WO1998032113A1 - Procede et systeme de controle de cle pour signature electronique - Google Patents
Procede et systeme de controle de cle pour signature electronique Download PDFInfo
- Publication number
- WO1998032113A1 WO1998032113A1 PCT/JP1998/000142 JP9800142W WO9832113A1 WO 1998032113 A1 WO1998032113 A1 WO 1998032113A1 JP 9800142 W JP9800142 W JP 9800142W WO 9832113 A1 WO9832113 A1 WO 9832113A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- signature
- keys
- confirmation
- updated
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
- H04L9/16—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
Definitions
- the present invention provides a key management method for an electronic signature, which makes it possible to update the contents of a key for an electronic signature without restricting issuance of an electronic signature and provision of various services based on the electronic signature, and A system suitable for implementing this key management method.
- the electronic signature is an electronic signature that proves the identity of the user using a user-specific key.
- a membership card has been issued in the form of a high-security medium such as an IC card to provide an electronic identification card that can be possessed only by the member, or a forgery using electronic signature technology online. Attempts have been made to create difficult membership registration cards (electronic identification cards) and electronic tickets.
- the membership registration card, electronic ticket, etc. (hereinafter referred to as “member registration card” for the sake of convenience) will not only evaluate the authenticity of the contents, but also allow the person who uses the membership registration card to correctly confirm the identity of the member. It is necessary to keep it. For this reason, conventionally, it has been carried out to check whether the member registration certificate has been forged using an electronic signature that can be generated only by the person himself, or whether the holder of the member registration certificate is a legitimate member. ing.
- public key encryption technology is usually used. In other words, a designated member registration organization performs an electronic signature using its own private key (signing key) and distributes a public key (confirmation key) corresponding to the signature key to all members. I do. When each member authenticates the electronic signature, the electronic signature is confirmed using the confirmation key.
- the confirmation key itself does not contain information indicating that it is a legitimate public key of the member registration institution, so it is necessary to separately confirm the validity of the confirmation key in advance.
- the Member Registration Agency may distribute a new confirmation key to all members at the same time. It is also conceivable to register a new confirmation key at a predetermined public key certificate issuing center. In the latter case, the public key certificate issuing center signs the data to be signed with its own private key (center private key) to form a public key certificate, and distributes this public key certificate to members as appropriate. The distributed member checks the electronic signature with the public key of the public key certificate issuing center (center public key) notified in advance.
- a member wants a third party to confirm his / her membership registration certificate, the member obtains a public key certificate and attaches the obtained public key certificate to the member registration certificate.
- the person who verifies the electronic signature can easily confirm the validity of the public key of the new member registration organization.
- Public key certificates must always be attached to digital signatures. It is only necessary to attach the signature key and confirmation key once when it is updated.
- the attachment of a public key certificate may be omitted to reduce the amount of data at the time of transmission.
- the public key certificate will be obtained by the member who has received the public key certificate.
- the mode (2) the amount of data during transmission / reception increases, and extra time is required for obtaining a public key certificate. Also, the public key certificate is forged If this is done, a false center public key will be distributed, and the risk will depend on the security of the center public key at the public key certificate issuing center.
- the member who checks the electronic signature for example, the member who checks the membership registration certificate of a certain member and intends to provide some service, receives the membership registration certificate of the certain member, and then receives the public key. You will get a certificate. Therefore, when a member requests confirmation of the membership registration certificate for the first time after the key is updated, the other member has to limit the service provision until the public key certificate is obtained and the membership registration certificate is confirmed. . Also, in order to obtain public key certificates immediately, contact the public key certificate issuing center or a member registration institution online.
- the key management method of the present invention that achieves the above object provides a method in which a plurality of keys whose contents are periodically updated at different times are prepared, and the plurality of keys are switched shorter than an update cycle of each key. It is characterized in that one key is switched at a time and the switched key is used as a signature key for an electronic signature. For example, it is effective to set the switching cycle to a period of the same length for all keys in order to facilitate key updating.
- the update cycle of each key is divided into three sections to be the most important.
- the first and last divided sections are used as spare sections, the intermediate divided sections are used sections used as signature keys for digital signatures, and the used section for each key is temporally continuous with the used section of another key. And switching so that they do not overlap with each other.
- a first key that is periodically updated and a second key that is periodically updated at a different time from the first key are prepared. Any one of the first key and the second key is alternately switched at a switching cycle shorter than the renewal cycle of each key, and is used for use as a signature key for an electronic signature.
- a fourth key, which is used as a confirmation key in the case of a signature key is disclosed as a pair, and the pair of the third key and the fourth key is provided for confirmation of the electronic signature.
- the third key and the fourth key may each be added with a term of use of the key.
- the update cycle is set to be equal to or less than a period obtained by subtracting a valid period of a digital signature generated based on the key from an average period in which the security of the key can be secured.
- C Another key management method of the present invention Prepares M (M is a natural number of 2 or more) signing keys that are periodically updated at different times, and M confirmation keys that are updated in synchronization with each signature key update time At the same time, and selecting one signature key from the M prepared signature keys in a predetermined order in a cycle shorter than the renewal cycle of the signature key, and performing an electronic signature of predetermined signature target data. Performing, and verifying the electronic signature using any of the disclosed M verification keys.
- Each of the key management methods includes a key holding unit that holds a plurality of keys used as a signature key of an electronic signature; a key updating unit that periodically updates the contents of the plurality of keys at different times; and the key updating unit.
- the key whose content was updated in Reading means for reading from the key holding means in accordance with a predetermined rule, and using the read key as the signature key, a signature means for performing an electronic signature on predetermined data to be signed.
- a key holding unit for holding a first key and a second key used as a signature key of the electronic signature; and updating the contents of the first key and the second key at the same time at different times.
- Key updating means and a key whose content has been updated by the key updating means is read out from the key holding means in accordance with a predetermined rule, and the read first or second key is used as the signature key to generate predetermined signature target data.
- a key management system including a signature unit for performing an electronic signature on the key management system is also suitable for implementing the key management method of the present invention.
- a third key updated synchronously with the first key and serving as a confirmation key when the first key is a signature key
- the second key Key holding means for holding a fourth key which is updated in synchronization and serves as a confirmation key when the second key is a signature key, wherein the electronic key is used by using the first key or the second key.
- the third key and the fourth key are made public at the same time when the signature is made.
- the present invention also provides an electronic signature authentication system that can determine whether the electronic signature is valid when the electronic signature and the confirmation key are received.
- This authentication system includes a digital signature generated by using one of M signature keys (M is a natural number of 2 or more) and updating the M signature keys including the signature key used for the digital signature.
- a signature receiving unit that receives M confirmation keys that are updated synchronously; and a signature confirmation unit that confirms the received digital signature with any of the M confirmation keys. It is characterized in that the electronic authentication that has been obtained is determined to be a valid electronic signature.
- the signature receiving means is a signature key updated at different times among the M signature keys.
- FIG. 1 is a schematic configuration diagram of a member system to which the present invention is applied
- FIG. 2 is a procedure explanatory diagram showing a key and other delivery sequence
- FIG. 3 is a sequence chart showing a simplest example of a key update schedule.
- FIG. 4 is a sequence chart showing an example of a key update schedule when the period changes
- FIG. 5 is a sequence chart showing another example of a key update schedule when the period changes.
- Fig. 6 is a sequence chart showing an example of a key update schedule when five keys are used
- Fig. 7 is a block diagram showing an example of the configuration of a key management system of the present invention
- Fig. 8A is a key diagram. Detailed block diagram of the information processing control unit in the management system, FIG.
- FIG. 8B is a detailed structural diagram of the data file device
- FIG. 9 is a block diagram showing an operation form of the member system
- FIG. 10 is a member of FIG. Key distribution in the system and Diagram of key update procedure
- Fig. 11 is a diagram of mutual authentication between members in the member system of Fig. 9
- Fig. 12 is a diagram of mutual authentication between members in the member system of Fig. 9.
- FIG. 13 is a block diagram showing an operation form of another member system
- FIG. 14 is a sequence chart showing an example of a key update schedule in the member system of FIG. BEST MODE FOR CARRYING OUT THE INVENTION
- This member system can, for example, bidirectionally communicate with a plurality of member operation systems that can be operated only by members, a member registration system provided for a member registration organization that supervises and manages members, and a public key certificate issuing center.
- communication means (not shown) is connected through a public network, and key distribution is performed by authenticated communication.
- the public key certificate issuing center is not necessarily required.
- a common key method that is, a method in which the signature key and the confirmation key are the same key can be adopted, but in the following description, it is assumed that the above-described public key method is used for convenience.
- the member registration system has a function to perform member registration according to the member registration request information from the member, a function to issue a member registration certificate to each registered member using the private key (that is, a signature key) of the institution. It has a function of periodically updating a signature key, and a function of generating and updating a public key (that is, a confirmation key) corresponding to the signature key. Details of these functions will be described later.
- the public key certificate issuance center uses its member private key (center private key) as the data to be signed, using the name of the member registrar, the confirmation key generated by the member registration system, and other information (signature algorithm and signature validity period). ) To generate a digital signature, hold this as a public key certificate, and issue this public key certificate as required by members.
- Each member operation system obtains a confirmation key directly from the member registration system or through a public key certificate issuing center, and applies for membership registration. If the certificate is obtained through the public key certificate issuing center, a process for confirming the public key certificate with the public key (center private key) of the public key certificate issuing center is required.
- the member operation system is called “member”
- the member registration system is called “member registrar”
- the public key certificate issuing center is called “center”.
- Fig. 1 is a diagram schematically showing how keys and other electronic information are exchanged between member registrars, members, and centers.
- the portion related to the center CA is indicated by a broken line in the sense that it is not essential as described above, but is used in this example.
- L 2 is a membership registration card issued to members Ul and U 2.
- An electronic signature using the signature key (SkTl, SkT2) is performed when a membership registration certificate is issued.
- SkTl signature key
- SkT2 an electronic signature using the signature key
- the distribution sequence of keys and the like in FIG. 1 is as shown in FIG.
- members U l and U 2 can obtain the center public key P k C A in advance and confirm the public key certificate when the public key certificate is obtained.
- a signing key SkTl and a confirmation key PkTl are prepared by the member registration organization T (step S101).
- the confirmation key PkTl is registered in the center CA (steps S102 and S103).
- the member U1 applies for membership registration to the member registrar T. At that time, it sends out its own confirmation key (PkU1) (step S105).
- the member registrar T issues a membership registration certificate L1 for the member's confirmation key (PkU1) and other information using the signature key SkT1 (step S106).
- the member registrar T updates the signature key SkT1 to the signature key SkT2 (step S107). Then, the updated signature key S k T The confirmation key PkT2 corresponding to 2 is re-registered in the center CA (steps S108, S109).
- the member U2 After obtaining the public key certificate CERT (PkT2) from the center CA (step S110), the member U2 applies for membership registration to the member registrar Tc. P k U 2) is sent (step S 1 1 1).
- the member registrar T issues a member registration certificate L2 using the signature key SkT2 for this member registration application (step S112).
- members U 1 and 112 perform mutual authentication based on the membership certificates 1 ⁇ 1 and L 2 (step S 1 13) o
- the Member Registration Institution wants to periodically update the signature key S k T and the confirmation key P k T without interrupting the issuance of the membership registration certificate.
- one of the two keys is used as a primary key and the other is used as an auxiliary key, and the two keys are used as a signature key for an electronic signature while switching between them according to a certain rule.
- An example in which two verification keys corresponding to a signature key are used as a pair will be given.
- a signature key S k T and a verification key P k T are prepared, two each for the primary key and the auxiliary key.
- the signature key S k T as the primary key is used as the signature primary key
- Signing key S k T a signature auxiliary key as an auxiliary key confirming as the primary key key P k T a confirmation main key
- each c key called confirmation auxiliary key confirmation key P k T as an auxiliary key respectively Updated periodically at different times.
- the renewal cycle does not necessarily have to be the same period.
- Each key has an average period (safe use period) that can be used safely, and the key update period is generated based on the key from the safe use period of the key.
- the digital signature must be less than or equal to the reduced validity period. This is because we tried to ensure the security of the key by updating it before the key was broken.
- the safe use period can be set by adjusting the key security parameters, for example, the key length.
- the validity period of a digital signature is a period that is shorter than the shorter of the first divided section and the last divided section.
- Figure 3 is a diagram specifically showing the update schedule for each key. Since the relationship between the primary key and the auxiliary key is common to the signature key S k and the verification key P k T, only one key is shown.
- the two key renewal target sections are both 1 year
- the safe use period is 5 years
- the renewal cycle is every 4 years
- the auxiliary key is used for the first year and the last one year. In the middle two years, it is used as the primary key.
- “a 0”, “al”, “a 3”, and “a 4” are key contents (values).
- the use section of one key is temporally continuous with the use section of the other key, and does not overlap with each other.
- the sum of the periods that are auxiliary keys is the period of the same length as the used section, and the first year as the primary key, the last year as the auxiliary key before updating, and the last as the primary key.
- One year of the new key and the first year of the updated auxiliary key have the same period. This is mainly due to the ease of key management. Key renewal is performed at the beginning of the last year in which one key remains the primary key. Then, at the end of the use section for one key, the use section for the updated key is started.
- each update target section is different from the combination in other sections.
- a0 and a1 in one update target section a1 and aO, or a1 and a2, ... in other update target sections.
- a signature primary key is used to generate an electronic signature, that is, a member registration certificate is issued, and an electronic signature is verified, that is, a member registration certificate is verified using either a pair of a verification primary key or a confirmation auxiliary key. .
- Each key can be used as a signature key regardless of the switching.
- the key is updated according to the above schedule, and the membership registration certificate issued using the signature primary key is valid for a maximum of one year, that is, one section. Therefore, as described above, if two members U l and U 2 try to confirm each other's membership certificates L 1 and L 2, they will either be issued in the same section or only one It was issued in the section where it was done. One of the membership certificates issued two sections apart has expired. A member who has two member registration cards with overlapping validity periods can use one of the primary key for confirmation or the auxiliary key for confirmation to confirm the member registration card possessed by another member.
- the expiration date of the key is added to the primary key for confirmation and the auxiliary key for confirmation, and when the member confirms the membership certificate of another member, the key whose expiration date has expired is used for confirmation. It is also possible not to do so. In this way, a key whose expiration date has expired can be decrypted and decrypted. It is possible to easily deal with illegal tampering.
- the renewal cycle of the two keys is all four years, but as shown in Figs. 4 and 5, the renewal cycle of the two keys A and B is the same. Even if they are not the same, the key management method of the present invention can be implemented.
- the renewal cycle of keys A and B is periodic, such as 5 years, 6 years, 5 years, 6 years, and so on, but the period changes. I do.
- the point where one key is used as the primary key and the other key is the auxiliary key is the same as in the example of Fig. 3, except that the use period for each key is not necessarily constant. . In other words, it may be two out of five years or three out of five years.
- one key is updated while the other key continues to be the primary key, and the updated key is used when the usage interval for the other key ends (the auxiliary key until then). By starting the use section for, the key can be updated smoothly.
- the confirmation key is also disclosed as a pair of the confirmation main key and the confirmation auxiliary key so that the verifier can confirm the electronic signature using one of the pair confirmation keys.
- the renewal cycle of key A is 5 years, 6 years, 5 years, 6 years, ...
- the renewal cycle of key B is 5 years, 5 years, 6 years, 6 years, ⁇ ⁇
- the cycle changes like •. Also in this case, the same effect as in the examples of FIGS. 3 and 4 can be expected by updating the key according to the same rule as above and alternately switching between the primary key and the auxiliary key.
- Fig. 6 shows an example of a key update schedule when five keys are used.
- This key management system is provided individually or in a distributed manner in each member organization of the member system, for example, the above-mentioned member registration institution. As shown in FIG. 7, an arithmetic processing unit 1 and a display output unit are provided. 2, a data input / output device 3, a communication network connection device 4, an information processing control unit 5, a data file device 6, a time management device 7, and a key generation device 8.
- the arithmetic processing unit 1 is a kind of computer that realizes required functions by executing a program recorded in an external storage device or a ROM (not shown), and the display output device 2 is a process performed by the arithmetic processing unit 1 and the like. This is a display device that visualizes the results.
- the data input / output device 3 includes an external storage device such as a mouse or other pointing device, a keyboard, or the like, and Includes the interface between them.
- the communication connection device 4 controls communication performed between various members and the center CA.
- the time management device 7 is a timer
- the key generation device 8 is a device for generating a key.
- the information processing control unit 5 is a functional block formed, for example, by the arithmetic processing unit 1 reading and executing the above-mentioned program. As shown in FIG. 8 (a), the information processing control unit 5 gives a mode update trigger. A trigger processing unit 51, an update processing unit 52 for updating the mode, a replacement processing unit 53 for replacing the primary key and the auxiliary key, and a replacement processing unit for replacing the key contents of the primary key and the auxiliary key. 5, a generation unit 55 for performing an electronic signature, and a transmission processing unit 56 for transmitting an electronic signature and a primary key / auxiliary key to the outside.
- mode B is applied when one year elapses and the system moves to the second year, and key contents a0 and a1 are replaced with the primary key and the auxiliary key. Is done.
- Mode A is applied when moving to the third year after the second year, and the key content a1 of the primary key is inherited, but the key content a0 of the auxiliary key is updated to ⁇ a2 '' . Since mode A and mode B are applied periodically, in the following description, the cycle from mode A until mode B is applied is cycle A, after mode B until mode A is applied. This cycle is sometimes referred to as cycle B.
- the update processing section 52 performs the above-described mode switching, records a mode flag (cycle A / B) indicating the current cycle in the data file device 6, and updates the mode when the mode is subsequently updated (cycle switching). Time).
- the replacement processing unit 53 converts the signature key and the confirmation key into a primary key and a W 9
- the replacement processing section 54 replaces the key content with a new one.
- the generation unit 55 performs an electronic signature of the specified signature target data for each signature generation request using the signature main key.
- the data file device 6 has a mode flag 61, a verification primary key 62, a signature primary key 63, a verification auxiliary key 64, and a signature auxiliary key 65, respectively. Is stored.
- the member registrar T holds the confirmation primary key 62 and the confirmation auxiliary key 64 because the confirmation key may be directly distributed to the members regardless of the center CA.
- this member system is configured by connecting ticket sales organization B, user member U, and service provider I, which are members, respectively, to member registration organization T via a communication network.
- the key management system of the present invention is provided in the member registration organization T, but may be configured to have other members at the same time. Each member shall be able to perform at least authentication communication using encryption technology.
- the member registrar T first sets a date for renewing the key (for example, January 1 every year). Also, a primary key for confirmation P k T m 62, a primary key for signature S k T m 63, an auxiliary key for confirmation P k T s 64, and an auxiliary key for signature S k T s 65 are prepared, and the mode flag is set. 6 Set 1 to “Cycle A” (Step S 2 0 1) 0
- the user member U creates his / her own signature key S k U and a confirmation key P k U, and member registration request information including the confirmation key P k U and member information I d U such as a user name.
- the member registration institution ⁇ extracts the confirmation key ⁇ k U from the transmitted member registration request information, and the generation unit 55 of the key management system adds the expiration date E 1 u to the data to be signed. Overnight. Then, the signature target data is signed using the signature primary key S k T m and a membership registration certificate Lu is issued. After that, the transmission processing unit 56 converts the membership registration certificate Lu into the expiration date E 1 u, the confirmation key P k U, the member information I d U, and the above-mentioned primary key for confirmation P k T m 62, and an auxiliary for confirmation Transmit to the user member U together with the key PkTs64 (step S203) o
- the member registrar T can make requests for member registration available at any time, and issues a membership registration certificate Lu that is valid for one year from the date of member registration.
- Ticket sales organization B and service provider I also perform membership registration in the same manner, and receive membership registration certificates Lb and Li.
- the member registrar T refers to the mode flag 61 and updates the current cycle A to cycle B in the update processor 52 (step S204). Subsequently, the exchange processing section 53 exchanges the primary key with the auxiliary key (step S205).
- the member registrar T updates the current cycle B to cycle A in the update processor 52 (step S206).
- the replacement processing unit 54 stores the new key generated by the key generation device 8 as an auxiliary key (step S207). This is repeated one more cycle at a time during the renewal cycle of four years (steps S208 to S211).
- Distribution of the confirmation key to user member U, ticket sales organization B, and service provider I (transmission of the confirmation primary key P k T m 62 and the confirmation auxiliary key P k T s 64) is secure. It is desirable to include offline processing for the purpose. For example, It will be more secure if you use hand-to-face delivery, mailing, or sending by facsimile. If only online, some kind of authentication communication must be performed.
- the ordinary public key certificate contains only one confirmation key, which is the public key.
- service provider I includes service provision assurance information C, confirmation key P k B of ticket sales institution B, expiration date of service E c, ticket issue serial number R c, and member information I. dI, other service contents ⁇ Send item information as needed, such as the amount of money, to ticket sales organization B (step S301).
- This is information that allows the service provider I to later confirm the authenticity of the ticket sent ex post. By registering such information in advance at Ticket Sales Institution B, double-use of tickets by User Member U and unauthorized use of Ticket Sales Institution B can be detected before service provision. There is a merit that becomes.
- the user member U transmits the member registration certificate Lu, the confirmation key PkU, the expiration date E1U, and the challenge (authentication request) to the ticket sales organization B (step S302).
- the challenge is used as an example of encryption technology and signature technology.
- Ticket sales organization B receives the membership registration certificate L sent from user member U. u, etc., are tested with both the confirmation primary key P k T m and the confirmation auxiliary key P k T s stored therein (step S303). Regardless of which one is issued first, the membership registration Lu of the user member U and the membership registration Lb of the ticket sales organization B However, it may be the case that the member registrar T updates the signing key. As long as both are valid membership certificates Lu and Lb, the signature can be confirmed with either one of the verification keys. Public key certificate issuing center There is no need to get a public key certificate from the CA or send it from the user. If the signature can be verified using either one of the verification keys, proceed to the next process. If it cannot be confirmed, it means that the membership registration certificate Lu is not valid, so the ticket is rejected (step S304: No, S305).
- ticket sales organization B issues ticket registration organization Lb, confirmation key P k B, expiration date E 1 B, and the challenge sent from user member U to ticket sales organization B.
- the signature generated using the signature key SkB of B is transmitted to the user member U (step S306).
- the user member U tries the membership registration certificate Lb sent from the ticket sales organization B with both the verification primary key P k T m and the verification auxiliary key P k T s stored therein (Step S307). If the signature can be confirmed with either one of the verification keys, proceed to the next process. If it cannot be confirmed, it means that the member registration card b is not valid, and it is possible that it is a fake ticket sales institution, so cancel the purchase (Step S307: No, S30) 8) o
- the signature of the ticket sales organization B for the challenge sent by the user is confirmed with the ticket sales organization B confirmation key P k B. If confirmed, proceed to the next step.
- the confirmation key P k B is a valid public key of the ticket sales organization B, which means that the membership of the ticket sales organization B W
- the user member U attaches the ticket information to the ticket information H to be purchased to the ticket information and the electronic signature generated by the user member U's signature key for the challenge generated by the ticket sales agency B, and The ticket is transmitted to the sales organization B, and the purchase of the ticket is applied (step S309).
- the ticket sales organization B confirms the ticket information and the electronic signature sent from the user member U using the confirmation key PkU of the user member U (step S310). If the ticket information and the digital signature can be confirmed, the process proceeds to the next processing (step S311: Yes). If it cannot be confirmed, it means that a person other than the legitimate holder of the membership certificate Lu has applied for the purchase and that the data has been falsified during communication. Is rejected (step S311: No, S312).
- Ticket sales organization B also checks the confirmation key P k U of user member U, service provision assurance information C, expiration date E c, issue serial number R c, member information I d I, and ticket sales organization B.
- the ticket signature information F is generated using the sum of the ticket sales serial number R f and the ticket expiration date E f as the data to be signed.
- the ticket sales serial number R f is included in the signature target data overnight.
- the user registers the service provider I's membership certificate L i, confirmation key P k I, and expiration date E 1 i, ticket sales sequence number R f, ticket expiration date E f, and ticket signature information F.
- Send to Member U (Step S3 13) o
- the user member U checks the membership registration certificate Li of the service provider I with the confirmation key P k T of the membership registration organization T. If the member registration certificate L i can be confirmed, the above service provision assurance information C is confirmed with the confirmation key P k I of the service provider I, and the ticket is confirmed with the confirmation key P k B of the ticket sales organization B. Station Check the name information F. If the ticket signature information F or the like can be confirmed, a fee of $ is paid (step S314).
- the user member U transmits the member registration certificate Lu, the confirmation key PkU, the expiration date E1u, and the challenge to the service provider I (step S401).
- the service provider I confirms the member registration certificate Lu of the user member U in the same manner as the ticket sales organization B (step S402). If it is confirmed, the service provider I sends the membership registration certificate L i, the electronic signature for the challenge, and the challenge to the user member U (step S 403: Yes, S 405) 0
- the user member U also checks the service provider I's membership registration Li and checks the electronic signature of the challenge (step S406). If it can be confirmed (Step S407: Yes), the user member U uses the signature key of his / her own to sign the ticket signature information F and the confirmation key of the service provider I together with the challenge range.
- Information S Membership certificate Lb, Confirmation key PkB, Expiration date E1b, Ticket signature information F, Ticket sales sequence number Rf, Expiration date Ef, Service provision guarantee information C, Issuance sequence number Rc, Generate an electronic signature of expiration date E c and member information I d I and send it to service provider I (step S 407: Yes YS 409) o
- the service provider I checks whether the service provision assurance information C, ticket signature information F, user signature information S, ticket expiration dates E f and E c, and whether the ticket has already been used. If confirmed, the service provision is started (step S410). If the result of the mutual authentication of the service provider I and the user member U is negative, the service provision or application is rejected (steps S403: No, S404, S407: No, S4 0 8) o
- Tickets can also be transferred between members as follows.
- Member U 1 gives the ticket to member U 2 with a signature showing the transfer certificate.
- Member U2 sends the ticket and the transfer certificate to Service Provider I.
- Service Provider I confirms the ticket and the transfer certificate and provides the service to Member U2.
- the above ticket sales will be conducted to determine whether the membership registration certificate presented by the user member U has been issued by the membership registrar T or the electronic signature is valid. It may be necessary to confirm separately from institution B and ticket provider I. In this case, the validity of the membership registration certificate is confirmed using the authentication system of the present invention.
- This authentication system includes a first confirmation processing unit that receives an electronic signature and a plurality of confirmation keys and confirms the contents, and a second confirmation processing that confirms the received electronic signature with one of the plurality of confirmation keys.
- These confirmation processing units are, for example, function blocks formed in the computer when the computer reads and executes a predetermined program. Note that the received electronic signature may be generated using a signature key updated at a different time.
- the key management system of the present invention is provided not only at the member registration organization T but also at the ticket sales organization B. Also, in the member system with the configuration shown in Fig. 9, the key of ticket sales organization B is one set. Request the issuance of the membership registration card L.
- the ticket sales organization B prepares two ticket signing keys (SkBm / SkBs: hereafter, a ticket signing key), a primary key and an auxiliary key. Update with the key management schedule shown in Fig. 3.
- the renewal timing of the membership registration card L and the renewal timing of the ticket signing key need not be the same, but may be the same. However, the ticket signing key must have a validity period equal to or longer than the validity period of the membership registration certificate L.
- a ticket signing key having the same validity period as that of the member registration certificate L is used. For example, suppose you register as a member on April 1 and renew every year.
- the service provider I When the service provider I deposits the service provision assurance information C with the ticket sales institution B, the service provider I receives the ticket registration institution B's membership certificate Lb and the verification key P k B m no P k B s And the expiration date E 1 b.
- the expiration date E c of the service provision guarantee information C is, for example, one year or less after issuance.
- the signature of the member registration certificate Lb can be confirmed, the member registration certificate Lb, the confirmation key PkBm / PkBs, and the expiration date E1b are stored.
- the user member U obtains the membership registration card Lb of the ticket sales organization B upon the purchase of the ticket.
- the member registration certificate Lb of the ticket sales organization B obtained here does not need to be stored after confirmation of the ticket. If the key management system of the present invention is used for the ticket sales organization B, It is one of the advantages of this.
- the service provider I After the service provider I obtains the membership registration card Lb of the ticket sales organization B, the service provider I waits until the user member U obtains the signature of the ticket sales organization B. Even if the key is renewed, the member registration certificate Lb can be confirmed with either the primary key or the auxiliary key of the ticket sales institution B, so the key must be obtained again. There is no.
- the member registrar T shall renew the key every year.
- the member registrar T generates one key valid for five years every two years, and this one key is used for the first and last sections, that is, 1 It is used as an auxiliary key in the section of the year and the fourth year, and used as the primary key in the two sections between them, that is, in the section of the second and third years.
- the membership registration certificate is valid for one year or less.
- Ticket sales organization B updates the key at a different timing from membership registration organization T. The cycle at this time is the same every year.
- the validity period of the ticket signature information F shall be one year or less.
- the member registration organization T and the ticket sales organization B update their keys, they register them with the center C A. This is to substitute for the authentication communication.
- the user member U and the service provider I are required to update the membership registration card L, register the service provision assurance information C, and purchase the ticket signature information F.
- the keys of the registrar T and the ticket sales institution B can be obtained from the center CA.
- the ticket is provided between the service provider I and the ticket sales organization B when the service provision guarantee information C is deposited, and between the user member U and the ticket sales organization B when purchasing the ticket.
- the user registration certificate issued by the member registration organization T can be confirmed between the user member U and the service provider I, and the ticket issued by the ticket sales organization B when using the ticket.
- the key point is that the signature information F can be confirmed.
- the contents of the confirmation key P k T 1 in the first section are assumed to be t o for the primary key and t 1 for the auxiliary key.
- the confirmation key P k T 2 in the second section the primary key and the auxiliary key are exchanged, and the primary key is t 1 and the auxiliary key is t 0.
- the confirmation key P k T 3 in the third section is such that the primary key is t 1 and the auxiliary key is the newly generated content t 2.
- Membership certificate L1 of user member U is issued in the third section. Specifically, it is generated with the signature key SkT3 primary key corresponding to the verification key PkT3 primary key t1 in the section. At this time, the primary key t1 and the auxiliary key t2 of the confirmation key PkT3 in the section are distributed to the user member U. Membership certificate L2 is issued in the fourth section. Specifically, the confirmation key in the section is generated with the signature key S k T 4 corresponding to the primary key 2 of the signature 4. At this time, the primary key t 2 and the auxiliary key t 1 of the confirmation key P k T 3 are distributed to the user member U.
- the key of the ticket sales organization B is also renewed by the key management method of the present invention.
- the portion of PkB1, PkB2,... Described next to the ticket sales organization B in FIG. 14 means this.
- Ticket The sales organization B sends the confirmation key, which is the combination of the primary key and the auxiliary key, to the member registration institution to be issued a membership registration card.
- Membership certificate L2 of user member U is issued with the signature key of t1.
- Membership certificate L2 of service provider I which has an overlapping validity period, has obtained primary key t1 and auxiliary key t2 at the time of issuance, so member registration certificate L1 of user member U Can be confirmed with the primary key t 1. Also, since the member registration certificate L2 of the service provider I has acquired the primary key t2 and the auxiliary key t1, this time, the signature content of the user member U's member registration certificate L1 is confirmed with the auxiliary t1 can do.
- the member registration certificate L 1 of the service provider I generated with the primary key t 1 can be confirmed.
- User member U also obtains primary key t 2 and auxiliary key t 1 when member registration certificate L 2, and confirms service provider I's member registration certificate L 2 with primary key t 2 can do.
- the membership registration card can be issued at any time, and the service provider I and the ticket sales institution B, the user U and the ticket sales institution B, and the service provision with the user U are provided.
- the service provider I and the ticket sales institution B, the user U and the ticket sales institution B, and the service provision with the user U are provided.
- the ticket signature information F will be described in more detail.
- Service provider I registers service provision assurance information C with ticketing agency B. On this occasion, the primary key and auxiliary key of ticket sales organization B are obtained.
- the validity period of the service provision guarantee information C and the ticket signature information F is, for example, one year.
- the ticket sales organization B When the user member U purchases a ticket, the ticket sales organization B generates the ticket signature information F1 with the signature key of the primary key b1 of the confirmation key PkB3.
- the service provider I registers the service provision assurance information C with the ticket sales organization B, the service provider I uses either the verification key P k B 2 of the ticket sales organization B or the verification key P k B 3. (Because the service provision guarantee information C is valid for one year).
- the user member U may have obtained the verification key PkB4 before using the ticket signature information F1.
- the service provider I confirms the confirmation key PkB2, the confirmation key PkB3, and the confirmation key PkB4. And the signature can be confirmed because b1 is included in either the primary key or the auxiliary key.
- the second example is for a user member to purchase a ticket.
- ticket sales organization B generates ticket signature information F2 using the signature key of primary key b2 of confirmation key PkB4.
- the service provider I registers the service provision assurance information C with the ticket sales institution B
- the service provider I uses either the confirmation key P k B 3 of the ticket sales institution B or the confirmation key P k B 4. Obtained.
- the user member U may have obtained the verification key PkB5 before using the ticket signature information F1.
- the service provider I will be notified by the user member U at the time of using the ticket signature information F1. Since the user has either the confirmation key P k B 3, the confirmation key P k B 4, or the confirmation key P k B 5, and the primary key or the auxiliary key contains b 2, the signature can be confirmed. it can. .
- a plurality of keys to be used as a signature key are prepared, these keys are updated according to a fixed rule, and the confirmation key is updated and made public in synchronization with the update of these keys. This eliminates the need to stop issuing digital signatures at the time of renewal or restrict the use of services after renewing keys.
- cross-certification of digital signatures issued at different times can be performed off-line.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/142,929 US6377692B1 (en) | 1997-01-17 | 1998-01-16 | Method and system for controlling key for electronic signature |
EP98900392A EP0898260B1 (en) | 1997-01-17 | 1998-01-16 | Method and system for controlling key for electronic signature |
DE69835924T DE69835924T2 (de) | 1997-01-17 | 1998-01-16 | Verfahren und system zur schlüsselkontrolle bei elektronischer unterschrift |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP9/6810 | 1997-01-17 | ||
JP681097 | 1997-01-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998032113A1 true WO1998032113A1 (fr) | 1998-07-23 |
Family
ID=11648562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1998/000142 WO1998032113A1 (fr) | 1997-01-17 | 1998-01-16 | Procede et systeme de controle de cle pour signature electronique |
Country Status (4)
Country | Link |
---|---|
US (1) | US6377692B1 (ja) |
EP (1) | EP0898260B1 (ja) |
DE (1) | DE69835924T2 (ja) |
WO (1) | WO1998032113A1 (ja) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0936805A1 (en) * | 1998-02-12 | 1999-08-18 | Hewlett-Packard Company | Document transfer systems |
CN1217509C (zh) | 2000-03-30 | 2005-08-31 | 三洋电机株式会社 | 内容数据存储装置 |
JP3629516B2 (ja) * | 2000-11-02 | 2005-03-16 | インターナショナル・ビジネス・マシーンズ・コーポレーション | プロキシサーバ、電子署名システム、電子署名検証システム、ネットワークシステム、電子署名方法、電子署名検証方法及び記憶媒体 |
JP2003069559A (ja) * | 2001-08-23 | 2003-03-07 | Sony Corp | コンテンツ保護システム |
US7349871B2 (en) * | 2002-08-08 | 2008-03-25 | Fujitsu Limited | Methods for purchasing of goods and services |
US7353382B2 (en) * | 2002-08-08 | 2008-04-01 | Fujitsu Limited | Security framework and protocol for universal pervasive transactions |
US20040107170A1 (en) * | 2002-08-08 | 2004-06-03 | Fujitsu Limited | Apparatuses for purchasing of goods and services |
US7606560B2 (en) | 2002-08-08 | 2009-10-20 | Fujitsu Limited | Authentication services using mobile device |
US7784684B2 (en) | 2002-08-08 | 2010-08-31 | Fujitsu Limited | Wireless computer wallet for physical point of sale (POS) transactions |
US7801826B2 (en) * | 2002-08-08 | 2010-09-21 | Fujitsu Limited | Framework and system for purchasing of goods and services |
US7822688B2 (en) | 2002-08-08 | 2010-10-26 | Fujitsu Limited | Wireless wallet |
ATE315859T1 (de) * | 2002-09-17 | 2006-02-15 | Errikos Pitsos | Verfahren und vorrichtung zur bereitstellung einer liste von öffentlichen schlüsseln in einem public-key-system |
EP2182465B1 (en) * | 2003-02-21 | 2013-05-01 | Research In Motion Limited | System and method of multiple-level control of electronic devices |
BRPI0412722B1 (pt) * | 2003-07-29 | 2017-10-24 | Thomson Licensing | Key synchronization for wireless lan (wlan) |
EP1673898A1 (en) * | 2003-09-22 | 2006-06-28 | Impsys Digital Security AB | Data communication security arrangement and method |
US7299493B1 (en) * | 2003-09-30 | 2007-11-20 | Novell, Inc. | Techniques for dynamically establishing and managing authentication and trust relationships |
US8015301B2 (en) * | 2003-09-30 | 2011-09-06 | Novell, Inc. | Policy and attribute based access to a resource |
US7467415B2 (en) * | 2003-09-30 | 2008-12-16 | Novell, Inc. | Distributed dynamic security for document collaboration |
US7877605B2 (en) * | 2004-02-06 | 2011-01-25 | Fujitsu Limited | Opinion registering application for a universal pervasive transaction framework |
US7711119B2 (en) * | 2004-05-27 | 2010-05-04 | Qualcomm Incorporated | Method and apparatus for transition of encryption key during an ongoing media communication session |
US20060259440A1 (en) * | 2005-05-13 | 2006-11-16 | Keycorp | Method and system for electronically signing a document |
DE602005002652T2 (de) * | 2005-08-05 | 2008-07-10 | Sap Ag | System und Verfahren für das Erneuern von Schlüsseln, welche in Public-Key Kryptographie genutzt werden |
JP5458657B2 (ja) * | 2009-05-01 | 2014-04-02 | ソニー株式会社 | 情報処理装置、鍵更新方法、及びプログラム |
FR2965431B1 (fr) * | 2010-09-28 | 2013-01-04 | Mouchi Haddad | Systeme d'echange de donnees entre au moins un emetteur et un recepteur |
JP2018205817A (ja) * | 2017-05-30 | 2018-12-27 | 富士通株式会社 | 情報処理装置、および管理プログラム |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6026387A (ja) * | 1983-07-22 | 1985-02-09 | 日本電信電話株式会社 | デイジタル署名方式 |
JPS6095475A (ja) * | 1983-10-28 | 1985-05-28 | 富士通株式会社 | 暗号装置の鍵生成方式 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4868877A (en) * | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4941176A (en) * | 1988-08-11 | 1990-07-10 | International Business Machines Corporation | Secure management of keys using control vectors |
US4918728A (en) * | 1989-08-30 | 1990-04-17 | International Business Machines Corporation | Data cryptography operations using control vectors |
US5091942A (en) * | 1990-07-23 | 1992-02-25 | Ericsson Ge Mobile Communications Holding, Inc. | Authentication system for digital cellular communications |
US5404403A (en) * | 1990-09-17 | 1995-04-04 | Motorola, Inc. | Key management in encryption systems |
JPH08305662A (ja) * | 1995-05-02 | 1996-11-22 | Fujitsu Ltd | クライアント認証システムおよび方法 |
JP3627384B2 (ja) * | 1996-01-17 | 2005-03-09 | 富士ゼロックス株式会社 | ソフトウェアの保護機能付き情報処理装置及びソフトウェアの保護機能付き情報処理方法 |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
-
1998
- 1998-01-16 DE DE69835924T patent/DE69835924T2/de not_active Expired - Lifetime
- 1998-01-16 EP EP98900392A patent/EP0898260B1/en not_active Expired - Lifetime
- 1998-01-16 US US09/142,929 patent/US6377692B1/en not_active Expired - Lifetime
- 1998-01-16 WO PCT/JP1998/000142 patent/WO1998032113A1/ja active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6026387A (ja) * | 1983-07-22 | 1985-02-09 | 日本電信電話株式会社 | デイジタル署名方式 |
JPS6095475A (ja) * | 1983-10-28 | 1985-05-28 | 富士通株式会社 | 暗号装置の鍵生成方式 |
Non-Patent Citations (1)
Title |
---|
See also references of EP0898260A4 * |
Also Published As
Publication number | Publication date |
---|---|
US6377692B1 (en) | 2002-04-23 |
EP0898260A1 (en) | 1999-02-24 |
DE69835924D1 (de) | 2006-11-02 |
EP0898260B1 (en) | 2006-09-20 |
DE69835924T2 (de) | 2007-09-20 |
EP0898260A4 (en) | 2004-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1998032113A1 (fr) | Procede et systeme de controle de cle pour signature electronique | |
JP3722592B2 (ja) | 通し番号を再使用可能な仮想プリペイドカードの使用要求承認法 | |
JP4082717B2 (ja) | 共有私有鍵を用いる匿名署名の方法と装置 | |
JP3802074B2 (ja) | 携帯可能な身分証明要素でのトランザクション方法 | |
US8438116B2 (en) | Token based new digital cash protocols | |
JP4109548B2 (ja) | 端末通信システム | |
US20080250246A1 (en) | Method for Controlling Secure Transactions Using a Single Multiple Dual-Key Device, Corresponding Physical Deivce, System and Computer Program | |
KR20020039318A (ko) | 전자 화폐 시스템 | |
JP2004506245A (ja) | デバイスの公開鍵と製造中の情報とのリンク | |
KR20060070484A (ko) | 포맷된 데이터 구조를 사용하여 안전 결제 거래를 수행하는시스템 및 방법 | |
SK117696A3 (en) | Trusted agents for open electronic commerce | |
JP3775791B2 (ja) | Ic、データ処理システム及びコンピュータプログラム | |
RU2007138849A (ru) | Сетевые коммерческие транзакции | |
WO2021144888A1 (ja) | 決済処理装置、決済処理プログラムおよび決済処理システム | |
JP3640785B2 (ja) | 電子署名用の鍵管理方法及びシステム | |
JP2003150735A (ja) | 電子証明書システム | |
US20030163374A1 (en) | Point service providing system with mechanism for preventing illegal use of point data | |
KR20010089622A (ko) | 카드에 대한 변제 의무 이행 요청 및 이 변제 의무 승인방법 | |
Van Herreweghen | Non-repudiation in SET: Open issues | |
KR100509924B1 (ko) | 이동 단말기를 이용한 전자화폐 기반의 다중 지불 방법 | |
CA2382696A1 (en) | An improved method and system for conducting secure payments over a computer network | |
JPH11296603A (ja) | 電子小切手方法 | |
KR100327885B1 (ko) | 복수기관에의등록방법,그의장치및그의프로그램기록매체 | |
EP1368959B1 (en) | Method and arrangement in a communications system | |
JPH10124597A (ja) | 利用許可証付き電子小切手方法および装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): KR SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998900392 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1998900392 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09142929 Country of ref document: US |
|
WWG | Wipo information: grant in national office |
Ref document number: 1998900392 Country of ref document: EP |