WO2016181976A1 - Dispositif de transmission d'informations - Google Patents

Dispositif de transmission d'informations Download PDF

Info

Publication number
WO2016181976A1
WO2016181976A1 PCT/JP2016/063936 JP2016063936W WO2016181976A1 WO 2016181976 A1 WO2016181976 A1 WO 2016181976A1 JP 2016063936 W JP2016063936 W JP 2016063936W WO 2016181976 A1 WO2016181976 A1 WO 2016181976A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
transmission
publicly available
confidential
encryption
Prior art date
Application number
PCT/JP2016/063936
Other languages
English (en)
Japanese (ja)
Inventor
仁志 直江
Original Assignee
株式会社テイエルブイ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社テイエルブイ filed Critical 株式会社テイエルブイ
Publication of WO2016181976A1 publication Critical patent/WO2016181976A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • the present application relates to an information transmission apparatus, and more particularly, to an apparatus that transmits publicly available information and encrypted confidential information as a unit.
  • a conventional information transmission apparatus will be described using a wireless sensor.
  • the wireless sensor is attached to a living body that wirelessly communicates with an access point.
  • the wireless sensor measures the measurement target; and (B) extracts the temporal variation value of the measurement data measured in step (A).
  • (C) storing the fluctuation value in combination with a random number into a hash value and storing it as encryption key generation data of the wireless sensor stored in the encryption key generation data storage unit; and (D) storing the encryption key generation data A step of generating an authentication message and an encryption key by a combination;
  • the measurement data obtained by extracting the fluctuation value of the measurement data measured by the wireless sensor is used as a common key at the time of authentication, and the measurement data of the wireless sensor is a value unique to the sensor and includes a fluctuation element. Cannot be deciphered (see Patent Document 1).
  • the conventional wireless sensor described above has the following points to be improved.
  • a hash value generated by combining a temporal variation value of measured measurement data and a random number is stored as encryption key generation data, and an encryption key generated by combining already stored encryption key generation data Is used to encrypt the newly generated encryption key generation data and transmit it.
  • past encryption key generation data is required in order to encrypt the latest encryption key generation data, that is, the temporal variation value of the measurement data.
  • past encryption key generation data is required.
  • an access point that receives and decrypts encrypted data For this reason, there is an obvious point that when past encryption key generation data is lost, there is a case where decryption cannot be performed. This is a point to be improved particularly when data is easily lost during data transmission and reception, such as wireless communication.
  • an object of the present application is to provide an information transmission device that reduces loss due to information loss during communication while strongly encrypting confidential information.
  • An information transmitting apparatus includes publicly available information acquisition means for acquiring publicly available information that can be disclosed to a third party, confidential information acquisition means for acquiring confidential information to be kept confidential to a third party, and the publicly available information Using the encryption means for generating the encrypted confidential information obtained by encrypting the confidential information, the transmission information generating means for generating the transmission information in which the publicly available information and the encrypted confidential information are integrated, and the transmission information. Transmitting means for transmitting.
  • the encryption unit further acquires information associated with the publicly available information in the transmission information as additional information for encryption, and the acquired additional information for encryption together with the publicly available information. And generating the encrypted confidential information.
  • the encryption unit further acquires information that can uniquely identify the information transmission apparatus as additional information for encryption, and uses the acquired additional information for encryption together with the publicly available information. Generating the encrypted confidential information.
  • An information transmission program is an information transmission program for causing a computer to function as an information transmission device, and the information transmission program is a disclosure for obtaining publicly available information that can be disclosed to a third party.
  • Possible information acquisition means confidential information acquisition means for acquiring confidential information to be confidential to a third party, encryption means for generating encrypted confidential information obtained by encrypting the confidential information using the publicly available information, It functions as transmission information generation means for generating transmission information in which the publicly available information and the encrypted confidential information are integrated, and transmission means for transmitting the transmission information.
  • the “information transmitting apparatus” in the claims corresponds to “information transmitting apparatus 100”, “information transmitting apparatus 200”, or “information transmitting apparatus 300” in the embodiments.
  • the “publicly available information acquisition unit” in the claims corresponds to “CPU 100a”, “memory 100b”, and “HDD 100c”.
  • the “confidential information acquisition unit” in the claims corresponds to “CPU 100a”, “memory 100b”, and “HDD 100c”.
  • Encryption means” in the claims corresponds to “CPU 100a” and “memory 100b”.
  • Transmission information generation means” in the claims corresponds to “CPU 100a” and “memory 100b”.
  • “Transmission means” in the claims corresponds to “CPU 100a” and “wireless communication circuit 100h”.
  • FIG. 5 is a flowchart of information transmission processing of the information transmission apparatus 100. It is a figure which shows the outline
  • FIG. It is a flowchart of the information transmission process of the information transmission apparatus 200 which is one Example of the information transmission apparatus which concerns on this application. It is a figure which shows the outline
  • FIG. It is a flowchart of the information transmission process of the information transmission apparatus 300 which is one Example of the information transmission apparatus which concerns on this application.
  • 6 is a diagram illustrating an outline of information transmission processing of the information transmission device 300.
  • the configuration of the information transmitting device 100 will be described with reference to FIG.
  • the information transmitting apparatus 100 includes a CPU 100a, a memory 100b, a hard disk drive 100c (hereinafter referred to as HDD 100c), and a wireless communication circuit 100h. Further, a keyboard 100d, a mouse 100e, a display 100f, and an optical drive 100g are connected to the information transmitting apparatus 100.
  • the CPU 100a performs processing based on other applications such as an operating system (OS) and an information transmission program recorded in the HDD 100c.
  • the memory 100b provides a work area for the CPU 100a.
  • the HDD 100c records and holds an operating system (OS), other application programs such as an information transmission program, and various data.
  • the wireless communication circuit 100h transmits / receives information to / from an external communication device by wireless communication.
  • the keyboard 100d and the mouse 100e accept external commands.
  • the display 100f displays an image such as a user interface.
  • the optical drive 100g reads an information transmission program from an optical medium 100p (not shown) in which an information transmission program is recorded, and reads other application programs from other optical media. Read data from.
  • Second Information Transmitting Device 100 The operation of the information transmitting device 100 will be described with reference to the flowchart shown in FIG.
  • the CPU 100a of the information transmitting apparatus 100 acquires the publicly available information stored in the memory 100b or the HDD 100c (S203).
  • the CPU 100a acquires confidential information associated with the publicly available information acquired in step S203 (S205). It is stored and held in the memory 100b or the HDD 100c.
  • the information that can be disclosed means information that the user has already disclosed to a third party, or information that can be disclosed to a third party in the future.
  • confidential information refers to information that a user wants to keep secret from a third party. Note that one publicly available information and one secret information are associated with each other and stored in the HDD 100c.
  • the CPU 100a generates an encryption key using the acquired publicly available information (S207).
  • the CPU 100a encrypts the confidential information using the generated encryption key, and generates the encrypted confidential information (S209).
  • a predetermined encryption key generation algorithm and encryption algorithm set in advance can be used for generation of the encryption key and encryption of the secret information.
  • shared key cryptosystem DES, TripleDES, RC2, or Rijndael, public key cryptosystem DSA, RSA, or the like can be used.
  • the CPU 100a generates transmission information in which the publicly available information acquired in step S203 and the encrypted confidential information generated in step S209 are integrated (S211).
  • the CPU 100a transmits the generated transmission information to a predetermined communication device (S213).
  • the receiving device that receives the transmission information extracts publicly available information from the received transmission information, generates a decryption key, and decrypts the encrypted confidential information by using the generated decryption key. get.
  • a decryption key generation algorithm corresponding to the encryption key generation algorithm used in the information transmission process in the information transmission apparatus 100 is used.
  • the generated decryption key can be decrypted as a common key
  • the generated decryption key can be decrypted as a public key.
  • an encryption key K11 is generated through a predetermined encryption key generation algorithm.
  • encrypted secret information D15 obtained by encrypting the secret information D13 is generated.
  • Transmission information D17 to which headers and footers necessary for transmission are added is generated after the publicly available information D11 and the encrypted confidential information D15 are integrated.
  • the confidential information can be acquired only by receiving one transmission information.
  • the loss due to the loss of one transmission information at the time of transmission / reception of information can be limited to only the confidential information included in one transmission information. it can.
  • the information transmission apparatus 100 generates the encryption key using the publicly available information, but the information transmission apparatus 200 according to the present embodiment transmits the publicly available information and the encrypted confidential information.
  • an encryption key is generated using information associated with publicly available information, for example, a sequence number that specifies the transmission order of transmission information including publicly available information.
  • symbol is attached
  • the configuration of the information transmitting device 200 is the same as that of the information transmitting device 100 according to the first embodiment (see FIG. 1).
  • Second Information Transmitting Device 200 The operation of the information transmitting device 200 will be described with reference to the flowchart shown in FIG.
  • the CPU 100a of the information transmission apparatus 200 acquires the publicly available information stored in the memory 100b or the HDD 100c (S203). Further, the CPU 100a determines the sequence number of the transmission information for transmitting the publicly available information and the encrypted confidential information (S401). Generally, when generating transmission information, the sequence number of the transmission information is determined, but the information transmitting apparatus 200 encrypts the confidential information in more detail before generating the transmission information. Before that, the sequence number of the transmission information for transmitting the publicly available information and the encrypted confidential information is determined. The CPU 100a acquires the sequence number assigned to the transmission information to be generated as additional information for encryption (S403).
