JP2002182563A - Electronic sealing system - Google Patents

Electronic sealing system

Info

Publication number
JP2002182563A
JP2002182563A JP2000380958A JP2000380958A JP2002182563A JP 2002182563 A JP2002182563 A JP 2002182563A JP 2000380958 A JP2000380958 A JP 2000380958A JP 2000380958 A JP2000380958 A JP 2000380958A JP 2002182563 A JP2002182563 A JP 2002182563A
Authority
JP
Japan
Prior art keywords
electronic
data
seal
unit
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2000380958A
Other languages
Japanese (ja)
Other versions
JP4465516B2 (en
Inventor
Hiroshi Ichise
浩 市瀬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toyo Communication Equipment Co Ltd
Original Assignee
Toyo Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toyo Communication Equipment Co Ltd filed Critical Toyo Communication Equipment Co Ltd
Priority to JP2000380958A priority Critical patent/JP4465516B2/en
Publication of JP2002182563A publication Critical patent/JP2002182563A/en
Application granted granted Critical
Publication of JP4465516B2 publication Critical patent/JP4465516B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

PROBLEM TO BE SOLVED: To provide an electronic seal system which prevents a sealing request source from doing illegal operation and disables an object document to be sealed to be substituted when sealing is requested. SOLUTION: This electronic seal system is equipped with a sealing request part which requests sealing such as an electronic signature for electronic data, a data storage part which stores the electronic data as an object to be sealed, and an electronic seal part which gives a seal to the electronic data; and the sealing request part is equipped with an identifier output part which outputs an identifier for specifying the sealed object, the electronic seal part is equipped with a request acceptance part which receives a sealing request from the sealing request part and specifies specific data according to the identifier included in the sealing request, a readout control part which requests data from the data storage part according to an indication from the request acceptance part and receives a data response from the data storage part, and a ciphering part which generates an electronic seal with the received electronic data, and the ciphering part sends the electronic seal back to the sealing request part.

Description

【発明の詳細な説明】DETAILED DESCRIPTION OF THE INVENTION

【0001】[0001]

【発明の属する技術分野】本発明は電子押印システムに
関し、特に電子署名を行う者の意に反する電子書類に電
子印鑑の押印を行うことを防止した電子押印システムに
関する。
BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an electronic seal system, and more particularly, to an electronic seal system for preventing an electronic seal stamp from being imprinted on an electronic document contrary to a person who performs an electronic signature.

【0002】[0002]

【従来の技術】近年、インターネットに代表されるよう
に、ネットワーク基盤の構築が進み、文書等も電子デー
タでやり取りする機会が増加した。また、電子化された
文書を認証するため或いは電子化文書の安全性を確保す
るために電子署名或いは電子印鑑押印が行われており、
一般的には署名対象文書のハッシュ情報を暗号化し、そ
の情報を文書に添付することにより行われている。図3
は従来の電子押印システムを示す図であり、例えば、電
子化された文書に対し、インターネットを介して電子印
鑑を押印する場合を想定して説明を行う。20は電子印
鑑を押印すべきデータ20aが保管されたサーバー、2
2は電子印鑑押印者(以下、押印者)が保有する電子印
鑑装置、26は当該押印者が接続しているプロバイダの
PCであり、電子印鑑装置22は例えば押印者が利用し
ているブラウザがその機能を有している。
2. Description of the Related Art In recent years, as represented by the Internet, the construction of a network infrastructure has been advanced, and opportunities for exchanging documents and the like by electronic data have increased. In addition, in order to authenticate the digitized document or to secure the security of the digitized document, an electronic signature or an electronic seal stamp is performed.
Generally, hash information of a document to be signed is encrypted, and the information is attached to the document. FIG.
FIG. 1 is a diagram showing a conventional electronic seal system. For example, a description will be given on the assumption that a digital document is stamped with an electronic seal stamp via the Internet. Reference numeral 20 denotes a server on which data 20a to be stamped with an electronic seal are stored.
Reference numeral 2 denotes an electronic seal stamp device held by the electronic seal stamper (hereinafter, “sealant”), reference numeral 26 denotes a PC of a provider to which the seal stamper is connected, and the electronic seal stamp device 22 is, for example, a browser used by the seal stamper. It has that function.

【0003】例えば、押印要求元となるプロバイダでは
所望の電子化データが保管されたサーバー20にデータ
要求を行い、サーバー20はデータ応答としてデータ2
0aを出力する。電子化データを受領したプロバイダ2
6では押印対象文書のハッシュ情報を抽出し、該抽出さ
れたハッシュ情報に対して押印を行うよう押印者の電子
印鑑装置22に押印要求を行い、電子印鑑装置22では
要求を受け付け、更に暗号化(秘密鍵による暗号化等)
を行い、押印応答としてプロバイダ26に出力とする。
通常、電子署名は文書の真正性を保証するために電子デ
ータである文書を作成した者又は確認した者がハッシュ
情報を当該電子データから抽出し、当該抽出したハッシ
ュ情報に対して暗号化処理を行うので、署名が行われる
対象文書を確認し署名を行うことができる。
[0003] For example, a provider as a seal request source issues a data request to a server 20 in which desired digitized data is stored, and the server 20 sends data 2 as a data response.
0a is output. Provider 2 who received the digitized data
In step 6, the hash information of the document to be stamped is extracted, a seal request is made to the sealer's electronic seal stamp device 22 to seal the extracted hash information, and the electronic seal stamp device 22 accepts the request and further encrypts. (Encryption with secret key, etc.)
And outputs it to the provider 26 as a seal response.
Normally, a digital signature is created by a person who has created or confirmed a document, which is electronic data, in order to guarantee the authenticity of the document.Hash information is extracted from the electronic data, and encryption processing is performed on the extracted hash information. Therefore, the target document to be signed can be confirmed and signed.

【0004】[0004]

【発明が解決しようとする課題】しかしながら、予め定
められたフォーマットからなる文書データであって、押
印者が最終的に電子データを操作できないものに押印を
求められる場合を想定すると、押印対象文書データから
ハッシュ情報を抽出するのは押印要求元(プロバイダ
等)であるため、例えば、悪意を持ったプロバイダやハ
ッキング等によりプロバイダを介して第三者が押印対象
文書をすり替え、ハッシュ情報を抽出し、押印者に押印
を促すケースも生じる虞があり、このような場合であっ
ても、押印者は要求受付部にて受領したデータが真に押
印対象のデータに基づくものであるか否かを判別するこ
とができないので、押印者の意図とは異なる文書に押印
する可能性があるという問題点があった。本発明は、上
記のような従来の問題点を解決するためになされたもの
であって、押印を求められる際に、押印要求元における
不正操作を防止し、押印対象文書のすり替え等を行うこ
とができない電子押印システムを提供することを課題と
する。
However, assuming a case in which document data having a predetermined format and in which the sealer cannot finally operate the electronic data is required to seal the document data, the document data to be stamped is considered. It is the seal requester (provider or the like) that extracts the hash information from, for example, a third party replaces the seal target document via the provider due to a malicious provider or hacking, and extracts the hash information. There may be cases where the sealer is urged to perform the seal. Even in such a case, the sealer determines whether the data received by the request receiving unit is truly based on the data to be stamped. Therefore, there is a problem in that it is possible to seal a document different from the intention of the sealer. SUMMARY OF THE INVENTION The present invention has been made to solve the above-described conventional problems, and it is an object of the present invention to prevent improper operation at a seal requesting source when a seal is requested, and to replace a seal target document. An object of the present invention is to provide an electronic seal system that cannot perform the operation.

【0005】[0005]

【課題を解決するための手段】上記課題を解決するため
に、本発明に係る電子押印システムの請求項1記載の発
明は、電子データに電子署名等の押印を要求する押印要
求部と、押印対象である電子データを保管したデータ保
管部と、電子データに押印を行う電子署名部とを備え、
前記押印要求部は押印対象を特定するための識別子を前
記電子署名部に出力し、該電子署名部は前記識別子に基
づいて前記データ保管部より電子データを受領して該電
子データより電子署名を作成すると共に、該作成された
電子署名を前記電子データに内蔵させて押印要求部に返
還したことを特徴とする。
According to a first aspect of the present invention, there is provided an electronic stamping system according to the present invention, comprising: a stamp requesting unit for requesting a stamp of an electronic data such as an electronic signature; A data storage unit that stores the electronic data that is the target, and an electronic signature unit that seals the electronic data,
The seal requesting unit outputs an identifier for specifying a seal target to the electronic signature unit. The electronic signature is created, and the created electronic signature is embedded in the electronic data and returned to the seal requesting unit.

【0006】本発明に係る電子押印システムの請求項2
記載の発明は、前記請求項1記載の発明において、前記
電子印鑑部は押印された電子印鑑と共にデータ保管部よ
り受け取った押印対象データを前記押印要求部に返還し
たことを特徴とする。
[0006] Claim 2 of the electronic seal system according to the present invention
According to a preferred embodiment of the present invention, in the first aspect of the present invention, the electronic seal stamp unit returns the stamp target data received from the data storage unit together with the stamped electronic seal stamp to the seal request unit.

【0007】本発明に係る電子押印システムの請求項3
記載の発明は、前記請求項1又は2記載の発明におい
て、前記識別子は、押印対象データを特定するための記
号、数値、或いは文書名等であることを特徴とする。
[0007] Claim 3 of the electronic seal system according to the present invention.
According to the invention described in the first or second aspect, the identifier is a symbol, a numerical value, a document name, or the like for specifying the data to be stamped.

【0008】本発明に係る電子押印システムの請求項4
記載の発明は、請求項1〜3記載の発明において、前記
押印部は押印対象データからハッシュ情報を抽出し、該
抽出したデータに対して暗号化を行うものであることを
特徴とする。
[0008] Claim 4 of the electronic seal system according to the present invention.
The invention described in the above claims is characterized in that, in the invention described in any one of the first to third aspects, the sealing unit extracts hash information from the data to be stamped and encrypts the extracted data.

【0009】[0009]

【発明の実施の形態】以下、図面に示した実施例に基づ
いて本発明を詳細に説明する。図1は本発明に係る電子
押印システムの構成を示す図であり、上記説明と同様に
電子化された文書に対し、インターネットを介して電子
印鑑を押印する場合を想定して説明を行う。1は電子印
鑑を押印すべき押印対象データ1aが保管されたサーバ
ー(データ保管部)、3は押印者が保有する電子印鑑装
置(電子印鑑部)であって、押印要求受付部3a、読み
出し制御部3b、押印部(暗号化部)3cを備えてい
る。また、5は例えばプロバイダ等の押印要求元であっ
て、押印対象を特定するための識別子を出力する識別子
出力部5aを有す。
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described in detail based on embodiments shown in the drawings. FIG. 1 is a diagram showing a configuration of an electronic seal system according to the present invention, and the description will be made on the assumption that a digital document is stamped with an electronic seal stamp via the Internet in the same manner as described above. Reference numeral 1 denotes a server (data storage unit) in which the data 1a to be stamped to be stamped is stored, and 3 denotes an electronic seal stamp device (electronic seal stamp unit) owned by the stamper. A portion 3b and a seal portion (encryption portion) 3c are provided. Reference numeral 5 denotes a seal requesting source such as a provider, which has an identifier output unit 5a for outputting an identifier for specifying a seal target.

【0010】以下、図1並びに図2に示したフローチャ
ートに基づき本発明に係る電子押印システムを説明す
る。尚、図2のフローチャートにおいて単枠による表記
は押印要求元5の動作、二重枠線による表記は電子印鑑
装置3における動作、八角枠による表記は押印対象文書
データが保管されたサーバー1の動作を表す。
Hereinafter, an electronic seal system according to the present invention will be described with reference to the flowcharts shown in FIGS. In the flowchart of FIG. 2, the notation in the single frame indicates the operation of the stamp requesting source 5, the notation in the double border line indicates the operation in the electronic seal stamp device 3, and the notation in the octagonal frame indicates the operation of the server 1 storing the document data to be stamped. Represents

【0011】まず、押印要求元5は押印を希望する対象
データを特定するための識別子、例えば、記号、数値、
文書名等を内蔵した押印要求を識別子出力部5aより電
子印鑑装置3に出力し(ステップS1)、電子印鑑装置
3の要求受付部3aが要求を受け付ける(ステップS
2)。すると、要求受付部3aは内蔵された識別子を抽
出し、読み出し制御部3bに押印すべき書類の指示を行
い(ステップS3)、読み出し制御部3bは特定された
データの受け渡しをサーバー1に要求する(ステップS
4)。押印対象文書を保管しているサーバー1はデータ
要求が行われると、指定された文書データ1aを電子印
鑑装置3に出力する(ステップS5)。電子印鑑装置3
の読み取り制御部3bにて受け取ったデータは、押印部
3cに渡され、該暗号化部3cにおいてハッシュ情報を
抽出し、かつ該抽出された情報の暗号化が行われ、押印
対象文書の末尾に追加書込するなどして押印対象文書に
添付されて押印要求元5に出力される(ステップS6、
S7、S8)。押印要求元5では電子印鑑が押印された
文書データを受信し(ステップS9)、その後、復号化
等の所望の手続きが行われ文書が認証される。
First, the seal requesting source 5 identifies the target data for which the seal is desired, for example, a symbol, a numerical value,
A seal request containing a document name or the like is output from the identifier output unit 5a to the electronic seal stamp device 3 (step S1), and the request receiving unit 3a of the electronic seal stamp device 3 receives the request (step S1).
2). Then, the request receiving unit 3a extracts the built-in identifier, instructs the reading control unit 3b of the document to be stamped (step S3), and the reading control unit 3b requests the server 1 to transfer the specified data. (Step S
4). When a data request is made, the server 1 storing the seal target document outputs the designated document data 1a to the electronic seal stamp device 3 (step S5). Electronic seal stamp device 3
The data received by the read control unit 3b is passed to the sealing unit 3c, the hash information is extracted by the encryption unit 3c, and the extracted information is encrypted. Attached to the document to be stamped by additional writing or the like and output to the stamp requesting source 5 (step S6,
S7, S8). The seal request source 5 receives the document data on which the electronic seal is stamped (step S9), and then performs a desired procedure such as decryption to authenticate the document.

【0012】すなわち、本発明に係る電子押印システム
では電子印鑑装置3が文書を読み取り、該文書からデー
タを抽出して電子印鑑を押印するための暗号化処理が行
われるので、押印文書のすり替え等を回避することがで
き、セキュリティを向上することができる。
That is, in the electronic seal system according to the present invention, the electronic seal stamp device 3 reads a document, extracts data from the document, and performs an encryption process for stamping the electronic seal stamp. Can be avoided, and security can be improved.

【0013】なお、上記説明においては、電子印鑑装置
3において押印対象であるデータを抽出し、かつ、押印
対象文書に押印データを添付して押印要求元に応答する
例を挙げて説明したが、電子印鑑装置3より電子押印の
みを押印要求元に返送し、押印要求元5がデータ保管サ
ーバ1から所望のデータを読み出し、押印要求元におい
て読み出したデータに電子印鑑部3から受領した電子押
印を添付してもよい。この場合、電子押印を作成するた
めのデータを受け渡す経路が電子印鑑装置3と押印対象
データを保管しているサーバー1間のみとなるので、押
印対象データの誤送による押印の誤りを防ぐこともでき
る。
In the above description, an example has been described in which the electronic seal stamp device 3 extracts the data to be stamped, attaches the stamping data to the document to be stamped, and responds to the stamping request source. Only the electronic seal is returned from the electronic seal stamp device 3 to the seal request source, the seal request source 5 reads the desired data from the data storage server 1, and the electronic seal received from the electronic seal stamp unit 3 is read into the read data at the seal request source. May be attached. In this case, since the path for transferring the data for creating the electronic seal is only between the electronic seal stamp device 3 and the server 1 storing the data to be stamped, it is possible to prevent an error in the seal due to erroneous transmission of the data to be sealed. You can also.

【0014】また、上記説明では押印対象データからハ
ッシュ情報を抽出し、該抽出情報を暗号化した例を挙げ
たが、これに限定するものではなく、文章を特定するた
めの情報であればよい。
Further, in the above description, an example was given in which hash information was extracted from the data to be stamped and the extracted information was encrypted. However, the present invention is not limited to this, and any information for specifying a sentence may be used. .

【0015】[0015]

【発明の効果】以上説明したように、本発明に係る電子
押印システムの請求項1記載の発明では押印要求元が押
印対象文書を特定する識別子を押印者の電子印鑑装置に
出力し、電子印鑑装置が識別子に応じて所定のデータを
サーバーより入手し、更に電子印鑑装置が押印対象であ
るデータから押印のためのデータを抽出して押印処理を
行うので、押印者は押印対象文書を確認した上で押印処
理を行うことができ、文書のすり替え等が行われる機会
が減り、セキュリティを高めることができる。更に、押
印対象文書がサーバーと電子印鑑装置間でのみ転送され
るので、誤押印を未然に防ぐ上で効果を有す。
As described above, according to the invention of the electronic seal system according to the first aspect of the present invention, the seal requester outputs an identifier for specifying the document to be sealed to the sealer's electronic seal device, and the electronic seal stamp. The device obtains predetermined data from the server according to the identifier, and further, the electronic seal stamp device extracts the data for sealing from the data to be sealed and performs the sealing process. The stamping process can be performed on the above, so that the chance of replacing the document or the like is reduced, and the security can be improved. Further, since the document to be stamped is transferred only between the server and the electronic seal stamp device, it is effective in preventing erroneous stamping.

【0016】また、請求項2記載の発明では、押印者は
押印対象文書を確認した上で押印処理を行うことがで
き、文書のすり替え等が行われる機会が減り、例えば、
押印が正しく行われなかったかのごとくする妨害を阻止
する等、セキュリティを高めることができる。
According to the second aspect of the present invention, the sealer can perform the sealing process after confirming the document to be stamped, which reduces the chances of replacing the document.
Security can be enhanced, for example, by preventing interference as if imprinting was not performed correctly.

【0017】請求項3記載の発明では、押印要求元より
押印対象データを特定するための識別子として記号、数
値、文書名等を出力するので、押印対象データの誤指定
を防ぐことができると共に、押印対象文書を確認した上
で押印処理を行うことができ、文書のすり替え等が行わ
れる機会が減り、セキュリティを高めることができる。
According to the third aspect of the present invention, a symbol, a numerical value, a document name, and the like are output as an identifier for specifying the data to be stamped from the source of the seal request, so that erroneous designation of the data to be stamped can be prevented. It is possible to perform the stamping process after confirming the document to be stamped, thereby reducing the chances of replacing documents and the like, and improving security.

【0018】請求項4記載の発明では暗号化部がハッシ
ュ情報を抽出するので、電子印鑑のデータ量が増大する
ことなく、押印対象文書を確認した上で押印処理を行う
ことができ、文書のすり替え等が行われる機会が減り、
セキュリティを高めることができる。
According to the fourth aspect of the present invention, since the encryption unit extracts the hash information, it is possible to perform the stamping process after confirming the document to be stamped without increasing the data amount of the electronic seal stamp. Opportunities such as replacement are reduced,
Security can be increased.

【図面の簡単な説明】[Brief description of the drawings]

【図1】本発明に係る電子押印システムを示す図。FIG. 1 is a diagram showing an electronic seal system according to the present invention.

【図2】本発明に係る電子押印システムの動作フローを
説明するための図。
FIG. 2 is a diagram for explaining an operation flow of the electronic seal system according to the present invention.

【図3】従来の電子押印システムを示す図。FIG. 3 is a diagram showing a conventional electronic seal system.

【符号の説明】[Explanation of symbols]

1・・・データ保管部(サーバー) 1a・・・押印対象データ 3・・・電子印鑑部 3a・・・要求受付部 3b・・・読み取り制御部 3c・・・暗号化部(押印部) 5・・・押印要求元 5a・・・識別子出力部 DESCRIPTION OF SYMBOLS 1 ... Data storage part (server) 1a ... Sealing target data 3 ... Electronic seal part 3a ... Request reception part 3b ... Read control part 3c ... Encryption part (Seal part) 5 ... Seal request source 5a ... Identifier output unit

Claims (4)

【特許請求の範囲】[Claims] 【請求項1】電子データに電子署名等の押印を要求する
押印要求部と、押印対象である電子データを保管したデ
ータ保管部と、電子データに押印を行う電子印鑑部とを
備えた電子押印システムにおいて、 前記押印要求部は押印対象を特定するための識別子を出
力する識別子出力部を有し、前記電子印鑑部は前記押印
要求部からの押印要求を受け取り、かつ、押印要求に含
まれる識別子から所定のデータを特定する要求受付部
と、要求受付部からの指示によりデータ保管部にデータ
要求を行うと共に該データ保管部からのデータ応答を受
領する読み取り制御部と、受領した電子データより電子
押印を作成する暗号化部とを備え、該暗号化部より電子
押印を押印要求部に返還したことを特徴とする電子押印
システム。
1. An electronic seal comprising: a seal requesting unit for requesting an electronic data to be stamped with an electronic signature, etc .; a data storage unit storing electronic data to be stamped; and an electronic seal stamp unit for stamping the electronic data. In the system, the seal requesting unit has an identifier output unit that outputs an identifier for specifying a seal target, and the electronic seal stamp unit receives a seal request from the seal request unit, and includes an identifier included in the seal request. A request receiving unit that specifies predetermined data from the data receiving unit, a reading control unit that makes a data request to the data storage unit according to an instruction from the request receiving unit and receives a data response from the data storage unit, An electronic seal system, comprising: an encryption unit for creating an seal; and returning the electronic seal to the seal request unit from the encryption unit.
【請求項2】前記電子印鑑部は電子押印と共にデータ保
管部より受け取った押印対象データを前記押印要求部に
返還したことを特徴とする請求項1記載の電子押印シス
テム。
2. The electronic stamping system according to claim 1, wherein the electronic stamping unit returns the stamping target data received from the data storage unit together with the electronic stamping to the stamping requesting unit.
【請求項3】前記識別子は、押印対象データを特定する
ための記号、数値、或いは文書名等であることを特徴と
する請求項1又は2記載の電子押印システム。
3. The electronic stamping system according to claim 1, wherein the identifier is a symbol, a numerical value, a document name, or the like for specifying the data to be stamped.
【請求項4】前記暗号化部は押印対象データからハッシ
ュ情報を抽出し、該抽出したデータに対して暗号化を行
うものであることを特徴とする請求項1〜3記載の電子
押印システム。
4. The electronic sealing system according to claim 1, wherein said encryption unit extracts hash information from the data to be stamped and encrypts the extracted data.
JP2000380958A 2000-12-14 2000-12-14 Electronic seal system Expired - Fee Related JP4465516B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2000380958A JP4465516B2 (en) 2000-12-14 2000-12-14 Electronic seal system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2000380958A JP4465516B2 (en) 2000-12-14 2000-12-14 Electronic seal system

Publications (2)

Publication Number Publication Date
JP2002182563A true JP2002182563A (en) 2002-06-26
JP4465516B2 JP4465516B2 (en) 2010-05-19

Family

ID=18849056

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2000380958A Expired - Fee Related JP4465516B2 (en) 2000-12-14 2000-12-14 Electronic seal system

Country Status (1)

Country Link
JP (1) JP4465516B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003304243A (en) * 2002-04-12 2003-10-24 Mitsubishi Electric Information Systems Corp Electronic signature program
JP2014078964A (en) * 2008-01-07 2014-05-01 Trustseed Sas Signing method and signing device
CN117453164A (en) * 2023-12-22 2024-01-26 北京裕佳科技有限公司 Print control instrument platform safety supervision and early warning system based on data analysis

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09270784A (en) * 1996-03-29 1997-10-14 Hitachi Software Eng Co Ltd Ciphering/decoding/digital signature generating/ verification device
JPH1032570A (en) * 1996-07-15 1998-02-03 N T T Data Tsushin Kk Electronic signature system
JPH1188321A (en) * 1997-09-02 1999-03-30 Kiyadeitsukusu:Kk Digital signature generation server
JPH11175512A (en) * 1997-12-09 1999-07-02 Hitachi Ltd Program related with presence certification of document
JP2000339417A (en) * 1999-05-25 2000-12-08 Nippon Telegr & Teleph Corp <Ntt> Ic card security managing method, ic card system and storage medium storing ic card security management program
JP2001282105A (en) * 2000-03-27 2001-10-12 Internatl Business Mach Corp <Ibm> Certification method for electronic contents, system and medium with recorded program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH09270784A (en) * 1996-03-29 1997-10-14 Hitachi Software Eng Co Ltd Ciphering/decoding/digital signature generating/ verification device
JPH1032570A (en) * 1996-07-15 1998-02-03 N T T Data Tsushin Kk Electronic signature system
JPH1188321A (en) * 1997-09-02 1999-03-30 Kiyadeitsukusu:Kk Digital signature generation server
JPH11175512A (en) * 1997-12-09 1999-07-02 Hitachi Ltd Program related with presence certification of document
JP2000339417A (en) * 1999-05-25 2000-12-08 Nippon Telegr & Teleph Corp <Ntt> Ic card security managing method, ic card system and storage medium storing ic card security management program
JP2001282105A (en) * 2000-03-27 2001-10-12 Internatl Business Mach Corp <Ibm> Certification method for electronic contents, system and medium with recorded program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003304243A (en) * 2002-04-12 2003-10-24 Mitsubishi Electric Information Systems Corp Electronic signature program
JP2014078964A (en) * 2008-01-07 2014-05-01 Trustseed Sas Signing method and signing device
US9391775B2 (en) 2008-01-07 2016-07-12 Trustseed Sas Signature method and device
CN117453164A (en) * 2023-12-22 2024-01-26 北京裕佳科技有限公司 Print control instrument platform safety supervision and early warning system based on data analysis

Also Published As

Publication number Publication date
JP4465516B2 (en) 2010-05-19

Similar Documents

Publication Publication Date Title
JP4689945B2 (en) Resource access method
US7797544B2 (en) Attesting to establish trust between computer entities
JP5060652B2 (en) How to unlock the secret of the calling program
EP1817687B1 (en) Apparatus and method for supporting content exchange between different drm domains
US7908492B2 (en) Method for using a compact disk as a smart key device
ES2283555T3 (en) METHOD AND APPARATUS THAT ALLOWS TO ESTABLISH THE RIGHTS OF USE OF A DIGITAL WORK BEFORE ITS CONTENT IS CREATED IN THE FUTURE.
EP2095288B1 (en) Method for the secure storing of program state data in an electronic device
US20100257370A1 (en) Apparatus And Method for Supporting Content Exchange Between Different DRM Domains
US20130125196A1 (en) Method and apparatus for combining encryption and steganography in a file control system
PT2063675E (en) Robust and flexible digital rights management (drm) involving a tamper-resistant identity module
JPH11149414A (en) Method for preserving data, its system and storage medium for data preservation processing
CN109690537B (en) System for decrypting and presenting content
CN107508685B (en) Method for implementing application electronic signature service system in cloud computing environment
US8737622B2 (en) Method for importing rights object and rights issuer
CN108400874B (en) Method for authenticating seal by using digital signature function of seal verification terminal
JP4703668B2 (en) Content transfer method
JP2002182563A (en) Electronic sealing system
RU2374779C2 (en) Method for downloading of multimedia information into portable data carrier and portable data carrier
WO2007068263A1 (en) Device, system and method for allowing authorised access to a digital content
CN113111360A (en) File processing method
JPH0375983A (en) Card utilizing system
JP2007080145A (en) Data management system, data processing method and data processing program
US7886147B2 (en) Method, apparatus and computer readable medium for secure conversion of confidential files
CN115996126B (en) Information interaction method, application device, auxiliary platform and electronic device
US11876797B2 (en) Multi-factor geofencing system for secure encryption and decryption system

Legal Events

Date Code Title Description
A625 Written request for application examination (by other person)

Free format text: JAPANESE INTERMEDIATE CODE: A625

Effective date: 20071120

A711 Notification of change in applicant

Free format text: JAPANESE INTERMEDIATE CODE: A711

Effective date: 20071221

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20081003

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20081021

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20081215

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20100126

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20100208

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130305

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130305

Year of fee payment: 3

S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130305

Year of fee payment: 3

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130305

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20140305

Year of fee payment: 4

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

LAPS Cancellation because of no payment of annual fees