WO2018088475A1 - Electronic authentication method and program - Google Patents

Electronic authentication method and program Download PDF

Info

Publication number
WO2018088475A1
WO2018088475A1 PCT/JP2017/040432 JP2017040432W WO2018088475A1 WO 2018088475 A1 WO2018088475 A1 WO 2018088475A1 JP 2017040432 W JP2017040432 W JP 2017040432W WO 2018088475 A1 WO2018088475 A1 WO 2018088475A1
Authority
WO
WIPO (PCT)
Prior art keywords
computers
data
authentication
user
terminal
Prior art date
Application number
PCT/JP2017/040432
Other languages
French (fr)
Japanese (ja)
Inventor
誠 武宮
岡田 隆
武至 米津
Original Assignee
ソラミツ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ソラミツ株式会社 filed Critical ソラミツ株式会社
Priority to JP2018550251A priority Critical patent/JP7114078B2/en
Publication of WO2018088475A1 publication Critical patent/WO2018088475A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to electronic authentication, particularly when an individual or an organization that has been verified in relation to one operator requires authentication for identification in relation to another operator.
  • the present invention relates to a technique used for authentication of identity verification for another operator by using the fact that has been verified in relation to one operator.
  • Patent Document 1 discloses a system in which a user can confirm the reliability of a website that provides various electronic authentication services on a screen.
  • the certificate authority that is an institution that issues an electronic certificate is a single organization or organization, or has a multiple configuration in which a root certificate authority and an intermediate certificate authority exist on the certification path.
  • the latter in order from the issuing certificate authority, goes to the upper certificate authority that is authenticating the certificate authority, the higher certificate authority, etc., and finally takes the authentication procedure to reach the root certificate authority.
  • the certificate authority in the case of a certificate authority that is a single organization or group, it is natural that the certificate authority implements the overall function, but even if it is composed of a root certificate authority and an intermediate certificate authority, one One certificate authority still has central control and management. In other words, although each CA in the certification path has successively taken over the certification by other CAs, it operates in a collaborative system with multiple independent CAs simultaneously performing authentication processing in each local authentication. It has not been done.
  • the conventional centrally managed certificate authority cannot issue an electronic certificate during a time period when the certificate authority server or the like is not operating, so that a user who wants to issue an electronic certificate has a limited use time. It will be. Even if the system can be operated 24 hours a day, it may be necessary to perform server maintenance regularly, or an unexpected system down may occur due to various factors. It will not be a service. In the case of a certificate authority composed of a central management type, it is not possible to provide a service that can obtain an electronic certificate at any time.
  • some digital certificates that are issued include personal information (for example, basic information on name, address, date of birth, and gender).
  • personal information for example, basic information on name, address, date of birth, and gender.
  • Personal Information Protection Law Personal Information Protection Law
  • the information server owned and managed by the national government, local government itself, and private companies has taken measures to prevent unauthorized intrusion by the Service-to-Self.
  • the certificate authority is able to provide personal information as can be understood from the fact that there is no end to the news that information leakage could not be completely prevented as a result. In the current situation, it is not possible to guarantee that no leakage or tampering will occur.
  • DLT distributed ledger technology
  • Permissionless / Permissioned Permissionless / Permissioned
  • a typical example of data disclosure in a public permissionless transaction is a block chain for cryptocurrency (bitcoin).
  • Bitcoin cryptocurrency
  • “Ripple” is intended for Permissioned networks where network participation qualifications (especially data approvers), those who issue transactions, and those who read data from the API are limited to reliable node terminals. It is a mechanism called “Hyperledger”. For these, see below. https://ripple.com/files/ripple_consensus_whitepaper.pdf, and http://www.linuxfoundation.org/news-media/announcements/2017/02/linux-foundation -s-hyperledger-project-announces-30-founding.
  • One of the features of distributed ledger technology is that it is based on a decentralized peer-to-peer (P2P) network without relying on verification at specific servers to determine the legitimacy of transactions and actions. It is a point. When it is recognized that there is no inconsistency in any ledger for new transactions, etc., because each terminal manages the same ledger rather than a specific server managing the ledger for transactions, etc. Only in the management configuration, it is recognized as a regular transaction to be added to each ledger. For example, even if a certain terminal is attacked and the distributed ledger held by that terminal is tampered with by an unauthorized person, if it does not match the ledger of another terminal participating in the approver group on the network, It will be rejected. Without agreement from a certain number of terminals participating in the approver group on the network, the integrity of the distributed ledger will be lacking and will not be recorded as legitimate data. By making the network connection of each terminal P2P type, security management is distributed and reliability is improved.
  • P2P peer-to-
  • the distributed ledger technology requires that the data held by each terminal be completely the same throughout the network, while maintaining the local circumstances at each terminal, that is, the existing system configuration, transaction processing procedure, and contents. It also has the flexibility of not requiring any changes. Accordingly, the distributed ledger technology has begun to attract attention as one of the excellent means as a means for distributing security and high reliability while maintaining the independence of each terminal.
  • an object of the present invention is to provide a technique for performing electronic authentication based on a distributed ledger technique in order to solve the above-described various problems related to electronic authentication.
  • a program and method for information sharing is a program for performing authentication processing using a plurality of computers connected on a network, and is included in the plurality of computers.
  • One computer in response to a user registration request, outputs data including information identifying an individual or an organization on the network, and at least one other than the one computer included in the plurality of computers.
  • the above computers capture the data output on the network and execute the same calculation to obtain consensus between the computers, and the plurality of computers store the data in their recording media.
  • an arbitrary computer included in the plurality of computers When receiving a request for user authentication of a registered user from an entity or an individual, at least one of the plurality of computers determines whether the data is stored in its recording medium; When the data is stored, a process of transmitting a personal authentication report to an entity or an individual who requests the personal authentication is performed.
  • the data is stored in the same recording medium in each of the plurality of computers. Whether or not the consensus is formed is determined by whether or not there is a predetermined number or more of coincidence of calculation results by the computers.
  • a plurality of independent computers that can communicate via a network serve as a certificate authority, and whether or not an individual or an organization has a valid personally authenticated record is linked between computers. And prove it. For this reason, even if some computers of multiple independent computers fail due to arbitrary factors, the entire certificate authority is fault-tolerant so that it can always operate, so timely electronic authentication is always possible It becomes. If a conventional centrally-managed certificate authority guarantees 24-hour operation, costs for fault tolerance and redundant configuration are incurred. However, in the present invention, a plurality of computers are independently authenticated by the same user. Since the standard specification of the P2P type distributed ledger technology that presupposes sharing is distributed, a zero downtime certificate authority system can be constructed at a low cost.
  • the fact that a user (individual or organization) has already been authenticated is stored in a plurality of independent computers functioning as a certificate authority system because of the necessity of business of a certain business operator.
  • the fact that the person has already been authenticated is used for the person authentication required by another company.
  • the fact that the user has already been authenticated is trusted to complete the user authentication.
  • another business operator receives a report in which a valid personal authentication is recorded from the certificate authority system of the present invention, the other business operator will renew the same if it is a personal authentication within a valid period.
  • each of the plurality of computers in the present invention stores the fact that the identity has been confirmed, whether the confirmation content has been changed, etc. in time series as completely identical electronic certificate history data, and there is a discrepancy between the computers. The recording state without a mark is retained. For this reason, even if the history data is changed for an unauthorized purpose or the like in one computer included in a plurality of computers, the history data is changed if it is not the same as the history data in other computers included in the plurality of computers. Historical data will never be accepted as legitimate data.
  • History data that is not recorded and managed in a state where all the computers are in agreement is estimated to be not genuine (valid). Since it is virtually impossible for an unauthorized person to change history data on all computers at the same time, it is possible to eliminate the risk of falsification of the digital certificate, which is the fact that the individual has been authenticated. . Therefore, the electronic authentication processing according to the present invention can guarantee extremely high security.
  • a certificate authority for authenticating an individual is constructed by a plurality of computers, and the plurality of computers forms a consortium of a plurality of financial institutions having no centralized terminal. This is a P2P type network connection.
  • the plurality of computers are equal to each other, and will be described in detail later. However, the plurality of computers store data indicating the fact that the person has been confirmed, thereby distributing the same data.
  • user X has not yet registered his / her identity in authentication system 100.
  • user X makes an application for opening an account on the site of bank A via the Internet from his computer terminal, as in the past. Specifically, at least the name, address, date of birth, gender (hereinafter, these four pieces of information are referred to as “basic four information”) and the like necessary for opening an account are entered on the WEB screen.
  • the account establishment is completed through procedures such as submission of identity verification documents and address confirmation.
  • Bank A returns a predetermined ID and password to the user X.
  • mail is sent here for the purpose of address confirmation, it may be sent to the email address of user X.
  • the user X logs in to the A bank using this ID and password, confirms the balance, and executes a transaction.
  • the ID and password include both the case where it is the same as or different from the account number or the PIN code of ATM.
  • Bank A checks the personal information including the basic 4 information and the contents of the transmitted identity verification document, and performs the identity verification operation of user X. Specifically, it is determined that the basic 4 information can be identified as a real person by confirming the contents of the identity verification document, confirming the address, collating with the blacklist, etc. and permit the account transaction. If it is possible, the account of the user X is opened because the identity has been confirmed. As a result, the user X can confirm that the opening of the bank A account has been completed. The user X can log in to the bank A site using the ID and password sent from the bank A, and can start a so-called online transaction in which deposits / withdraws, transfers, and the like are performed via the Internet.
  • the present invention registers the fact that the bank A has verified the identity of the user X in the authentication system 100, so that banks other than the bank A, etc. It is characterized by the fact that the fact that the identity has been confirmed can be used when opening an account. Whether or not to register in the authentication system 100 is premised on an application from the user X, and can be registered in the authentication system 100 by executing a user registration application at any time after opening an account.
  • FIG. 1 is a flowchart showing a procedure for performing registration for using the authentication system 100.
  • the left part of FIG. 1 shows the process when registering the user X in the authentication system 100 for the first time in a time-series flow, and shows what data or signal is exchanged in each process on the right side of the flow.
  • data or signals are transmitted and received between the computer terminal (C1) of the user X, the mobile terminal (C2) of the user X such as a smartphone, the authentication terminal (A1), and the certificate authority terminal (Aall).
  • the authentication terminal (A1) corresponds to the terminal of bank A where the user X opened an account.
  • the certificate authority terminal (Aall) is a predetermined plurality of terminals that construct a distributed ledger technology (DLT) or a block chain in the authentication system 100.
  • the plurality of terminals function as a certificate authority, and, as will be described later, the bank A, that is, the authentication terminal (A1) receives a user registration request and requests the authentication system 100, which is a certificate authority, to register. become.
  • a document with a predetermined ID and password is returned to the user X as described above.
  • the user X desires to register with the authentication system 100, the user X first logs in by entering the ID and password assigned to the A bank site from the user PC (C1). (Refer to “1. User login” in FIG. 1). Next, since a user registration application button necessary for using the authentication service by the authentication system 100 is displayed on the login screen, the user X presses this button.
  • the authentication terminal (A1) which is a bank A terminal, issues a disposable random value called a nonce, attaches an electronic signature to the nonce, and transmits it to the user PC (C1) (FIG. (Refer to “2. Then, the user PC (C1) generates a QR code (registered trademark) using the received nonce and displays it on the screen. Since the electronic signature itself is a known technical matter, description thereof is omitted in this specification.
  • A1 signature (nonce) in the figure means a nonce with an electronic signature by the authentication terminal (A1).
  • the meaning of the description of the ## signature (**) transmitted and received in FIGS. 1 and 2A to 2B represents ** with an electronic signature by ##.
  • the purpose of issuing the nonce to the user X by the authentication terminal (A1) is to confirm that the user X requesting user registration truly performs the registration procedure in the subsequent procedure processing. If it is not sent back to the authentication terminal (A1), it is determined that the registration procedure is by a person other than the user X.
  • the user X performs a procedure for making the mobile terminal (smartphone or the like) usable in the authentication system 100.
  • the number of users who have at least one mobile terminal (C2) has increased, and the use of the mobile terminal (C2) enhances security by using two-step authentication, and it is also possible to enter and exit even when away from home. This is in order to meet the demand for personal authentication for money or money transfer.
  • a user registration application downloaded from a predetermined application site is activated on the mobile terminal (C2).
  • the user X who has received the nonce with the electronic signature of the authentication terminal (A1) by the user PC (C1) reads the QR code displayed on the screen of the user PC (C1) using the portable terminal (C2).
  • the QR code includes bank information related to bank A, and includes, for example, a connection address for connecting to bank A from the mobile terminal (C2).
  • the portable terminal (C2) receives the bank information from the read QR code and the nonce received by the user PC (C1) (see “3. QR code reading” in FIG. 1).
  • the QR code (registered trademark) may be displayed on a document in which a predetermined ID and password are described.
  • a key pair of a secret key and a public key is created by a user registration application (see “4. Key pair creation” in FIG. 1).
  • the secret key (C2 secret key) of the key pair is stored in the mobile terminal (C2).
  • the public key (C2 public key) of the key pair is transmitted to the authentication terminal (A1) which is the A bank.
  • the portable terminal (C2) gives an electronic signature using the C2 private key to the nonce and C2 public key received at the time of “3. QR code reading”.
  • the nonce with the electronic signature of the portable terminal (C2) and the C2 public key are transmitted to the authentication terminal (A1) (see “5. User public key transmission” in FIG. 1).
  • the authentication terminal (A1) verifies the electronic signature of the portable terminal (C2) using the received C2 public key. Only the C2 private key forming the key pair corresponds to the C2 public key. Therefore, if the electronic signature provided using the C2 private key can be confirmed by the C2 public key, it can be confirmed that the C2 public key is signed by the portable terminal (C2) that stores the C2 private key forming the key pair. Further, the authentication terminal (A1) receives a nonce in addition to the C2 public key, and whether this nonce is the same as the nonce issued by the authentication terminal (A1) at the time of “2. nonce transmission”. It is confirmed that the user X is a true user who desires user registration. If the identity of the nonce cannot be confirmed, it is rejected as a procedure by a person other than the user X.
  • the authentication terminal (A1) When the authentication terminal (A1) can confirm the authenticity of the user X requesting user registration, the authentication terminal (A1) then requests the certificate authority terminal (Aall) composed of a plurality of computers to perform user registration. 4 A hash value of information, an electronic signature is attached to the public key (A1 public key) of the authentication terminal (A1) and transmitted to the certification authority terminal (Aall) ("6. Registration with the certification authority" in FIG. 1) "reference). Furthermore, as an option, an expiration date that makes the validity of the user registration time-limited may be added and transmitted to the certificate authority terminal (Aall).
  • the authentication terminal (A1) is provided with basic 4 information from the user X at the time of opening an account, a hash operation is performed on the basic 4 information using a predetermined hash function, and a hash value is generated and transmitted. To do. Since the hash is a technical matter known to those skilled in the art, the description thereof is omitted in this specification.
  • the certificate authority terminal (Aall) has a data structure sometimes called so-called distributed ledger technology (DLT) or block chain, and the data sent from the authentication terminal (A1) is sent to each of the plurality of computers in the same manner.
  • DLT distributed ledger technology
  • the authentication terminal (A1) confirms whether it has been registered (refer to “7. Confirmation of Registration Result” in FIG. 1), and the certificate authority terminal (Aall) returns the confirmation result to the authentication terminal (A1) (FIG. 1). (See “8. Results of registration confirmation”).
  • the authentication terminal (A1) creates the encrypted data by encrypting the basic 4 information using the C2 public key received at the time of "5. User public key transmission”. Then, the authentication terminal (A1) gives its own electronic signature to the encrypted data and the public key (A1 public key) of the authentication terminal (A1) and transmits it to the portable terminal (C2) (“9” in FIG. 1). Refer to “Registering Basic 4 Information”). The reason why the encrypted data of the basic 4 information is created is to avoid the risk of unauthorized use or the like if the raw (plaintext) basic 4 information is wiretapped on the communication line.
  • the portable terminal (C2) verifies the electronic signature of the authentication terminal (A1) using the received A1 public key. Only the A1 private key forming the key pair corresponds to the A1 public key. Therefore, the portable terminal (C2) can confirm the correct communication from the authentication terminal (A1) by checking the electronic signature of the authentication terminal (A1) using the A1 private key with the A1 public key. . Further, the basic 4 information is decrypted with the C2 secret key stored by itself and registered in a safe area (for example, a key chain) other than the application data. Further, an expiration date may be registered as an option.
  • the authentication terminal (A1) transmits the registration result (may include basic 4 information and expiration date) to the user PC (C1) so that the fact of user registration does not contradict the mobile terminal (C2). (See “10. Registration result notification” in FIG. 1).
  • the user X is registered in the authentication system 100, and the user authentication service by the authentication system 100 can be used.
  • 2 (A) and 2 (B) are flowcharts showing the procedure of identity verification using the authentication system 100 when opening an account of B bank.
  • the request for the identity verification service by the authentication system 100 is premised on the application from the user X.
  • the application for the identity verification service can be performed from a PC terminal or a mobile terminal such as a smartphone. If the user X does not apply, a copy of the personal identification document is mailed or transmitted to the bank B as before, and the bank B verifies the personal information including the basic four information based on the personal identification document.
  • User X requests the opening of the bank B account from the user PC (C1) (see “1. V1 account opening request” in FIG. 2A).
  • a selection button for displaying whether or not to use the personal identification service using the authentication system 100 instead of the data transmission of the personal identification document is displayed.
  • the button used by the user X is selected, the authentication system 100 It is confirmed whether or not the user is registered. Since the identity verification service cannot be used unless the user is registered, an existing identity verification flow (that is, opening an account by submitting an identity verification document) is performed. If user registration is desired, user registration processing may be performed according to the procedure shown in FIG.
  • the verification terminal (V1) which is a terminal of the B bank issues a disposable random value called a nonce to the user X and verifies this.
  • the electronic signature of the terminal (V1) is given and transmitted to the user PC (C1) which is the terminal of the user X (see “2. nonce transmission” in FIG. 2A).
  • the user X who has received the nonce with the electronic signature of the verification terminal (V1) by the user PC (C1) receives the QR code displayed on the screen of the user PC (C1) as a portable terminal.
  • the QR code includes bank information related to the B bank, and includes, for example, a connection destination address for connecting to the B bank from the mobile terminal (C2).
  • the portable terminal (C2) receives the bank information and the nonce received by the user PC (C1) from the read QR code (see “3. QR code reading” in FIG. 2A).
  • the mobile terminal (C2) stores the C2 key pair (secret key, public key). Therefore, next, the portable terminal (C2) gives an electronic signature to the received nonce and C2 public key using the C2 private key.
  • the nonce with the electronic signature of the portable terminal (C2) and the C2 public key are transmitted to the verification terminal (V1) (refer to “4. User public key transmission” in FIG. 2A).
  • the verification terminal (V1) verifies the electronic signature of the portable terminal (C2) using the received C2 public key, and confirms the validity of the data transmitted from the portable terminal (C2). Furthermore, it is confirmed whether or not the user X is a true user who wishes to open a bank B account by confirming whether or not it is the same as the nonce issued at the time of “2. ⁇ nonce transmission ”. If the identity of the nonce cannot be confirmed, it is rejected as a registration procedure by a person other than the user X.
  • the verification terminal (V1) creates a temporary key pair (T secret key, T public key) (see “5. Temporary communication key creation” in FIG. 2A). This is because it is used for encryption when receiving basic four information from the user X.
  • the verification terminal (V1) attaches an electronic signature to the T public key of the temporary key pair and the issued nonce, and transmits it to the mobile terminal (C2) (see “6. Temporary Communication Key Transmission” in FIG. 2A). "reference).
  • the T secret key is stored in the verification terminal (V1).
  • the mobile terminal (C2) that has received the T public key encrypts the basic four information using the T public key and creates encrypted data. Then, the mobile terminal (C2) attaches an electronic signature to the encrypted data and the nonce, and transmits it to the verification terminal (V1) (see “7. Basic 4 information transmission” in FIG. 2A).
  • the verification terminal (V1) restores the basic 4 information to plaintext by decrypting the encrypted data using the stored T secret key, and then hashes the basic 4 information with a predetermined hash function (hash ( 4 information)). Next, the verification terminal (V1) transmits the hash (4 information) and the C2 public key to the certification authority terminal (Aall), and whether there is a fact that the user X is truly registered in the certification authority terminal (Aall). (See “8. Confirmation Request for Existing Registration” in FIG. 2B).
  • each of the plurality of computers in the certificate authority terminal (Aall) stores and manages the fact of user registration in the same recording medium.
  • the presence or absence of user registration is detected by searching the recording medium using the C2 public key as a search key. If a plurality of registrations are made for the same user, the latest registration is detected. This will apply to cases where the address or name has changed. Moreover, what is not expired should just be detected when it is registered including the expiration date.
  • the certificate authority terminal (Aall) has (i) that at least one computer (preferably a certain number of computers) constituting the certificate authority terminal (Aall) records the fact of the user registration.
  • the verification terminal (V1) considers that the identity has been obtained in the case of the result of the user registration, and opens the B bank account of the user X. In the case of the result without user registration, the bank B account is not opened (see “10. Open account with V1” in FIG. 2B).
  • the verification terminal (V1) issues a request for registering the fact that the user X has established the B bank account in the certificate authority terminal (Aall). For this registration, the verification terminal (V1) gives an electronic signature to the C2 public key, hash (4 information) that is hashed basic 4 information, and the public key (V1 public key) of the verification terminal (V1). To the certificate authority terminal (Aall). As an option, an expiration date for setting an expiration date of user registration, a date and time of registration, and the like may be included. Still another embodiment includes setting the expiration date to the expiration date of a driver's license or insurance card, or determining the registration date and time as, for example, one year. In response, the certification authority terminal (Aall) registers the received data (see “11. Registration with Certification Authority” in FIG. 2B).
  • the verification terminal (V1) confirms whether or not the registration is normally performed in the certification authority terminal (Aall), and the certification authority terminal (Aall) returns the confirmation result to the verification terminal (V1) (FIG. 2B). Refer to “12. Confirmation of registration result”.
  • the verification terminal (V1) transmits the report registered by the certificate authority terminal (Aall) to the mobile terminal (C2) (see “13. Registration completion report” in FIG. 2B).
  • An electronic signature of the verification terminal (V1) (and optionally an expiration date may also be included) may be attached to the public key of the verification terminal (V1) and transmitted to the mobile terminal (C2).
  • the mobile terminal (C2) Upon receiving the transmission from the verification terminal (V1), the mobile terminal (C2) verifies the electronic signature of the verification terminal (V1) using the public key of the verification terminal (V1) and encrypts it with its own C2 private key. Decrypt the data. Thereby, you may make it know that the account opening of B bank was registered into the certification authority terminal (Aall).
  • the verification terminal (V1) executes the key destruction that disables the temporary key pair (T secret key, T public key) (see “14. Temporary communication key destruction” in FIG. 2B). "reference). Then, the verification terminal (V1) transmits the registration result (basic 4 information and expiration date may also be included) to the user PC (C1), and the registration of the bank B account opening is performed with the portable terminal (C2). (Refer to "15. Registration result notification" in Fig. 2 (B))
  • the bank B does not request the user X to send a personal identification document as in the past, but the user X is already registered in the authentication system 100 for transactions with other businesses. Therefore, it is possible to process the identity verification work for each business operator instead of the identity verification work.
  • the authentication system 100 executes processing based on the distributed ledger technology.
  • One of the features of the distributed ledger technology is that a plurality of terminals participating in the network have the same book (that is, history data), and the information is always shared. Nodes (terminals) connected to the network in the P2P type store history data in a distributed manner.
  • the authentication system 100 is characterized in that it is premised that user data registered (stored) in each recording medium by a plurality of computers is the same data. .
  • FIG. 3 shows an example of the configuration of data registered by each computer in the certificate authority (Aall).
  • Registration with certificate authority includes the public key of the portable terminal (C2) and the basic four information of user X as shown in the left part of FIG. It includes a hash value, a public key of the authentication terminal (A1) that is A bank, and an expiration date as an option, and an electronic signature data group 31 of the authentication terminal (A1).
  • the data group 31 is not necessarily limited, and other data may be included as appropriate.
  • time stamp information at the time of storage may be included. This time stamp information may be both the date and time common to each computer of the certificate authority (Aall) or the date and time stored in each computer.
  • FIG. 3 shows an example of the data structure in which the fact that the user has been registered at the time of opening the bank A account and then requested the identity authority (Aall) to confirm the identity at the time of opening the bank B account is recorded.
  • This data structure conceptually represents a case where the data group 32 recorded at the time of the B bank is connected and recorded immediately after the data group 31 recorded at the time of the A bank. Since it is considered as a chain of such data groups, it is also called a so-called distributed ledger technology (DLT) or a block chain structure.
  • DLT distributed ledger technology
  • the data group 31 After the data group 31 is recorded, other user registrations performed by an arbitrary entity such as Bank A or Bank B are registered. Therefore, if data registration is represented in time series, Similar data related to the user Y will be recorded between the data group 31 and the data group 32.
  • the data group 31 and the data group 32 may have link information (for example, a pointer) indicating the storage address of each other, so that the stored data of the same person named the user X can be searched quickly.
  • Each computer in the certificate authority (Aall) stores the plurality of data groups in the same data configuration.
  • a leader may be selected at random, or may become a leader in order after a predetermined time has elapsed.
  • the computer that has become the leader instructs other computers to execute predetermined operations using the distributed ledger technology (DLT) or block chain data of the configuration shown in FIG. To do.
  • the predetermined operation is a mathematical calculation using the hash function H.
  • a public encryption technique based on an elliptic curve is used, and the hash function H to be used is 512-bit SHA3.
  • B is a set of basic points for forming a predetermined elliptic curve, and has an enormous number of elements.
  • A is also each element of set B that can be encoded into a 256-bit integer. Thus, since A is an element of set B, it is encoded into a 256-bit integer public key A that functions as a public key.
  • a signature can be generated by executing each of the steps. Further, (R, S) is a signature of the message M under the secret key K.
  • R ′ SB ⁇ H (R, A, M) A to verify the signature (R, S) for a given message M and public key A
  • R ′ R To verify.
  • FIG. 4A and FIG. 4B show a configuration example of the authentication system 100 using a plurality of computers described so far.
  • a plurality of certificate authority terminals Y (1) to Y (N) are connected to the network 3, and each of the terminals Y (1) to Y (N) records the same transaction data, and P2P
  • Terminals Y (1) to Y (N) surrounded by a dashed line indicate “a plurality of computers” recited in the claims.
  • a terminal Z (1) other than the terminals Y (1) to Y (N) may be included in the authentication system 100.
  • the terminals Y (1) to Y (N) and the terminal Z (1) indicate “a plurality of computers” described in the claims.
  • the terminal Z is not necessarily required to be single. Therefore, there may be a plurality of terminals Z corresponding to two or more third-party organizations.
  • the terminal Z (1) is in a third party position (for example, an organization that supervises a financial institution or a certification authority for the purpose of preventing the transfer of criminal proceeds, a company that provides an authentication service according to the present invention, etc.). It is a terminal that is positioned.
  • a series of data or transactions recorded in a plurality of computers as a distributed ledger makes it easy to trace whether the records have been falsified later, since past history records serve as evidence for showing personal authentication facts. It is unavoidable to reexamine past historical records because it is necessary to confirm the flow of information when legal matters require incidents related to information leakage or when auditing financial institutions.
  • a third-party organization such as terminal Z is included, even if the bank refuses, the transmission record can be checked by tracing the history of the recording medium of terminal Z, and a highly transparent system is constructed. can do.
  • bank A or bank B requests authentication of any of the terminals Y (1) to Y (N) of the certificate authority and requests the user to issue an electronic certificate.
  • Bank A and bank B may function as the terminal Y of the certificate authority.
  • the service provider is registered in advance in the authentication system 100 as a service provider, but the service provider functions as a computer constituting the certificate authority. There is no restriction in the present embodiment that it should not be done.
  • an authentication service provider for example, a financial institution of the present invention may be distinguished from a certificate authority.
  • a predetermined execution program is installed in the terminals Y (1) to Y (N) and the terminal Z, and each process according to the present invention is executed in each terminal by starting the execution program.
  • the execution program is such that the terminals Y (1) to Y (N) and the terminal Z can be downloaded from a predetermined site via a network, or installed from a CD or USB memory in which the execution program is stored.
  • the present invention relates to a program installed or loaded in a computer by downloading it through various recording media such as an optical disk such as a CD-ROM, a magnetic disk, and a semiconductor memory, or via a communication network, and the storage thereof. The medium is included in the scope of the invention.
  • the certificate authority system 100 is a P2P network that does not require a central management entity, and distributes data records among a plurality of computers. As a result, even if some computers are down, the entire system has fault tolerance so that a 24-hour operation system without downtime is realized. And since it is a distributed ledger technology (DLT) or block chain type data structure that is extremely difficult to be tampered with by unauthorized persons, it is possible to construct a highly secure system at low cost. In addition, since the basic 4 information that each computer records in its own recording medium is hashed instead of raw data, even if the basic 4 information is read from each computer, it may not be decoded. It has high security.
  • DLT distributed ledger technology
  • the present invention is not necessarily limited to authentication at a financial institution.
  • various fields such as medical care, communication, real estate, education, administration, logistics, insurance, voluntary contracts, Internet services, and sharing economy services are also included in the scope of the present invention.
  • the technical significance of the present invention is also exhibited when authentication is performed not only for personal information but also for information that can be defined as digital assets (for example, rights and value records) at any organization or organization.

Abstract

The purpose of the present invention is to provide a technology for simply and quickly executing electronic authentication. According to the present invention, a plurality of computers communicable with one another over a network serve as authentication stations, and the computers cooperate in certifying whether an individual or an organization has a valid record showing that the identity was authenticated. Therefore, the authentication stations have fault tolerance of being able to continuously operate as a whole even if some of the computers are down, so that timely electronic authentication can be executed at any time. Each of the computers stores and manages completely the same history data indicating whether an identity was confirmed, whether or not the contents of the data have been changed, and the like, and a state in which the data is matched among the computers is held. Only when agreement is built by the plurality of computers, registration of identity confirmation as valid data is allowed. Accordingly, the registered data can be used as reliable identity authentication information about a user.

Description

電子認証方法及びプログラムElectronic authentication method and program
 本発明は、電子認証に係り、特に、一の事業者との関係で本人確認済みがされている個人又は組織体が、他の事業者との関係でも本人確認の認証が必要な場合に、一の事業者との関係で記憶されている本人確認済みの事実を用いて他の事業者のための本人確認の認証に利用する技術に関する。 The present invention relates to electronic authentication, particularly when an individual or an organization that has been verified in relation to one operator requires authentication for identification in relation to another operator. The present invention relates to a technique used for authentication of identity verification for another operator by using the fact that has been verified in relation to one operator.
 従来、個人が銀行又は証券会社等の金融機関に口座を開設する場合や、インターネットを介してネット業者から物品やサービス等を購入する際には、少なくとも氏名、住所、生年月日等を含む個人情報及びその証明書が要求される。この個人情報が悪用された場合、プライバシー侵害につながるのみならず経済的損失の可能性もあるため、秘密情報として扱っている企業も多い。例えば、個人XがA銀行に口座を開設するためA銀行へ身元確認を示す個人情報及び証明書を提供し、その後にB銀行にも口座を開設するときは、同じように個人情報及び証明書を提供する必要がある。したがって、個人は各金融機関に対して本人確認手続きをしなければならないという手間が生じていた。 Conventionally, when an individual opens an account at a financial institution such as a bank or a securities company, or when purchasing goods or services from an internet company via the Internet, the individual including at least name, address, date of birth, etc. Information and its certificate are required. If this personal information is abused, it not only leads to privacy infringement, but there is also a possibility of economic loss, so many companies treat it as confidential information. For example, when an individual X provides personal information and a certificate showing identification to Bank A to open an account at Bank A, and then opens an account at Bank B, the personal information and certificate are the same. Need to provide. Therefore, it has been troublesome for individuals to carry out identity verification procedures for each financial institution.
 近年、証明書に関しては電子認証が普及しつつある。インターネット上の情報のやりとりは相手が誰なのか、別人がなりすまししていないか、交わした情報は信用できるものかといった懸念がある。そこで、電子認証局から発行される電子証明書を用いてなりすまし防止や情報の改ざんを防止する有効な一手段が、電子認証技術である。例えば、すでに、多くの都道府県では納税をはじめとする様々な行政手続き等において公的個人認証サービスが利用可能であり、電子証明書が使用されている。公的個人認証サービスはこれまで行政機関等に限られていたが、総務省は平成28年より、ID・パスワード方式よりも高いセキュリティレベルが要求される様々な民間サービスに対しても公的個人認証サービスを普及拡大させるよう推進している。最近では、金融機関等での口座開設時の個人情報及び証明書の提供に代わり、公的個人認証サービスによる電子証明書の利用が提案されはじめている。 In recent years, electronic authentication is becoming popular for certificates. There are concerns about the exchange of information on the Internet, such as who the other party is, whether another person is impersonating, and whether the information exchanged can be trusted. An effective means for preventing spoofing and falsification of information using an electronic certificate issued by an electronic certificate authority is an electronic authentication technique. For example, in many prefectures, public personal authentication services are already available for various administrative procedures including tax payment, and electronic certificates are used. The public personal authentication service has been limited to administrative organizations, etc., but since 2016, the Ministry of Internal Affairs and Communications has been a public individual for various private services that require a higher security level than the ID / password method. We are promoting the spread of certification services. Recently, instead of providing personal information and a certificate at the time of opening an account at a financial institution or the like, use of an electronic certificate by a public personal authentication service has begun to be proposed.
 上述した金融機関の口座開設のケースにおいて、従来では、個人情報を記入した口座開設申込書や本人確認書類を金融機関等に送付又は送信し、金融機関等が送られた書類を確認して、利用者カード等を書留郵便などで個人に返送するため、多くの時間及びコストがかかっていた。これに代わり、電子証明書を利用した手続きにすれば、口座開設の申込み後すぐに手続が開始され、コストもかなり安価に抑えることが期待できる。 In the case of the account opening of a financial institution described above, conventionally, an account opening application form in which personal information is entered or an identity verification document is sent or transmitted to the financial institution, etc., and the financial institution etc. confirms the sent document, It took a lot of time and money to return user cards, etc. to individuals by registered mail. Instead, if a procedure using an electronic certificate is used, the procedure can be started immediately after the application for opening an account, and the cost can be expected to be considerably reduced.
 公的個人認証サービスの他にも各電子認証サービス会社によって様々な種類の民間電子認証サービスがインターネット上のウェブサイトで提供されるようになると、ユーザは何が認証されるのかを判別し難くなったり、その電子認証サービスを提供するウェブサイトが信頼できるのかを確認することが新たな課題としてあらわれてくる。そこで、下記特許文献1は、様々な電子認証サービスを提供するウェブサイトの信頼性を画面上でユーザが確認できるシステムを開示している。 In addition to public personal authentication services, various types of private electronic authentication services will be provided by websites on the Internet by each electronic authentication service company, making it difficult for users to determine what is being authenticated. Or confirming whether the website providing the electronic authentication service is reliable appears as a new issue. Therefore, Patent Document 1 below discloses a system in which a user can confirm the reliability of a website that provides various electronic authentication services on a screen.
特開2010-63069号公報JP 2010-63069 A
 確かに、電子認証サービスによる電子証明書の利用は、従来に較べて即時性及びコスト面で優れているといえよう。しかしながら、電子証明書の取得をするには各ユーザが認証局に申込みをして所定の手続に従った操作が必要である。例えば、電子認証サービスを利用するための所定のプログラムを自分の端末にインストールすること等が要求されるので、手間のかかるセットアップ作業が面倒で電子認証サービスの利用を断念するユーザもいる。 Certainly, it can be said that the use of electronic certificates by the electronic authentication service is superior in terms of immediacy and cost compared to the past. However, in order to obtain an electronic certificate, each user must apply to a certificate authority and perform an operation according to a predetermined procedure. For example, since it is required to install a predetermined program for using the electronic authentication service in his / her terminal, there are some users who give up using the electronic authentication service due to troublesome setup work.
 また、電子証明書を発行する機関である認証局は、単一の組織又は団体であるか、若しくは認証パス上にルート認証局と中間認証局が存在するという複数体の構成である。後者は、発行元の認証局から順に、その認証局を認証している上位の認証局、さらに上位の認証局…といった具合に辿っていき、最終的にルート認証局にたどり着くという認証手順をとる。単一の組織又は団体である認証局の場合、その認証局が統括機能を実現していることは当然であるが、ルート認証局及び中間認証局で構成される場合であっても、1つ1つの認証局においてはやはり中央管理的な制御及び管理がなされていることに変わりはない。つまり、認証パス上の各認証局は、他の認証局による認証を順次引き継いではいるものの、それぞれのローカルな認証において複数の独立した認証局が同時並行に認証処理を行いながら協働体制で運営されているわけではない。 In addition, the certificate authority that is an institution that issues an electronic certificate is a single organization or organization, or has a multiple configuration in which a root certificate authority and an intermediate certificate authority exist on the certification path. The latter, in order from the issuing certificate authority, goes to the upper certificate authority that is authenticating the certificate authority, the higher certificate authority, etc., and finally takes the authentication procedure to reach the root certificate authority. . In the case of a certificate authority that is a single organization or group, it is natural that the certificate authority implements the overall function, but even if it is composed of a root certificate authority and an intermediate certificate authority, one One certificate authority still has central control and management. In other words, although each CA in the certification path has successively taken over the certification by other CAs, it operates in a collaborative system with multiple independent CAs simultaneously performing authentication processing in each local authentication. It has not been done.
 このため、従来の中央管理型認証局は、認証局のサーバ等が稼働していない時間帯では電子証明書の発行ができないので、電子証明書の発行を望むユーザは利用時間が制限されてしまうことになる。仮に一日24時間のサービス利用可能な体制で運用したとしても、サーバメンテナンス等を定期的に行う必要があったり、様々な要因による不測のシステムダウンが発生し得るので、実際には年中無休のサービスにはならない。中央管理型で構成される認証局の場合は、いつでも好きな時に電子証明書を取得できるサービスを提供できないのである。 For this reason, the conventional centrally managed certificate authority cannot issue an electronic certificate during a time period when the certificate authority server or the like is not operating, so that a user who wants to issue an electronic certificate has a limited use time. It will be. Even if the system can be operated 24 hours a day, it may be necessary to perform server maintenance regularly, or an unexpected system down may occur due to various factors. It will not be a service. In the case of a certificate authority composed of a central management type, it is not possible to provide a service that can obtain an electronic certificate at any time.
 また、発行される電子証明書の中には、個人情報(例えば、氏名・住所・生年月日・性別の基本4情報)を含んでいるものがある。情報化の急速な進展に伴い、個人情報の目的外利用の禁止、適正な取得方法、安全管理措置、第三者提供の制限など個人情報に対する保護(個人情報保護法)が強化されている事情から、国や地方自自体、及び民間企業が保有・管理する情報サーバは、悪意者による不正侵入されないようにする対策を講じてはいる。しかし、厳重なセキュリティ体制が施されていると言われているサーバであっても、結果として情報漏洩が完全に防止できなかったニュースが後を絶たないことから理解できるとおり、認証局が個人情報の保有をしていた場合、その漏洩や改ざんがされないことを長期にわたり保証できないのが現状である。 Also, some digital certificates that are issued include personal information (for example, basic information on name, address, date of birth, and gender). With the rapid progress of computerization, the protection of personal information (Personal Information Protection Law) has been strengthened, such as prohibition of unintended use of personal information, proper acquisition methods, safety management measures, restrictions on provision of third parties, etc. Therefore, the information server owned and managed by the national government, local government itself, and private companies has taken measures to prevent unauthorized intrusion by the Service-to-Self. However, even with a server that is said to have a strict security system, the certificate authority is able to provide personal information as can be understood from the fact that there is no end to the news that information leakage could not be completely prevented as a result. In the current situation, it is not possible to guarantee that no leakage or tampering will occur.
 ところで、最近は、主に金融関係の分野で分散型台帳技術(DLT, Distributed Ledger Technology)が注目をあびてきている。現時点で分散型台帳技術の正確な定義は確定していないが、台帳を承認する者がネットワークに接続する任意のノード端末にするか限定したノード端末にするか(Permissionless/Permissioned)を一つの指標として分類することができる。 By the way, recently, distributed ledger technology (DLT, “Distributed” Ledger Technology) has attracted attention mainly in the field of finance. At present, the exact definition of the distributed ledger technology has not been finalized, but one indicator is whether the person approving the ledger should be an arbitrary node terminal connected to the network or a limited node terminal (Permissionless / Permissioned) Can be classified as
 公開型のPermissionlessトランザクションで、特にデータの公開をしている典型例が、暗号通貨(ビットコイン)のためのブロックチェーンである。これに対し、ネットワークの参加資格(特に、データ承認者)、取引を発行する者、APIからデータを読み込む者が信頼性のあるノード端末に限定したPermissionedネットワークを対象としているのが、“Ripple”や“Hyperledger”と呼ばれている仕組みである。これらについては、下記を参照されたい。
https://ripple.com/files/ripple_consensus_whitepaper.pdf、及び
http://www.linuxfoundation.org/news-media/announcements/2016/02/linux-foundation
-s-hyperledger-project-announces-30-founding。
A typical example of data disclosure in a public permissionless transaction is a block chain for cryptocurrency (bitcoin). On the other hand, “Ripple” is intended for Permissioned networks where network participation qualifications (especially data approvers), those who issue transactions, and those who read data from the API are limited to reliable node terminals. It is a mechanism called “Hyperledger”. For these, see below.
https://ripple.com/files/ripple_consensus_whitepaper.pdf, and
http://www.linuxfoundation.org/news-media/announcements/2016/02/linux-foundation
-s-hyperledger-project-announces-30-founding.
 分散型台帳技術の特徴の一つは、トランザクション及びアクションの正当性を決定する際に特定のサーバにおける検証に依存することなく、非中央集権なピア・ツー・ピア(P2P)型ネットワークを基盤にしているという点である。特定のサーバがトランザクション等に関する台帳を統括して管理するのではなく、各端末が同一の台帳を管理することによって、新たなトランザクション等に対してどの台帳においても矛盾が生じないと認められた場合にのみ、各台帳に追加する正規なトランザクション等として認められるという管理構成をとる。例えば、或る端末が攻撃され、その端末が保有する分散型台帳が不正者によって改ざんされたとしても、ネットワーク上の承認者グループに参加する他の端末の台帳と整合しない場合は、改ざんトランザクションは拒絶されてしまう。ネットワーク上の承認者グループに参加する一定数以上の端末からの合意が得られなければ、分散型台帳の完全性の欠如となり、正規のデータとして記録されることはない。各端末のネットワーク接続をP2P型にすることにより、セキュリティ管理の分散化及び信頼性向上を図っているのである。 One of the features of distributed ledger technology is that it is based on a decentralized peer-to-peer (P2P) network without relying on verification at specific servers to determine the legitimacy of transactions and actions. It is a point. When it is recognized that there is no inconsistency in any ledger for new transactions, etc., because each terminal manages the same ledger rather than a specific server managing the ledger for transactions, etc. Only in the management configuration, it is recognized as a regular transaction to be added to each ledger. For example, even if a certain terminal is attacked and the distributed ledger held by that terminal is tampered with by an unauthorized person, if it does not match the ledger of another terminal participating in the approver group on the network, It will be rejected. Without agreement from a certain number of terminals participating in the approver group on the network, the integrity of the distributed ledger will be lacking and will not be recorded as legitimate data. By making the network connection of each terminal P2P type, security management is distributed and reliability is improved.
 このように分散型台帳技術は各端末が保有するデータがネットワーク全体で完全同一であることを求める一方で、各端末それぞれでのローカルな事情、即ち、既存のシステム構成やトランザクション処理手順や内容に対して何ら変更を要求するわけではない柔軟性をあわせ持っている。したがって、各端末の独立性を維持しながらセキュリティ性の分散化・高信頼性を図る一手段として、分散型台帳技術は優れた手段の一つとして注目され始めている。 In this way, the distributed ledger technology requires that the data held by each terminal be completely the same throughout the network, while maintaining the local circumstances at each terminal, that is, the existing system configuration, transaction processing procedure, and contents. It also has the flexibility of not requiring any changes. Accordingly, the distributed ledger technology has begun to attract attention as one of the excellent means as a means for distributing security and high reliability while maintaining the independence of each terminal.
 そこで、本発明は、電子認証に関する上述した様々な課題を解決するべく、分散型台帳技術を基に電子認証を行う技術を提供することを目的とする。 Therefore, an object of the present invention is to provide a technique for performing electronic authentication based on a distributed ledger technique in order to solve the above-described various problems related to electronic authentication.
 前記目的を達成するために本発明に係る情報共有のためのプログラム及び方法は、ネットワーク上に接続する複数のコンピュータを用いて認証処理を行うためのプログラムであって、前記複数のコンピュータに含まれる一のコンピュータは、ユーザ登録のリクエストに応答して、前記ネットワーク上に個人又は組織体を特定する情報を含むデータを出力する処理と、前記複数のコンピュータに含まれる前記一のコンピュータ以外の少なくとも1以上のコンピュータは、前記ネットワーク上に出力された前記データを取り込み、同一の演算を実行することによりコンピュータ間の合意形成が得られた場合に前記複数のコンピュータは各自の記録媒体に前記データを記憶する処理と、前記複数のコンピュータに含まれる任意のコンピュータが、前記ユーザ登録したユーザの本人認証の要求を事業体又は個人から受けた場合、前記複数のコンピュータの少なくとも1つのコンピュータが自身の記録媒体に前記データが記憶されているか否かを判定する処理と、前記データが記憶されていた場合、前記本人認証を要求する事業体又は個人に対し、本人認証済みの報告を送信する処理と、が実行されるようにすることを特徴とする。 To achieve the above object, a program and method for information sharing according to the present invention is a program for performing authentication processing using a plurality of computers connected on a network, and is included in the plurality of computers. One computer, in response to a user registration request, outputs data including information identifying an individual or an organization on the network, and at least one other than the one computer included in the plurality of computers. The above computers capture the data output on the network and execute the same calculation to obtain consensus between the computers, and the plurality of computers store the data in their recording media. And an arbitrary computer included in the plurality of computers, When receiving a request for user authentication of a registered user from an entity or an individual, at least one of the plurality of computers determines whether the data is stored in its recording medium; When the data is stored, a process of transmitting a personal authentication report to an entity or an individual who requests the personal authentication is performed.
 また、前記複数のコンピュータの各コンピュータの記録媒体には、前記データが完全同一で記憶されている。前記合意形成の有無は、前記各コンピュータによる演算結果の一致が所定数以上か否かにより決定する。 Further, the data is stored in the same recording medium in each of the plurality of computers. Whether or not the consensus is formed is determined by whether or not there is a predetermined number or more of coincidence of calculation results by the computers.
 本発明に係る電子認証処理によれば、ネットワークを介して通信可能な複数の独立したコンピュータ相互が認証局となり、個人又は組織体が正当な本人認証済み記録を有しているかをコンピュータ間で連携して証明する。このため、仮に複数の独立したコンピュータの一部のコンピュータが任意の要因により機能不全になったとしても認証局全体としては常時稼働可能という耐障害性があるので、常にタイムリーな電子認証が可能となる。従来の中央管理型の認証局が24時間稼働を保証すようとすれば、耐障害性や冗長構成のためのコストがかかるが、本発明は複数のコンピュータがそれぞれ独立に同一の本人認証済み記録を分散共有することを前提とするP2P型分散型台帳技術の標準仕様を実装するため、低コストでゼロダウンタイムの認証局システムを構築することができる。 According to the electronic authentication processing according to the present invention, a plurality of independent computers that can communicate via a network serve as a certificate authority, and whether or not an individual or an organization has a valid personally authenticated record is linked between computers. And prove it. For this reason, even if some computers of multiple independent computers fail due to arbitrary factors, the entire certificate authority is fault-tolerant so that it can always operate, so timely electronic authentication is always possible It becomes. If a conventional centrally-managed certificate authority guarantees 24-hour operation, costs for fault tolerance and redundant configuration are incurred. However, in the present invention, a plurality of computers are independently authenticated by the same user. Since the standard specification of the P2P type distributed ledger technology that presupposes sharing is distributed, a zero downtime certificate authority system can be constructed at a low cost.
 また、本発明の場合、或る事業者の業務の必要性からユーザ(個人又は組織体)の行った本人認証済みの事実が認証局システムとして機能する複数の独立したコンピュータに記憶されている場合、その本人認証済みの事実を別の事業者で必要となる本人認証に利用する。既に記憶された本人認証済みの事実を信頼して、当該ユーザの本人認証を完了させるものである。つまり、別の事業者は、本発明の認証局システムから正当な本人認証が記録されている報告を受け取った場合、有効な期間内の本人認証であれば、その別の事業者が改めて同様の本人確認作業を行う必要がない。これは、別の事業者の手間を削減することのみならず、事業者ごとに本人確認書類を送付していたユーザ側の煩雑な処理を省略させることができるという効果を奏する。 In the case of the present invention, the fact that a user (individual or organization) has already been authenticated is stored in a plurality of independent computers functioning as a certificate authority system because of the necessity of business of a certain business operator. , The fact that the person has already been authenticated is used for the person authentication required by another company. The fact that the user has already been authenticated is trusted to complete the user authentication. In other words, if another business operator receives a report in which a valid personal authentication is recorded from the certificate authority system of the present invention, the other business operator will renew the same if it is a personal authentication within a valid period. There is no need to perform identity verification. This not only reduces the time and labor of another business operator, but also has an effect that it is possible to omit complicated processing on the user side that has sent the identification document for each business operator.
 本人認証済みの事実を別の事業者での本人認証に利用するということは、認証局である複数のコンピュータに記憶された本人確認の事実が完璧に真性であることが認証の信頼性を担保する上で常に要求される。この点に関し、本発明における複数のコンピュータの各々は、本人確認済みの事実、確認内容の変更の有無等を完全同一な電子証明書履歴データとして時系列に保管しており、各コンピュータ間で不一致のない記録状態を保持している。このため、仮に複数のコンピュータに含まれる一のコンピュータにおいて、不正目的等で履歴データが変更されたとしても、複数のコンピュータに含まれる他のコンピュータ内の履歴データと同じでなければ、その変更された履歴データが正当なデータとして最終的に認められることはない。複数のコンピュータすべてが一致した状態で記録管理されていない履歴データは真性(正当)でないものと推定されることになる。不正者が複数のコンピュータすべてに対して履歴データの変更を一斉に実行することは事実上不可能であることから、本人認証済みの事実である電子証明書の改ざんリスクを無くすことが可能である。したがって、本発明に係る電子認証処理は、極めて高いセキュリティを保証することができる。 Using facts that have already been authenticated for identity verification by another company means that the fact of identity verification stored on multiple computers, which are certificate authorities, is completely authentic and ensures the authenticity of authentication. Always required to do. In this regard, each of the plurality of computers in the present invention stores the fact that the identity has been confirmed, whether the confirmation content has been changed, etc. in time series as completely identical electronic certificate history data, and there is a discrepancy between the computers. The recording state without a mark is retained. For this reason, even if the history data is changed for an unauthorized purpose or the like in one computer included in a plurality of computers, the history data is changed if it is not the same as the history data in other computers included in the plurality of computers. Historical data will never be accepted as legitimate data. History data that is not recorded and managed in a state where all the computers are in agreement is estimated to be not genuine (valid). Since it is virtually impossible for an unauthorized person to change history data on all computers at the same time, it is possible to eliminate the risk of falsification of the digital certificate, which is the fact that the individual has been authenticated. . Therefore, the electronic authentication processing according to the present invention can guarantee extremely high security.
[規則91に基づく訂正 29.11.2017] 
A銀行に口座を開設し、本発明の認証処理を実行する認証システムにユーザ登録するときの手順を示したフローチャートである。 B銀行で口座を開設する際に、ユーザの本人確認を認証システムに依頼するときの手順を示したフローチャートである。 B銀行で口座を開設する際に、ユーザの本人確認を認証システムに依頼するときの手順を示したフローチャートである。 各コンピュータに記憶されたトランザクションデータ(電子証明書)のデータ構造を模式的に表した図である。 電子認証方法を実現する複数のコンピュータを示した図である。 図4(A)と異なる構成例の複数のコンピュータを示した図である。
[Correction 29.11.2017 under Rule 91]
It is the flowchart which showed the procedure at the time of opening an account in A bank and performing user registration to the authentication system which performs the authentication process of this invention. It is the flowchart which showed the procedure at the time of requesting a user's identity verification to an authentication system, when opening an account in B bank. It is the flowchart which showed the procedure at the time of requesting a user's identity verification to an authentication system, when opening an account in B bank. It is the figure which represented typically the data structure of the transaction data (electronic certificate) memorize | stored in each computer. It is the figure which showed the some computer which implement | achieves an electronic authentication method. It is the figure which showed the some computer of the structural example different from FIG. 4 (A).
 以下に図面を参照しながら、本発明に係る電子認証方法又はそのプログラムに規定する各処理を実行する認証局システムについて説明する。以下の実施の形態においては、個人が金融機関に口座を開設する際に必要な本人確認の事実をデータ化して記録し、別の金融機関の口座開設時においては個人から本人確認書類を受領せずとも本人確認を行える手順を例にしている。また、記録されたデータは本人確認がされていた事実の証拠となるため、いわゆる電子証明書として使用することも可能である。なお、個人に限らず、法人などの組織体に対する電子認証の場合であってもまったく同様である。 Hereinafter, a certificate authority system that executes each process defined in the electronic authentication method or the program thereof according to the present invention will be described with reference to the drawings. In the following embodiment, the fact of identity verification required when an individual opens an account at a financial institution is recorded and recorded, and when an account is opened at another financial institution, an identity verification document can be received from the individual. The procedure that can verify the identity at least is taken as an example. In addition, since the recorded data is evidence of the fact that the identity has been confirmed, it can also be used as a so-called electronic certificate. Note that the same applies to the case of electronic authentication not only for individuals but also for organizations such as corporations.
 本発明の電子認証処理を実行するシステム構成は、個人を認証するための認証局が複数のコンピュータによって構築され、しかも複数のコンピュータは中央集権的な端末が存在しない複数の金融機関によるコンソーシアムを形成するというP2P型のネットワーク接続になっている。複数のコンピュータは互いに対等であり、詳細は後述するが、本人確認した事実を示すデータを複数のコンピュータそれぞれが保管し合うことで同一データの分散化を図っている。 In the system configuration for executing the electronic authentication processing of the present invention, a certificate authority for authenticating an individual is constructed by a plurality of computers, and the plurality of computers forms a consortium of a plurality of financial institutions having no centralized terminal. This is a P2P type network connection. The plurality of computers are equal to each other, and will be described in detail later. However, the plurality of computers store data indicating the fact that the person has been confirmed, thereby distributing the same data.
 以下では、まず、従来どおりに口座開設を行う手順、次に本発明の電子認証処理を実行する認証局となる認証システム100に本人確認済み事実を登録していないユーザが本人確認の事実を登録する手順、そして、金融機関から登録後ユーザの本人確認済み事実の真偽のリクエストがあったとき、認証システム100が実行する電子認証処理について説明する。 In the following, first, a procedure for opening an account as usual, and then a user who has not registered the fact of identity confirmation registered in the authentication system 100 that is the certificate authority that executes the electronic authentication processing of the present invention registers the fact of identity confirmation. The electronic authentication process executed by the authentication system 100 when there is a request for authenticity of the fact that the identity of the user after registration has been received from the financial institution will be described.
 ユーザXは認証システム100に本人確認をまだ登録していないとする。ユーザXは、A銀行に口座を開設するため、従来のように、自分のコンピュータ端末からインターネット経由でA銀行のサイト上で、口座開設の申し込みをする。具体的には、口座開設に必要となる少なくとも、自分の氏名、住所、生年月日、性別(以下、この4つの情報を「基本4情報」と呼ぶ。)等をWEB画面上で入力する。本人確認書類の提出と住所確認などの手続きを経て口座開設が完了し、口座開設完了後に、A銀行は所定のID及びパスワードをユーザXに返送する。ここでは住所確認を兼ねる目的で郵送するが、ユーザXのeメールアドレスに送信するようにしてもよい。以降、ユーザXはこのID及びパスワードを用いてA銀行にログインし残高を確認することや、取引実行などを行うこととなる。なお、ID及びパスワードは、口座番号やATMの暗証番号と同じ場合又は異なる場合の両方を含む。 Suppose user X has not yet registered his / her identity in authentication system 100. In order to open an account at bank A, user X makes an application for opening an account on the site of bank A via the Internet from his computer terminal, as in the past. Specifically, at least the name, address, date of birth, gender (hereinafter, these four pieces of information are referred to as “basic four information”) and the like necessary for opening an account are entered on the WEB screen. The account establishment is completed through procedures such as submission of identity verification documents and address confirmation. After the account establishment is completed, Bank A returns a predetermined ID and password to the user X. Although mail is sent here for the purpose of address confirmation, it may be sent to the email address of user X. Thereafter, the user X logs in to the A bank using this ID and password, confirms the balance, and executes a transaction. Note that the ID and password include both the case where it is the same as or different from the account number or the PIN code of ATM.
 口座開設のためには、基本4情報の真偽を証明する本人確認書類を送付することが必要である。本人確認書類のコピー書面を郵送してもよいが、郵送の代わりに本人確認書類の電子データの送信も従来から行われている。ここでは、本人確認書類を電子データにしてA銀行に送信するものとする。もっとも、口座を開設するためには、インターネット経由だけではなく、対面での申込も存在する。 In order to open an account, it is necessary to send identity verification documents that prove the authenticity of the basic 4 information. Although a copy of the personal identification document may be mailed, electronic data of the personal identification document is also conventionally transmitted instead of mailing. Here, it is assumed that the personal identification document is sent as electronic data to Bank A. However, in order to open an account, there are applications not only via the Internet but also face-to-face.
 A銀行は、基本4情報を含む個人情報と、送信された本人確認書類の内容をチェックし、ユーザXの本人確認作業を行う。具体的には、基本4情報が本人確認書類の内容の一致、住所の確認し、ブラックリストとの照合などで、ユーザXが実在する人物として識別できて口座取引を許可してもよいと判断できた場合、本人確認済みであるとしてユーザXの口座開設を行う。これにより、ユーザXはA銀行の口座開設が完了したことを確認できる。ユーザXは、A銀行から送られたID及びパスワードを用いてA銀行のサイトにログインし、入出金や振込み等をインターネット経由で行ういわゆるネット取引を開始できるようになる。 銀行 Bank A checks the personal information including the basic 4 information and the contents of the transmitted identity verification document, and performs the identity verification operation of user X. Specifically, it is determined that the basic 4 information can be identified as a real person by confirming the contents of the identity verification document, confirming the address, collating with the blacklist, etc. and permit the account transaction. If it is possible, the account of the user X is opened because the identity has been confirmed. As a result, the user X can confirm that the opening of the bank A account has been completed. The user X can log in to the bank A site using the ID and password sent from the bank A, and can start a so-called online transaction in which deposits / withdraws, transfers, and the like are performed via the Internet.
 ここまでの処理は、従来から既に行われてきたものであるが、本発明は、A銀行がユーザXの本人確認を行った事実を認証システム100に登録することで、A銀行以外の銀行等での口座開設時には本人確認済みの事実を利用できるという点に特徴がある。認証システム100に登録するか否かはユーザXからの申込みを前提とし、口座開設後、任意の時にユーザ登録アプリケーションを実行することによって認証システム100に登録することができる。 The processing so far has already been performed, but the present invention registers the fact that the bank A has verified the identity of the user X in the authentication system 100, so that banks other than the bank A, etc. It is characterized by the fact that the fact that the identity has been confirmed can be used when opening an account. Whether or not to register in the authentication system 100 is premised on an application from the user X, and can be registered in the authentication system 100 by executing a user registration application at any time after opening an account.
<認証システム100への登録>
 図1は、認証システム100を利用するための登録を行う手順を示したフローチャートである。図1の左部は、ユーザXを認証システム100に初めて登録するときの処理を時系列のフローで示し、各処理においてどのようなデータ又は信号がやりとりされているかをフローの右側にあらわしている。図示するとおり、ユーザXのコンピュータ端末(C1)、スマートフォン等のユーザXの携帯端末(C2)、認証端末(A1)、認証局端末(Aall)の間でデータ又は信号が送受信される。ここで、認証端末(A1)とは、ユーザXが口座開設したA銀行の端末に相当する。A銀行の端末を“認証”端末と称しているのは、上述したようにA銀行がユーザXの本人確認(認証)をしているからである。認証局端末(Aall)は、認証システム100において分散型台帳技術(DLT)又はブロックチェーンを構築する所定の複数の端末である。この複数の端末が認証局としての機能を果たし、後述するように、A銀行、即ち認証端末(A1)が、ユーザの登録要求を受けて、認証局である認証システム100に登録を依頼することになる。
<Registration to authentication system 100>
FIG. 1 is a flowchart showing a procedure for performing registration for using the authentication system 100. The left part of FIG. 1 shows the process when registering the user X in the authentication system 100 for the first time in a time-series flow, and shows what data or signal is exchanged in each process on the right side of the flow. . As shown in the figure, data or signals are transmitted and received between the computer terminal (C1) of the user X, the mobile terminal (C2) of the user X such as a smartphone, the authentication terminal (A1), and the certificate authority terminal (Aall). Here, the authentication terminal (A1) corresponds to the terminal of bank A where the user X opened an account. The reason why the bank A terminal is referred to as the “authentication” terminal is because the bank A verifies the identity of the user X (authentication) as described above. The certificate authority terminal (Aall) is a predetermined plurality of terminals that construct a distributed ledger technology (DLT) or a block chain in the authentication system 100. The plurality of terminals function as a certificate authority, and, as will be described later, the bank A, that is, the authentication terminal (A1) receives a user registration request and requests the authentication system 100, which is a certificate authority, to register. become.
 A銀行の口座開設が完了すると、上述したように、所定のID及びパスワードを記載した書面がユーザXに返送される。ユーザXが認証システム100への登録を希望する場合、まずユーザXはユーザPC(C1)からA銀行のサイトに付与されたID及びパスワードを入力してログインする。(図1の「1. ユーザログイン」参照)。つぎに、ログイン画面上には認証システム100による認証サービスを利用するために必要なユーザ登録申込みボタンが表示されているため、ユーザXがこのボタンを押下する。これにより、A銀行の端末である認証端末(A1)は、ノンス(nonce)と呼ばれる使い捨てのランダムな値を発行し、このノンスに電子署名を付与してユーザPC(C1)に送信する(図1の「2. nonce送信」参照)。そして、ユーザPC(C1)は、受け取ったノンスなどを利用してQRコード(登録商標)を生成し、画面上に表示する。なお、電子署名自体は既知の技術的事項であるため、本明細書では説明を省略する。 When the opening of the bank A account is completed, a document with a predetermined ID and password is returned to the user X as described above. When the user X desires to register with the authentication system 100, the user X first logs in by entering the ID and password assigned to the A bank site from the user PC (C1). (Refer to “1. User login” in FIG. 1). Next, since a user registration application button necessary for using the authentication service by the authentication system 100 is displayed on the login screen, the user X presses this button. As a result, the authentication terminal (A1), which is a bank A terminal, issues a disposable random value called a nonce, attaches an electronic signature to the nonce, and transmits it to the user PC (C1) (FIG. (Refer to “2. Then, the user PC (C1) generates a QR code (registered trademark) using the received nonce and displays it on the screen. Since the electronic signature itself is a known technical matter, description thereof is omitted in this specification.
 図中における“A1署名(nonce)”は、認証端末(A1)による電子署名付きのノンスを意味する。同様に、図1及び図2(A)-(B)において送受信される##署名(**)の記載の意味は、##による電子署名付きの**をあらわしている。
 認証端末(A1)がユーザXにノンスを発行する目的は、後の手続処理で、ユーザ登録を要求するユーザXが真に登録手続きを行っていることを確認するためであり、ノンスがユーザXから認証端末(A1)へ返信されなければ、ユーザX以外の者による登録手続きであると判定する。
“A1 signature (nonce)” in the figure means a nonce with an electronic signature by the authentication terminal (A1). Similarly, the meaning of the description of the ## signature (**) transmitted and received in FIGS. 1 and 2A to 2B represents ** with an electronic signature by ##.
The purpose of issuing the nonce to the user X by the authentication terminal (A1) is to confirm that the user X requesting user registration truly performs the registration procedure in the subsequent procedure processing. If it is not sent back to the authentication terminal (A1), it is determined that the registration procedure is by a person other than the user X.
 ユーザXは、次に、携帯端末(スマートフォン等)が認証システム100で利用可能になる手続きを行う。これは、昨今は少なくとも1台の携帯端末(C2)を所持するユーザが増加し、携帯端末(C2)の使用によって二段階認証を利用してセキュリティを強化すると共に、出先からであっても入出金や振込み等のために個人認証を行いたい要求に応えるためである。 Next, the user X performs a procedure for making the mobile terminal (smartphone or the like) usable in the authentication system 100. In recent years, the number of users who have at least one mobile terminal (C2) has increased, and the use of the mobile terminal (C2) enhances security by using two-step authentication, and it is also possible to enter and exit even when away from home. This is in order to meet the demand for personal authentication for money or money transfer.
 携帯端末(C2)には、所定のアプリサイトからダウンロードされたユーザ登録アプリケーションが起動されているとする。認証端末(A1)の電子署名付きのノンスをユーザPC(C1)で受信したユーザXは、ユーザPC(C1)の画面上に表示されているQRコードを携帯端末(C2)を用いて読み込む。QRコードにはA銀行に関する銀行情報が含まれており、例えば、携帯端末(C2)からA銀行に接続する接続先アドレスを含んでいる。携帯端末(C2)は、読み込んだQRコードからの銀行情報及びユーザPC(C1)で受信されたノンスを受信する(図1の「3. QRコード読取」参照)。
 なお、他の実施形態では、QRコード(登録商標)は、所定のID及びパスワードが記載された書面に表示されていてもよい。
It is assumed that a user registration application downloaded from a predetermined application site is activated on the mobile terminal (C2). The user X who has received the nonce with the electronic signature of the authentication terminal (A1) by the user PC (C1) reads the QR code displayed on the screen of the user PC (C1) using the portable terminal (C2). The QR code includes bank information related to bank A, and includes, for example, a connection address for connecting to bank A from the mobile terminal (C2). The portable terminal (C2) receives the bank information from the read QR code and the nonce received by the user PC (C1) (see “3. QR code reading” in FIG. 1).
In other embodiments, the QR code (registered trademark) may be displayed on a document in which a predetermined ID and password are described.
 次に、携帯端末(C2)では、ユーザ登録アプリケーションによって秘密鍵及び公開鍵のキーペアを作成する(図1の「4. キーペア作成」参照)。キーペアのうち秘密鍵(C2秘密鍵)は、携帯端末(C2)内に保管される。一方、キーペアのうち公開鍵(C2公開鍵)は、A銀行である認証端末(A1)に送信される。このとき、携帯端末(C2)は、「3. QRコード読取」の際に受信したノンス及びC2公開鍵に対してC2秘密鍵を用いて電子署名を付与する。携帯端末(C2)の電子書署名付きのノンス及びC2公開鍵は認証端末(A1)に送信される(図1の「5. ユーザ公開鍵送信」参照)。 Next, in the portable terminal (C2), a key pair of a secret key and a public key is created by a user registration application (see “4. Key pair creation” in FIG. 1). The secret key (C2 secret key) of the key pair is stored in the mobile terminal (C2). On the other hand, the public key (C2 public key) of the key pair is transmitted to the authentication terminal (A1) which is the A bank. At this time, the portable terminal (C2) gives an electronic signature using the C2 private key to the nonce and C2 public key received at the time of “3. QR code reading”. The nonce with the electronic signature of the portable terminal (C2) and the C2 public key are transmitted to the authentication terminal (A1) (see “5. User public key transmission” in FIG. 1).
 認証端末(A1)は、受信したC2公開鍵を用いて携帯端末(C2)の電子署名を検証する。C2公開鍵に対応するのはキーペアを成すC2秘密鍵しか存在しない。したがって、C2秘密鍵を用いて付与した電子署名をC2公開鍵によって確認できれば、キーペアを成すC2秘密鍵を保管する携帯端末(C2)によってC2公開鍵が署名されたことを確認できる。さらに、認証端末(A1)は、C2公開鍵の他にノンスも受信しており、このノンスが、「2. nonce送信」の際に認証端末(A1)が発行したノンスと同一であるか否かを確認することで、ユーザXがユーザ登録を望む真のユーザであることを確認する。ノンスの同一性を確認できなければ、ユーザX以外の者による手続として拒絶する。 The authentication terminal (A1) verifies the electronic signature of the portable terminal (C2) using the received C2 public key. Only the C2 private key forming the key pair corresponds to the C2 public key. Therefore, if the electronic signature provided using the C2 private key can be confirmed by the C2 public key, it can be confirmed that the C2 public key is signed by the portable terminal (C2) that stores the C2 private key forming the key pair. Further, the authentication terminal (A1) receives a nonce in addition to the C2 public key, and whether this nonce is the same as the nonce issued by the authentication terminal (A1) at the time of “2. nonce transmission”. It is confirmed that the user X is a true user who desires user registration. If the identity of the nonce cannot be confirmed, it is rejected as a procedure by a person other than the user X.
 認証端末(A1)は、ユーザ登録をリクエストするユーザXの真性を確認できると、次に、複数のコンピュータで構成された認証局端末(Aall)へユーザ登録を依頼するため、C2公開鍵、基本4情報のハッシュ値、認証端末(A1)の公開鍵(A1公開鍵)に対して自身の電子署名を付与して認証局端末(Aall)へ送信する(図1の「6. 認証局に登録」参照)。さらに、オプションとして、ユーザ登録の効力を期限付きなものにさせる有効期限を追加して認証局端末(Aall)へ送信するようにしてもよい。なお、認証端末(A1)は、口座開設にあたりユーザXから基本4情報が提供されているので、この基本4情報に所定のハッシュ関数を用いてハッシュ演算を実行し、ハッシュ値を生成して送信する。ハッシュについては当業者であれば既知の技術的事項なため、本明細書では説明を省略する。 When the authentication terminal (A1) can confirm the authenticity of the user X requesting user registration, the authentication terminal (A1) then requests the certificate authority terminal (Aall) composed of a plurality of computers to perform user registration. 4 A hash value of information, an electronic signature is attached to the public key (A1 public key) of the authentication terminal (A1) and transmitted to the certification authority terminal (Aall) ("6. Registration with the certification authority" in FIG. 1) "reference). Furthermore, as an option, an expiration date that makes the validity of the user registration time-limited may be added and transmitted to the certificate authority terminal (Aall). Since the authentication terminal (A1) is provided with basic 4 information from the user X at the time of opening an account, a hash operation is performed on the basic 4 information using a predetermined hash function, and a hash value is generated and transmitted. To do. Since the hash is a technical matter known to those skilled in the art, the description thereof is omitted in this specification.
 認証局端末(Aall)では、いわゆる分散型台帳技術(DLT)又はブロックチェーンといわれることもあるデータ構造で、認証端末(A1)から送られてきたデータを、複数のコンピュータの各々が同じように記憶する(分散型台帳)。データ登録の具体的な処理方法については後述する。認証端末(A1)は登録がされたかの確認を行い(図1の「7. 登録結果の確認」参照)、認証局端末(Aall)はその確認結果を認証端末(A1)に返す(図1の「8. 登録確認の結果」参照)。 The certificate authority terminal (Aall) has a data structure sometimes called so-called distributed ledger technology (DLT) or block chain, and the data sent from the authentication terminal (A1) is sent to each of the plurality of computers in the same manner. Remember (distributed ledger). A specific processing method for data registration will be described later. The authentication terminal (A1) confirms whether it has been registered (refer to “7. Confirmation of Registration Result” in FIG. 1), and the certificate authority terminal (Aall) returns the confirmation result to the authentication terminal (A1) (FIG. 1). (See “8. Results of registration confirmation”).
 正常に登録が完了されていた場合、認証端末(A1)は、「5. ユーザ公開鍵送信」の際に受信したC2公開鍵を用いて基本4情報を暗号化して暗号データを作成する。そして、認証端末(A1)は、暗号データ及び認証端末(A1)の公開鍵(A1公開鍵)に対して自身の電子署名を付与して携帯端末(C2)へ送信する(図1の「9. 基本4情報の登録」参照)。基本4情報の暗号データを作成するのは、通信回線上で生(平文)の基本4情報が盗聴されると不正利用等されてしまうリスクを回避するためである。 If the registration is completed normally, the authentication terminal (A1) creates the encrypted data by encrypting the basic 4 information using the C2 public key received at the time of "5. User public key transmission". Then, the authentication terminal (A1) gives its own electronic signature to the encrypted data and the public key (A1 public key) of the authentication terminal (A1) and transmits it to the portable terminal (C2) (“9” in FIG. 1). Refer to “Registering Basic 4 Information”). The reason why the encrypted data of the basic 4 information is created is to avoid the risk of unauthorized use or the like if the raw (plaintext) basic 4 information is wiretapped on the communication line.
 携帯端末(C2)は、受信したA1公開鍵を用いて認証端末(A1)の電子署名を検証する。A1公開鍵に対応するのはキーペアを成すA1秘密鍵しか存在しない。したがって、携帯端末(C2)は、A1公開鍵によって、A1秘密鍵を用いた認証端末(A1)の電子署名を確認して認証端末(A1)からの正しい通信であることを確認することができる。さらに、自身が保管するC2秘密鍵で基本4情報を復号化してアプリデータ以外の安全な領域(例えば、キーチェーンなど)に登録しておく。さらに、オプションとして有効期限を登録してもよい。 The portable terminal (C2) verifies the electronic signature of the authentication terminal (A1) using the received A1 public key. Only the A1 private key forming the key pair corresponds to the A1 public key. Therefore, the portable terminal (C2) can confirm the correct communication from the authentication terminal (A1) by checking the electronic signature of the authentication terminal (A1) using the A1 private key with the A1 public key. . Further, the basic 4 information is decrypted with the C2 secret key stored by itself and registered in a safe area (for example, a key chain) other than the application data. Further, an expiration date may be registered as an option.
 また、認証端末(A1)は、ユーザPC(C1)にも登録結果(基本4情報や有効期限を含んでもよい。)を送信し、ユーザ登録の事実が携帯端末(C2)と齟齬しないようにしておく(図1の「10. 登録結果通知」参照)。上述した一連の手続きにより、ユーザXは認証システム100に登録され、認証システム100によるユーザ認証サービスを利用することが可能になる。 In addition, the authentication terminal (A1) transmits the registration result (may include basic 4 information and expiration date) to the user PC (C1) so that the fact of user registration does not contradict the mobile terminal (C2). (See “10. Registration result notification” in FIG. 1). Through the series of procedures described above, the user X is registered in the authentication system 100, and the user authentication service by the authentication system 100 can be used.
<認証システム100の利用>
 次に、ユーザXがA銀行以外の別の金融機関(例えば、B銀行とする。)に口座開設をする場合を想定する。ユーザXはB銀行の口座開設の申し込みをする際、従来であれば、B銀行もユーザXに対して本人確認書類の送信を要求し、A銀行と同じようにユーザXの本人確認作業を行うものであるが、本実施形態の場合、この本人確認作業を認証システム100に依頼する。
<Use of authentication system 100>
Next, it is assumed that the user X opens an account with another financial institution other than Bank A (for example, Bank B). When the user X applies for an account opening for the bank B, conventionally, the bank B also requests the user X to send an identification document, and performs the user X identification process in the same manner as the bank A. However, in the case of the present embodiment, this authentication process is requested to the authentication system 100.
 図2(A)及び(B)は、B銀行の口座開設時に認証システム100を利用した本人確認の手順を示すフローチャートである。認証システム100による本人確認サービスの依頼は、ユーザXからの申込みがあることを前提とする。本人確認サービスの申込みは、PC端末からでも、スマートフォン等の携帯端末からでも行える。ユーザXが申込まなければ従来どおりB銀行へ本人確認書類のコピー書面を郵送又はデータ送信し、B銀行は基本4情報を含む個人情報を本人確認書類に基づき検証する。 2 (A) and 2 (B) are flowcharts showing the procedure of identity verification using the authentication system 100 when opening an account of B bank. The request for the identity verification service by the authentication system 100 is premised on the application from the user X. The application for the identity verification service can be performed from a PC terminal or a mobile terminal such as a smartphone. If the user X does not apply, a copy of the personal identification document is mailed or transmitted to the bank B as before, and the bank B verifies the personal information including the basic four information based on the personal identification document.
 ユーザXは、ユーザPC(C1)からB銀行の口座開設をリクエストする(図2(A)の「1. V1の口座開設要求」参照)。 User X requests the opening of the bank B account from the user PC (C1) (see “1. V1 account opening request” in FIG. 2A).
 WEB画面上には、本人確認書類のデータ送信に代わり認証システム100を利用した本人確認サービスを利用するか否かの選択ボタンが表示され、ユーザXが利用するボタンを選択した場合、認証システム100にユーザ登録しているかの確認が行われる。ユーザ登録していなければ本人確認サービスを利用できないので、既存の本人確認フロー(すなわち、本人確認書類を提出して口座開設を行うなど)を行う。なお、ここでユーザ登録を希望すれば図1の手順に従いユーザ登録の処理を行うようにしてもよい。 On the WEB screen, a selection button for displaying whether or not to use the personal identification service using the authentication system 100 instead of the data transmission of the personal identification document is displayed. When the button used by the user X is selected, the authentication system 100 It is confirmed whether or not the user is registered. Since the identity verification service cannot be used unless the user is registered, an existing identity verification flow (that is, opening an account by submitting an identity verification document) is performed. If user registration is desired, user registration processing may be performed according to the procedure shown in FIG.
 上述したように、ユーザXは既にユーザ登録しているので、B銀行の端末である検証端末(V1)は、ユーザXにノンス(nonce)と呼ばれる使い捨てのランダムな値を発行すると、これに検証端末(V1)の電子署名を付与して、ユーザXの端末であるユーザPC(C1)に送信する(図2(A)の「2. nonce送信」参照)。 As described above, since the user X has already registered as a user, the verification terminal (V1) which is a terminal of the B bank issues a disposable random value called a nonce to the user X and verifies this. The electronic signature of the terminal (V1) is given and transmitted to the user PC (C1) which is the terminal of the user X (see “2. nonce transmission” in FIG. 2A).
 A銀行の口座開設時と同様、検証端末(V1)の電子署名付きのノンスをユーザPC(C1)で受信したユーザXは、ユーザPC(C1)の画面上に表示されるQRコードを携帯端末(C2)を用いて読み込む。QRコードにはB銀行に関する銀行情報が含まれており、例えば、携帯端末(C2)からB銀行に接続する接続先アドレスを含んでいる。携帯端末(C2)は、読み込んだQRコードから銀行情報及びユーザPC(C1)で受信されたノンスを受信する(図2(A)の「3. QRコード読取」参照)。 As with the opening of the bank A account, the user X who has received the nonce with the electronic signature of the verification terminal (V1) by the user PC (C1) receives the QR code displayed on the screen of the user PC (C1) as a portable terminal. Read using (C2). The QR code includes bank information related to the B bank, and includes, for example, a connection destination address for connecting to the B bank from the mobile terminal (C2). The portable terminal (C2) receives the bank information and the nonce received by the user PC (C1) from the read QR code (see “3. QR code reading” in FIG. 2A).
 図1(A)の「4. キーペア作成」で説明したとおり、携帯端末(C2)はC2用のキーペア(秘密鍵、公開鍵)を保管している。そこで、次に携帯端末(C2)は、受信したノンス及びC2公開鍵に対してC2秘密鍵を用いて電子署名を付与する。携帯端末(C2)の電子書署名付きのノンス及びC2公開鍵が検証端末(V1)に送信される(図2(A)の「4. ユーザ公開鍵送信」参照)。 As described in “4. 保管 Key pair creation” in FIG. 1A, the mobile terminal (C2) stores the C2 key pair (secret key, public key). Therefore, next, the portable terminal (C2) gives an electronic signature to the received nonce and C2 public key using the C2 private key. The nonce with the electronic signature of the portable terminal (C2) and the C2 public key are transmitted to the verification terminal (V1) (refer to “4. User public key transmission” in FIG. 2A).
 検証端末(V1)は、受信したC2公開鍵を用いて携帯端末(C2)の電子署名を検証し、携帯端末(C2)から送信されたデータの正当性を確認する。さらに、「2. nonce送信」の際に自身が発行したノンスと同一であるか否かを確認することで、ユーザXがB銀行の口座開設を望む真のユーザであることを確認する。ノンスの同一性を確認できなければ、ユーザX以外の者による登録手続として拒絶する。 The verification terminal (V1) verifies the electronic signature of the portable terminal (C2) using the received C2 public key, and confirms the validity of the data transmitted from the portable terminal (C2). Furthermore, it is confirmed whether or not the user X is a true user who wishes to open a bank B account by confirming whether or not it is the same as the nonce issued at the time of “2.「 nonce transmission ”. If the identity of the nonce cannot be confirmed, it is rejected as a registration procedure by a person other than the user X.
 次に、検証端末(V1)は、テンポラリーなキーペア(T秘密鍵、T公開鍵)を作成する(図2(A)の「5. 一時的通信鍵作成」参照)。ユーザXから基本4情報を受信するときの暗号化に用いるためである。検証端末(V1)は、テンポラリーなキーペアのT公開鍵及び発行済みのノンスに電子署名を付与して、携帯端末(C2)に送信する(図2(A)の「6. 一時的通信鍵送信」参照)。T秘密鍵は検証端末(V1)が保管しておく。 Next, the verification terminal (V1) creates a temporary key pair (T secret key, T public key) (see “5. Temporary communication key creation” in FIG. 2A). This is because it is used for encryption when receiving basic four information from the user X. The verification terminal (V1) attaches an electronic signature to the T public key of the temporary key pair and the issued nonce, and transmits it to the mobile terminal (C2) (see “6. Temporary Communication Key Transmission” in FIG. 2A). "reference). The T secret key is stored in the verification terminal (V1).
 T公開鍵を受信した携帯端末(C2)は、このT公開鍵を用いて基本4情報を暗号化して暗号データを作成する。そして、携帯端末(C2)は、暗号データ及びノンスに対して電子署名を付与して、検証端末(V1)に送信する(図2(A)の「7. 基本4情報送信」参照)。 The mobile terminal (C2) that has received the T public key encrypts the basic four information using the T public key and creates encrypted data. Then, the mobile terminal (C2) attaches an electronic signature to the encrypted data and the nonce, and transmits it to the verification terminal (V1) (see “7. Basic 4 information transmission” in FIG. 2A).
 検証端末(V1)は、保管してあるT秘密鍵を用いて暗号データを復号化することによって基本4情報を平文に戻した上で、所定のハッシュ関数で基本4情報をハッシュする(hash(4情報))。次に、検証端末(V1)は、このhash(4情報)及びC2公開鍵を認証局端末(Aall)に送信し、ユーザXが認証局端末(Aall)に真に登録された事実があるかの検証をリクエストする(図2(B)の「8. 既登録の確認要求」参照)。 The verification terminal (V1) restores the basic 4 information to plaintext by decrypting the encrypted data using the stored T secret key, and then hashes the basic 4 information with a predetermined hash function (hash ( 4 information)). Next, the verification terminal (V1) transmits the hash (4 information) and the C2 public key to the certification authority terminal (Aall), and whether there is a fact that the user X is truly registered in the certification authority terminal (Aall). (See “8. Confirmation Request for Existing Registration” in FIG. 2B).
 認証局端末(Aall)における複数のコンピュータの各々は、上述したように各自の記録媒体に同じようにユーザ登録の事実を保管及び管理している。本実施形態の場合、例えば、C2公開鍵を検索キーとして記録媒体内をサーチしてユーザ登録の有無を検出する。
 同一ユーザに関して複数の登録がされていれば、登録が最新のものを検出したりする。これは、住所や氏名が変更されたケースに適用されるであろう。また、有効期限も含んで登録されている場合は失効されていないものを検出すればよい。このように、認証局端末(Aall)は、(i)認証局端末(Aall)を構成する少なくとも1つのコンピュータ(好ましくは、一定数以上のコンピュータ)がそのユーザ登録の事実を記録していること、及び(ii)記録されたhash(4情報)が検証端末(V1)から送られたhash(4情報)と同一であること、を確認できた場合はユーザ登録有りの結果、確認できなかった場合はユーザ登録無しの結果を、検証端末(V1)に返す(図2(B)の「9. 既登録の確認処理」参照)。
As described above, each of the plurality of computers in the certificate authority terminal (Aall) stores and manages the fact of user registration in the same recording medium. In the present embodiment, for example, the presence or absence of user registration is detected by searching the recording medium using the C2 public key as a search key.
If a plurality of registrations are made for the same user, the latest registration is detected. This will apply to cases where the address or name has changed. Moreover, what is not expired should just be detected when it is registered including the expiration date. As described above, the certificate authority terminal (Aall) has (i) that at least one computer (preferably a certain number of computers) constituting the certificate authority terminal (Aall) records the fact of the user registration. And (ii) if the recorded hash (4 information) is the same as the hash (4 information) sent from the verification terminal (V1), it could not be confirmed as a result of user registration. In this case, the result of no user registration is returned to the verification terminal (V1) (see “9. Confirmation process of already registered” in FIG. 2B).
 検証端末(V1)は、ユーザ登録有りの結果の場合は本人確認がとれたとみなして、ユーザXのB銀行口座を開設する。ユーザ登録無しの結果の場合はB銀行口座を開設しない(図2(B)の「10. V1で口座開設」参照)。 The verification terminal (V1) considers that the identity has been obtained in the case of the result of the user registration, and opens the B bank account of the user X. In the case of the result without user registration, the bank B account is not opened (see “10. Open account with V1” in FIG. 2B).
 さらに、検証端末(V1)は、ユーザXのB銀行口座開設の事実を認証局端末(Aall)に登録するリクエストを出す。本登録のため、検証端末(V1)は、C2公開鍵、ハッシュされた基本4情報であるhash(4情報)、検証端末(V1)の公開鍵(V1公開鍵)に対して電子署名を付与して、認証局端末(Aall)に送信する。オプションとして、ユーザ登録の効力の期限を設けるための有効期限や登録した日時などを含んでいてもよい。更に他の実施形態では、有効期限を運転免許証や保険証の有効期限に設定したり、登録日時から例えば1年などと決めるようにすることを含む。
 これを受けて、認証局端末(Aall)は受信した上記データを登録する(図2(B)の「11. 認証局に登録」参照)。
Further, the verification terminal (V1) issues a request for registering the fact that the user X has established the B bank account in the certificate authority terminal (Aall). For this registration, the verification terminal (V1) gives an electronic signature to the C2 public key, hash (4 information) that is hashed basic 4 information, and the public key (V1 public key) of the verification terminal (V1). To the certificate authority terminal (Aall). As an option, an expiration date for setting an expiration date of user registration, a date and time of registration, and the like may be included. Still another embodiment includes setting the expiration date to the expiration date of a driver's license or insurance card, or determining the registration date and time as, for example, one year.
In response, the certification authority terminal (Aall) registers the received data (see “11. Registration with Certification Authority” in FIG. 2B).
 また、検証端末(V1)は認証局端末(Aall)に正常に登録がされたかの確認を行い、認証局端末(Aall)はその確認結果を検証端末(V1)に返す(図2(B)の「12. 登録結果の確認」参照)。検証端末(V1)は、認証局端末(Aall)にユーザ登録された報告を携帯端末(C2)に送信する(図2(B)の「13. 登録完了の報告」参照)。 Further, the verification terminal (V1) confirms whether or not the registration is normally performed in the certification authority terminal (Aall), and the certification authority terminal (Aall) returns the confirmation result to the verification terminal (V1) (FIG. 2B). Refer to “12. Confirmation of registration result”. The verification terminal (V1) transmits the report registered by the certificate authority terminal (Aall) to the mobile terminal (C2) (see “13. Registration completion report” in FIG. 2B).
 なお、他の実施形態においては、ユーザ登録された報告を携帯端末(C2)に送信する際に「4. ユーザ公開鍵送信」の際に受信したC2公開鍵で暗号化した基本4情報と、検証端末(V1)の公開鍵とに、検証端末(V1)の電子署名(更に、オプションとして有効期限も含んでもよい。)を付与して携帯端末(C2)へ送信するようにしてもよい。検証端末(V1)からの送信を受けて、携帯端末(C2)は、検証端末(V1)の公開鍵を用いて検証端末(V1)の電子署名を検証するとともに、自身のC2秘密鍵で暗号データを復号化する。これにより、認証局端末(Aall)にB銀行の口座開設が登録されたことを知るようにしてもよい。 In another embodiment, when transmitting a user-registered report to the mobile terminal (C2), the basic four information encrypted with the C2 public key received at the time of “4. user public key transmission”; An electronic signature of the verification terminal (V1) (and optionally an expiration date may also be included) may be attached to the public key of the verification terminal (V1) and transmitted to the mobile terminal (C2). Upon receiving the transmission from the verification terminal (V1), the mobile terminal (C2) verifies the electronic signature of the verification terminal (V1) using the public key of the verification terminal (V1) and encrypts it with its own C2 private key. Decrypt the data. Thereby, you may make it know that the account opening of B bank was registered into the certification authority terminal (Aall).
 その後、検証端末(V1)は、テンポラリーなキーペア(T秘密鍵、T公開鍵)を使用できなくする、鍵の破棄を実行しておく(図2(B)の「14. 一時的通信鍵破棄」参照)。そして、検証端末(V1)は、ユーザPC(C1)にも登録結果(基本4情報や有効期限を含んでもよい。)を送信し、B銀行の口座開設の登録が携帯端末(C2)と齟齬しないようにしておく(図2(B)の「15. 登録結果通知」参照) After that, the verification terminal (V1) executes the key destruction that disables the temporary key pair (T secret key, T public key) (see “14. Temporary communication key destruction” in FIG. 2B). "reference). Then, the verification terminal (V1) transmits the registration result (basic 4 information and expiration date may also be included) to the user PC (C1), and the registration of the bank B account opening is performed with the portable terminal (C2). (Refer to "15. Registration result notification" in Fig. 2 (B))
 以上のとおり、B銀行は従来のような本人確認書類の送信をユーザXに要求するのではなく、ユーザXが他の事業者との間での取引等のために既に認証システム100に登録されている事実をもって本人確認作業を行うものであり、事業者ごとに行っていた本人確認作業の代わりを処理することができるようになる。 As described above, the bank B does not request the user X to send a personal identification document as in the past, but the user X is already registered in the authentication system 100 for transactions with other businesses. Therefore, it is possible to process the identity verification work for each business operator instead of the identity verification work.
<登録データの構成と登録処理>
 以降は、認証システム100を構成する複数のコンピュータに記憶されるデータの構成と、複数のコンピュータがユーザXを各自の記録媒体に登録する際に行う演算処理について説明する。
 本実施形態の認証システム100は、分散型台帳技術に基づく処理を実行する。分散型台帳技術の特徴の一つは、ネットワークに参加する複数の端末間で同じ帳簿(即ち、履歴データ)をそれぞれ持ち合い、常に情報が共有されるように構成されている点である。P2P型でネットワーク接続するノード(端末)が履歴データを分散して保存しているのである。従来の多くのシステムのようなサーバを核とする中央集権型に構成され、ネットワーク上のインスタンスやデータを中央集権サーバがコントロールするような仕組みとは大きく異なる。したがって、本実施形態の認証システム100の場合、複数のコンピュータの各コンピュータが各自の記録媒体に登録(記憶)しているユーザデータが、同一なデータであることを前提とすることに特徴がある。
<Configuration of registration data and registration processing>
Hereinafter, the configuration of data stored in a plurality of computers constituting the authentication system 100 and the arithmetic processing performed when the plurality of computers register the user X in their recording media will be described.
The authentication system 100 according to the present embodiment executes processing based on the distributed ledger technology. One of the features of the distributed ledger technology is that a plurality of terminals participating in the network have the same book (that is, history data), and the information is always shared. Nodes (terminals) connected to the network in the P2P type store history data in a distributed manner. It is configured in a centralized type with a server as a core like many conventional systems, and is greatly different from a mechanism in which a centralized server controls instances and data on a network. Therefore, the authentication system 100 according to the present embodiment is characterized in that it is premised that user data registered (stored) in each recording medium by a plurality of computers is the same data. .
1.登録されるデータ構成
 図3は、認証局(Aall)における各コンピュータが登録するデータの構成例を示している。図1の登録フローに従い、「6. 認証局に登録」の手順のとき登録されるデータは、図3の左部に示すとおり、携帯端末(C2)の公開鍵、ユーザXの基本4情報のハッシュ値、A銀行である認証端末(A1)の公開鍵、そしてオプションとして有効期限、及び認証端末(A1)の電子署名のデータ群31を含む。必ずしもこれらのデータ群31に限定しているわけではなく、他のデータを適宜含むこともある。例えば、記憶する時点のタイムスタンプ情報を含んでいてもよい。このタイムスタンプ情報は、認証局(Aall)の各コンピュータで共通の日時、あるいは各コンピュータで記憶した日時の両方の場合がある。
1. Registered Data Configuration FIG. 3 shows an example of the configuration of data registered by each computer in the certificate authority (Aall). According to the registration flow of FIG. 1, the data registered in the procedure of “6. Registration with certificate authority” includes the public key of the portable terminal (C2) and the basic four information of user X as shown in the left part of FIG. It includes a hash value, a public key of the authentication terminal (A1) that is A bank, and an expiration date as an option, and an electronic signature data group 31 of the authentication terminal (A1). The data group 31 is not necessarily limited, and other data may be included as appropriate. For example, time stamp information at the time of storage may be included. This time stamp information may be both the date and time common to each computer of the certificate authority (Aall) or the date and time stored in each computer.
 また、A銀行の口座開設時にユーザ登録した後、B銀行の口座開設時に本人確認を認証局(Aall)にリクエストした事実を記録したデータ構成例を図3の右部に示す。このデータ構成では、A銀行のときに記録したデータ群31の直後にB銀行のときに記録したデータ群32がつながって記録されているケースを概念的にあらわしている。このようなデータ群の連鎖として考えられることから、いわゆる分散型台帳技術(DLT)又はブロックチェーン構造とも呼ばれている。 Also, the right part of FIG. 3 shows an example of the data structure in which the fact that the user has been registered at the time of opening the bank A account and then requested the identity authority (Aall) to confirm the identity at the time of opening the bank B account is recorded. This data structure conceptually represents a case where the data group 32 recorded at the time of the B bank is connected and recorded immediately after the data group 31 recorded at the time of the A bank. Since it is considered as a chain of such data groups, it is also called a so-called distributed ledger technology (DLT) or a block chain structure.
 実際には、データ群31の記録の後、A銀行やB銀行等の任意の事業体で行われる他のユーザ登録が登録されることになるため、時系列でデータ登録をあらわすとすれば、データ群31とデータ群32との間にはユーザYに関する同様のデータが記録されることになろう。この場合、データ群31とデータ群32は互いの記憶アドレスを示すリンク情報(例えば、ポインターなど)を有することで、ユーザXという同一人物の記憶データを迅速にサーチできるようにしてもよい。認証局(Aall)における各コンピュータは、これら複数のデータ群を同一のデータ構成で記憶する。 Actually, after the data group 31 is recorded, other user registrations performed by an arbitrary entity such as Bank A or Bank B are registered. Therefore, if data registration is represented in time series, Similar data related to the user Y will be recorded between the data group 31 and the data group 32. In this case, the data group 31 and the data group 32 may have link information (for example, a pointer) indicating the storage address of each other, so that the stored data of the same person named the user X can be searched quickly. Each computer in the certificate authority (Aall) stores the plurality of data groups in the same data configuration.
2.登録処理
 次に、認証局(Aall)における各コンピュータが合意形成をした上で、携帯端末(C2)の公開鍵、ユーザXの基本4情報のハッシュ値、A銀行である認証端末(A1)の公開鍵を登録することについて説明する。
2. Registration Processing Next, after each computer in the certificate authority (Aall) has formed a consensus, the public key of the portable terminal (C2), the hash value of the basic four information of the user X, the authentication terminal (A1) that is A bank Registration of a public key will be described.
 まず、複数のコンピュータの中から一のコンピュータをリーダーとして選定し、そのリーダーが下す結論を他のコンピュータが従うものとする。各コンピュータは自分の信頼度スコアがあり、複数のコンピュータは所定の信頼度レートを共有していることから、この信頼度レートを閾値として超えるコンピュータの中から例えば最も信頼度スコアが高いコンピュータをリーダーとして選定する。他の実施形態では、ランダムにリーダーを選定したり、所定の時間が経過すると順繰りにリーダーとなるようにすることもある。 First, it is assumed that one computer is selected as a leader from among a plurality of computers, and other computers follow the conclusions made by the leader. Since each computer has its own reliability score and a plurality of computers share a predetermined reliability rate, the computer having the highest reliability score, for example, is selected from among computers that exceed this reliability rate as a threshold. Select as In other embodiments, a leader may be selected at random, or may become a leader in order after a predetermined time has elapsed.
 リーダーとなったコンピュータは、他のコンピュータに、各自がユーザXに関して記録している図3に示す構成の分散型台帳技術(DLT)又はブロックチェーンのデータを用いて所定の演算を実行するよう指示する。所定の演算とはハッシュ関数Hを用いた数学計算である。例えば、本実施形態では、楕円曲線に基づく公開暗号技術を用い、使用するハッシュ関数Hは、512ビットのSHA3である。
 秘密鍵Kをランダムな256ビット整数としたとき、秘密鍵Kに対応する公開鍵Aは、
   H(k)=(h0,h1,…,h511)      (1)
   a=2256+Σ2ii(但し、3≦i≦253) (2)
   A=aB                   (3)
 の各ステップを実行することにより生成することができる。
 ここで、Bは、所定の楕円曲線を形成するための基本ポイントの集合であり、膨大な数の要素を有する。Aは、256ビット整数にエンコードされ得る集合Bの各要素でもある。このように、Aは集合Bの要素であるため、公開鍵として機能する256ビット整数の公開鍵Aにエンコードされる。
The computer that has become the leader instructs other computers to execute predetermined operations using the distributed ledger technology (DLT) or block chain data of the configuration shown in FIG. To do. The predetermined operation is a mathematical calculation using the hash function H. For example, in this embodiment, a public encryption technique based on an elliptic curve is used, and the hash function H to be used is 512-bit SHA3.
When the secret key K is a random 256-bit integer, the public key A corresponding to the secret key K is
H (k) = (h 0 , h 1 ,..., H 511 ) (1)
a = 2 256 + Σ2 i h i ( where, 3 ≦ i ≦ 253) ( 2)
A = aB (3)
It can generate | occur | produce by performing each step of.
Here, B is a set of basic points for forming a predetermined elliptic curve, and has an enormous number of elements. A is also each element of set B that can be encoded into a 256-bit integer. Thus, since A is an element of set B, it is encoded into a 256-bit integer public key A that functions as a public key.
 記憶する対象データとしてのメッセージM、秘密鍵K及び関連する公開鍵Aとしたとき、
   H(k)=(h0,h1,…,h511)      (4)
      r=H(h256,…,h511,M)     (5)
      R=rB                (6)
      S=(r+H(R,A,M)a) mod q   (7)
 の各ステップを実行することにより、署名を生成することができる。
 また、(R,S)は、秘密鍵Kの下でのメッセージMの署名となる。
When the message M, the secret key K and the related public key A are stored as target data,
H (k) = (h 0 , h 1 ,..., H 511 ) (4)
r = H (h 256 ,..., h 511 , M) (5)
R = rB (6)
S = (r + H (R, A, M) a) mod q (7)
A signature can be generated by executing each of the steps.
Further, (R, S) is a signature of the message M under the secret key K.
 各コンピュータは、所与のメッセージM及び公開鍵Aに関する署名(R,S)を検証するため、R’=SB―H(R,A,M)Aを計算し、R’=Rであることを検証する。値が一致するコンピュータの数が所定の数を超えた場合、複数のコンピュータ間で登録の合意が形成されたものとみなし、登録対象にするデータと判定する。なお、合意が形成されなかった場合、そのデータはブロック分散型台帳技術(DLT)又はチェーンの一要素として登録されることなく排除される。 Each computer computes R ′ = SB−H (R, A, M) A to verify the signature (R, S) for a given message M and public key A, and R ′ = R To verify. When the number of computers with matching values exceeds a predetermined number, it is considered that a registration agreement has been formed among a plurality of computers, and it is determined that the data is to be registered. If no consensus is formed, the data is excluded without being registered as part of a block distributed ledger technology (DLT) or chain.
 なお、上述した各コンピュータによる実行される集団的合意(コンセンサス)に関する数学的演算は、あくまで一例であって上述の手順に限定するものではなく、例えばビットコインで行われるようなProof of Work(POW)の計算の手法を排除するわけではない。
 複数のコンピュータが連携して記録対象のデータの正当性に対する集団的合意をとることは、不正データの複製や記憶データの改ざんを発見する上で極めて有効である。
The mathematical operations related to collective consensus (consensus) executed by each computer described above are merely examples, and are not limited to the above-described procedure. For example, Proof of Work (POW) performed in bitcoin ) Does not exclude the calculation method.
Collective agreement on the legitimacy of data to be recorded in cooperation with a plurality of computers is extremely effective in finding illegal data duplication and stored data alteration.
 これまで、説明してきた複数のコンピュータによる認証システム100の構成例を図4(A)及び図4(B)に示す。図4(A)は、ネットワーク3に複数の認証局の端末Y(1)~Y(N)が接続され、端末Y(1)~Y(N)それぞれが同一のトランザクションデータを記録してP2P型分散型台帳技術を具現化する例である。一点波線で囲った端末Y(1)~Y(N)端末が、特許請求の範囲に記載する「複数のコンピュータ」を指す。 FIG. 4A and FIG. 4B show a configuration example of the authentication system 100 using a plurality of computers described so far. In FIG. 4A, a plurality of certificate authority terminals Y (1) to Y (N) are connected to the network 3, and each of the terminals Y (1) to Y (N) records the same transaction data, and P2P This is an example of embodying a distributed type ledger technology. Terminals Y (1) to Y (N) surrounded by a dashed line indicate “a plurality of computers” recited in the claims.
 また、図4(B)のように、端末Y(1)~Y(N)以外の端末Z(1)が認証システム100に含まれることもある。このようなシステム構成の場合、端末Y(1)~Y(N)及び端末Z(1)が、特許請求の範囲に記載する「複数のコンピュータ」を指す。なお、端末Zが必ず単一であることを要求するものではない。したがって、2以上の第三者的な機関に対応して端末Zが複数であってもよい。 Further, as shown in FIG. 4B, a terminal Z (1) other than the terminals Y (1) to Y (N) may be included in the authentication system 100. In the case of such a system configuration, the terminals Y (1) to Y (N) and the terminal Z (1) indicate “a plurality of computers” described in the claims. The terminal Z is not necessarily required to be single. Therefore, there may be a plurality of terminals Z corresponding to two or more third-party organizations.
 端末Z(1)は、第三者的な立場(例えば、犯罪収益の移転を防止する目的で金融機関や認証局等を監督する組織体、本発明に係る認証サービスを提供する会社など)に位置づけられる端末である。分散型台帳として複数のコンピュータに記録される一連のデータ又はトランザクションは、過去の履歴記録が個人の認証事実を示すための証拠となるので、後から記録の改ざんを行なったかのトレースが容易である。法律上の要請から、情報漏洩に関連する事件等が発生した場合や金融機関の監査においては情報の流れを確認する必要があるので、過去の履歴記録を調べ直すことは避けられない。端末Zのような第三者的な機関が含まれていると、銀行等が拒否したとしても端末Zの記録媒体の履歴をトレースすることで送信記録をチェックでき、透明性が高いシステムを構築することができる。 The terminal Z (1) is in a third party position (for example, an organization that supervises a financial institution or a certification authority for the purpose of preventing the transfer of criminal proceeds, a company that provides an authentication service according to the present invention, etc.). It is a terminal that is positioned. A series of data or transactions recorded in a plurality of computers as a distributed ledger makes it easy to trace whether the records have been falsified later, since past history records serve as evidence for showing personal authentication facts. It is unavoidable to reexamine past historical records because it is necessary to confirm the flow of information when legal matters require incidents related to information leakage or when auditing financial institutions. If a third-party organization such as terminal Z is included, even if the bank refuses, the transmission record can be checked by tracing the history of the recording medium of terminal Z, and a highly transparent system is constructed. can do.
 上述した説明では、A銀行やB銀行が、認証局の端末Y(1)~Y(N)のいずれかに認証依頼して、ユーザの電子証明書の発行をリクエストするものであったが、A銀行やB銀行が認証局の端末Yとして機能する場合もある。A銀行及びB銀行が上述した認証サービスを利用するには、認証システム100においてサービス提供事業者としてあらかじめ登録されていることは当然であるが、サービス提供事業者が認証局を構成するコンピュータとして機能してはいけないという制限は本実施形態において設けていない。別の実施形態では、本発明の認証サービス提供事業者(例えば、金融機関)と、認証局は区別するようにしてもよい。 In the above description, bank A or bank B requests authentication of any of the terminals Y (1) to Y (N) of the certificate authority and requests the user to issue an electronic certificate. Bank A and bank B may function as the terminal Y of the certificate authority. In order for Bank A and Bank B to use the authentication service described above, it is natural that the service provider is registered in advance in the authentication system 100 as a service provider, but the service provider functions as a computer constituting the certificate authority. There is no restriction in the present embodiment that it should not be done. In another embodiment, an authentication service provider (for example, a financial institution) of the present invention may be distinguished from a certificate authority.
 また、端末Y(1)~Y(N)及び端末Zには所定の実行プログラムがインストールされ、当該実行プログラムが起動することによって、本発明に係る各処理がそれぞれの端末で実行される。その実行プログラムは、端末Y(1)~Y(N)及び端末Zがネットワーク経由で所定のサイトからダウンロードできるようにしたり、或いは実行プログラムが格納されたCDやUSBメモリなどからインストールされるものとする。したがって、本発明は、CD-ROM等の光学ディスク、磁気ディスク、半導体メモリなどの各種の記録媒体を通じて、又は通信ネットワークなどを介してダウンロードすることにより、コンピュータにインストール又はロードしたプログラム、及びこれら記憶媒体を発明の範疇として含む。 Also, a predetermined execution program is installed in the terminals Y (1) to Y (N) and the terminal Z, and each process according to the present invention is executed in each terminal by starting the execution program. The execution program is such that the terminals Y (1) to Y (N) and the terminal Z can be downloaded from a predetermined site via a network, or installed from a CD or USB memory in which the execution program is stored. To do. Therefore, the present invention relates to a program installed or loaded in a computer by downloading it through various recording media such as an optical disk such as a CD-ROM, a magnetic disk, and a semiconductor memory, or via a communication network, and the storage thereof. The medium is included in the scope of the invention.
 本発明に関する認証局システム100は、中央管理主体を必要としないP2Pネットワークであって、複数のコンピュータでデータ記録を分散する。これにより、一部のコンピュータがダウンしても、システム全体がダウンしない耐障害性を有するのであり、不稼働時間のない24時間運用システムの構築を実現する。そして、不正者による改ざんが極めて困難な分散型台帳技術(DLT)又はブロックチェーン型のデータ構造であることから高いセキュリティ性のあるシステムを低コストで構築することが可能である。
 なお、各コンピュータが各自の記録媒体内に記録する基本4情報は、生データではなくハッシュ化されているため、各コンピュータから基本4情報が読み出されたとしても、解読される事態にはならず、高いセキュリティ性がある。
The certificate authority system 100 according to the present invention is a P2P network that does not require a central management entity, and distributes data records among a plurality of computers. As a result, even if some computers are down, the entire system has fault tolerance so that a 24-hour operation system without downtime is realized. And since it is a distributed ledger technology (DLT) or block chain type data structure that is extremely difficult to be tampered with by unauthorized persons, it is possible to construct a highly secure system at low cost.
In addition, since the basic 4 information that each computer records in its own recording medium is hashed instead of raw data, even if the basic 4 information is read from each computer, it may not be decoded. It has high security.
 上述した実施形態では、金融機関に口座を開設するときのユーザの認証について説明してきたが、必ずしも金融機関での認証に限定されるものではない。例えば、医療、通信、不動産、教育、行政、物流、保険、任意の契約、インターネットサービス、シェアリングエコノミーサービスなど様々な分野についても本発明の範疇に含まれる。また、個人情報に限らず、デジタルアセットとして定義可能な情報(例えば、権利や価値記録)を取得する際の認証を任意の機関又は組織で行う場合も本発明の技術的意義が発揮されることになろう。 In the above-described embodiment, user authentication when opening an account in a financial institution has been described, but the present invention is not necessarily limited to authentication at a financial institution. For example, various fields such as medical care, communication, real estate, education, administration, logistics, insurance, voluntary contracts, Internet services, and sharing economy services are also included in the scope of the present invention. In addition, the technical significance of the present invention is also exhibited when authentication is performed not only for personal information but also for information that can be defined as digital assets (for example, rights and value records) at any organization or organization. Would.
 2 ユーザのPC端末
 3 ネットワーク
 100 認証システム
 X ユーザのモバイル端末
 Y 認証局端末
 Z 監督組織体又は認証システム提供会社などの端末
2 User PC terminal 3 Network 100 Authentication system X User mobile terminal Y Certification authority terminal Z Terminal of supervisory organization or authentication system provider

Claims (4)

  1.  ネットワーク上に接続する複数のコンピュータを用いて認証処理を行うためのプログラムであって、
     前記複数のコンピュータに含まれる一のコンピュータは、ユーザ登録のリクエストに応答して、前記ネットワーク上に個人又は組織体を特定する情報を含むデータを出力する処理と、
     前記複数のコンピュータに含まれる前記一のコンピュータ以外の少なくとも1以上のコンピュータは、前記ネットワーク上に出力された前記データを取り込み、同一の演算を実行することによりコンピュータ間の合意形成が得られた場合に前記複数のコンピュータは各自の記録媒体に前記データを記憶する処理と、
     前記複数のコンピュータに含まれる任意のコンピュータが、前記ユーザ登録したユーザの本人認証の要求を事業体又は個人から受けた場合、前記複数のコンピュータの少なくとも1つのコンピュータが自身の記録媒体に前記データが記憶されているか否かを判定する処理と、
     前記データが記憶されていた場合、前記本人認証を要求する事業体又は個人に対し、本人認証済みの報告を送信する処理と、
     が実行されるようにする、プログラム。
    A program for performing authentication processing using a plurality of computers connected to a network,
    One computer included in the plurality of computers, in response to a user registration request, outputs data including information identifying an individual or an organization on the network;
    When at least one computer other than the one computer included in the plurality of computers fetches the data output on the network and executes the same operation, thereby obtaining consensus between the computers And the plurality of computers store the data in their recording media;
    When an arbitrary computer included in the plurality of computers receives a request for user authentication of the registered user from a business entity or an individual, at least one of the plurality of computers stores the data in its recording medium. A process of determining whether or not it is stored;
    When the data is stored, a process of sending a report of authenticated personal identity to an entity or individual requesting the personal authentication;
    A program that causes a program to be executed.
  2.  前記複数のコンピュータの各コンピュータの記録媒体には、前記データが完全同一で記憶されている、請求項1に記載のプログラム。 The program according to claim 1, wherein the data is stored in the same recording medium in each of the plurality of computers.
  3.  前記合意形成の有無は、前記各コンピュータによる演算結果の一致が所定数以上か否かにより決定する、請求項1又は2に記載のプログラム。 The program according to claim 1 or 2, wherein the presence or absence of the consensus is determined by whether or not the number of coincidence of calculation results by the computers is equal to or greater than a predetermined number.
  4.  ネットワーク上に接続する複数のコンピュータを用いた電子認証方法であって、
     前記複数のコンピュータに含まれる一のコンピュータが、ユーザ登録のリクエストに応答して、個人又は組織体を特定する情報を含むデータを、前記複数のコンピュータに含まれる他のコンピュータに送信し、
     前記複数のコンピュータの各コンピュータが、同一の演算を実行することによりコンピュータ間の合意形成が得られた場合に各自の記録媒体に前記データを記憶し、
     前記複数のコンピュータに含まれる任意のコンピュータが、前記ユーザ登録したユーザの本人認証の要求を事業体又は個人から受けた場合、前記複数のコンピュータの少なくとも1つのコンピュータが自身の記録媒体に前記データが記憶されているか否かを判定し、
     前記データが記憶されていた場合、前記本人認証を要求する事業体又は個人に対し、本人認証済みの報告を送信する、
     ことが実行される電子認証方法。
    An electronic authentication method using a plurality of computers connected on a network,
    In response to a user registration request, one computer included in the plurality of computers transmits data including information identifying an individual or an organization to another computer included in the plurality of computers.
    Each computer of the plurality of computers stores the data in its own recording medium when consensus formation is obtained between the computers by executing the same operation,
    When an arbitrary computer included in the plurality of computers receives a request for user authentication of the registered user from a business entity or an individual, at least one of the plurality of computers stores the data in its recording medium. Determine whether it is remembered,
    If the data is stored, send a personally authenticated report to the entity or individual requesting the personal authentication,
    The electronic authentication method that is performed.
PCT/JP2017/040432 2016-11-09 2017-11-09 Electronic authentication method and program WO2018088475A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2018550251A JP7114078B2 (en) 2016-11-09 2017-11-09 Electronic authentication method and program

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2016-218939 2016-11-09
JP2016218939 2016-11-09

Publications (1)

Publication Number Publication Date
WO2018088475A1 true WO2018088475A1 (en) 2018-05-17

Family

ID=62110705

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2017/040432 WO2018088475A1 (en) 2016-11-09 2017-11-09 Electronic authentication method and program

Country Status (2)

Country Link
JP (1) JP7114078B2 (en)
WO (1) WO2018088475A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2019219780A (en) * 2018-06-18 2019-12-26 Necソリューションイノベータ株式会社 Personal information management system, and service providing system, method and program
CN110896659A (en) * 2018-08-02 2020-03-20 刘卓 Data processing method, node, block chain network and virtual data carrier
EP3664363A1 (en) 2018-12-03 2020-06-10 Fujitsu Limited Device and method for processing public key of user in communication system that includes a plurality of nodes
US11711219B1 (en) 2017-08-24 2023-07-25 United Services Automobile Association (Usaa) PKI-based user authentication for web services using blockchain
CN116545762A (en) * 2023-06-26 2023-08-04 北京力码科技有限公司 Financial electronic information authentication system and method
JP7436351B2 (en) 2020-12-07 2024-02-21 株式会社日立製作所 Electronic delegation system and electronic delegation method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150128240A1 (en) * 2013-11-01 2015-05-07 Ncluud Corporation Determining Identity Of Individuals Using Authenticators
JP2015146165A (en) * 2014-02-04 2015-08-13 日本電信電話株式会社 Fault resistance signal processor and fault resistance signal processing method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150128240A1 (en) * 2013-11-01 2015-05-07 Ncluud Corporation Determining Identity Of Individuals Using Authenticators
JP2015146165A (en) * 2014-02-04 2015-08-13 日本電信電話株式会社 Fault resistance signal processor and fault resistance signal processing method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
FUCHIDA, YASUYUKI: "Block chain and Innovation in Financial Transaction", NOMURA CAPITAL MARKETS QUARTERLY, vol. 19, no. 2, 1 November 2015 (2015-11-01), pages 11 - 35 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11711219B1 (en) 2017-08-24 2023-07-25 United Services Automobile Association (Usaa) PKI-based user authentication for web services using blockchain
JP2019219780A (en) * 2018-06-18 2019-12-26 Necソリューションイノベータ株式会社 Personal information management system, and service providing system, method and program
CN110896659A (en) * 2018-08-02 2020-03-20 刘卓 Data processing method, node, block chain network and virtual data carrier
CN110896659B (en) * 2018-08-02 2024-02-09 刘卓 Data processing method, node, blockchain network and virtual data carrier
EP3664363A1 (en) 2018-12-03 2020-06-10 Fujitsu Limited Device and method for processing public key of user in communication system that includes a plurality of nodes
JP2020092287A (en) * 2018-12-03 2020-06-11 富士通株式会社 Communication device, communication method, and communication program
US11469905B2 (en) 2018-12-03 2022-10-11 Fujitsu Limited Device and method for processing public key of user in communication system that includes a plurality of nodes
JP7209518B2 (en) 2018-12-03 2023-01-20 富士通株式会社 Communication device, communication method, and communication program
JP7436351B2 (en) 2020-12-07 2024-02-21 株式会社日立製作所 Electronic delegation system and electronic delegation method
CN116545762A (en) * 2023-06-26 2023-08-04 北京力码科技有限公司 Financial electronic information authentication system and method

Also Published As

Publication number Publication date
JP7114078B2 (en) 2022-08-08
JPWO2018088475A1 (en) 2019-10-03

Similar Documents

Publication Publication Date Title
US10942994B2 (en) Multicomputer processing for data authentication using a blockchain approach
US11159537B2 (en) Multicomputer processing for data authentication and event execution using a blockchain approach
JP6524347B2 (en) Information sharing system
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
EP3395006B1 (en) Method for managing a trusted identity
Bistarelli et al. An end-to-end voting-system based on bitcoin
RU2448365C2 (en) Apparatus and method for secure data transmission
WO2018088475A1 (en) Electronic authentication method and program
CN115699000A (en) Method, apparatus and computer readable medium for secure multilateral data exchange over a computer network
AU2017225928A1 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
Roh et al. A study on electronic voting system using private blockchain
Bistarelli et al. End-to-end voting with non-permissioned and permissioned ledgers
Agbesi et al. Electronic voting recording system based on blockchain technology
US20220405765A1 (en) Know your customer (kyc) and anti-money laundering (aml) verification in a multi-decentralized private blockchains network
JP2017092713A (en) Anonymous communication system and method for subscribing the same
CN112991045B (en) Medical health consumption financing method, device, equipment and medium based on blockchain
Dongre et al. Education degree fraud detection and student certificate verification using blockchain
Boontaetae et al. RDI: Real digital identity based on decentralized PKI
Tewari Blockchain research beyond cryptocurrencies
Sulaiman et al. Algorithms and Security Concern in Blockchain Technology: A Brief Review
Rafi et al. CERTIFICATE MANAGEMENT AND VALIDATION SYSTEM USING BLOCKCHAIN
US20240135380A1 (en) Identity conveyance systems
KR102239449B1 (en) Portfolio management system by using data sharing
KR102274169B1 (en) System for issuing object with function for preventing object from being tampered
TWI737139B (en) Personal data protection application system and personal data protection application method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17869581

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018550251

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17869581

Country of ref document: EP

Kind code of ref document: A1