  • step S203 the confidential information associated with the publicly available information acquired in step S203 is acquired (S205).
  • the CPU 100a of the information transmitting apparatus 200 uses the header including the sequence number acquired in step S401 when generating transmission information in step S211.
  • FIG. 5 schematically showing the information transmission processing of the CPU 100a of the information transmission apparatus 200 shown in FIG. 4 from the viewpoint of information to be transmitted.
  • an encryption key K21 is generated through a predetermined encryption key generation algorithm.
  • encrypted confidential information D25 obtained by encrypting the confidential information D13 is generated.
  • the transmission information D27 to which the header including the sequence number Seq, the footer, and the like are added is generated after the publicly available information D11 and the encrypted confidential information D25 are integrated.
  • the encryption key generation can be made more complex by generating the encryption key using not only the publicly available information but also the additional information for encryption that is other information included in the transmission information. Decryption of confidential information can be made more difficult.
  • the information transmitting apparatus 200 generates an encryption key by using, as additional information for encryption, a sequence number that specifies a transmission order for transmission information including publicly available information.
  • the information transmission device 300 is information that can be uniquely identified between the information reception device that receives the transmission information and the information transmission device 300, for example, specifically, a device identification number that uniquely identifies the information transmission device (for example, information transmission)
  • the encryption key is generated using the MAC address of the device as additional information for encryption.
  • symbol is attached
  • the configuration of the information transmitting device 300 is the same as that of the information transmitting device 100 in the first embodiment (see FIG. 1).
  • Second Information Transmitting Device 300 Operation of Second Information Transmitting Device 300 The operation of the information transmitting device 300 will be described with reference to the flowchart shown in FIG.
  • the CPU 100a of the information transmitting apparatus 300 acquires the publicly available information in step S203, and then acquires the apparatus identification number assigned to the generated transmission information as additional information for encryption (S403). Note that when generating the transmission information in step S211, the CPU 100a uses the publicly available information acquired in step S203 and the encrypted confidential information generated in step S209, as in the information transmitting apparatus 100 in the first embodiment. Integrated transmission information is generated (S211).
  • the information receiving device that receives the transmission information stores the device identification number of the information transmitting device 300 that transmits the transmission information in advance in the HDD 100c (see FIG. 1), and uses this device identification number for decrypting the encrypted confidential information. It is comprised so that it can be used.
  • FIG. 7 schematically showing from the viewpoint of information to be transmitted.
  • an encryption key K31 is generated through a predetermined encryption key generation algorithm.
  • encrypted secret information D35 obtained by encrypting the secret information D13 is generated.
  • Transmission information D37 to which a header, a footer, and the like are added is generated after integrating publicly available information D11 and encrypted confidential information D35.
  • the generation of the encryption key can be made more complicated by generating the encryption key by using not only the publicly available information but also the device identification number of the information transmitting device as additional information for encryption. Can be made more difficult.
  • a plurality of publicly available information may be associated with one secret information.
  • the confidential information may be encrypted with any publicly available information.
  • the sequence number included in the transmission information is used as the additional information for encryption.
  • the information is limited to the illustrated example.
  • time information can be used as additional information for encryption.
  • device identification that uniquely identifies the information transmission device 300, which is information that can be uniquely identified between the information transmission device and the information reception device that receives the transmission information.
  • the information is not limited to the illustrated example as long as the information can be uniquely specified between the information transmitting apparatus and the information receiving apparatus that receives the transmission information.
  • the information transmission time that is predetermined and synchronized between the information transmission device and the information reception device may be used.
  • the device identification number used as the additional information for encryption is stored in each of the information transmitting device 300 and the information receiving device that receives the transmission information, but is not included in the transmission information, even if it is included in the transmission information. You may do it.
  • the publicly available information and the confidential information are configured to be acquired from the memory 100b or the HDD 100c.
  • a sensor or other communication device is used. Thus, it may be directly acquired from the outside.
  • the CPU 100a is used to execute the processing of the flowchart shown in FIG. 2, but the flowchart shown in FIG. 2 is used using a dedicated and general-purpose logic circuit. You may make it perform the process of. The same applies to Example 2 and Example 3.

Abstract

L'objectif de la présente invention est de pourvoir à un dispositif de transmission d'informations grâce auquel des pertes résultant de l'altération des informations au cours d'une communication sont réduites, tandis que des informations confidentielles sont chiffrées de manière robuste. Une clé de chiffrement K11 est générée au moyen d'un algorithme de génération de clé de chiffrement prescrit, à l'aide d'informations publiables D11. Des informations confidentielles chiffrées D15, dans lesquelles des informations confidentielles D13 ont été chiffrées, sont générées au moyen de la clé de chiffrement K11. Les informations publiables D11 et les informations confidentielles chiffrées D15 sont intégrées, et un en-tête et un pied de page, par exemple, nécessaires à la transmission, sont ajoutés à celles-ci pour générer des informations de transmission D17.
PCT/JP2016/063936 2015-05-12 2016-05-11 Dispositif de transmission d'informations WO2016181976A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015097785 2015-05-12
JP2015-097785 2015-05-12

Publications (1)

Publication Number Publication Date
WO2016181976A1 true WO2016181976A1 (fr) 2016-11-17

Family

ID=57248074

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2016/063936 WO2016181976A1 (fr) 2015-05-12 2016-05-11 Dispositif de transmission d'informations

Country Status (1)

Country Link
WO (1) WO2016181976A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020178154A (ja) * 2019-04-15 2020-10-29 株式会社カシカ 情報処理装置、システム及びプログラム

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5764766A (en) * 1996-06-11 1998-06-09 Digital Equipment Corporation System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same
JP2005286844A (ja) * 2004-03-30 2005-10-13 Hitachi Ltd 映像コンテンツ配信/再生システム及び映像コンテンツ配信/再生方法
JP2006109428A (ja) * 2004-09-10 2006-04-20 Hitachi Kokusai Electric Inc 暗号化方法及びデータ配信システム及び暗号化装置及びデータ蓄積配信装置
JP2008104040A (ja) * 2006-10-20 2008-05-01 Fujitsu Ltd 共通鍵生成装置および共通鍵生成方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5764766A (en) * 1996-06-11 1998-06-09 Digital Equipment Corporation System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same
JP2005286844A (ja) * 2004-03-30 2005-10-13 Hitachi Ltd 映像コンテンツ配信/再生システム及び映像コンテンツ配信/再生方法
JP2006109428A (ja) * 2004-09-10 2006-04-20 Hitachi Kokusai Electric Inc 暗号化方法及びデータ配信システム及び暗号化装置及びデータ蓄積配信装置
JP2008104040A (ja) * 2006-10-20 2008-05-01 Fujitsu Ltd 共通鍵生成装置および共通鍵生成方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020178154A (ja) * 2019-04-15 2020-10-29 株式会社カシカ 情報処理装置、システム及びプログラム

Similar Documents

Publication Publication Date Title
US10015159B2 (en) Terminal authentication system, server device, and terminal authentication method
JP6495629B2 (ja) 情報処理システム、読出装置、情報処理装置、および、情報処理方法
RU2017131640A (ru) Управление конфиденциальной связью
EP2538366B1 (fr) Génération de clé secrète de dispositif sécurisé
CN102880836A (zh) 安全装置
US9692770B2 (en) Signature verification using unidirectional function
WO2019127265A1 (fr) Procédé d'écriture de données basé sur un contrat intelligent de chaîne de blocs, et dispositif et support de stockage
CA2613289A1 (fr) Generation d'une cle secrete a partir d'une cle privee asymetrique
JP2015045674A (ja) 暗号化システム、暗号化方法及びコンピュータプログラム
JP6930053B2 (ja) 装置認証キーを利用したデータ暗号化方法およびシステム
KR101424972B1 (ko) 모바일 카드를 이용한 컨텐츠 사용 방법, 호스트 장치, 및모바일 카드
TW201926216A (zh) 設備資料處理方法及系統
JP4684714B2 (ja) ファイル管理システム、及びプログラム
JP2016019233A (ja) 通信システム、通信装置、鍵管理装置、及び通信方法
US11411715B2 (en) System and method for generating scalable group key based on homomorphic encryption with trust server
US9038194B2 (en) Client-side encryption in a distributed environment
WO2016181976A1 (fr) Dispositif de transmission d'informations
JP2017108237A (ja) システム、端末装置、制御方法、およびプログラム
KR101808313B1 (ko) 데이터 암호화 방법
WO2019032580A1 (fr) Appareil et procédé d'encapsulation de clés privées de certificat de profil ou d'autres données
US20220350897A1 (en) Encryption Method and Encryption System
US11757624B2 (en) Data transfer control device, data transfer control system, and data transfer control method
JP5792573B2 (ja) 相互認証システム及び相互認証方法
JP6717730B2 (ja) 端末装置、鍵提供システム、鍵提供方法及びコンピュータプログラム
JP2007325038A (ja) 画像処理装置およびその方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16792701

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16792701

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP