TW200834457A - ID-based E-Will system - Google Patents

ID-based E-Will system Download PDF

Info

Publication number
TW200834457A
TW200834457A TW96105375A TW96105375A TW200834457A TW 200834457 A TW200834457 A TW 200834457A TW 96105375 A TW96105375 A TW 96105375A TW 96105375 A TW96105375 A TW 96105375A TW 200834457 A TW200834457 A TW 200834457A
Authority
TW
Taiwan
Prior art keywords
court
testator
death
application
stage
Prior art date
Application number
TW96105375A
Other languages
Chinese (zh)
Inventor
Hung-Yu Chien
Ru-Yu Lin
Original Assignee
Hung-Yu Chien
Ru-Yu Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hung-Yu Chien, Ru-Yu Lin filed Critical Hung-Yu Chien
Priority to TW96105375A priority Critical patent/TW200834457A/en
Publication of TW200834457A publication Critical patent/TW200834457A/en

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses an ID-based E-will system. The present invention combines both network and information security techniques to design mechanisms of an online will self-writing system and a will encryption system, such that a person can freely create, modify, delete or inquire a will of his/her own online. The present invention can reduce cost of commissioning a lawyer, as well as improve convenience and security. After the present invention meets legitimacy, people can write their own living wills online, so as to reduce time and processes for governments and family members to take care of legacies.

Description

200834457 九、發明說明: 【發明所屬之技術領域】 本發明係以個人身份資訊做為其公開金叙建置安全的線上預立 遺嘱系統之機制,而以個人身份資訊做為其公開金鑰,其最大優點就是系 統巾需魏外齡使用者的’均’使用者的公鑰就是本身的身份(如: ‘姓名、電子郵件位址、正位址…等),因此不需去驗註公鑰的有效性。此系 .統解決了以憑證絲礎公開金鑰密碼系、贿賴金鑰目制缺點,也不需 _ *第三者的協助才能取得公鑰,但是使用者的私錄由可信賴的系統中心(TA) 產生。 此外,個人隱私資料的保護在網際網路上是一項相當重要的問題,為 了保護遺囑人«巾請函的個人隱私:雜不被外界取得,在我們設計的系 統中所有在網際網路上傳輸的訊息,均建立在「安全通訊層(ssl)」,確 保用戶端應用程式與Web服務間通訊的安全;由於所採用之基本安全機制 及協定,如洲加_歸章機_已經過正規化安攸明,我們的方 法的安全性是植胁這麵韻败SSL的安紐上,能触全地滿足私 密性資料祕護衫可否認性上:町分別說明我們設計的線上自書遺囑 系統和密封遺囑系統所具備的安全性質。 自書遺囑系統·· 能確認遺囑確實為申請 .⑴確認性:t請函與賴均有韻人的數位簽章, 人所立。 ⑵完整性:对當軸建立、自己的遺囑。 ⑶不可否雛:喊巾請函與賴是經由鋼人的私鍮簽章過,可以使用 5 200834457 公鑰驗証是否為其所立,另外,法院也 私鳞4署申請函,以證實受 理此案件,因此,賴人所立韻具有法律_效力。 密封遺囑系、统:除了具有自書遺喝系統中的 文王注貝·(1)確認性、(2)完整 性(3)不可否認性外,並且滿足機密性。‘ ⑷機密性:使麟稱式金鑰加密賴,他人無法得知遺囑内容。 ψ ^ 【先前技術】 依據我國民法法規條例第-千—狀十六條(_能力)陳述,年滿π 歲:上且未受禁治產宣告的人,在平時就可以立下「生_⑽㈣碰)」, 且是具有法律效力的。預立韻有町五種方式(民法第—千—百八十九 條),凡是符合下列任何一種立遺嘱的方式,皆為具有法律效力的遺囑,遺 囑在遺囑人社時即纽(民法f _千_百九十九條)。 (1)自書遺囑:自書遺囑者,應自書遺囑 曰疋蜀王又,δ己明年、月、日,並親自簽 名,不需要見證人。;如有增減、塗改,應註明增減、塗改之處所及字 數,另行簽名。(民法第一千一百九十條) ⑵綠遺囑:遺囑人須指定二人以上之見證人,在公證人前口述遺囑意 曰’由公證人筆記、宣讀、講解,經遺囑人認可後,記明年、月、日, 由公證人、見證人及遺屬人同行簽名。遺囑人不能簽名者,由公證人將 其事由,使驗騎狀。前項攸公證蚊鶴,在無公證人之 地,传由法院書記官行之,僑民在中華民國領事駐在地為遺喝時,得由 τ!事行之。(民法弟一千一百九十一條) ⑶始、封m囑:遺囑人自行書寫遺囑内容,並記明年月日,親自簽名後,密 200834457 封並於封賴處簽名,指定兩人赴見證人,向公證人提出,陳述其為 自己之遺囑。若不是本人親自書寫,須陳述繕寫人姓名、住所,由公證 人於封面記明提出之年月日及遺囑人所為的陳述,與遺囑人及見證人— 同簽名(民法第-千-百九十一條)。有封緘之遺囑,非在親屬會議當場 或法院公證處,不得開視。前項遺囑開視時應製作紀錄,記明遺囑之封 、緘有無毁損情形,或其他特別情事,並由在場的人同行簽名。200834457 IX. Description of the invention: [Technical field to which the invention pertains] The present invention uses personally identifiable information as a mechanism for publicly establishing a secure online pre-testamentary will system, and using personally identifiable information as its public key. The biggest advantage is that the public key of the 'average' user of the system for the external user is the identity of the user (eg: 'name, email address, positive address, etc.'), so there is no need to check the public key. Effectiveness. This system solves the shortcomings of the public key cryptosystem and the bribery key system, and does not need _ * third party assistance to obtain the public key, but the user's private record is trusted by the system. The center (TA) is produced. In addition, the protection of personal privacy data is a very important issue on the Internet. In order to protect the personal privacy of the wills, the privacy of the complaints is not obtained by the outside world. All of the systems we designed are transmitted over the Internet. The messages are all based on the "secure communication layer (ssl)" to ensure the security of communication between the client application and the web service; due to the basic security mechanisms and agreements adopted, such as the _ _ _ chapter machine _ has been regularized Yan Ming, the security of our method is to protect the face of this rhyme-successful SSL. It can meet the privacy of the secret information. The nickname of the online self-documenting system and Seal the security features of the testament system. Self-book wills system ·· Can confirm that the will is indeed the application. (1) Confirmation: t request letter and Lai have a digital signature of the rhyme, the person established. (2) Integrity: The establishment of the original axis, its own will. (3) Can't be young: Call for a letter and Lai is signed by the private person of the steelman. You can use the 5,034,457 public key to verify whether it is established. In addition, the court also has a private letter to apply for confirmation. The case, therefore, Lai’s rhyme has legal _ effectiveness. Sealed wills and systems: in addition to the self-booking system, Wenwang Note (1) confirmability, (2) integrity (3) non-repudiation, and meet confidentiality. ‘ (4) Confidentiality: The nickname key is encrypted, and others cannot know the will. ψ ^ [Prior Art] According to the National Law of the People's Republic of China, the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the stipulations of the People's Republic of China (10) (4) Touch), and is legally binding. There are five ways to pre-establish the rhyme and the town (the civil law is - thousand - 189), and any method that meets any of the following will be a legally valid will, and the will in the will of the widow is New Zealand (civil law f _ thousand _ hundred ninety-nine). (1) From the will of the book: from the will of the book, it should be from the will of the book. Wang Wang, δ has been signed next year, month, and day, and personally signed, no need to witness. If there is any increase or decrease or alteration, the number of words added and subtracted, altered, and the number of words shall be indicated and signed separately. (1,190 of the Civil Code) (2) Green Will: The testator must designate a witness of more than two persons, and dictate the will of the notary before the notary. 'The notary's notes, read, explain, after the testator's approval, record Next year, month and day, signed by the notary public, witnesses and survivors. If the testator cannot sign, the notary will use the matter to make the ride. The former item, the notarized mosquito crane, was passed to the court clerk in a place without a notary. When the expatriate was stationed in the territory of the Republic of China for the sake of drinking, he had to do it. (1,119 civil law brothers) (3) Beginning and sealing m嘱: The testator writes the content of the will, and remembers the signature of the next month, the signature of the secret 200834457 and signed it at the seal, and designated two people to go. The witness, who presented the notary to the notary, stated that it was his will. If it is not written by the person himself, the name and address of the writer shall be stated, and the notary shall be stated on the cover of the date and the statement of the testator, and the testator and the witness shall be signed together (Civil Law No. - Thousand-Hundred-Nine Eleven). There is a will to be sealed, not at the meeting of the relatives or at the notary of the court. When the will of the preceding paragraph is opened, a record shall be made, the seal of the will, the presence or absence of damage, or other special circumstances shall be recorded and signed by the person present.

⑷代筆« :由朗人蚊三人社的見證人,由韻人口述遺囑意旨 時,由其中-位見證人筆記、宣讀、講解,經遺囑人認可後,記明年月 曰及代筆人躲名,由驗人全體及賴人同時簽名;若賴人不能簽 名者,可按指印替代之。(民法第一千一百九十四條) ⑸口授遺囑:遺囑人因生命垂危或其他特殊情況,不能依其他方式為遺囑 者’可依以下方式口授遺囑:①由遺囑人指定兩人以上的見證人之一, 將其遺囑意旨,據實作成筆記,並記明年月日,與其他見證人共同簽 名;②由遺囑人指定兩人以上的見證人,並口授遺囑意旨、遺囑人姓名 及年、月、日,由全體見證人π述遺囑之絲正及見證人姓名,全部予 从錄音,將錄音帶當場密封,並記明年月日,由全體見證人在封縫處同 行簽名(民法第-千-百九十五條);口授遺囑,自遺囑人能依其他方式 為遺囑之時起三個月失效(民法第一千一百九十六條)。若遺囑人死亡, 應由見證人之-或利害關係人,於死亡後三则内,提親屬會議認定真 偽,如有異議,得聲請法律公正(民法第―千—百九十七條)。 【發明内容】 200834457 *我們的發明共分成二個部份:⑴自書遺屬系統之機制;⑵密封 遺嘱系統之機制,圖-為本發明的流程圖,也是本發明的代表圖。本 發明之目的在於提供-種結合網際網路與f訊安全技術,料線上自 書遺囑系統能封遺«狀_,提供民眾鱗_地上網建立、 修改、刪除或查詢自己糊,藉由我們設計峨降低委託律師的 高成本,以及提昇方便性和安全性,並要求達顺法性,來鼓勵大家 上網預立韻,以驗政賴_在處雖生者遺產科間與流程。 本發明之-,設計自書遺齡統之卿,主妓為了改善傳統預 立自書賴常以書面呈現’軸可料便補人修改賴,但也方便 了有心人事竄改遺囑,因此’本系統希望藉由網際網路結合資訊安全 技術,開發具有法律效力之預立遺囑平台,以信託服務中心的角色保 管遺囑。财在麟網路上傳輸㈣訊,均建立在「安全通訊層 (SSL)」’以建立安全通訊通道,確個戶端顧程式與触服務間通 訊的安全’確實碰辆謂私資韻紐與輕喊的完整性。 傳統預立㈣遺囑必麟於遺囑加以簽名、密封,並於封密缝處 簽名。本發明之三,料的密封遺囑系統之機制,結合網際網路與資 訊安全技術,遺囑人只要對於遺囑進行數位簽章與加密,再指定兩名 以上的見證人對加密後的遺囑背書,請法院公證,即可建立具有法律 效力的密封遺囑,本系統計設的目的在於節省遺囑人委託律師保管遺 囑的成本,與解決將所有關鍵人物聚集一地的困擾。我們使用數位欠 章、對稱式密碼系統與非對稱式密碼系統對遺囑加以保密,所有資訊 δ 200834457 的傳輸均_安全通訊層(SSL)。 密封遺囑系統與自書遺囑系統最大的不同在於密封遺囑系統使用 對稱式加解密演算法對遺囑内容加以保密,並將該對稱式加密金鑰以 身分基礎式公開金鑰加密保存,該對稱式金鑰只有在預定的條件下才 可解開。因此不管是見證人、法院或是惡意攻擊都無法於預設情境(取 知立运囑人之死亡證明)發生前得知遺囑内容。 【實施方式】 本發明所採用的是植基於橢圓曲線及雙線配對之身份基礎式公開 孟錄’其所需之系統參數與符號表示說明如下: 五〇匕):一有限場(finite field)為'的橢圓曲線(elliptic curve)五。 G •為一加法群(additive group),其序(order)為大質數《,其中q為橢 圓曲線五(〇中點集合之子群(subgroup),其生成點(generator^ />。 G2 :序(order)為大質數 g 的乘法群(multiplicative group)。 己:為一雙線性映射(bilinear map)&G1xG1對應至G2,我們可將此映射 表示為,且在此映射e中,離散對數問題在(^和巧皆為 NP-Complete 問題。 :單向雜湊函數(one-way hash function),A :{〇,1}* — q,即輪入為 {〇,$,輸出在q上的一個點。 i/2 ·單向雜凑函數’ :G2 {〇,l},即輸入G2中元素,輸出的字 串0 200834457 δ, ·使用者?之公输,2 :^(使用者身分識別” /MJM):以心這把私密金鑰對訊息#做簽章,簽章演算法可以選 擇採用任一安全的簽章演算法。 /瓜以么驗證夕是否為#的合法簽章。 招芯〜㈣⑹·’做代表身分基礎式公開加密法(id—based public key encryption) ’ ρ^σίΑ代表a的死亡公鑰,其產生方式為以代表a死亡 之文字串(須符合公定袼式)產生其公錄。厕‘,)即代表以A的死 亡公錄對#加密。 以d的死亡私餘解密密文〇 一、i書遺囑系統之機制 整個自書遺囑系統運作流程如圖一(a),以下說明各個步驟處理細節: 系統建置階段(2〇):系統中心(1〇)初始化系統參數 。另外,系統中心(1〇)隨機挑選一個亂數 〜’作為系統中心私鑰,隨後計算系統公錄 ΙΛ ΤΑ 2·-主冊階段(21):遺囑人向系統中心(ι〇)註冊以取得私鑰,首先, 退囑人W將自己之身份識別/〇,(姓名丨丨身份証號丨丨出生年月日丨丨性別), 如姓名、身份証編號、出生年月日、性別等,傳送給系統中心(1〇)。系 、充中心收到7i^後,計算込=A(仍J,隨後計算使用者的私鑰 ζ ,並且透過一個安全的密秘管道(如:义弘)將私錄傳給遺 囑人另外,法院(10)、醫生(13)和醫院(12)或政府單位,也必須 10 200834457 向系統中心註冊以取得私輪;法院的私料醫生的私鍮 心^么/醫院(或政府單位)的私叫'.么·’以及法院的公錄, 以么繼稱)麵。*_公鑰和是法院的名稱或其他足以代 表唯-法院的任何字串文字。醫生的麵,可以是醫紐名和註書字號 的組合,足以識別醫生的任何丰蛊 =//ι(醫生姓名1丨証書字號)表 示。醫院的錢=看梅嶋丨__,可以是醫院的院所代 號或是醫院的住址等,其他足以代表絲特定f院的字串。 3.預立自書遺囑階段(22):遺囑人"祐# 獻域射請函触院提出請 求預立賴,申請函内容包含受文者和申請人資料,待遺立後,載 明年月日,分別於遺囑和申請函上簽章;最後,將遺囑和申請函一起傳 达給法院’她收财請函和遺輕,立即餘遺物請函是否為 當事人所有’如果_實,則於申請函上背書後回傳給遺囑人,以證 明法院己受耻案。射叫後―麵訊妓键找訊層上傳 輸,預立遺囑步驟如下: ’(4) Generation of the pen «: The witness of the Langren Mosquito Three Society, when the rhyme population tells the will, from which the witnesses take notes, read, explain, after the testator's approval, remember the next month's moon and the writer to hide, Signatures are signed by all the examiners and others; if they are not signable, they can be replaced by fingerprints. (1,194 of the Civil Code) (5) The dictation of the will: the testator may not be a testator in other ways because of his dying or other special circumstances. 'The testament may be stipulated in the following ways: 1 The testator appoints two or more persons. One of the witnesses, the will of the will, according to the actual notes, and remember to sign together with other witnesses next month; 2 the testator appointed more than two witnesses, and dictate the will, the name and year of the testator , month, and day, the witnesses of all the witnesses π and the names of the witnesses, all from the recording, the tapes sealed on the spot, and recorded next month, by all witnesses in the seals of the counterparts signed (Civil Law - Thousands - 195); dictating a will, three months from the time when the testator can be a will in other ways (1,196 of the Civil Code). If the testator dies, it shall be determined by the witness's or the interested person in the three post-mortem meetings. If there is any objection, the law will be justified (Civil Law No. - Thousand - 197) . SUMMARY OF THE INVENTION 200834457 * Our invention is divided into two parts: (1) the mechanism of the system of the legacy of the book; (2) the mechanism of sealing the testament system, and the flow chart of the present invention, which is also a representative figure of the present invention. The purpose of the present invention is to provide a combination of the Internet and the security technology of the f-message. The self-booking system can be sealed from the book, and the public can be created, modified, deleted or queried by the Internet. The design reduces the high cost of the attorney, as well as the convenience and safety, and requires compliance with the law, to encourage everyone to pre-establish the rhyme on the Internet, to test the reliance on the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The invention of the present invention is designed from the book of the age of the book. In order to improve the traditional pre-arrangement, the book is presented in the form of a 'axis can be supplemented, but it is also convenient for the person to tamper with the will, so 'this The system hopes to develop a legally valid pre-testamentary willal platform through the use of the Internet in conjunction with information security technology to preserve the will in the role of a trust service center. The transmission of the (four) news on the network is based on the "secure communication layer (SSL)" to establish a secure communication channel, and the security of the communication between the program and the touch service is indeed the case. The integrity of shouting. The traditional pre-establishment (4) will be signed, sealed, and signed at the seal. According to the third aspect of the invention, the mechanism of the sealed testament system of the material, combined with the internet and information security technology, the testator only performs digital signature and encryption on the will, and then designates more than two witnesses to endorse the encrypted will, please The court can establish a legally binding sealed will, and the purpose of this system is to save the cost of the will of the beneficiary to save the will, and to solve the problem of gathering all the key people. We use the digital under-status, symmetric cryptosystem and asymmetric cryptosystem to keep the will confidential. All information δ 200834457 is transmitted as Secure Communication Layer (SSL). The biggest difference between the sealed will system and the self-document will system is that the sealed will system uses the symmetric encryption and decryption algorithm to keep the will content confidential, and the symmetric encryption key is encrypted and stored as the basic public key. The symmetric gold The key can only be unlocked under predetermined conditions. Therefore, no matter whether it is a witness, a court, or a malicious attack, it is impossible to know the content of the will before the occurrence of the pre-set situation (the death certificate of the person who made the trip). [Embodiment] The present invention adopts an identity based on elliptic curve and two-line pairing. The system parameters and symbolic representations required are as follows: 〇匕 〇匕: a finite field For the 'elliptic curve' five. G • is an additive group whose order is a large prime number, where q is an elliptic curve five (subgroup of the midpoint set, which generates a point (generator^ /> G2 : The order is a multiplicative group of large prime numbers g. For a bilinear map & G1xG1 corresponding to G2, we can represent this map as, and in this mapping e, The discrete logarithm problem is both (^ and NP-Complete.: One-way hash function, A :{〇,1}* — q, that is, the round is {〇, $, the output is A point on q. i/2 · One-way hash function ' :G2 {〇,l}, that is, input the element in G2, the output string 0 200834457 δ, · user? public input, 2 :^ (use Identity recognition / MJM: In the heart of the private key to the message # to do the signature, the signature algorithm can choose to use any safe signature algorithm. / Guawei to verify whether the evening is # legal signature Zhang. (4) · ' _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The method is to generate a public record of the text string representing the death of a (should conform to the public stipulation). The toilet ',) means to encrypt the death record of A. # decrypt the ciphertext with the death of d. The mechanism of the book will system The whole process of the system of the testament system is shown in Figure 1 (a). The following describes the details of each step: System construction phase (2〇): System center (1〇) initializes system parameters. In addition, the system center ( 1〇) randomly pick a random number~' as the system center private key, and then calculate the system record ΙΛ ΤΑ 2·- main book stage (21): the testator registers with the system center (ι〇) to obtain the private key, first, The returning person W will identify himself/〇, (name, ID number, date of birth, gender), such as name, ID number, date of birth, gender, etc., to the system center ( 1〇). After receiving the 7i^, the system and the charging center calculate 込=A (still J, then calculate the user's private key ζ, and pass the private record to a secure secret channel (eg, Yihong) The testator, in addition, the court (10), the doctor (13) and the hospital (12) or the government Unit, must also 10 200834457 Register with the system center to obtain the private round; the private doctor of the court's private doctors ^ / hospital (or government unit) privately called '. 么 · ' and the court's public record, to follow *_ Public key is the name of the court or any other string of words that is sufficient to represent the court. The doctor's face can be a combination of the name of the doctor and the size of the note book, enough to identify any of the doctor's words =/ /ι (doctor name 1丨 certificate size) indicates. The hospital's money = see Meilong __, can be the hospital's yard code or the hospital's address, etc., other enough to represent the string of the specific f hospital. 3. Pre-established self-study testament stage (22): The testator's willingness "you# The donation field contact letter is requested by the court. The application letter contains the information of the recipient and the applicant. On the day of the month, sign the will and the application letter respectively; finally, pass the will and the application letter to the court. 'She received the letter and the light, and immediately the remnant request is all the parties'. Then, after the endorsement on the application letter, it will be passed back to the testator to prove that the court has been humiliated. After the shoot, the face-to-face button is uploaded to the search layer. The steps for pre-launch are as follows:

(1)…~"ssl、TA、.L’,S,M,L 遺⑽删祕峨M,㈣請函者 請曰期、申請人之姓名、身一者’ 出生年月日、性別、電子郵件、 聯絡電話^住與戶籍地址、—等親内直系錢,, 囑連結;遺嘱μ内容必須包含 。 月文2i 用私鍮分別ffi m屬文、亚s己明年月日後,遺囑人以 1 簽章和對申請-簽章,取得㈣ =S,卿代錢物嶋圖:u)所示,最後 200834457 rs、从和尤傳送至法院。 TA^lsj~>UA:Ln "-收到运屬人之預立运囑請求與遺囑後,先取得遺囑人之公錄 仏驗w正申凊函和遺囑是否為當事人所有,驗証式為,⑹) 和你5^{^},(从))’若確實為遺囑人所有,法院立即對申請函簽章 1 ’並回覆一份z〃給遺囑人,用以確認法院己受理此案 件,且負責保管遺囑人之遺囑。(1)...~"ssl,TA,.L',S,M,L (10) Delete the secret 峨M, (4) The request is for the deadline, the applicant's name, and the person's birth date, gender , e-mail, contact phone ^ live with the household registration address, - such as the pro-in-house direct money, 嘱 link; the will 嘱 content must be included. In the month 2i, the private texts are ffi m genre, and the singer is next year, the next month, the wills are signed and signed, and (4) =S, Qing dynasty money: u) 200834457 rs, from Hehe to the court. TA^lsj~>UA:Ln "-After receiving the request and will of the prefecture of the transporter, first obtain the testimony of the testator and verify whether the letter and the will are owned by the party. For, (6)) and you 5^{^}, (from)) 'If it is indeed owned by the testator, the court immediately responds to the application letter 1 'and replies a copy to the testator to confirm that the court has accepted this The case is responsible for keeping the will of the testator.

(3)逍囑人收到法院回函後,使用法院公鑰込驗証是否為合法簽 署’驗证式為,證實法院已受理此案件。 退囑人可隨時隨地上網修改遺囑内容,並重復步驟(1)〜(3),即能建立 具有法律效力的遺囑。 4·醫院發行死亡證明書階段⑽:當遺嘱人死亡時,醫生診·生者死因 後’開立數位死亡證明書(death certificate,DC)給其家屬,死亡證 明書上包含醫生簽章y =/5^(DC)和醫院院章簽署 S'/BUDC,),並且將DC、V和π傳給一等親家屬。 5·家屬交遞死亡證明書階段(24):家屬交遞死亡證明書⑺向去 院請求公開往生者遺囑。 6·驗証死亡證明書階段(25):法院驗証死亡證明書上是否有呼生的數_ 章和醫院院章的數位簽署,驗証式分別為仿双 },〇DC))和 娜』〇,队〇),若確實是具有法律效力的死亡證明書,則執 行步驟7.。 ' 12 200834457 7.告知遺囑階段(26):將往生者託付於系統中心保管的遺囑交給其家屬。 -、密封遺囑糸統之機制 整個密封遺囑系統運作流程如圖一(b),以下說明各個步驟處理細節·· 系統建置階段(20) ··與自書遺囑系統之系統建置階段相同。系統中心(TA) 任意選擇一個亂數整數& eZ:,作為系統中心私鑰,隨後計算系統公錄 •P。 2.註冊階段(21) ··與自書遺囑系統之註冊階段相同。遺囑人%公鑰為 好,(仍j,其中仍,(姓名丨丨身份言正號丨丨出生年月日丨丨性別),y向系統 中心註冊以取得私餘,並且透過一個安全的密秘管道(如:规) 將私餘傳給遺囑人%。另外,法院(1G)、醫生⑽和醫院⑽或政府單 位,也必須向系統中心註冊以取得私输;法院的私鍮^ %以醫生的 私鑰心醫院(或政府單位)的私糾ί。以及法院的公 餘,以輸稱)絲。法院的麵可以是法院的名稱或其他足 以代表唯—法院的任何字串文字。醫生的讀,可以是醫生姓名和註書 字號的組合,足以識別醫生的任何字串H(醫生姓雖書字號)表 =醫院的公蚁,醫療院所侧院所地址),可以是醫院的院所代 遗或是醫院的住址等,其他足以代表絲_院的字串。 預立在封运囑階段(3〇):遺囑人" 函肖法院提岭求預立遺 ^ ’待遺囑建立後,細年月日, 屬而要對於逍囑進行數位簽章, 再將退囑及其簽章用對稱式 4統加检,加密的對稱式金鑰再以申請 13 200834457 人的γ公錄加密;將加密過的遺屬、被加密之對稱式金辦中奢子— 起傳送給法院⑽’當魏㈣巾請函和遺囑時,轉敢翻和^ 函是否為當事人财。通過魏料財的驗證後,再通知巾請書上^ 指定二名社繼人⑽物獅;錢貴隨即物函簽 早(見證人謝增函)並峰^人州物:最後,等到 收到正式的壯證败件後;蛾首輯絲賴人社公餘之私(3) After receiving the reply from the court, the deaf person uses the public key of the court to verify whether it is legally signed. The verification is that the court has accepted the case. The returning person can modify the content of the will at any time and anywhere, and repeat steps (1) to (3) to establish a legally valid will. 4. The stage of issuing a death certificate by the hospital (10): When the testator dies, the doctor's diagnosis and the death of the living person 'open a digital death certificate (DC) to the family member, and the death certificate contains the doctor's signature y = /5^(DC) and the hospital chapter sign S'/BUDC,), and pass DC, V and π to the first-class relatives. 5. Family members handing over the death certificate stage (24): The family member handing down the death certificate (7) to the hospital to request the disclosure of the will of the living. 6. Verification of the death certificate stage (25): The court verifies whether there is a number of exhaled birth certificates on the death certificate _ chapter and the number of hospital hospital chapters signed, the verification type is imitation double}, 〇DC)) and Na 〇, Team 〇), if it is indeed a legally valid death certificate, proceed to step 7. ' 12 200834457 7. Inform the will (26): hand over the remains of the survivors to the custody of the system center to their families. - The mechanism for sealing the remains system The operation process of the entire sealed will system is shown in Figure 1 (b). The following describes the details of each step. · System construction phase (20) · The same as the system construction phase of the self-document system. The System Center (TA) arbitrarily selects a random integer & eZ: as the system center private key, and then calculates the system record •P. 2. Registration phase (21) ·· The same as the registration phase of the self-study system. The testator's % public key is good, (still j, which still, (name, identity, positive, birth, date, sex), y registered with the system center to obtain private, and through a secure secret The secret pipeline (eg, regulations) will pass the private money to the testator. In addition, the court (1G), doctor (10) and hospital (10) or government units must also register with the system center to obtain private transfer; The doctor's private key heart hospital (or government unit) private correction. As well as the court's public, to lose the name) silk. The court's face can be the name of the court or any other string of words that is sufficient to represent the court. The doctor's reading can be a combination of the doctor's name and the note size, which is enough to identify any string of doctors (the doctor's name is the book size) = the hospital's public ants, the hospital's side yard address), can be the hospital's The name of the hospital or the hospital's address, etc., other enough to represent the string of silk. Pre-established in the stage of Fengyun (3〇): Wills " Letter to the court of the court to ask for pre-existence ^ After the establishment of the will, the fine year and month, the genus shall be digitally signed for the ,, and then The retreat and its signature are checked by the symmetry type 4, and the encrypted symmetric key is encrypted by the gamma record of the application 13 200834457; the encrypted survivor, the encrypted symmetrical gold is used as a luxury Delivered to the court (10) 'When Wei (four) towel letter and will, turn to dare and ^ letter is the party's wealth. After the verification of Wei Caicai, the notice will be notified to the applicant. 2. Specify the second successor (10) lion; Qian Gui immediately sign the letter early (see witness Xie Zengxin) and peak ^ people state: Finally, wait until the official receipt After the disappointment of the Zhuangzheng;

鍮,接著«賴之對赋麵,再此—_式麵解開遺囑 文。預立密封遺囑步驟如下步驟: (1) K ssl >TA:L,L’,C,IBE (k) QADeath、’ 遺囑人%撰寫申請函Z和遺囑M。其中申請函1内容包含受文者、申 請日期、申請人之姓名、身份註號、出生年月曰、性別、電子郵件、 聯絡電話、居住與戶籍地址、—魏内直系錄、見證人之姓名、身 攸號、出生年月日、性別、電子郵件,以及聯絡方式...等,並與密 文遺囑及加密後錢連結;朗仏㈣⑹内容轉包含遺喝文 0»)並。己月年月日和送囑人的數位簽章(s)。當遺囑人撰寫完申請函 牙囑後首先,使用遺嘱人%之私餘心分對遺嘱似簽章,取得 ,其次,由遺嘱人選取_個亂數μ作為對稱式加密金 錄(/為該軸式加⑽、狀金鑰長度),並觀_式加密演算法對 簽章後的賴加密,得職封賴c=jEi(M);之後,遺_人產生— 把新的公鑰,其中, 姓名丨丨身份註號丨丨出生年月日丨丨見證人!丨丨見證人2丨丨法院名稱丨丨死亡) 14 200834457 ,公鎗U立韻人之社销麵,其對應之立韻人死亡私密 金鑰必須於法敵舰亡朗錢才會產生;最後,射請函丄簽章 以取付L ⑹;此時,申請函與遺屬的關聯如圖二叫所示。最 後’遺囑人U,L、V、C和\Jk)傳送至法院。Hey, then «Lai Zhi on the face, and then - _ style to unlock the will. The steps for pre-standing the remains are as follows: (1) K ssl > TA: L, L', C, IBE (k) QADeath, 'The testator % writes the application letter Z and the will M. The application letter 1 contains the recipient, the date of application, the name of the applicant, the identity note number, the date of birth, the gender, the e-mail, the contact number, the residence and household registration address, the name of Wei Nei, and the name of the witness. , nickname, date of birth, gender, e-mail, and contact information, etc., and linked with the ciphertext wills and encrypted money; recite (4) (6) content to include the slogan 0») and. The date of the month and the number of signatures sent to the deaf (s). After the testator has finished writing the application letter, the first use of the testator's private heart is to sign the will, and then, the testator selects _ a random number μ as the symmetric encryption record (/ for the Axis plus (10), the length of the key), and the _-encryption algorithm is encrypted after the signature, and the job is blocked by c=jEi(M); after that, the _ person generates - the new public key, Among them, the name 丨丨 identity note number 丨丨 birth date 丨丨 witness witness! 丨丨 witness witness 2 丨丨 court name 丨丨 death) 14 200834457, the public gun U Li Yunren's social sales, its corresponding stand The private key of the rhyme death must be generated after the death of the enemy ship; in the end, the letter is signed to pay L (6); at this time, the association between the application letter and the survivor is shown in Figure 2. The last 'testator U, L, V, C and \Jk) was transmitted to the court.

⑵ TA~i^X,Y:L,Lf,C 當法院⑽收到遺囑人(11)之預立遺囑請求與遺囑後,先取得遺囑人 %之公錄α ’驗μ中請函和遺囑是否為當事人所有,驗註式為 娜2,奶从〇)’請求法院將申請函轉送給申請函中指定的見證人 (15) (X 和 γ)。 3丄見證遺囑階段(32) ’:當見證人(⑸收到法院⑽寄來的申請函時,先檢 查自己的個人貧料無誤後,並且向:系統中心註冊取得私鑰,再分別以私 鑰射請函簽章,取得匕碼⑽丨寧)和广气(H),最 後’將f和傳給法院。 3·2·法院告知遺囑人已受理申請階段(33)。此階段,法院以見證人的公錄么 和α驗註簽章#和π的有效性;確實正確無誤後,法院隨即對申請函 4章(見證人已簽章),求得服,並回覆一份厂給 遺囑人,用以確認法院己受理此案件,且負責保管遺囑人之遺囑。當遺 囑人ί/χ收到法院回函後,使用法院公錄仏驗註是否為合法簽署,驗言正 式為7财^认〃},(4",0,*^,5^)),證實法院已受理此案件。 遺囑人可隨時隨地上網修改遺囑内容,並重復步驟3· 〇·〜3· 2•,即能建 立具有法律效力的遺囑。 15 200834457 步驟4·〜6.與自書賴纽步驟4.〜6.相同。 7.告知麵隨⑽:公觀-41)產生相對應的私 ,’使用私鑰乂_取得對稱式金鑰 隨後,使用對稱式金論免解開密文遺囑c,將 往生者所立遺囑交給家屬。 . 【圖式簡單說明】 係丰發明之以身份為基礎的自書遺囑系統流程圖。 二一係本發明之以身份為基礎的密封遺囑系統流程圖。 二二L自書遺囑系統機制之申請函與遺囑的關聯 回一()役封遺囑系統機制之申請函與遺嘱的關聯 【主要元件符號說明】 (10) 法院、公證、系統中心 (11) 遺囑人 (12) 醫院 (13) 醫生 (14) 家屬 (15) 見證人 (20) 系統建置階段 (21) 註冊階段 (22) 預立自書遺囑階段 (23) 發行死亡證明書階段 (24) 遞死亡證明書階段 (25) 驗證死亡證明書階段 (26) 告知遺囑階段 (30) 預立密封遺囑階段 (31) 指定見證人階段 (32) 見證遺囑階段 (33) 告知已受理階段 (40) 參與自書遺囑系統之成員 (41) 參與密封遺囑系統之成員 參與整個系統運作的主要角色如下: •系統中心、(Trusted Auth_ ’ ΤΑ)⑽:主要負責發行個者私鍮、保 16 200834457 管遺囑人的_ ’受理預續齡件。此肖色適合扮魏實生活中的法 院和公證人。以實作峨縣看,可以是_個TA扮衫個角色;也可以 是一個系統中心。 •法院(〇:扮演系統平台提供單位,實作時可依情況與系统中心合併成為 . 單一單位。 •遺囑人:預立遺囑的當事人。 •醫院(H) (12):負責驗fi£病人的死亡與關,並開立死亡證明書給往生 者的家屬。 •醫生⑻(13) ·•負責驗註往生者之死因,並簽署死亡證明書。 •家屬(14):與遺囑人有血緣關係的親人。 •見證人队和%)(15):遺囑人所指定的見證人,用以見證遺囑人續實 立有逍囑。其中,未成年人、禁治產人、繼承人及其配偶或其直系血親、 受遺贈人及其配偶或其直系血親、為公證人或代行公證職務人之同居人 助理人或受僱人,不得為遺囑見證人。 - 我們所設計的遺囑系統中,提及的加解密演算法、數位簽章演算法、 對稱式金鑰密碼機制,以下列符號表示: •舰·以身份為基礎(Identity_based)之加密演算法。傳送者口、要取 得接收者的公鑰Q,即可加密訊息Μ。 · • /叫(及’ κ) ··以身份為基礎(Wentity_based)之解密演算法。接收者口要收 】丄文{足厂},再搭配自己的私餘《,即可取得明文訊息从。 • 任-安全之簽麵算法。傳送者使用自己的私鑰⑽訊息财簽 17 200834457 章。 • /及ST^O^M):相對應於之驗証簽章演算法。接收者收到簽章值夕 和明文Μ後,使用傳送者的公鑰β淦証簽章。 • Α(Μ):對稱式加密演算法。傳送者使用對稱式私密金錄,對訊息Μ加 密0 18(2) TA~i^X, Y:L, Lf, C When the court (10) receives the request and testament of the will of the testator (11), first obtain the public record of the testator's α' testimony and will Whether it is owned by the client, the test is Na 2, and the milk is from 〇) 'Request the court to forward the application letter to the witness (15) (X and γ) specified in the application letter. 3丄 Witness the will (32) ': When the witness ((5) receives the application letter sent by the court (10), first check that his personal poverty is correct, and register with the system center to obtain the private key, and then privately Key shot letter signature, get the weight (10) Suining) and Guangqi (H), and finally 'pass the f and pass it to the court. 3.2.2 The court informed the testator that the application has been accepted (33). At this stage, the court used the witness's public record and the alpha checkmark to sign the validity of the # and π; after the correctness, the court immediately appealed to the application letter 4 (when the witness has signed), and replied A factory is given to the testator to confirm that the court has accepted the case and is responsible for keeping the will of the testator. When the testator ί/χ receives a reply from the court, it uses the court to verify whether the test is legally signed, and the testimony is officially known as 财 ,, (4", 0, *^, 5^)), Confirm that the court has accepted the case. The testator can modify the content of the will at any time and anywhere, and repeat the steps 3· 〇·~3· 2• to establish a legally valid will. 15 200834457 Step 4·~6. Same as Steps 4.~6. 7. Inform the face with (10): Public-41) Generate the corresponding private, 'Use the private key 乂 _ to obtain the symmetric key, then use the symmetrical formula to solve the ciphertext c, and hand over the will of the surviving Family members. [Simple description of the schema] The flow chart of the identity-based self-book wills system of the company. The second is a flow chart of the identity-based sealed will system of the present invention. The relationship between the application letter and the will of the second-two L self-study system mechanism back to one () the relationship between the application letter and the will of the system of the seal of the will system [the description of the main components] (10) Court, notary, system center (11) Wills Person (12) Hospital (13) Doctor (14) Family (15) Witness (20) System establishment stage (21) Registration stage (22) Pre-booking stage (23) Release of death certificate stage (24) The certificate of death certificate (25) The stage of verification of death certificate (26) The stage of notification of will (30) The stage of pre-sealing will (31) The stage of witness identification (32) The stage of witness test (33) The stage of notification (40) Members participating in the self-study system (41) The main roles of members involved in the sealed will system in the operation of the entire system are as follows: • System Center, (Trusted Auth_ ' ΤΑ) (10): Mainly responsible for issuing individual privacy, insurance 16 200834457 People's _ 'accept pre-continued pieces. This color is suitable for the courts and notaries in Wei Shi's life. To see it as a county, it can be a role of a TA; it can also be a system center. • Court (〇: acts as a system platform provider, which can be merged with the system center according to the situation to become a single unit. • Wills: the party who pre-determined the will. • Hospital (H) (12): responsible for the examination of patients The death and the death, and the death certificate is issued to the family of the living. • Doctor (8) (13) · • Responsible for the death of the surviving person and sign the death certificate. • Family (14): Blood relationship with the testator Relatives of the relationship. • Witnesses and %) (15): Witnesses designated by the testator to witness the continued success of the testator. Among them, minors, banned persons, heirs and their spouses or their immediate blood relatives, beneficiaries and their spouses or their immediate blood relatives, notary public or cohabiting assistants or servants on behalf of notary public may not Witness for the testament. - The cryptographic algorithm, digital signature algorithm, and symmetric key cryptosystem mentioned in our testament system are represented by the following symbols: • Shipment-based identity-based encryption algorithm. The sender's port, to obtain the recipient's public key Q, can encrypt the message. · • / called (and ' κ) · · Identity-based (Wentity_based) decryption algorithm. The recipient's mouth needs to receive the 丄文{足厂}, and then with his own private ", you can get the plaintext message from. • Any-safe signature algorithm. The sender uses his private key (10) message to sign 17 200834457. • / and ST^O^M): Corresponding to the verification signature algorithm. After receiving the signature value and the plaintext, the recipient uses the sender's public key β to sign the signature. • Α(Μ): Symmetric encryption algorithm. The sender uses a symmetric private record to encrypt the message. 0 18

Claims (1)

200834457 十、申請專利範圍: ()種^身份為基礎公開金錄密石馬系統(線上遺囑系統,其包含有: 自書遺囑系統之機制與密封遺囑系統之機制。 (-)如巾轉纖圍第㈠項所述—翻身份為基礎公開金输密碼系 統之線上遺囑系統,其參與自書遺囑系統與密封遺囑系統運作的 成員包含有: 1. 系統中心(TAK主要負責發行使用者私鑰、保管遺嘱人的遺 以及受理預立賴餅。此肖色扮演現實生活巾的法院口 公證人。以實作的觀點來看,可以是-個系統中心扮演多個角' 色;也可以是一個系統中心。 2. 醫院和醫生:負責驗絲生者的死亡與死因,並開立死亡證明 書給往生者的家屬。 . 3·遺囑人:預立遺囑的當事人。 ‘ 4·家屬:與遺囑人有血緣關係的親人。 , 5·見證人:遺囑人所指定的見證人,用以見證遺囑人確實立有 囑。 (-)如巾4專利祕第㈠項所述—種以身份域礎公開金输密碼系 統之線上韻彡統,該自書遺齡統的實齡驟為·· 1·系統建置階段。 _2·註冊階段。 3. 預立自書遺囑階段。 4·醫院發行死亡證明書階段。 5·家屬交遞死亡證明書階段。 6·驗証死亡證明書階段。 7·告知遺囑階段。 (四)如巾請專利細第㈠項所述—種以諸為基礎公開金錄密碼系 統之線上遺囑系統,該密封遺囑系統的實施步驟為: 1·系統建置階段。 2·註冊階段。 19 200834457 3·〇 預立密封遺囑階段。 3·1 見證人見證遺囑階段。 3·2 法院告知遺囑人已受理申請階段。 4·醫院發行死亡證明書階段。 5·家屬交遞死亡證明書階段。 6. 驗証死亡證明書階段。 7. 告知遺囑階段。 (五) 如申請專利範圍第(三)項和第(四)項所述自書遺囑系統與密封遺 囑系統之實施步驟1.系統建置階段,系統中心必須針對不同的密. 碼學機制初使化系統參數,並且挑選系統中心私鑰和計算系統中 心公錄。 (六) 如申請專利範圍第(三)項和第(四)項所述自書遺囑系統與密封遺 囑系統之實施步驟2·註冊階段,與申請專利範圍第(二)項^述之 成員,必須找出足以識別個人身份之任何字串或字串組合,作為 自己的公錄,並將公输傳給糸統中心,向系統中心申請私錄,^ 統中心再透過一安全的密秘通道傳送私输。 μ (七) 如申請專利範圍第(三)項所述自書遺囑系統之實施步驟3•預立自 書遺囑階段,此階段遺囑人須填寫預立遺囑申請函向法院提出請 求預立遺囑,申請函内容包含受文者和申請人資料,待遺囑建: 後,载明年明曰,分別於遺囑和申請函上簽章;最後,將遺囑和 申請函一起傳送給法院,當法院收到申請函和遺囑時,立即驗証. 遺囑和申請函是否為當事人所有,如果驗証屬實,則於申請函上 簽旱月書後回傳給遺囑人,以證明法院已受理此案。 ' (八) 如申請專利範圍第(四)項所述密封遺囑系統之實施步驟3〇預立 密封遺囑階段,此階段遺囑人須填寫申請函向法院提出請求預立 遺囑,待遺囑建立後,載明年月日,並指定二名以上之見證人, 分別於退囑和申請函上簽章,並使用對稱式金鑰⑹加密被簽章後 的遺囑明文,最後,將加密過的遺囑和申請函一起傳送給法院, 當法院收到申請函和遺囑時,立即驗証遺囑和申請函是否為g事 20 200834457 人所有。 (九)如申請專利範圍第(八)項所述使用對稱式金鑰④加密被簽章後的 遺囑,使其得到密封遺囑,此階段遺囑人須進一步產生一把新的 死亡公餘來加密對稱式金錄(々)後,一起傳給法院,此死亡公開金 餘為么=尽(叫_),其中,=(姓名丨丨身份証號丨I出生年月曰丨| 見證人1II見證人2丨丨法院名稱丨|死亡),公鑰為立遺囑人之死亡公 開金鑰,其對應之立遺囑人死亡私密金鑰必須於法院收到死亡註 明書後才會產生。 (十)如申晴專利範圍第(四)項所述密封遺囑系統之實施步驟3.1見證 人見證遺囑階段,當見證人收到法院寄來的申請函時,進一步檢 查自己的個人資料無誤與驗證遺囑人的資料後,分別以私錄對申 請函簽章,再將簽章值回傳給系統中心,完成見證遺囑人的遺囑。 (十一)如申請專利範圍第(四)項所述密封遺囑系統之實施步驟3·2法 二二=逍囑人已受理申請階段,此階段,法院以見證人的公鑰馬 也兹早的有效性,若見證人之簽章符合有效性,法院隨即對申言 函簽早’並發文告知遺囑人已受理預立遺爆案件,且負責保管文 -囑。而遺囑人在收到法院之發文時,也必須驗證文的有效性。 (十二)^申請專利範圍第(三)項和第(四)項所述之自書遺囑系統的 封退囑祕之實施轉4·醫院發行壯證明書階段,當遺囑人》 亡時’醫生須診斷往生者死因後,開立數位死亡證明書㈣ certificate)給其家屬。 (nt請專利範圍第(三)項和第(四)項所述之自書遺囑系物 、ii°.糸、、4之貝;步驟5,豕屬交遞死亡證 (十四ff交遞給法院’請求公開往生者賴 封、虫嘱:絲利ί圍弟(二)項和第(四)項所述之自書遺囑系統和^ 步驟6.餘死亡證明書階段,法院進一步齡 去律上疋否有醫姊1眺章峨位絲,若確實是具; 法律政力的社則書,再缺告知辆。 (十五)如中叫專彻㈣(三)項所述之自書遺齡統之實施步驟7.」 200834457 知遺囑階段,將往生者託付於系統中心保管的遺囑交給其家屬。 (十六)如申請專利範圍第(四)項所述密封遺囑系統之實施步驟7·告知 遺囑階段,此階段系統中心針對公鑰=尽(/D )產生相對應 A[)eath =私鑰^^ ,使用私鑰心μ取得加密遺囑的那把對稱式 ' t鑰彻5〜J撕^^)) 4,隨後,使用對稱式金鍮《解開密文 誕囑,將往生者所立遺囑交給家屬。200834457 X. Patent application scope: () Kind of identity-based public gold record secret stone horse system (online will system), which includes: the mechanism of the book testament system and the mechanism of sealing the will system. (-) (1) The online widow system of the identity-based open-access cryptosystem, whose members participate in the operation of the self-dealing system and the sealed will system include: 1. System Center (TAK is mainly responsible for issuing user private keys, custody The will of the widow and the pre-emptive cake. This Shaw plays the court mouth notary of the real life towel. From a practical point of view, it can be a system center playing multiple horns; it can also be a system 2. Hospital and doctor: Responsible for the death and death of the surviving person, and open a death certificate to the family of the survivor. 3. The testator: the party who pre-established the will. '4. Family: with the testator Relatives with blood relationship. 5. Witnesses: Witnesses designated by the testator to witness the testator's possession. (-) As described in the article 4 of the Patent Secrets (1) The online rhyme system of the domain-based public gold-transfer cryptosystem, the age of the self-booking system is 1.····································································· The stage of issuing the death certificate. 5. The stage of returning the death certificate by the family. 6. The stage of verifying the certificate of death. 7. The stage of telling the will. (4) If the case is as described in the patent (1), it is publicly disclosed. The online will system of the Golden Recording Password System, the implementation steps of the sealed will system are: 1. System construction phase 2. Registration phase 19 200834457 3·〇Pre-seal sealed wills stage. 3.1 Witness witnesses the will. 3. 2 The court informed the testator that the application has been accepted. 4. The hospital issued the death certificate. 5. The family passed the death certificate. 6. Verify the death certificate. 7. Tell the will stage. Steps for implementing the self-documentary system and the sealed will system as described in items (3) and (4) of the patent scope 1. During the system construction phase, the system center must first target different confidentiality codes. System parameters, and select the system center private key and the calculation system center. (6) If the application of the patent scope (3) and (4), the implementation of the self-documentary system and the sealed will system 2 In the stage, members of the second paragraph of the patent application scope must find any string or string combination that is sufficient to identify an individual, as their own public record, and pass the public transmission to the SiS Center to the system center. To apply for a private record, the Control Center will then transmit the private transmission through a secure secret channel. μ (7) The implementation steps of the self-book wills system as described in item (3) of the patent application scope. At this stage, the testator must fill in the application form of the pre-supplement and submit a request to the court for the advance will. The application letter contains the information of the recipient and the applicant, and the remains will be built after the next year, respectively, on the will and the application letter. At the end of the process, the will and the application letter are transmitted to the court. When the court receives the application letter and the will, it will be verified immediately. Whether the will and the application letter are owned by the parties, if the verification is true, then Dry month after signing the book back to the testator on your letter to prove that the court has accepted the case. (8) If the implementation procedure of the sealed probate system mentioned in item (4) of the scope of patent application is 3, the probationary stage of the pre-opening seal, the probate at this stage shall fill in the application letter and submit a request to the court for the execution of the will, after the will is established, On the next day of the next month, and designate two or more witnesses, sign the return and application letter respectively, and use the symmetric key (6) to encrypt the signed will, and finally, the encrypted will and application. The letter is sent to the court together. When the court receives the application letter and will, it immediately verifies that the will and the application letter are all owned by the 200828457 person. (9) If the signed will is encrypted using the symmetric key 4 as described in item (8) of the patent application, so that the sealed will is obtained, the testator must further generate a new death reserve to encrypt. After the symmetrical gold record (々), it is passed to the court together. What is the death of the public money? = (called _), where = (name 丨丨 ID number 丨 I birth year 曰丨 | Witness 1II witness The name of the court is 丨|death. The public key is the public key of the death of the testator. The corresponding private key of the death of the testator must be issued after the death notice is received by the court. (10) Steps for the implementation of the sealed probate system as mentioned in item (4) of Shenqing's patent scope 3.1 Witness witnesses the testamentary stage. When the witness receives the application letter sent by the court, he further checks his personal data for correctness and verification. After the information of the testator, the application letter is signed in private, and the signature value is passed back to the system center to complete the will of the testator. (11) Steps for the implementation of the sealed will system as described in item (4) of the scope of application for patents 3·2 Method 2 = The application has been accepted at the application stage. At this stage, the court uses the public key of the witness, Ma Yez The effectiveness, if the witness's signature is valid, the court immediately signed the letter of the application and sent a message to the testator to accept the pre-emptive case, and is responsible for keeping the text. The testator must also verify the validity of the text when he receives the paper issued by the court. (12) ^ The application for the revocation of the self-documentary system described in items (3) and (4) of the scope of patent application is transferred to the 4th stage of the hospital's issuance of the Zhuang certificate, when the testator is dead] The doctor must diagnose the cause of death of the living person and open a digital certificate of death to his family. (nt request the self-booking system, ii°.糸, 4 shells mentioned in items (3) and (4) of the patent scope; step 5, the survivor’s death certificate (fourteen ff handover) To the court's request for the public to go to the living, Lai Feng, Insects: Silky (2) and (4), the self-documentary system and ^Step 6. The death certificate stage, the court goes further Do you have a doctor's advice in the law? If it is indeed a stipulation, the social book of the legal power will no longer inform the vehicle. (15) If it is called the special (4) (3) Steps for the implementation of the book ageing system 7." 200834457 In the process of knowing the will, the wills entrusted to the system center will be handed over to the family members. (16) Implementation of the sealed will system as described in item (4) of the patent application scope Step 7·Inform the will stage, in which the system center generates the corresponding A[)eath = private key ^^ for the public key = (D), and uses the private key μ to obtain the symmetric key of the encrypted will. 5~J tearing ^^)) 4, then, using the symmetrical gold 鍮 "Unlock the cipher birthday, hand over the will of the surviving to the family.
TW96105375A 2007-02-14 2007-02-14 ID-based E-Will system TW200834457A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96105375A TW200834457A (en) 2007-02-14 2007-02-14 ID-based E-Will system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96105375A TW200834457A (en) 2007-02-14 2007-02-14 ID-based E-Will system

Publications (1)

Publication Number Publication Date
TW200834457A true TW200834457A (en) 2008-08-16

Family

ID=44819484

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96105375A TW200834457A (en) 2007-02-14 2007-02-14 ID-based E-Will system

Country Status (1)

Country Link
TW (1) TW200834457A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109859077A (en) * 2017-11-30 2019-06-07 夏彦晖 A kind of information commission transmission method based on network implementations
TWI720934B (en) * 2019-11-01 2021-03-01 華南商業銀行股份有限公司 Encryptable allocation document transmission system
TWI721930B (en) * 2019-11-01 2021-03-11 華南商業銀行股份有限公司 Allocation document transmission system with multiple processing nodes

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109859077A (en) * 2017-11-30 2019-06-07 夏彦晖 A kind of information commission transmission method based on network implementations
TWI720934B (en) * 2019-11-01 2021-03-01 華南商業銀行股份有限公司 Encryptable allocation document transmission system
TWI721930B (en) * 2019-11-01 2021-03-11 華南商業銀行股份有限公司 Allocation document transmission system with multiple processing nodes

Similar Documents

Publication Publication Date Title
US20200374129A1 (en) Systems and methods for creating a digital id record and methods of using thereof
US10887098B2 (en) System for digital identity authentication and methods of use
US11463423B2 (en) System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
US20190149328A1 (en) System for digital identity authentication and methods of use
Pramanik et al. Security and privacy in remote healthcare: Issues, solutions, and standards
US9166986B1 (en) Witnessing documents
TW201031169A (en) Network reputation system and its controlling method
US20180254093A1 (en) Cryptographically secure medical test data distribution system using smart testing/diagnostic devices
CN106295393A (en) Electronic prescription operational approach, Apparatus and system
TW200421815A (en) Methods, apparatus and computer programs for generating and/or using conditional electronic signatures and/or for reporting status changes
US20200213302A1 (en) Providing verified claims of user identity
WO2020212420A1 (en) Methods and systems for enhancing network privacy of multiple party documents on distributed ledger- based networks
US20220005039A1 (en) Delegation method and delegation request managing method
CN110189184A (en) A kind of electronic invoice storage method and device
TW200834457A (en) ID-based E-Will system
Parthasarathy et al. Secure distributed medical record storage using blockchain and emergency sharing using multi-party computation
Posch et al. Secure and privacy-preserving eGovernment—best practice Austria
TWI456966B (en) Method for providing social network service using privacy homomorphism cryptography
US20230132554A1 (en) System and method to enable pki- and pmi-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means - added
KR20070108996A (en) System for making a will using internet communication and method thereof
TWI414167B (en) A method of establishing a will and a heir's will on a line based on a secret sharing mechanism
CA2915796C (en) A system and method employed for accessing personal data after demise of a subscriber
ES2635602T3 (en) System, method, server and computer-readable medium for real-time verification of a member status of an organization
ES2681873T3 (en) Procedure and device for the personalized electronic signature of a document and software product
US20150207787A1 (en) Techniques for secure data transactions