程"},{"subitem_text_value":"九州大学"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Terrara Code Research Institute / Kyushu University, External PhD-course","subitem_text_language":"en"},{"subitem_text_value":"Kyushu University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/174662/files/IPSJ-JNL5709011.pdf","label":"IPSJ-JNL5709011.pdf"},"date":[{"dateType":"Available","dateValue":"2018-09-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5709011.pdf","filesize":[{"value":"2.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"3b25a8e4-f2af-46ea-a4e2-cbbf3977b870","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"寺浦, 信之"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"櫻井, 幸一"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Nobuyuki, Teraura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kouichi, Sakurai","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"すべての人への情報提供を目的とした応用だけでなく,特定の対象にだけ情報を提供する二次元コードのニーズも存在する.そこで,二次元コードの基本要素であるセルを多値化して二次元コードを大容量化し,新たに作り出した領域を秘匿化する.単に二次元コードに暗号化領域を設定し,その復号キイを有する端末のみが読み取り可能とする方式が提案されている.しかし,二次元コードのデータが複数の領域に区分されており,複数の読み取り者ごとに読み取り範囲が異なる場合の対応は想定されていない.この機能が実現できれば二次元コードの活用分野を広げることができる.そこで,この場合に対応可能なシステムを検討する.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The need of providing only a specific target with the information, including the personal information etc. which were memorized by the 2D code, which should be kept secret is exist. Then, the cell which is a primitive of a 2D code is made into a multiple-valued, and the area which became large capacity and newly made the 2D code is kept secret. The method which sets an encryption area as the storage area of a 2D code, and makes possible reading only of the terminal which has the decoding Key is proposed. However, it is not assumed, when the data on a 2D code is classified into two or more areas and read ranges differ for two or more read persons of each. When this function is realizable, the activity field of a 2D code can be extended. Then, the system which can respond in this case is examined.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1973","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"1965","bibliographicIssueDates":{"bibliographicIssueDate":"2016-09-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"9","bibliographicVolumeNumber":"57"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":174662,"created":"2025-01-19T00:44:49.617550+00:00"}