WO2023145027A1 - Verification assistance method, verification assistance program, and information processing device - Google Patents

Verification assistance method, verification assistance program, and information processing device Download PDF

Info

Publication number
WO2023145027A1
WO2023145027A1 PCT/JP2022/003451 JP2022003451W WO2023145027A1 WO 2023145027 A1 WO2023145027 A1 WO 2023145027A1 JP 2022003451 W JP2022003451 W JP 2022003451W WO 2023145027 A1 WO2023145027 A1 WO 2023145027A1
Authority
WO
WIPO (PCT)
Prior art keywords
public key
certificate
verification
key
valid
Prior art date
Application number
PCT/JP2022/003451
Other languages
French (fr)
Japanese (ja)
Inventor
孝一 矢崎
陸大 小嶋
洋介 中村
泰久 奥村
大 山本
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to PCT/JP2022/003451 priority Critical patent/WO2023145027A1/en
Publication of WO2023145027A1 publication Critical patent/WO2023145027A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to a verification support method, a verification support program, and an information processing apparatus.
  • the conventional technology may not be able to accurately verify the validity of the certificate. For example, if an attacker rewrites the VC issuer information stored in the organization's web server, the validity of the VC assigned to the data cannot be verified normally.
  • the object of the present invention is to improve the accuracy of verifying the validity of a certificate.
  • the first public key and a second certificate issued to a predetermined system by a certificate authority.
  • a verification support method, a verification support program, and an information processing apparatus for outputting to an original address are proposed.
  • FIG. 1 is an explanatory diagram of an example of a verification support method according to an embodiment.
  • FIG. 2 is an explanatory diagram showing an example of the verification system 200.
  • FIG. 3 is a block diagram showing a hardware configuration example of the information processing apparatus 100.
  • FIG. 4 is an explanatory diagram showing an example of the contents of the storage destination management table 400.
  • FIG. 5 is an explanatory diagram showing an example of the contents of the reference destination management table 500.
  • FIG. FIG. 6 is a block diagram showing a hardware configuration example of the verification-side device 201.
  • FIG. 7 is a block diagram showing a functional configuration example of the verification system 200.
  • FIG. FIG. 1 is an explanatory diagram of an example of a verification support method according to an embodiment.
  • FIG. 2 is an explanatory diagram showing an example of the verification system 200.
  • FIG. 3 is a block diagram showing a hardware configuration example of the information processing apparatus 100.
  • FIG. 4 is an explanatory diagram showing an example of the contents of the
  • FIG. 8 is an explanatory diagram (part 1) showing an operation example of the verification system 200.
  • FIG. FIG. 9 is an explanatory diagram (part 2) showing an operation example of the verification system 200.
  • FIG. 10 is an explanatory diagram (part 3) showing an operation example of the verification system 200.
  • FIG. 11 is an explanatory diagram (part 4) showing an operation example of the verification system 200.
  • FIG. 12 is an explanatory diagram (No. 5) showing an operation example of the verification system 200.
  • FIG. FIG. 13 is an explanatory diagram showing an example in which the chip 320 outputs a certificate.
  • FIG. 14 is a sequence diagram illustrating an example of a registration processing procedure
  • FIG. 15 is a sequence diagram illustrating an example of a verification processing procedure;
  • FIG. 1 is an explanatory diagram of an example of a verification support method according to an embodiment.
  • the information processing apparatus 100 is a computer for improving the accuracy of verifying the validity of a certificate.
  • a certificate is, for example, a VC.
  • a VC includes a distributed ID (Decentralized Identifier) with an electronic signature. In the following description, the distributed ID may be referred to as "DID".
  • DID distributed ID
  • Electronic signatures tend to be implemented using centralized certificates.
  • a centralized certificate is established, for example, by an audit of a certification authority. Therefore, since there is a cost associated with the audit, it is difficult to reduce the cost associated with using electronic signatures.
  • a verifier who verifies the legitimacy of a VC may prepare a trust list in which DIDs with relatively high reliability are registered. Specifically, it is conceivable that the verifier determines that the DID has a relatively high degree of reliability based on the experience of meeting the issuer of the DID, and registers the DID in the trust list. With this approach, it may be difficult to determine whether the DID is relatively reliable. This method may increase the workload of the verifier. Therefore, it is difficult for verifiers with relatively low information literacy to use this method. It is difficult for this method to deal with the diversification of situations in which electronic signatures are used, and it is difficult to deal with the increase in the number of people trying to use electronic signatures.
  • a method of centrally establishing the reliability of DID can be considered. Specifically, a method of building a consortium blockchain and attempting to establish the reliability of the DID along with the admission examination for the consortium blockchain can be considered. With this method, there is a cost involved in admission screening, so even if a VC is used, there remains the problem that it is difficult to reduce the cost involved in using an electronic signature.
  • a method of establishing the reliability of the DID with the reliability of the existing system can be considered by storing the DID in association with the existing system.
  • An existing system is, for example, a system managed by a DID issuer.
  • a method of pre-associating and storing the DID in the web server can be considered.
  • the reliability of the DID cannot be verified with high precision, and the validity of the VC cannot be verified with high precision in some cases. For example, if an attacker rewrites the DID stored in the web server, the reliability of the DID cannot be verified normally, and the legitimacy of the VC cannot be verified normally.
  • Requester 110 is, for example, a computer that receives first certificate 111 .
  • the first certificate 111 is, for example, a legitimate certificate sent from the managing entity 130 .
  • the first certificate 111 may be, for example, an unauthorized certificate sent by an attacker pretending to be the administrative entity 130 .
  • a first certificate 111 may be attached to the data, for example, to ensure the authenticity of the data.
  • the requester 110 transmits a verification request regarding the first public key 112 corresponding to the first certificate 111 to the information processing apparatus 100 .
  • the managing entity 130 is, for example, an organization or an individual.
  • the system 120 is realized by a computer managed by the management subject 130.
  • System 120 is, for example, a website and implemented by a web server.
  • System 120 has a second certificate 121 issued by a certificate authority.
  • the second certificate 121 is, for example, an SSL (Secure Socket Layer) certificate.
  • System 120 has a second private key 122 corresponding to a second certificate 121 .
  • the system 120 provides the second private key 122 to the information processing device 100 .
  • the management entity 130 is a computer corresponding to the issuer that issues and uses the third certificate 131 .
  • Management entity 130 has a third certificate 131 .
  • the third certificate 131 can be the first certificate 111, for example.
  • the third certificate 131 may be issued without going through a third party certificate authority, for example.
  • a third certificate 131 is, for example, a VC.
  • a managing entity 130 has a first private key 132 corresponding to a third certificate 131 .
  • the management entity 130 provides the first secret key 132 to the information processing device 100 .
  • the information processing device 100 has a storage unit 101 .
  • the storage unit 101 stores a first private key 132 corresponding to the third certificate 131 issued to the management entity 130 and a second private key 132 corresponding to the second certificate 121 issued to the system 120 . is stored in association with the private key 122 of .
  • the information processing apparatus 100 associates the provided first secret key 132 with the second secret key 122 and stores them in the storage unit 101 .
  • the storage unit 101 may be, for example, a chip compatible with a TPM (Trusted Platform Module).
  • the information processing apparatus 100 receives from the requester 110 a verification request regarding the first public key 112 corresponding to the first certificate 111 .
  • the verification request includes, for example, first public key 112 .
  • the verification request may include, for example, a second public key 102 corresponding to a second certificate 121 issued to system 120 by a certificate authority.
  • the information processing apparatus 100 acquires a combination of the first public key 112 and the second public key 102 in response to the verification request. For example, the information processing apparatus 100 extracts the combination of the first public key 112 and the second public key 102 from the verification request, thereby generating the first public key 112 and the second public key 102. get a combination of
  • the information processing apparatus 100 refers to the storage unit 101 and determines whether the acquired combination is valid.
  • the information processing apparatus 100 determines whether or not the first public key 112 is a valid public key corresponding to the first secret key 132 stored in the storage unit 101 .
  • the information processing apparatus 100 determines whether the second public key 102 is a valid public key corresponding to the second secret key 122 stored in the storage unit 101 .
  • the information processing apparatus 100 can use the first public key 112 and the second public key 102 Determine that the combination is valid. For example, if at least one of the first public key 112 and the second public key 102 is not a valid public key, the information processing apparatus 100 uses the first public key 112 and the second public key 102 is determined to be invalid.
  • the information processing apparatus 100 outputs the determined result to the requester 110 of the verification request.
  • the information processing apparatus 100 transmits the determined result to the requester 110, for example.
  • the requester 110 determines that the first certificate 111 is valid. I judge. In this case, the first certificate 111 matches the third certificate 131, for example.
  • the requester 110 determines that the first certificate 111 is not valid. I judge. In this case, the first certificate 111 does not match the third certificate 131, for example.
  • the information processing apparatus 100 can improve the accuracy of verifying the validity of the first certificate 111 .
  • the information processing apparatus 100 can verify the validity of the first certificate 111 at the requester 110.
  • the validity of the document 111 can be made normally verifiable.
  • the information processing apparatus 100 does not allow the requester 110 to The validity of the first certificate 111 can be normally verified.
  • the information processing apparatus 100 normally verifies the legitimacy of the first certificate 111 at the requester 110 regardless of whether the first certificate 111 was issued via a third party certificate authority. can be made possible. Therefore, the information processing apparatus 100 can issue the third certificate 131, which can be the first certificate 111, by the management entity 130 without going through a third party certificate authority.
  • the information processing apparatus 100 can reduce the costs incurred when the third certificate 131 is issued by the management entity 130, and can facilitate the use of the third certificate 131.
  • the information processing apparatus 100 uses a specific format such as the third certificate 131 in order to guarantee the authenticity of data and express intentions such as confirmation, approval, or consent to data. It is possible to cope with the diversification of situations in which certificates are used.
  • the information processing apparatus 100 associates the provided first secret key 132 with the second secret key 122 and stores them in the storage unit 101, so that the request source 110 can validate the first certificate 111. can be successfully verifiable. Therefore, the information processing apparatus 100 can suppress an increase in the time required to enable the requester 110 to normally verify the validity of the first certificate 111 .
  • the information processing apparatus 100 extracts the combination of the first public key 112 and the second public key 102 from the verification request has been described, but the present invention is not limited to this.
  • the information processing apparatus 100 may extract the first public key 112 from the verification request and acquire the second public key 102 from the system 120 .
  • the present invention is not limited to this.
  • a plurality of computers may work together to realize the functions of the information processing apparatus 100 .
  • FIG. 2 is an explanatory diagram showing an example of the verification system 200.
  • the verification system 200 includes an information processing device 100, one or more verification-side devices 201, one or more issuing-side devices 202, one or more management-side devices 203, and one or more recording-side devices 204. including.
  • the network 210 is, for example, a LAN (Local Area Network), a WAN (Wide Area Network), the Internet, or the like.
  • the verification side device 201 and the management side device 203 are connected via a wired or wireless network 210 .
  • the verification device 201 and the recording device 204 are connected via a wired or wireless network 210 .
  • the information processing device 100 and the issuing device 202 are connected via a wired or wireless network 210 .
  • the information processing device 100 and the management device 203 are connected via a wired or wireless network 210 .
  • the information processing device 100 is a computer used by the user on the providing side.
  • Information processing apparatus 100 has a chip group including a chip that stores a DID private key and an SSL private key in association with each other.
  • the DID private key is a private key used by the issuer of the DID to generate the electronic signature attached to the DID.
  • the information processing device 100 receives a DID public key and a DID private key from one of the issuing devices 202 .
  • the information processing device 100 receives an SSL public key and an SSL private key from one of the issuing devices 202 .
  • the information processing apparatus 100 associates the DID private key received from one of the issuing devices 202 with the SSL private key received from the issuing device 202, and stores them in one of the chips of the chip group.
  • the information processing device 100 selects a chip corresponding to one of the issuing devices 202 from among the chip groups, for example, referring to a storage destination management table 400 described later in FIG. For example, the information processing apparatus 100 associates the DID private key received from the issuing device 202 and the SSL private key received from the issuing device 202 with a chip corresponding to one of the selected issuing devices 202. Attach and store.
  • the information processing apparatus 100 stores information that enables identification of a chip in which a combination of a DID private key and an SSL private key corresponding to the combination of the DID public key and the SSL public key is stored, which will be described later with reference to FIG. It may be stored in the reference destination management table 500 .
  • the information processing apparatus 100 includes the DID public key received from the issuing device 202 and the It may be stored in association with the SSL private key.
  • the information processing device 100 receives a verification request indicating the combination of the DID public key and the SSL public key from the verification side device 201 .
  • the information processing apparatus 100 selects a chip corresponding to the combination of the DID public key indicated by the verification request and the SSL public key from among the chip group by referring to a reference destination management table 500 described later with reference to FIG.
  • the information processing device 100 determines whether or not the selected chip stores a combination of a DID private key and an SSL private key corresponding to the combination of the DID public key and the SSL public key indicated by the verification request. do.
  • the information processing apparatus 100 determines that the combination of the DID public key and the SSL public key indicated by the verification request is valid. do. If the combination of the DID private key and the SSL private key is not stored in the selected chip, the information processing device 100 determines that the combination of the DID public key and the SSL public key indicated by the verification request is invalid. do.
  • the information processing device 100 transmits the result of determining whether or not the combination of the DID public key indicated by the verification request and the SSL public key is valid to the verification side device 201 .
  • the information processing apparatus 100 is, for example, a server or a PC (Personal Computer).
  • the verification-side device 201 is a computer used by the verification-side user.
  • the verifying device 201 receives the data to which the VC is assigned from the issuing device 202 .
  • Verification-side device 201 acquires the DID public key from recording-side device 204 based on the data to which VC is assigned.
  • the verifying device 201 acquires from the recording device 204 information that enables the management device 203 that manages the system corresponding to the issuing device 202 to be identified based on the data to which the VC is assigned.
  • the system is, for example, a website or the like.
  • the verification-side device 201 identifies the management-side device 203 based on the information that enables the management-side device 203 to be identified.
  • the verification-side device 201 acquires the SSL public key and the SSL certificate from the identified management-side device 203 .
  • Verification-side device 201 acquires the DID public key from specified management-side device 203 .
  • the verification-side device 201 may evaluate the reliability of the management-side device 203 based on the SSL certificate and verify whether the DID public key obtained from the management-side device 203 is valid. When the verification-side device 201 determines that the trust of the management-side device 203 is relatively low based on the SSL certificate, the verification-side device 201 determines that the DID public key acquired from the management-side device 203 is not valid, and adds it to the data. It may be determined that the given VC is not valid. When the verification side device 201 determines that the reliability of the management side device 203 is relatively high based on the SSL certificate, it temporarily determines that the DID public key obtained from the management side device 203 is valid. You can leave it.
  • the verification-side device 201 may compare the DID public key obtained from the recording-side device 204 with the DID public key obtained from the management-side device 203 to verify whether the DID public key is valid. For example, if the DID public key obtained from the recording device 204 and the DID public key obtained from the management device 203 do not match, the verification device 201 determines that at least one DID public key is not valid. You may If the DID public key is not valid, the verifier device 201 may determine that the VC given to the data is not valid. For example, when the DID public key obtained from the recording device 204 and the DID public key obtained from the management device 203 match, the verifying device 201 provisionally determines that each DID public key is valid. You can keep it.
  • the verification-side device 201 determines whether the combination of the DID public key and the SSL public key is valid. Verification-side device 201 transmits, for example, a verification request indicating a combination of a DID public key and an SSL public key to information processing device 100 . The verification-side device 201 receives from the information processing device 100 the result of determining whether or not the combination of the DID public key indicated by the verification request and the SSL public key is valid.
  • the verification-side device 201 determines that the VC given to the data is valid. If the combination of the DID public key indicated by the verification request and the SSL public key is not valid, the verifying device 201 determines that the VC given to the data is not valid.
  • the verification-side device 201 may output the determined result so that the verification-side user can refer to it. If the verification-side device 201 determines that the VC attached to the data is not valid, the verification-side device 201 may discard the data.
  • the verification-side device 201 is, for example, a PC, a tablet terminal, or a smart phone.
  • the issuing device 202 is a computer used by the issuing user. Issuer device 202 generates a DID private key, a DID public key, an SSL private key, and an SSL public key. The issuing device 202 issues a DID and issues a VC using the DID.
  • a VC includes, for example, a DID with an electronic signature based on the DID private key.
  • the VC contains, for example, the DID public key.
  • Issuer device 202 transmits the DID private key and the SSL private key to information processing device 100 . The issuing device 202 may transmit the DID public key and the SSL public key to the information processing device 100 .
  • the issuer device 202 provides the management device 203 with the SSL private key and the SSL public key. Issuer device 202 provides the DID public key to management device 203 . The issuing device 202 provides the DID public key to the recording device 204 . The issuing device 202 provides the recording device 204 with information that enables the management device 203 that manages the system corresponding to the issuing device 202 to be specified. The system is, for example, a website or the like. The issuing device 202 transmits the VC-added data to the verifying device 201 . The issuing device 202 is, for example, a PC, a tablet terminal, or a smart phone.
  • the management-side device 203 is a computer used by a management-side user.
  • the administrative user is, for example, the same user as the issuing user.
  • the administrative user is, for example, a user who has the same attributes as the issuing user.
  • the managing device 203 manages the system corresponding to the issuing device 202 .
  • the system is, for example, a website or the like.
  • the management-side device 203 receives the SSL private key and the SSL public key from the issuing-side device 202 .
  • the management-side device 203 generates an SSL certificate based on the SSL private key.
  • An SSL certificate contains, for example, an SSL public key.
  • the management-side device 203 stores the SSL public key and the SSL certificate so that the verification-side device 201 can refer to them.
  • the managing device 203 receives the DID public key from the issuing device 202 .
  • Management-side device 203 stores the DID public key so that verification-side device 201 can refer to it.
  • the management-side device 203 is, for example, a server or a PC.
  • the recording-side device 204 is a computer used by the recording-side user. Recording device 204 receives the DID public key from issuing device 202 . Recording-side device 204 records the DID public key so that verification-side device 201 can refer to it. Recording device 204 receives information from issuing device 202 that enables identification of management device 203 that manages the system corresponding to issuing device 202 . The recording device 204 records information that enables the identification of the management device 203 that manages the system corresponding to the issuing device 202 so that the verification device 201 can refer to it. The recording device 204 is, for example, a server or a PC.
  • the verifying device 201 may function as the issuing device 202 and may also operate as the issuing device 202 .
  • the issuing device 202 and the managing device 203 are different devices has been described here, the present invention is not limited to this.
  • the issuing device 202 may have the function of the managing device 203 and be operable as the managing device 203 as well.
  • FIG. 3 is a block diagram showing a hardware configuration example of the information processing apparatus 100.
  • the information processing apparatus 100 includes a CPU (Central Processing Unit) 301, a memory 302, a network I/F (Interface) 303, a recording medium I/F 304, a recording medium 305, and a chip group 306. have. Also, each component is connected by a bus 300 .
  • the CPU 301 controls the entire information processing apparatus 100 .
  • the memory 302 has, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a flash ROM, and the like. Specifically, for example, a flash ROM or ROM stores various programs, and a RAM is used as a work area for the CPU 301 .
  • a program stored in the memory 302 causes the CPU 301 to execute coded processing by being loaded into the CPU 301 .
  • the memory 302 may store a storage destination management table 400, which will be described later with reference to FIG. 4, and a reference destination management table 500, which will be described later with reference to FIG.
  • the network I/F 303 is connected to the network 210 through a communication line, and is connected to other computers via the network 210.
  • a network I/F 303 serves as an internal interface with the network 210 and controls input/output of data from other computers.
  • Network I/F 303 is, for example, a modem or a LAN adapter.
  • the recording medium I/F 304 controls reading/writing of data from/to the recording medium 305 under the control of the CPU 301 .
  • the recording medium I/F 304 is, for example, a disk drive, SSD (Solid State Drive), USB (Universal Serial Bus) port, or the like.
  • a recording medium 305 is a nonvolatile memory that stores data written under control of the recording medium I/F 304 .
  • the recording medium 305 may store a storage destination management table 400, which will be described later with reference to FIG. 4, and a reference destination management table 500, which will be described later with reference to FIG.
  • the recording medium 305 is, for example, a disk, a semiconductor memory, a USB memory, or the like.
  • the recording medium 305 may be removable from the information processing apparatus 100 .
  • the chip group 306 includes one or more chips 320.
  • Chip 320 stores a combination of a DID private key and an SSL private key.
  • the chip 320 may have a function of determining whether or not a DID private key corresponding to the DID public key exists within the own chip 320 in response to input of the DID public key.
  • the chip 320 may have the capability of outputting a certificate indicating the existence of the DID private key if the DID private key exists.
  • the chip 320 may have a function of determining whether or not an SSL private key corresponding to the SSL public key exists within the own chip 320 in response to the input of the SSL public key.
  • the chip 320 may have the capability of outputting a certificate indicating the existence of the SSL private key if the SSL private key exists.
  • the information processing apparatus 100 may have, for example, a keyboard, mouse, display, printer, scanner, microphone, speaker, etc., in addition to the components described above. Further, the information processing apparatus 100 may have a plurality of recording medium I/Fs 304 and recording media 305 . Further, the information processing apparatus 100 may not have the recording medium I/F 304 and the recording medium 305 .
  • the storage destination management table 400 is realized by a storage area such as the memory 302 or the recording medium 305 of the information processing apparatus 100 shown in FIG. 3, for example.
  • FIG. 4 is an explanatory diagram showing an example of the storage contents of the storage location management table 400.
  • the storage destination management table 400 has fields of account, authentication information 1, authentication information 2, authentication information 3, attribute, chip number, and area.
  • the storage destination management table 400 stores storage destination management information as a record 400-a by setting information in each field for each account. a is any integer.
  • the account field contains an account that identifies the issuer of the DID.
  • the authentication information 1 field one of authentication information for authenticating the account is set.
  • the authentication information 2 field one of the authentication information for authenticating the account is set.
  • the authentication information 3 field one of the authentication information for authenticating the account is set.
  • the attributes of the issuer are set in the attribute field.
  • identification information for identifying the chip that stores the combination of the DID secret key corresponding to the issuer and the SSL secret key is set.
  • the identification information is, for example, a chip number assigned to the chip.
  • the area field is set with identification information for identifying the area in the chip where the combination of the DID secret key and the SSL secret key is stored.
  • the identification information is, for example, an area number assigned to the area.
  • the reference destination management table 500 is realized, for example, by a storage area such as the memory 302 or the recording medium 305 of the information processing apparatus 100 shown in FIG.
  • FIG. 5 is an explanatory diagram showing an example of the contents of the reference destination management table 500.
  • the reference destination management table 500 has fields of DID public key, SSL public key, chip number, and area.
  • the reference destination management table 500 stores reference destination management information as a record 500-b by setting information in each field for each combination of a DID public key and an SSL public key. b is any integer.
  • a DID public key is set in the DID public key field.
  • An SSL public key is set in the SSL public key field.
  • identification information for identifying a chip storing a combination of a DID private key and an SSL private key corresponding to the combination of the DID public key and the SSL public key is set.
  • the identification information is, for example, a chip number assigned to the chip.
  • the area field is set with identification information for identifying the area in the chip where the combination of the DID secret key and the SSL secret key is stored.
  • the identification information is, for example, an area number assigned to the area.
  • FIG. 6 is a block diagram showing a hardware configuration example of the verification-side device 201.
  • verification-side device 201 has CPU 601 , memory 602 , network I/F 603 , recording medium I/F 604 , and recording medium 605 . Also, each component is connected by a bus 600 .
  • the CPU 601 controls the verification device 201 as a whole.
  • the memory 602 has, for example, ROM, RAM and flash ROM. Specifically, for example, a flash ROM or ROM stores various programs, and a RAM is used as a work area for the CPU 601 .
  • a program stored in the memory 602 causes the CPU 601 to execute coded processing by being loaded into the CPU 601 .
  • the network I/F 603 is connected to the network 210 through a communication line, and is connected to other computers via the network 210.
  • a network I/F 603 serves as an internal interface with the network 210 and controls input/output of data from other computers.
  • the network I/F 603 is, for example, a modem or LAN adapter.
  • the recording medium I/F 604 controls reading/writing of data from/to the recording medium 605 under the control of the CPU 601 .
  • a recording medium I/F 604 is, for example, a disk drive, an SSD, a USB port, or the like.
  • a recording medium 605 is a nonvolatile memory that stores data written under control of the recording medium I/F 604 .
  • the recording medium 605 is, for example, a disk, semiconductor memory, USB memory, or the like.
  • the recording medium 605 may be removable from the verification device 201 .
  • the verification-side device 201 may have, for example, a keyboard, mouse, display, printer, scanner, microphone, speaker, etc., in addition to the components described above. Also, the verification-side device 201 may have a plurality of recording medium I/Fs 604 and recording media 605 . Also, the verification-side device 201 may not have the recording medium I/F 604 and the recording medium 605 .
  • the hardware configuration example of the issuing device 202 is specifically the same as the hardware configuration example of the verifying device 201 shown in FIG. 6, so the description thereof will be omitted.
  • the hardware configuration example of the management-side device 203 is specifically the same as the hardware configuration example of the verification-side device 201 shown in FIG. 6, so the description thereof will be omitted.
  • a hardware configuration example of the recording-side device 204 is specifically the same as the hardware configuration example of the verification-side device 201 shown in FIG. 6, so description thereof will be omitted.
  • FIG. 7 is a block diagram showing a functional configuration example of the verification system 200.
  • information processing apparatus 100 includes first storage section 700 , first acquisition section 701 , registration section 702 , first determination section 703 , and first output section 704 .
  • the first storage unit 700 is implemented, for example, by a storage area such as the memory 302 or the recording medium 305 shown in FIG. 3, or a storage area of the chip 320. Although a case where the first storage unit 700 is included in the information processing apparatus 100 will be described below, the present invention is not limited to this. For example, the first storage unit 700 may be included in a device different from the information processing device 100 , and the information stored in the first storage unit 700 may be referenced from the information processing device 100 .
  • the first acquisition unit 701 to first output unit 704 function as an example of a control unit. Specifically, for example, the first acquisition unit 701 to the first output unit 704 cause the CPU 301 to execute a program stored in a storage area such as the memory 302 or the recording medium 305 shown in FIG.
  • the network I/F 303 implements that function.
  • the processing result of each functional unit is stored in a storage area such as the memory 302 or recording medium 305 shown in FIG. 3, for example.
  • the first storage unit 700 stores various information that is referred to or updated in the processing of each functional unit.
  • the first storage unit 700 stores the first public key corresponding to the first certificate.
  • the first certificate is, for example, a valid certificate issued to a management entity that manages a given system.
  • the first certificate may be, for example, a certificate issued without going through a third party certificate authority.
  • the first certificate is a VC that uses the DID owned by the managing entity.
  • a predetermined system corresponds to the management-side device 203, for example.
  • a given system is, for example, a website.
  • the predetermined system may be, for example, DNS (Domain Name System).
  • a management entity corresponds to, for example, a DID issuer.
  • a management entity corresponds to, for example, an organization or an individual.
  • a management entity corresponds to the issuing device 202, for example.
  • the first public key is specifically a valid DID public key.
  • the first certificate may be, for example, an unauthorized certificate issued to an attacker masquerading as a management entity that manages a given system.
  • the first public key is, for example, a VC using DID owned by an attacker.
  • the first public key is specifically an illegal DID public key.
  • the first public key is obtained by the first obtaining unit 701, for example.
  • the first storage unit 700 stores the second public key corresponding to the second certificate.
  • a second certificate is, for example, a certificate issued by a certificate authority for a given system.
  • the second certificate is specifically an SSL certificate.
  • the second public key is specifically an SSL public key.
  • the second public key is obtained by the first obtaining unit 701, for example.
  • the first storage unit 700 stores a first secret key and a second secret key.
  • the first private key corresponds to the third certificate issued to the managing entity.
  • a third certificate may be, for example, the first certificate.
  • the third certificate is specifically a VC using the DID owned by the managing entity.
  • a first private key may, for example, correspond to a first public key.
  • a second private key corresponds, for example, to a second certificate issued by a certificate authority for a given system.
  • the second private key for example, corresponds to the second public key.
  • the first storage unit 700 uses the chip 320, for example, to store the first secret key and the second secret key. For example, in response to acceptance of a public key, if the chip 320 has a private key corresponding to the public key accepted by the chip 320, a certificate certifying that the private key exists, The information processing apparatus 100 may have a function of outputting so that it can be referred to.
  • the first secret key and the second secret key are obtained by the first obtaining unit 701, for example. As a result, since the first storage unit 700 uses the chip 320, the first secret key and the second secret key can be easily and securely stored.
  • the first acquisition unit 701 acquires various types of information used for processing of each functional unit.
  • the first acquisition unit 701 stores the acquired various information in the first storage unit 700 or outputs the information to each functional unit. Further, the first acquisition unit 701 may output various information stored in the first storage unit 700 to each functional unit.
  • the first acquisition unit 701 acquires various types of information, for example, based on user's operation input.
  • the first acquisition unit 701 may receive various types of information from a device different from the information processing device 100, for example.
  • a first acquisition unit 701 acquires a first secret key and a second secret key.
  • the first acquisition unit 701 acquires, for example, the first secret key and the second secret key from the management entity. Specifically, the first acquisition unit 701 acquires the first secret key and the second secret key by receiving them from the issuing device 202 . For example, the first acquisition unit 701 obtains the first secret key and the second secret key by accepting the input of the first secret key and the second secret key based on the user's operation input. may be obtained.
  • the user is, for example, the issuing user.
  • the user may be, for example, a controlling user who has called or communicated with the issuing user.
  • the first acquisition unit 701 acquires a verification request regarding the first public key.
  • the verification request for example, requests verification of whether or not the first public key is valid. Specifically, the verification request requests verification of whether or not the combination of the first public key and the second public key is valid.
  • the verification request includes, for example, the first public key.
  • the verification request may include, for example, information that enables obtaining the first public key.
  • the verification request may specifically include the address of the storage area where the first public key exists.
  • the verification request may contain, for example, the second public key.
  • the verification request may include, for example, information that enables obtaining the second public key.
  • the verification request may specifically include the address of the storage area where the second public key exists.
  • the first acquisition unit 701 acquires a verification request from the requester.
  • the requester corresponds to, for example, the verification-side device 201 .
  • the first acquisition unit 701 acquires the verification request by receiving it from the verification-side device 201 .
  • the first acquisition unit 701 may acquire the verification request by, for example, accepting the input of the verification request based on the user's operation input.
  • the user is, for example, a verification user.
  • the user may be, for example, a controlling user who has called or communicated with the proving user.
  • the first acquisition unit 701 acquires a combination of the first public key and the second public key in response to the verification request.
  • the first acquisition unit 701 acquires a combination of the first public key and the second public key by, for example, extracting the first public key and the second public key from the verification request. .
  • the first acquisition unit 701 may acquire the first public key, for example, based on the address of the storage area containing the first public key included in the verification request.
  • the first acquisition unit 701 may acquire the second public key, for example, based on the address of the storage area containing the second public key included in the verification request.
  • the first obtaining unit 701 can obtain the combination of the first public key and the second public key to be verified as to whether or not it is valid.
  • the first acquisition unit 701 may accept a start trigger for starting processing of any of the functional units.
  • the start trigger is, for example, that there is a predetermined operation input by the user.
  • the start trigger may be, for example, reception of predetermined information from another computer.
  • the start trigger may be, for example, the output of predetermined information by any of the functional units.
  • the first acquisition unit 701 may accept acquisition of the first secret key and the second secret key as a start trigger for starting the processing of the registration unit 702 .
  • the first acquisition unit 701 may accept acquisition of the first public key and the second public key as a start trigger for starting the processing of the first determination unit 703 .
  • Registration unit 702 stores the first secret key and the second secret key in first storage unit 700 in response to acquisition of the first secret key and the second secret key by first acquisition unit 701 . store in association with a key. Thereby, the registration unit 702 can verify whether or not the combination of the first public key and the second public key is valid.
  • the first determination unit 703 refers to the first storage unit 700 and determines whether or not the combination of the first public key and the second public key acquired by the first acquisition unit 701 is valid. . For example, the first determination unit 703 determines whether the first public key acquired by the first acquisition unit 701 is a valid public key corresponding to the first private key stored in the first storage unit 700. judge. For example, the first determination unit 703 determines whether the second public key acquired by the first acquisition unit 701 is a legitimate public key corresponding to the second private key stored in the first storage unit 700. judge.
  • the first determination unit 703 determines that the combination of the first public key and the second public key is valid. Determine that there is. For example, if at least one of the first public key and the second public key is not a valid public key, the first determination unit 703 determines the combination of the first public key and the second public key. is determined to be incorrect. As a result, the first determination unit 703 can accurately verify whether or not the first public key is valid, and the first certificate corresponding to the first public key is valid. Whether or not can be verified with high accuracy.
  • the first determination unit 703 may input the first public key and the second public key included in the acquired combination to the chip 320 .
  • the first determination unit 703 determines, for example, whether the chip 320 outputs a certificate proving that the first private key corresponding to the first public key exists.
  • the first determination unit 703 determines, for example, whether the chip 320 outputs a certificate proving that the second private key corresponding to the second public key exists.
  • the first determination unit 703 sends both a certificate proving the existence of the first private key and a certificate proving the existence of the second private key corresponding to the second public key. , is output from the chip 320, it is determined that the combination is valid. For example, the first determination unit 703 determines at least a certificate proving the existence of the first private key and a certificate proving the existence of the second private key corresponding to the second public key. If either is not output from chip 320, then the combination is determined to be invalid. As a result, the first determination unit 703 can accurately verify whether or not the first public key is valid, and the first certificate corresponding to the first public key is valid. Whether or not can be verified with high accuracy.
  • a first output unit 704 outputs the processing result of at least one of the functional units.
  • the output format is, for example, display on a display, print output to a printer, transmission to an external device via the network I/F 303, or storage in a storage area such as the memory 302 or recording medium 305.
  • the first output unit 704 can notify the user of the processing result of at least one of the functional units, and the convenience of the information processing apparatus 100 can be improved.
  • the first output unit 704 outputs the determined result to the requester of the verification request.
  • the first output unit 704 for example, transmits the determined result to the verification-side device 201 . Accordingly, the first output unit 704 can accurately verify whether or not the first public key is valid at the request source, and the first certificate corresponding to the first public key can be verified. It is possible to accurately verify whether or not is valid.
  • the requester includes a second storage unit 710 , a second acquisition unit 711 , a second determination unit 712 , and a second output unit 713 .
  • the request source is, for example, the verification-side device 201 . In the following description, the case where the request source is the "verification-side device 201" will be described.
  • the second storage unit 710 is implemented, for example, by a storage area such as the memory 602 or recording medium 605 shown in FIG. A case where the second storage unit 710 is included in the verification-side device 201 will be described below, but the present invention is not limited to this.
  • the second storage unit 710 may be included in a device different from the verification-side device 201 and the contents stored in the second storage unit 710 may be referenced from the verification-side device 201 .
  • the second acquisition unit 711 to second output unit 713 function as an example of a control unit. Specifically, for example, the second acquisition unit 711 to the second output unit 713 cause the CPU 601 to execute a program stored in a storage area such as the memory 602 or the recording medium 605 shown in FIG. 6, or The network I/F 603 realizes that function. The processing result of each functional unit is stored in a storage area such as the memory 602 or recording medium 605 shown in FIG. 6, for example.
  • the second storage unit 710 stores various information that is referred to or updated in the processing of each functional unit.
  • the second storage unit 710 stores, for example, the first certificate.
  • the first certificate is obtained by the second obtaining unit 711, for example.
  • the second storage unit 710 stores, for example, a first public key.
  • the first public key is obtained by the second obtaining unit 711, for example.
  • the second storage unit 710 stores, for example, a second public key.
  • the second public key is obtained by the second obtaining unit 711, for example.
  • the second acquisition unit 711 acquires various information used for processing of each functional unit.
  • the second acquisition unit 711 stores the acquired various information in the second storage unit 710 or outputs the acquired information to each functional unit. Further, the second acquisition unit 711 may output various information stored in the second storage unit 710 to each functional unit.
  • the second acquisition unit 711 acquires various types of information, for example, based on the user's operation input.
  • the second acquisition unit 711 may receive various information from a device different from the verification device 201, for example.
  • the second acquisition unit 711 acquires data to which the first certificate is attached. Specifically, the second acquisition unit 711 acquires data to which the first certificate is attached by receiving it from another computer.
  • the other computer is, for example, publisher device 202 .
  • the other computer may be, for example, a computer possessed by an attacker impersonating the issuing device 202 .
  • the second acquisition unit 711 acquires the data to which the first certificate is attached by accepting the input of the data to which the first certificate is attached based on the operation input by the user. may
  • the second acquiring unit 711 acquires the first public key and the second public key based on the first certificate. get.
  • the second obtaining unit 711 can identify a predetermined system from a predetermined database based on the first certificate in response to obtaining data to which the first certificate is attached. Get information to make.
  • the predetermined database corresponds to the recording device 204, for example.
  • a predetermined system corresponds to, for example, the management-side device 203 .
  • the second obtaining unit 711 obtains a first public key owned by a predetermined system and a second public key owned by a predetermined system based on the obtained information.
  • the second acquisition unit 711 receives from the information processing device 100 the result of determining whether or not the combination of the first public key and the second public key is valid. As a result, the second acquisition unit 711 can accurately verify whether the first public key is valid, and the first certificate corresponding to the first public key is valid. Whether or not can be verified with high accuracy. The second acquisition unit 711 can accurately verify whether or not the data to which the first certificate is attached is valid.
  • the second determination unit 712 determines whether the first public key is valid, determines whether the first certificate is valid, and determines whether the first certificate is valid. It may be determined whether the data is valid. Specifically, the second determination unit 712 determines whether or not the combination of the first public key and the second public key acquired by the second acquisition unit 711 is valid. , determine whether the first public key is valid. Specifically, if the combination is valid, the second determination unit 712 determines that the first public key is valid. Specifically, the second determination unit 712 determines that the first certificate is valid if the first public key is valid. Specifically, if the first certificate is valid, the second determination unit 712 determines that the data attached with the first certificate is valid. Thereby, the second determination unit 712 can ensure security.
  • the second output unit 713 outputs the processing result of at least one of the functional units.
  • the output format is, for example, display on a display, print output to a printer, transmission to an external device via the network I/F 603, or storage in a storage area such as the memory 602 or recording medium 605. Thereby, the second output unit 713 can notify the user of the processing result of at least one of the functional units, and the convenience of the verification-side device 201 can be improved.
  • the second output unit 713 obtains the first public key and the second public key in response to the second obtaining unit 711 obtaining the first public key and the second public key.
  • a verification request containing the information is transmitted to the information processing apparatus 100 .
  • the second output unit 713 allows the user to refer to the result of determining whether the combination of the first public key and the second public key acquired by the second acquisition unit 711 is valid. output as possible.
  • a user corresponds to, for example, a verifying user.
  • the second output unit 713 outputs, for example, the result of the second determination unit 712 determining whether or not the first public key is valid so that the user can refer to it.
  • a user corresponds to, for example, a verifying user.
  • the second output unit 713 outputs, for example, the result of the determination made by the second determination unit 712 as to whether or not the first certificate is valid so that the user can refer to it.
  • a user corresponds to, for example, a verifying user.
  • the second output unit 713 outputs, for example, the result of the determination made by the second determination unit 712 as to whether or not the data to which the first certificate is attached is valid so that the user can refer to it.
  • the first determination unit 703 directly determines whether or not the combination of the first public key and the second public key is valid has been described, but the present invention is not limited to this.
  • the first determination unit 703 indirectly determines whether the combination of the first public key and the second public key is valid, and directly determines whether the combination is valid. may not be executed.
  • the first determination unit 703 may perform processing up to determining whether the first public key and the second public key are valid public keys. good too.
  • the first output unit 704 verifies the results obtained by the first determination unit 703 determining whether the first public key and the second public key are valid public keys. Send to the side device 201 .
  • the second determination unit 712 determines whether the first public key and the second public key are valid public keys. directly determines whether or not the combination with the public key of is valid.
  • the information processing apparatus 100 includes the first acquisition unit 701, the registration unit 702, the first determination unit 703, and the first output unit 704 has been described, but the present invention is not limited to this.
  • the information processing apparatus 100 may not include the registration unit 702 .
  • the verification system 200 may include another computer including the registration unit 702 in addition to the information processing apparatus 100 .
  • FIG. 8 to 12 are explanatory diagrams showing operation examples of the verification system 200.
  • an information processing apparatus 100 implements a TaaS (Trust as a Service) server.
  • a verification side device 201 corresponding to the B organization
  • an issuing side device 202 corresponding to the A organization
  • a management side device 203 serving as a web server that operates the website owned by the A organization
  • a recording side device 204 .
  • the issuing device 202 generates a DID corresponding to the A organization, and generates a key pair of a DID private key and a DID public key.
  • the issuing device 202 generates a key pair of an SSL private key and an SSL public key, and uses a certificate authority to generate an SSL certificate corresponding to the website owned by the A organization.
  • the issuing device 202 provides the management device 203 with the DID corresponding to the A organization, the SSL public key, the SSL private key, and the SSL certificate.
  • the management-side device 203 stores the received DID corresponding to the A organization so that other computers can refer to it.
  • the management-side device 203 stores the received SSL public key so that other computers can refer to it.
  • the management-side device 203 securely stores the received SSL private key.
  • the management-side device 203 stores the received SSL certificate so that other computers can refer to it.
  • the issuing device 202 provides the recording device 204 with the DID corresponding to the A organization, the DID public key, and the address of the management device 203 serving as a web server.
  • the recording device 204 associates the DID corresponding to the A organization, the DID public key, and the address of the management device 203 serving as a web server, and stores them in the ledger 801 .
  • Ledger 801 is, for example, a block chain.
  • the issuing device 202 transmits to the information processing device 100 the account owned by the A organization, the authentication information owned by the A organization, the attributes owned by the A organization, and the like.
  • the information processing apparatus 100 refers to the storage location management table 400 and authenticates the organization A based on the account owned by the organization A, the authentication information owned by the organization A, and the attributes owned by the organization A. Select the corresponding chip 320 .
  • the issuing device 202 transmits the DID public key, the SSL public key, the DID private key, and the SSL private key to the information processing device 100 .
  • the management device 203 may transmit the SSL public key and the SSL private key to the information processing device 100 instead of the issuing device 202 .
  • the information processing device 100 receives the DID public key, the SSL public key, the DID private key, and the SSL private key from the issuing device 202 .
  • the information processing device 100 uses the chip 320 corresponding to the selected A organization to store the combination of the DID private key and the SSL private key.
  • the information processing apparatus 100 associates the chip number for identifying the chip 320 corresponding to the selected organization A, the DID public key, and the SSL public key, and stores them in the reference destination management table 500 .
  • the information processing apparatus 100 can thereafter grasp the valid combination of the DID public key and the SSL public key corresponding to the A organization.
  • the information processing apparatus 100 can specify which chip 320 should be referred to when grasping the valid combination of the DID public key and the SSL public key corresponding to the A organization.
  • issuing device 202 generates a signature using a legitimate DID private key corresponding to A organization.
  • Issuing side device 202 generates a valid VC using a valid DID corresponding to the A organization to which the generated signature is attached.
  • the issuing device 202 transmits data to which a valid VC is assigned to the verifying device 201 .
  • the data are, for example, valid sentences.
  • the sentences are, for example, sentences related to contracts.
  • Verification-side device 201 receives the text to which VC is assigned.
  • the verification-side device 201 verifies whether or not the data to which the VC is assigned is valid data that has not been tampered with and has been transmitted from the issuing-side device 202 corresponding to the A organization.
  • Verification device 201 transmits an inquiry about VC to recording device 204 based on the VC.
  • the recording device 204 verifies the DID corresponding to the VC and corresponding to the A organization stored in the ledger 801, the DID public key, and the address of the management device 203 serving as the web server.
  • Send to the side device 201 Verification-side device 201 receives from recording-side device 204 the DID corresponding to organization A, the DID public key, and the address of management-side device 203 serving as a web server.
  • Verification-side device 201 acquires an SSL certificate and an SSL public key from management-side device 203 based on the address of management-side device 203 serving as a web server. Verification-side device 201 determines whether the SSL certificate is valid based on the SSL public key. If the SSL certificate is not valid, the verification-side device 201 determines that the VC-assigned data is not valid, and the verification-side user refers to the result of the determination that the VC-assigned data is not valid. output as possible. Assume here that the verification-side device 201 determines that the SSL certificate is valid.
  • Verification-side device 201 acquires a DID from management-side device 203 if the SSL certificate is valid. The verification-side device 201 determines whether the DID obtained from the recording-side device 204 and the DID obtained from the management-side device 203 match. If the DID acquired from the recording device 204 and the DID acquired from the management device 203 do not match, the verification device 201 determines that the DID is invalid. If the DID is not valid, the verification-side device 201 determines that the data to which the VC is assigned is not valid, and allows the verification-side user to refer to the result of the determination that the data to which the VC is assigned is not valid. Output. Assume here that the verification-side device 201 determines that the DID acquired from the recording-side device 204 and the DID acquired from the management-side device 203 match.
  • the verifier device 201 transmits to the information processing device 100 a verification request including a combination of the DID public key and the SSL public key.
  • the information processing apparatus 100 refers to the reference destination management table 500 and selects the chip 320 corresponding to the combination of the DID public key and the SSL public key.
  • the information processing device 100 inputs the DID public key and the SSL public key to the selected chip 320 .
  • information processing apparatus 100 determines whether chip 320 outputs a certificate indicating that chip 320 stores a DID private key and an SSL private key in association with each other. do. An example in which the chip 320 outputs the certificate will be described later using FIG.
  • information processing apparatus 100 determines that the combination of the DID public key and the SSL public key is valid.
  • the information processing apparatus 100 determines that the combination of the DID public key and the SSL public key is not valid unless the certificate is output.
  • the information processing device 100 transmits to the verification side device 201 the result of determining whether or not the combination of the DID public key and the SSL public key is valid.
  • Verification-side device 201 receives from information processing device 100 the result of determining whether or not the combination of the DID public key and the SSL public key is valid. Assume here that the information processing apparatus 100 determines that the combination of the DID public key and the SSL public key is valid.
  • Verifier device 201 determines that the DID is valid, the VC is valid, and the data to which the VC is attached is valid. I judge. Verification-side device 201 outputs the result of determining that the data to which VC is assigned is valid so that the verification-side user can refer to it.
  • the verification-side device 201 determines that the DID is not valid, the VC is not valid, and the data with the VC is not valid. Verification-side device 201 outputs the result of determining that the data to which VC is assigned is not valid so that the verification-side user can refer to it.
  • the verification-side device 201 determines that the DID is valid, the VC is valid, and the data to which the VC is attached is valid. do. Verification-side device 201 outputs the result of determining that the data to which VC is assigned is valid so that the verification-side user can refer to it.
  • the information processing apparatus 100 enables the verification-side apparatus 201 to accurately verify whether the DID is valid and to accurately verify whether the VC is valid. Whether or not the data is valid can be verified with high accuracy.
  • the description of FIG. 10 will be described.
  • FIG. 10 it is assumed that there is an attacking device (not shown) used by an attacker.
  • the attacking device generates an illegal DID' to replace the DID, and generates a key pair of the DID' private key and the DID' public key.
  • the attacking device tampered with the DID stored in the management device 203 into an illegal DID'.
  • the attacking device tampered with the DID stored in the ledger 801 of the recording device 204 to an illegal DID', for example.
  • the attacking device tampered with the DID public key stored in the ledger 801 of the recording device 204 into a DID' public key.
  • the attacking device uses the DID' private key to generate a signature.
  • the attacking device generates an unauthorized VC' using the generated signature-added unauthorized DID'.
  • the issuing device 202 pretends to be the issuing device 202 corresponding to the A organization and transmits the data to which the unauthorized VC' is assigned to the verifying device 201 .
  • the data are, for example, fraudulent texts.
  • the sentences are, for example, sentences related to contracts.
  • Verification-side device 201 receives the text to which VC' is assigned.
  • the attacking device may capture the data sent from the issuing device 202 corresponding to the A organization.
  • the attacking device modifies the captured data into data corresponding to the fraudulent text.
  • the attacking device alters the VC attached to the captured data to VC'.
  • the attacking device transmits the falsified data to which the falsified VC' is added to the verifying device 201 under the guise of the issuing device 202 corresponding to the A organization.
  • the verifying device 201 verifies whether or not the data to which VC' is assigned is unfalsified valid data transmitted from the issuing device 202 corresponding to the A organization. .
  • Verification device 201 transmits an inquiry regarding VC' to recording device 204 based on VC'. In response to the inquiry, the recording device 204 transmits the DID', the DID' public key, and the address of the management device 203 serving as the web server corresponding to the VC' stored in the ledger 801 to the verification device. 201. Verification-side device 201 receives DID', DID' public key, and the address of management-side device 203 serving as a web server from recording-side device 204 .
  • Verification-side device 201 acquires an SSL certificate and an SSL public key from management-side device 203 based on the address of management-side device 203 serving as a web server. Verification-side device 201 determines whether the SSL certificate is valid based on the SSL public key. If the SSL certificate is not valid, the verification-side device 201 determines that the data to which the VC' is assigned is not valid, and the result of determining that the data to which the VC' is assigned is not valid is sent to the verification-side user. is output so that it can be referenced. Assume here that the verification-side device 201 determines that the SSL certificate is valid.
  • Verification device 201 acquires DID' from management device 203 if the SSL certificate is valid. The verification-side device 201 determines whether the DID' obtained from the recording-side device 204 and the DID' obtained from the management-side device 203 match.
  • the verification device 201 determines that the DID' is invalid. If the DID' is not valid, the verifying device 201 determines that the data to which the VC' is assigned is not valid. Output so that it can be referenced. Here, it is assumed that the verification-side device 201 determines that the DID' obtained from the recording-side device 204 and the DID' obtained from the management-side device 203 match.
  • the information processing device 100 does not exist. Therefore, when the DID' obtained from the recording device 204 and the DID' obtained from the management device 203 match, the conventional computer corresponding to the verification device 201 mistakenly believes that the VC' is valid. It is conceivable that judgment may be made. Therefore, it is conceivable that conventional computers may erroneously determine that data to which VC' is assigned is valid. Next, the description of FIG. 12 will be described.
  • the verifier device 201 transmits to the information processing device 100 a verification request including a combination of the DID' public key and the SSL public key.
  • the information processing apparatus 100 refers to the reference destination management table 500 and selects the chip 320 corresponding to the combination of the DID' public key and the SSL public key. If the chip 320 corresponding to the combination of the DID' public key and the SSL public key does not exist, the information processing apparatus 100 determines that the combination of the DID' public key and the SSL public key is invalid.
  • the attacking device has already registered the combination of the DID' public key and the SSL public key in the reference destination management table 500 .
  • the information processing device 100 inputs the DID' public key and the SSL public key to the selected chip 320 .
  • information processing apparatus 100 determines whether chip 320 outputs a certificate indicating that chip 320 stores the DID' private key and the SSL private key in association with each other. judge. An example in which the chip 320 outputs the certificate will be described later using FIG.
  • the information processing apparatus 100 determines that the combination of the DID' public key and the SSL public key is valid.
  • the information processing apparatus 100 determines that the combination of the DID' public key and the SSL public key is not valid unless the certificate is output.
  • the information processing device 100 transmits to the verification side device 201 the result of determining whether the combination of the DID' public key and the SSL public key is valid.
  • the verifier device 201 receives from the information processing device 100 the result of determining whether or not the combination of the DID' public key and the SSL public key is valid.
  • the information processing apparatus 100 determines that the combination of the DID' public key and the SSL public key is invalid because the certificate is not output.
  • the verification-side device 201 determines that the DID' is valid, the VC' is valid, and the data to which the VC' is assigned. is correct. Verification-side device 201 outputs the result of determining that the data to which VC' is assigned is valid so that the verification-side user can refer to it.
  • the verifier device 201 determines that the DID' is not valid, the VC' is not valid, and the data to which the VC' is assigned is not valid. judge. Verification-side device 201 outputs the result of determining that the data to which VC' is assigned is not valid so that the verification-side user can refer to it.
  • the verification-side device 201 determines that the DID' is not valid, the VC' is not valid, and the data to which VC' is attached is valid. determine that it is not. Verification-side device 201 outputs the result of determining that the data to which VC' is assigned is not valid so that the verification-side user can refer to it.
  • the information processing apparatus 100 enables the verification-side apparatus 201 to accurately verify whether or not DID' is valid, and to accurately verify whether or not VC' is valid. It is possible to accurately verify whether or not the given data is valid.
  • the information processing apparatus 100 can adopt, for example, a key pair of an SSL public key and an SSL private key, which are difficult to tamper with, as a criterion for determining whether or not the DID is valid. Whether or not can be verified with high accuracy.
  • the information processing device 100 uses a VC using DID in the verifying device 201. It is possible to accurately verify whether or not is valid. For this reason, the information processing apparatus 100 can suppress an increase in cost incurred when securely exchanging data between the issuing user and the verifying user. In addition, the information processing apparatus 100 can suppress an increase in the time required until data can be securely exchanged between the issuing user and the verifying user.
  • the information processing apparatus 100 enables the verification user to determine whether or not the issuing user is trustworthy even if the issuing user and the verifying user do not interact face-to-face. can. Therefore, the information processing apparatus 100 can cope with diversification of situations in which data is securely exchanged. The information processing apparatus 100 can cope with an increase in the number of people trying to securely exchange data.
  • verification-side device 201 receives the DID corresponding to organization A, the DID public key, and the address of management-side device 203 serving as a web server from recording-side device 204 in response to an inquiry. , but not limited to this.
  • the issuing device 202 sends the DID corresponding to the A organization, the DID public key, and the address of the management device 203 serving as a web server to the verification device 201 together with the text to which the VC is assigned.
  • the verifying device 201 receives the DID corresponding to the A organization, the DID public key, and the address of the managing device 203 serving as a web server from the issuing device 202 .
  • FIG. 13 is an explanatory diagram showing an example of how the chip 320 outputs a certificate.
  • the chip 320 generates an AT private key as an attestation key and an AT public key corresponding to the AT private key.
  • Chip 320 generates a certificate for the attestation key.
  • the certificate of the attestation key contains the Embedded CA certificate.
  • the embedded CA certificate contains the CA public key.
  • the embedded CA certificate contains a signature by the CA private key corresponding to the CA public key.
  • the Embedded CA certificate is, for example, a certificate corresponding to the vendor of the chip 320.
  • the attestation key certificate contains the AT public key.
  • An attestation key's certificate contains an attribute that allows the existence of other keys to be attested. Attestation is to prove.
  • the chip 320 When receiving input of a DID public key, the chip 320 determines whether or not a DID private key corresponding to the input DID public key exists within the chip 320 . If the chip 320 contains a DID private key corresponding to the input DID public key, the chip 320 generates Cerify information of the DID private key.
  • the DID private key Cerify information includes the DID public key.
  • the Cerify information of the DID private key includes a signature using the attestation key.
  • the DID private key Cerify information includes an attribute that the DID private key exists.
  • the chip 320 When receiving an input of an SSL public key, the chip 320 determines whether an SSL private key corresponding to the input SSL public key exists within the chip 320 . If the chip 320 contains an SSL private key corresponding to the input SSL public key, the chip 320 generates Cerify information of the SSL private key.
  • the SSL private key Cerify information includes the SSL public key.
  • the SSL private key Cerify information includes a signature using the attestation key.
  • the SSL private key Cerify information includes an attribute that the SSL private key exists.
  • the chip 320 associates the certificate of the attestation key, the Cerify information of the DID private key, and the Cerify information of the SSL private key, and outputs them so that the information processing apparatus 100 can refer to them. If both the DID private key cerify information and the SSL private key cerify information include a signature using the same attestation key, the information processing apparatus 100 stores the DID private key and the SSL private key in the chip 320 . It is determined that the private key is stored in association with the private key.
  • the information processing device 100 determines that the combination of the DID public key and the SSL public key is valid. Thereby, the information processing apparatus 100 can securely manage the DID private key and the SSL private key. The information processing apparatus 100 can determine whether or not a combination of a DID private key and an SSL private key corresponding to the combination of the DID public key and the SSL public key exists in the chip 320. can.
  • the information processing apparatus 100 associates the certificate of the attestation key, the DID private key cerify information, and the SSL private key cerify information, and transmits them to the verifier apparatus 201 as information indicating the determination result. good too. Since the information processing apparatus 100 utilizes the certificate of the attestation key output by the chip 320, the reliability of the vendor of the chip 320 can be used as the reliability of the determination result. Therefore, the information processing apparatus 100 can allow the verification user to appropriately determine the reliability of the determination result regardless of the reliability of the own apparatus.
  • Registration processing procedure Next, an example of a registration processing procedure executed by the verification system 200 will be described with reference to FIG. 14 .
  • a issuing device 202 corresponding to the A organization.
  • a verifier device 201 corresponding to the B organization.
  • a management-side device 203 that implements a web server.
  • FIG. 14 is a sequence diagram showing an example of the registration processing procedure.
  • issuing device 202 generates an SSL key pair consisting of an SSL private key and an SSL public key (step S1401).
  • the issuing device 202 sets the generated SSL key pair in the management device 203 (step S1402).
  • the management-side device 203 stores an SSL key pair.
  • the management-side device 203 may generate and store an SSL certificate.
  • the issuing device 202 then transmits a request for selecting the chip 320 corresponding to the issuing device 202 to the information processing device 100 (step S1403).
  • the information processing device 100 In response to receiving the selection request, the information processing device 100 refers to the storage destination management table 400, selects the chip 320 corresponding to the issuing side device 202, and sends the wrapping key issuance request to the selected chip 320. is transmitted (step S1404).
  • Chip 320 issues a wrapping key in response to receiving the issue request, and transmits it to issuer device 202 (step S1405).
  • the wrapping key is given a signature using, for example, Embedded CA.
  • the chip 320 decrypts and stores the SSL private key based on the E Wrapping key (SSL private key) (step S1407).
  • the information processing apparatus 100 may acquire the SSL public key, associate the chip number of the selected chip 320 with the acquired SSL public key, and store the result in the reference destination management table 500 .
  • the issuing device 202 generates a DID and generates a DID key pair consisting of a DID private key and a DID public key (step S1408).
  • the issuing device 202 sets the DID public key to the management device 203 (step S1409).
  • the management-side device 203 stores the DID public key.
  • the issuing device 202 then transmits a request for selecting the chip 320 corresponding to the issuing device 202 to the information processing device 100 (step S1410).
  • the information processing device 100 In response to receiving the selection request, the information processing device 100 refers to the storage destination management table 400, selects the chip 320 corresponding to the issuing side device 202, and sends the wrapping key issuance request to the selected chip 320. is transmitted (step S1411). Chip 320 issues a wrapping key in response to receiving the issue request and transmits it to issuer device 202 (step S1412).
  • the wrapping key is given a signature using, for example, Embedded CA.
  • Chip 320 decrypts and stores the DID private key based on the E wrapping key (DID private key) (step S1414).
  • the information processing apparatus 100 may acquire a DID public key, associate the acquired DID public key with the chip number of the selected chip 320 , and store it in the reference destination management table 500 . After that, the verification system 200 ends the registration process.
  • Verification processing procedure Next, an example of a verification processing procedure executed by the verification system 200 will be described with reference to FIG. 15 .
  • a issuing device 202 corresponding to the A organization.
  • a verifier device 201 corresponding to the B organization.
  • a management-side device 203 that implements a web server.
  • FIG. 15 is a sequence diagram showing an example of the verification processing procedure.
  • Verification-side device 201 converts the text with signature and VC into ? Receive from the organization (step S1501). ?
  • the organization is, for example, the A organization.
  • An organization may, for example, be an attacker masquerading as the A organization.
  • the verifying device 201 acquires the VC issuer's DID, the VC issuer's DID public key, and the VC issuer's website address from the recording device 204 having the ledger (step S1502).
  • Verification-side device 201 acquires a DID and an SSL certificate from management-side device 203, which implements a web server that operates the website, based on the website address (step S1503).
  • the certificate is given a signature using, for example, Embedded CA.
  • the information processing device 100 receives the certificate from the selected chip 320 (step S1509).
  • the information processing device 100 transmits the received certificate to the verification-side device 201 (step S1510).
  • the information processing device 100 may send a notification indicating that the certificate has not been sent to the verifying device 201 .
  • Verification-side device 201 verifies the validity of the combination of the DID public key and the SSL public key based on the received certificate (step S1511).
  • the information processing apparatus 100 determines that the combination of the DID public key and the SSL public key is valid in response to receiving the certificate. For example, when the certificate is not received, the information processing apparatus 100 may determine that the combination of the DID public key and the SSL public key is invalid. If the combination of the DID public key and the SSL public key is valid, the information processing apparatus 100 determines that the DID public key is valid, the VC is valid, and the sentence with the VC is valid. .
  • the information processing device 100 it is possible to accept a verification request regarding the first public key corresponding to the first certificate.
  • the combination of the first public key and the second public key corresponding to the second certificate issued by the certificate authority to the predetermined system is generated. can be obtained.
  • the first private key corresponding to the third certificate issued to the management entity managing the system and the second private key corresponding to the second certificate are stored. It can have a storage unit for storing in correspondence.
  • the information processing apparatus 100 it is possible to refer to the storage unit and determine whether the acquired combination is valid.
  • the determined result can be output to the requester of the verification request.
  • the information processing apparatus 100 can accurately verify the validity of the first public key, and accurately validate the first certificate based on the validity of the first public key. It can be verifiable.
  • the information processing device 100 it is possible to access a chip that implements a storage unit.
  • the chip in response to acceptance of a public key, if a private key corresponding to the accepted public key exists in the storage unit, the computer refers to a certificate proving that the private key exists. It has a function to output possible.
  • the first public key and the second public key included in the acquired combination can be input to the chip.
  • the information processing apparatus 100 it is possible to determine that the acquired combination is valid when it is output. Thereby, the information processing apparatus 100 can securely manage the first secret key and the second secret key.
  • the first secret key and the second secret key are stored in the storage unit in response to obtaining the first secret key and the second secret key from the management entity. can be associated and stored. Thereby, the information processing apparatus 100 can appropriately manage the storage unit. The information processing apparatus 100 can determine whether the combination of the first public key and the second public key is valid.
  • the device can be accessed.
  • the information that enables the system to be specified can be obtained from the predetermined database based on the first certificate.
  • the apparatus it is possible to acquire the first public key possessed by the system and the second public key possessed by the system based on the acquired information.
  • a verification request including a combination of a first public key and a second public key can be received from the device.
  • the information processing apparatus 100 in response to receiving the verification request from the apparatus, it is possible to acquire the combination of the first public key and the second public key based on the verification request. Accordingly, the information processing apparatus 100 can determine whether or not the data to which the first certificate is attached is valid.
  • the information processing device 100 it is possible to adopt the VC corresponding to the DID for the first certificate. Accordingly, the information processing apparatus 100 can allow a certificate generated without a third party's certificate authority to be used as the first certificate.
  • the verification support method described in the present embodiment can be realized by executing a program prepared in advance on a computer such as a PC or workstation.
  • the verification support program described in this embodiment is recorded in a computer-readable recording medium and executed by being read from the recording medium by a computer.
  • Recording media include a hard disk, flexible disk, CD (Compact Disc)-ROM, MO (Magneto Optical disc), DVD (Digital Versatile Disc), and the like.
  • the verification support program described in the present embodiment may be distributed via a network such as the Internet.
  • Second Public Key 110 Requester 111 First Certificate 112 First Public Key 120 System 121 Second Certificate 122 Second Private Key 130 Management Subject 131 Third Certificate book 132 first secret key 200 verification system 201 verification side device 202 issuing side device 203 management side device 204 recording side device 210 network 300, 600 bus 301, 601 CPU 302, 602 memory 303, 603 network I/F 304, 604 recording medium I/F 305, 605 recording medium 306 chip group 320 chip 400 storage destination management table 500 reference destination management table 700 first storage unit 701 first acquisition unit 702 registration unit 703 first determination unit 704 first output unit 710 second storage unit 711 2 acquisition unit 712 second determination unit 713 second output unit 801 ledger

Abstract

An information processing device (100) includes a storage unit (101). The storage unit (101) stores a first secret key (132) that corresponds to a third certificate (131) issued for a management subject (130), and a second secret key (122) that corresponds to a second certificate (121) issued for a system (120) in association with each other. The information processing device (100) acquires, in response to a verification request, a combination of a first public key (112) and a second public key (102). The information processing device (100) determines, with reference to the storage unit (101), whether the acquired combination is valid.

Description

検証支援方法、検証支援プログラム、および情報処理装置Verification support method, verification support program, and information processing device
 本発明は、検証支援方法、検証支援プログラム、および情報処理装置に関する。 The present invention relates to a verification support method, a verification support program, and an information processing apparatus.
 従来、データの真正性を保証したり、データに対する確認、承認、または、同意などの意思を表明したりするために、電子署名がデータに付与されることがある。ここで、電子署名を利用する場面の多様化に伴って、電子署名を利用する際にかかるコストの低減化が望まれている。例えば、VC(Verifiable Claim)と呼ばれる証明書を活用し、組織が有するウェブサーバに、予めVC issuer情報を対応付けて記憶しておき、データに付与されたVCの正当性を検証可能にする手法が考えられる。 Conventionally, electronic signatures are sometimes attached to data in order to guarantee the authenticity of data and to express intentions such as confirmation, approval, or consent to data. Here, with the diversification of situations in which electronic signatures are used, it is desired to reduce the costs incurred when using electronic signatures. For example, a method that utilizes a certificate called VC (Verifiable Claim), stores VC issuer information in advance in association with the organization's web server, and verifies the validity of the VC attached to the data. can be considered.
 先行技術としては、例えば、エンドユーザが、セキュリティポリシーに整合した方法で得た、信頼可能と判断された任意のリストの公開鍵を、信頼された公開鍵のリストに追加するものがある。 As a prior art, for example, there is a technique in which an end user adds a public key of an arbitrary list that is obtained by a method consistent with a security policy and is determined to be trustworthy to a list of trusted public keys.
米国特許第6134327号明細書U.S. Pat. No. 6,134,327
 しかしながら、従来技術では、証明書の正当性を精度よく検証することができない場合がある。例えば、攻撃者によって、組織が有するウェブサーバに記憶されたVC issuer情報が書き換えられると、データに付与されたVCの正当性を正常に検証することができなくなる。 However, the conventional technology may not be able to accurately verify the validity of the certificate. For example, if an attacker rewrites the VC issuer information stored in the organization's web server, the validity of the VC assigned to the data cannot be verified normally.
 1つの側面では、本発明は、証明書の正当性を検証する精度の向上を図ることを目的とする。 In one aspect, the object of the present invention is to improve the accuracy of verifying the validity of a certificate.
 1つの実施態様によれば、第1の証明書に対応する第1の公開鍵に関する検証依頼に応じて、前記第1の公開鍵と、所定のシステムに対して認証局によって発行された第2の証明書に対応する第2の公開鍵との組み合わせを取得し、前記システムを管理する管理主体に対して発行された第3の証明書に対応する第1の秘密鍵と、前記第2の証明書に対応する第2の秘密鍵とを対応付けて記憶する記憶部を参照して、取得した前記組み合わせが正当であるか否かを判定し、前記判定した結果を、前記検証依頼の依頼元宛てに出力する検証支援方法、検証支援プログラム、および情報処理装置が提案される。 According to one embodiment, in response to a verification request for a first public key corresponding to a first certificate, the first public key and a second certificate issued to a predetermined system by a certificate authority. Acquiring a combination with a second public key corresponding to the certificate of, a first private key corresponding to a third certificate issued to the management entity that manages the system, and the second Referencing a storage unit that stores a second private key corresponding to a certificate in association with each other to determine whether or not the acquired combination is valid, and requesting the verification request based on the determined result. A verification support method, a verification support program, and an information processing apparatus for outputting to an original address are proposed.
 一態様によれば、証明書の正当性を検証する精度の向上を図ることが可能になる。 According to one aspect, it is possible to improve the accuracy of verifying the validity of a certificate.
図1は、実施の形態にかかる検証支援方法の一実施例を示す説明図である。FIG. 1 is an explanatory diagram of an example of a verification support method according to an embodiment. 図2は、検証システム200の一例を示す説明図である。FIG. 2 is an explanatory diagram showing an example of the verification system 200. As shown in FIG. 図3は、情報処理装置100のハードウェア構成例を示すブロック図である。FIG. 3 is a block diagram showing a hardware configuration example of the information processing apparatus 100. As shown in FIG. 図4は、格納先管理テーブル400の記憶内容の一例を示す説明図である。FIG. 4 is an explanatory diagram showing an example of the contents of the storage destination management table 400. As shown in FIG. 図5は、参照先管理テーブル500の記憶内容の一例を示す説明図である。FIG. 5 is an explanatory diagram showing an example of the contents of the reference destination management table 500. As shown in FIG. 図6は、検証側装置201のハードウェア構成例を示すブロック図である。FIG. 6 is a block diagram showing a hardware configuration example of the verification-side device 201. As shown in FIG. 図7は、検証システム200の機能的構成例を示すブロック図である。FIG. 7 is a block diagram showing a functional configuration example of the verification system 200. As shown in FIG. 図8は、検証システム200の動作例を示す説明図(その1)である。FIG. 8 is an explanatory diagram (part 1) showing an operation example of the verification system 200. FIG. 図9は、検証システム200の動作例を示す説明図(その2)である。FIG. 9 is an explanatory diagram (part 2) showing an operation example of the verification system 200. As shown in FIG. 図10は、検証システム200の動作例を示す説明図(その3)である。FIG. 10 is an explanatory diagram (part 3) showing an operation example of the verification system 200. As shown in FIG. 図11は、検証システム200の動作例を示す説明図(その4)である。FIG. 11 is an explanatory diagram (part 4) showing an operation example of the verification system 200. As shown in FIG. 図12は、検証システム200の動作例を示す説明図(その5)である。FIG. 12 is an explanatory diagram (No. 5) showing an operation example of the verification system 200. As shown in FIG. 図13は、チップ320が証明書を出力する一例を示す説明図である。FIG. 13 is an explanatory diagram showing an example in which the chip 320 outputs a certificate. 図14は、登録処理手順の一例を示すシーケンス図である。FIG. 14 is a sequence diagram illustrating an example of a registration processing procedure; 図15は、検証処理手順の一例を示すシーケンス図である。FIG. 15 is a sequence diagram illustrating an example of a verification processing procedure;
 以下に、図面を参照して、本発明にかかる検証支援方法、検証支援プログラム、および情報処理装置の実施の形態を詳細に説明する。 Embodiments of a verification support method, a verification support program, and an information processing apparatus according to the present invention will be described in detail below with reference to the drawings.
(実施の形態にかかる検証支援方法の一実施例)
 図1は、実施の形態にかかる検証支援方法の一実施例を示す説明図である。情報処理装置100は、証明書の正当性を検証する精度の向上を図るためのコンピュータである。証明書は、例えば、VCである。VCは、電子署名が付与された分散型ID(Decentralized Identifier)を含む。以下の説明では、分散型IDを「DID」と表記する場合がある。
(One Example of Verification Support Method According to Embodiment)
FIG. 1 is an explanatory diagram of an example of a verification support method according to an embodiment. The information processing apparatus 100 is a computer for improving the accuracy of verifying the validity of a certificate. A certificate is, for example, a VC. A VC includes a distributed ID (Decentralized Identifier) with an electronic signature. In the following description, the distributed ID may be referred to as "DID".
 電子署名を利用する場面の多様化に伴って、電子署名を利用する際にかかるコストの低減化が望まれている。例えば、サプライチェーン攻撃の増加によって、オープンソースソフトウェアのライブラリ、または、ライブラリの更新プログラムなどの出所を保証する目的で、電子署名を利用しようとする人数が増加することが考えられる。例えば、ビジネスにおいて、請求書、または、契約書などの電子化が行われる傾向があり、電子署名を利用しようとする人数が増加することが考えられる。従って、電子署名を利用する際にかかるコストの低減化が望まれる傾向がある。 With the diversification of situations where electronic signatures are used, it is desired to reduce the cost of using electronic signatures. For example, an increase in supply chain attacks may increase the number of people seeking to use electronic signatures to assure the provenance of open source software libraries or updates to libraries. For example, there is a tendency in business to digitize invoices, contracts, and the like, and it is conceivable that the number of people who want to use electronic signatures will increase. Therefore, there is a tendency to desire a reduction in the costs involved in using electronic signatures.
 電子署名は、例えば、中央集権的な証明書を活用して実現される傾向がある。中央集権的な証明書は、例えば、認証局の監査によって成立する。従って、監査にかかるコストが存在するため、電子署名を利用する際にかかるコストの低減化を図ることが難しい。 Electronic signatures, for example, tend to be implemented using centralized certificates. A centralized certificate is established, for example, by an audit of a certification authority. Therefore, since there is a cost associated with the audit, it is difficult to reduce the cost associated with using electronic signatures.
 これに対し、DIDを利用するVCを活用し、電子署名を利用することが考えられる。VCを活用する際にかかるコストは、比較的小さくなる傾向がある。しかしながら、VCを活用する場合、DIDの信頼度を確立可能にし、DIDの信頼度を検証可能にし、DIDを含むVCの正当性を検証可能にしなければならないと考えられる。 In contrast, it is conceivable to utilize VCs that use DID and use electronic signatures. The costs involved in leveraging VCs tend to be relatively small. However, when utilizing VCs, it is considered necessary to be able to establish the reliability of DIDs, to be able to verify the reliability of DIDs, and to be able to verify the legitimacy of VCs including DIDs.
 例えば、トラストチェインを構築せずに、VCの正当性を検証する検証者側で、信頼度が比較的高いDIDを登録するトラストリストを用意する手法が考えられる。具体的には、検証者が、DIDの発行者と対面した経験に基づいて、当該DIDの信頼度が比較的高いと判断し、当該DIDをトラストリストに登録することが考えられる。この手法では、DIDの信頼度が比較的高いか否かを判断することが難しい場合がある。この手法では、検証者にかかる作業負担の増大化を招く場合がある。従って、情報リテラシが比較的少ない検証者は、この手法を利用することは難しい。この手法は、電子署名を利用する場面の多様化に対処することが難しく、電子署名を利用しようとする人数の増大化に対処することが難しい。 For example, without building a trust chain, a verifier who verifies the legitimacy of a VC may prepare a trust list in which DIDs with relatively high reliability are registered. Specifically, it is conceivable that the verifier determines that the DID has a relatively high degree of reliability based on the experience of meeting the issuer of the DID, and registers the DID in the trust list. With this approach, it may be difficult to determine whether the DID is relatively reliable. This method may increase the workload of the verifier. Therefore, it is difficult for verifiers with relatively low information literacy to use this method. It is difficult for this method to deal with the diversification of situations in which electronic signatures are used, and it is difficult to deal with the increase in the number of people trying to use electronic signatures.
 例えば、DIDの信頼度を、中央集権的に確立しようとする手法が考えられる。具体的には、コンソーシアムブロックチェーンを構築し、コンソーシアムブロックチェーンに対する入会審査に伴い、DIDの信頼度を確立しようとする手法が考えられる。この手法では、入会審査にかかるコストが存在するため、VCを活用しても、電子署名を利用する際にかかるコストの低減化を図ることが難しいという問題が残ってしまう。 For example, a method of centrally establishing the reliability of DID can be considered. Specifically, a method of building a consortium blockchain and attempting to establish the reliability of the DID along with the admission examination for the consortium blockchain can be considered. With this method, there is a cost involved in admission screening, so even if a VC is used, there remains the problem that it is difficult to reduce the cost involved in using an electronic signature.
 例えば、DIDの利用実績に関する集合知により、DIDの信頼度に関するランキングを実施し、DIDの信頼度を確立しようとする手法が考えられる。この手法では、DIDの利用実績が蓄積しなければ、DIDの信頼度を確立することができない。このため、DIDの信頼度を確立するまでにかかる所要時間の増大化を招くという問題がある。 For example, it is conceivable to implement a ranking regarding the reliability of DIDs based on the collective knowledge of DID usage records, and to try to establish the reliability of DIDs. In this method, the reliability of the DID cannot be established unless the DID usage record is accumulated. Therefore, there is a problem that the time required to establish the reliability of the DID is increased.
 例えば、既存のシステムに、DIDを対応付けて記憶しておくことにより、既存のシステムの信頼度で、DIDの信頼度を確立しようとする手法が考えられる。既存のシステムは、例えば、DIDの発行者によって管理されるシステムである。具体的には、ウェブサーバに、予めDIDを対応付けて記憶しておく手法が考えられる。この手法では、DIDの信頼度を精度よく検証することができず、VCの正当性を精度よく検証することができない場合がある。例えば、攻撃者によって、ウェブサーバに記憶されたDIDが書き換えられると、DIDの信頼度を正常に検証することができず、VCの正当性を正常に検証することができなくなるという問題がある。 For example, a method of establishing the reliability of the DID with the reliability of the existing system can be considered by storing the DID in association with the existing system. An existing system is, for example, a system managed by a DID issuer. Specifically, a method of pre-associating and storing the DID in the web server can be considered. With this method, the reliability of the DID cannot be verified with high precision, and the validity of the VC cannot be verified with high precision in some cases. For example, if an attacker rewrites the DID stored in the web server, the reliability of the DID cannot be verified normally, and the legitimacy of the VC cannot be verified normally.
 そこで、本実施の形態では、証明書の正当性を検証する精度の向上を図ることができる検証支援方法について説明する。 Therefore, in this embodiment, a verification support method capable of improving the accuracy of verifying the validity of a certificate will be described.
 図1において、情報処理装置100と、依頼元110と、システム120と、システム120の管理主体130とが存在するとする。依頼元110は、例えば、第1の証明書111を受信するコンピュータである。第1の証明書111は、例えば、管理主体130から送信された正当な証明書である。第1の証明書111は、例えば、管理主体130を装って攻撃者から送信された不正な証明書である場合が考えられる。第1の証明書111は、例えば、データの真正性を保証するために、当該データに付与されることがある。依頼元110は、例えば、第1の証明書111の正当性を検証するため、第1の証明書111に対応する第1の公開鍵112に関する検証依頼を、情報処理装置100に送信する。管理主体130は、例えば、組織、または、個人などである。  In FIG. 1, it is assumed that there are an information processing device 100, a request source 110, a system 120, and a manager 130 of the system 120. Requester 110 is, for example, a computer that receives first certificate 111 . The first certificate 111 is, for example, a legitimate certificate sent from the managing entity 130 . The first certificate 111 may be, for example, an unauthorized certificate sent by an attacker pretending to be the administrative entity 130 . A first certificate 111 may be attached to the data, for example, to ensure the authenticity of the data. For example, in order to verify the validity of the first certificate 111 , the requester 110 transmits a verification request regarding the first public key 112 corresponding to the first certificate 111 to the information processing apparatus 100 . The managing entity 130 is, for example, an organization or an individual.
 システム120は、管理主体130によって管理されるコンピュータによって実現される。システム120は、例えば、ウェブサイトであって、ウェブサーバによって実現される。システム120は、認証局によって発行された第2の証明書121を有する。第2の証明書121は、例えば、SSL(Secure Socket Layer)証明書である。システム120は、第2の証明書121に対応する第2の秘密鍵122を有する。システム120は、第2の秘密鍵122を、情報処理装置100に提供する。 The system 120 is realized by a computer managed by the management subject 130. System 120 is, for example, a website and implemented by a web server. System 120 has a second certificate 121 issued by a certificate authority. The second certificate 121 is, for example, an SSL (Secure Socket Layer) certificate. System 120 has a second private key 122 corresponding to a second certificate 121 . The system 120 provides the second private key 122 to the information processing device 100 .
 管理主体130は、第3の証明書131を発行して利用する発行元に対応するコンピュータである。管理主体130は、第3の証明書131を有する。第3の証明書131は、例えば、第1の証明書111となり得る。第3の証明書131は、例えば、第3者の認証局を介さずに発行されていてもよい。第3の証明書131は、例えば、VCである。管理主体130は、第3の証明書131に対応する第1の秘密鍵132を有する。管理主体130は、第1の秘密鍵132を、情報処理装置100に提供する。 The management entity 130 is a computer corresponding to the issuer that issues and uses the third certificate 131 . Management entity 130 has a third certificate 131 . The third certificate 131 can be the first certificate 111, for example. The third certificate 131 may be issued without going through a third party certificate authority, for example. A third certificate 131 is, for example, a VC. A managing entity 130 has a first private key 132 corresponding to a third certificate 131 . The management entity 130 provides the first secret key 132 to the information processing device 100 .
 情報処理装置100は、記憶部101を有する。記憶部101は、管理主体130に対して発行された第3の証明書131に対応する第1の秘密鍵132と、システム120に対して発行された第2の証明書121に対応する第2の秘密鍵122とを対応付けて記憶する。情報処理装置100は、提供された第1の秘密鍵132と、第2の秘密鍵122とを対応付けて、記憶部101に格納する。記憶部101は、例えば、TPM(Trusted Platform Module)に対応するチップであってもよい。 The information processing device 100 has a storage unit 101 . The storage unit 101 stores a first private key 132 corresponding to the third certificate 131 issued to the management entity 130 and a second private key 132 corresponding to the second certificate 121 issued to the system 120 . is stored in association with the private key 122 of . The information processing apparatus 100 associates the provided first secret key 132 with the second secret key 122 and stores them in the storage unit 101 . The storage unit 101 may be, for example, a chip compatible with a TPM (Trusted Platform Module).
 (1-1)情報処理装置100は、第1の証明書111に対応する第1の公開鍵112に関する検証依頼を、依頼元110から受信する。検証依頼は、例えば、第1の公開鍵112を含む。検証依頼は、例えば、システム120に対して認証局によって発行された第2の証明書121に対応する第2の公開鍵102を含んでいてもよい。情報処理装置100は、検証依頼に応じて、第1の公開鍵112と、第2の公開鍵102との組み合わせを取得する。情報処理装置100は、例えば、検証依頼から、第1の公開鍵112と、第2の公開鍵102との組み合わせを抽出することにより、第1の公開鍵112と、第2の公開鍵102との組み合わせを取得する。 (1-1) The information processing apparatus 100 receives from the requester 110 a verification request regarding the first public key 112 corresponding to the first certificate 111 . The verification request includes, for example, first public key 112 . The verification request may include, for example, a second public key 102 corresponding to a second certificate 121 issued to system 120 by a certificate authority. The information processing apparatus 100 acquires a combination of the first public key 112 and the second public key 102 in response to the verification request. For example, the information processing apparatus 100 extracts the combination of the first public key 112 and the second public key 102 from the verification request, thereby generating the first public key 112 and the second public key 102. get a combination of
 (1-2)情報処理装置100は、記憶部101を参照して、取得した組み合わせが正当であるか否かを判定する。情報処理装置100は、例えば、第1の公開鍵112が、記憶部101に記憶された第1の秘密鍵132に対応する正当な公開鍵であるか否かを判定する。情報処理装置100は、例えば、第2の公開鍵102が、記憶部101に記憶された第2の秘密鍵122に対応する正当な公開鍵であるか否かを判定する。 (1-2) The information processing apparatus 100 refers to the storage unit 101 and determines whether the acquired combination is valid. The information processing apparatus 100 , for example, determines whether or not the first public key 112 is a valid public key corresponding to the first secret key 132 stored in the storage unit 101 . The information processing apparatus 100 , for example, determines whether the second public key 102 is a valid public key corresponding to the second secret key 122 stored in the storage unit 101 .
 情報処理装置100は、例えば、第1の公開鍵112と、第2の公開鍵102とが共に、正当な公開鍵であれば、第1の公開鍵112と、第2の公開鍵102との組み合わせが正当であると判定する。情報処理装置100は、例えば、第1の公開鍵112と、第2の公開鍵102との少なくともいずれかが、正当な公開鍵でなければ、第1の公開鍵112と、第2の公開鍵102との組み合わせが正当ではないと判定する。 For example, if both the first public key 112 and the second public key 102 are valid public keys, the information processing apparatus 100 can use the first public key 112 and the second public key 102 Determine that the combination is valid. For example, if at least one of the first public key 112 and the second public key 102 is not a valid public key, the information processing apparatus 100 uses the first public key 112 and the second public key 102 is determined to be invalid.
 (1-3)情報処理装置100は、判定した結果を、検証依頼の依頼元110宛てに出力する。情報処理装置100は、例えば、判定した結果を、依頼元110に送信する。依頼元110は、例えば、判定した結果が、第1の公開鍵112と、第2の公開鍵102との組み合わせが正当であることを示していれば、第1の証明書111が正当であると判定する。この場合、第1の証明書111は、例えば、第3の証明書131と一致する。依頼元110は、例えば、判定した結果が、第1の公開鍵112と、第2の公開鍵102との組み合わせが正当ではないことを示していれば、第1の証明書111が正当ではないと判定する。この場合、第1の証明書111は、例えば、第3の証明書131と一致しない。 (1-3) The information processing apparatus 100 outputs the determined result to the requester 110 of the verification request. The information processing apparatus 100 transmits the determined result to the requester 110, for example. For example, if the result of determination shows that the combination of the first public key 112 and the second public key 102 is valid, the requester 110 determines that the first certificate 111 is valid. I judge. In this case, the first certificate 111 matches the third certificate 131, for example. For example, if the result of determination indicates that the combination of the first public key 112 and the second public key 102 is not valid, the requester 110 determines that the first certificate 111 is not valid. I judge. In this case, the first certificate 111 does not match the third certificate 131, for example.
 これにより、情報処理装置100は、第1の証明書111の正当性を検証する精度の向上を図ることができる。情報処理装置100は、例えば、システム120が、第1の証明書111の正当性を検証可能にする、DIDなどのような情報を有していなくても、依頼元110で、第1の証明書111の正当性を正常に検証可能にすることができる。情報処理装置100は、例えば、攻撃者によって、第1の証明書111の正当性を検証可能にするためにシステム120が有するDIDなどのような情報が改ざんされていても、依頼元110で、第1の証明書111の正当性を正常に検証可能にすることができる。 As a result, the information processing apparatus 100 can improve the accuracy of verifying the validity of the first certificate 111 . For example, even if the system 120 does not have information such as a DID that enables verification of the legitimacy of the first certificate 111, the information processing apparatus 100 can verify the validity of the first certificate 111 at the requester 110. The validity of the document 111 can be made normally verifiable. For example, even if information such as the DID held by the system 120 has been tampered with by an attacker in order to verify the legitimacy of the first certificate 111, the information processing apparatus 100 does not allow the requester 110 to The validity of the first certificate 111 can be normally verified.
 情報処理装置100は、第1の証明書111が、第3者の認証局を介して発行されたか否かに関わらず、依頼元110で、第1の証明書111の正当性を正常に検証可能にすることができる。従って、情報処理装置100は、管理主体130で、第1の証明書111になり得る第3の証明書131を、第3者の認証局を介さずに発行可能にすることができる。 The information processing apparatus 100 normally verifies the legitimacy of the first certificate 111 at the requester 110 regardless of whether the first certificate 111 was issued via a third party certificate authority. can be made possible. Therefore, the information processing apparatus 100 can issue the third certificate 131, which can be the first certificate 111, by the management entity 130 without going through a third party certificate authority.
 結果として、情報処理装置100は、管理主体130で、第3の証明書131を発行する際にかかるコストの低減化を図ることができ、第3の証明書131を利用し易くすることができる。情報処理装置100は、例えば、データの真正性を保証したり、データに対する確認、承認、または、同意などの意思を表明したりするために、第3の証明書131のような特定の形式の証明書を利用する場面の多様化に対処することができる。 As a result, the information processing apparatus 100 can reduce the costs incurred when the third certificate 131 is issued by the management entity 130, and can facilitate the use of the third certificate 131. . For example, the information processing apparatus 100 uses a specific format such as the third certificate 131 in order to guarantee the authenticity of data and express intentions such as confirmation, approval, or consent to data. It is possible to cope with the diversification of situations in which certificates are used.
 情報処理装置100は、提供された第1の秘密鍵132と、第2の秘密鍵122とを対応付けて、記憶部101に格納すれば、依頼元110で、第1の証明書111の正当性を正常に検証可能にすることができる。このため、情報処理装置100は、依頼元110で、第1の証明書111の正当性を正常に検証可能にする際にかかる所要時間の増大化を抑制することができる。 The information processing apparatus 100 associates the provided first secret key 132 with the second secret key 122 and stores them in the storage unit 101, so that the request source 110 can validate the first certificate 111. can be successfully verifiable. Therefore, the information processing apparatus 100 can suppress an increase in the time required to enable the requester 110 to normally verify the validity of the first certificate 111 .
 ここでは、情報処理装置100が、検証依頼から、第1の公開鍵112と、第2の公開鍵102との組み合わせを抽出する場合について説明したが、これに限らない。例えば、情報処理装置100が、検証依頼から、第1の公開鍵112を抽出し、システム120から、第2の公開鍵102を取得する場合があってもよい。 Here, the case where the information processing apparatus 100 extracts the combination of the first public key 112 and the second public key 102 from the verification request has been described, but the present invention is not limited to this. For example, the information processing apparatus 100 may extract the first public key 112 from the verification request and acquire the second public key 102 from the system 120 .
 ここでは、情報処理装置100が、単独で動作する場合について説明したが、これに限らない。例えば、複数のコンピュータが協働して、情報処理装置100としての機能を実現する場合があってもよい。 Although the case where the information processing device 100 operates alone has been described here, the present invention is not limited to this. For example, a plurality of computers may work together to realize the functions of the information processing apparatus 100 .
(検証システム200の一例)
 次に、図2を用いて、図1に示した情報処理装置100を適用した、検証システム200の一例について説明する。
(Example of verification system 200)
Next, an example of a verification system 200 to which the information processing apparatus 100 shown in FIG. 1 is applied will be described using FIG.
 図2は、検証システム200の一例を示す説明図である。図2において、検証システム200は、情報処理装置100と、1以上の検証側装置201と、1以上の発行側装置202と、1以上の管理側装置203と、1以上の記録側装置204とを含む。 FIG. 2 is an explanatory diagram showing an example of the verification system 200. FIG. 2, the verification system 200 includes an information processing device 100, one or more verification-side devices 201, one or more issuing-side devices 202, one or more management-side devices 203, and one or more recording-side devices 204. including.
 検証システム200において、情報処理装置100と検証側装置201とは、有線または無線のネットワーク210を介して接続される。ネットワーク210は、例えば、LAN(Local Area Network)、WAN(Wide Area Network)、インターネットなどである。 In the verification system 200 , the information processing device 100 and the verification side device 201 are connected via a wired or wireless network 210 . The network 210 is, for example, a LAN (Local Area Network), a WAN (Wide Area Network), the Internet, or the like.
 また、検証システム200において、検証側装置201と管理側装置203とは、有線または無線のネットワーク210を介して接続される。また、検証システム200において、検証側装置201と記録側装置204とは、有線または無線のネットワーク210を介して接続される。また、検証システム200において、情報処理装置100と発行側装置202とは、有線または無線のネットワーク210を介して接続される。また、検証システム200において、情報処理装置100と管理側装置203とは、有線または無線のネットワーク210を介して接続される。 Also, in the verification system 200 , the verification side device 201 and the management side device 203 are connected via a wired or wireless network 210 . In the verification system 200 , the verification device 201 and the recording device 204 are connected via a wired or wireless network 210 . In the verification system 200 , the information processing device 100 and the issuing device 202 are connected via a wired or wireless network 210 . In the verification system 200 , the information processing device 100 and the management device 203 are connected via a wired or wireless network 210 .
 情報処理装置100は、提供側ユーザによって用いられるコンピュータである。情報処理装置100は、DID秘密鍵と、SSL秘密鍵とを対応付けて記憶するチップを含むチップ群を有する。DID秘密鍵は、DIDの発行元で、DIDに付与された電子署名の生成に用いられた秘密鍵である。DID秘密鍵に対応するDID公開鍵が存在する。 The information processing device 100 is a computer used by the user on the providing side. Information processing apparatus 100 has a chip group including a chip that stores a DID private key and an SSL private key in association with each other. The DID private key is a private key used by the issuer of the DID to generate the electronic signature attached to the DID. There is a DID public key corresponding to the DID private key.
 情報処理装置100は、DID公開鍵と、DID秘密鍵とを、いずれかの発行側装置202から受信する。情報処理装置100は、SSL公開鍵と、SSL秘密鍵とを、いずれかの発行側装置202から受信する。情報処理装置100は、いずれかの発行側装置202から受信したDID秘密鍵と、当該発行側装置202から受信したSSL秘密鍵とを対応付けて、チップ群のいずれかのチップに格納する。 The information processing device 100 receives a DID public key and a DID private key from one of the issuing devices 202 . The information processing device 100 receives an SSL public key and an SSL private key from one of the issuing devices 202 . The information processing apparatus 100 associates the DID private key received from one of the issuing devices 202 with the SSL private key received from the issuing device 202, and stores them in one of the chips of the chip group.
 情報処理装置100は、例えば、図4に後述する格納先管理テーブル400を参照して、チップ群のうち、いずれかの発行側装置202に対応するチップを選択する。情報処理装置100は、例えば、選択したいずれかの発行側装置202に対応するチップに、当該発行側装置202から受信したDID秘密鍵と、当該発行側装置202から受信したSSL秘密鍵とを対応付けて格納する。 The information processing device 100 selects a chip corresponding to one of the issuing devices 202 from among the chip groups, for example, referring to a storage destination management table 400 described later in FIG. For example, the information processing apparatus 100 associates the DID private key received from the issuing device 202 and the SSL private key received from the issuing device 202 with a chip corresponding to one of the selected issuing devices 202. Attach and store.
 情報処理装置100は、DID公開鍵と、SSL公開鍵との組み合わせに対応する、DID秘密鍵と、SSL秘密鍵との組み合わせが記憶されたチップを特定可能にする情報を、図5に後述する参照先管理テーブル500に記憶しておいてもよい。情報処理装置100は、例えば、選択したいずれかの発行側装置202に対応するチップを特定可能にする情報に、当該発行側装置202から受信したDID公開鍵と、当該発行側装置202から受信したSSL秘密鍵とを対応付けて格納しておいてもよい。 The information processing apparatus 100 stores information that enables identification of a chip in which a combination of a DID private key and an SSL private key corresponding to the combination of the DID public key and the SSL public key is stored, which will be described later with reference to FIG. It may be stored in the reference destination management table 500 . For example, the information processing apparatus 100 includes the DID public key received from the issuing device 202 and the It may be stored in association with the SSL private key.
 情報処理装置100は、DID公開鍵と、SSL公開鍵との組み合わせを示す検証依頼を、検証側装置201から受信する。情報処理装置100は、図5に後述する参照先管理テーブル500を参照して、チップ群のうち、検証依頼が示すDID公開鍵と、SSL公開鍵との組み合わせに対応するチップを選択する。情報処理装置100は、選択したチップに、検証依頼が示すDID公開鍵と、SSL公開鍵との組み合わせに対応する、DID秘密鍵と、SSL秘密鍵との組み合わせが記憶されているか否かを判定する。 The information processing device 100 receives a verification request indicating the combination of the DID public key and the SSL public key from the verification side device 201 . The information processing apparatus 100 selects a chip corresponding to the combination of the DID public key indicated by the verification request and the SSL public key from among the chip group by referring to a reference destination management table 500 described later with reference to FIG. The information processing device 100 determines whether or not the selected chip stores a combination of a DID private key and an SSL private key corresponding to the combination of the DID public key and the SSL public key indicated by the verification request. do.
 情報処理装置100は、選択したチップに、DID秘密鍵と、SSL秘密鍵との組み合わせが記憶されていれば、検証依頼が示すDID公開鍵と、SSL公開鍵との組み合わせが正当であると判定する。情報処理装置100は、選択したチップに、DID秘密鍵と、SSL秘密鍵との組み合わせが記憶されていなければ、検証依頼が示すDID公開鍵と、SSL公開鍵との組み合わせが正当ではないと判定する。 If the selected chip stores a combination of the DID private key and the SSL private key, the information processing apparatus 100 determines that the combination of the DID public key and the SSL public key indicated by the verification request is valid. do. If the combination of the DID private key and the SSL private key is not stored in the selected chip, the information processing device 100 determines that the combination of the DID public key and the SSL public key indicated by the verification request is invalid. do.
 情報処理装置100は、検証依頼が示すDID公開鍵と、SSL公開鍵との組み合わせが正当であるか否かを判定した結果を、検証側装置201に送信する。情報処理装置100は、例えば、サーバ、または、PC(Personal Computer)などである。 The information processing device 100 transmits the result of determining whether or not the combination of the DID public key indicated by the verification request and the SSL public key is valid to the verification side device 201 . The information processing apparatus 100 is, for example, a server or a PC (Personal Computer).
 検証側装置201は、検証側ユーザによって用いられるコンピュータである。検証側装置201は、VCが付与されたデータを、発行側装置202から受信する。検証側装置201は、VCが付与されたデータに基づいて、DID公開鍵を、記録側装置204から取得する。検証側装置201は、VCが付与されたデータに基づいて、発行側装置202に対応するシステムを管理する管理側装置203を特定可能にする情報を、記録側装置204から取得する。システムは、例えば、ウェブサイトなどである。 The verification-side device 201 is a computer used by the verification-side user. The verifying device 201 receives the data to which the VC is assigned from the issuing device 202 . Verification-side device 201 acquires the DID public key from recording-side device 204 based on the data to which VC is assigned. The verifying device 201 acquires from the recording device 204 information that enables the management device 203 that manages the system corresponding to the issuing device 202 to be identified based on the data to which the VC is assigned. The system is, for example, a website or the like.
 検証側装置201は、管理側装置203を特定可能にする情報に基づいて、管理側装置203を特定する。検証側装置201は、SSL公開鍵と、SSL証明書とを、特定した管理側装置203から取得する。検証側装置201は、DID公開鍵を、特定した管理側装置203から取得する。 The verification-side device 201 identifies the management-side device 203 based on the information that enables the management-side device 203 to be identified. The verification-side device 201 acquires the SSL public key and the SSL certificate from the identified management-side device 203 . Verification-side device 201 acquires the DID public key from specified management-side device 203 .
 検証側装置201は、SSL証明書に基づいて、管理側装置203の信頼性を評価し、管理側装置203から取得したDID公開鍵が正当であるか否かを検証してもよい。検証側装置201は、SSL証明書に基づいて、管理側装置203の信頼性が比較的低いと判断した場合、管理側装置203から取得したDID公開鍵が正当ではないと判定し、データに付与されたVCが正当ではないと判定してもよい。検証側装置201は、SSL証明書に基づいて、管理側装置203の信頼性が比較的高いと判断した場合、暫定的に管理側装置203から取得したDID公開鍵が正当であると判定しておいてもよい。 The verification-side device 201 may evaluate the reliability of the management-side device 203 based on the SSL certificate and verify whether the DID public key obtained from the management-side device 203 is valid. When the verification-side device 201 determines that the trust of the management-side device 203 is relatively low based on the SSL certificate, the verification-side device 201 determines that the DID public key acquired from the management-side device 203 is not valid, and adds it to the data. It may be determined that the given VC is not valid. When the verification side device 201 determines that the reliability of the management side device 203 is relatively high based on the SSL certificate, it temporarily determines that the DID public key obtained from the management side device 203 is valid. You can leave it.
 検証側装置201は、記録側装置204から取得したDID公開鍵と、管理側装置203から取得したDID公開鍵とを照合し、DID公開鍵が正当であるか否かを検証してもよい。検証側装置201は、例えば、記録側装置204から取得したDID公開鍵と、管理側装置203から取得したDID公開鍵とが一致しなければ、少なくともいずれかのDID公開鍵が正当ではないと判定してもよい。検証側装置201は、DID公開鍵が正当でなければ、データに付与されたVCが正当ではないと判定してもよい。検証側装置201は、例えば、記録側装置204から取得したDID公開鍵と、管理側装置203から取得したDID公開鍵とが一致すれば、暫定的にそれぞれのDID公開鍵が正当であると判定しておいてもよい。 The verification-side device 201 may compare the DID public key obtained from the recording-side device 204 with the DID public key obtained from the management-side device 203 to verify whether the DID public key is valid. For example, if the DID public key obtained from the recording device 204 and the DID public key obtained from the management device 203 do not match, the verification device 201 determines that at least one DID public key is not valid. You may If the DID public key is not valid, the verifier device 201 may determine that the VC given to the data is not valid. For example, when the DID public key obtained from the recording device 204 and the DID public key obtained from the management device 203 match, the verifying device 201 provisionally determines that each DID public key is valid. You can keep it.
 検証側装置201は、DID公開鍵と、SSL公開鍵との組み合わせが正当であるか否かを判定する。検証側装置201は、例えば、DID公開鍵と、SSL公開鍵との組み合わせを示す検証依頼を、情報処理装置100に送信する。検証側装置201は、検証依頼が示すDID公開鍵と、SSL公開鍵との組み合わせが正当であるか否かを判定した結果を、情報処理装置100から受信する。 The verification-side device 201 determines whether the combination of the DID public key and the SSL public key is valid. Verification-side device 201 transmits, for example, a verification request indicating a combination of a DID public key and an SSL public key to information processing device 100 . The verification-side device 201 receives from the information processing device 100 the result of determining whether or not the combination of the DID public key indicated by the verification request and the SSL public key is valid.
 検証側装置201は、検証依頼が示すDID公開鍵と、SSL公開鍵との組み合わせが正当であれば、データに付与されたVCが正当であると判定する。検証側装置201は、検証依頼が示すDID公開鍵と、SSL公開鍵との組み合わせが正当でなければ、データに付与されたVCが正当ではないと判定する。 If the combination of the DID public key indicated by the verification request and the SSL public key is valid, the verification-side device 201 determines that the VC given to the data is valid. If the combination of the DID public key indicated by the verification request and the SSL public key is not valid, the verifying device 201 determines that the VC given to the data is not valid.
 検証側装置201は、判定した結果を、検証側ユーザが参照可能に出力してもよい。検証側装置201は、データに付与されたVCが正当ではないと判定した場合、当該データを破棄してもよい。検証側装置201は、例えば、PC、タブレット端末、または、スマートフォンなどである。 The verification-side device 201 may output the determined result so that the verification-side user can refer to it. If the verification-side device 201 determines that the VC attached to the data is not valid, the verification-side device 201 may discard the data. The verification-side device 201 is, for example, a PC, a tablet terminal, or a smart phone.
 発行側装置202は、発行側ユーザによって用いられるコンピュータである。発行側装置202は、DID秘密鍵と、DID公開鍵と、SSL秘密鍵と、SSL公開鍵とを生成する。発行側装置202は、DIDを発行し、DIDを利用したVCを発行する。VCは、例えば、DID秘密鍵に基づく電子署名が付与されたDIDを含む。VCは、例えば、DID公開鍵を含む。発行側装置202は、DID秘密鍵と、SSL秘密鍵とを、情報処理装置100に送信する。発行側装置202は、DID公開鍵と、SSL公開鍵とを、情報処理装置100に送信してもよい。 The issuing device 202 is a computer used by the issuing user. Issuer device 202 generates a DID private key, a DID public key, an SSL private key, and an SSL public key. The issuing device 202 issues a DID and issues a VC using the DID. A VC includes, for example, a DID with an electronic signature based on the DID private key. The VC contains, for example, the DID public key. Issuer device 202 transmits the DID private key and the SSL private key to information processing device 100 . The issuing device 202 may transmit the DID public key and the SSL public key to the information processing device 100 .
 発行側装置202は、SSL秘密鍵と、SSL公開鍵とを、管理側装置203に提供する。発行側装置202は、DID公開鍵を、管理側装置203に提供する。発行側装置202は、DID公開鍵を、記録側装置204に提供する。発行側装置202は、発行側装置202に対応するシステムを管理する管理側装置203を特定可能にする情報を、記録側装置204に提供する。システムは、例えば、ウェブサイトなどである。発行側装置202は、VCが付与されたデータを、検証側装置201に送信する。発行側装置202は、例えば、PC、タブレット端末、または、スマートフォンなどである。 The issuer device 202 provides the management device 203 with the SSL private key and the SSL public key. Issuer device 202 provides the DID public key to management device 203 . The issuing device 202 provides the DID public key to the recording device 204 . The issuing device 202 provides the recording device 204 with information that enables the management device 203 that manages the system corresponding to the issuing device 202 to be specified. The system is, for example, a website or the like. The issuing device 202 transmits the VC-added data to the verifying device 201 . The issuing device 202 is, for example, a PC, a tablet terminal, or a smart phone.
 管理側装置203は、管理側ユーザによって用いられるコンピュータである。管理側ユーザは、例えば、発行側ユーザと同一のユーザである。管理側ユーザは、例えば、発行側ユーザと同一の属性を有するユーザである。管理側装置203は、発行側装置202に対応するシステムを管理する。システムは、例えば、ウェブサイトなどである。 The management-side device 203 is a computer used by a management-side user. The administrative user is, for example, the same user as the issuing user. The administrative user is, for example, a user who has the same attributes as the issuing user. The managing device 203 manages the system corresponding to the issuing device 202 . The system is, for example, a website or the like.
 管理側装置203は、SSL秘密鍵と、SSL公開鍵とを、発行側装置202から受信する。管理側装置203は、SSL秘密鍵に基づいて、SSL証明書を生成する。SSL証明書は、例えば、SSL公開鍵を含む。管理側装置203は、SSL公開鍵と、SSL証明書とを、検証側装置201が参照可能に記憶する。管理側装置203は、DID公開鍵を、発行側装置202から受信する。管理側装置203は、DID公開鍵を、検証側装置201が参照可能に記憶する。管理側装置203は、例えば、サーバ、または、PCなどである。 The management-side device 203 receives the SSL private key and the SSL public key from the issuing-side device 202 . The management-side device 203 generates an SSL certificate based on the SSL private key. An SSL certificate contains, for example, an SSL public key. The management-side device 203 stores the SSL public key and the SSL certificate so that the verification-side device 201 can refer to them. The managing device 203 receives the DID public key from the issuing device 202 . Management-side device 203 stores the DID public key so that verification-side device 201 can refer to it. The management-side device 203 is, for example, a server or a PC.
 記録側装置204は、記録側ユーザによって用いられるコンピュータである。記録側装置204は、DID公開鍵を、発行側装置202から受信する。記録側装置204は、DID公開鍵を、検証側装置201が参照可能に記録する。記録側装置204は、発行側装置202に対応するシステムを管理する管理側装置203を特定可能にする情報を、発行側装置202から受信する。記録側装置204は、発行側装置202に対応するシステムを管理する管理側装置203を特定可能にする情報を、検証側装置201が参照可能に記録する。記録側装置204は、例えば、サーバ、または、PCなどである。 The recording-side device 204 is a computer used by the recording-side user. Recording device 204 receives the DID public key from issuing device 202 . Recording-side device 204 records the DID public key so that verification-side device 201 can refer to it. Recording device 204 receives information from issuing device 202 that enables identification of management device 203 that manages the system corresponding to issuing device 202 . The recording device 204 records information that enables the identification of the management device 203 that manages the system corresponding to the issuing device 202 so that the verification device 201 can refer to it. The recording device 204 is, for example, a server or a PC.
 ここでは、検証側装置201と、発行側装置202とが異なる装置である場合について説明したが、これに限らない。例えば、検証側装置201が、発行側装置202としての機能を有し、発行側装置202としても動作可能な場合があってもよい。 Here, the case where the verification-side device 201 and the issuing-side device 202 are different devices has been described, but the present invention is not limited to this. For example, the verifying device 201 may function as the issuing device 202 and may also operate as the issuing device 202 .
 ここでは、発行側装置202と、管理側装置203とが異なる装置である場合について説明したが、これに限らない。例えば、発行側装置202が、管理側装置203としての機能を有し、管理側装置203としても動作可能な場合があってもよい。 Although the case where the issuing device 202 and the managing device 203 are different devices has been described here, the present invention is not limited to this. For example, the issuing device 202 may have the function of the managing device 203 and be operable as the managing device 203 as well.
(情報処理装置100のハードウェア構成例)
 次に、図3を用いて、情報処理装置100のハードウェア構成例について説明する。
(Hardware Configuration Example of Information Processing Device 100)
Next, a hardware configuration example of the information processing apparatus 100 will be described with reference to FIG.
 図3は、情報処理装置100のハードウェア構成例を示すブロック図である。図3において、情報処理装置100は、CPU(Central Processing Unit)301と、メモリ302と、ネットワークI/F(Interface)303と、記録媒体I/F304と、記録媒体305と、チップ群306とを有する。また、各構成部は、バス300によってそれぞれ接続される。 FIG. 3 is a block diagram showing a hardware configuration example of the information processing apparatus 100. As shown in FIG. 3, the information processing apparatus 100 includes a CPU (Central Processing Unit) 301, a memory 302, a network I/F (Interface) 303, a recording medium I/F 304, a recording medium 305, and a chip group 306. have. Also, each component is connected by a bus 300 .
 ここで、CPU301は、情報処理装置100の全体の制御を司る。メモリ302は、例えば、ROM(Read Only Memory)、RAM(Random Access Memory)およびフラッシュROMなどを有する。具体的には、例えば、フラッシュROMやROMが各種プログラムを記憶し、RAMがCPU301のワークエリアとして使用される。メモリ302に記憶されるプログラムは、CPU301にロードされることにより、コーディングされている処理をCPU301に実行させる。メモリ302は、図4に後述する格納先管理テーブル400と、図5に後述する参照先管理テーブル500とを記憶していてもよい。 Here, the CPU 301 controls the entire information processing apparatus 100 . The memory 302 has, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a flash ROM, and the like. Specifically, for example, a flash ROM or ROM stores various programs, and a RAM is used as a work area for the CPU 301 . A program stored in the memory 302 causes the CPU 301 to execute coded processing by being loaded into the CPU 301 . The memory 302 may store a storage destination management table 400, which will be described later with reference to FIG. 4, and a reference destination management table 500, which will be described later with reference to FIG.
 ネットワークI/F303は、通信回線を通じてネットワーク210に接続され、ネットワーク210を介して他のコンピュータに接続される。そして、ネットワークI/F303は、ネットワーク210と内部のインターフェースを司り、他のコンピュータからのデータの入出力を制御する。ネットワークI/F303は、例えば、モデムやLANアダプタなどである。 The network I/F 303 is connected to the network 210 through a communication line, and is connected to other computers via the network 210. A network I/F 303 serves as an internal interface with the network 210 and controls input/output of data from other computers. Network I/F 303 is, for example, a modem or a LAN adapter.
 記録媒体I/F304は、CPU301の制御に従って記録媒体305に対するデータのリード/ライトを制御する。記録媒体I/F304は、例えば、ディスクドライブ、SSD(Solid State Drive)、USB(Universal Serial Bus)ポートなどである。記録媒体305は、記録媒体I/F304の制御で書き込まれたデータを記憶する不揮発メモリである。記録媒体305は、メモリ302に代わり、図4に後述する格納先管理テーブル400と、図5に後述する参照先管理テーブル500とを記憶していてもよい。記録媒体305は、例えば、ディスク、半導体メモリ、USBメモリなどである。記録媒体305は、情報処理装置100から着脱可能であってもよい。 The recording medium I/F 304 controls reading/writing of data from/to the recording medium 305 under the control of the CPU 301 . The recording medium I/F 304 is, for example, a disk drive, SSD (Solid State Drive), USB (Universal Serial Bus) port, or the like. A recording medium 305 is a nonvolatile memory that stores data written under control of the recording medium I/F 304 . Instead of the memory 302, the recording medium 305 may store a storage destination management table 400, which will be described later with reference to FIG. 4, and a reference destination management table 500, which will be described later with reference to FIG. The recording medium 305 is, for example, a disk, a semiconductor memory, a USB memory, or the like. The recording medium 305 may be removable from the information processing apparatus 100 .
 チップ群306は、1以上のチップ320を含む。チップ320は、DID秘密鍵と、SSL秘密鍵との組み合わせを記憶する。チップ320は、例えば、DID公開鍵が入力されたことに応じて、自チップ320内にDID公開鍵に対応するDID秘密鍵が存在するか否かを判定する機能を有していてもよい。チップ320は、DID秘密鍵が存在している場合に、DID秘密鍵が存在することを示す証明書を出力する機能を有していてもよい。チップ320は、例えば、SSL公開鍵が入力されたことに応じて、自チップ320内にSSL公開鍵に対応するSSL秘密鍵が存在するか否かを判定する機能を有していてもよい。チップ320は、SSL秘密鍵が存在している場合に、SSL秘密鍵が存在することを示す証明書を出力する機能を有していてもよい。 The chip group 306 includes one or more chips 320. Chip 320 stores a combination of a DID private key and an SSL private key. For example, the chip 320 may have a function of determining whether or not a DID private key corresponding to the DID public key exists within the own chip 320 in response to input of the DID public key. The chip 320 may have the capability of outputting a certificate indicating the existence of the DID private key if the DID private key exists. For example, the chip 320 may have a function of determining whether or not an SSL private key corresponding to the SSL public key exists within the own chip 320 in response to the input of the SSL public key. The chip 320 may have the capability of outputting a certificate indicating the existence of the SSL private key if the SSL private key exists.
 情報処理装置100は、上述した構成部の他、例えば、キーボード、マウス、ディスプレイ、プリンタ、スキャナ、マイク、スピーカーなどを有してもよい。また、情報処理装置100は、記録媒体I/F304や記録媒体305を複数有していてもよい。また、情報処理装置100は、記録媒体I/F304や記録媒体305を有していなくてもよい。 The information processing apparatus 100 may have, for example, a keyboard, mouse, display, printer, scanner, microphone, speaker, etc., in addition to the components described above. Further, the information processing apparatus 100 may have a plurality of recording medium I/Fs 304 and recording media 305 . Further, the information processing apparatus 100 may not have the recording medium I/F 304 and the recording medium 305 .
(格納先管理テーブル400の記憶内容)
 次に、図4を用いて、格納先管理テーブル400の記憶内容の一例について説明する。格納先管理テーブル400は、例えば、図3に示した情報処理装置100のメモリ302や記録媒体305などの記憶領域により実現される。
(Stored Contents of Storage Destination Management Table 400)
Next, an example of the contents of the storage destination management table 400 will be described with reference to FIG. The storage destination management table 400 is realized by a storage area such as the memory 302 or the recording medium 305 of the information processing apparatus 100 shown in FIG. 3, for example.
 図4は、格納先管理テーブル400の記憶内容の一例を示す説明図である。図4に示すように、格納先管理テーブル400は、アカウントと、認証情報1と、認証情報2と、認証情報3と、属性と、チップ番号と、エリアとのフィールドを有する。格納先管理テーブル400は、アカウントごとに各フィールドに情報を設定することにより、格納先管理情報がレコード400-aとして記憶される。aは、任意の整数である。 FIG. 4 is an explanatory diagram showing an example of the storage contents of the storage location management table 400. As shown in FIG. As shown in FIG. 4, the storage destination management table 400 has fields of account, authentication information 1, authentication information 2, authentication information 3, attribute, chip number, and area. The storage destination management table 400 stores storage destination management information as a record 400-a by setting information in each field for each account. a is any integer.
 アカウントのフィールドには、DIDの発行元を識別するアカウントが設定される。認証情報1のフィールドには、上記アカウントを認証するための認証情報の一つが設定される。認証情報2のフィールドには、上記アカウントを認証するための認証情報の一つが設定される。認証情報3のフィールドには、上記アカウントを認証するための認証情報の一つが設定される。属性のフィールドには、上記発行元が有する属性が設定される。 The account field contains an account that identifies the issuer of the DID. In the authentication information 1 field, one of authentication information for authenticating the account is set. In the authentication information 2 field, one of the authentication information for authenticating the account is set. In the authentication information 3 field, one of the authentication information for authenticating the account is set. The attributes of the issuer are set in the attribute field.
 チップ番号のフィールドには、上記発行元に対応するDID秘密鍵と、SSL秘密鍵との組み合わせを記憶するチップを識別する識別情報が設定される。識別情報は、例えば、チップに割り振られたチップ番号である。エリアのフィールドには、上記DID秘密鍵と、上記SSL秘密鍵との組み合わせが記憶されたチップ内のエリアを識別する識別情報が設定される。識別情報は、例えば、エリアに割り振られたエリア番号である。 In the chip number field, identification information for identifying the chip that stores the combination of the DID secret key corresponding to the issuer and the SSL secret key is set. The identification information is, for example, a chip number assigned to the chip. The area field is set with identification information for identifying the area in the chip where the combination of the DID secret key and the SSL secret key is stored. The identification information is, for example, an area number assigned to the area.
(参照先管理テーブル500の記憶内容)
 次に、図5を用いて、参照先管理テーブル500の記憶内容の一例について説明する。参照先管理テーブル500は、例えば、図3に示した情報処理装置100のメモリ302や記録媒体305などの記憶領域により実現される。
(Stored contents of reference management table 500)
Next, an example of the contents of the reference destination management table 500 will be described with reference to FIG. The reference destination management table 500 is realized, for example, by a storage area such as the memory 302 or the recording medium 305 of the information processing apparatus 100 shown in FIG.
 図5は、参照先管理テーブル500の記憶内容の一例を示す説明図である。図5に示すように、参照先管理テーブル500は、DID公開鍵と、SSL公開鍵と、チップ番号と、エリアとのフィールドを有する。参照先管理テーブル500は、DID公開鍵と、SSL公開鍵との組み合わせごとに各フィールドに情報を設定することにより、参照先管理情報がレコード500-bとして記憶される。bは、任意の整数である。 FIG. 5 is an explanatory diagram showing an example of the contents of the reference destination management table 500. As shown in FIG. As shown in FIG. 5, the reference destination management table 500 has fields of DID public key, SSL public key, chip number, and area. The reference destination management table 500 stores reference destination management information as a record 500-b by setting information in each field for each combination of a DID public key and an SSL public key. b is any integer.
 DID公開鍵のフィールドには、DID公開鍵が設定される。SSL公開鍵のフィールドには、SSL公開鍵が設定される。チップ番号のフィールドには、上記DID公開鍵と、上記SSL公開鍵との組み合わせに対応する、DID秘密鍵と、SSL秘密鍵との組み合わせが記憶されたチップを識別する識別情報が設定される。識別情報は、例えば、チップに割り振られたチップ番号である。エリアのフィールドには、上記DID秘密鍵と、上記SSL秘密鍵との組み合わせが記憶されたチップ内のエリアを識別する識別情報が設定される。識別情報は、例えば、エリアに割り振られたエリア番号である。 A DID public key is set in the DID public key field. An SSL public key is set in the SSL public key field. In the chip number field, identification information for identifying a chip storing a combination of a DID private key and an SSL private key corresponding to the combination of the DID public key and the SSL public key is set. The identification information is, for example, a chip number assigned to the chip. The area field is set with identification information for identifying the area in the chip where the combination of the DID secret key and the SSL secret key is stored. The identification information is, for example, an area number assigned to the area.
(検証側装置201のハードウェア構成例)
 次に、図6を用いて、検証側装置201のハードウェア構成例について説明する。
(Hardware configuration example of verification-side device 201)
Next, a hardware configuration example of the verification-side device 201 will be described with reference to FIG.
 図6は、検証側装置201のハードウェア構成例を示すブロック図である。図6において、検証側装置201は、CPU601と、メモリ602と、ネットワークI/F603と、記録媒体I/F604と、記録媒体605とを有する。また、各構成部は、バス600によってそれぞれ接続される。 FIG. 6 is a block diagram showing a hardware configuration example of the verification-side device 201. As shown in FIG. In FIG. 6 , verification-side device 201 has CPU 601 , memory 602 , network I/F 603 , recording medium I/F 604 , and recording medium 605 . Also, each component is connected by a bus 600 .
 ここで、CPU601は、検証側装置201の全体の制御を司る。メモリ602は、例えば、ROM、RAMおよびフラッシュROMなどを有する。具体的には、例えば、フラッシュROMやROMが各種プログラムを記憶し、RAMがCPU601のワークエリアとして使用される。メモリ602に記憶されるプログラムは、CPU601にロードされることにより、コーディングされている処理をCPU601に実行させる。 Here, the CPU 601 controls the verification device 201 as a whole. The memory 602 has, for example, ROM, RAM and flash ROM. Specifically, for example, a flash ROM or ROM stores various programs, and a RAM is used as a work area for the CPU 601 . A program stored in the memory 602 causes the CPU 601 to execute coded processing by being loaded into the CPU 601 .
 ネットワークI/F603は、通信回線を通じてネットワーク210に接続され、ネットワーク210を介して他のコンピュータに接続される。そして、ネットワークI/F603は、ネットワーク210と内部のインターフェースを司り、他のコンピュータからのデータの入出力を制御する。ネットワークI/F603は、例えば、モデムやLANアダプタなどである。 The network I/F 603 is connected to the network 210 through a communication line, and is connected to other computers via the network 210. A network I/F 603 serves as an internal interface with the network 210 and controls input/output of data from other computers. The network I/F 603 is, for example, a modem or LAN adapter.
 記録媒体I/F604は、CPU601の制御に従って記録媒体605に対するデータのリード/ライトを制御する。記録媒体I/F604は、例えば、ディスクドライブ、SSD、USBポートなどである。記録媒体605は、記録媒体I/F604の制御で書き込まれたデータを記憶する不揮発メモリである。記録媒体605は、例えば、ディスク、半導体メモリ、USBメモリなどである。記録媒体605は、検証側装置201から着脱可能であってもよい。 The recording medium I/F 604 controls reading/writing of data from/to the recording medium 605 under the control of the CPU 601 . A recording medium I/F 604 is, for example, a disk drive, an SSD, a USB port, or the like. A recording medium 605 is a nonvolatile memory that stores data written under control of the recording medium I/F 604 . The recording medium 605 is, for example, a disk, semiconductor memory, USB memory, or the like. The recording medium 605 may be removable from the verification device 201 .
 検証側装置201は、上述した構成部の他、例えば、キーボード、マウス、ディスプレイ、プリンタ、スキャナ、マイク、スピーカーなどを有してもよい。また、検証側装置201は、記録媒体I/F604や記録媒体605を複数有していてもよい。また、検証側装置201は、記録媒体I/F604や記録媒体605を有していなくてもよい。 The verification-side device 201 may have, for example, a keyboard, mouse, display, printer, scanner, microphone, speaker, etc., in addition to the components described above. Also, the verification-side device 201 may have a plurality of recording medium I/Fs 604 and recording media 605 . Also, the verification-side device 201 may not have the recording medium I/F 604 and the recording medium 605 .
(発行側装置202のハードウェア構成例)
 発行側装置202のハードウェア構成例は、具体的には、図6に示した検証側装置201のハードウェア構成例と同様であるため、説明を省略する。
(Hardware Configuration Example of Issuing Device 202)
The hardware configuration example of the issuing device 202 is specifically the same as the hardware configuration example of the verifying device 201 shown in FIG. 6, so the description thereof will be omitted.
(管理側装置203のハードウェア構成例)
 管理側装置203のハードウェア構成例は、具体的には、図6に示した検証側装置201のハードウェア構成例と同様であるため、説明を省略する。
(Hardware Configuration Example of Management Side Device 203)
The hardware configuration example of the management-side device 203 is specifically the same as the hardware configuration example of the verification-side device 201 shown in FIG. 6, so the description thereof will be omitted.
(記録側装置204のハードウェア構成例)
 記録側装置204のハードウェア構成例は、具体的には、図6に示した検証側装置201のハードウェア構成例と同様であるため、説明を省略する。
(Hardware Configuration Example of Recording Device 204)
A hardware configuration example of the recording-side device 204 is specifically the same as the hardware configuration example of the verification-side device 201 shown in FIG. 6, so description thereof will be omitted.
(検証システム200の機能的構成例)
 次に、図7を用いて、検証システム200の機能的構成例について説明する。
(Example of functional configuration of verification system 200)
Next, a functional configuration example of the verification system 200 will be described with reference to FIG.
 図7は、検証システム200の機能的構成例を示すブロック図である。検証システム200において、情報処理装置100は、第1記憶部700と、第1取得部701と、登録部702と、第1判定部703と、第1出力部704とを含む。 FIG. 7 is a block diagram showing a functional configuration example of the verification system 200. As shown in FIG. In verification system 200 , information processing apparatus 100 includes first storage section 700 , first acquisition section 701 , registration section 702 , first determination section 703 , and first output section 704 .
 第1記憶部700は、例えば、図3に示したメモリ302や記録媒体305などの記憶領域、または、チップ320の記憶領域などによって実現される。以下では、第1記憶部700が、情報処理装置100に含まれる場合について説明するが、これに限らない。例えば、第1記憶部700が、情報処理装置100とは異なる装置に含まれ、第1記憶部700の記憶内容が情報処理装置100から参照可能である場合があってもよい。 The first storage unit 700 is implemented, for example, by a storage area such as the memory 302 or the recording medium 305 shown in FIG. 3, or a storage area of the chip 320. Although a case where the first storage unit 700 is included in the information processing apparatus 100 will be described below, the present invention is not limited to this. For example, the first storage unit 700 may be included in a device different from the information processing device 100 , and the information stored in the first storage unit 700 may be referenced from the information processing device 100 .
 第1取得部701~第1出力部704は、制御部の一例として機能する。第1取得部701~第1出力部704は、具体的には、例えば、図3に示したメモリ302や記録媒体305などの記憶領域に記憶されたプログラムをCPU301に実行させることにより、または、ネットワークI/F303により、その機能を実現する。各機能部の処理結果は、例えば、図3に示したメモリ302や記録媒体305などの記憶領域に記憶される。 The first acquisition unit 701 to first output unit 704 function as an example of a control unit. Specifically, for example, the first acquisition unit 701 to the first output unit 704 cause the CPU 301 to execute a program stored in a storage area such as the memory 302 or the recording medium 305 shown in FIG. The network I/F 303 implements that function. The processing result of each functional unit is stored in a storage area such as the memory 302 or recording medium 305 shown in FIG. 3, for example.
 第1記憶部700は、各機能部の処理において参照され、または更新される各種情報を記憶する。第1記憶部700は、第1の証明書に対応する第1の公開鍵を記憶する。第1の証明書は、例えば、所定のシステムを管理する管理主体に対して発行された正当な証明書である。第1の証明書は、例えば、第3者の認証局を介さずに発行された証明書であってもよい。第1の証明書は、具体的には、管理主体が有するDIDを利用したVCである。 The first storage unit 700 stores various information that is referred to or updated in the processing of each functional unit. The first storage unit 700 stores the first public key corresponding to the first certificate. The first certificate is, for example, a valid certificate issued to a management entity that manages a given system. The first certificate may be, for example, a certificate issued without going through a third party certificate authority. Specifically, the first certificate is a VC that uses the DID owned by the managing entity.
 所定のシステムは、例えば、管理側装置203に対応する。所定のシステムは、例えば、ウェブサイトである。所定のシステムは、例えば、DNS(Domain Name System)などであってもよい。管理主体は、例えば、DIDの発行元に対応する。管理主体は、例えば、組織、または、個人などに対応する。管理主体は、例えば、発行側装置202に対応する。第1の公開鍵は、具体的には、正当なDID公開鍵である。 A predetermined system corresponds to the management-side device 203, for example. A given system is, for example, a website. The predetermined system may be, for example, DNS (Domain Name System). A management entity corresponds to, for example, a DID issuer. A management entity corresponds to, for example, an organization or an individual. A management entity corresponds to the issuing device 202, for example. The first public key is specifically a valid DID public key.
 第1の証明書は、例えば、所定のシステムを管理する管理主体を装う攻撃者に対して発行された不正な証明書であってもよい。第1の公開鍵は、例えば、攻撃者が有するDIDを利用したVCである。第1の公開鍵は、具体的には、不正なDID公開鍵である。第1の公開鍵は、例えば、第1取得部701によって取得される。 The first certificate may be, for example, an unauthorized certificate issued to an attacker masquerading as a management entity that manages a given system. The first public key is, for example, a VC using DID owned by an attacker. The first public key is specifically an illegal DID public key. The first public key is obtained by the first obtaining unit 701, for example.
 第1記憶部700は、第2の証明書に対応する第2の公開鍵を記憶する。第2の証明書は、例えば、所定のシステムに対して認証局によって発行された証明書である。第2の証明書は、具体的には、SSL証明書である。第2の公開鍵は、具体的には、SSL公開鍵である。第2の公開鍵は、例えば、第1取得部701によって取得される。 The first storage unit 700 stores the second public key corresponding to the second certificate. A second certificate is, for example, a certificate issued by a certificate authority for a given system. The second certificate is specifically an SSL certificate. The second public key is specifically an SSL public key. The second public key is obtained by the first obtaining unit 701, for example.
 第1記憶部700は、第1の秘密鍵と、第2の秘密鍵とを記憶する。第1の秘密鍵は、管理主体に対して発行された第3の証明書に対応する。第3の証明書は、例えば、第1の証明書である場合がある。第3の証明書は、具体的には、管理主体が有するDIDを利用したVCである。第1の秘密鍵は、例えば、第1の公開鍵に対応する場合がある。第2の秘密鍵は、例えば、所定のシステムに対して認証局によって発行された第2の証明書に対応する。第2の秘密鍵は、例えば、第2の公開鍵に対応する。 The first storage unit 700 stores a first secret key and a second secret key. The first private key corresponds to the third certificate issued to the managing entity. A third certificate may be, for example, the first certificate. The third certificate is specifically a VC using the DID owned by the managing entity. A first private key may, for example, correspond to a first public key. A second private key corresponds, for example, to a second certificate issued by a certificate authority for a given system. The second private key, for example, corresponds to the second public key.
 第1記憶部700は、例えば、チップ320を用いて、第1の秘密鍵と、第2の秘密鍵とを記憶する。チップ320は、例えば、公開鍵を受け付けたことに応じて、チップ320に受け付けた当該公開鍵に対応する秘密鍵が存在していれば、当該秘密鍵が存在することを証明する証明書を、情報処理装置100が参照可能に出力する機能を有していてもよい。第1の秘密鍵と、第2の秘密鍵とは、例えば、第1取得部701によって取得される。これにより、第1記憶部700は、チップ320を用いるため、第1の秘密鍵と、第2の秘密鍵とをセキュアに記憶し易くすることができる。 The first storage unit 700 uses the chip 320, for example, to store the first secret key and the second secret key. For example, in response to acceptance of a public key, if the chip 320 has a private key corresponding to the public key accepted by the chip 320, a certificate certifying that the private key exists, The information processing apparatus 100 may have a function of outputting so that it can be referred to. The first secret key and the second secret key are obtained by the first obtaining unit 701, for example. As a result, since the first storage unit 700 uses the chip 320, the first secret key and the second secret key can be easily and securely stored.
 第1取得部701は、各機能部の処理に用いられる各種情報を取得する。第1取得部701は、取得した各種情報を、第1記憶部700に記憶し、または、各機能部に出力する。また、第1取得部701は、第1記憶部700に記憶しておいた各種情報を、各機能部に出力してもよい。第1取得部701は、例えば、利用者の操作入力に基づき、各種情報を取得する。第1取得部701は、例えば、情報処理装置100とは異なる装置から、各種情報を受信してもよい。 The first acquisition unit 701 acquires various types of information used for processing of each functional unit. The first acquisition unit 701 stores the acquired various information in the first storage unit 700 or outputs the information to each functional unit. Further, the first acquisition unit 701 may output various information stored in the first storage unit 700 to each functional unit. The first acquisition unit 701 acquires various types of information, for example, based on user's operation input. The first acquisition unit 701 may receive various types of information from a device different from the information processing device 100, for example.
 第1取得部701は、第1の秘密鍵と、第2の秘密鍵とを取得する。第1取得部701は、例えば、第1の秘密鍵と、第2の秘密鍵とを、管理主体から取得する。第1取得部701は、具体的には、第1の秘密鍵と、第2の秘密鍵とを、発行側装置202から受信することにより取得する。第1取得部701は、例えば、利用者の操作入力に基づき、第1の秘密鍵と、第2の秘密鍵との入力を受け付けることにより、第1の秘密鍵と、第2の秘密鍵とを取得してもよい。利用者は、例えば、発行側ユーザである。利用者は、例えば、発行側ユーザと通話または通信した制御側ユーザなどであってもよい。 A first acquisition unit 701 acquires a first secret key and a second secret key. The first acquisition unit 701 acquires, for example, the first secret key and the second secret key from the management entity. Specifically, the first acquisition unit 701 acquires the first secret key and the second secret key by receiving them from the issuing device 202 . For example, the first acquisition unit 701 obtains the first secret key and the second secret key by accepting the input of the first secret key and the second secret key based on the user's operation input. may be obtained. The user is, for example, the issuing user. The user may be, for example, a controlling user who has called or communicated with the issuing user.
 第1取得部701は、第1の公開鍵に関する検証依頼を取得する。検証依頼は、例えば、第1の公開鍵が正当であるか否かを検証することを依頼する。検証依頼は、具体的には、第1の公開鍵と第2の公開鍵との組み合わせが正当であるか否かを検証することを依頼する。検証依頼は、例えば、第1の公開鍵を含む。検証依頼は、例えば、第1の公開鍵を取得可能にする情報を含んでいてもよい。検証依頼は、具体的には、第1の公開鍵が存在する記憶領域のアドレスを含んでいてもよい。検証依頼は、例えば、第2の公開鍵を含んでいてもよい。検証依頼は、例えば、第2の公開鍵を取得可能にする情報を含んでいてもよい。検証依頼は、具体的には、第2の公開鍵が存在する記憶領域のアドレスを含んでいてもよい。 The first acquisition unit 701 acquires a verification request regarding the first public key. The verification request, for example, requests verification of whether or not the first public key is valid. Specifically, the verification request requests verification of whether or not the combination of the first public key and the second public key is valid. The verification request includes, for example, the first public key. The verification request may include, for example, information that enables obtaining the first public key. The verification request may specifically include the address of the storage area where the first public key exists. The verification request may contain, for example, the second public key. The verification request may include, for example, information that enables obtaining the second public key. The verification request may specifically include the address of the storage area where the second public key exists.
 第1取得部701は、例えば、検証依頼を、依頼元から取得する。依頼元は、例えば、検証側装置201に対応する。第1取得部701は、具体的には、検証依頼を、検証側装置201から受信することにより取得する。第1取得部701は、例えば、利用者の操作入力に基づいて、検証依頼の入力を受け付けることにより、検証依頼を取得してもよい。利用者は、例えば、検証側ユーザである。利用者は、例えば、検証側ユーザと通話または通信した制御側ユーザなどであってもよい。 For example, the first acquisition unit 701 acquires a verification request from the requester. The requester corresponds to, for example, the verification-side device 201 . Specifically, the first acquisition unit 701 acquires the verification request by receiving it from the verification-side device 201 . The first acquisition unit 701 may acquire the verification request by, for example, accepting the input of the verification request based on the user's operation input. The user is, for example, a verification user. The user may be, for example, a controlling user who has called or communicated with the proving user.
 第1取得部701は、検証依頼に応じて、第1の公開鍵と、第2の公開鍵との組み合わせを取得する。第1取得部701は、例えば、検証依頼から、第1の公開鍵と、第2の公開鍵とを抽出することにより、第1の公開鍵と、第2の公開鍵との組み合わせを取得する。 The first acquisition unit 701 acquires a combination of the first public key and the second public key in response to the verification request. The first acquisition unit 701 acquires a combination of the first public key and the second public key by, for example, extracting the first public key and the second public key from the verification request. .
 第1取得部701は、例えば、検証依頼に含まれる第1の公開鍵が存在する記憶領域のアドレスに基づいて、第1の公開鍵を取得してもよい。第1取得部701は、例えば、検証依頼に含まれる第2の公開鍵が存在する記憶領域のアドレスに基づいて、第2の公開鍵を取得してもよい。これにより、第1取得部701は、正当であるか否かを検証する対象である、第1の公開鍵と、第2の公開鍵との組み合わせを取得することができる。 The first acquisition unit 701 may acquire the first public key, for example, based on the address of the storage area containing the first public key included in the verification request. The first acquisition unit 701 may acquire the second public key, for example, based on the address of the storage area containing the second public key included in the verification request. As a result, the first obtaining unit 701 can obtain the combination of the first public key and the second public key to be verified as to whether or not it is valid.
 第1取得部701は、いずれかの機能部の処理を開始する開始トリガーを受け付けてもよい。開始トリガーは、例えば、利用者による所定の操作入力があったことである。開始トリガーは、例えば、他のコンピュータから、所定の情報を受信したことであってもよい。開始トリガーは、例えば、いずれかの機能部が所定の情報を出力したことであってもよい。 The first acquisition unit 701 may accept a start trigger for starting processing of any of the functional units. The start trigger is, for example, that there is a predetermined operation input by the user. The start trigger may be, for example, reception of predetermined information from another computer. The start trigger may be, for example, the output of predetermined information by any of the functional units.
 第1取得部701は、例えば、第1の秘密鍵と、第2の秘密鍵とを取得したことを、登録部702の処理を開始する開始トリガーとして受け付けてもよい。第1取得部701は、例えば、第1の公開鍵と、第2の公開鍵とを取得したことを、第1判定部703の処理を開始する開始トリガーとして受け付けてもよい。 For example, the first acquisition unit 701 may accept acquisition of the first secret key and the second secret key as a start trigger for starting the processing of the registration unit 702 . For example, the first acquisition unit 701 may accept acquisition of the first public key and the second public key as a start trigger for starting the processing of the first determination unit 703 .
 登録部702は、第1取得部701で第1の秘密鍵と、第2の秘密鍵とを取得したことに応じて、第1記憶部700に、第1の秘密鍵と、第2の秘密鍵とを対応付けて格納する。これにより、登録部702は、第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを検証可能にすることができる。 Registration unit 702 stores the first secret key and the second secret key in first storage unit 700 in response to acquisition of the first secret key and the second secret key by first acquisition unit 701 . store in association with a key. Thereby, the registration unit 702 can verify whether or not the combination of the first public key and the second public key is valid.
 第1判定部703は、第1記憶部700を参照して、第1取得部701で取得した第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを判定する。第1判定部703は、例えば、第1取得部701で取得した第1の公開鍵が、第1記憶部700に記憶された第1の秘密鍵に対応する正当な公開鍵であるか否かを判定する。第1判定部703は、例えば、第1取得部701で取得した第2の公開鍵が、第1記憶部700に記憶された第2の秘密鍵に対応する正当な公開鍵であるか否かを判定する。 The first determination unit 703 refers to the first storage unit 700 and determines whether or not the combination of the first public key and the second public key acquired by the first acquisition unit 701 is valid. . For example, the first determination unit 703 determines whether the first public key acquired by the first acquisition unit 701 is a valid public key corresponding to the first private key stored in the first storage unit 700. judge. For example, the first determination unit 703 determines whether the second public key acquired by the first acquisition unit 701 is a legitimate public key corresponding to the second private key stored in the first storage unit 700. judge.
 第1判定部703は、例えば、第1の公開鍵と、第2の公開鍵とが共に正当な公開鍵であれば、第1の公開鍵と、第2の公開鍵との組み合わせが正当であると判定する。第1判定部703は、例えば、第1の公開鍵と、第2の公開鍵との少なくともいずれかが正当な公開鍵でなければ、第1の公開鍵と、第2の公開鍵との組み合わせが正当ではないと判定する。これにより、第1判定部703は、第1の公開鍵が正当であるか否かを精度よく検証可能にすることができ、第1の公開鍵に対応する第1の証明書が正当であるか否かを精度よく検証可能にすることができる。 For example, if both the first public key and the second public key are valid public keys, the first determination unit 703 determines that the combination of the first public key and the second public key is valid. Determine that there is. For example, if at least one of the first public key and the second public key is not a valid public key, the first determination unit 703 determines the combination of the first public key and the second public key. is determined to be incorrect. As a result, the first determination unit 703 can accurately verify whether or not the first public key is valid, and the first certificate corresponding to the first public key is valid. Whether or not can be verified with high accuracy.
 第1判定部703は、例えば、取得した組み合わせに含まれる第1の公開鍵と、第2の公開鍵とを、チップ320に入力してもよい。第1判定部703は、例えば、第1の公開鍵に対応する第1の秘密鍵が存在することを証明する証明書が、チップ320から出力されるか否かを判定する。第1判定部703は、例えば、第2の公開鍵に対応する第2の秘密鍵が存在することを証明する証明書が、チップ320から出力されるか否かを判定する。 For example, the first determination unit 703 may input the first public key and the second public key included in the acquired combination to the chip 320 . The first determination unit 703 determines, for example, whether the chip 320 outputs a certificate proving that the first private key corresponding to the first public key exists. The first determination unit 703 determines, for example, whether the chip 320 outputs a certificate proving that the second private key corresponding to the second public key exists.
 第1判定部703は、例えば、第1の秘密鍵が存在することを証明する証明書と、第2の公開鍵に対応する第2の秘密鍵が存在することを証明する証明書とが共に、チップ320から出力された場合、組み合わせが正当であると判定する。第1判定部703は、例えば、第1の秘密鍵が存在することを証明する証明書と、第2の公開鍵に対応する第2の秘密鍵が存在することを証明する証明書との少なくともいずれかが、チップ320から出力されない場合、組み合わせが正当ではないと判定する。これにより、第1判定部703は、第1の公開鍵が正当であるか否かを精度よく検証可能にすることができ、第1の公開鍵に対応する第1の証明書が正当であるか否かを精度よく検証可能にすることができる。 The first determination unit 703, for example, sends both a certificate proving the existence of the first private key and a certificate proving the existence of the second private key corresponding to the second public key. , is output from the chip 320, it is determined that the combination is valid. For example, the first determination unit 703 determines at least a certificate proving the existence of the first private key and a certificate proving the existence of the second private key corresponding to the second public key. If either is not output from chip 320, then the combination is determined to be invalid. As a result, the first determination unit 703 can accurately verify whether or not the first public key is valid, and the first certificate corresponding to the first public key is valid. Whether or not can be verified with high accuracy.
 第1出力部704は、少なくともいずれかの機能部の処理結果を出力する。出力形式は、例えば、ディスプレイへの表示、プリンタへの印刷出力、ネットワークI/F303による外部装置への送信、または、メモリ302や記録媒体305などの記憶領域への記憶である。これにより、第1出力部704は、少なくともいずれかの機能部の処理結果を利用者に通知可能にし、情報処理装置100の利便性の向上を図ることができる。 A first output unit 704 outputs the processing result of at least one of the functional units. The output format is, for example, display on a display, print output to a printer, transmission to an external device via the network I/F 303, or storage in a storage area such as the memory 302 or recording medium 305. Thereby, the first output unit 704 can notify the user of the processing result of at least one of the functional units, and the convenience of the information processing apparatus 100 can be improved.
 第1出力部704は、判定した結果を、検証依頼の依頼元宛てに出力する。第1出力部704は、例えば、判定した結果を、検証側装置201に送信する。これにより、第1出力部704は、依頼元で、第1の公開鍵が正当であるか否かを精度よく検証可能にすることができ、第1の公開鍵に対応する第1の証明書が正当であるか否かを精度よく検証可能にすることができる。 The first output unit 704 outputs the determined result to the requester of the verification request. The first output unit 704 , for example, transmits the determined result to the verification-side device 201 . Accordingly, the first output unit 704 can accurately verify whether or not the first public key is valid at the request source, and the first certificate corresponding to the first public key can be verified. It is possible to accurately verify whether or not is valid.
 また、検証システム200において、依頼元は、第2記憶部710と、第2取得部711と、第2判定部712と、第2出力部713とを含む。依頼元は、例えば、検証側装置201である。以下の説明では、依頼元が「検証側装置201」である場合について説明する。 Also, in the verification system 200 , the requester includes a second storage unit 710 , a second acquisition unit 711 , a second determination unit 712 , and a second output unit 713 . The request source is, for example, the verification-side device 201 . In the following description, the case where the request source is the "verification-side device 201" will be described.
 第2記憶部710は、例えば、図6に示したメモリ602や記録媒体605などの記憶領域によって実現される。以下では、第2記憶部710が、検証側装置201に含まれる場合について説明するが、これに限らない。例えば、第2記憶部710が、検証側装置201とは異なる装置に含まれ、第2記憶部710の記憶内容が検証側装置201から参照可能である場合があってもよい。 The second storage unit 710 is implemented, for example, by a storage area such as the memory 602 or recording medium 605 shown in FIG. A case where the second storage unit 710 is included in the verification-side device 201 will be described below, but the present invention is not limited to this. For example, the second storage unit 710 may be included in a device different from the verification-side device 201 and the contents stored in the second storage unit 710 may be referenced from the verification-side device 201 .
 第2取得部711~第2出力部713は、制御部の一例として機能する。第2取得部711~第2出力部713は、具体的には、例えば、図6に示したメモリ602や記録媒体605などの記憶領域に記憶されたプログラムをCPU601に実行させることにより、または、ネットワークI/F603により、その機能を実現する。各機能部の処理結果は、例えば、図6に示したメモリ602や記録媒体605などの記憶領域に記憶される。 The second acquisition unit 711 to second output unit 713 function as an example of a control unit. Specifically, for example, the second acquisition unit 711 to the second output unit 713 cause the CPU 601 to execute a program stored in a storage area such as the memory 602 or the recording medium 605 shown in FIG. 6, or The network I/F 603 realizes that function. The processing result of each functional unit is stored in a storage area such as the memory 602 or recording medium 605 shown in FIG. 6, for example.
 第2記憶部710は、各機能部の処理において参照され、または更新される各種情報を記憶する。第2記憶部710は、例えば、第1の証明書を記憶する。第1の証明書は、例えば、第2取得部711によって取得される。第2記憶部710は、例えば、第1の公開鍵を記憶する。第1の公開鍵は、例えば、第2取得部711によって取得される。第2記憶部710は、例えば、第2の公開鍵を記憶する。第2の公開鍵は、例えば、第2取得部711によって取得される。 The second storage unit 710 stores various information that is referred to or updated in the processing of each functional unit. The second storage unit 710 stores, for example, the first certificate. The first certificate is obtained by the second obtaining unit 711, for example. The second storage unit 710 stores, for example, a first public key. The first public key is obtained by the second obtaining unit 711, for example. The second storage unit 710 stores, for example, a second public key. The second public key is obtained by the second obtaining unit 711, for example.
 第2取得部711は、各機能部の処理に用いられる各種情報を取得する。第2取得部711は、取得した各種情報を、第2記憶部710に記憶し、または、各機能部に出力する。また、第2取得部711は、第2記憶部710に記憶しておいた各種情報を、各機能部に出力してもよい。第2取得部711は、例えば、利用者の操作入力に基づき、各種情報を取得する。第2取得部711は、例えば、検証側装置201とは異なる装置から、各種情報を受信してもよい。 The second acquisition unit 711 acquires various information used for processing of each functional unit. The second acquisition unit 711 stores the acquired various information in the second storage unit 710 or outputs the acquired information to each functional unit. Further, the second acquisition unit 711 may output various information stored in the second storage unit 710 to each functional unit. The second acquisition unit 711 acquires various types of information, for example, based on the user's operation input. The second acquisition unit 711 may receive various information from a device different from the verification device 201, for example.
 第2取得部711は、例えば、第1の証明書が付与されたデータを取得する。第2取得部711は、具体的には、第1の証明書が付与されたデータを、他のコンピュータから受信することにより取得する。他のコンピュータは、例えば、発行側装置202である。他のコンピュータは、例えば、発行側装置202を装った攻撃者が有するコンピュータである場合がある。第2取得部711は、具体的には、利用者の操作入力に基づき、第1の証明書が付与されたデータの入力を受け付けることにより、第1の証明書が付与されたデータを取得してもよい。 The second acquisition unit 711, for example, acquires data to which the first certificate is attached. Specifically, the second acquisition unit 711 acquires data to which the first certificate is attached by receiving it from another computer. The other computer is, for example, publisher device 202 . The other computer may be, for example, a computer possessed by an attacker impersonating the issuing device 202 . Specifically, the second acquisition unit 711 acquires the data to which the first certificate is attached by accepting the input of the data to which the first certificate is attached based on the operation input by the user. may
 第2取得部711は、例えば、第1の証明書が付与されたデータを取得したことに応じて、第1の証明書に基づいて、第1の公開鍵と、第2の公開鍵とを取得する。第2取得部711は、具体的には、第1の証明書が付与されたデータを取得したことに応じて、第1の証明書に基づいて、所定のデータベースから、所定のシステムを特定可能にする情報を取得する。所定のデータベースは、例えば、記録側装置204に対応する。所定のシステムは、例えば、管理側装置203に対応する。第2取得部711は、具体的には、取得した情報に基づいて、所定のシステムが有する第1の公開鍵と、所定のシステムが有する第2の公開鍵とを取得する。 For example, in response to acquiring data to which the first certificate is attached, the second acquiring unit 711 acquires the first public key and the second public key based on the first certificate. get. Specifically, the second obtaining unit 711 can identify a predetermined system from a predetermined database based on the first certificate in response to obtaining data to which the first certificate is attached. Get information to make. The predetermined database corresponds to the recording device 204, for example. A predetermined system corresponds to, for example, the management-side device 203 . Specifically, the second obtaining unit 711 obtains a first public key owned by a predetermined system and a second public key owned by a predetermined system based on the obtained information.
 第2取得部711は、例えば、第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを判定した結果を、情報処理装置100から受信する。これにより、第2取得部711は、第1の公開鍵が正当であるか否かを精度よく検証可能にすることができ、第1の公開鍵に対応する第1の証明書が正当であるか否かを精度よく検証可能にすることができる。第2取得部711は、第1の証明書が付与されたデータが正当であるか否かを精度よく検証可能にすることができる。 For example, the second acquisition unit 711 receives from the information processing device 100 the result of determining whether or not the combination of the first public key and the second public key is valid. As a result, the second acquisition unit 711 can accurately verify whether the first public key is valid, and the first certificate corresponding to the first public key is valid. Whether or not can be verified with high accuracy. The second acquisition unit 711 can accurately verify whether or not the data to which the first certificate is attached is valid.
 第2判定部712は、例えば、第1の公開鍵が正当であるか否かを判定し、第1の証明書が正当であるか否かを判定し、第1の証明書が付与されたデータが正当であるか否かを判定してもよい。第2判定部712は、具体的には、第2取得部711で取得した、第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを判定した結果に基づいて、第1の公開鍵が正当であるか否かを判定する。第2判定部712は、具体的には、組み合わせが正当であれば、第1の公開鍵が正当であると判定する。第2判定部712は、具体的には、第1の公開鍵が正当であれば、第1の証明書が正当であると判定する。第2判定部712は、具体的には、第1の証明書が正当であれば、第1の証明書が付与されたデータが正当であると判定する。これにより、第2判定部712は、セキュリティを確保することができる。 For example, the second determination unit 712 determines whether the first public key is valid, determines whether the first certificate is valid, and determines whether the first certificate is valid. It may be determined whether the data is valid. Specifically, the second determination unit 712 determines whether or not the combination of the first public key and the second public key acquired by the second acquisition unit 711 is valid. , determine whether the first public key is valid. Specifically, if the combination is valid, the second determination unit 712 determines that the first public key is valid. Specifically, the second determination unit 712 determines that the first certificate is valid if the first public key is valid. Specifically, if the first certificate is valid, the second determination unit 712 determines that the data attached with the first certificate is valid. Thereby, the second determination unit 712 can ensure security.
 第2出力部713は、少なくともいずれかの機能部の処理結果を出力する。出力形式は、例えば、ディスプレイへの表示、プリンタへの印刷出力、ネットワークI/F603による外部装置への送信、または、メモリ602や記録媒体605などの記憶領域への記憶である。これにより、第2出力部713は、少なくともいずれかの機能部の処理結果を利用者に通知可能にし、検証側装置201の利便性の向上を図ることができる。 The second output unit 713 outputs the processing result of at least one of the functional units. The output format is, for example, display on a display, print output to a printer, transmission to an external device via the network I/F 603, or storage in a storage area such as the memory 602 or recording medium 605. Thereby, the second output unit 713 can notify the user of the processing result of at least one of the functional units, and the convenience of the verification-side device 201 can be improved.
 第2出力部713は、例えば、第2取得部711で第1の公開鍵と、第2の公開鍵とを取得したことに応じて、第1の公開鍵と、第2の公開鍵とを含む検証依頼を、情報処理装置100に送信する。第2出力部713は、例えば、第2取得部711で取得した、第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを判定した結果を、利用者が参照可能に出力する。利用者は、例えば、検証側ユーザに対応する。 For example, the second output unit 713 obtains the first public key and the second public key in response to the second obtaining unit 711 obtaining the first public key and the second public key. A verification request containing the information is transmitted to the information processing apparatus 100 . For example, the second output unit 713 allows the user to refer to the result of determining whether the combination of the first public key and the second public key acquired by the second acquisition unit 711 is valid. output as possible. A user corresponds to, for example, a verifying user.
 第2出力部713は、例えば、第2判定部712で第1の公開鍵が正当であるか否かを判定した結果を、利用者が参照可能に出力する。利用者は、例えば、検証側ユーザに対応する。第2出力部713は、例えば、第2判定部712で第1の証明書が正当であるか否かを判定した結果を、利用者が参照可能に出力する。利用者は、例えば、検証側ユーザに対応する。第2出力部713は、例えば、第2判定部712で第1の証明書が付与されたデータが正当であるか否かを判定した結果を、利用者が参照可能に出力する。 The second output unit 713 outputs, for example, the result of the second determination unit 712 determining whether or not the first public key is valid so that the user can refer to it. A user corresponds to, for example, a verifying user. The second output unit 713 outputs, for example, the result of the determination made by the second determination unit 712 as to whether or not the first certificate is valid so that the user can refer to it. A user corresponds to, for example, a verifying user. The second output unit 713 outputs, for example, the result of the determination made by the second determination unit 712 as to whether or not the data to which the first certificate is attached is valid so that the user can refer to it.
 ここでは、第1判定部703が、第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを直接的に判定する場合について説明したが、これに限らない。例えば、第1判定部703が、第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを間接的に判定する処理までを実行し、直接的に判定する処理までは実行しない場合があってもよい。 Here, the case where the first determination unit 703 directly determines whether or not the combination of the first public key and the second public key is valid has been described, but the present invention is not limited to this. For example, the first determination unit 703 indirectly determines whether the combination of the first public key and the second public key is valid, and directly determines whether the combination is valid. may not be executed.
 具体的には、第1判定部703が、第1の公開鍵と、第2の公開鍵とが、それぞれ、正当な公開鍵であるか否かを判定する処理までを実行する場合があってもよい。この場合、第1出力部704は、第1判定部703で、第1の公開鍵と、第2の公開鍵とが、それぞれ、正当な公開鍵であるか否かを判定した結果を、検証側装置201に送信する。第2判定部712は、第1の公開鍵と、第2の公開鍵とが、それぞれ、正当な公開鍵であるか否かを判定した結果に基づいて、第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを直接的に判定する。 Specifically, the first determination unit 703 may perform processing up to determining whether the first public key and the second public key are valid public keys. good too. In this case, the first output unit 704 verifies the results obtained by the first determination unit 703 determining whether the first public key and the second public key are valid public keys. Send to the side device 201 . Based on the result of determining whether the first public key and the second public key are valid public keys, the second determination unit 712 determines whether the first public key and the second public key are valid public keys. directly determines whether or not the combination with the public key of is valid.
 ここでは、情報処理装置100が、第1取得部701と、登録部702と、第1判定部703と、第1出力部704とを含む場合について説明したが、これに限らない。例えば、情報処理装置100が、登録部702を含まない場合があってもよい。この場合、検証システム200において、情報処理装置100以外に、登録部702を含む他のコンピュータが存在していてもよい。 Here, the case where the information processing apparatus 100 includes the first acquisition unit 701, the registration unit 702, the first determination unit 703, and the first output unit 704 has been described, but the present invention is not limited to this. For example, the information processing apparatus 100 may not include the registration unit 702 . In this case, the verification system 200 may include another computer including the registration unit 702 in addition to the information processing apparatus 100 .
(検証システム200の動作例)
 次に、図8~図12を用いて、検証システム200の動作例について説明する。
(Example of operation of verification system 200)
Next, an operation example of the verification system 200 will be described with reference to FIGS. 8 to 12. FIG.
 図8~図12は、検証システム200の動作例を示す説明図である。図8において、情報処理装置100は、TaaS(Trust as a Service)サーバを実現する。B組織に対応する検証側装置201と、A組織に対応する発行側装置202と、A組織が有するウェブサイトを運営するウェブサーバとなる管理側装置203と、記録側装置204とが存在するとする。 8 to 12 are explanatory diagrams showing operation examples of the verification system 200. FIG. In FIG. 8, an information processing apparatus 100 implements a TaaS (Trust as a Service) server. Assume that there are a verification side device 201 corresponding to the B organization, an issuing side device 202 corresponding to the A organization, a management side device 203 serving as a web server that operates the website owned by the A organization, and a recording side device 204. .
 (8-1)発行側装置202は、A組織に対応するDIDを生成し、DID秘密鍵と、DID公開鍵との鍵ペアを生成する。発行側装置202は、SSL秘密鍵と、SSL公開鍵との鍵ペアを生成し、認証局を利用して、A組織が有するウェブサイトに対応するSSL証明書を生成する。 (8-1) The issuing device 202 generates a DID corresponding to the A organization, and generates a key pair of a DID private key and a DID public key. The issuing device 202 generates a key pair of an SSL private key and an SSL public key, and uses a certificate authority to generate an SSL certificate corresponding to the website owned by the A organization.
 (8-2)発行側装置202は、A組織に対応するDIDと、SSL公開鍵と、SSL秘密鍵と、SSL証明書とを、管理側装置203に提供する。管理側装置203は、受信したA組織に対応するDIDを、他のコンピュータから参照可能に記憶する。管理側装置203は、受信したSSL公開鍵を、他のコンピュータから参照可能に記憶する。管理側装置203は、受信したSSL秘密鍵をセキュアに記憶する。管理側装置203は、受信したSSL証明書を、他のコンピュータから参照可能に記憶する。 (8-2) The issuing device 202 provides the management device 203 with the DID corresponding to the A organization, the SSL public key, the SSL private key, and the SSL certificate. The management-side device 203 stores the received DID corresponding to the A organization so that other computers can refer to it. The management-side device 203 stores the received SSL public key so that other computers can refer to it. The management-side device 203 securely stores the received SSL private key. The management-side device 203 stores the received SSL certificate so that other computers can refer to it.
 (8-3)発行側装置202は、A組織に対応するDIDと、DID公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを、記録側装置204に提供する。記録側装置204は、A組織に対応するDIDと、DID公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを対応付けて、台帳801に記憶する。台帳801は、例えば、ブロックチェーンである。 (8-3) The issuing device 202 provides the recording device 204 with the DID corresponding to the A organization, the DID public key, and the address of the management device 203 serving as a web server. The recording device 204 associates the DID corresponding to the A organization, the DID public key, and the address of the management device 203 serving as a web server, and stores them in the ledger 801 . Ledger 801 is, for example, a block chain.
 (8-4)発行側装置202は、A組織が有するアカウントと、A組織が有する認証情報と、A組織が有する属性などを、情報処理装置100に送信する。情報処理装置100は、格納先管理テーブル400を参照して、A組織が有するアカウントと、A組織が有する認証情報と、A組織が有する属性などに基づいて、A組織を認証すると、A組織に対応するチップ320を選択する。 (8-4) The issuing device 202 transmits to the information processing device 100 the account owned by the A organization, the authentication information owned by the A organization, the attributes owned by the A organization, and the like. The information processing apparatus 100 refers to the storage location management table 400 and authenticates the organization A based on the account owned by the organization A, the authentication information owned by the organization A, and the attributes owned by the organization A. Select the corresponding chip 320 .
 発行側装置202は、DID公開鍵と、SSL公開鍵と、DID秘密鍵と、SSL秘密鍵とを、情報処理装置100に送信する。管理側装置203が、発行側装置202に代わり、SSL公開鍵と、SSL秘密鍵とを、情報処理装置100に送信してもよい。情報処理装置100は、DID公開鍵と、SSL公開鍵と、DID秘密鍵と、SSL秘密鍵とを、発行側装置202から受信する。 The issuing device 202 transmits the DID public key, the SSL public key, the DID private key, and the SSL private key to the information processing device 100 . The management device 203 may transmit the SSL public key and the SSL private key to the information processing device 100 instead of the issuing device 202 . The information processing device 100 receives the DID public key, the SSL public key, the DID private key, and the SSL private key from the issuing device 202 .
 情報処理装置100は、選択したA組織に対応するチップ320を用いて、DID秘密鍵と、SSL秘密鍵との組み合わせを記憶する。情報処理装置100は、選択したA組織に対応するチップ320を識別するチップ番号と、DID公開鍵と、SSL公開鍵とを対応付けて、参照先管理テーブル500に記憶する。 The information processing device 100 uses the chip 320 corresponding to the selected A organization to store the combination of the DID private key and the SSL private key. The information processing apparatus 100 associates the chip number for identifying the chip 320 corresponding to the selected organization A, the DID public key, and the SSL public key, and stores them in the reference destination management table 500 .
 これにより、情報処理装置100は、以降、A組織に対応する、DID公開鍵とSSL公開鍵との正当な組み合わせを把握可能にすることができる。情報処理装置100は、A組織に対応する、DID公開鍵とSSL公開鍵との正当な組み合わせを把握するにあたって、いずれのチップ320を参照すればよいのかを特定可能にすることができる。次に、図9の説明に移行する。 As a result, the information processing apparatus 100 can thereafter grasp the valid combination of the DID public key and the SSL public key corresponding to the A organization. The information processing apparatus 100 can specify which chip 320 should be referred to when grasping the valid combination of the DID public key and the SSL public key corresponding to the A organization. Next, the description of FIG. 9 will be described.
 図9において、(9-1)発行側装置202は、A組織に対応する正当なDID秘密鍵を用いて、署名を生成する。発行側装置202は、生成した署名を付与したA組織に対応する正当なDIDを利用した正当なVCを生成する。発行側装置202は、正当なVCを付与したデータを、検証側装置201に送信する。データは、例えば、正当な文章である。文章は、例えば、契約に関する文章である。検証側装置201は、VCが付与された文章を受信する。 In FIG. 9, (9-1) issuing device 202 generates a signature using a legitimate DID private key corresponding to A organization. Issuing side device 202 generates a valid VC using a valid DID corresponding to the A organization to which the generated signature is attached. The issuing device 202 transmits data to which a valid VC is assigned to the verifying device 201 . The data are, for example, valid sentences. The sentences are, for example, sentences related to contracts. Verification-side device 201 receives the text to which VC is assigned.
 ここで、検証側装置201で、VCが付与されたデータが、A組織に対応する発行側装置202から送信された改ざんされていない正当なデータであるか否かを検証することが望まれる。 Here, it is desired that the verification-side device 201 verifies whether or not the data to which the VC is assigned is valid data that has not been tampered with and has been transmitted from the issuing-side device 202 corresponding to the A organization.
 (9-2)検証側装置201は、VCに基づいて、VCに関する問い合わせを、記録側装置204に送信する。記録側装置204は、問い合わせに応じて、台帳801に記憶された、VCに対応する、A組織に対応するDIDと、DID公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを、検証側装置201に送信する。検証側装置201は、A組織に対応するDIDと、DID公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを、記録側装置204から受信する。 (9-2) Verification device 201 transmits an inquiry about VC to recording device 204 based on the VC. In response to the inquiry, the recording device 204 verifies the DID corresponding to the VC and corresponding to the A organization stored in the ledger 801, the DID public key, and the address of the management device 203 serving as the web server. Send to the side device 201 . Verification-side device 201 receives from recording-side device 204 the DID corresponding to organization A, the DID public key, and the address of management-side device 203 serving as a web server.
 (9-3)検証側装置201は、ウェブサーバとなる管理側装置203のアドレスに基づいて、管理側装置203から、SSL証明書と、SSL公開鍵とを取得する。検証側装置201は、SSL公開鍵に基づいて、SSL証明書が正当であるか否かを判定する。検証側装置201は、SSL証明書が正当でなければ、VCが付与されたデータが正当ではないと判定し、VCが付与されたデータが正当ではないと判定した結果を、検証側ユーザが参照可能に出力する。ここでは、検証側装置201は、SSL証明書が正当であると判定したとする。 (9-3) Verification-side device 201 acquires an SSL certificate and an SSL public key from management-side device 203 based on the address of management-side device 203 serving as a web server. Verification-side device 201 determines whether the SSL certificate is valid based on the SSL public key. If the SSL certificate is not valid, the verification-side device 201 determines that the VC-assigned data is not valid, and the verification-side user refers to the result of the determination that the VC-assigned data is not valid. output as possible. Assume here that the verification-side device 201 determines that the SSL certificate is valid.
 (9-4)検証側装置201は、SSL証明書が正当であれば、管理側装置203から、DIDを取得する。検証側装置201は、記録側装置204から取得したDIDと、管理側装置203から取得したDIDとが一致するか否かを判定する。検証側装置201は、記録側装置204から取得したDIDと、管理側装置203から取得したDIDとが一致しなければ、DIDが正当ではないと判定する。検証側装置201は、DIDが正当でなければ、VCが付与されたデータが正当ではないと判定し、VCが付与されたデータが正当ではないと判定した結果を、検証側ユーザが参照可能に出力する。ここでは、検証側装置201は、記録側装置204から取得したDIDと、管理側装置203から取得したDIDとが一致すると判定したとする。 (9-4) Verification-side device 201 acquires a DID from management-side device 203 if the SSL certificate is valid. The verification-side device 201 determines whether the DID obtained from the recording-side device 204 and the DID obtained from the management-side device 203 match. If the DID acquired from the recording device 204 and the DID acquired from the management device 203 do not match, the verification device 201 determines that the DID is invalid. If the DID is not valid, the verification-side device 201 determines that the data to which the VC is assigned is not valid, and allows the verification-side user to refer to the result of the determination that the data to which the VC is assigned is not valid. Output. Assume here that the verification-side device 201 determines that the DID acquired from the recording-side device 204 and the DID acquired from the management-side device 203 match.
 (9-5)検証側装置201は、DID公開鍵と、SSL公開鍵との組み合わせを含む検証依頼を、情報処理装置100に送信する。情報処理装置100は、参照先管理テーブル500を参照して、DID公開鍵と、SSL公開鍵との組み合わせに対応するチップ320を選択する。情報処理装置100は、DID公開鍵と、SSL公開鍵とを、選択したチップ320に入力する。 (9-5) The verifier device 201 transmits to the information processing device 100 a verification request including a combination of the DID public key and the SSL public key. The information processing apparatus 100 refers to the reference destination management table 500 and selects the chip 320 corresponding to the combination of the DID public key and the SSL public key. The information processing device 100 inputs the DID public key and the SSL public key to the selected chip 320 .
 情報処理装置100は、入力に応じて、チップ320において、DID秘密鍵と、SSL秘密鍵とが対応付けて記憶されていることを示す証明書が、チップ320から出力されるか否かを判定する。チップ320が証明書を出力する一例については、図13を用いて後述する。情報処理装置100は、証明書が出力されると、DID公開鍵と、SSL公開鍵との組み合わせが正当であると判定する。情報処理装置100は、証明書が出力されなければ、DID公開鍵と、SSL公開鍵との組み合わせが正当ではないと判定する。 In response to the input, information processing apparatus 100 determines whether chip 320 outputs a certificate indicating that chip 320 stores a DID private key and an SSL private key in association with each other. do. An example in which the chip 320 outputs the certificate will be described later using FIG. When the certificate is output, information processing apparatus 100 determines that the combination of the DID public key and the SSL public key is valid. The information processing apparatus 100 determines that the combination of the DID public key and the SSL public key is not valid unless the certificate is output.
 情報処理装置100は、DID公開鍵と、SSL公開鍵との組み合わせが正当であるか否かを判定した結果を、検証側装置201に送信する。検証側装置201は、DID公開鍵と、SSL公開鍵との組み合わせが正当であるか否かを判定した結果を、情報処理装置100から受信する。ここでは、情報処理装置100は、DID公開鍵と、SSL公開鍵との組み合わせが正当であると判定したとする。 The information processing device 100 transmits to the verification side device 201 the result of determining whether or not the combination of the DID public key and the SSL public key is valid. Verification-side device 201 receives from information processing device 100 the result of determining whether or not the combination of the DID public key and the SSL public key is valid. Assume here that the information processing apparatus 100 determines that the combination of the DID public key and the SSL public key is valid.
 (9-6)検証側装置201は、DID公開鍵と、SSL公開鍵との組み合わせが正当であれば、DIDが正当であり、VCが正当であり、VCが付与されたデータが正当であると判定する。検証側装置201は、VCが付与されたデータが正当であると判定した結果を、検証側ユーザが参照可能に出力する。 (9-6) If the combination of the DID public key and the SSL public key is valid, the verifier device 201 determines that the DID is valid, the VC is valid, and the data to which the VC is attached is valid. I judge. Verification-side device 201 outputs the result of determining that the data to which VC is assigned is valid so that the verification-side user can refer to it.
 検証側装置201は、DID公開鍵と、SSL公開鍵との組み合わせが正当でなければ、DIDが正当ではなく、VCが正当ではなく、VCが付与されたデータが正当ではないと判定する。検証側装置201は、VCが付与されたデータが正当ではないと判定した結果を、検証側ユーザが参照可能に出力する。 If the combination of the DID public key and the SSL public key is not valid, the verification-side device 201 determines that the DID is not valid, the VC is not valid, and the data with the VC is not valid. Verification-side device 201 outputs the result of determining that the data to which VC is assigned is not valid so that the verification-side user can refer to it.
 ここでは、検証側装置201は、DID公開鍵と、SSL公開鍵との組み合わせが正当であるため、DIDが正当であり、VCが正当であり、VCが付与されたデータが正当であると判定する。検証側装置201は、VCが付与されたデータが正当であると判定した結果を、検証側ユーザが参照可能に出力する。 Here, since the combination of the DID public key and the SSL public key is valid, the verification-side device 201 determines that the DID is valid, the VC is valid, and the data to which the VC is attached is valid. do. Verification-side device 201 outputs the result of determining that the data to which VC is assigned is valid so that the verification-side user can refer to it.
 これにより、情報処理装置100は、検証側装置201で、DIDが正当であるか否かを精度よく検証可能にし、VCが正当であるか否かを精度よく検証可能にし、VCが付与されたデータが正当であるか否かを精度よく検証可能にすることができる。次に、図10の説明に移行する。 As a result, the information processing apparatus 100 enables the verification-side apparatus 201 to accurately verify whether the DID is valid and to accurately verify whether the VC is valid. Whether or not the data is valid can be verified with high accuracy. Next, the description of FIG. 10 will be described.
 図10において、攻撃者によって用いられる攻撃側装置(不図示)が存在するとする。 In FIG. 10, it is assumed that there is an attacking device (not shown) used by an attacker.
 (10-1)攻撃側装置は、DIDと置き換えるための不正なDID’を生成し、DID’秘密鍵と、DID’公開鍵との鍵ペアを生成する。攻撃側装置は、管理側装置203に記憶されたDIDを、不正なDID’に改ざんしたとする。攻撃側装置は、例えば、記録側装置204の台帳801に記憶されたDIDを、不正なDID’に改ざんしたとする。攻撃側装置は、例えば、記録側装置204の台帳801に記憶されたDID公開鍵を、DID’公開鍵に改ざんしたとする。次に、図11の説明に移行する。 (10-1) The attacking device generates an illegal DID' to replace the DID, and generates a key pair of the DID' private key and the DID' public key. Assume that the attacking device tampered with the DID stored in the management device 203 into an illegal DID'. Assume that the attacking device tampered with the DID stored in the ledger 801 of the recording device 204 to an illegal DID', for example. Assume, for example, that the attacking device tampered with the DID public key stored in the ledger 801 of the recording device 204 into a DID' public key. Next, the description of FIG. 11 will be described.
 図11において、(11-1)攻撃側装置は、DID’秘密鍵を用いて、署名を生成する。攻撃側装置は、生成した署名を付与した不正なDID’を利用した不正なVC’を生成する。発行側装置202は、不正なVC’を付与したデータを、A組織に対応する発行側装置202を装って、検証側装置201に送信する。データは、例えば、詐欺の文章である。文章は、例えば、契約に関する文章である。検証側装置201は、VC’が付与された文章を受信する。 In FIG. 11, (11-1) the attacking device uses the DID' private key to generate a signature. The attacking device generates an unauthorized VC' using the generated signature-added unauthorized DID'. The issuing device 202 pretends to be the issuing device 202 corresponding to the A organization and transmits the data to which the unauthorized VC' is assigned to the verifying device 201 . The data are, for example, fraudulent texts. The sentences are, for example, sentences related to contracts. Verification-side device 201 receives the text to which VC' is assigned.
 攻撃側装置は、A組織に対応する発行側装置202から送信されたデータをキャプチャすることがあってもよい。攻撃側装置は、キャプチャしたデータを、詐欺の文章に対応するデータに改ざんする。攻撃側装置は、キャプチャしたデータに付与されたVCを、VC’に改ざんする。攻撃側装置は、改ざんしたVC’が付与された改ざんしたデータを、A組織に対応する発行側装置202を装って、検証側装置201に送信する。 The attacking device may capture the data sent from the issuing device 202 corresponding to the A organization. The attacking device modifies the captured data into data corresponding to the fraudulent text. The attacking device alters the VC attached to the captured data to VC'. The attacking device transmits the falsified data to which the falsified VC' is added to the verifying device 201 under the guise of the issuing device 202 corresponding to the A organization.
 ここで、検証側装置201で、VC’が付与されたデータが、A組織に対応する発行側装置202から送信された改ざんされていない正当なデータであるか否かを検証することが望まれる。 Here, it is desired that the verifying device 201 verifies whether or not the data to which VC' is assigned is unfalsified valid data transmitted from the issuing device 202 corresponding to the A organization. .
 (11-2)検証側装置201は、VC’に基づいて、VC’に関する問い合わせを、記録側装置204に送信する。記録側装置204は、問い合わせに応じて、台帳801に記憶された、VC’に対応する、DID’と、DID’公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを、検証側装置201に送信する。検証側装置201は、DID’と、DID’公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを、記録側装置204から受信する。 (11-2) Verification device 201 transmits an inquiry regarding VC' to recording device 204 based on VC'. In response to the inquiry, the recording device 204 transmits the DID', the DID' public key, and the address of the management device 203 serving as the web server corresponding to the VC' stored in the ledger 801 to the verification device. 201. Verification-side device 201 receives DID', DID' public key, and the address of management-side device 203 serving as a web server from recording-side device 204 .
 (11-3)検証側装置201は、ウェブサーバとなる管理側装置203のアドレスに基づいて、管理側装置203から、SSL証明書と、SSL公開鍵とを取得する。検証側装置201は、SSL公開鍵に基づいて、SSL証明書が正当であるか否かを判定する。検証側装置201は、SSL証明書が正当でなければ、VC’が付与されたデータが正当ではないと判定し、VC’が付与されたデータが正当ではないと判定した結果を、検証側ユーザが参照可能に出力する。ここでは、検証側装置201は、SSL証明書が正当であると判定したとする。 (11-3) Verification-side device 201 acquires an SSL certificate and an SSL public key from management-side device 203 based on the address of management-side device 203 serving as a web server. Verification-side device 201 determines whether the SSL certificate is valid based on the SSL public key. If the SSL certificate is not valid, the verification-side device 201 determines that the data to which the VC' is assigned is not valid, and the result of determining that the data to which the VC' is assigned is not valid is sent to the verification-side user. is output so that it can be referenced. Assume here that the verification-side device 201 determines that the SSL certificate is valid.
 (11-4)検証側装置201は、SSL証明書が正当であれば、管理側装置203から、DID’を取得する。検証側装置201は、記録側装置204から取得したDID’と、管理側装置203から取得したDID’とが一致するか否かを判定する。 (11-4) Verification device 201 acquires DID' from management device 203 if the SSL certificate is valid. The verification-side device 201 determines whether the DID' obtained from the recording-side device 204 and the DID' obtained from the management-side device 203 match.
 検証側装置201は、記録側装置204から取得したDID’と、管理側装置203から取得したDID’とが一致しなければ、DID’が正当ではないと判定する。検証側装置201は、DID’が正当でなければ、VC’が付与されたデータが正当ではないと判定し、VC’が付与されたデータが正当ではないと判定した結果を、検証側ユーザが参照可能に出力する。ここでは、検証側装置201は、記録側装置204から取得したDID’と、管理側装置203から取得したDID’とが一致すると判定したとする。 If the DID' obtained from the recording device 204 and the DID' obtained from the management device 203 do not match, the verification device 201 determines that the DID' is invalid. If the DID' is not valid, the verifying device 201 determines that the data to which the VC' is assigned is not valid. Output so that it can be referenced. Here, it is assumed that the verification-side device 201 determines that the DID' obtained from the recording-side device 204 and the DID' obtained from the management-side device 203 match.
 従来では、情報処理装置100が存在しない。このため、検証側装置201に相当する従来のコンピュータは、記録側装置204から取得したDID’と、管理側装置203から取得したDID’とが一致した場合、VC’が正当であると誤って判定してしまうことがあると考えられる。従って、従来のコンピュータは、VC’が付与されたデータが正当であると誤って判定してしまうことがあると考えられる。次に図12の説明に移行する。 Conventionally, the information processing device 100 does not exist. Therefore, when the DID' obtained from the recording device 204 and the DID' obtained from the management device 203 match, the conventional computer corresponding to the verification device 201 mistakenly believes that the VC' is valid. It is conceivable that judgment may be made. Therefore, it is conceivable that conventional computers may erroneously determine that data to which VC' is assigned is valid. Next, the description of FIG. 12 will be described.
 図12において、(12-1)検証側装置201は、DID’公開鍵と、SSL公開鍵との組み合わせを含む検証依頼を、情報処理装置100に送信する。情報処理装置100は、参照先管理テーブル500を参照して、DID’公開鍵と、SSL公開鍵との組み合わせに対応するチップ320を選択する。情報処理装置100は、DID’公開鍵と、SSL公開鍵との組み合わせに対応するチップ320が存在しなければ、DID’公開鍵と、SSL公開鍵との組み合わせが正当ではないと判定する。 In FIG. 12, (12-1) the verifier device 201 transmits to the information processing device 100 a verification request including a combination of the DID' public key and the SSL public key. The information processing apparatus 100 refers to the reference destination management table 500 and selects the chip 320 corresponding to the combination of the DID' public key and the SSL public key. If the chip 320 corresponding to the combination of the DID' public key and the SSL public key does not exist, the information processing apparatus 100 determines that the combination of the DID' public key and the SSL public key is invalid.
 ここでは、攻撃側装置が、参照先管理テーブル500に、DID’公開鍵と、SSL公開鍵との組み合わせを登録済みであるとする。一方で、攻撃側装置が、チップ320の内部のデータを書き換えることは難しい。また、攻撃側装置が、SSL秘密鍵を把握することが難しく、チップ320に、不正なDID’秘密鍵と、正当なSSL秘密鍵との組み合わせを格納することは難しい。情報処理装置100は、DID’公開鍵と、SSL公開鍵とを、選択したチップ320に入力する。 Here, it is assumed that the attacking device has already registered the combination of the DID' public key and the SSL public key in the reference destination management table 500 . On the other hand, it is difficult for an attacking device to rewrite data inside the chip 320 . Also, it is difficult for the attacking device to grasp the SSL private key, and it is difficult for the chip 320 to store a combination of an illegal DID' private key and a valid SSL private key. The information processing device 100 inputs the DID' public key and the SSL public key to the selected chip 320 .
 情報処理装置100は、入力に応じて、チップ320において、DID’秘密鍵と、SSL秘密鍵とが対応付けて記憶されていることを示す証明書が、チップ320から出力されるか否かを判定する。チップ320が証明書を出力する一例については、図13を用いて後述する。情報処理装置100は、証明書が出力されると、DID’公開鍵と、SSL公開鍵との組み合わせが正当であると判定する。情報処理装置100は、証明書が出力されなければ、DID’公開鍵と、SSL公開鍵との組み合わせが正当ではないと判定する。 In response to the input, information processing apparatus 100 determines whether chip 320 outputs a certificate indicating that chip 320 stores the DID' private key and the SSL private key in association with each other. judge. An example in which the chip 320 outputs the certificate will be described later using FIG. When the certificate is output, the information processing apparatus 100 determines that the combination of the DID' public key and the SSL public key is valid. The information processing apparatus 100 determines that the combination of the DID' public key and the SSL public key is not valid unless the certificate is output.
 情報処理装置100は、DID’公開鍵と、SSL公開鍵との組み合わせが正当であるか否かを判定した結果を、検証側装置201に送信する。検証側装置201は、DID’公開鍵と、SSL公開鍵との組み合わせが正当であるか否かを判定した結果を、情報処理装置100から受信する。ここでは、情報処理装置100は、証明書が出力されないため、DID’公開鍵と、SSL公開鍵との組み合わせが正当ではないと判定したとする。 The information processing device 100 transmits to the verification side device 201 the result of determining whether the combination of the DID' public key and the SSL public key is valid. The verifier device 201 receives from the information processing device 100 the result of determining whether or not the combination of the DID' public key and the SSL public key is valid. Here, it is assumed that the information processing apparatus 100 determines that the combination of the DID' public key and the SSL public key is invalid because the certificate is not output.
 (12-2)検証側装置201は、DID’公開鍵と、SSL公開鍵との組み合わせが正当であれば、DID’が正当であり、VC’が正当であり、VC’が付与されたデータが正当であると判定する。検証側装置201は、VC’が付与されたデータが正当であると判定した結果を、検証側ユーザが参照可能に出力する。 (12-2) If the combination of the DID' public key and the SSL public key is valid, the verification-side device 201 determines that the DID' is valid, the VC' is valid, and the data to which the VC' is assigned. is correct. Verification-side device 201 outputs the result of determining that the data to which VC' is assigned is valid so that the verification-side user can refer to it.
 検証側装置201は、DID’公開鍵と、SSL公開鍵との組み合わせが正当でなければ、DID’が正当ではなく、VC’が正当ではなく、VC’が付与されたデータが正当ではないと判定する。検証側装置201は、VC’が付与されたデータが正当ではないと判定した結果を、検証側ユーザが参照可能に出力する。 If the combination of the DID' public key and the SSL public key is not valid, the verifier device 201 determines that the DID' is not valid, the VC' is not valid, and the data to which the VC' is assigned is not valid. judge. Verification-side device 201 outputs the result of determining that the data to which VC' is assigned is not valid so that the verification-side user can refer to it.
 ここでは、検証側装置201は、DID’公開鍵と、SSL公開鍵との組み合わせが正当ではないため、DID’が正当ではなく、VC’が正当ではなく、VC’が付与されたデータが正当ではないと判定する。検証側装置201は、VC’が付与されたデータが正当ではないと判定した結果を、検証側ユーザが参照可能に出力する。 Here, since the combination of the DID' public key and the SSL public key is not valid, the verification-side device 201 determines that the DID' is not valid, the VC' is not valid, and the data to which VC' is attached is valid. determine that it is not. Verification-side device 201 outputs the result of determining that the data to which VC' is assigned is not valid so that the verification-side user can refer to it.
 これにより、情報処理装置100は、検証側装置201で、DID’が正当であるか否かを精度よく検証可能にし、VC’が正当であるか否かを精度よく検証可能にし、VC’が付与されたデータが正当であるか否かを精度よく検証可能にすることができる。情報処理装置100は、例えば、改ざんが難しいSSL公開鍵と、SSL秘密鍵との鍵ペアを、DIDが正当であるか否かを判定する基準として採用することができるため、DIDが正当であるか否かを精度よく検証可能にすることができる。 As a result, the information processing apparatus 100 enables the verification-side apparatus 201 to accurately verify whether or not DID' is valid, and to accurately verify whether or not VC' is valid. It is possible to accurately verify whether or not the given data is valid. The information processing apparatus 100 can adopt, for example, a key pair of an SSL public key and an SSL private key, which are difficult to tamper with, as a criterion for determining whether or not the DID is valid. Whether or not can be verified with high accuracy.
 情報処理装置100は、発行側装置202で、DIDを利用したVCのような、第3者の認証局を介さない証明書を利用していても、検証側装置201で、DIDを利用したVCが正当であるか否かを精度よく検証可能にすることができる。このため、情報処理装置100は、発行側ユーザと、検証側ユーザとで、セキュアにデータをやり取りする際にかかるコストの増大化を抑制することができる。また、情報処理装置100は、発行側ユーザと、検証側ユーザとで、セキュアにデータをやり取り可能になるまでの所要時間の増大化を抑制することができる。 Even if the issuing device 202 uses a certificate that does not involve a third-party certificate authority, such as a VC using DID, the information processing device 100 uses a VC using DID in the verifying device 201. It is possible to accurately verify whether or not is valid. For this reason, the information processing apparatus 100 can suppress an increase in cost incurred when securely exchanging data between the issuing user and the verifying user. In addition, the information processing apparatus 100 can suppress an increase in the time required until data can be securely exchanged between the issuing user and the verifying user.
 また、情報処理装置100は、発行側ユーザと、検証側ユーザとが対面で交流していなくても、検証側ユーザが、発行側ユーザを信頼可能であるか否かを判断可能にすることができる。従って、情報処理装置100は、セキュアにデータをやり取りする場面の多様化に対処することができる。情報処理装置100は、セキュアにデータをやり取りしようとする人数の増加に対処することができる。 Further, the information processing apparatus 100 enables the verification user to determine whether or not the issuing user is trustworthy even if the issuing user and the verifying user do not interact face-to-face. can. Therefore, the information processing apparatus 100 can cope with diversification of situations in which data is securely exchanged. The information processing apparatus 100 can cope with an increase in the number of people trying to securely exchange data.
 ここでは、検証側装置201が、問い合わせにより、A組織に対応するDIDと、DID公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを、記録側装置204から受信する場合について説明したが、これに限らない。例えば、発行側装置202が、VCが付与された文章と共に、A組織に対応するDIDと、DID公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを、検証側装置201に送信する場合があってもよい。検証側装置201は、A組織に対応するDIDと、DID公開鍵と、ウェブサーバとなる管理側装置203のアドレスとを、発行側装置202から受信する。 Here, a case has been described where verification-side device 201 receives the DID corresponding to organization A, the DID public key, and the address of management-side device 203 serving as a web server from recording-side device 204 in response to an inquiry. , but not limited to this. For example, when the issuing device 202 sends the DID corresponding to the A organization, the DID public key, and the address of the management device 203 serving as a web server to the verification device 201 together with the text to which the VC is assigned. There may be The verifying device 201 receives the DID corresponding to the A organization, the DID public key, and the address of the managing device 203 serving as a web server from the issuing device 202 .
(チップ320が証明書を出力する一例)
 次に、図13を用いて、チップ320が証明書を出力する一例について説明する。
(An example where the chip 320 outputs a certificate)
Next, an example in which the chip 320 outputs a certificate will be described with reference to FIG.
 図13は、チップ320が証明書を出力する一例を示す説明図である。図13に示すように、チップ320は、アテステーションキーとなるAT秘密鍵と、AT秘密鍵に対応するAT公開鍵とを生成する。チップ320は、アテステーションキーの証明書を生成する。アテステーションキーの証明書は、Enbbedded CA証明書を含む。 FIG. 13 is an explanatory diagram showing an example of how the chip 320 outputs a certificate. As shown in FIG. 13, the chip 320 generates an AT private key as an attestation key and an AT public key corresponding to the AT private key. Chip 320 generates a certificate for the attestation key. The certificate of the attestation key contains the Embedded CA certificate.
 Enbbedded CA証明書は、CA公開鍵を含む。Enbbedded CA証明書は、CA公開鍵に対応するCA秘密鍵による署名を含む。Enbbedded CA証明書は、例えば、チップ320のベンダに対応する証明書である。アテステーションキーの証明書は、AT公開鍵を含む。アテステーションキーの証明書は、他の鍵の存在をアテステーション可能という属性を含む。アテステーションは、証明することである。 The embedded CA certificate contains the CA public key. The embedded CA certificate contains a signature by the CA private key corresponding to the CA public key. The Embedded CA certificate is, for example, a certificate corresponding to the vendor of the chip 320. The attestation key certificate contains the AT public key. An attestation key's certificate contains an attribute that allows the existence of other keys to be attested. Attestation is to prove.
 チップ320は、DID公開鍵の入力を受け付けた際、チップ320内に、入力されたDID公開鍵に対応するDID秘密鍵が存在するか否かを判定する。チップ320は、チップ320内に、入力されたDID公開鍵に対応するDID秘密鍵が存在すれば、DID秘密鍵のCerify情報を生成する。DID秘密鍵のCerify情報は、DID公開鍵を含む。DID秘密鍵のCerify情報は、アテステーションキーを利用した署名を含む。DID秘密鍵のCerify情報は、DID秘密鍵が存在するという属性を含む。 When receiving input of a DID public key, the chip 320 determines whether or not a DID private key corresponding to the input DID public key exists within the chip 320 . If the chip 320 contains a DID private key corresponding to the input DID public key, the chip 320 generates Cerify information of the DID private key. The DID private key Cerify information includes the DID public key. The Cerify information of the DID private key includes a signature using the attestation key. The DID private key Cerify information includes an attribute that the DID private key exists.
 チップ320は、SSL公開鍵の入力を受け付けた際、チップ320内に、入力されたSSL公開鍵に対応するSSL秘密鍵が存在するか否かを判定する。チップ320は、チップ320内に、入力されたSSL公開鍵に対応するSSL秘密鍵が存在すれば、SSL秘密鍵のCerify情報を生成する。SSL秘密鍵のCerify情報は、SSL公開鍵を含む。SSL秘密鍵のCerify情報は、アテステーションキーを利用した署名を含む。SSL秘密鍵のCerify情報は、SSL秘密鍵が存在するという属性を含む。 When receiving an input of an SSL public key, the chip 320 determines whether an SSL private key corresponding to the input SSL public key exists within the chip 320 . If the chip 320 contains an SSL private key corresponding to the input SSL public key, the chip 320 generates Cerify information of the SSL private key. The SSL private key Cerify information includes the SSL public key. The SSL private key Cerify information includes a signature using the attestation key. The SSL private key Cerify information includes an attribute that the SSL private key exists.
 チップ320は、アテステーションキーの証明書と、DID秘密鍵のCerify情報と、SSL秘密鍵のCerify情報とを対応付けて、情報処理装置100が参照可能に出力する。情報処理装置100は、DID秘密鍵のCerify情報と、SSL秘密鍵のCerify情報とが共に、同一のアテステーションキーを利用した署名を含んでいれば、チップ320内に、DID秘密鍵と、SSL秘密鍵とが対応付けて記憶されていると判定する。 The chip 320 associates the certificate of the attestation key, the Cerify information of the DID private key, and the Cerify information of the SSL private key, and outputs them so that the information processing apparatus 100 can refer to them. If both the DID private key cerify information and the SSL private key cerify information include a signature using the same attestation key, the information processing apparatus 100 stores the DID private key and the SSL private key in the chip 320 . It is determined that the private key is stored in association with the private key.
 情報処理装置100は、チップ320内に、DID秘密鍵と、SSL秘密鍵とが対応付けて記憶されていれば、DID公開鍵と、SSL公開鍵との組み合わせが正当であると判定する。これにより、情報処理装置100は、DID秘密鍵と、SSL秘密鍵とをセキュアに管理することができる。情報処理装置100は、チップ320内に、DID公開鍵と、SSL公開鍵との組み合わせに対応する、DID秘密鍵と、SSL秘密鍵との組み合わせが存在するか否かを判定可能にすることができる。 If the chip 320 stores the DID private key and the SSL private key in association with each other, the information processing device 100 determines that the combination of the DID public key and the SSL public key is valid. Thereby, the information processing apparatus 100 can securely manage the DID private key and the SSL private key. The information processing apparatus 100 can determine whether or not a combination of a DID private key and an SSL private key corresponding to the combination of the DID public key and the SSL public key exists in the chip 320. can.
 情報処理装置100は、アテステーションキーの証明書と、DID秘密鍵のCerify情報と、SSL秘密鍵のCerify情報とを対応付けて、判定した結果を示す情報として、検証側装置201に送信してもよい。情報処理装置100は、チップ320が出力するアテステーションキーの証明書などを活用するため、チップ320のベンダの信頼度を、判定した結果の信頼度として利用可能にすることができる。このため、情報処理装置100は、自装置の信頼度に関わらず、検証側ユーザが、判定した結果の信頼度を適切に判断可能にすることができる。 The information processing apparatus 100 associates the certificate of the attestation key, the DID private key cerify information, and the SSL private key cerify information, and transmits them to the verifier apparatus 201 as information indicating the determination result. good too. Since the information processing apparatus 100 utilizes the certificate of the attestation key output by the chip 320, the reliability of the vendor of the chip 320 can be used as the reliability of the determination result. Therefore, the information processing apparatus 100 can allow the verification user to appropriately determine the reliability of the determination result regardless of the reliability of the own apparatus.
(登録処理手順)
 次に、図14を用いて、検証システム200が実行する、登録処理手順の一例について説明する。ここでは、A組織に対応する発行側装置202が存在するとする。B組織に対応する検証側装置201が存在するとする。ウェブサーバを実現する管理側装置203が存在するとする。
(Registration processing procedure)
Next, an example of a registration processing procedure executed by the verification system 200 will be described with reference to FIG. 14 . Here, it is assumed that there is a issuing device 202 corresponding to the A organization. Assume that there is a verifier device 201 corresponding to the B organization. Assume that there is a management-side device 203 that implements a web server.
 図14は、登録処理手順の一例を示すシーケンス図である。図14において、発行側装置202は、SSL秘密鍵とSSL公開鍵とのSSL鍵ペアを生成する(ステップS1401)。次に、発行側装置202は、生成したSSL鍵ペアを、管理側装置203に設定する(ステップS1402)。管理側装置203は、SSL鍵ペアを記憶する。管理側装置203は、SSL証明書を生成して記憶していてもよい。そして、発行側装置202は、発行側装置202に対応するチップ320の選択要求を、情報処理装置100に送信する(ステップS1403)。 FIG. 14 is a sequence diagram showing an example of the registration processing procedure. In FIG. 14, issuing device 202 generates an SSL key pair consisting of an SSL private key and an SSL public key (step S1401). Next, the issuing device 202 sets the generated SSL key pair in the management device 203 (step S1402). The management-side device 203 stores an SSL key pair. The management-side device 203 may generate and store an SSL certificate. The issuing device 202 then transmits a request for selecting the chip 320 corresponding to the issuing device 202 to the information processing device 100 (step S1403).
 情報処理装置100は、選択要求を受信したことに応じて、格納先管理テーブル400を参照して、発行側装置202に対応するチップ320を選択し、選択したチップ320に、ラッピングキーの発行要求を送信する(ステップS1404)。チップ320は、発行要求を受信したことに応じて、ラッピングキーを発行し、発行側装置202に送信する(ステップS1405)。ラッピングキーは、例えば、Embedded CAを利用した署名が付与されている。 In response to receiving the selection request, the information processing device 100 refers to the storage destination management table 400, selects the chip 320 corresponding to the issuing side device 202, and sends the wrapping key issuance request to the selected chip 320. is transmitted (step S1404). Chip 320 issues a wrapping key in response to receiving the issue request, and transmits it to issuer device 202 (step S1405). The wrapping key is given a signature using, for example, Embedded CA.
 発行側装置202は、受信したラッピングキーを用いて、SSL秘密鍵を暗号化し、暗号化したSSL秘密鍵=EWrapping key(SSL秘密鍵)を、チップ320に送信する(ステップS1406)。チップ320は、EWrapping key(SSL秘密鍵)に基づいて、SSL秘密鍵を復号して記憶する(ステップS1407)。情報処理装置100は、SSL公開鍵を取得し、選択したチップ320のチップ番号に、取得したSSL公開鍵を対応付けて、参照先管理テーブル500に格納しておいてもよい。 Issuer device 202 encrypts the SSL private key using the received wrapping key, and transmits the encrypted SSL private key=E Wrapping key (SSL private key) to chip 320 (step S1406). The chip 320 decrypts and stores the SSL private key based on the E Wrapping key (SSL private key) (step S1407). The information processing apparatus 100 may acquire the SSL public key, associate the chip number of the selected chip 320 with the acquired SSL public key, and store the result in the reference destination management table 500 .
 発行側装置202は、DIDを生成し、DID秘密鍵とDID公開鍵とのDID鍵ペアを生成する(ステップS1408)。次に、発行側装置202は、DID公開鍵を、管理側装置203に設定する(ステップS1409)。管理側装置203は、DID公開鍵を記憶する。そして、発行側装置202は、発行側装置202に対応するチップ320の選択要求を、情報処理装置100に送信する(ステップS1410)。 The issuing device 202 generates a DID and generates a DID key pair consisting of a DID private key and a DID public key (step S1408). Next, the issuing device 202 sets the DID public key to the management device 203 (step S1409). The management-side device 203 stores the DID public key. The issuing device 202 then transmits a request for selecting the chip 320 corresponding to the issuing device 202 to the information processing device 100 (step S1410).
 情報処理装置100は、選択要求を受信したことに応じて、格納先管理テーブル400を参照して、発行側装置202に対応するチップ320を選択し、選択したチップ320に、ラッピングキーの発行要求を送信する(ステップS1411)。チップ320は、発行要求を受信したことに応じて、ラッピングキーを発行し、発行側装置202に送信する(ステップS1412)。ラッピングキーは、例えば、Embedded CAを利用した署名が付与されている。 In response to receiving the selection request, the information processing device 100 refers to the storage destination management table 400, selects the chip 320 corresponding to the issuing side device 202, and sends the wrapping key issuance request to the selected chip 320. is transmitted (step S1411). Chip 320 issues a wrapping key in response to receiving the issue request and transmits it to issuer device 202 (step S1412). The wrapping key is given a signature using, for example, Embedded CA.
 発行側装置202は、受信したラッピングキーを用いて、DID秘密鍵を暗号化し、暗号化したDID秘密鍵=EWrapping key(DID秘密鍵)を、チップ320に送信する(ステップS1413)。チップ320は、EWrapping key(DID秘密鍵)に基づいて、DID秘密鍵を復号して記憶する(ステップS1414)。情報処理装置100は、DID公開鍵を取得し、選択したチップ320のチップ番号に、取得したDID公開鍵を対応付けて、参照先管理テーブル500に格納しておいてもよい。その後、検証システム200は、登録処理を終了する。 Issuer-side device 202 encrypts the DID private key using the received wrapping key, and transmits the encrypted DID private key=E Wrapping key (DID private key) to chip 320 (step S1413). Chip 320 decrypts and stores the DID private key based on the E wrapping key (DID private key) (step S1414). The information processing apparatus 100 may acquire a DID public key, associate the acquired DID public key with the chip number of the selected chip 320 , and store it in the reference destination management table 500 . After that, the verification system 200 ends the registration process.
(検証処理手順)
 次に、図15を用いて、検証システム200が実行する、検証処理手順の一例について説明する。ここでは、A組織に対応する発行側装置202が存在するとする。B組織に対応する検証側装置201が存在するとする。ウェブサーバを実現する管理側装置203が存在するとする。
(Verification processing procedure)
Next, an example of a verification processing procedure executed by the verification system 200 will be described with reference to FIG. 15 . Here, it is assumed that there is a issuing device 202 corresponding to the A organization. Assume that there is a verifier device 201 corresponding to the B organization. Assume that there is a management-side device 203 that implements a web server.
 図15は、検証処理手順の一例を示すシーケンス図である。検証側装置201は、署名とVCとを付与した文章を、?組織から受信する(ステップS1501)。?組織は、例えば、A組織である。?組織は、例えば、A組織を装った攻撃者である場合がある。 FIG. 15 is a sequence diagram showing an example of the verification processing procedure. Verification-side device 201 converts the text with signature and VC into ? Receive from the organization (step S1501). ? The organization is, for example, the A organization. ? An organization may, for example, be an attacker masquerading as the A organization.
 次に、検証側装置201は、VCに基づいて、台帳を有する記録側装置204から、VC issuerのDIDと、VC issuerのDID公開鍵と、VC issuerのウェブサイトのアドレスとを取得する(ステップS1502)。そして、検証側装置201は、ウェブサイトのアドレスに基づいて、ウェブサイトを運営するウェブサーバを実現する管理側装置203から、DIDと、SSL証明書とを取得する(ステップS1503)。 Next, based on the VC, the verifying device 201 acquires the VC issuer's DID, the VC issuer's DID public key, and the VC issuer's website address from the recording device 204 having the ledger (step S1502). Verification-side device 201 acquires a DID and an SSL certificate from management-side device 203, which implements a web server that operates the website, based on the website address (step S1503).
 次に、検証側装置201は、SSL証明書に基づいて、SSL公開鍵を取得する(ステップS1504)。そして、検証側装置201は、pub1=DID公開鍵と、pub2=SSL公開鍵との組み合わせを含むリクエスト(pub1,pub2)を、情報処理装置100に送信する(ステップS1505)。また、検証側装置201は、管理側装置203から取得したDIDと、記録側装置204から取得したDIDとを検証し、VC issuerの正当性を検証する(ステップS1506)。ここでは、検証側装置201は、VC issuerが正当であると判定したとする。 Next, the verifier device 201 acquires an SSL public key based on the SSL certificate (step S1504). Verifier apparatus 201 then transmits a request (pub1, pub2) including a combination of pub1=DID public key and pub2=SSL public key to information processing apparatus 100 (step S1505). Also, the verification-side device 201 verifies the DID obtained from the management-side device 203 and the DID obtained from the recording-side device 204, and verifies the validity of the VC issuer (step S1506). Here, it is assumed that the verifier device 201 determines that the VC issuer is valid.
 情報処理装置100は、リクエスト(pub1,pub2)に応じて、参照先管理テーブル500を参照して、pub1=DID公開鍵と、pub2=SSL公開鍵との組み合わせに対応するチップ320を選択する(ステップS1507)。次に、情報処理装置100は、選択したチップ320に、pub1=DID公開鍵と、pub2=SSL公開鍵とを含めた、問い合わせに対応する証明書の生成要求を送信する(ステップS1508)。 In response to the request (pub1, pub2), the information processing apparatus 100 refers to the reference destination management table 500 and selects the chip 320 corresponding to the combination of pub1=DID public key and pub2=SSL public key ( step S1507). Next, the information processing apparatus 100 transmits to the selected chip 320 a request for generating a certificate corresponding to the inquiry, including pub1=DID public key and pub2=SSL public key (step S1508).
 チップ320は、生成要求に応じて、pub1=DID公開鍵に対応するDID秘密鍵と、pub2=SSL公開鍵に対応するSSL秘密鍵とを対応付けて記憶していれば、証明書を、情報処理装置100に送信する。証明書は、例えば、Embedded CAを利用した署名が付与されている。情報処理装置100は、選択したチップ320から、証明書を受信する(ステップS1509)。 If the chip 320 stores the DID private key corresponding to the pub1=DID public key and the SSL private key corresponding to the pub2=SSL public key in association with each other in response to the generation request, the chip 320 generates the certificate as information. Send to the processing device 100 . The certificate is given a signature using, for example, Embedded CA. The information processing device 100 receives the certificate from the selected chip 320 (step S1509).
 情報処理装置100は、受信した証明書を、検証側装置201に送信する(ステップS1510)。情報処理装置100は、チップ320から証明書が送信されない場合、証明書が送信されなかったことを示す通知を、検証側装置201に送信してもよい。検証側装置201は、受信した証明書に基づいて、DID公開鍵と、SSL公開鍵との組み合わせの正当性を検証する(ステップS1511)。 The information processing device 100 transmits the received certificate to the verification-side device 201 (step S1510). When the certificate is not sent from the chip 320 , the information processing device 100 may send a notification indicating that the certificate has not been sent to the verifying device 201 . Verification-side device 201 verifies the validity of the combination of the DID public key and the SSL public key based on the received certificate (step S1511).
 情報処理装置100は、例えば、証明書を受信したことに応じて、DID公開鍵と、SSL公開鍵との組み合わせが正当であると判定する。情報処理装置100は、例えば、証明書を受信しない場合、DID公開鍵と、SSL公開鍵との組み合わせが正当ではないと判定してもよい。情報処理装置100は、DID公開鍵と、SSL公開鍵との組み合わせが正当であれば、DID公開鍵が正当であり、VCが正当であり、VCが付与された文章が正当であると判定する。 For example, the information processing apparatus 100 determines that the combination of the DID public key and the SSL public key is valid in response to receiving the certificate. For example, when the certificate is not received, the information processing apparatus 100 may determine that the combination of the DID public key and the SSL public key is invalid. If the combination of the DID public key and the SSL public key is valid, the information processing apparatus 100 determines that the DID public key is valid, the VC is valid, and the sentence with the VC is valid. .
 以上説明したように、情報処理装置100によれば、第1の証明書に対応する第1の公開鍵に関する検証依頼を受け付けることができる。情報処理装置100によれば、検証依頼に応じて、第1の公開鍵と、所定のシステムに対して認証局によって発行された第2の証明書に対応する第2の公開鍵との組み合わせを取得することができる。情報処理装置100によれば、システムを管理する管理主体に対して発行された第3の証明書に対応する第1の秘密鍵と、第2の証明書に対応する第2の秘密鍵とを対応付けて記憶する記憶部を有することができる。情報処理装置100によれば、記憶部を参照して、取得した組み合わせが正当であるか否かを判定することができる。情報処理装置100によれば、判定した結果を、検証依頼の依頼元宛てに出力することができる。これにより、情報処理装置100は、第1の公開鍵の正当性を精度よく検証可能にすることができ、第1の公開鍵の正当性に基づいて第1の証明書の正当性を精度よく検証可能にすることができる。 As described above, according to the information processing device 100, it is possible to accept a verification request regarding the first public key corresponding to the first certificate. According to the information processing apparatus 100, in response to the verification request, the combination of the first public key and the second public key corresponding to the second certificate issued by the certificate authority to the predetermined system is generated. can be obtained. According to the information processing apparatus 100, the first private key corresponding to the third certificate issued to the management entity managing the system and the second private key corresponding to the second certificate are stored. It can have a storage unit for storing in correspondence. According to the information processing apparatus 100, it is possible to refer to the storage unit and determine whether the acquired combination is valid. According to the information processing apparatus 100, the determined result can be output to the requester of the verification request. As a result, the information processing apparatus 100 can accurately verify the validity of the first public key, and accurately validate the first certificate based on the validity of the first public key. It can be verifiable.
 情報処理装置100によれば、記憶部を実現するチップにアクセスすることができる。チップによれば、公開鍵を受け付けたことに応じて、記憶部に受け付けた当該公開鍵に対応する秘密鍵が存在していれば当該秘密鍵が存在することを証明する証明書をコンピュータが参照可能に出力する機能を有する。情報処理装置100によれば、取得した組み合わせに含まれる第1の公開鍵と、第2の公開鍵とを、チップに入力することができる。情報処理装置100によれば、入力に応じて、第1の公開鍵に対応する第1の秘密鍵が存在することを証明する証明書と、第2の公開鍵に対応する第2の秘密鍵が存在することを証明する証明書とが、チップから出力されるか否かを判定することができる。情報処理装置100によれば、出力された場合に、取得した組み合わせが正当であると判定することができる。これにより、情報処理装置100は、第1の秘密鍵と、第2の秘密鍵とをセキュアに管理可能にすることができる。 According to the information processing device 100, it is possible to access a chip that implements a storage unit. According to the chip, in response to acceptance of a public key, if a private key corresponding to the accepted public key exists in the storage unit, the computer refers to a certificate proving that the private key exists. It has a function to output possible. According to the information processing apparatus 100, the first public key and the second public key included in the acquired combination can be input to the chip. According to the information processing apparatus 100, according to the input, a certificate proving that the first private key corresponding to the first public key exists, and a second private key corresponding to the second public key. It can be determined whether a certificate proving the existence of is output from the chip. According to the information processing apparatus 100, it is possible to determine that the acquired combination is valid when it is output. Thereby, the information processing apparatus 100 can securely manage the first secret key and the second secret key.
 情報処理装置100によれば、第1の秘密鍵と、第2の秘密鍵とを、管理主体から取得したことに応じて、記憶部に、第1の秘密鍵と、第2の秘密鍵とを対応付けて格納することができる。これにより、情報処理装置100は、記憶部を適切に管理することができる。情報処理装置100は、第1の公開鍵と、第2の公開鍵との組み合わせが正当であるか否かを判定可能にすることができる。 According to the information processing apparatus 100, the first secret key and the second secret key are stored in the storage unit in response to obtaining the first secret key and the second secret key from the management entity. can be associated and stored. Thereby, the information processing apparatus 100 can appropriately manage the storage unit. The information processing apparatus 100 can determine whether the combination of the first public key and the second public key is valid.
 情報処理装置100によれば、装置にアクセスすることができる。装置によれば、第1の証明書が付与されたデータを受信したことに応じて、第1の証明書に基づいて、所定のデータベースからシステムを特定可能にする情報を取得することができる。装置によれば、取得した情報に基づいて、システムが有する第1の公開鍵と、システムが有する第2の公開鍵とを取得することができる。情報処理装置100によれば、第1の公開鍵と、第2の公開鍵との組み合わせを含む検証依頼を、装置から受信することができる。情報処理装置100によれば、検証依頼を、装置から受信したことに応じて、検証依頼に基づいて、第1の公開鍵と、第2の公開鍵との組み合わせを取得することができる。これにより、情報処理装置100は、装置で、第1の証明書が付与されたデータが正当であるか否かを判定可能にすることができる。 According to the information processing device 100, the device can be accessed. According to the device, in response to receiving the data to which the first certificate is attached, the information that enables the system to be specified can be obtained from the predetermined database based on the first certificate. According to the apparatus, it is possible to acquire the first public key possessed by the system and the second public key possessed by the system based on the acquired information. According to the information processing device 100, a verification request including a combination of a first public key and a second public key can be received from the device. According to the information processing apparatus 100, in response to receiving the verification request from the apparatus, it is possible to acquire the combination of the first public key and the second public key based on the verification request. Accordingly, the information processing apparatus 100 can determine whether or not the data to which the first certificate is attached is valid.
 情報処理装置100によれば、第1の証明書に、DIDに対応するVCを採用可能にすることができる。これにより、情報処理装置100は、第3者の認証局を介さずに生成された証明書を、第1の証明書とすることを許容することができる。 According to the information processing device 100, it is possible to adopt the VC corresponding to the DID for the first certificate. Accordingly, the information processing apparatus 100 can allow a certificate generated without a third party's certificate authority to be used as the first certificate.
 なお、本実施の形態で説明した検証支援方法は、予め用意されたプログラムをPCやワークステーションなどのコンピュータで実行することにより実現することができる。本実施の形態で説明した検証支援プログラムは、コンピュータで読み取り可能な記録媒体に記録され、コンピュータによって記録媒体から読み出されることによって実行される。記録媒体は、ハードディスク、フレキシブルディスク、CD(Compact Disc)-ROM、MO(Magneto Optical disc)、DVD(Digital Versatile Disc)などである。また、本実施の形態で説明した検証支援プログラムは、インターネットなどのネットワークを介して配布してもよい。 It should be noted that the verification support method described in the present embodiment can be realized by executing a program prepared in advance on a computer such as a PC or workstation. The verification support program described in this embodiment is recorded in a computer-readable recording medium and executed by being read from the recording medium by a computer. Recording media include a hard disk, flexible disk, CD (Compact Disc)-ROM, MO (Magneto Optical disc), DVD (Digital Versatile Disc), and the like. Also, the verification support program described in the present embodiment may be distributed via a network such as the Internet.
 100 情報処理装置
 101 記憶部
 102 第2の公開鍵
 110 依頼元
 111 第1の証明書
 112 第1の公開鍵
  120 システム
 121 第2の証明書
  122 第2の秘密鍵
 130 管理主体
  131 第3の証明書 
  132 第1の秘密鍵
  200 検証システム
 201 検証側装置
 202 発行側装置
 203 管理側装置
 204 記録側装置
 210 ネットワーク
 300,600 バス
 301,601 CPU
 302,602 メモリ
 303,603 ネットワークI/F
 304,604 記録媒体I/F
 305,605 記録媒体
 306 チップ群
 320 チップ
 400 格納先管理テーブル
 500 参照先管理テーブル
 700 第1記憶部
 701 第1取得部
 702 登録部
 703 第1判定部
 704 第1出力部
 710 第2記憶部
 711 第2取得部
 712 第2判定部
 713 第2出力部
 801 台帳
100 Information Processing Device 101 Storage Unit 102 Second Public Key 110 Requester 111 First Certificate 112 First Public Key 120 System 121 Second Certificate 122 Second Private Key 130 Management Subject 131 Third Certificate book
132 first secret key 200 verification system 201 verification side device 202 issuing side device 203 management side device 204 recording side device 210 network 300, 600 bus 301, 601 CPU
302, 602 memory 303, 603 network I/F
304, 604 recording medium I/F
305, 605 recording medium 306 chip group 320 chip 400 storage destination management table 500 reference destination management table 700 first storage unit 701 first acquisition unit 702 registration unit 703 first determination unit 704 first output unit 710 second storage unit 711 2 acquisition unit 712 second determination unit 713 second output unit 801 ledger

Claims (7)

  1.  第1の証明書に対応する第1の公開鍵に関する検証依頼に応じて、前記第1の公開鍵と、所定のシステムに対して認証局によって発行された第2の証明書に対応する第2の公開鍵との組み合わせを取得し、
     前記システムを管理する管理主体に対して発行された第3の証明書に対応する第1の秘密鍵と、前記第2の証明書に対応する第2の秘密鍵とを対応付けて記憶する記憶部を参照して、取得した前記組み合わせが正当であるか否かを判定し、
     前記判定した結果を、前記検証依頼の依頼元宛てに出力する、
     処理をコンピュータに実行させることを特徴とする検証支援方法。
    a first public key and a second certificate issued by a certificate authority to a predetermined system in response to a verification request relating to a first public key corresponding to the first certificate; Get the combination with the public key of
    A memory that associates and stores a first private key corresponding to a third certificate issued to a management entity that manages the system and a second private key corresponding to the second certificate. section to determine whether the acquired combination is valid,
    outputting the determined result to the requester of the verification request;
    A verification support method characterized by causing a computer to execute processing.
  2.  前記コンピュータは、
     公開鍵を受け付けたことに応じて、前記記憶部に受け付けた当該公開鍵に対応する秘密鍵が存在していれば当該秘密鍵が存在することを証明する証明書を前記コンピュータが参照可能に出力する機能を有する、前記記憶部を実現するチップにアクセス可能であって、
     前記判定する処理は、
     取得した前記組み合わせに含まれる前記第1の公開鍵と、前記第2の公開鍵とを、前記チップに入力したことに応じて、前記第1の公開鍵に対応する前記第1の秘密鍵が存在することを証明する証明書と、前記第2の公開鍵に対応する前記第2の秘密鍵が存在することを証明する証明書とが、前記チップから出力された場合に、取得した前記組み合わせが正当であると判定する、ことを特徴とする請求項1に記載の検証支援方法。
    The computer is
    In response to acceptance of the public key, if a private key corresponding to the accepted public key exists in the storage unit, a certificate certifying that the private key exists is output so that the computer can refer to it. A chip that implements the storage unit is accessible, and has the function of
    The process of determining
    In response to inputting the first public key and the second public key included in the obtained combination into the chip, the first secret key corresponding to the first public key is generated. The combination obtained when a certificate proving the existence and a certificate proving the existence of the second private key corresponding to the second public key are output from the chip 2. The verification support method according to claim 1, wherein is determined to be valid.
  3.  前記第1の秘密鍵と、前記第2の秘密鍵とを、前記管理主体から取得したことに応じて、前記記憶部に、前記第1の秘密鍵と、前記第2の秘密鍵とを対応付けて格納する、
     処理を前記コンピュータに実行させることを特徴とする請求項1または2に記載の検証支援方法。
    Corresponding the first secret key and the second secret key to the storage unit in response to obtaining the first secret key and the second secret key from the management entity store with
    3. The verification support method according to claim 1, wherein the processing is executed by the computer.
  4.  前記コンピュータは、
     前記第1の証明書が付与されたデータを受信したことに応じて、前記第1の証明書に基づいて、所定のデータベースから前記システムを特定可能にする情報を取得し、取得した前記情報に基づいて、前記システムが有する前記第1の公開鍵と、前記システムが有する前記第2の公開鍵とを取得する装置にアクセス可能であって、
     前記取得する処理は、
     前記第1の公開鍵と、前記第2の公開鍵との組み合わせを含む前記検証依頼を、前記装置から受信したことに応じて、前記検証依頼に基づいて、前記第1の公開鍵と、前記第2の公開鍵との組み合わせを取得する、ことを特徴とする請求項1~3のいずれか一つに記載の検証支援方法。
    The computer is
    Acquiring information that enables the system to be specified from a predetermined database based on the first certificate in response to receiving the data to which the first certificate is attached, and using the acquired information Accessible to a device for obtaining the first public key possessed by the system and the second public key possessed by the system based on
    The acquisition process includes
    in response to receiving the verification request including the combination of the first public key and the second public key from the device, based on the verification request, the first public key and the 4. The verification support method according to any one of claims 1 to 3, wherein a combination with the second public key is obtained.
  5.  前記第1の証明書は、Decentralized Identifierに対応するVerifiable Credentialsである、ことを特徴とする請求項1~4のいずれか一つに記載の検証支援方法。 The verification support method according to any one of claims 1 to 4, characterized in that said first certificate is Verifiable Credentials corresponding to a Decentralized Identifier.
  6.  第1の証明書に対応する第1の公開鍵に関する検証依頼に応じて、前記第1の公開鍵と、所定のシステムに対して認証局によって発行された第2の証明書に対応する第2の公開鍵との組み合わせを取得し、
     前記システムを管理する管理主体に対して発行された第3の証明書に対応する第1の秘密鍵と、前記第2の証明書に対応する第2の秘密鍵とを対応付けて記憶する記憶部を参照して、取得した前記組み合わせが正当であるか否かを判定し、
     前記判定した結果を、前記検証依頼の依頼元宛てに出力する、
     処理をコンピュータに実行させることを特徴とする検証支援プログラム。
    a first public key and a second certificate issued by a certificate authority to a predetermined system in response to a verification request relating to a first public key corresponding to the first certificate; Get the combination with the public key of
    A memory that associates and stores a first private key corresponding to a third certificate issued to a management entity that manages the system and a second private key corresponding to the second certificate. section to determine whether the acquired combination is valid,
    outputting the determined result to the requester of the verification request;
    A verification support program characterized by causing a computer to execute processing.
  7.  第1の証明書に対応する第1の公開鍵に関する検証依頼に応じて、前記第1の公開鍵と、所定のシステムに対して認証局によって発行された第2の証明書に対応する第2の公開鍵との組み合わせを取得し、
     前記システムを管理する管理主体に対して発行された第3の証明書に対応する第1の秘密鍵と、前記第2の証明書に対応する第2の秘密鍵とを対応付けて記憶する記憶部を参照して、取得した前記組み合わせが正当であるか否かを判定し、
     前記判定した結果を、前記検証依頼の依頼元宛てに出力する、
     制御部を有することを特徴とする情報処理装置。
    a first public key and a second certificate issued by a certificate authority to a predetermined system in response to a verification request relating to a first public key corresponding to the first certificate; Get the combination with the public key of
    A memory that associates and stores a first private key corresponding to a third certificate issued to a management entity that manages the system and a second private key corresponding to the second certificate. section to determine whether the acquired combination is valid,
    outputting the determined result to the requester of the verification request;
    An information processing apparatus comprising a control unit.
PCT/JP2022/003451 2022-01-28 2022-01-28 Verification assistance method, verification assistance program, and information processing device WO2023145027A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2022/003451 WO2023145027A1 (en) 2022-01-28 2022-01-28 Verification assistance method, verification assistance program, and information processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2022/003451 WO2023145027A1 (en) 2022-01-28 2022-01-28 Verification assistance method, verification assistance program, and information processing device

Publications (1)

Publication Number Publication Date
WO2023145027A1 true WO2023145027A1 (en) 2023-08-03

Family

ID=87470958

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2022/003451 WO2023145027A1 (en) 2022-01-28 2022-01-28 Verification assistance method, verification assistance program, and information processing device

Country Status (1)

Country Link
WO (1) WO2023145027A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006018889A1 (en) * 2004-08-20 2006-02-23 Mitsubishi Denki Kabushiki Kaisha Terminal apparatus
JP2019050511A (en) * 2017-09-11 2019-03-28 ブラザー工業株式会社 Information processing device and computer program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006018889A1 (en) * 2004-08-20 2006-02-23 Mitsubishi Denki Kabushiki Kaisha Terminal apparatus
JP2019050511A (en) * 2017-09-11 2019-03-28 ブラザー工業株式会社 Information processing device and computer program

Similar Documents

Publication Publication Date Title
JP7181539B2 (en) METHOD AND APPARATUS FOR MANAGING USER IDENTIFICATION AND AUTHENTICATION DATA
RU2434340C2 (en) Infrastructure for verifying biometric account data
US7774611B2 (en) Enforcing file authorization access
JP5517314B2 (en) Method, program and computer system for generating a soft token
CN108696358B (en) Digital certificate management method and device, readable storage medium and service terminal
RU2430412C2 (en) Service for determining whether digital certificate has been annulled
KR20040034518A (en) Management apparatus, terminal apparatus and management system
CN1450481A (en) Access control method and system
KR102280061B1 (en) Corporation related certificate issue system and method using did based on blockchain
CN114008968A (en) System, method and storage medium for license authorization in a computing environment
US20230006840A1 (en) Methods and devices for automated digital certificate verification
EP3966997B1 (en) Methods and devices for public key management using a blockchain
JP2019153181A (en) Management program
US7856657B2 (en) Secure access of resources at shared appliances
KR20060101343A (en) Tamper resistant device and file generation method
CN109981287A (en) A kind of code signature method and its storage medium
CN114666168A (en) Decentralized identity certificate verification method and device, and electronic equipment
JP2005149341A (en) Authentication method and apparatus, service providing method and apparatus, information input apparatus, management apparatus, authentication guarantee apparatus, and program
KR20220006234A (en) Method for creating decentralized identity able to manage user authority and system for managing user authority using the same
JP2003348077A (en) Method and device for verifying attribute certificate
US20090210719A1 (en) Communication control method of determining whether communication is permitted/not permitted, and computer-readable recording medium recording communication control program
WO2023145027A1 (en) Verification assistance method, verification assistance program, and information processing device
US20040223183A1 (en) Image communication apparatus
JP3793042B2 (en) Electronic signature proxy method, apparatus, program, and recording medium
JP5282229B2 (en) Service providing system, alteration check method, and alteration check program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22923891

Country of ref document: EP

Kind code of ref document: A1