US20190372782A1 - Data Certification Device, Non-transitory Computer-readable Medium, and Method Therefor - Google Patents
Data Certification Device, Non-transitory Computer-readable Medium, and Method Therefor Download PDFInfo
- Publication number
- US20190372782A1 US20190372782A1 US16/543,847 US201916543847A US2019372782A1 US 20190372782 A1 US20190372782 A1 US 20190372782A1 US 201916543847 A US201916543847 A US 201916543847A US 2019372782 A1 US2019372782 A1 US 2019372782A1
- Authority
- US
- United States
- Prior art keywords
- file
- time
- data
- date
- certification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the present disclosure relates to a digital data content certification system that, for certifying contents of digital data of a client, first creates a certificate file in which predetermined items are described, attaches the digital data that is the original thereto, and further provides the certificate file with date and time certification information to obtain final certification of the contents.
- a certified date from a notary public is used to objectively prove that a paper medium existed at a certain time point. This is because a claim of the existence of the paper medium made by the owner thereof himself/herself, even if he/she has made any, is not reliable and intervention by a trusted third party is therefore necessary.
- Patent Literature 1 discloses a technology for realizing an electronic notary service.
- a digital signature (131) of a consumer of a notary service and additional information (132) are added to electronic data (130) for which the notary service is desired, a digital signature (133) of an authorizer at a notary center is further added thereto to obtain the resulting data in an integrated state as certified electronic data (141).
- the electronic data (130) that used to be the original have become non-identical to the original electronic data. Since data for which certification is required are the original data before being modified, it is like putting the cart before the horse that the original data have to be modified for certification.
- the additional information (132) contains the date, the authorizer, the authorized content, etc., and serves as a certificate of the electronic data (130), but a certificate should essentially be independent of the subject to be certified thereby and is not supposed to be added to data to be certified.
- Patent Literature 1 Japanese Patent Application Laid-Open No. 2002-49590 (paragraphs [0016], [0028] and FIG. 6, etc.).
- An object is to solve a problem that digital data to be certified are modified for certification.
- the original data part and the certificate part are independent of each other and cannot be altered, and there is no room for doubt about the relation therebetween. It is an object of the present invention to realize such a certification method even for a case where the original is digital data.
- Original data Digital data to be certified will be hereinafter referred to as “original data”.
- an aspect of the invention according to claim 1 is a digital data content certification system realized by a data certification device connected to a user terminal and a time-stamping device in a manner capable of communication therewith, the data certification device including: original data receiving means; intermediate file creating means; time-stamp requesting means; date and time certification information acquiring means; certified file creating means; and certified file transmitting means.
- the original data receiving means receives digital data (for example, contents such as various contracts, still pictures and moving pictures) to be certified from the user terminal.
- digital data for example, contents such as various contracts, still pictures and moving pictures
- the intermediate file creating means creates a certificate file for proving existence of the original data and attaches the original data to the certificate file to create an uncertified file, that is, an intermediate file.
- the time-stamp requesting means transmits the intermediate file to the time-stamping device.
- the date and time certification information acquiring means receives date and time certification information containing a hash value and date and time information of the intermediate file from the time-stamping device.
- the certified file creating means embeds the received date and time certification information into the intermediate file to create a certified file.
- the certified file transmitting means transmits the certified file to the user terminal.
- the “intermediate file” is one file having areas in which an arbitrary number of pieces of original data are stored in addition to the certificate file provided with areas capable of storing the date of receipt of the original data (including the date of receipt of the original data and the date of creation of the intermediate file), the data name (such as the file name of the original data), and items such as items input by the user and having these information pieces described therein.
- the term “to attach” is used to express to add and store one or more pieces of original data in one file (to make one file contain one or more pieces of original data) in the present specification.
- the original data attached to the intermediate file are not altered at all. This is essential for a system for content certification.
- the number of pieces of original data attached in one file may be more than one.
- data created by spreadsheet software, data created by word processing software, and data created by graphics software, for example can be attached in one file. This greatly improves the convenience.
- the “certified file” is a file obtained by embedding the date and time certification information into the “intermediate file”, and saved at the user terminal side for future needs.
- “To embed” means to write into a predetermined location in the intermediate file. For example, if the format of the intermediate file is the PDF, the date and time certification information is a kind of file attribute information and written in a signature block that cannot be overwritten.
- the “date and time information” is information representing the date and the time of receipt of a request for content certification of the original data, or like information.
- the “date and time certification information” contains the date and time information and a hash value, and also additional information where necessary.
- the hash value is obtained by feeding the intermediate file into a predetermined hash function.
- the date and time information can certify the time period for which the original data have existed, and the hash value can prove that the original data and the certificate to which the original data are attached have not been altered at least for this time period.
- the date and time certification information is preferably encrypted by an encryption key of the time-stamping device. That is, the public key system is also introduced to enhance the security.
- the intermediate file created by the data certification device is a file employing a format of integrated management such as the PDF (portable document format), and can be compared to an envelope in which the original to be certified is enclosed and on the front side of which the certificate is written.
- the original inside the envelope is not altered at all.
- the certified file can be compared to the envelope with the original inside being affixed with a seal of a notary public. This seal serves as certification of both the original inside the envelope and the certificate on the front of the envelope at the same time; likewise, the date and time certification information according to the present invention also certifies the original data and the certificate at the same time.
- the time-stamping device calculates the hash value of the intermediate file instead of the original data piece itself. This allows certification as to whether or not the original data and the certificate have been altered at the same time.
- the time-stamp requesting means may feed the intermediate file into a predetermined hash function to calculate a hash value and transmit the calculated hash value in place of the intermediate file to the time-stamping device.
- This option may be determined automatically or by an instruction from the user.
- a computer that operates as the data certification device according to claim 1 or 2 , a computer program making a computer operate as the data certification device, and a method for certifying a content of original data by using the system according to claim 1 or 2 also achieve the object of the present invention.
- an information processing device used by a user attempting to have a content of original data certified, that directly accesses the time-stamping device, that is, a user terminal that also serves as the “data certification device” according to claim 1 or 2 also achieves the object of the present invention.
- the original data, the certificate thereof, and the date and time certification information thereof (containing a time-stamp, the original data, and the hash value of the certificate) are integrated, the original data to be certified and the certificate can be verified at the same time.
- FIG. 1 is a diagram illustrating an exemplary system configuration according to a first embodiment.
- FIG. 2 is a diagram illustrating exemplary functional blocks of a data certification device of the system according to the first embodiment.
- FIG. 3 is a flowchart illustrating an outline of processes of the system according to the first embodiment.
- FIG. 4 is a diagram for explaining procedures for creating a certified file of original data in the system according to the first embodiment.
- FIG. 5 is a diagram illustrating an exemplary system configuration of a system according to a second embodiment.
- FIG. 6 is a diagram illustrating exemplary functional blocks of a user terminal in the system according to the second embodiment.
- FIG. 1 illustrates an exemplary system configuration according to the present embodiment.
- a data certification device 1 is connected to a user terminal 2 and a time-stamping device 3 via the Internet N.
- the user terminal 2 is used by a user who attempts to have a content of digital data (original data) certified by using the system according to the present embodiment, and may be a mobile phone or a PDA as long as the user terminal 2 has a function of connecting to the Internet. Since, however, creation and update of original data are assumed, a computer installed with an image processing program and a document preparation program is preferable. Although only one user terminal 2 is illustrated in FIG. 1 , the number of user terminals is not limited.
- the time-stamping device 3 is an information processing unit that generates date and time certification information and returns the generated date and time certification information to the data certification device 1 in response to a request from the data certification device 1 .
- the time-stamping device 3 is an information processing device used by the provider for providing the service.
- the data certification device 1 is an information processing device that first creates a certificate file for original data to be certified, then attaches the original data to the certificate file to create an intermediate file integrating the original data and the certificate file, and finally embeds date and time certification information to create a certified file. Although only one data certification device 1 is illustrated in FIG. 1 , the processing is not necessarily performed by one device but may be performed by a plurality of information processing devices in cooperation.
- the data certification device 1 includes a storage unit 4 and a processing unit 5 .
- the storage unit 4 stores computer programs for causing a computer to function as the data certification device 1 , and work data, parameters, web data and the like in the process of processing. In a case where the person who can use this system is limited to registered users, the storage unit 4 also stores personal information of the registered users and the like as necessary.
- the processing unit 5 includes original data receiving means 6 , intermediate file creating means 7 , time-stamp requesting means 8 , date and time certification information acquiring means 9 , certified file creating means 10 , certified file transmitting means 11 and other processing means.
- the data certification device 1 also includes input/output means such as a keyboard and a display, drivers, and a communication interface unit 12 capable of communication with the user terminal 2 and the time-stamping device 3 via a communication network.
- input/output means such as a keyboard and a display, drivers, and a communication interface unit 12 capable of communication with the user terminal 2 and the time-stamping device 3 via a communication network.
- the original data receiving means 6 receives an arbitrary number, which is one or more, of pieces of original data to be certified from the user terminal 2 .
- the intermediate file creating means 7 first creates a certificate file for proving existence of the original data, and then attaches the original data without any modification to create an intermediate file.
- the certificate may be in any format as long as the certificate has description of items such as the date and time of receipt of a file, a file name and the like that are assumed to be necessary.
- the time-stamp requesting means 8 transmits the received original data to the time-stamping device 3 .
- the date and time certification information acquiring means 9 receives date and time certification information from the time-stamping device 3 .
- the certified file creating means 10 embeds the received date and time certification information into the intermediate file to create a certified file.
- the certified file transmitting means 11 transmits the created certified file to the user terminal 2 .
- the original data receiving means 6 receives original data D from the user terminal 2 via the Internet N and the interface unit 12 (step S 1 ). Since information identifying a user and the like are also transmitted from the user terminal 2 , necessary information for user management, billing and the like is registered as appropriate in the storage unit 4 . This will be described in detail later.
- the intermediate file creating means 7 creates a certificate file F 1 containing the date and time of receipt of the original data D, etc., as items described therein, attach the original data D to the certificate file F 1 to create an intermediate file F 2 (step S 2 ).
- the time-stamp requesting means 8 transmits the intermediate file F 2 to the time-stamping device 3 (step S 3 ). It is assumed that the data certification device 1 has performed in advance predetermined procedures such as registration for receiving the service provided by the time-stamping device 3 . Since the data certification device 1 is one user among a number of users for the time-stamping device 3 , there has to be certain authentication means established therebetween.
- the time-stamping device 3 generates date and time certification information C to be provided to the received intermediate file F 2 (step S 4 ). As illustrated in FIG. 4 , the time-stamping device 3 feeds the received intermediate file F 2 into a predetermined hash function to calculate a hash value H. What is characteristic here is that a hash value of the original data D is not calculated but a hash value of the intermediate file F 2 obtained by attaching the original data D to the certificate F 1 is calculated. As a result, this is virtually the same as affixing one certification seal to the original data D and the certificate F 1 at the same time. In addition, the time-stamping device 3 requests a predetermined time certification authority to issue a time-stamp TS.
- the time-stamp TS corresponds to the time of receipt of the intermediate file F 2 or the like.
- the time-stamp TS in the system according to the present embodiment corresponds to the “date and time information” in claim 1 , and the hash value H and other additional information are included therein to generate date and time certification information C.
- the additional information can include certificates of the time certification authority, the time-stamping device 3 or the like in addition to hash values. Since the date and time certification information C may be any information that contains at least the time-stamp TS and the hash value H and the additional information is not essential, the date and time certification information C may be determined taking the convenience, etc., into account.
- the time-stamping device 3 transmits the date and time certification information C (step S 5 ), and the date and time certification information acquiring means 9 receives the transmitted date and time certification information C.
- the certified file creating means 10 embeds the date and time certification information C into the intermediate file F 2 to create a certified file F 3 (step S 6 ).
- the method for embedding the date and time certification information C is according to known file formats such as the PDF and detailed description thereof will not be provided.
- file creation software for the PDF or the like may be added using a computer program for embedding the date and time certification information C as necessary as plug-in.
- the certified file transmitting means 11 transmits the created certified file F 3 to the user terminal 2 (step S 7 ).
- the PDF is optimal for the format of the files F 2 and F 3 at the time of filing of the present application.
- the original data D is attached in the body of the file and the date and time certification information C is written in a signature block.
- a file in the PDF is characterized in that data written in the signature block cannot be altered or deleted. The fact that the date and time certification information C has not been altered later is thus reliable.
- an arbitrary number, which is one or more, of pieces of original data can be attached in the file F 2 .
- the file formats in which individual pieces of original data are stored are not limited, it is possible to attach a file created by wordprocessing software such as WORD (product name of Microsoft Corporation) and an image file in the GIF, for example, can be attached to one certificate F 1 without changing the file formats.
- WORD product name of Microsoft Corporation
- the feature that the certified file F 3 can be created without changing the file formats of the original data is also one of characteristics of the present invention.
- a plurality of methods can be considered as to the method for verification to be used by the user who has received the certified file F 3 when content certification of the attached data D is necessary. Only one example thereof is provided here.
- the data certification device 1 or the time-stamping device 3 creates software for verifying the certified file F 3 in advance and also transmits the software when transmitting the certified file F 3 from the data certification device 1 to the user terminal 2 .
- This software has the following functions:
- the software has a constant number as a public key and extracts hash value by decrypting the date and time certification information C with the public key.
- the present embodiment Since the certificate F 1 describing the date, the data name and the like of the original data is created, the present embodiment has the following advantageous effect.
- the date and time certification information C is often embedded in an encrypted state into a signature block of the certified file F 3 . In this case, even the owner of the certified file F 3 cannot immediately know the date and time. Since, however, the date and time are also described in plain text in the certificate F 1 , the date and time can be immediately known by reference thereto. Both the security and the convenience are satisfied.
- the second embodiment is different from the first embodiment in that a user terminal 20 has the role of the data certification device 1 in the first embodiment.
- the difference from the first embodiment will be mainly described below.
- FIG. 5 illustrates an exemplary system configuration according to the present embodiment.
- An arbitrary number of user terminals 20 are connected to the time-stamping device 3 via the Internet N.
- the user terminal 20 includes a storage unit 21 and a processing unit 22 .
- the storage unit 21 stores original data to be certified, various computer programs, work data in the process of processing, and the like.
- the processing unit 22 includes intermediate file creating means 24 , time-stamp requesting means 25 , date and time certification information acquiring means 26 , certified file creating means 27 , and other processing means.
- the respective means are implemented by hardware or software according to the functions thereof.
- the CPU executes computer programs stored in storage means such as a ROM and a hard disk. Since these are known matters, the description thereof will not be provided.
- Computer programs for causing the user terminal 20 perform various processes for content certification are distributed by an operator of the system according to the present invention.
- the system administrator installs the data certification device 1 for himself/herself and executes the content certification service in response to a request from the user terminal 2 .
- the system operator may distribute computer programs to users instead of operating and managing the data certification device.
- the user terminal 20 also includes input/output means such as a keyboard and a display, drivers, and a communication interface unit 23 capable of communication with the time-stamping device 3 via a communication network.
- input/output means such as a keyboard and a display, drivers, and a communication interface unit 23 capable of communication with the time-stamping device 3 via a communication network.
- the intermediate file creating means 24 creates a certificate file F 1 that proves the existence of original data D, and attaches the original data D to the certificate file F 1 to create an intermediate file F 2 .
- the time-stamp requesting means 25 transmits the intermediate file F 2 to the time-stamping device 3 .
- the date and time certification information acquiring means 26 receives date and time certification information C from the time-stamping device 3 .
- the certified file creating means 27 embeds the received date and time certification information C into the intermediate file F 2 to create a certified file F 3 .
- the methods and the like for generating the date and time certification information C by the time-stamping device 3 and for verifying the certified file F 3 are similar to those in the first embodiment.
- the data certification device 1 transmits the intermediate file F 2 containing the original data D in an integrated manner without any change to the time-stamping device 3 .
- a hash value may be calculated from the intermediate file F 2 at the data certification device 1 and only the hash value may be transmitted to the time-stamping device 3 instead of the intermediate file F 2 itself.
- the hash vale instead of the original data is transmitted to the time-stamping device 3 , and date and time certification information is generated.
- the data certification device 1 then embeds the date and time certification information received from the time-stamping device 3 into the intermediate file to generate a certified file, and transmits the certified file to the user terminal.
- information necessary for generation of the date and time certification information C may be transmitted to the time-stamping device 3 in any manner as long as necessary information is transmitted thereto.
- the certified file F 3 is transmitted from the data certification device 1 to the user terminal 2 .
- the certified file F 3 need not necessarily be transmitted to the user terminal 2 .
- the certified file F 3 may be saved in a device (the data certification device 1 can be considered but the device is not limited thereto and may be a database server or the like connected to the data certification device 1 in a manner capable of communication therewith) that can be accessed by the user terminal 2 via the Internet N, and may be made available each time a request is made by the user terminal 2 .
- the user can easily receive content certification for original data regardless of the file formats in which the data are stored. It is anticipated that various documents will be increasingly shifted from conventional paper media to digital data, and much demand for the present invention is expected as a system and a method for providing certification of contents of digital data in an easy and reliable manner. Note that the term “easy” not only refers to the easiness of user operation but also means that “a large-scale organization for operation is not needed”.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
A file is created in which digital data and a certificate are integrated and content authentication for the digital data and the certificate are performed simultaneously. A data authentication device (1) is provided with: an original data receiving means which is communicably connected to a user terminal (2) and a timestamp provision device (3), and receives original data to be authenticated from the user terminal (2); an intermediate file creation means which creates an authentication file corresponding to the original data, and attaches the actual original data to the authentication file to create an intermediate file; a timestamp request means which transmits the intermediate file to the timestamp provision device (3); a date/time security information acquisition means which receives from the timestamp provision device (3) date/time security information containing date/time information and a hash value for the intermediate file; an authenticated file creation means which embeds the received date/time security information in the intermediate file and creates an authenticated file; and an authenticated file transmission means which transmits the authenticated file to the user terminal (2)
Description
- The present disclosure relates to a digital data content certification system that, for certifying contents of digital data of a client, first creates a certificate file in which predetermined items are described, attaches the digital data that is the original thereto, and further provides the certificate file with date and time certification information to obtain final certification of the contents.
- A certified date from a notary public is used to objectively prove that a paper medium existed at a certain time point. This is because a claim of the existence of the paper medium made by the owner thereof himself/herself, even if he/she has made any, is not reliable and intervention by a trusted third party is therefore necessary.
- In the meantime, various documents are recently more and more often created by information processing devices such as computers, and there has been an increasing demand for having the creation time and the content of created digital data certified by a third party. Under such existing circumstances,
Patent Literature 1 discloses a technology for realizing an electronic notary service. - According to the description in paragraph [0026] of
Patent Literature 1, a digital signature (131) of a consumer of a notary service and additional information (132) are added to electronic data (130) for which the notary service is desired, a digital signature (133) of an authorizer at a notary center is further added thereto to obtain the resulting data in an integrated state as certified electronic data (141). As a result of adding the digital signature (131), etc., in this manner, the electronic data (130) that used to be the original have become non-identical to the original electronic data. Since data for which certification is required are the original data before being modified, it is like putting the cart before the horse that the original data have to be modified for certification. Moreover, the additional information (132) contains the date, the authorizer, the authorized content, etc., and serves as a certificate of the electronic data (130), but a certificate should essentially be independent of the subject to be certified thereby and is not supposed to be added to data to be certified. - Patent Literature 1: Japanese Patent Application Laid-Open No. 2002-49590 (paragraphs [0016], [0028] and FIG. 6, etc.).
- An object is to solve a problem that digital data to be certified are modified for certification.
- With the method of certifying a paper medium with a seal, the original data part and the certificate part are independent of each other and cannot be altered, and there is no room for doubt about the relation therebetween. It is an object of the present invention to realize such a certification method even for a case where the original is digital data.
- Digital data to be certified will be hereinafter referred to as “original data”.
- In order to achieve the aforementioned object, an aspect of the invention according to
claim 1 is a digital data content certification system realized by a data certification device connected to a user terminal and a time-stamping device in a manner capable of communication therewith, the data certification device including: original data receiving means; intermediate file creating means; time-stamp requesting means; date and time certification information acquiring means; certified file creating means; and certified file transmitting means. - The original data receiving means receives digital data (for example, contents such as various contracts, still pictures and moving pictures) to be certified from the user terminal.
- The intermediate file creating means creates a certificate file for proving existence of the original data and attaches the original data to the certificate file to create an uncertified file, that is, an intermediate file.
- The time-stamp requesting means transmits the intermediate file to the time-stamping device.
- The date and time certification information acquiring means receives date and time certification information containing a hash value and date and time information of the intermediate file from the time-stamping device.
- The certified file creating means embeds the received date and time certification information into the intermediate file to create a certified file.
- The certified file transmitting means transmits the certified file to the user terminal.
- The “intermediate file” is one file having areas in which an arbitrary number of pieces of original data are stored in addition to the certificate file provided with areas capable of storing the date of receipt of the original data (including the date of receipt of the original data and the date of creation of the intermediate file), the data name (such as the file name of the original data), and items such as items input by the user and having these information pieces described therein. Note that the term “to attach” is used to express to add and store one or more pieces of original data in one file (to make one file contain one or more pieces of original data) in the present specification.
- The original data attached to the intermediate file are not altered at all. This is essential for a system for content certification. The number of pieces of original data attached in one file may be more than one. Thus, data created by spreadsheet software, data created by word processing software, and data created by graphics software, for example, can be attached in one file. This greatly improves the convenience.
- The “certified file” is a file obtained by embedding the date and time certification information into the “intermediate file”, and saved at the user terminal side for future needs. “To embed” means to write into a predetermined location in the intermediate file. For example, if the format of the intermediate file is the PDF, the date and time certification information is a kind of file attribute information and written in a signature block that cannot be overwritten.
- The “date and time information” is information representing the date and the time of receipt of a request for content certification of the original data, or like information.
- The “date and time certification information” contains the date and time information and a hash value, and also additional information where necessary.
- The hash value is obtained by feeding the intermediate file into a predetermined hash function.
- In this manner, the date and time information can certify the time period for which the original data have existed, and the hash value can prove that the original data and the certificate to which the original data are attached have not been altered at least for this time period.
- The date and time certification information is preferably encrypted by an encryption key of the time-stamping device. That is, the public key system is also introduced to enhance the security.
- The intermediate file created by the data certification device is a file employing a format of integrated management such as the PDF (portable document format), and can be compared to an envelope in which the original to be certified is enclosed and on the front side of which the certificate is written. The original inside the envelope is not altered at all. The certified file can be compared to the envelope with the original inside being affixed with a seal of a notary public. This seal serves as certification of both the original inside the envelope and the certificate on the front of the envelope at the same time; likewise, the date and time certification information according to the present invention also certifies the original data and the certificate at the same time.
- The time-stamping device calculates the hash value of the intermediate file instead of the original data piece itself. This allows certification as to whether or not the original data and the certificate have been altered at the same time.
- If it is certified whether alteration has been made separately for the original data and the certificate, the relation between the original data and the certificate has to be additionally certified. In the present invention, however, there is no room for doubt about the relation therebetween.
- In order to achieve the aforementioned object, the time-stamp requesting means may feed the intermediate file into a predetermined hash function to calculate a hash value and transmit the calculated hash value in place of the intermediate file to the time-stamping device.
- This allows processing without delay even when the intermediate file is large in size.
- This option may be determined automatically or by an instruction from the user.
- A computer that operates as the data certification device according to
claim claim - In addition, an information processing device, used by a user attempting to have a content of original data certified, that directly accesses the time-stamping device, that is, a user terminal that also serves as the “data certification device” according to
claim - Since the original data, the certificate thereof, and the date and time certification information thereof (containing a time-stamp, the original data, and the hash value of the certificate) are integrated, the original data to be certified and the certificate can be verified at the same time.
-
FIG. 1 is a diagram illustrating an exemplary system configuration according to a first embodiment. -
FIG. 2 is a diagram illustrating exemplary functional blocks of a data certification device of the system according to the first embodiment. -
FIG. 3 is a flowchart illustrating an outline of processes of the system according to the first embodiment. -
FIG. 4 is a diagram for explaining procedures for creating a certified file of original data in the system according to the first embodiment. -
FIG. 5 is a diagram illustrating an exemplary system configuration of a system according to a second embodiment. -
FIG. 6 is a diagram illustrating exemplary functional blocks of a user terminal in the system according to the second embodiment. -
FIG. 1 illustrates an exemplary system configuration according to the present embodiment. - A
data certification device 1 is connected to auser terminal 2 and a time-stamping device 3 via the Internet N. - The
user terminal 2 is used by a user who attempts to have a content of digital data (original data) certified by using the system according to the present embodiment, and may be a mobile phone or a PDA as long as theuser terminal 2 has a function of connecting to the Internet. Since, however, creation and update of original data are assumed, a computer installed with an image processing program and a document preparation program is preferable. Although only oneuser terminal 2 is illustrated inFIG. 1 , the number of user terminals is not limited. - The time-
stamping device 3 is an information processing unit that generates date and time certification information and returns the generated date and time certification information to thedata certification device 1 in response to a request from thedata certification device 1. In the system according to the present embodiment, since the service of an existing provider of time-stamping service is used, if there is any, the time-stamping device 3 is an information processing device used by the provider for providing the service. - The
data certification device 1 is an information processing device that first creates a certificate file for original data to be certified, then attaches the original data to the certificate file to create an intermediate file integrating the original data and the certificate file, and finally embeds date and time certification information to create a certified file. Although only onedata certification device 1 is illustrated inFIG. 1 , the processing is not necessarily performed by one device but may be performed by a plurality of information processing devices in cooperation. - Next, the configuration of the
data certification device 1 will be described with reference to a block diagram ofFIG. 2 . - The
data certification device 1 includes astorage unit 4 and aprocessing unit 5. - The
storage unit 4 stores computer programs for causing a computer to function as thedata certification device 1, and work data, parameters, web data and the like in the process of processing. In a case where the person who can use this system is limited to registered users, thestorage unit 4 also stores personal information of the registered users and the like as necessary. - The
processing unit 5 includes original data receiving means 6, intermediatefile creating means 7, time-stamp requesting means 8, date and time certificationinformation acquiring means 9, certifiedfile creating means 10, certified file transmitting means 11 and other processing means. - Note that the classification of these means is merely for the convenience of description. The respective means are implemented by hardware or software according to the functions thereof. When the means are implemented by software, the CPU executes computer programs stored in storage means such as a ROM and a hard disk. Since these are known matters, the description thereof will not be provided.
- The
data certification device 1 also includes input/output means such as a keyboard and a display, drivers, and acommunication interface unit 12 capable of communication with theuser terminal 2 and the time-stamping device 3 via a communication network. - The original data receiving means 6 receives an arbitrary number, which is one or more, of pieces of original data to be certified from the
user terminal 2. - The intermediate
file creating means 7 first creates a certificate file for proving existence of the original data, and then attaches the original data without any modification to create an intermediate file. The certificate may be in any format as long as the certificate has description of items such as the date and time of receipt of a file, a file name and the like that are assumed to be necessary. - The time-
stamp requesting means 8 transmits the received original data to the time-stamping device 3. - The date and time certification
information acquiring means 9 receives date and time certification information from the time-stamping device 3. - The certified
file creating means 10 embeds the received date and time certification information into the intermediate file to create a certified file. - The certified file transmitting means 11 transmits the created certified file to the
user terminal 2. - Next, operation of the system according to the present embodiment will be described in detail with reference to
FIG. 3 . - The original data receiving means 6 receives original data D from the
user terminal 2 via the Internet N and the interface unit 12 (step S1). Since information identifying a user and the like are also transmitted from theuser terminal 2, necessary information for user management, billing and the like is registered as appropriate in thestorage unit 4. This will be described in detail later. - The intermediate
file creating means 7 creates a certificate file F1 containing the date and time of receipt of the original data D, etc., as items described therein, attach the original data D to the certificate file F1 to create an intermediate file F2 (step S2). - The time-
stamp requesting means 8 transmits the intermediate file F2 to the time-stamping device 3 (step S3). It is assumed that thedata certification device 1 has performed in advance predetermined procedures such as registration for receiving the service provided by the time-stamping device 3. Since thedata certification device 1 is one user among a number of users for the time-stamping device 3, there has to be certain authentication means established therebetween. - The time-
stamping device 3 generates date and time certification information C to be provided to the received intermediate file F2 (step S4). As illustrated inFIG. 4 , the time-stamping device 3 feeds the received intermediate file F2 into a predetermined hash function to calculate a hash value H. What is characteristic here is that a hash value of the original data D is not calculated but a hash value of the intermediate file F2 obtained by attaching the original data D to the certificate F1 is calculated. As a result, this is virtually the same as affixing one certification seal to the original data D and the certificate F1 at the same time. In addition, the time-stamping device 3 requests a predetermined time certification authority to issue a time-stamp TS. The time-stamp TS corresponds to the time of receipt of the intermediate file F2 or the like. The time-stamp TS in the system according to the present embodiment corresponds to the “date and time information” inclaim 1, and the hash value H and other additional information are included therein to generate date and time certification information C. The additional information can include certificates of the time certification authority, the time-stamping device 3 or the like in addition to hash values. Since the date and time certification information C may be any information that contains at least the time-stamp TS and the hash value H and the additional information is not essential, the date and time certification information C may be determined taking the convenience, etc., into account. - The time-
stamping device 3 transmits the date and time certification information C (step S5), and the date and time certificationinformation acquiring means 9 receives the transmitted date and time certification information C. - The certified
file creating means 10 embeds the date and time certification information C into the intermediate file F2 to create a certified file F3 (step S6). The method for embedding the date and time certification information C is according to known file formats such as the PDF and detailed description thereof will not be provided. - Note that file creation software for the PDF or the like may be added using a computer program for embedding the date and time certification information C as necessary as plug-in.
- Subsequently, the certified file transmitting means 11 transmits the created certified file F3 to the user terminal 2 (step S7).
- The PDF is optimal for the format of the files F2 and F3 at the time of filing of the present application. The original data D is attached in the body of the file and the date and time certification information C is written in a signature block. A file in the PDF is characterized in that data written in the signature block cannot be altered or deleted. The fact that the date and time certification information C has not been altered later is thus reliable.
- Furthermore, an arbitrary number, which is one or more, of pieces of original data can be attached in the file F2. Moreover, since the file formats in which individual pieces of original data are stored are not limited, it is possible to attach a file created by wordprocessing software such as WORD (product name of Microsoft Corporation) and an image file in the GIF, for example, can be attached to one certificate F1 without changing the file formats. The feature that the certified file F3 can be created without changing the file formats of the original data is also one of characteristics of the present invention.
- The configuration and the operation according to the first embodiment have been described above.
- A plurality of methods can be considered as to the method for verification to be used by the user who has received the certified file F3 when content certification of the attached data D is necessary. Only one example thereof is provided here.
- The
data certification device 1 or the time-stamping device 3 creates software for verifying the certified file F3 in advance and also transmits the software when transmitting the certified file F3 from thedata certification device 1 to theuser terminal 2. This software has the following functions: - a function of calculating a hash value of a file obtained by deleting the date and time certification information C from the certified file F3; a function of comparing the calculated hash value with a hash value extracted from the date and time certification information; and a function of outputting the result of comparison between hash values.
- In a case where the date and time certification information C is encrypted with a secret key of the time-
stamping device 3, the software has a constant number as a public key and extracts hash value by decrypting the date and time certification information C with the public key. - When the hash values are identical according to the software, it can be determined that neither of the certificate F1 and the original data D attached thereto in the certified file F3 is altered.
- In this manner, it is possible to prove when the content of the original data D is certified, that is, at what point the original data D already existed, and that there is no doubt about the relation between the certificate F1 and the original data D attached thereto stored in the certified file F3.
- Since the certificate F1 describing the date, the data name and the like of the original data is created, the present embodiment has the following advantageous effect. The date and time certification information C is often embedded in an encrypted state into a signature block of the certified file F3. In this case, even the owner of the certified file F3 cannot immediately know the date and time. Since, however, the date and time are also described in plain text in the certificate F1, the date and time can be immediately known by reference thereto. Both the security and the convenience are satisfied.
- The second embodiment is different from the first embodiment in that a
user terminal 20 has the role of thedata certification device 1 in the first embodiment. The difference from the first embodiment will be mainly described below. -
FIG. 5 illustrates an exemplary system configuration according to the present embodiment. - An arbitrary number of
user terminals 20 are connected to the time-stamping device 3 via the Internet N. - Functional blocks of a
user terminal 20 according to the present embodiment will be described with reference toFIG. 6 . - The
user terminal 20 includes astorage unit 21 and aprocessing unit 22. - The
storage unit 21 stores original data to be certified, various computer programs, work data in the process of processing, and the like. - The
processing unit 22 includes intermediatefile creating means 24, time-stamp requesting means 25, date and time certificationinformation acquiring means 26, certifiedfile creating means 27, and other processing means. - Note that the classification of these means is merely for the convenience of description. The respective means are implemented by hardware or software according to the functions thereof. When the means are implemented by software, the CPU executes computer programs stored in storage means such as a ROM and a hard disk. Since these are known matters, the description thereof will not be provided. Computer programs for causing the
user terminal 20 perform various processes for content certification are distributed by an operator of the system according to the present invention. In the first embodiment, the system administrator installs thedata certification device 1 for himself/herself and executes the content certification service in response to a request from theuser terminal 2. In the second embodiment, however, the system operator may distribute computer programs to users instead of operating and managing the data certification device. - The
user terminal 20 also includes input/output means such as a keyboard and a display, drivers, and acommunication interface unit 23 capable of communication with the time-stamping device 3 via a communication network. - The intermediate
file creating means 24 creates a certificate file F1 that proves the existence of original data D, and attaches the original data D to the certificate file F1 to create an intermediate file F2. - The time-stamp requesting means 25 transmits the intermediate file F2 to the time-
stamping device 3. - The date and time certification
information acquiring means 26 receives date and time certification information C from the time-stamping device 3. - The certified
file creating means 27 embeds the received date and time certification information C into the intermediate file F2 to create a certified file F3. - The methods and the like for generating the date and time certification information C by the time-
stamping device 3 and for verifying the certified file F3 are similar to those in the first embodiment. - While the present invention has been described above on the basis of the first and second embodiments, these embodiments are exemplary only. For example, various modified examples can be considered about allocation of processes and the flow of processes between the
data certification device 1 and the time-stamping device 3 in the first embodiment, which are within the scope of the present invention. - Some of such modified examples will be described below.
- In the first embodiment described above, the
data certification device 1 transmits the intermediate file F2 containing the original data D in an integrated manner without any change to the time-stamping device 3. - As in the aspect of the invention according to
claim 2, however, a hash value may be calculated from the intermediate file F2 at thedata certification device 1 and only the hash value may be transmitted to the time-stamping device 3 instead of the intermediate file F2 itself. In this case, the hash vale instead of the original data is transmitted to the time-stamping device 3, and date and time certification information is generated. Thedata certification device 1 then embeds the date and time certification information received from the time-stamping device 3 into the intermediate file to generate a certified file, and transmits the certified file to the user terminal. The point is that information necessary for generation of the date and time certification information C may be transmitted to the time-stamping device 3 in any manner as long as necessary information is transmitted thereto. - In the first embodiment described above, the certified file F3 is transmitted from the
data certification device 1 to theuser terminal 2. The certified file F3, however, need not necessarily be transmitted to theuser terminal 2. The certified file F3 may be saved in a device (thedata certification device 1 can be considered but the device is not limited thereto and may be a database server or the like connected to thedata certification device 1 in a manner capable of communication therewith) that can be accessed by theuser terminal 2 via the Internet N, and may be made available each time a request is made by theuser terminal 2. - The user can easily receive content certification for original data regardless of the file formats in which the data are stored. It is anticipated that various documents will be increasingly shifted from conventional paper media to digital data, and much demand for the present invention is expected as a system and a method for providing certification of contents of digital data in an easy and reliable manner. Note that the term “easy” not only refers to the easiness of user operation but also means that “a large-scale organization for operation is not needed”.
-
- 1 Data certification device
- 2 User terminal
- 3 Time-stamping device
- 6 Original data receiving means
- 7 Intermediate file creating means
- 8 Time-stamp requesting means
- 9 Date and time certification information acquiring means
- 10 Certified file creating means
- 11 Certified file transmitting means
- 20 User terminal (of second embodiment)
- 24 Intermediate file creating means
- 25 Time-stamp requesting means
- 26 Date and time certification information acquiring means
- 27 Certified file creating means
- N Internet
- C Date and time certification information
- D Original data
- F1 Certificate file
- F2 Intermediate file
- F3 Certified file
Claims (2)
1-8. (canceled)
9. A method for certifying existence of digital data at a time point, using a system of network connected devices that includes
a user terminal at a first location,
a data certification device at a second location, and
a time-stamping device at a third location,
wherein the first, second, and third locations are different from one another;
the method comprising:
receiving, at the data certification device from the user terminal, original digital data to be certified;
creating, at the data certification device, a certificate file containing date and time of receipt of the received original digital data,
attaching, at the data certification device, the original digital data to the certificate file to create an intermediate file in which the original digital data is unaltered;
feeding, at the data certification device, the intermediate file into a predetermined hash function to calculate a hash value;
transmitting, from the data certification device to the time-stamping device, only the calculated hash value;
receiving, at the data certification device from the time-stamping device, date and time certification information indicative of when the time-stamping device received the hash value;
embedding, at the data certification device, the date and time certification information into the intermediate file to create a certified file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/543,847 US20190372782A1 (en) | 2010-02-03 | 2019-08-19 | Data Certification Device, Non-transitory Computer-readable Medium, and Method Therefor |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010022396A JP4558099B1 (en) | 2010-02-03 | 2010-02-03 | Digital data content certification system, data certification device, user terminal, computer program and method |
JP2010-022396 | 2010-02-03 | ||
PCT/JP2011/052181 WO2011096452A1 (en) | 2010-02-03 | 2011-02-02 | Digital data content authentication system, data authentication device, user terminal, computer program and method |
US201213576622A | 2012-10-22 | 2012-10-22 | |
US15/704,092 US20180006828A1 (en) | 2010-02-03 | 2017-09-14 | Digital data content certification system, data certification device, user terminal, computer program and method therefor |
US16/543,847 US20190372782A1 (en) | 2010-02-03 | 2019-08-19 | Data Certification Device, Non-transitory Computer-readable Medium, and Method Therefor |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/704,092 Continuation US20180006828A1 (en) | 2010-02-03 | 2017-09-14 | Digital data content certification system, data certification device, user terminal, computer program and method therefor |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190372782A1 true US20190372782A1 (en) | 2019-12-05 |
Family
ID=43048749
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/576,622 Active US9794071B2 (en) | 2010-02-03 | 2011-02-02 | Digital data content certification system, data certification device, user terminal, computer program and method therefor |
US15/704,092 Abandoned US20180006828A1 (en) | 2010-02-03 | 2017-09-14 | Digital data content certification system, data certification device, user terminal, computer program and method therefor |
US16/543,847 Abandoned US20190372782A1 (en) | 2010-02-03 | 2019-08-19 | Data Certification Device, Non-transitory Computer-readable Medium, and Method Therefor |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/576,622 Active US9794071B2 (en) | 2010-02-03 | 2011-02-02 | Digital data content certification system, data certification device, user terminal, computer program and method therefor |
US15/704,092 Abandoned US20180006828A1 (en) | 2010-02-03 | 2017-09-14 | Digital data content certification system, data certification device, user terminal, computer program and method therefor |
Country Status (4)
Country | Link |
---|---|
US (3) | US9794071B2 (en) |
JP (1) | JP4558099B1 (en) |
CN (2) | CN105825115B (en) |
WO (1) | WO2011096452A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012028882A (en) * | 2010-07-20 | 2012-02-09 | Mekiki Creates Co Ltd | Digital data content certification system |
US9853949B1 (en) * | 2013-04-19 | 2017-12-26 | Amazon Technologies, Inc. | Secure time service |
JP5908145B1 (en) * | 2015-05-29 | 2016-04-26 | 株式会社スカイコム | Digital self-written system, digital self-written verification apparatus, method and program |
JP6534355B2 (en) * | 2016-02-26 | 2019-06-26 | 株式会社スカイコム | PDF file management system, PDF file management server, PDF file data acquisition server, PDF file management method, PDF file data acquisition method, PDF file management program, and PDF file data acquisition program |
JP6296623B2 (en) * | 2016-03-04 | 2018-03-20 | 株式会社スカイコム | Digital self-written verification apparatus, digital self-written verification method, and digital self-written verification program |
IT201700073538A1 (en) * | 2017-06-30 | 2018-12-30 | Alberto Carlo Francesco Dubini | ELECTRONIC SYSTEM TO CERTIFY DATA ACQUIRED WITH A MOBILE ELECTRONIC DEVICE AND ITS METHOD AND PROGRAM FOR ELECTRONIC PROCESSORS |
CN108418876B (en) * | 2018-02-09 | 2019-04-19 | 北京众享比特科技有限公司 | Store proof of work method and system, motivational techniques and system |
CN110378079B (en) * | 2018-04-13 | 2023-07-04 | 胡小凡 | Information processing, protecting and selling method and device based on original works |
IT202100003290A1 (en) * | 2021-02-15 | 2022-08-15 | Tolemaica S R L | PROCEDURE, SOFTWARE AND INFORMATION SYSTEM FOR CERTIFYING DATA FLOWS |
Family Cites Families (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5748738A (en) * | 1995-01-17 | 1998-05-05 | Document Authentication Systems, Inc. | System and method for electronic transmission, storage and retrieval of authenticated documents |
US6219669B1 (en) * | 1997-11-13 | 2001-04-17 | Hyperspace Communications, Inc. | File transfer system using dynamically assigned ports |
WO2000051286A1 (en) * | 1999-02-26 | 2000-08-31 | Bitwise Designs, Inc. | Digital file management and imaging system and method including secure file marking |
US8868914B2 (en) * | 1999-07-02 | 2014-10-21 | Steven W. Teppler | System and methods for distributing trusted time |
US6898709B1 (en) * | 1999-07-02 | 2005-05-24 | Time Certain Llc | Personal computer system and methods for proving dates in digital data files |
CN1967559A (en) * | 1999-07-06 | 2007-05-23 | 索尼株式会社 | Data providing system, method therefor and control device therefor |
US20030078880A1 (en) * | 1999-10-08 | 2003-04-24 | Nancy Alley | Method and system for electronically signing and processing digital documents |
US7412478B1 (en) * | 2000-01-27 | 2008-08-12 | Marger Johnson & Mccollom, P.C. | Rich media file format and delivery methods |
JP2002049590A (en) * | 2000-08-04 | 2002-02-15 | Hitachi Ltd | Electronic authentication system |
US20020080959A1 (en) * | 2000-12-27 | 2002-06-27 | Xerox Corporation | Automatic authentication of printed documents |
US7783972B2 (en) * | 2001-01-08 | 2010-08-24 | Enfocus NV | Ensured workflow system and method for editing a consolidated file |
JP3707685B2 (en) * | 2002-05-08 | 2005-10-19 | ソニー株式会社 | Optical disc apparatus, optical disc recording method, optical disc recording method program, and recording medium recording optical disc recording method program |
AU2003298560A1 (en) * | 2002-08-23 | 2004-05-04 | Exit-Cube, Inc. | Encrypting operating system |
US7715034B2 (en) * | 2003-10-17 | 2010-05-11 | Canon Kabushiki Kaisha | Data processing device and data storage device for performing time certification of digital data |
US7444516B2 (en) * | 2004-02-26 | 2008-10-28 | Intermec Ip Corp. | Method, apparatus and article for off-line certification in mobile applications |
JP2005332088A (en) * | 2004-05-18 | 2005-12-02 | Canon Inc | Document preparing device and file conversion system |
US7666386B2 (en) * | 2005-02-08 | 2010-02-23 | Lynntech Power Systems, Ltd. | Solid chemical hydride dispenser for generating hydrogen gas |
JP2007025866A (en) * | 2005-07-13 | 2007-02-01 | Konica Minolta Business Technologies Inc | User interface device and image reader |
US20070067620A1 (en) * | 2005-09-06 | 2007-03-22 | Ironkey, Inc. | Systems and methods for third-party authentication |
US8117045B2 (en) * | 2005-09-12 | 2012-02-14 | Mymedicalrecords.Com, Inc. | Method and system for providing online medical records |
JP4150037B2 (en) * | 2005-09-30 | 2008-09-17 | 株式会社東芝 | Time stamp acquisition system, time stamp acquisition device, time stamp acquisition program, and time stamp acquisition method |
JP4455474B2 (en) * | 2005-11-04 | 2010-04-21 | 株式会社東芝 | Time stamp update device and time stamp update program |
JP2007274254A (en) * | 2006-03-31 | 2007-10-18 | Murata Mach Ltd | Communication terminal device with time stamp function |
JP4816375B2 (en) * | 2006-09-28 | 2011-11-16 | 富士ゼロックス株式会社 | Information processing system, information processing apparatus, and program |
US8451763B2 (en) * | 2006-12-07 | 2013-05-28 | Digimarc Corporation | Wireless local area network-based position locating systems and methods |
US8468244B2 (en) * | 2007-01-05 | 2013-06-18 | Digital Doors, Inc. | Digital information infrastructure and method for security designated data and with granular data stores |
JP2009026076A (en) * | 2007-07-19 | 2009-02-05 | Canon Inc | Document management system |
US8140847B1 (en) * | 2007-09-18 | 2012-03-20 | Jianqing Wu | Digital safe |
US8464045B2 (en) * | 2007-11-20 | 2013-06-11 | Ncr Corporation | Distributed digital certificate validation method and system |
JP4985438B2 (en) * | 2008-02-01 | 2012-07-25 | Necシステムテクノロジー株式会社 | Electronic file access right management device, electronic file access right management method, and program |
WO2010011472A2 (en) * | 2008-06-29 | 2010-01-28 | Jeffrey Peck Koplow | Public encrypted disclosure |
JP2010061448A (en) * | 2008-09-04 | 2010-03-18 | Canon Inc | Image processing apparatus, its controlling method, and program |
US8612388B2 (en) * | 2008-09-30 | 2013-12-17 | Visa Usa, Inc. | System and method for file monitoring |
US8374930B2 (en) * | 2009-02-02 | 2013-02-12 | Trustifi Corporation | Certified email system and method |
TW201103298A (en) * | 2009-03-25 | 2011-01-16 | Pacid Technologies Llc | Method and system for securing communication |
US8542823B1 (en) * | 2009-06-18 | 2013-09-24 | Amazon Technologies, Inc. | Partial file encryption |
WO2011082322A2 (en) * | 2009-12-30 | 2011-07-07 | Intergraph Technologies Company | A system and method for transmission of files within a secured network |
US8959362B2 (en) * | 2012-04-30 | 2015-02-17 | General Electric Company | Systems and methods for controlling file execution for industrial control systems |
-
2010
- 2010-02-03 JP JP2010022396A patent/JP4558099B1/en not_active Expired - Fee Related
-
2011
- 2011-02-02 CN CN201610183831.6A patent/CN105825115B/en not_active Expired - Fee Related
- 2011-02-02 CN CN201180017551.3A patent/CN102845017B/en active Active
- 2011-02-02 US US13/576,622 patent/US9794071B2/en active Active
- 2011-02-02 WO PCT/JP2011/052181 patent/WO2011096452A1/en active Application Filing
-
2017
- 2017-09-14 US US15/704,092 patent/US20180006828A1/en not_active Abandoned
-
2019
- 2019-08-19 US US16/543,847 patent/US20190372782A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
JP4558099B1 (en) | 2010-10-06 |
CN102845017B (en) | 2016-04-20 |
CN102845017A (en) | 2012-12-26 |
CN105825115A (en) | 2016-08-03 |
WO2011096452A1 (en) | 2011-08-11 |
US20130042103A1 (en) | 2013-02-14 |
JP2011160349A (en) | 2011-08-18 |
CN105825115B (en) | 2020-01-10 |
US9794071B2 (en) | 2017-10-17 |
US20180006828A1 (en) | 2018-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190372782A1 (en) | Data Certification Device, Non-transitory Computer-readable Medium, and Method Therefor | |
US8005904B2 (en) | Electronic business card exchange system and method | |
US20130275765A1 (en) | Secure digital document distribution with real-time sender control of recipient document content access rights | |
JP2003244139A (en) | Time stamp imprinting system to electronic document, and program medium thereof | |
US9356927B2 (en) | Enabling digital signatures in mobile apps | |
US20210211299A1 (en) | Generating electronic signatures | |
JP2024027133A (en) | Program, information processing apparatus, and method | |
KR20120112290A (en) | System for creating and certifying the original of digital contents and method thereof | |
EP1921554A1 (en) | Data delivery system, issuance apparatus, terminal apparatus and intermediate node | |
JP2008035019A (en) | Digital signature device | |
JP2011024155A (en) | Electronic signature system and method | |
CA2813992C (en) | System, method and apparatus for optimizing wireless communications of secure e-mail messages with attachments | |
CN109005105B (en) | Method and device for generating mail with recorded sender position information and storage medium | |
WO2012011509A1 (en) | Digital data content authentication system | |
JP2007310624A (en) | Workflow system using electronic envelope, method, computer program | |
KR101355080B1 (en) | System for syndicating the original of digital contents for contents provider and method thereof | |
JP2012009059A (en) | Data creation apparatus, method and computer program | |
JP2017175377A (en) | Time stamp storage server, portable terminal, electronic data storage server, time stamp storage program, portable terminal program, and electronic data storage program | |
JP2011160402A (en) | Data creation method, data creation device and computer program | |
WO2008059898A1 (en) | Authentication time adding apparatus, authentication time adding method, and program | |
JP2024024656A (en) | Program, information processing device, and method | |
JP2023165230A (en) | Signature system, signature method, and program | |
JP2024043747A (en) | Time stamp support system, time stamp support method, and time stamp support program | |
KR101356210B1 (en) | System for registering the original of digital contents and mehtod thereof | |
JP2004080335A (en) | Digital signature device, digital signature system, and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GENIUS NOTE CO., LTD., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DEGUCHI, HIKARU;REEL/FRAME:050087/0209 Effective date: 20170912 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |