WO2008038386A1 - Dispositif de fourniture de service, système de fourniture de service et procédé de fourniture de service - Google Patents

Dispositif de fourniture de service, système de fourniture de service et procédé de fourniture de service Download PDF

Info

Publication number
WO2008038386A1
WO2008038386A1 PCT/JP2006/319362 JP2006319362W WO2008038386A1 WO 2008038386 A1 WO2008038386 A1 WO 2008038386A1 JP 2006319362 W JP2006319362 W JP 2006319362W WO 2008038386 A1 WO2008038386 A1 WO 2008038386A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
data
information
audit
digest value
Prior art date
Application number
PCT/JP2006/319362
Other languages
English (en)
Japanese (ja)
Inventor
Tetsuya Okano
Tsutomu Kawai
Original Assignee
Fujitsu Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Limited filed Critical Fujitsu Limited
Priority to PCT/JP2006/319362 priority Critical patent/WO2008038386A1/fr
Publication of WO2008038386A1 publication Critical patent/WO2008038386A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Definitions

  • the present invention relates to a service providing apparatus that provides a service to a user terminal, and in particular, a service providing apparatus and a service providing capable of determining the validity of information recording the amount of work involved in service provision
  • the present invention relates to a system and a service providing method.
  • FIG. 21 is a diagram for explaining a conventional technique.
  • the data center entrusted with the environmental management 'operation for providing services by the service provider provides services to the service users on behalf of the service providers and provides services. You may have charged your service provider with a fee.
  • the billing method charged by the data center to the service provider is a fixed billing method that charges the server, etc. at a fixed fee, or a fee is added according to the amount of work involved in providing the service. Pay-per-use billing is generally used. In recent years, from the viewpoint of effective use of resources, etc., the billing method of charges charged by data centers to service providers is becoming a pay-as-you-go method.
  • a data center charges a fee according to a pay-per-use billing method
  • the workload when the service is provided to the user is recorded, and a fee corresponding to the workload is calculated.
  • the data center then charges the calculated fee to the service provider and notifies the service pronoida of information that records the amount of work required to provide the service to prove the validity of the charged fee. ! /
  • Patent Document 1 both the customer and the lending company calculate a loan fee based on information on the amount of power used by the customer, and compare the respective loan fees.
  • the technology that determines whether the lending fee charged by a lender to a customer is correct is disclosed.
  • Patent Document 1 Japanese Patent Application Laid-Open No. 2005-50174
  • the service provider does not directly monitor service exchanges between the data center and an unspecified number of users. If there is no way to determine the legitimacy of the amount of work required to provide services provided by the data center, there is a problem that the amount of work is tampered with by a malicious person and an unfair fee is paid. It was.
  • the present invention has been made to solve the above-described problems caused by the prior art, and provides a service providing apparatus and a service providing that can determine the legitimacy of information recording the amount of work involved in providing a service.
  • An object is to provide a system and a service providing method. Means for solving the problem
  • the present invention provides a service providing program for causing a terminal accessing a computer to function as a service providing apparatus that provides a Web service, the computer When measuring the workload of the service provided to the terminal that has accessed the service, and recording the measured workload data as log data, and providing the service in response to the service request, It is characterized by functioning as transmission control means for transmitting log data recorded by the data recording means as audit data to a terminal that is a service providing destination.
  • the present invention further includes digest value generation means for generating a digest value based on the log data, wherein the transmission control means provides a service in response to a service request.
  • the digest value is transmitted to a terminal that provides a service.
  • the present invention is characterized in that, in the above invention, the digest value generation means generates a digest value from log data of a predetermined period recorded in the data recording means.
  • the present invention provides a service providing system in which a service providing apparatus entrusted to provide a service to a service provider provides a service to a user terminal, the service providing apparatus performing a service providing service.
  • the present invention is a service providing method performed by a service providing apparatus and a terminal used by an inspector of a provider who substitutes the Web service to the service providing apparatus, and accesses a work amount related to service provision.
  • the process of measuring the workload of the service provided to the terminal that has been received, recording the measured workload data as log data in the recording device, and providing the service in response to a service request A transmission control step of transmitting the log data recorded by the recording device as audit data to a terminal serving as a provision destination of the data; acquiring the audit data and the log data transmitted to the auditor's terminal; and And a determination step for determining whether or not the data has been tampered with.
  • the workload of the service provided to the accessed terminal is measured, the measured workload data is recorded as log data, and the service is provided in response to the service request.
  • log data recorded by the data recording means is transmitted as audit data to a terminal that is a service providing destination, so that falsification of log data can be prevented.
  • a digest value is generated based on log data and a service is provided in response to a service request
  • a digest is provided to a terminal serving as a service providing destination. Since the est value is transmitted, falsification of log data can be prevented efficiently.
  • the service when a digest value is generated based on log data for a predetermined period and a service is provided in response to a service request from a user's terminal, the service is provided. Since the digest value is transmitted to the previous terminal, it becomes more difficult for the malicious data to be altered by the malicious third party, and the log data can be efficiently prevented from being altered.
  • the service providing apparatus measures the work amount of the service provided to the terminal that has accessed the work amount related to the service provision, and obtains the measured work amount data.
  • the log data recorded by the data recording means is transmitted as the audit data to the terminal that provides the service. Whether the audit data acquired by accessing the service providing device and the log data recorded in the data recording means are acquired, and whether or not the log data is falsified based on the acquired audit data and log data. Therefore, falsification of log data can be prevented.
  • FIG. 1 is a diagram for explaining the outline and features of the service providing system according to the first embodiment.
  • FIG. 2 is a system configuration diagram of the service providing system according to the first embodiment.
  • FIG. 3 is a functional block diagram of the configuration of the data center according to the first embodiment.
  • FIG. 4 is a diagram illustrating an example of a data structure of service usage log information.
  • FIG. 5 is a diagram of an example of a data structure of audit information according to the first embodiment.
  • FIG. 6 is a functional block diagram of the configuration of the service provider according to the first embodiment.
  • FIG. 7 is a diagram illustrating an example of a data structure of audit management information according to the first embodiment.
  • FIG. 8 is an explanatory diagram for explaining the process performed by the log information verification unit according to the first embodiment.
  • FIG. 9 is a flowchart of processing when the data center according to the first embodiment provides a service. It is a flowchart which shows order.
  • FIG. 10 is a flowchart of a determination process performed by the service provider according to the first embodiment.
  • FIG. 11 is a diagram for explaining the outline and features of the service providing system according to the second embodiment.
  • FIG. 12 is a system configuration diagram of the service providing system according to the second embodiment.
  • FIG. 13 is a functional block diagram of the configuration of the data center according to the second embodiment.
  • FIG. 14 is a diagram illustrating an example of a data structure of audit information according to the second embodiment.
  • FIG. 15 is a functional block diagram of the configuration of the service provider according to the second embodiment.
  • FIG. 16 is a diagram illustrating an example of a data structure of audit management information according to the second embodiment.
  • FIG. 17 is an explanatory diagram for explaining the process performed by the log information verification unit according to the second embodiment.
  • FIG. 18 is a flowchart of a process procedure performed when the data center according to the second embodiment provides a service.
  • FIG. 19 is a flowchart of a determination process performed by the service provider according to the second embodiment.
  • FIG. 20 is a diagram showing a hardware configuration of a computer constituting the data center or service provider shown in FIG.
  • FIG. 21 is a diagram for explaining a conventional technique.
  • FIG. 1 is a diagram for explaining the outline and features of the service providing system according to the first embodiment.
  • the data center entrusted with service provision to the service provider provides services provided to the terminals of auditors and general user terminals that audit the workload related to the service provision.
  • the measured workload data is recorded in the recording device as service usage log information, and a service is provided in response to a service request, a part of the service usage log information is serviced as audit information.
  • the data is sent to the terminal to which the data is provided (the data center does not know whether the terminal is a user of the auditor's terminal power).
  • the service provider acquires the audit information and the service usage log information to obtain the audit information and The service usage log information is compared with the service usage log information to determine whether the service usage log information has been tampered with. (If the service usage log information is tampered with, the data center power service provider has an unfair fee. Will be charged).
  • the service providing system transmits the audit information to the terminal that is the service providing destination, and the service provider transmits the audit information and the service.
  • the usage log information is obtained and it is determined whether the service usage log information has been tampered with, so that the problem that the malicious user charges the service usage log information and charges an unauthorized fee is solved. Can do.
  • the service center logs the service usage log information to the service provider and compares it with the audit information sent to the auditor's terminal. You can prove the validity of the fee.
  • FIG. 2 is a system configuration diagram of the service providing system according to the first embodiment.
  • this service providing system includes user terminals 10, 20, a data center 100, and a service router 200.
  • the user terminals 10, 20, the data center 100, and the service provider 200 are connected by a network 50.
  • the user terminals 10 and 20 are shown here for convenience of explanation, it is assumed that a plurality of other user terminals are also connected to the network 50 without being limited thereto.
  • the user terminals 10 and 20 are devices that are operated by an auditor or a general user to access the data center 100 and receive a desired service provision.
  • an auditor who operates the user terminal 10 (or the user terminal 20) accesses the data center 100
  • the auditor acquires the audit information that is also transmitted by the data center, and uses the acquired audit information as a service provider. Send to 200.
  • the data center 100 is a device that is entrusted with service provision to the service provider 200 and provides the service instead of the service provider 200.
  • the data center 100 measures the workload of the service provided to the user terminals 10 and 20, generates information on the measured workload, that is, service usage log information, and sends the audit information to the service provider.
  • the administrator of the data center 100 charges the administrator of the data service provider 200 based on the service usage log information.
  • the service provider 200 entrusts the service provision to the data center 100, and when the service provider 200 is charged by the administrator of the data center 100 according to the service usage log information, the service provider 200 operates the auditor.
  • This is a device that obtains audit information from the user terminals 10 and 20, and determines whether or not the service use log information has been falsified based on the obtained audit information and service use log information.
  • FIG. 3 is a functional block diagram of the configuration of the data center 100 according to the first embodiment.
  • the data center 100 includes an input unit 110, an output unit 120, a communication control unit 130, an input / output control IF unit 140, a storage unit 150, and a control unit 160. Is done.
  • the input unit 110 is an input means for inputting various types of information. Consists of a mouse and a microphone.
  • the monitor (output unit 120) described later also realizes a pointing device function in cooperation with the mouse.
  • the output unit 120 is an output unit that outputs various types of information, and includes a monitor (or a display or touch panel), a speaker, or the like.
  • the communication control unit 130 is mainly means for controlling communication between the user terminals 10 and 20 and the service provider 200.
  • the input / output control IF unit 140 includes an input unit 110, an output unit 120, This is a means for controlling data input / output by the communication control unit 130, the storage unit 150, and the control unit 160.
  • the storage unit 150 is a storage unit that stores data and programs necessary for various processes by the control unit 160. In particular, as shown in FIG. Log information 150a is provided.
  • the service use log information 150a is data in which information on a work amount related to service provision is recorded.
  • FIG. 4 is a diagram showing an example of the data structure of the service usage log information 150a.
  • this service usage log information 150a includes the access occurrence time, the IP (Internet Protocol) address of the access source (the user terminal that made the service request to the data center), the access source port (port Number), access destination URL (Uniform Resource Locator), and cumulative access count indicating the cumulative usage count of the service provided.
  • the service usage log information 150a includes a session usage time such as a session-oriented service, a user ID (Idification) used in the case of an authentication type service, and the like.
  • the control unit 160 has an internal memory for storing programs and control data defining various processing procedures, and is a control means for executing various processes by these, and is closely related to the present invention. As shown in FIG. 3, the service providing unit 160a, the service usage log information creating unit 160b, the audit information managing unit 160c, the electronic signature creating unit 160d, and the encryption key processing unit 160e are as shown in FIG. Is provided.
  • the service providing unit 160a is a processing unit that provides various services to the user terminal of the service request source when a service request is received from the user terminals 10 and 20. For example, the service providing unit 160a provides a variety of information by displaying a Web page on the Web browser of the user terminal of the service request source. [0036] When the service providing unit 160a receives an output command for the service usage log information 150a from the input unit 110, the service providing unit 160a outputs the service usage log information 150a to the service provider 200 (the service usage log information 150a is (It is output after being encrypted by the encryption key processing unit 160e described later). This output command shall be input by the administrator of the data center 100 when, for example, the administrator of the service provider 200 is charged for the fee for providing the service capability of the administrator of the data center 100. .
  • the service use log information creation unit 160b is a service workload (service number of accesses to the web page, data transfer amount, access time, registration) performed by the service providing unit 160a on the user terminals 10, 20 This is a processing unit that measures service usage log information 150a (see Fig. 4).
  • the audit information management unit 160c creates audit information based on the service usage log information 150a, and the service providing unit 160a transmits the audit information to the user terminal that provides the service. Part. Specifically, the audit information management unit 160c is provided when the service providing unit 160a provides the service, and the service usage log information creation unit 160b records the workload information corresponding to the service in the service usage log information 150a. Then, a part of the information recorded in the service usage log information 150a is extracted, and the extracted information is transmitted as audit information to the corresponding user terminal.
  • the information extracted from the service usage log information 150a may be information corresponding to the user terminal receiving the service provision, or may be a plurality of past information recorded in the service usage log information 150a.
  • FIG. 5 is a diagram illustrating an example of a data structure of audit information according to the first embodiment.
  • this audit information includes an access occurrence time, an IP address, a port, an access destination URL, and an accumulated access count.
  • the audit information includes a session usage time such as a session-oriented service and a user ID used in the case of an authentication type service.
  • the electronic signature creation unit 160d is a processing unit that creates electronic signature data using a public key cryptosystem and attaches the electronic signature data to the audit information created by the audit information management unit 160c. .
  • the electronic signature creation unit 160d creates a message digest from the audit information, and encrypts the powerful message digest with a private key. Attach the data.
  • the encryption key processing unit 160e is a processing unit that encrypts the audit information created by the audit information management unit 160c. That is, the audit information management unit 160c outputs the audit information encrypted with the electronic signature attached thereto to the user terminals 10 and 20.
  • the encryption processing unit 160e encrypts the service usage log information 150a.
  • FIG. 6 is a functional block diagram of the structure of the service provider 200 according to the first embodiment.
  • the service pronoider 200 includes an input unit 210, an output unit 220, a communication control unit 230, an input / output control IF unit 240, a storage unit 250, and a control unit 260. Configured.
  • the input unit 210 is an input means for inputting various types of information, and includes a keyboard, a mouse, a microphone, and the like.
  • the monitor (output unit 220) described later also realizes a pointing device function in cooperation with the mouse.
  • the output unit 220 is an output unit that outputs various types of information, and includes a monitor (or a display or touch panel), a speaker, or the like.
  • the communication control unit 230 is mainly means for controlling communication between the user terminals 10 and 20 and the data center 100.
  • the input / output control IF unit 240 includes an input unit 210, an output unit 220, This is means for controlling input / output of data by the communication control unit 230, the storage unit 250, and the control unit 260.
  • the storage unit 250 is a storage unit that stores data and programs necessary for various types of processing by the control unit 260. Particularly, as closely related to the present invention, as shown in FIG. Information 250a and service usage log information 250b are provided.
  • the audit management information 250a is data in which a plurality of pieces of audit information transmitted from the user terminals 10 and 20 operated by the auditor are recorded.
  • FIG. 7 is a diagram illustrating an example of the data structure of the audit management information 250a according to the first embodiment. As shown in the figure, this audit management information 250a records a plurality of audit information.
  • Service usage log information 250b is used to charge the data center 100 This data is output to the service provider 200 in order to prove the correctness of the charge billing when it is made to the binder. Since the data structure of the service usage log information 250b is the same as the service usage log information 150a (see FIG. 4) stored in the storage unit 150 of the data center 100, the description thereof is omitted.
  • the control unit 260 is a control means that has an internal memory for storing programs and control data that define various processing procedures, and performs various processing using these programs, and is closely related to the present invention. As related items, as shown in FIG. 6, a decryption processing unit 260a, a signature verification unit 260b, and a log information verification unit 260c are provided.
  • the decryption processing unit 260a obtains audit information (encrypted audit information) from the user terminals 10, 20 (or the input unit 2 10) operated by the auditor, the obtained audit information Is a processing unit that decrypts the audit information and stores the decrypted audit information in the audit management information 250a.
  • the decryption processing unit 260a decrypts the service usage log information (encrypted service usage log information) output from the data center 100, and uses the decrypted service usage log information as the service usage log information 250b. Is stored in the storage unit 250.
  • the signature verification unit 260b is a processing unit that acquires the electronic signature data attached to the audit information and determines whether or not the audit information has been tampered with using a public key encryption method or the like. . For example, the signature verification unit 260b creates a message digest from the audit information, decrypts the electronic signature data with the public key, and decrypts the message digest created from the audit information and the electronic signature data. In comparison, if both message digests do not match, it is determined that the audit information has been tampered with.
  • the signature verification unit 260b determines that the audit information has been tampered with, the signature verification unit 260b deletes the tampered audit information from the audit management information 250a, and displays information indicating that the audit information has been tampered with. Output to the output unit 220.
  • the log information verification unit 260c is a processing unit that compares the audit management information 250a and the service usage log information 250b to determine whether or not the service usage log information 250b has been tampered with.
  • FIG. 8 is an explanatory diagram for explaining the process performed by the log information verification unit 260c according to the first embodiment.
  • the log information verification unit 260c determines whether or not there is a contradiction in the IP address of the service usage log information 250b (the log information verification unit 260c exists in advance). If the IP address of the user terminal to be obtained (such as the IP address of the user terminal that is the target of service provision) is stored and an IP address other than the IP address to be used exists in the service usage log information 250b, the IP address Judge that there is a contradiction). When there is a contradiction in the IP address of the service usage log information 250b, the log information verification unit 260c outputs that fact to the output unit 220.
  • the log information verification unit 260c compares the audit management information 250a with the service usage log information 25 Ob, and data corresponding to the audit information of the audit management information 250a is included in the service usage log information 250b. It is determined whether or not. The log information verification unit 260c determines that the service usage log information 250b has been tampered with when the data corresponding to the audit information of the audit management information 250a is not included in the service usage log information 250b, and the output unit 220 Output to.
  • the log information verification unit 260c compares the audit management information 250a with the service usage log information 250b, and determines the access occurrence time in the audit information and the access occurrence in the service usage log information 250b corresponding to the audit information. A difference with time is calculated, and if the calculated difference is equal to or greater than a specified value, it is determined that the service usage log information 250b has been tampered with, and a message to that effect is output to the output unit 220. For example, when the accumulated access count is used as a key, the access occurrence time of the audit information for the accumulated access count “5802 2” is “August 1, 2006 10: 18: 18.015 seconds”.
  • the access occurrence time in the service usage log information 250b corresponding to the audit information is the access occurrence time corresponding to the cumulative access count “58022” in the service usage log information 250b “10:18 on August 1, 2006 18. 015 seconds ", the difference between the access occurrence times of both is calculated, and the calculated difference is compared with the specified value.
  • the log information verification unit 260c compares the audit management information 250a with the service usage log information 250b, and determines whether or not the accumulated access count of the service usage log information 250b is appropriate. For example, the log information verification unit 260c compares the IP address corresponding to the cumulative access count of the audit information with the IP address corresponding to the cumulative access count of the service usage log information 250b, and determines whether or not both IP addresses match. Determine whether. If the IP addresses do not match, the log information verification unit 260c determines that the service usage log information 250b has been tampered with, and outputs that fact to the output unit 220.
  • the log information verification unit 260c indicates that the number of predetermined IP addresses in the service usage log information 250b (the IP address of the user terminal operated by the auditor) is the number of audit accesses (the auditor is the user). The number of service requests made to the data center 100 by operating the terminal), and if not, it is determined that the service usage log information 250b has been tampered with, and a message to that effect is output to the output unit 220. To do. It is assumed that the log information verification unit 260c acquires in advance the information such as the IP address of the user terminal operated by the auditor and the number of times of audit access by using the input unit 210 and the like, and holds the information that is helpful.
  • FIG. 9 is a flowchart of a process procedure performed when the data center 100 according to the first embodiment provides a service.
  • the service providing unit 160a receives the service request from the user terminal 10 (or the user terminal 20) (step S101), and the service terminal 160a receives the service request.
  • Start providing service step S102).
  • the service usage log information creation unit 160b measures the amount of work involved in service provision by the service provision unit 160a, creates service usage log information 150a (step S103), and the audit information management unit 160c Audit information is created (step S104).
  • the electronic signature creation unit 160d creates electronic signature data (step S105), the encryption processing unit 160e encrypts the audit information (step S106), and the audit information management unit 160c creates the electronic signature.
  • the audit information with data attached and encrypted is output to the user terminal of the service provider (step S107).
  • the data center 100 creates audit information at the time of service provision, and the data center cannot determine whether it is a user terminal serving as a service provider (an auditor's terminal or a general user's terminal). Since the audit information is output to the user terminal), it is possible to prevent the malicious user from falsifying the service usage log information 150a.
  • FIG. 10 is a flowchart showing the determination process performed by the service provider 200 according to the first embodiment.
  • the decryption processing unit 260a acquires service usage log information (encrypted service usage log information) and uses the service. After the log information is decrypted, it is stored in the storage unit 250 (step S201), and the log information verification unit 260c determines whether or not there is a contradiction in the IP address of the service usage log information 250b (step S202).
  • step S203 If there is a contradiction in the IP address in the service usage log information 250b (step S203, Yes), information indicating that the service usage log information 250b is not appropriate is output to the output unit 220 ( Step S204). On the other hand, if there is no contradiction in the IP address (step S203, No), it is determined whether information corresponding to the audit information exists in the service usage log information 250b (step S205).
  • step S206 If the information corresponding to the audit information does not exist in the service usage log information 250b (step S206, No), the process proceeds to step S204. On the other hand, if the information corresponding to the audit information exists in the service usage log information 250b (step S206, Yes), the difference between the access occurrence time of the corresponding audit information and the access occurrence time of the service usage log information 250b is calculated. It is calculated (step S207), and it is determined whether or not the time difference is greater than or equal to a predetermined value (step S208).
  • step S209 If the time difference is equal to or greater than the predetermined value (step S209, Yes), the process proceeds to step S204. On the other hand, if the time difference is less than the predetermined value (step S209, No), it is determined whether the accumulated access count of the audit information is equal to the accumulated access count of the service usage log information 250b (step S210).
  • step S211, No If the accumulated access counts are not equal (step S211, No), the process proceeds to step S204. On the other hand, when the accumulated access count is equal (step S211, Yes), it is determined whether or not the number of predetermined IP addresses in the service usage log information 250b is equal to the number of audit accesses (step S212).
  • step S213, No If the number of predetermined IP addresses in the service usage log information 250b is not equal to the number of audit accesses (step S213, No), the process proceeds to step S204. On the other hand, if the number of predetermined IP addresses in the service usage log information 250b is equal to the number of audit accesses (step S213, Yes), information indicating that the service usage log information is appropriate is sent to the output unit 220. Output (step S214).
  • the log information verification unit 260c and the audit information included in the audit management information 250a The service usage log information 250b obtained from the data center 100 is compared with the service usage log information 250b to determine whether or not the service usage log information 250b has been tampered with. It is possible to solve the problem of paying a certain person.
  • the service providing system is a service provided by the data center 100 to a terminal of an auditor who audits a workload related to service provision and a terminal of a general user.
  • a part of the service usage log information is audit information.
  • the service provider 200 acquires the audit information and the service usage log information, compares the audit information with the service usage log information, and determines whether or not the service usage log information has been tampered with. It is possible to solve the problem that the service usage log information is falsified by a malicious person and an unauthorized fee is charged.
  • the data center 100 when providing the service, does not know whether the access is made by an auditor or a general user, so the number of accesses used for the service use log information 150a is illegally increased. It can be suppressed. Even if the auditor does not access for the audit, the data center 100 cannot deny the existence of the access for the audit, so that fraud is suppressed.
  • FIG. 11 is a diagram for explaining the outline and features of the service providing system according to the second embodiment.
  • the service providing system according to the second embodiment has a digest value based on information in a predetermined area (predetermined period) among information recorded in the service usage log information by the data center.
  • the audit information and digest value are sent to the terminal that provides the service.
  • the service provider log information and the service usage log information The digest value generated by the service usage log information is compared with each other to determine whether the service usage log information has been tampered with.
  • the service providing system generates a digest value based on the service usage log information, and when the data center receives a service request, the service providing system provides the terminal serving as a service providing destination. Audit information and digest values are sent, and the service provider determines whether the service usage log information has been falsified based on the digest value, so it is possible to efficiently prevent falsification of the service usage log information. .
  • FIG. 12 is a system configuration diagram of the service providing system according to the second embodiment.
  • this service providing system includes user terminals 10, 20, a data center 300, and a service provider 400.
  • the user terminals 10 and 20, the data center 300, and the service provider 400 are connected by a network 50.
  • the user terminals 10 and 20 are shown, but the present invention is not limited to this, and it is assumed that a plurality of other user terminals are also connected to the network 50.
  • the user terminals 10 and 20 are devices operated by an auditor or a general user to access the data center 300 and receive a desired service provision.
  • an auditor who operates the user terminal 10 (or the user terminal 20) accesses the data center 300
  • the auditor acquires the audit information that is also transmitted by the data center, and uses the acquired audit information as a service provider. Sent to 400.
  • the data center 300 is a device that entrusts the service provider 400 to provide a service and provides the service instead of the service provider 400. Further, the data center 300 measures the workload of the services provided to the user terminals 10 and 20, generates information on the measured workload, that is, service usage log information, and generates a digest value. Then, the data center 300 transmits the digest value and the audit information to the user terminal that is the service providing destination. Note that the administrator of the data center 300 charges the administrator of the data service provider 400 based on the service usage log information.
  • the service provider 400 entrusts the data center 300 to provide the service, and When the fee for the service usage log information is charged by the administrator of the data 300, etc., the audit information and digest value are acquired from the user terminals 10 and 20 operated by the auditor, and the acquired audit information and This device determines whether or not the service usage log information has been falsified based on the digest value, the service usage log information, and the digest value generated from the service usage log information.
  • FIG. 13 is a functional block diagram of the configuration of the data center 300 according to the second embodiment.
  • the data center 300 includes an input unit 310, an output unit 320, a communication control unit 330, an input / output control IF unit 340, a storage unit 350, and a control unit 360. Is done.
  • the input unit 310 is an input means for inputting various types of information, and includes a keyboard, a mouse, a microphone, and the like.
  • the output unit 320 is an output unit that outputs various types of information, and includes a monitor (or a display or touch panel), a speaker, or the like.
  • the communication control unit 330 is mainly means for controlling communication between the user terminals 10 and 20 and the service provider 400.
  • the input / output control IF unit 340 includes an input unit 310, an output unit 320, This is a means for controlling input / output of data by the communication control unit 330, the storage unit 350, and the control unit 360.
  • the storage unit 350 is a storage unit that stores data and programs necessary for various types of processing by the control unit 360.
  • Log information 350a is provided.
  • the service usage log information 350a is data in which information on a work amount related to service provision is recorded.
  • the data structure of the service usage log information 350a is the same as the data structure of the service usage log information 150a shown in FIG.
  • the control unit 360 has an internal memory for storing programs and control data defining various processing procedures, and is a control means for executing various processes by these, and is closely related to the present invention.
  • the service providing unit 360a As shown in FIG. 13, the service providing unit 360a, the service usage log information creating unit 360b, the audit information managing unit 360c, the digest value calculating unit 360d, the digital signature creating unit 360e, And an encryption processing unit 360f.
  • the service providing unit 360a is a processing unit that provides various services to the user terminal of the service request source when a service request is received from the user terminals 10 and 20.
  • the service providing unit 360a provides a variety of information by displaying a web page on the web browser of the user terminal of the service request source.
  • the service providing unit 360a When the service providing unit 360a receives an output command of the service usage log information 350a from the input unit 310, the service providing unit 360a outputs the service usage log information 350a to the service provider 400 (the service usage log information 350a It is output after being encrypted by the encryption key processing unit 360f described later).
  • This output command shall be input by the administrator of the data center 300 when, for example, the administrator of the service provider 400 is charged for the fee for providing the administrator power service of the data center 300. .
  • the service usage log information creation unit 360b is a service workload that the service providing unit 360a performs on the user terminals 10, 20 (number of accesses to the web page, amount of data transfer, access time, registration) This is a processing unit that measures the number of users) and creates service usage log information 350a (see Fig. 4).
  • the audit information management unit 360c creates audit information based on the service usage log information 350a, and the service providing unit 360a transmits the audit information to the user terminal that provides the service. Part. Specifically, the audit information management unit 360c is provided when the service providing unit 360a provides the service, and the service usage log information creating unit 360b records the workload information corresponding to the service in the service usage log information 350a. Then, a part of the information recorded in the service usage log information 350a is extracted, and the extracted information is transmitted as audit information to the corresponding user terminal.
  • the information extracted from the service usage log information 350a may be information corresponding to the user terminal receiving the service provision, or may be a plurality of past information recorded in the service usage log information 350a.
  • FIG. 14 is a diagram illustrating an example of a data structure of audit information according to the second embodiment.
  • this audit information includes access occurrence time, IP address, port, access destination URL, accumulated access count, and digest value (explained about digest value will be described later).
  • the audit information includes the session usage time for session-oriented services, user IDs used for authentication-type services, etc.
  • the digest value calculation unit 360d is a processing unit that calculates a digest value based on the service usage log information 350a. Specifically, the digest value calculation unit 360d uses the no-hash function (for example, MD5 and Message Direct 5>) to obtain the digest value from the information table generated in the predetermined period included in the service usage log information 350a. Calculate (for example, calculate the information power digest value corresponding to the total number of times 58022 to 58026; see Fig. 4). Then, the digest value calculation unit 360d records the calculated digest value in a digest value recording area of audit information (audit information generated by the audit information management unit 360c).
  • the no-hash function for example, MD5 and Message Direct 5>
  • the digest value calculation unit 360d when the digest value calculation unit 360d records the digest value in the audit information, the digest value calculation unit 360d also records the accumulated access count that is a reference of the information for which the digest value has been calculated. Referring to FIG. 4, when the digest value calculation unit 360d calculates the digest value based on the cumulative access count “58022 to 58026” in the service use log information, the digest value is calculated based on the reference of the information. The total access count “508026” is recorded in the audit information together with the digest value. In the following, the information on the accumulated access as a reference and the digest value are simply referred to as a digest value.
  • the electronic signature creation unit 360e is a processing unit that creates electronic signature data using a public key cryptosystem and attaches the electronic signature data to the audit information created by the audit information management unit 360c. .
  • the electronic signature creation unit 360e creates a message digest from the audit information, and attaches electronic signature data obtained by encrypting a powerful message digest with a private key.
  • the encryption key processing unit 360f is a processing unit that encrypts the audit information created by the audit information management unit 360c. That is, the audit information management unit 360c outputs the encrypted audit information attached with the electronic signature to the user terminals 10 and 20.
  • the encryption processing unit 360f encrypts the service usage log information 350a.
  • FIG. 15 is a functional block diagram of the configuration of the service provider 400 according to the second embodiment.
  • the service pronoider 400 includes an input unit 410, an output unit 420, a communication control unit 430, an input / output control IF unit 440, a storage unit 450, and a control unit 460. Configured.
  • the input unit 410 is an input unit for inputting various types of information, and includes a keyboard, a mouse, a microphone, and the like.
  • the monitor (output unit 420) described later also realizes a pointing device function in cooperation with the mouse.
  • the output unit 420 is an output unit that outputs various types of information, and includes a monitor (or a display or touch panel), a speaker, or the like.
  • the communication control unit 430 is mainly means for controlling communication between the user terminals 10 and 20 and the data center 300.
  • the input / output control IF unit 440 includes an input unit 410, an output unit 420,
  • the communication control unit 430, the storage unit 450, and the control unit 460 are means for controlling data input / output.
  • the storage unit 450 is a storage unit that stores data and programs necessary for various processes by the control unit 460. As particularly related to the present invention, as shown in FIG. Information 450a and service usage log information 450b are provided.
  • the audit management information 450a is data in which a plurality of pieces of audit information transmitted from the user terminals 10 and 20 operated by the auditor are recorded.
  • FIG. 16 is a diagram illustrating an example of the data structure of the audit management information 45 Oa according to the second embodiment. As shown in the figure, the audit management information 450a records a plurality of audit information.
  • the service usage log information 450b is a service pronoidae for verifying the legitimate charge billing when the data center 300 administrator charge is charged to the service provider 400 administrator. Data output to 400.
  • the data structure of the service usage log information 45 Ob is the same as that of the service usage log information 150a (see FIG. 4) described in the first embodiment!
  • the control unit 460 is a control means that has an internal memory for storing programs and control data that define various processing procedures, and executes various processes by these, and is closely related to the present invention. As shown in FIG. 15, a decryption processing unit 460a, a signature verification unit 460b, a log information verification unit 460c, and a digest value verification unit 460d are provided. [0097] When the decryption processing unit 460a acquires the audit information (encrypted audit information) from the user terminals 10, 20 (or the input unit 4 10) operated by the auditor, the acquired audit information Is a processing unit that decrypts the audit information and stores the decrypted audit information in the audit management information 450a.
  • the decryption processing unit 460a acquires the audit information (encrypted audit information) from the user terminals 10, 20 (or the input unit 4 10) operated by the auditor
  • the acquired audit information Is a processing unit that decrypts the audit information and stores the decrypted audit information in the audit management
  • the decryption processing unit 460a decrypts the service usage log information (encrypted service usage log information) output from the data center 300, and uses the decrypted service usage log information as the service usage log information 450b. Is stored in the storage unit 450.
  • the signature verification unit 460b is a processing unit that acquires the electronic signature data attached to the audit information and determines whether the audit information has been tampered with using a public key encryption method or the like. . For example, the signature verification unit 460b creates a message digest from the audit information, decrypts the electronic signature data with the public key, and decrypts the message digest created from the audit information and the electronic signature data. In comparison, if both message digests do not match, it is determined that the audit information has been tampered with. If the signature verification unit 460b determines that the audit information has been falsified, the signature verification unit 460b deletes the falsified audit information from the audit management information 450a, and displays information indicating that the audit information has been falsified. Output to the output unit 420.
  • the log information verification unit 460c is a processing unit that compares the audit management information 450a with the service usage log information 450b to determine whether the service usage log information 450b has been tampered with.
  • FIG. 17 is an explanatory diagram for explaining the process performed by the log information verification unit 460c according to the second embodiment.
  • the log information verification unit 460c determines whether there is any contradiction in the IP address of the service usage log information 450b (in advance, the log information verification unit 460c determines the IP address (service provision target If the IP address other than the IP address to be used exists in the service usage log information 450b, it is determined that there is a contradiction in the IP address).
  • the log information verification unit 460c outputs that fact to the output unit 420.
  • the log information verification unit 460c compares the audit management information 450a with the service usage log information 45 Ob, and data corresponding to the audit information of the audit management information 450a is included in the service usage log information 450b. It is determined whether or not.
  • the log information verification unit 460c When the data corresponding to the audit information in the information 450a is not included in the service usage log information 450b, it is determined that the service usage log information 450b has been tampered with, and the fact is output to the output unit 420.
  • the log information verification unit 460c compares the audit management information 450a with the service usage log information 450b, and generates the access in the service usage log information 450b corresponding to the audit information access occurrence time and the audit information. A difference with time is calculated, and when the calculated difference is equal to or greater than a specified value, it is determined that the service usage log information 450b has been tampered with, and a message to that effect is output to the output unit 420. For example, when the accumulated access count is used as a key, the access occurrence time of the audit information for the accumulated access count “5802 2” is “August 1, 2006 10: 18: 18.015 seconds”.
  • the access occurrence time in the service usage log information 450b corresponding to the audit information is the access occurrence time corresponding to the cumulative access count “58022” in the service usage log information 450b “10:18 on August 1, 2006 18. 015 seconds ", the difference between the access occurrence times of both is calculated, and the calculated difference is compared with the specified value.
  • the log information verification unit 460c compares the audit management information 450a with the service usage log information 450b and determines whether or not the accumulated access count of the service usage log information 450b is appropriate. For example, the log information verification unit 460c compares the IP address corresponding to the accumulated access count of the audit information with the IP address corresponding to the accumulated access count of the service usage log information 450b, and whether or not both IP addresses match. Determine whether. If the IP addresses do not match, the log information verification unit 460c determines that the service usage log information 450b has been tampered with, and outputs that fact to the output unit 420.
  • the log information verification unit 460c provides a predetermined IP address in the service usage log information 450b.
  • IP address of the user terminal operated by the auditor is equal to the number of audit accesses (number of times the auditor has operated the user terminal and made a service request to the data center 300) If they are not equal, it is determined that the service usage log information 450b has been tampered with and the fact is output to the output unit 420. It is assumed that the log information verification unit 460c obtains in advance information such as the IP address of the user terminal operated by the auditor and the number of times of audit access by the input unit 410 and holds the information that is helpful.
  • the digest value verification unit 460d includes the digest included in the audit information of the audit management information 450a. This is a processing unit that compares the service service log information 450b with the digest value calculated from the service use log information 450b and determines whether or not the service use log information 450b has been tampered with. Specifically, the processing performed by the digest value verification unit 460d will be described with reference to FIG. 17.Firstly, the digest value verification unit 460d obtains the digest value of the audit information, and calculates the cumulative access count included in the digest value. Extract information. Taking the audit information shown in the second row of Fig. 17 as an example, the digest value of the strong audit information is extracted. The total number of accesses is “580 26”.
  • the digest value verification unit 460d obtains a predetermined number of past information from the service usage log information 450b starting from the extracted accumulated access count “58026” (for example, the accumulated access count “58022 to 58026”). ”).
  • the section of information acquired by the digest value verification unit 460d from the service usage log information 450b is matched with the section of information acquired by the service usage log information 350a when the digest value calculation unit 360d calculates the digest value. It is assumed that the information acquisition range (predetermined number) is set beforehand. As described above, when the information corresponding to “58022 to 58026” in the service usage log information 450b is acquired with the accumulated access count “58026” as the starting point, the predetermined number is 5.
  • the digest value verification unit 460d uses the information acquired from the service usage log information 450b and the hash function (the same hash function as the hash function used by the digest value calculation unit 360d) and uses the digest value. And the calculated digest value is compared with the digest value included in the audit information of the audit management information 450a (excluding the cumulative access count included in the head part of the digest value), and the digest values of both match. Judge whether it is power or not. If the digest values do not match, the log information verification unit 460c determines that the service usage log information 450b has been tampered with, and outputs that fact to the output unit 420. The digest value verification unit 460d repeatedly executes the above-described processing for each piece of audit information included in the audit management information 450a.
  • FIG. 18 is a flowchart of a process procedure performed when the data center 300 according to the second embodiment provides a service.
  • the providing unit 360a also receives the service request from the user terminal 10 (or the user terminal 20) (step S301), and starts providing the service to the user terminal of the service providing destination (step S302).
  • the service usage log information creation unit 360b measures the amount of work involved in service provision of the service provision unit 360a, creates service usage log information 350a (step S303), and the audit information management unit 360c Audit information is created (step S304).
  • the electronic signature creation unit 360e creates electronic signature data (step S305), the digest value calculation unit 360d calculates the digest value from the service usage log information 350a, and records the digest value in the audit information. (Step S306), the encryption processing unit 360f encrypts the audit information (Step S307), and the audit information management unit 360c provides electronically signed data and provides the encrypted audit information. Output to the previous user terminal (step S308).
  • the data center 300 creates audit information at the time of service provision, calculates the digest value, and outputs the audit information (including the digest value) to the user terminal that is the service provision destination. It is possible to prevent the service usage log information 350a from being altered by a certain person.
  • FIG. 19 is a flowchart showing the determination process performed by the service provider 400 according to the second embodiment.
  • the service provider 400 includes a storage unit after the decryption processing unit 460a obtains service usage log information (encrypted service usage log information) and decrypts the service usage log information.
  • the data is stored in 450 (Step S401), and the log information verification unit 460c determines whether or not there is a contradiction in the IP address of the service usage log information 450b (Step S402).
  • step S403, Yes If there is a contradiction in the IP address in the service usage log information 450b (step S403, Yes), information indicating that the service usage log information 450b is not appropriate is output to the output unit 420 ( Step S404). On the other hand, if there is no contradiction in the IP address (step S403, No), it is determined whether information corresponding to the audit information exists in the service usage log information 450b (step S405). [0113] If the information corresponding to the audit information does not exist in the service usage log information 450b (step S406, No), the process proceeds to step S404.
  • step S406 if the information corresponding to the audit information exists in the service usage log information 450b (step S406, Yes), the difference between the access occurrence time of the corresponding audit information and the access occurrence time of the service usage log information 450b is calculated. It is calculated (step S407), and it is determined whether or not the time difference is greater than or equal to a predetermined value (step S408).
  • step S409 If the time difference is greater than or equal to the predetermined value (step S409, Yes), the process proceeds to step S404. On the other hand, if the time difference is less than the predetermined value (step S409, No), it is determined whether or not the accumulated access count of the audit information is equal to the accumulated access count of the service usage log information 450b (step S410).
  • step S411, No If the accumulated access counts are not equal (step S411, No), the process proceeds to step S404. On the other hand, when the accumulated access count is equal (step S411, Yes), it is determined whether or not the number of predetermined IP addresses in the service usage log information 450b is equal to the audit access count (step S412).
  • step S413, No If the number of predetermined IP addresses in the service usage log information 450b is not equal to the number of audit accesses (step S413, No), the process proceeds to step S404. On the other hand, if the number of predetermined IP addresses in the service usage log information 450b is equal to the number of audit accesses (step S413, Yes), the digest value verification unit 460d uses the digest value from the service usage log information 450b. (Step S414), the digest value included in the audit information of the audit management information 450a is compared with the digest value calculated from the service usage log information 450b, and whether or not the digest values are equal. (Step S415).
  • step S416, No If the digest values are different (step S416, No), the process proceeds to step S404. On the other hand, if the digest values are equal (step S416, Yes), information indicating that the service usage log information is appropriate is output to the output unit 220 (step S417).
  • the digest value verification unit 460d calculates the digest value of the service usage log information 450b, and the digest value included in the audit information of the audit management information 450a Since the digest value calculated from the service usage log information 450b is compared, the legitimacy of the service usage log information 450b can be determined more accurately.
  • the service providing system is based on information in a predetermined area (predetermined period) among information recorded in the service usage log information by the data center 300.
  • the digest value is generated, and the audit information and the digest value are transmitted to the terminal that provides the service.
  • the service information 400 includes the audit information and the digest value, the service usage log information, and the digest value generated from the service usage log information.
  • the auditor transmits the audit information to the service provider 200.
  • a user terminal that is not limited to this may be automatically performed.
  • the user terminal that performs the audit may access the data center 100, and the user terminal may be configured to transmit the audit information output from the data center to the service provider 200.
  • the user terminal repeats access to the data center 100 at an interval shorter than the average time interval at which the user accesses the data center 100 (time interval equal to or less than a predetermined value). Unauthorized padding can be generated to prevent unauthorized use of service usage log information.
  • the data center 100 encrypts the audit information in response to the service request and transmits it to the user terminal.
  • the audit information is not limited to this. It can be embedded in information obtained by the user (for example, a created CAD file if the user is an online CAD service) and sent to the user terminal.
  • the audit information is not limited to this. It can be embedded in information obtained by the user (for example, a created CAD file if the user is an online CAD service) and sent to the user terminal.
  • the audit information is possible to prevent the general user from understanding the details of the audit information and solve the problem of information leakage.
  • FIG. 20 is a diagram showing a hardware configuration of a computer constituting the data center 100 or the service provider 200 shown in FIG. 2 (the data center 300 shown in FIG. 12 is! / Is the service provider 400).
  • This computer is an input device 30 that accepts input of data from the user, a monitor 31, a RAM (Random Access Memory) 32, a ROM (Read Only Memory) 33, and a medium reading that reads programs from various recording media.
  • Device 34, network interface 35 that exchanges data with other computers via the network, CPU (Central Processing Unit) 36, and HDD (Hard Disk Drive) 37 are connected via bus 38.
  • the input device 30 that accepts input of data from the user, a monitor 31, a RAM (Random Access Memory) 32, a ROM (Read Only Memory) 33, and a medium reading that reads programs from various recording media.
  • Device 34, network interface 35 that exchanges data with other computers via the network, CPU (Central Processing Unit) 36, and HDD (Hard Disk Drive) 37 are connected
  • the HDD 37 includes the data center 100 or the service provider 200 described above.
  • the HDD 37 stores various data 37a corresponding to the data stored in the storage unit of the data center 100 or the service provider 200 (data center 300 or service provider 400) described above.
  • the CPU 36 stores various data 37a in the HDD 37, reads the various data 37a from the HDD 37, stores the data 37a in the RAM 32, and executes data processing based on the various data 32a stored in the RAM 32.
  • the various programs 37b do not necessarily have the initial power stored in the HDD 37.
  • “portable physical media” such as a flexible disk (FD), CD—ROM, DVD disk, magneto-optical disk, IC card, etc.
  • Various programs 37b are stored in “fixed physical media” such as “other computers (or servers)” connected to the computer via public lines, the Internet, LAN, WAN, etc. Alternatively, the computer may read and execute the various programs 37b.
  • each device is functionally conceptual, and need not be physically configured as illustrated.
  • the specific form of distribution / integration of each device is not limited to the one shown in the figure, and all or a part thereof is functionally or physically distributed in an arbitrary unit according to various loads and usage conditions.
  • Can be integrated and configured.
  • each processing function performed in each device is realized by a program analyzed and executed by the CPU and the CPU, or as hardware by wired logic. Can be realized. Industrial applicability
  • the service provision method is useful for a service provision system in which a service provision device entrusted with service provision to a service provider provides a service to a user terminal, and in particular, provided by the service provision device. This is suitable when it is necessary to accurately determine the validity of the history information related to the service workload.

Landscapes

  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un centre de données (100) mesurant une quantité de travail de service fournie à un terminal d'un personnel de vérification qui vérifie la quantité de travail concernant le service fourni et un terminal d'un utilisateur général. Le centre de données enregistre les données de quantité de mots mesurées en tant qu'informations de journal d'utilisation de service, et fournit un service en réponse à une requête de service, une partie des informations de journal d'utilisation de service est transmise sous forme d'informations de vérification à un terminal en tant que destination de fourniture de service (le centre de données ne peut pas savoir si le terminal est celui d'un personnel de moniteur ou d'un utilisateur général). Un fournisseur de service (200) acquiert les informations de vérification et les informations de journal d'utilisation de service et compare les informations de vérification aux informations de journal d'utilisation de service de façon à déterminer si les informations de journal d'utilisation de service sont altérées.
PCT/JP2006/319362 2006-09-28 2006-09-28 Dispositif de fourniture de service, système de fourniture de service et procédé de fourniture de service WO2008038386A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2006/319362 WO2008038386A1 (fr) 2006-09-28 2006-09-28 Dispositif de fourniture de service, système de fourniture de service et procédé de fourniture de service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2006/319362 WO2008038386A1 (fr) 2006-09-28 2006-09-28 Dispositif de fourniture de service, système de fourniture de service et procédé de fourniture de service

Publications (1)

Publication Number Publication Date
WO2008038386A1 true WO2008038386A1 (fr) 2008-04-03

Family

ID=39229834

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/319362 WO2008038386A1 (fr) 2006-09-28 2006-09-28 Dispositif de fourniture de service, système de fourniture de service et procédé de fourniture de service

Country Status (1)

Country Link
WO (1) WO2008038386A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011022825A (ja) * 2009-07-16 2011-02-03 Nippon Telegr & Teleph Corp <Ntt> サービス提供システム、改ざんチェック方法および改ざんチェックプログラム
JP2015181045A (ja) * 2010-06-02 2015-10-15 ヴイエムウェア インクVMware, Inc. マルチ・テナント・クラウドにおける顧客仮想計算機の保護

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1139219A (ja) * 1997-07-18 1999-02-12 Fuji Xerox Co Ltd 被検証データ生成装置、データ検証装置及び被検証データ生成プログラムを記録した媒体
JP2002169909A (ja) * 2000-12-04 2002-06-14 Fujitsu Ltd 公開立証システム並びに閲覧アクセスログ記録サーバ,掲載アクセスログ記録サーバおよびデジタル署名サーバ並びに閲覧アクセス用情報端末
JP2002229943A (ja) * 2001-02-05 2002-08-16 Hitachi Ltd サービスレベル制御機構を有するトランザクション処理システム及びそのためのプログラム
JP2003143139A (ja) * 2001-11-07 2003-05-16 Fujitsu Ltd デジタルデータ記憶・検証プログラムおよびデジタルデータ記憶・検証方法
JP2004165761A (ja) * 2002-11-11 2004-06-10 Nec Corp 通信システム

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1139219A (ja) * 1997-07-18 1999-02-12 Fuji Xerox Co Ltd 被検証データ生成装置、データ検証装置及び被検証データ生成プログラムを記録した媒体
JP2002169909A (ja) * 2000-12-04 2002-06-14 Fujitsu Ltd 公開立証システム並びに閲覧アクセスログ記録サーバ,掲載アクセスログ記録サーバおよびデジタル署名サーバ並びに閲覧アクセス用情報端末
JP2002229943A (ja) * 2001-02-05 2002-08-16 Hitachi Ltd サービスレベル制御機構を有するトランザクション処理システム及びそのためのプログラム
JP2003143139A (ja) * 2001-11-07 2003-05-16 Fujitsu Ltd デジタルデータ記憶・検証プログラムおよびデジタルデータ記憶・検証方法
JP2004165761A (ja) * 2002-11-11 2004-06-10 Nec Corp 通信システム

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2011022825A (ja) * 2009-07-16 2011-02-03 Nippon Telegr & Teleph Corp <Ntt> サービス提供システム、改ざんチェック方法および改ざんチェックプログラム
JP2015181045A (ja) * 2010-06-02 2015-10-15 ヴイエムウェア インクVMware, Inc. マルチ・テナント・クラウドにおける顧客仮想計算機の保護

Similar Documents

Publication Publication Date Title
JP3905961B2 (ja) 臨時署名認証の方法及びそのシステム
JP4746233B2 (ja) データの使用を制限するトラステッドコンピューティングプラットフォーム
EP1529371B1 (fr) Surveillance d&#39;un contenu numerique fourni par un fournisseur de contenu sur un reseau
JP4806235B2 (ja) 権利管理を使用してロケーションプライバシを実施するシステムおよび方法
JP4818664B2 (ja) 機器情報送信方法、機器情報送信装置、機器情報送信プログラム
EP1434119A2 (fr) Procédé et appareil de gestion de licences
US20130114808A1 (en) System and method for providing an indication of randomness quality of random number data generated by a random data service
JPH10123950A (ja) データ検証方法、被検証データ生成装置およびデータ検証装置
JP2002259605A (ja) 情報処理装置及び方法、並びに記憶媒体
JP2010514000A (ja) 電子装置にプログラム状態データをセキュアに記憶するための方法
US20040133812A1 (en) Password recovery system
US20090025061A1 (en) Conditional peer-to-peer trust in the absence of certificates pertaining to mutually trusted entities
KR20040028086A (ko) 무선단말에서의 컨텐츠 저작권 관리 시스템 및 그 방법
JP5278495B2 (ja) 機器情報送信方法、機器情報送信装置、機器情報送信プログラム
JP5781678B1 (ja) 電子データ利用システム、携帯端末装置、及び電子データ利用システムにおける方法
JP4510392B2 (ja) 個人情報認証を行うサービス提供システム
WO2008038386A1 (fr) Dispositif de fourniture de service, système de fourniture de service et procédé de fourniture de service
KR100609701B1 (ko) 전자 거래 내역에 대한 프라이버시를 보호하는 거래 인증방법 및 시스템
JP5665592B2 (ja) サーバ装置並びにコンピュータシステムとそのログイン方法
JP2004140715A (ja) 電子文書管理方法及びシステム
JP2002229451A (ja) データ作成日時保証システム、データ作成日時保証方法、及びデータ作成日時保証プログラム
JP2008269544A (ja) 利用対象情報管理装置及び利用対象情報管理方法ならびにそのプログラム
TW200941996A (en) Using mobile device to construct a secure E-DRM method
JP2007096413A (ja) パケット記録支援装置、パケット記録支援方法、及びパケット記録支援プログラム
JP2005149011A (ja) データ処理装置および履歴検証方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06798410

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06798410

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP