JP2002007349A - Recording and reproducing method for secret information, and recording medium with cryptographic key or the like for identity authentication recorded thereon - Google Patents

Recording and reproducing method for secret information, and recording medium with cryptographic key or the like for identity authentication recorded thereon

Info

Publication number
JP2002007349A
JP2002007349A JP2000187168A JP2000187168A JP2002007349A JP 2002007349 A JP2002007349 A JP 2002007349A JP 2000187168 A JP2000187168 A JP 2000187168A JP 2000187168 A JP2000187168 A JP 2000187168A JP 2002007349 A JP2002007349 A JP 2002007349A
Authority
JP
Japan
Prior art keywords
information
recording medium
recording
authentication
recorded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2000187168A
Other languages
Japanese (ja)
Inventor
Shiori Kuniyone
しおり 国米
Hitoshi Kuniyone
仁 国米
Ryuhei Masuno
隆平 桝野
Masayuki Kuriyama
雅行 栗山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Asahi Business Assist Ltd
Original Assignee
Asahi Business Assist Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Asahi Business Assist Ltd filed Critical Asahi Business Assist Ltd
Priority to JP2000187168A priority Critical patent/JP2002007349A/en
Priority to PCT/JP2001/005297 priority patent/WO2001098912A1/en
Priority to AU2001266319A priority patent/AU2001266319A1/en
Publication of JP2002007349A publication Critical patent/JP2002007349A/en
Pending legal-status Critical Current

Links

Landscapes

  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

PROBLEM TO BE SOLVED: To enhance the determent-effect against illegal action on a telecommunication network by making difficult the decoding of a password or cryptographic key by increasing the number of digits in the array of alphanumerals such as cryptographic key and to exactly store authentication information such as password or cryptographic key being an alphanumeral array having a large number of digits. SOLUTION: Concerning the recording and reproducing method for secret information provided with following means, secret information such as authentication information is divided into plural parts and a large number of decoys are added to them, and the information is relocated at random and recorded on the recording medium after respectively adding addresses. Then, that recording medium is distributed to a user. The array instruction information as to which address in the addresses containing a large number of decoys is to be read in which order for restoring the secret information such as right authentication information is reported only to the user. When reproducing the secret information on the recording medium by inputting an instruction for reading the right addresses in the right order, the user performs his/her own authentication by inputting the instruction coincident with the array instruction information. Concerning the recording method for secret information and the recording medium recording cryptographic key or the like for identity authentication, the authentication information is divided into plural parts and after a large number of decoys are added, the information is relocated at random and recorded after adding respective addresses.

Description

【発明の詳細な説明】DETAILED DESCRIPTION OF THE INVENTION

【0001】[0001]

【発明の属する技術分野】本願発明は、認証情報等の機
密情報の記録再生方法に関する。また、機密情報へのア
クセスにあたり、暗号鍵等を使用した本人認証方法に関
するものである。より詳しくは、電気通信ネットワーク
上の不正行為の抑止対策として、パスワードや暗号鍵の
記録方法として、記録媒体に認証情報を記録する方法に
関するものである。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a method for recording and reproducing confidential information such as authentication information. The present invention also relates to a personal authentication method using an encryption key or the like when accessing confidential information. More specifically, the present invention relates to a method for recording authentication information on a recording medium as a method for recording a password or an encryption key as a measure for suppressing illegal acts on a telecommunication network.

【0002】[0002]

【従来の技術】メモリーカード等の一般に普及している
記録媒体は、その内容を容易に第3者に読み取られる可
能性があり、その第3者による「成りすまし」を許すこ
ととなる。CPU付きICカードはパスワードを入力し
なければ内容が読み出せないのでCPUのない単純な記
録媒体よりも認証媒体の記録・管理にはより適応してい
る。
2. Description of the Related Art A widely used recording medium such as a memory card has a possibility that its contents can be easily read by a third party, and "third party" is permitted by the third party. An IC card with a CPU is more suitable for recording and management of an authentication medium than a simple recording medium without a CPU because the contents cannot be read unless a password is input.

【0003】[0003]

【発明が解決しようとする課題】本願発明は、暗号鍵等
の英数字配列の桁数を増大することでパスワード、暗号
鍵等の認証情報の解読を困難として電気通信ネットワー
ク上の不正行為の抑止効果を高め、且つ、多数桁の英数
字配列であるパスワード、暗号鍵等の認証情報を正確に
記憶可能とすることを課題とする。
SUMMARY OF THE INVENTION The present invention increases the number of digits in an alphanumeric array such as an encryption key, thereby making it difficult to decipher authentication information such as a password and an encryption key, thereby suppressing illegal acts on a telecommunications network. It is an object of the present invention to enhance the effect and to be able to accurately store authentication information such as a password and an encryption key which are a multi-digit alphanumeric array.

【0004】[0004]

【課題を解決するための手段】本願第1発明は、下記の
手段を含むことを特徴とする機密情報の記録方法を提供
する。認証情報等の機密情報を複数に分割して、多数の
囮を加えた上で、ランダムに並べ替えてそれぞれにアド
レスを付けて記録媒体の中に記録し、その記録媒体をユ
ーザーに配布する。多数の囮を含むアドレスの内どのア
ドレスをどの順序で読み出せば正しい認証情報等の機密
情報が復元するかの配列指示情報をユーザーのみに伝え
る。記録媒体の機密情報の再生にあたり、正規のユーザ
ーは正しいアドレスを正しい順序で読み出す指示を入力
することにで、配列指示情報と一致する指示入力によ
り、自らの認証を行う。
The first invention of the present application provides a method for recording confidential information, which includes the following means. The confidential information such as authentication information is divided into a plurality of pieces, a large number of decoys are added, the pieces are rearranged at random, each is assigned an address and recorded in a recording medium, and the recording medium is distributed to users. Only the user is notified of the array designation information indicating which address among the addresses including a large number of decoys should be read out and in which order, confidential information such as correct authentication information can be restored. In reproducing the confidential information on the recording medium, the legitimate user performs an authentication by inputting an instruction to read out a correct address in a correct order, and by inputting an instruction that matches the arrangement instruction information.

【0005】本願第2発明は、認証情報を複数に分割し
て、多数の囮を加えた上で、ランダムに並べ替えてそれ
ぞれにアドレスを付けて記録してなる、機密情報の記録
方法および本人認証のための暗号鍵等を記録した記録媒
体を提供する。
The second invention of the present application is a method for recording confidential information and personal information, which is obtained by dividing authentication information into a plurality of pieces, adding a large number of decoys, rearranging the information at random, and attaching addresses to each of them. Provided is a recording medium on which an encryption key or the like for authentication is recorded.

【0006】[0006]

【実施例】以下、図面を参照して本願発明を詳細に説明
する。図4および図5のフローチャートを参照して、 .情報分割・ランダム配列・囮混入 a.認証情報(図1のA)1を作成する。 b.情報の重要度、記憶媒体の容量等を考慮して、認証
情報の長大さ、分割個数、囮情報の個数等を決定する。 c.認証情報1を複数に分割する。図1のB1は、列並び
に従って順次等分割した場合を示す(3A1,3A2,
3A3……)。図1のB2は、飛び分割した場合を示す
(3B1,3B2,3B3……)。 d.分割個数3に対応する個数のアドレスを示すアドレ
ス情報4を、平仮名,カタカナ、漢字、英数字等からラ
ンダムに選択し記録する(図1のC参照)。 e.上記で選択した平仮名,カタカナ、漢字、英数字等
を、分割情報3の各部分にアドレスとして割り当てる
(図1のD1,D2参照)。 f.分割情報3を復元するためのアドレス情報4の配列
順序を記録する(図1のE参照)。 g.分割情報3と類似しているが同一でない情報(囮情
報5)を分割情報3と類似のサイズで必要な個数をラン
ダムに作成する(図1のF参照)。 h.真正のアドレス情報4に使用していない平仮名,カ
タカナ、漢字、英数字等を、囮情報4に対するアドレス
として割り当て囮アドレス情報6とする(図1のG参
照)。 i. 真正の分割情報3およびアドレス情報4と、囮情報
5および囮アドレス情報6とを、区別することなく、暗
号化情報7として記録媒体に格納し、ユーザーに配布す
る。 j.上記の記録媒体とは別に、正しいアドレスとその選
択および復元順序のみをユーザーに教える。なお、平仮
名,カタカナ、漢字、英数字等のアドレス情報4および
その配列順序よりなるアドレス集合情報8(図1のH参
照)または図3に示す複数枚のカードを利用すること
で、ユーザーに「正しいアドレスとその選択および復元
順序」を教示することができる。
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention will be described below in detail with reference to the drawings. Referring to the flowcharts of FIGS. 4 and 5, information division, random arrangement, and decoy mixing a. Authentication information (A in FIG. 1) 1 is created. b. The length of the authentication information, the number of divisions, the number of dummy information, etc. are determined in consideration of the importance of the information, the capacity of the storage medium, and the like. c. Divide the authentication information 1 into a plurality. B1 in FIG. 1 shows a case in which the data is equally divided according to the column arrangement (3A1, 3A2,
3A3 ...). B2 in FIG. 1 shows a case where the image is divided into three parts (3B1, 3B2, 3B3...). d. Address information 4 indicating the number of addresses corresponding to the number of divisions 3 is randomly selected from hiragana, katakana, kanji, alphanumeric characters and the like and recorded (see C in FIG. 1). e. The hiragana, katakana, kanji, alphanumeric characters, etc. selected above are assigned as addresses to each part of the division information 3 (see D1 and D2 in FIG. 1). f. Record the arrangement order of the address information 4 for restoring the division information 3 (see E in FIG. 1). g. A required number of pieces of information similar to but not identical to the division information 3 (decoy information 5) are randomly created in a size similar to that of the division information 3 (see F in FIG. 1). h. Hiragana, katakana, kanji, alphanumeric characters, etc. which are not used in the genuine address information 4 are assigned as addresses to the decoy information 4 and are designated as decoy address information 6 (see G in FIG. 1). i. The genuine division information 3 and the address information 4 and the decoy information 5 and the decoy address information 6 are stored in a recording medium as encrypted information 7 without distinction and distributed to users. j. Apart from the above-mentioned recording medium, only the correct address and its selection and restoration order are shown to the user. Note that by using address information 4 such as hiragana, katakana, kanji, and alphanumeric characters and address set information 8 (see H in FIG. 1) composed of the arrangement order or a plurality of cards shown in FIG. Correct address and its selection and restoration order "can be taught.

【0007】.情報復元 k. 暗号化情報6とした認証情報を格納した記録媒体
を、システムに装填する。 l. 通信アクセス確立等のための認証を必要とするユ
ーザーがキーボード(かな・漢字変換機能をもつ電話ダ
イヤルキーを含む)等によってアドレス情報4を配列順
序に従ってシステムに入力する。 m.システムは入力指示されたアドレス情報4に対応す
る分割情報3のみを入力指示の順序に従って読み取り、
通信の相手方に送り出す。 n.正しいアドレス情報4が正しい順序で読み出された
場合は、相手方と通信が確立する。正しいアドレス情報
4が正しい順序で読み出されていない場合には、相手方
が通信の確立を拒否する。“l”に戻り、アドレス集合
情報7を再入力することとなる。
[0007] Information restoration k. A recording medium storing the authentication information as the encryption information 6 is loaded into the system. l. A user who needs authentication for establishing communication access or the like inputs address information 4 to the system in accordance with the arrangement order using a keyboard (including a telephone dial key having a kana / kanji conversion function) or the like. m. The system reads only the divided information 3 corresponding to the input address information 4 in the order of the input instruction,
Send to the other party of the communication. n. If the correct address information 4 is read out in the correct order, communication with the other party is established. If the correct address information 4 is not read in the correct order, the other party refuses to establish communication. Returning to "l", the address set information 7 is re-input.

【0008】悪意の第3者がこの暗号化情報7とした認
証情報を格納した記録媒体を入手して記録されている全
ての情報の解読に成功したとしても、別途にどのアドレ
スをどの順序で読み出すかの情報を併せて入手していな
い限り正しい認識情報を得ることはできない。従って、
記録媒体の入手という手段による不正行為は困難であ
る。
[0008] Even if a malicious third party obtains a recording medium storing the authentication information as the encrypted information 7 and succeeds in decoding all the recorded information, it is necessary to separately determine which addresses are in which order. Unless information to be read is also obtained, correct recognition information cannot be obtained. Therefore,
It is difficult to perform wrongdoing by obtaining a recording medium.

【0009】例えば、iモード型携帯電話等を重要な電
子取引の手段とする、或いは機密情報にアクセスする手
段とする必要の予見される時には、多桁のパスワードや
暗号鍵等の認証情報を携帯電話のメモリー内或いはメモ
リーステック等脱着型記録媒体に上記のように分散して
秘蔵しておく。認証が必要な時には相手方の要求に応じ
て正しいアドレスを正しい順序で入力して復元された多
量の認識情報を連続して送り出す。例え第3者がその携
帯電話を取得しても、正規の所持者からの正しいアドレ
スとその配列順序を教示されなければ、この認証を要す
る取引きにおいて正規所持者に成りすますことはまず不
可能である。
For example, when it is foreseen that an i-mode mobile phone or the like will be used as a means for important electronic transactions or as a means for accessing confidential information, authentication information such as a multi-digit password or an encryption key will be transmitted to the mobile phone. As described above, it is distributed and stored in a memory of a telephone or in a removable recording medium such as a memory stick. When authentication is required, a correct address is input in a correct order in response to a request from the other party, and a large amount of restored recognition information is continuously transmitted. Even if a third party obtains the mobile phone, it is almost impossible to impersonate a legitimate holder in a transaction that requires authentication, unless the legitimate holder teaches the correct address and the order of their arrangement. It is possible.

【0010】アドレスに「いろはにほへと」或いは「ア
イウエオ」を使えば、ダミーを含めて約50個までを容
易に管理できる。アドレスに漢字を使えば数千個のダミ
ーの中に正しいアドレスを容易に秘蔵することができ
る。勿論英数字その他の記号・象徴を使うことも可能で
ある。
If "Iroha Nihoto" or "Iueo" is used for the address, up to about 50 addresses including dummy can be easily managed. If you use kanji for the address, you can easily keep the correct address in thousands of dummies. Of course, alphanumeric characters and other symbols and symbols can be used.

【0011】また、この手法は暗号鍵等の通信アクセス
のための個人認証情報のみに限定されるものではなく、
あらゆる種類の機密情報を、CPUのない単純で安価な
記録媒体に安全に記録させ、簡単に読み出すことを可能
とする。
This method is not limited to only personal authentication information for communication access such as an encryption key.
All kinds of confidential information can be safely recorded on a simple and inexpensive recording medium without a CPU, and can be easily read.

【0012】現在オンライン取引・インターネット閲覧
で使われている英数文字によるパスワードは[長い(多
い桁数)、或いは本人情報と関連していないと覚えられ
ない。短い(少ない桁数)、或いは本人情報と関連して
いると簡単に破かれる。]ことの短所を抱えている。こ
こで、これらの短所は絵文字・似顔絵・イラスト・漫画
・色等の、文字でも数字でもないいわゆるアイコン・象
徴を使用する擬似パスワード(以下、パスシンボルとい
う)を本人認証に使用することで解決可能である。
[0012] The password using alphanumeric characters currently used in online transactions and Internet browsing is [long (large number of digits) or cannot be remembered unless it is related to personal information. It is easily broken if it is short (small number of digits) or related to personal information. ] Have the disadvantages. Here, these disadvantages can be solved by using a pseudo-password (hereinafter referred to as a pass symbol) that uses so-called icons and symbols that are neither characters nor numbers, such as pictograms, portraits, illustrations, cartoons, and colors, for personal authentication. It is.

【0013】数十・数百・或いは数千・数万にもなる様
々な小型の象徴を用意する。認証すべき個人に対してそ
のなかからランダムに選んだ2乃至数個の象徴を割当て
多数のダミーと共に提供し、正しい象徴とその選択順序
をランダムに決定し、その結果を認証すべきユーザーの
みに教示し記憶すべく指示する。なお、相対的に安全度
は低くなるがユーザーが象徴と順序を決定する方法もあ
り得る。メモリカード等の電気・磁気的な記録媒体にこ
れらの象徴を画像として記憶させこれらの画像を一斉に
或いは漸次暫時表示し、これらの中から教示された順序
で教示された象徴を選択する方法が可能である。
Various tens, hundreds, thousands or tens of thousands of small symbols are prepared. To the person to be authenticated, assign two or several symbols selected at random from among them, provide them with a number of dummies, determine the correct symbols and the order of their selection at random, and give the result only to the user to be authenticated. Instruct to teach and memorize. It should be noted that although the degree of security is relatively low, there may be a method in which the user determines the symbol and order. A method of storing these symbols as images on an electric or magnetic recording medium such as a memory card, displaying these images simultaneously or gradually, and selecting a taught symbol from these in the order taught. It is possible.

【0014】請求項2の発明の実施例においては、一枚
または数枚のカード10A、10B、10C…(図6参照)に
小型アイコン・象徴11を印刷してカード10よりアイコン
・象徴11を光学的読取り可能とする。これらのアイコン
・象徴11を教示された順序に従って光学的読取装置で読
取ることによりパスシンボル12(図7参照)を出力す
る。出力したスシンボル12は、通信回線を介して電送す
る。受信側においては、電送されたアイコン・象徴11の
内容と順序とがシステムに登録したパスシンボル12と一
致した場合についてのみ個人認証を完了させる。端末内
にはパスシンボル12を構成するアイコン・象徴11の記録
は一切残らない。また、選択入力にキーボード等を使用
する必要がないので、パスシンボル12の漏洩の可能性は
極めて小さい。電気・磁気的記録であれ、印刷による光
学的読取記録であれ、あらゆる種類の電気的通信ネット
ワークで使用可能である。
In an embodiment of the present invention, a small icon / symbol 11 is printed on one or several cards 10A, 10B, 10C... Optically readable. The path symbol 12 (see FIG. 7) is output by reading these icons / symbols 11 with an optical reader in the order taught. The output symbol 12 is transmitted via a communication line. On the receiving side, personal authentication is completed only when the content and order of the transmitted icons / symbols 11 match the path symbols 12 registered in the system. No record of the icon / symbol 11 constituting the path symbol 12 remains in the terminal. Further, since it is not necessary to use a keyboard or the like for selection input, the possibility of leakage of the path symbol 12 is extremely small. It can be used in all kinds of telecommunications networks, whether electrical or magnetic, or optically read by printing.

【0015】ユーザーが、与えられたアイコン・象徴を
使用したストーリーを考えるなどすればパスシンボル12
の記憶(アイコン・象徴の内容および順序の記憶)は更
に容易になる。例えば最初の画面・ページには様々な人
物の似顔絵ばかり100個記録されており、ユーザーに
はその内の一つが割り当てられる。その似顔絵には、例
えば「けいちゃん」といった呼称が併記されておれば更
に簡単に覚えることができる。勿論、呼称なしのイラス
トのみでもよい。2枚目は100個の犬のイラストが記
録されているとする。それぞれ「ジョン」「タロー」等
の名前を付けてもよい。3枚目は100個の花が記録さ
れているとする。システムの指示に従って個人は似顔絵
の中ではこの絵、犬の中ではこの犬、花の中ではこの花
と記憶する。指示された順序に従って選択・読取りをす
れば認証できる。もし個人が何らかのストーリーを考え
れば記憶の補助となる。例えば、教示された順序が
「花」「顔」「犬」であれば、「この花」を「この顔」
の人が好んでいるが「この顔」の人は「この犬」に噛ま
れたんだ、とストーリーを考える。悪意の第3者がこの
個人の記憶の中身を知ることは極めて困難であるが、個
人にとって記憶は容易であることで、認証の確実度を高
めることとなる。
If the user considers a story using the given icons and symbols, the path symbol 12
(The storage of the contents and order of icons and symbols) is further facilitated. For example, on the first screen / page, only 100 portraits of various people are recorded, and one of them is assigned to the user. If the portrait is accompanied by a name such as "Kei-chan", it can be more easily remembered. Of course, only an illustration without a name may be used. It is assumed that the second sheet contains illustrations of 100 dogs. Names such as "John" and "Taro" may be given respectively. It is assumed that the third sheet has 100 flowers recorded. According to the instructions of the system, the individual remembers this picture in portraits, this dog in dogs, and this flower in flowers. Authentication can be performed by selecting and reading in the specified order. If an individual thinks of a story, it can help with memory. For example, if the order taught is “flower”, “face”, “dog”, “this flower”
She likes the story, but thinks that the person with this face was bitten by this dog. It is extremely difficult for a malicious third party to know the contents of this individual's memory, but the memory is easy for the individual, which increases the certainty of authentication.

【0016】この認証ソフト手法、つまりランダムに決
定された複数個のデータ或いはデータグループの配列順
序指定・記憶による復元手法は、指紋、瞳、網膜などに
よる認証にも応用できるものである。
This authentication software method, that is, a restoration method by designating and storing the arrangement order of a plurality of data or data groups determined at random, can be applied to authentication using a fingerprint, a pupil, a retina, or the like.

【0017】認証データとして指紋読取データを登録す
る時に、システム側から複数本の指をある特定の順序で
読取らせるよう指示を出す。例えば、(1)右手薬指,
続いて(2)左手小指、更に引き続いて(3)再び右手薬
鎖指など。ユーザーは認証に際しては指示された順序に
従って指紋を読取らせることによって自ら選択する方法
を選択することも可能である。
When registering fingerprint reading data as authentication data, the system issues an instruction to read a plurality of fingers in a specific order. For example, (1) right ring finger,
Then (2) the little finger on the left hand, and (3) the ring finger on the right again. At the time of authentication, the user can select a method of selecting his / her own by reading fingerprints in the designated order.

【0018】悪意の第3者が正規のユーザーの全ての指
の指紋の複製を作成しても、或いは実力で本人の指を支
配化に置いたとしても、ユーザーからその指紋を読取ら
せるべき指とその読取順序と回数の全ての教示されてい
なければ「成りすまし」は不可能である。指紋自体有効
な認証方法であるが、この手法と複合することにより更
に成りすましを困難とする。読取回数を4回とすると、
10の4乗の組合わせがあり、指紋読取りについてその
全ての可能性の総当りを許すような杜撰なシステムの存
在を許さない限り不正はほぼ不可能に近い。
Even if a malicious third party makes a copy of the fingerprints of all the fingers of the legitimate user, or even puts his or her own finger in control, the user should read the fingerprints. "Spoofing" is not possible unless all of the finger and its reading order and number are taught. Although the fingerprint itself is an effective authentication method, spoofing is made more difficult by combining with this method. If the number of readings is four,
There are 10 to the fourth power combinations, and fraud is almost impossible unless a poor system exists that allows the brute force of all of its possibilities for fingerprint reading.

【0019】これは網膜、瞳、手紋による認証にも応用
できる。「右」、「右」、「左」と3回であれば2の3
乗であり、これを5回とすれば2の5乗の組み合わせと
なる。たとえシステム幻惑技術を開発してデータ照合機
能をその限りでは騙せたとしても、正規のユーザーの記
憶を盗まない限り悪意の第3者による「成りすまし」は
困難である。
This can be applied to authentication based on retina, pupil, and handprint. "3" for "right", "right", "left" three times
It is a power of 5, and if this is set to 5 times, it is a combination of 2 to the power of 5. Even if a system daze technology is developed to deceive the data collation function to that extent, it is difficult for a malicious third party to “spoof” without stealing the memory of a legitimate user.

【0020】本発明の実施にあたり、イハードディス
ク、フロッピー(登録商標)デスク、メモリカード、メ
モリスティック、MOディスク、CD―ROM、光カー
ド、バーコード・二次元コードム印字カード等の種類を
問わずあらゆる記憶媒体を対象とするものである。
In carrying out the present invention, any type of hard disk, floppy (registered trademark) desk, memory card, memory stick, MO disk, CD-ROM, optical card, barcode / two-dimensional codem printing card, etc. It is intended for storage media.

【0021】[0021]

【発明の効果】本願発明は、機密情報の記録、本人着認
証について、見極めて経済的なコストで、且つCPUの
ない単純な記憶媒体の弱い点を補完し、CPU付きIC
カードに優るとも劣らない高い安全性を具現する効果を
有するものである。
According to the present invention, the recording of confidential information and personal identification authentication can be performed at an extremely economical cost and complement the weak points of a simple storage medium without a CPU.
This has the effect of realizing high security not inferior to the card.

【図面の簡単な説明】[Brief description of the drawings]

【図1】認証情報の実施例を示す説明図。FIG. 1 is an explanatory diagram showing an embodiment of authentication information.

【図2】暗号化情報の実施例を示す説明図。FIG. 2 is an explanatory diagram showing an embodiment of encryption information.

【図3】アドレス集合情報を、カードにより教示する実
施例を示す説明図。
FIG. 3 is an explanatory diagram showing an embodiment in which address set information is taught by a card.

【図4】情報分割・ランダム配列・囮混入のフローチャ
ート。
FIG. 4 is a flowchart of information division, random arrangement, and decoy mixing.

【図5】情報復元のフローチャート。FIG. 5 is a flowchart of information restoration.

【図6】アイコン・象徴を印刷したカードの実施例を示
す説明図。
FIG. 6 is an explanatory diagram showing an embodiment of a card on which icons and symbols are printed.

【図7】パスシンボルの実施例を示す説明図。FIG. 7 is an explanatory diagram showing an embodiment of a path symbol.

【符号の説明】[Explanation of symbols]

1 認証情報 3 分割情報 4 アドレス情報 5 囮情報 6 囮アドレス情報 8 アドレス集合情報 10 カード 11 小型アイコン・象徴 10 カード 12 パスシンボル 1 Authentication information 3 Split information 4 Address information 5 Decoy information 6 Decoy address information 8 Address set information 10 Card 11 Small icon / symbol 10 Card 12 Pass symbol

───────────────────────────────────────────────────── フロントページの続き Fターム(参考) 5B072 AA09 BB08 CC21 DD01 MM09 5B085 AE03 AE08 AE12 AE23 5D044 CC08 DE03 DE17 DE24 DE38 GK17 HL11 5J104 AA16 EA03 EA04 EA14 KA01 KA17 KA19 NA05 NA07 NA35 NA38  ──────────────────────────────────────────────────続 き Continued on front page F term (reference) 5B072 AA09 BB08 CC21 DD01 MM09 5B085 AE03 AE08 AE12 AE23 5D044 CC08 DE03 DE17 DE24 DE38 GK17 HL11 5J104 AA16 EA03 EA04 EA14 KA01 KA17 KA19 NA05 NA07 NA38

Claims (3)

【特許請求の範囲】[Claims] 【請求項1】認証情報等の機密情報を複数に分割して、
多数の囮を加えた上で、ランダムに並べ替えてそれぞれ
にアドレスを付けて記録媒体の中に記録し、その記録媒
体をユーザーに配布する。多数の囮を含むアドレスの内
どのアドレスをどの順序で読み出せば正しい認証情報等
の機密情報が復元するかの配列指示情報をユーザーのみ
に伝える。記録媒体の機密情報の再生にあたり、正規の
ユーザーは正しいアドレスを正しい順序で読み出す指示
を入力することにで、配列指示情報と一致する指示入力
により、自らの認証を行う。以上の手段を含むことを特
徴とする機密情報の記録再生方法。
1. Dividing confidential information such as authentication information into a plurality of
After adding a large number of decoys, they are rearranged at random, each is assigned an address, recorded in a recording medium, and the recording medium is distributed to users. Only the user is notified of the array designation information indicating which address among the addresses including a large number of decoys should be read out and in which order, confidential information such as correct authentication information can be restored. In reproducing the confidential information on the recording medium, the legitimate user performs an authentication by inputting an instruction to read out a correct address in a correct order, and by inputting an instruction that matches the arrangement instruction information. A method for recording and reproducing confidential information, comprising the above means.
【請求項2】アイコン・象徴をカードに光学的読取り可
能な態様で記録してカードを記録媒体とし、記録媒体で
あるカードの光学的読取りにあたり際して、正規のアイ
コン・象徴の内容および順序をユーザーが指示入力する
ことを特徴とする請求項1に記載する機密情報の記録再
生方法。
An icon / symbol is recorded on the card in an optically readable manner, and the card is used as a recording medium. When the card as the recording medium is optically read, the contents and order of regular icons / symbols are recorded. 2. The method for recording and reproducing confidential information according to claim 1, wherein the user inputs an instruction.
【請求項3】認証情報を複数に分割して、多数の囮を加
えた上で、ランダムに並べ替えてそれぞれにアドレスを
付けて記録してなる、機密情報の記録方法および本人認
証のための暗号鍵等を記録した記録媒体。
3. A method for recording confidential information and a method for recording personal information, wherein the authentication information is divided into a plurality of pieces, a large number of decoys are added, and the pieces are randomly rearranged and recorded with addresses. A recording medium on which an encryption key is recorded.
JP2000187168A 2000-06-22 2000-06-22 Recording and reproducing method for secret information, and recording medium with cryptographic key or the like for identity authentication recorded thereon Pending JP2002007349A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2000187168A JP2002007349A (en) 2000-06-22 2000-06-22 Recording and reproducing method for secret information, and recording medium with cryptographic key or the like for identity authentication recorded thereon
PCT/JP2001/005297 WO2001098912A1 (en) 2000-06-22 2001-06-20 Recording/reproducing method for classified information such as identity authenticating information and recording medium for classified information such as identity authenticating information
AU2001266319A AU2001266319A1 (en) 2000-06-22 2001-06-20 Recording/reproducing method for classified information such as identity authenticating information and recording medium for classified information such as identity authenticating information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2000187168A JP2002007349A (en) 2000-06-22 2000-06-22 Recording and reproducing method for secret information, and recording medium with cryptographic key or the like for identity authentication recorded thereon

Publications (1)

Publication Number Publication Date
JP2002007349A true JP2002007349A (en) 2002-01-11

Family

ID=18687192

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2000187168A Pending JP2002007349A (en) 2000-06-22 2000-06-22 Recording and reproducing method for secret information, and recording medium with cryptographic key or the like for identity authentication recorded thereon

Country Status (1)

Country Link
JP (1) JP2002007349A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002324348A (en) * 2001-04-25 2002-11-08 Sony Corp Data recording medium, data recording device and method, and data reproducing device and method
JP2007095019A (en) * 2005-09-29 2007-04-12 Mitsunori Honma Identity authentication method
US7623022B2 (en) 2004-10-01 2009-11-24 Hewlett-Packard Development Company, L.P. Securing electronic annotations
US7895406B2 (en) 2006-12-18 2011-02-22 Spansion Llc Memory device and password storing method thereof
JP2014102532A (en) * 2012-11-16 2014-06-05 Danway Co Ltd Login management device and computer processing system provided with the same
KR102030785B1 (en) * 2019-04-26 2019-10-10 주식회사그린존시큐리티 An apparatus for obfuscating data of IoT devices using pseudorandom number and a method therefor

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002324348A (en) * 2001-04-25 2002-11-08 Sony Corp Data recording medium, data recording device and method, and data reproducing device and method
US7623022B2 (en) 2004-10-01 2009-11-24 Hewlett-Packard Development Company, L.P. Securing electronic annotations
JP2007095019A (en) * 2005-09-29 2007-04-12 Mitsunori Honma Identity authentication method
US7895406B2 (en) 2006-12-18 2011-02-22 Spansion Llc Memory device and password storing method thereof
JP2014102532A (en) * 2012-11-16 2014-06-05 Danway Co Ltd Login management device and computer processing system provided with the same
KR102030785B1 (en) * 2019-04-26 2019-10-10 주식회사그린존시큐리티 An apparatus for obfuscating data of IoT devices using pseudorandom number and a method therefor
WO2020218699A1 (en) * 2019-04-26 2020-10-29 주식회사그린존시큐리티 Apparatus for obfuscating data of iot device by using pseudorandom number, and method therefor
US20210209241A1 (en) * 2019-04-26 2021-07-08 Green Zone Security., Ltd. Apparatus and method for data obfuscation of IoT device using pseudorandom number

Similar Documents

Publication Publication Date Title
US8881251B1 (en) Electronic authentication using pictures and images
US7797549B2 (en) Secure method and system for biometric verification
US7836492B2 (en) User authentication system leveraging human ability to recognize transformed images
AU2013101034A4 (en) Registration and authentication of computing devices using a digital skeleton key
Just Designing and evaluating challenge-question systems
JP2004213665A (en) Authentication system and device based on random partial pattern recognition
JP2008537210A (en) Secured data communication method
US20030146931A1 (en) Method and apparatus for inputting secret information using multiple screen pointers
KR20010023602A (en) Digital signature generating server and digital signature generating method
Matta et al. TCpC: a graphical password scheme ensuring authentication for IoT resources
KR101897085B1 (en) Apparatus and method for generating a realtime password and storage medium
GB2377523A (en) User identity verification system
JP2002007349A (en) Recording and reproducing method for secret information, and recording medium with cryptographic key or the like for identity authentication recorded thereon
JP4799476B2 (en) Authentication method and authentication apparatus
US7715560B2 (en) Systems and methods for hiding a data group
KR20170016821A (en) Server system, communication system, communication terminal device, program, recording medium, and communication method
JP2006521762A (en) Information transmission system and transmission method using N-dimensional information
Patel et al. Survey on Graphical Password Authentication System
CA3126437A1 (en) Offline interception-free interaction with a cryptocurrency network using a network-disabled device
WO2023036143A1 (en) Decentralized zero-trust identity verification and authentication system and method
Bindu Secure usable authentication using strong pass text passwords
JP2002041478A (en) System and method for authentication, and recording medium with authentication program recorded thereon
Nandhini et al. Mobile communication based security for atm pin entry
KR20000024087A (en) A password preparing method using image associable words
Daher et al. Posh: A generalized captcha with security applications