WO2000045358A1 - Procede pour assurer la securite d'informations electroniques - Google Patents
Procede pour assurer la securite d'informations electroniques Download PDFInfo
- Publication number
- WO2000045358A1 WO2000045358A1 PCT/JP1999/001350 JP9901350W WO0045358A1 WO 2000045358 A1 WO2000045358 A1 WO 2000045358A1 JP 9901350 W JP9901350 W JP 9901350W WO 0045358 A1 WO0045358 A1 WO 0045358A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- electronic information
- electronic
- divided
- blocks
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 70
- 238000000605 extraction Methods 0.000 claims abstract description 16
- 238000012546 transfer Methods 0.000 claims description 26
- 230000005540 biological transmission Effects 0.000 claims description 16
- 230000015572 biosynthetic process Effects 0.000 claims 1
- 230000003467 diminishing effect Effects 0.000 abstract 1
- 238000004891 communication Methods 0.000 description 47
- 238000010586 diagram Methods 0.000 description 21
- 230000005856 abnormality Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 230000010354 integration Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/34—Bits, or blocks of bits, of the telegraphic message being interchanged in time
Definitions
- the present invention relates to a method for ensuring the security of electronic information in the storage or exchange of electronic information, and to a method for ensuring the identity of electronic information with the original.
- a large number of computers are connected to a communication network to form a system, and each computer can be connected to an unspecified number of people via a communication path. For this reason, electronic information stored in an external storage device of a computer, such as a hard disk device, may be accessed by an unauthorized person via a communication channel and may be stolen or falsified.
- the stored electronic information and the transmitted electronic information contain all the information, so those who have obtained the decryption method by some means such as decryption of the encryption may be used. If there is, it can be easily restored and useful information can be obtained. In addition, information can be falsified or forged, and electronic information that has been retrieved or received can be You must always worry about maintaining genuine information. In particular, when storing or transmitting electronic information that requires high confidentiality, such as personal authentication data, there is concern about the conventional method.
- the present invention processes electronic information to be stored or transmitted so that even if the electronic information during storage or communication is stolen, it cannot be used to reduce the value of the information.
- the purpose of the present invention is to provide a method for ensuring the security of electronic information, and to provide a method for assuring the authenticity of the information that the user intends to retrieve, receive and restore. Disclosure of the invention
- one or more information blocks are generated by dividing an electronic information file into a plurality of information elements, selecting the divided information elements, changing the order, and combining them.
- This information block ensures that all information elements are included when all information blocks are integrated.
- it generates divided extracted data that records the method of dividing into information elements and the method of forming information blocks, and stores or transmits information blocks and divided extracted data.
- all information blocks and divided extracted data are aggregated, and the information elements in the information block are subdivided based on the divided extracted data, rearranged in the correct order, and integrated. In this way, the original electronic information file is restored.
- one or more information blocks can be obtained by dividing an electronic information file to be stored or sent into an appropriate number of information elements of an appropriate length, and shuffling and combining them.
- the information block is stored in the external storage device or sent to the receiver.
- information blocks can be further stored or sent by applying cryptographic technology, which can significantly improve security.
- the division extraction data is data necessary for division and combination used when forming the information block, and is stored or transmitted together with the information block. Since the divided extraction data includes position information and length information in the electronic information file for each information element, it may be attached to each information element and used together with the information block. Also, if security is important, it is good to use it separately from the information block.
- the person who retrieves or receives the electronic information collects all the information blocks, separates the information elements contained in each information block using the segmented extraction data, recombines them in the correct order, and recombines the original electronic blocks. Restore to information.
- the electronic information file When storing the electronic information in the external storage device of the computer, the electronic information file may be processed as described above to generate an information block and divided extraction data, and these may be stored in the external storage device. .
- the electronic information file When sending electronic information, the electronic information file is divided into a plurality of information elements, the divided information elements are selected and combined to form a plurality of information blocks, and each of the information blocks is separated.
- the data is transmitted to the receiver at the same time, the divided extracted data is transmitted to the receiver, and the receiver receiving these data re-divides the information elements included in the information block based on the divided extracted data, and in the correct order. It is preferable to restore the original electronic information by integration.
- the communication path to be used may be widely open to the general public, so that it is preferable to have higher security. Even in such a case, by sending a plurality of information blocks by different communication means, it is possible to ensure a particularly high level of security.
- each information block according to the present invention includes only a part of necessary information, even if a part of information block is obtained during communication, the entire information cannot be restored.
- At least one of the information block and the divided and extracted data is sent to the receiver by a second transmission means different from other electronic information transmission means.
- the divided extracted data include data for confirming the originality of the electronic information file.
- the fact that the electronic information file you are trying to send and the electronic information restored by the recipient are the same is the fact that the divided extracted data and the received information block By verifying that the contents are not inconsistent, it can be confirmed with high accuracy.
- the fact that the electronic information file to be sent and the electronic information restored by the receiver are the same is that the information element selected from the information elements in the information block sent by another communication route, that is, The key elements may be included in common, and the information elements received when integrating the information elements may be verified by verifying the identity of the key elements that are duplicated and included. Les ,.
- the electronic information security method of the present invention is used for online sales of application programs and databases, only a part of the information can be obtained even if a person other than a legitimate purchaser steals the electronic information being communicated. Therefore, the program cannot be executed and useful information cannot be obtained. Therefore, there is no motivation to steal electronic information during communication, and the profit of the seller is not lost by theft.
- the receiver returns the restored electronic information and checks the original electronic information against the stored original information to confirm the identity, the information may be falsified or part of the communication information may be lost during the communication. In such a case, it is possible to determine immediately and take a countermeasure.
- the information block obtained by the receiver may be returned as it is and compared with the original electronic information. By inspecting each information block, it is possible to identify the faulty location, which facilitates countermeasures.
- the information can be sent again with the reliability of the communication channel suspected, or the communication channel can be changed without the intervention of the falsifier. Note that the recipient Receiving the verification result from the follower allows the use of electronic information with confidence.
- the transfer station transfers the information block included in the information package sent to its own station to the receiver based on the destination information.
- the reliability of the whole system is improved even if only the part including the divided extracted data is sent via the transfer station.
- the transfer station transfers the electronic information by applying the encryption technology, higher security can be secured.
- the transmitted information is not always used immediately by the recipient. Then, the information block sent by the sender is stored at the transfer station, and the receiver sends the information block to the transfer station as needed, and the collected information blocks are integrated, restored, and used. May be.
- the information block obtained by dividing the electronic information file is used by each of the certificate authority and the parties.
- the relevant information blocks from the certificate authority and the parties will be collected, integrated and restored to the original electronic information when electronic information is used. It can be done.
- the electronic information security ensuring method of the present invention is used to store a part of the information at a certificate authority and store the information block at hand and the information block owned by the other party when the original information is needed.
- the information block deposited with the certificate authority will be restored together. Therefore, even if either the party or the certificate authority alters the information, the fact of the alteration can be clearly understood, and since the certificate authority stores only part of the information instead of the entire information, the information capacity that the certificate authority must have is small. Good.
- FIG. 1 is a block diagram illustrating the concept of the electronic information security ensuring method of the present invention
- FIG. 2 is a drawing illustrating one operation of the present invention
- FIG. 3 is related to the electronic information security ensuring method of the present invention.
- FIG. 4 is a flow diagram showing a first embodiment
- FIG. 4 is a block diagram of a system using the present embodiment
- FIG. 5 is a flow diagram showing a second embodiment according to the electronic information security ensuring method of the present invention
- FIG. FIG. 6 is a block diagram of a system using the present embodiment
- FIG. 7 is a flow diagram showing a third embodiment of the electronic information security ensuring method of the present invention
- FIG. 8 is a diagram of a system using the present embodiment.
- FIG. 4 is a flow diagram showing a first embodiment
- FIG. 4 is a block diagram of a system using the present embodiment
- FIG. 5 is a flow diagram showing a second embodiment according to the electronic information security ensuring method of the present invention
- FIG. 6 is
- FIG. 9 is a flow diagram showing a fourth embodiment of the electronic information security ensuring method of the present invention.
- FIG. 10 is a block diagram showing a fifth embodiment of the electronic information security ensuring method of the present invention.
- Fig. 11 shows the application of the present invention. Is a block diagram illustrating the function of the certification authority. BEST MODE FOR CARRYING OUT THE INVENTION
- the electronic information security ensuring method of the present invention is a method for ensuring the security of electronic information in storing or communicating electronic information files. According to the method of the present invention, even if a person steals electronic information during storage or communication, the value of the information that can be obtained by theft is reduced to prevent theft and reduce the profit of theft. In this way, theft is prevented, and if information is lost or falsified during communication, the fact is detected to ensure security.
- FIG. 1 is a block diagram illustrating the concept of the present invention
- FIG. 2 is a diagram illustrating one operation of the present invention.
- FIG. 1 shows a case where an electronic information file is divided into six information elements and divided into two information blocks as an example of a use mode of the present invention.
- a target electronic information file 1 is divided into an appropriate number of information elements 2.
- Information electronics It is not necessary to separate the comment 2 at a position where the information is meaningful, and it is preferable that the electronic information file 1 is simply physically divided to reduce the possibility of plagiarism.
- the arrangement order of the divided information elements A, B, C, D, E, and F is changed and appropriately grouped to form an appropriate number of information blocks 3.
- information elements A, D, and E are allocated to the first information block 3
- information elements B, C, and F are allocated to the second information block 3.
- the arrangement order of the information elements in the information block 3 can be arbitrarily changed.
- the electronic information since the electronic information is divided, the contents cannot be restored unless all information blocks are obtained. For example, when the personal authentication data shown in Fig. 2 (a) is divided as shown in Fig. 2 (b), even if one of the information blocks is obtained and successfully restored, it cannot be used as authentication data. . For this reason, it is not easy to make electronic information available to anyone with unauthorized access, and information security can be maintained.
- This information block 3 is stored in a storage device according to the purpose or sent to the recipient.
- the user of the electronic information divides the information block 3 obtained from the storage location or received from the sender into the original information elements 4 (A, B, C,%) And rearranges them in the correct order for use
- the original electronic information file 1 is restored by reverting to the possible electronic information file 5.
- the basic information required to restore the electronic information file 1 includes the delimiter information of the information elements A, B, C,... Contained in each block 3 and the information in the electronic information file 1 of each information element. Information on position and length.
- the information elements included in each block are re-divided using the delimiter information, and the electronic information file 5 obtained by rearranging the divided information elements according to the arrangement order of the information elements 4 is used as the original electronic information file 1.
- the electronic information file 5 obtained by rearranging the divided information elements according to the arrangement order of the information elements 4 is used as the original electronic information file 1.
- Whether or not the restored electronic information file 5 and the original electronic information file 1 are the same can be verified with a certain degree of accuracy, for example, by comparing the total word lengths of the two.
- Divided extracted data including these basic information is created when information block 3 is formed, and an identification area is attached to a part of information block 3 or stored or sent to restore electronic information file 1. Used for The divided extracted data may be attached to each information element.
- the divided extracted data may be stored or sent separately and separately from the information block 3.
- the number of information blocks 3 corresponding to one electronic information file 1 is not limited to two, but may be three or more, or may be one. In any case, since the arrangement of the information elements in the information block 3 is different from the original one, the information cannot be read out and used by others, so that the security of the electronic information can be maintained.
- an electronic information file is safely transmitted to a partner using a communication path by applying the electronic information security ensuring method of the present invention.
- FIG. 3 is a flow diagram showing the present embodiment, and FIG. It is a block diagram of a stem.
- the sender of the electronic information first prepares an electronic information file 11 by newly creating or extracting from the database and editing the electronic information to be transmitted (S 1).
- Examples of electronic information that can be used include those that require a high degree of security, such as personal authentication data, and those that are valuable, such as software sold through communication channels.
- the electronic information file 11 is divided into a plurality of information elements 13 by using the division software 12 (S12).
- the division software 12 can specify the division position in the electronic information file 11 and the word length of the information element for each of the information elements 13.
- the division software 12 may determine the division number itself by designating the number of divisions.
- the number of divisions can be determined arbitrarily. However, when electronic information of up to about 100 OkByte is targeted, for example, a number within 100 may be selected.
- the extraction software 14 has a function of changing the order of the divided information elements 13 and rearranging them, and a function of distributing them to the information blocks 15.
- the number of information blocks can be designated by an operator.
- division information and the rearrangement result of the information element 13 are converted into electronic information as division extraction data, and are attached to the information element 13 respectively.
- the divided extracted data of all the information elements 13 allocated to each information block 15 may be collectively added to the identification areas X 1 and X 2 of the information block 15 (S 4).
- the identification areas XI and X2 contain data on the sender and recipient, data on electronic information such as the creator and affiliation, data describing the range of use of the electronic information such as the user and expiration date, and integrated software. For example, data specifying software to be applied may be attached.
- the journal of the information block becomes easier, so that the receiver can re-integrate and restore the electronic information file. This is convenient when collecting information blocks related to target electronic information.
- the divided extracted data may be sent to the recipient independently of the information block. Also, instead of being distributed and attached to each information block, it may be added together to any of the information blocks. Further, all the information blocks may be accompanied by the divided extracted data relating to the entire electronic information file.
- each information block 15 is stored in a package for transmission to the transfer station 21 (S5).
- the package should contain the address of the person who should ultimately receive it.
- This package is encrypted and sent to the transfer station 21 (S6).
- the ⁇ processing may be performed by applying an appropriate known method.
- a different destination can be selected for each package.
- the security ensuring method of the present invention has high security since electronic information is divided and rearranged and placed on a communication path, so that it is sufficiently safe even when a normal communication path is used as compared with the conventional method. .
- a method of sending a portable storage device such as a floppy disk using mail can be selected.
- the transfer station 21 Upon receiving the package, the transfer station 21 decrypts the package and reads the stored destination information (S7).
- the information block stored in the package is re-encrypted and sent to the designated recipient (S8).
- the information block 15 is delivered to different transfer stations in a state where the content cannot be seen from the appearance, even if another person can obtain the electronic information existing on the communication path, the necessary information is obtained. It is difficult to discriminate and collect, and the target electronic information cannot be restored.
- the receiver receives (S 9) the information block 31 sent from the transfer station, decodes it, and searches for the information block or the identification area of the information element, All information blocks 31 necessary for restoring the target electronic information are collected (S10).
- the division information when the information element 13 is generated and the extraction information when the information block 15 is generated are extracted from the division extraction data of the identification area (S11).
- the information block 31 is subdivided based on the division information and the extracted information, and the original information element 13 is cut out (S12), and rearranged in the original order. (S13).
- the electronic information security ensuring method according to the present invention further comprises means for further assuring the originality of the electronic information.
- FIG. 5 is a flow diagram showing a method for ensuring the security of electronic information according to the second embodiment provided with means for confirming the originality at the sender of the electronic information
- FIG. 6 is a block diagram thereof.
- the sender When the sender generates the electronic information file 11 to be sent, the sender generates a copy 17 from the original (S 21) and saves the copy 17 (S 22). The same is true if the original 11 is stored instead of the manuscript 17.
- the division information and extraction information provided by the operator or partially generated by a computer are used in the same manner as in the first embodiment described above.
- the original 11 of the electronic information file is processed based on the information to form an information block 15 (S23).
- the object to be processed is the manuscript 17.
- the information blocks 15 are transmitted to the transfer station 21 in the same manner as in the first embodiment (S24).
- the transfer station 21 transfers the received information block 15 to the designated receiver (S25) o
- the recipient examines the received information block 31 and collects all the information blocks 31 necessary for restoring the target electronic information (S26).
- the information elements in each information block 31 are extracted using the integration software 32, the arrangement order is corrected, and the information elements are integrated.
- the information file 33 is formed (S27).
- a copy 35 of the formed electronic information file 33 is generated (S28), and this is returned to the sender of the electronic information via the transfer station 22 in the same manner as the transmission (S28). 9).
- the copy 35 of the electronic information file to be returned is subjected to an encryption process to enhance security.
- the sender compares the received restored electronic information file manuscript 35 with the stored electronic information file manuscript 17 to confirm the identity (S30).
- the receiver If the two do not match, the receiver is informed that it cannot be used as electronic information (S31). If the receiver does not receive the alert notification from the sender, it can determine that the information file has been restored normally (S32).
- the third embodiment is a method for securing the security of electronic information according to the present invention, which includes means for confirming the originality of each information block, and detects abnormalities in individual communication paths to facilitate measures. This is a method of guaranteeing the originality of information.
- FIG. 7 is a flow diagram showing the present embodiment
- FIG. 8 is a block diagram of a system using the present embodiment.
- this embodiment will be described in detail with reference to FIGS. 7 and 8.
- the sender creates an electronic information file 11 to be sent (S41), cuts out information elements based on the division information and the extracted information, shuffles the information elements, and shuffles the information blocks. 15 is formed (S42).
- a manuscript is generated from the information block 15 and stored (S43).
- the transfer station 21 decrypts the package and identifies the recipient's address.
- the read information block 15 is transferred to the newly designated recipient (S45).
- the receiver creates a copy of the received information block 31 (S46) and returns it to the caller via the transfer station 23 (S47).
- the sender compares the returned manuscript of the information block 31 with the stored manuscript of the original information block 15 to check whether they match (S48).
- an abnormality can be detected, it is difficult to identify a communication path having an abnormality because all the communication paths are detected in an integrated manner.
- an abnormal path can be easily specified as described above. Therefore, measures such as removal of obstacles are also easy.
- the first embodiment is performed using integrated software 32.
- the electronic information file is restored in the same procedure as in step 15 (S50).
- the integrated data 33 formed from the information block 31 becomes a finale 34 having the same contents as the original electronic information file 11.
- the exchange of electronic information may be performed using a communication path in which the transfer stations 21 and 23 do not exist.
- the transfer station may store the information block sent by the sender and transmit the information block according to the request of the receiver.
- the recipient collects all blocks of information, integrates them, restores and uses them.
- an electronic information file is stored in an external storage device of a computer system by applying the electronic information security ensuring method of the present invention.
- FIG. 9 is a block diagram of a computer system using the electronic information security ensuring method of the present embodiment.
- the electronic information file 41 created by the computer system is divided into information elements by the division extraction software 42, rearranged, distributed to a plurality of information blocks 43, and stored in the storage device 50.
- the integration software 62 extracts the division information and the extraction information from the information block 61, cuts out the information elements in the information block 61 based on these information, rearranges them in the original order, integrates them, and integrates the electronic information. Generate file 63.
- the electronic information file stored in the storage device 50 is divided into a plurality of information blocks, and the information blocks related so that the target electronic information can be restored. It is difficult to collect all. Also, the information elements inside the information block are scattered like shredded paper information. Therefore, it is not easy to reproduce part of the electronic information.
- an encryption process may be performed when recording the data in the storage device 50.
- the storage device 50 need not be a single storage device, but may be stored in a separate storage device for each information block.
- the electronic information security ensuring method according to the present embodiment can be applied to a case where personal authentication data is stored in an external storage device such as a hard disk device or a magnetic tape device in a certificate authority that particularly requires confidentiality.
- the method for securing the security of electronic information according to the present invention includes means for using a part of the electronic information to guarantee the originality of the electronic information.
- FIG. 10 is a block diagram for explaining the originality assurance means used in this embodiment. Since the basic method of securing electronic information in this embodiment is the same as that already described, the description will be simplified below to avoid duplication of description.
- FIG. 10 shows a case where the electronic information file is divided into seven information elements and divided into two information blocks, as an example of a use mode of the present invention.
- the divided information elements A, B, C, D, E, F, and G are rearranged in order, grouped appropriately, and distributed to two information blocks. At this time, some of the information elements are included in both information blocks as key elements. Also, the information block is accompanied by identification areas X1 and X2, which record information element delimiter information, position and length information in the electronic information file, and ID information of the electronic information file, for restoration. Make it available to
- information elements A, B, C, E, and F are allocated to the left information block, and information elements B, D, E, and G are allocated to the right information block.
- Information elements B and E are included as a key element in any information block. Since the information elements in each information block are appropriately rearranged and have no meaningful arrangement, even if another person reads the information block, the contents of the electronic information cannot be read as it is.
- This information block It is stored in the storage device or sent to the recipient according to the purpose.
- the user of the electronic information divides the obtained information block into the original information elements (A, B, C,%) Based on the information recorded in the identification areas X1 and X2, and divides them into the correct order. And restore the original electronic information file.
- the abnormality detection method used in the present embodiment even if the information block is independently observed, the key element to be collated cannot be extracted, so that an attack by a third party can be easily avoided. Also, the information processing for confirming the security without any special additional information is simple.
- abnormality detection method of the present embodiment may be used in combination with another method to improve the safety.
- the sixth embodiment relates to a certificate authority that applies the electronic information security ensuring method of the present invention, divides and stores electronic information in various places, and accurately verifies and verifies transactions between parties. It is.
- FIG. 11 is a block diagram illustrating the function of a certificate authority to which the present invention has been applied.
- the basic security assurance method is the same as that already described, so that the parts used for the certificate authority will be described carefully below, and the other parts will not be described again.
- the first party I and the second party ⁇ electronically store the contents of the mutually agreed upon transaction.
- the originality of electronic documents cannot be guaranteed because no trace remains even after rewriting. Therefore, the contents of the transaction are deposited using a third-party institution CA that can be trusted to reduce the room for future disputes, and the contents of the transaction are deposited and verified if necessary. It is required to do so.
- the certificate authority CA requires an extremely large storage capacity. Also, there is a possibility that the certificate authority CA may be tampered with, To completely guarantee the authenticity of electronic information, the management and operation of the certification authority CA is accompanied by great difficulties.
- the present embodiment is configured by applying the electronic information security ensuring method of the present invention, and is an authentication system in which the burden on the certificate authority CA is small and the originality of the electronic information is guaranteed with high accuracy.
- the parties I and ⁇ divide the mutual agreement into information blocks A, B and C based on the method of the above embodiment.
- the first party I stores the first information block A
- the second party ⁇ stores the second information block C.
- the third information block B is deposited with the certification authority C A.
- the certification authority CA can guarantee the originality of the restored electronic information only by recording a very small part of the original. As described above, the storage capacity of the certification authority C A becomes smaller, and since the full text of the agreement does not need to be stored, the storage responsibility of the certification authority C A is reduced.
- the electronic information security ensuring method is such that an electronic information file is once divided into information elements, rearranged, divided into information blocks, placed in a communication path, or stored in a storage device. Therefore, even if an outsider steals the information block during communication or stored, the small information elements are stored in pieces and the contents of the electronic information cannot be read, preventing the leakage of secrets. . Also, when the electronic information is restored, the originality of the electronic information can be easily confirmed. In addition, if the receiver receives the communication result received via the communication path or the restored electronic information file and returns it to the sender and checks it against the stored manuscript, the originality can be assured at a very high level. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL14458599A IL144585A0 (en) | 1999-01-28 | 1999-03-18 | Method for securing safety of electronic information |
EP99909225A EP1193666B1 (en) | 1999-01-28 | 1999-03-18 | Method for securing safety of electronic information |
AU28529/99A AU755577B2 (en) | 1999-01-28 | 1999-03-18 | Method for securing safety of electronic information |
EA200100835A EA003230B1 (ru) | 1999-01-28 | 1999-03-18 | Способ для обеспечения защиты электронной информации |
BR9917009-4A BR9917009A (pt) | 1999-01-28 | 1999-03-18 | Método para garantir a segurança de informações eletrônicas |
DE69931967T DE69931967T2 (de) | 1999-01-28 | 1999-03-18 | Methode zur sicherung von elektronischer information |
US09/889,160 US6957349B1 (en) | 1999-01-28 | 1999-03-18 | Method for securing safety of electronic information |
JP2000596543A JP4039810B2 (ja) | 1999-01-28 | 1999-03-18 | 電子情報の安全確保方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP11/19399 | 1999-01-28 | ||
JP1939999 | 1999-01-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000045358A1 true WO2000045358A1 (fr) | 2000-08-03 |
Family
ID=11998207
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1999/001350 WO2000045358A1 (fr) | 1999-01-28 | 1999-03-18 | Procede pour assurer la securite d'informations electroniques |
Country Status (13)
Country | Link |
---|---|
US (1) | US6957349B1 (ja) |
EP (1) | EP1193666B1 (ja) |
JP (1) | JP4039810B2 (ja) |
KR (1) | KR100589579B1 (ja) |
CN (1) | CN1334951A (ja) |
AU (1) | AU755577B2 (ja) |
BR (1) | BR9917009A (ja) |
DE (1) | DE69931967T2 (ja) |
EA (1) | EA003230B1 (ja) |
ES (1) | ES2267251T3 (ja) |
IL (1) | IL144585A0 (ja) |
WO (1) | WO2000045358A1 (ja) |
ZA (1) | ZA200105541B (ja) |
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001099381A1 (en) * | 2000-06-19 | 2001-12-27 | Amino Holdings Limited | Secure communications method |
JP2002091301A (ja) * | 2000-09-19 | 2002-03-27 | Ntt Data Corp | 鍵情報分散装置、演算装置および署名検証装置 |
JP2002537584A (ja) * | 1999-02-16 | 2002-11-05 | チューンツー.コム,インコーポレイテッド | 符号化された波形のディジタルサンプリングを使用するオーディオ合成 |
JP2002344442A (ja) * | 2001-05-17 | 2002-11-29 | Dainippon Printing Co Ltd | データ送信装置、データ受信装置および通信システム |
JP2003046500A (ja) * | 2001-08-03 | 2003-02-14 | Nec Corp | 個人情報管理システム及び個人情報管理方法、並びに情報処理サーバ |
WO2003036537A1 (fr) * | 2001-10-23 | 2003-05-01 | Global Friendship Inc. | Systeme de distribution d'informations electroniques |
WO2003036538A1 (fr) * | 2001-10-23 | 2003-05-01 | Global Friendship Inc. | Systeme de distribution d'information electronique capable d'effectuer un essai |
JP2003317044A (ja) * | 2002-04-24 | 2003-11-07 | Dainippon Printing Co Ltd | Rfid認証システム |
EP1369325A1 (en) * | 2001-03-14 | 2003-12-10 | Yutaka Yasukura | Automobile operating key, and electronic control device for automobiles |
WO2004010635A1 (ja) * | 2002-07-22 | 2004-01-29 | Global Friendship Inc. | 電子割符生成方法およびプログラム |
WO2004010634A1 (ja) * | 2002-07-22 | 2004-01-29 | Global Friendship Inc. | 電子情報送信システム |
JPWO2002027501A1 (ja) * | 2000-09-20 | 2004-02-05 | 保倉 豊 | 電子情報の編成復元方法 |
JP2004147218A (ja) * | 2002-10-25 | 2004-05-20 | Ntt Communications Kk | データ分割管理方法及びプログラム |
WO2004088520A1 (ja) * | 2003-03-31 | 2004-10-14 | Minoru Ikeda | セキュアー・ネットワーク・データベース・システムおよび情報交換方法 |
JP2004328293A (ja) * | 2003-04-23 | 2004-11-18 | C4 Technology Inc | 電子チケット、電子チケット方式、認証方式および情報処理方式 |
JP2004334380A (ja) * | 2003-05-02 | 2004-11-25 | Yasuhiro Tanaka | 著作物管理方法。 |
JP2004336702A (ja) * | 2003-04-15 | 2004-11-25 | Ntt Communications Kk | データ原本性確保方法およびシステム、ならびにデータ原本性確保用プログラム |
JP2005020346A (ja) * | 2003-06-26 | 2005-01-20 | Konica Minolta Business Technologies Inc | データ秘密化装置、データ復元装置、画像データ保存装置及び画像形成装置 |
WO2005008503A1 (ja) * | 2003-07-18 | 2005-01-27 | Global Friendship Inc. | 電子情報管理システム |
JP2005025553A (ja) * | 2003-07-03 | 2005-01-27 | Fuji Xerox Co Ltd | データファイル配信装置、アクセス管理装置、データファイル配信方法、およびそのプログラム |
WO2005022912A1 (ja) * | 2003-07-28 | 2005-03-10 | Global Point Systems Inc. | 動画配信システム、動画分割システム、動画配信プログラム、動画分割プログラム、同動画配信プログラムおよび/または同動画分割プログラムを格納した記録媒体 |
JP2005293592A (ja) * | 2004-04-01 | 2005-10-20 | Toshiba Corp | ネットワークでのデータの安全な記憶 |
JP2005535970A (ja) * | 2002-08-16 | 2005-11-24 | デブロック、アラン | 通信ネットワーク上での情報の送信を安全確保するための方法および装置 |
JP2006059261A (ja) * | 2004-08-23 | 2006-03-02 | Sony Corp | メモリーカード及び再生装置 |
JP2006065401A (ja) * | 2004-08-24 | 2006-03-09 | Sony Corp | メモリーカード及びその作成方法 |
JP2006113764A (ja) * | 2004-10-14 | 2006-04-27 | Dainippon Printing Co Ltd | データ解読防止方法 |
JP2006197581A (ja) * | 2004-12-16 | 2006-07-27 | Matsushita Electric Ind Co Ltd | 改竄検出用データ生成方法 |
JP2006197540A (ja) * | 2004-12-16 | 2006-07-27 | Matsushita Electric Ind Co Ltd | 改竄検出用データ生成方法、および改竄検出方法及び装置 |
JP2006208992A (ja) * | 2005-01-31 | 2006-08-10 | Fujitsu Ltd | データ圧縮方法、データ復元方法、データ圧縮装置、データ復元装置、データ圧縮プログラムおよびデータ復元プログラム |
WO2006114841A1 (ja) * | 2005-04-08 | 2006-11-02 | Trusted Solutions Corporation | 情報処理方法および情報処理システム |
JP2007140869A (ja) * | 2005-11-17 | 2007-06-07 | Nippon Rad Inc | 電子情報管理方法、電子情報管理システム、コンピュータプログラム |
WO2007072615A1 (ja) * | 2005-12-19 | 2007-06-28 | Sony Computer Entertainment Inc. | 認証システム及び認証対象装置 |
JP2007199155A (ja) * | 2006-01-24 | 2007-08-09 | Kyocera Mita Corp | 画像形成システム |
JP2007243329A (ja) * | 2006-03-06 | 2007-09-20 | Sharp Corp | データ処理装置およびデータ復元装置 |
JP2008061041A (ja) * | 2006-08-31 | 2008-03-13 | Sharp Corp | 通信システム、プログラムおよび記録媒体 |
JP2009276935A (ja) * | 2008-05-13 | 2009-11-26 | Mizuho Information & Research Institute Inc | パスワード管理システム、パスワード管理方法及びパスワード管理プログラム |
JP2009301062A (ja) * | 2009-09-28 | 2009-12-24 | Oki Electric Ind Co Ltd | 重要情報伝送システム,重要情報送信装置,重要情報送信方法,中継装置,中継方法,およびそのプログラム |
JP2011015429A (ja) * | 2003-04-15 | 2011-01-20 | Ntt Communications Kk | データ原本性確保方法およびシステム、ならびにデータ原本性確保用プログラム |
JP2012527838A (ja) * | 2009-05-19 | 2012-11-08 | セキュリティー ファースト コーポレイション | クラウド内にデータを確保するシステムおよび方法 |
JP5214474B2 (ja) * | 2007-02-16 | 2013-06-19 | パナソニック株式会社 | 分散情報配布装置、保持装置、認証局装置及びシステム |
JP2013179569A (ja) * | 2012-01-30 | 2013-09-09 | Seiko Instruments Inc | データ証明システムおよびデータ証明サーバ |
JP2013222273A (ja) * | 2012-04-13 | 2013-10-28 | Lapis Semiconductor Co Ltd | 半導体装置、機密データ管理システム、及び機密データ管理方法 |
JP2014011762A (ja) * | 2012-07-03 | 2014-01-20 | Felica Networks Inc | 情報処理装置、端末装置、情報処理システム、情報処理方法およびコンピュータプログラム |
JP5895093B1 (ja) * | 2015-10-14 | 2016-03-30 | ネクスト・イット株式会社 | ナンバー復元システム並びに支援装置及び復元支援方法 |
JP2018032908A (ja) * | 2016-08-22 | 2018-03-01 | 日本電気株式会社 | 情報送信方法、情報処理方法、プログラム、復号方法、プログラム |
WO2020153480A1 (ja) * | 2019-01-24 | 2020-07-30 | 株式会社エヌティーアイ | 送受信システム、送信装置、受信装置、方法、並びにコンピュータプログラム |
JP2021056435A (ja) * | 2019-10-01 | 2021-04-08 | 株式会社東芝 | 情報処理装置、情報処理方法、およびプログラム |
JP2021096472A (ja) * | 2019-12-13 | 2021-06-24 | 黒川 敦 | 情報処理装置、およびコンピュータープログラム |
JP2022105800A (ja) * | 2021-01-05 | 2022-07-15 | 株式会社岩崎電機製作所 | 情報蓄積システム、および、情報蓄積方法 |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1164489B1 (en) | 1999-12-20 | 2007-02-14 | Dai Nippon Printing Co., Ltd. | Distributed data archive device and system |
JP2001320349A (ja) | 2000-05-08 | 2001-11-16 | Mitsubishi Heavy Ind Ltd | 分散通信装置 |
WO2001099379A1 (en) * | 2000-06-19 | 2001-12-27 | Martin Gilbert | Secure communications method |
US8077861B2 (en) * | 2004-08-12 | 2011-12-13 | Cmla, Llc | Permutation data transform to enhance security |
KR100446336B1 (ko) | 2003-05-20 | 2004-09-01 | 엔에이치엔(주) | 데이터 암호화 방법 및 장치 |
JP2005196728A (ja) * | 2003-12-11 | 2005-07-21 | Nec Corp | セキュリティ検証システム、装置、方法、およびセキュリティ検証用プログラム |
KR100957821B1 (ko) * | 2003-12-24 | 2010-05-13 | 엔에이치엔(주) | 데이터 암호화 방법 및 장치 |
FR2868226B1 (fr) * | 2004-03-29 | 2006-05-26 | Philippe Joliot | Procede de transmission d'un fichier de donnees numeriques au travers de reseaux de telecommunications ou de radiocommunications |
US8510225B2 (en) * | 2004-09-01 | 2013-08-13 | Research In Motion Limited | Split channel authenticity queries in multi-party dialog |
US8015595B2 (en) * | 2004-09-23 | 2011-09-06 | Igt | Methods and apparatus for negotiating communications within a gaming network |
CN1889418B (zh) * | 2005-06-30 | 2011-11-16 | 诺基亚西门子通信系统技术(北京)有限公司 | 一种网络存储方法与网络存储系统 |
CN1892731B (zh) * | 2005-07-01 | 2011-08-17 | 刘畅 | 字体点阵结构的加密方法和加密系统 |
JP2007135170A (ja) * | 2005-10-12 | 2007-05-31 | Hitachi Ltd | 電子データ送受信方法 |
JP4778361B2 (ja) | 2006-05-19 | 2011-09-21 | 日立オムロンターミナルソリューションズ株式会社 | 認証装置及び認証システム及び認証装置の装置確認方法 |
US10169598B1 (en) | 2008-04-10 | 2019-01-01 | United Services Automobile Association | Systems and methods for sending and receiving encrypted submessages |
IL191169A0 (en) * | 2008-04-30 | 2009-02-11 | Privacy Inside Ltd | A method and a system for data verification and/or authentication |
CN101320356B (zh) * | 2008-07-14 | 2013-06-05 | 曹乃承 | 数据存储方法和装置 |
US8204217B2 (en) * | 2009-01-28 | 2012-06-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Lightweight streaming protection by sequence number scrambling |
EP3015988A1 (en) | 2010-08-12 | 2016-05-04 | Security First Corp. | Systems and methods for secure remote storage of data |
US9165137B2 (en) | 2010-08-18 | 2015-10-20 | Security First Corp. | Systems and methods for securing virtual machine computing environments |
CN104520873A (zh) | 2012-04-06 | 2015-04-15 | 安全第一公司 | 用于保护和恢复虚拟机的系统和方法 |
KR101716063B1 (ko) * | 2013-11-19 | 2017-03-13 | 가부시키가이샤 고마쓰 세이사쿠쇼 | 작업 기계 및 작업 기계의 관리 시스템 |
US9621586B2 (en) * | 2014-02-08 | 2017-04-11 | International Business Machines Corporation | Methods and apparatus for enhancing business services resiliency using continuous fragmentation cell technology |
US9733849B2 (en) | 2014-11-21 | 2017-08-15 | Security First Corp. | Gateway for cloud-based secure storage |
CN106550032A (zh) * | 2016-10-25 | 2017-03-29 | 广东欧珀移动通信有限公司 | 一种数据备份方法、装置及系统 |
CN107330340B (zh) * | 2017-06-19 | 2020-09-11 | 国家计算机网络与信息安全管理中心 | 文件加密方法、设备、文件解密方法、设备及存储介质 |
CN110069933B (zh) * | 2018-01-22 | 2022-02-18 | 北大方正集团有限公司 | 文件处理方法和装置 |
JP2019161443A (ja) * | 2018-03-13 | 2019-09-19 | 富士通株式会社 | 暗号化情報処理装置、暗号化情報処理システム、復号化鍵情報生成プログラム、及び復号化鍵情報生成方法 |
JP6534478B1 (ja) * | 2018-08-16 | 2019-06-26 | 行徳紙工株式会社 | ファイルの秘匿分散システム及び秘匿分散方法 |
EP3681094B1 (en) * | 2019-01-09 | 2021-11-10 | British Telecommunications public limited company | Impeding data access |
GB2580386B8 (en) * | 2019-01-09 | 2021-08-11 | British Telecomm | Variable data protection |
WO2020144027A1 (en) | 2019-01-09 | 2020-07-16 | British Telecommunications Public Limited Company | Variable data protection |
CN112422491A (zh) * | 2020-05-08 | 2021-02-26 | 上海幻电信息科技有限公司 | 数字编码的加密解密方法、服务器和存储介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS60247683A (ja) * | 1984-05-23 | 1985-12-07 | 三菱電機株式会社 | デ−タ保護管理システム |
JPS6272243A (ja) * | 1985-09-26 | 1987-04-02 | Fujitsu Ltd | 暗号化方式 |
JPS63225840A (ja) * | 1987-03-03 | 1988-09-20 | Yokogawa Hewlett Packard Ltd | 情報記憶システム |
JPH02259689A (ja) * | 1989-03-30 | 1990-10-22 | Matsushita Electric Ind Co Ltd | データ転置装置 |
JPH03151738A (ja) * | 1989-11-08 | 1991-06-27 | Hitachi Ltd | 検証用データ生成装置 |
JPH08185376A (ja) * | 1994-12-28 | 1996-07-16 | Hitachi Ltd | メッセージの信託システム |
JPH1091705A (ja) * | 1996-09-17 | 1998-04-10 | Hitachi Ltd | 電子商取引におけるデータ伝送システムおよび方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2641337A1 (de) | 1976-09-14 | 1978-03-16 | Licentia Gmbh | Verfahren zur ver- und entschleierung zu uebertragender nachrichten |
JPS61107375A (ja) * | 1984-10-31 | 1986-05-26 | 富士通株式会社 | 暗号装置のランダム転置テ−ブル作成方法 |
JPS63255840A (ja) | 1987-04-14 | 1988-10-24 | Nec Corp | 光学的記録再生装置における光量制御装置 |
JP2800319B2 (ja) * | 1989-10-27 | 1998-09-21 | 松下電器産業株式会社 | 情報記録再生装置 |
US5058162A (en) * | 1990-08-09 | 1991-10-15 | Hewlett-Packard Company | Method of distributing computer data files |
JPH0774830A (ja) * | 1993-06-22 | 1995-03-17 | Canon Inc | マルチメディア情報通信装置 |
US5757922A (en) * | 1995-12-08 | 1998-05-26 | Nippon Telegraph & Telephone Corp. | Method and system for packet scrambling communication with reduced processing overhead |
WO2000064096A1 (fr) | 1999-04-19 | 2000-10-26 | Akita, Yasuo | Systeme de communications cryptees |
-
1999
- 1999-03-18 DE DE69931967T patent/DE69931967T2/de not_active Expired - Fee Related
- 1999-03-18 JP JP2000596543A patent/JP4039810B2/ja not_active Expired - Fee Related
- 1999-03-18 US US09/889,160 patent/US6957349B1/en not_active Expired - Fee Related
- 1999-03-18 IL IL14458599A patent/IL144585A0/xx not_active IP Right Cessation
- 1999-03-18 EP EP99909225A patent/EP1193666B1/en not_active Expired - Lifetime
- 1999-03-18 AU AU28529/99A patent/AU755577B2/en not_active Ceased
- 1999-03-18 WO PCT/JP1999/001350 patent/WO2000045358A1/ja active IP Right Grant
- 1999-03-18 KR KR1020017009481A patent/KR100589579B1/ko not_active IP Right Cessation
- 1999-03-18 CN CN99815903A patent/CN1334951A/zh active Pending
- 1999-03-18 EA EA200100835A patent/EA003230B1/ru not_active IP Right Cessation
- 1999-03-18 BR BR9917009-4A patent/BR9917009A/pt not_active IP Right Cessation
- 1999-03-18 ES ES99909225T patent/ES2267251T3/es not_active Expired - Lifetime
-
2001
- 2001-07-05 ZA ZA200105541A patent/ZA200105541B/en unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS60247683A (ja) * | 1984-05-23 | 1985-12-07 | 三菱電機株式会社 | デ−タ保護管理システム |
JPS6272243A (ja) * | 1985-09-26 | 1987-04-02 | Fujitsu Ltd | 暗号化方式 |
JPS63225840A (ja) * | 1987-03-03 | 1988-09-20 | Yokogawa Hewlett Packard Ltd | 情報記憶システム |
JPH02259689A (ja) * | 1989-03-30 | 1990-10-22 | Matsushita Electric Ind Co Ltd | データ転置装置 |
JPH03151738A (ja) * | 1989-11-08 | 1991-06-27 | Hitachi Ltd | 検証用データ生成装置 |
JPH08185376A (ja) * | 1994-12-28 | 1996-07-16 | Hitachi Ltd | メッセージの信託システム |
JPH1091705A (ja) * | 1996-09-17 | 1998-04-10 | Hitachi Ltd | 電子商取引におけるデータ伝送システムおよび方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1193666A4 * |
Cited By (72)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002537584A (ja) * | 1999-02-16 | 2002-11-05 | チューンツー.コム,インコーポレイテッド | 符号化された波形のディジタルサンプリングを使用するオーディオ合成 |
WO2001099381A1 (en) * | 2000-06-19 | 2001-12-27 | Amino Holdings Limited | Secure communications method |
JP2002091301A (ja) * | 2000-09-19 | 2002-03-27 | Ntt Data Corp | 鍵情報分散装置、演算装置および署名検証装置 |
US7231528B1 (en) | 2000-09-20 | 2007-06-12 | Yutaka Yasukura | Method of editing/restoring electronic information |
JPWO2002027501A1 (ja) * | 2000-09-20 | 2004-02-05 | 保倉 豊 | 電子情報の編成復元方法 |
EP1369325A1 (en) * | 2001-03-14 | 2003-12-10 | Yutaka Yasukura | Automobile operating key, and electronic control device for automobiles |
US7038331B2 (en) | 2001-03-14 | 2006-05-02 | Yutaka Yasukura | Automobile operating key and electronic control device dore automobiles |
EP1369325A4 (en) * | 2001-03-14 | 2005-01-12 | Yutaka Yasukura | AUTOMOBILE CONTROL KEY AND ELECTRONIC CONTROL DEVICE FOR MOTOR VEHICLES |
JP2002344442A (ja) * | 2001-05-17 | 2002-11-29 | Dainippon Printing Co Ltd | データ送信装置、データ受信装置および通信システム |
JP2003046500A (ja) * | 2001-08-03 | 2003-02-14 | Nec Corp | 個人情報管理システム及び個人情報管理方法、並びに情報処理サーバ |
JP2003132234A (ja) * | 2001-10-23 | 2003-05-09 | Global Friendship Inc | 試用可能な電子情報配送システム |
WO2003036537A1 (fr) * | 2001-10-23 | 2003-05-01 | Global Friendship Inc. | Systeme de distribution d'informations electroniques |
WO2003036538A1 (fr) * | 2001-10-23 | 2003-05-01 | Global Friendship Inc. | Systeme de distribution d'information electronique capable d'effectuer un essai |
JP2003132229A (ja) * | 2001-10-23 | 2003-05-09 | Global Friendship Inc | 電子情報配送システム |
JP2003317044A (ja) * | 2002-04-24 | 2003-11-07 | Dainippon Printing Co Ltd | Rfid認証システム |
WO2004010635A1 (ja) * | 2002-07-22 | 2004-01-29 | Global Friendship Inc. | 電子割符生成方法およびプログラム |
WO2004010634A1 (ja) * | 2002-07-22 | 2004-01-29 | Global Friendship Inc. | 電子情報送信システム |
JP2004053968A (ja) * | 2002-07-22 | 2004-02-19 | Global Friendship Inc | 電子情報送信システム |
JP2004053969A (ja) * | 2002-07-22 | 2004-02-19 | Global Friendship Inc | 電子割符生成方法およびプログラム |
JP2005535970A (ja) * | 2002-08-16 | 2005-11-24 | デブロック、アラン | 通信ネットワーク上での情報の送信を安全確保するための方法および装置 |
JP2004147218A (ja) * | 2002-10-25 | 2004-05-20 | Ntt Communications Kk | データ分割管理方法及びプログラム |
WO2004088520A1 (ja) * | 2003-03-31 | 2004-10-14 | Minoru Ikeda | セキュアー・ネットワーク・データベース・システムおよび情報交換方法 |
JP2011015429A (ja) * | 2003-04-15 | 2011-01-20 | Ntt Communications Kk | データ原本性確保方法およびシステム、ならびにデータ原本性確保用プログラム |
JP4610176B2 (ja) * | 2003-04-15 | 2011-01-12 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | データ原本性確保方法およびシステム、ならびにデータ原本性確保用プログラム |
JP2004336702A (ja) * | 2003-04-15 | 2004-11-25 | Ntt Communications Kk | データ原本性確保方法およびシステム、ならびにデータ原本性確保用プログラム |
JP2013102526A (ja) * | 2003-04-15 | 2013-05-23 | Ntt Communications Kk | データ原本性確保方法およびシステム、ならびにデータ原本性確保用プログラム |
JP2014142651A (ja) * | 2003-04-15 | 2014-08-07 | Ntt Communications Corp | データ原本性確保方法およびシステム、ならびにデータ原本性確保用プログラム |
JP2004328293A (ja) * | 2003-04-23 | 2004-11-18 | C4 Technology Inc | 電子チケット、電子チケット方式、認証方式および情報処理方式 |
JP2004334380A (ja) * | 2003-05-02 | 2004-11-25 | Yasuhiro Tanaka | 著作物管理方法。 |
JP2005020346A (ja) * | 2003-06-26 | 2005-01-20 | Konica Minolta Business Technologies Inc | データ秘密化装置、データ復元装置、画像データ保存装置及び画像形成装置 |
JP2005025553A (ja) * | 2003-07-03 | 2005-01-27 | Fuji Xerox Co Ltd | データファイル配信装置、アクセス管理装置、データファイル配信方法、およびそのプログラム |
JP2005038139A (ja) * | 2003-07-18 | 2005-02-10 | Global Friendship Inc | 電子情報管理システム |
WO2005008503A1 (ja) * | 2003-07-18 | 2005-01-27 | Global Friendship Inc. | 電子情報管理システム |
JPWO2005022912A1 (ja) * | 2003-07-28 | 2006-11-02 | 有限会社グローバルポイントシステムズ | 動画配信システム、動画分割システム、動画配信プログラム、動画分割プログラム、同動画配信プログラムおよび/または同動画分割プログラムを格納した記録媒体 |
WO2005022912A1 (ja) * | 2003-07-28 | 2005-03-10 | Global Point Systems Inc. | 動画配信システム、動画分割システム、動画配信プログラム、動画分割プログラム、同動画配信プログラムおよび/または同動画分割プログラムを格納した記録媒体 |
JP2005293592A (ja) * | 2004-04-01 | 2005-10-20 | Toshiba Corp | ネットワークでのデータの安全な記憶 |
JP2006059261A (ja) * | 2004-08-23 | 2006-03-02 | Sony Corp | メモリーカード及び再生装置 |
JP4655545B2 (ja) * | 2004-08-23 | 2011-03-23 | ソニー株式会社 | メモリーカード及び再生装置 |
JP2006065401A (ja) * | 2004-08-24 | 2006-03-09 | Sony Corp | メモリーカード及びその作成方法 |
JP4655547B2 (ja) * | 2004-08-24 | 2011-03-23 | ソニー株式会社 | メモリーカード及びその作成方法 |
JP2006113764A (ja) * | 2004-10-14 | 2006-04-27 | Dainippon Printing Co Ltd | データ解読防止方法 |
JP2006197540A (ja) * | 2004-12-16 | 2006-07-27 | Matsushita Electric Ind Co Ltd | 改竄検出用データ生成方法、および改竄検出方法及び装置 |
JP2006197581A (ja) * | 2004-12-16 | 2006-07-27 | Matsushita Electric Ind Co Ltd | 改竄検出用データ生成方法 |
US8185746B2 (en) | 2004-12-16 | 2012-05-22 | Panasonic Corporation | Method for generating data for detection of tampering, and method and apparatus for detection of tampering |
US7730320B2 (en) | 2004-12-16 | 2010-06-01 | Panasonic Corporation | Method for generating data for detection of tampering, and method and apparatus for detection of tampering |
JP2006208992A (ja) * | 2005-01-31 | 2006-08-10 | Fujitsu Ltd | データ圧縮方法、データ復元方法、データ圧縮装置、データ復元装置、データ圧縮プログラムおよびデータ復元プログラム |
US7965841B2 (en) | 2005-01-31 | 2011-06-21 | Fujitsu Limited | Method and apparatus for compressing and decompressing data, and computer product |
JP4630080B2 (ja) * | 2005-01-31 | 2011-02-09 | 富士通株式会社 | データ復元方法およびデータ復元プログラム |
WO2006114841A1 (ja) * | 2005-04-08 | 2006-11-02 | Trusted Solutions Corporation | 情報処理方法および情報処理システム |
JP2007140869A (ja) * | 2005-11-17 | 2007-06-07 | Nippon Rad Inc | 電子情報管理方法、電子情報管理システム、コンピュータプログラム |
US8281130B2 (en) | 2005-12-19 | 2012-10-02 | Sony Computer Entertainment Inc. | Authentication system and authentication object device |
WO2007072615A1 (ja) * | 2005-12-19 | 2007-06-28 | Sony Computer Entertainment Inc. | 認証システム及び認証対象装置 |
JP2007199155A (ja) * | 2006-01-24 | 2007-08-09 | Kyocera Mita Corp | 画像形成システム |
JP2007243329A (ja) * | 2006-03-06 | 2007-09-20 | Sharp Corp | データ処理装置およびデータ復元装置 |
JP2008061041A (ja) * | 2006-08-31 | 2008-03-13 | Sharp Corp | 通信システム、プログラムおよび記録媒体 |
JP5214474B2 (ja) * | 2007-02-16 | 2013-06-19 | パナソニック株式会社 | 分散情報配布装置、保持装置、認証局装置及びシステム |
US9166972B2 (en) | 2007-02-16 | 2015-10-20 | Panasonic Corporation | Shared information distributing device, holding device, certificate authority device, and system |
US8930660B2 (en) | 2007-02-16 | 2015-01-06 | Panasonic Corporation | Shared information distributing device, holding device, certificate authority device, and system |
JP2009276935A (ja) * | 2008-05-13 | 2009-11-26 | Mizuho Information & Research Institute Inc | パスワード管理システム、パスワード管理方法及びパスワード管理プログラム |
JP2012527838A (ja) * | 2009-05-19 | 2012-11-08 | セキュリティー ファースト コーポレイション | クラウド内にデータを確保するシステムおよび方法 |
JP2009301062A (ja) * | 2009-09-28 | 2009-12-24 | Oki Electric Ind Co Ltd | 重要情報伝送システム,重要情報送信装置,重要情報送信方法,中継装置,中継方法,およびそのプログラム |
JP2013179569A (ja) * | 2012-01-30 | 2013-09-09 | Seiko Instruments Inc | データ証明システムおよびデータ証明サーバ |
JP2013222273A (ja) * | 2012-04-13 | 2013-10-28 | Lapis Semiconductor Co Ltd | 半導体装置、機密データ管理システム、及び機密データ管理方法 |
JP2014011762A (ja) * | 2012-07-03 | 2014-01-20 | Felica Networks Inc | 情報処理装置、端末装置、情報処理システム、情報処理方法およびコンピュータプログラム |
JP5895093B1 (ja) * | 2015-10-14 | 2016-03-30 | ネクスト・イット株式会社 | ナンバー復元システム並びに支援装置及び復元支援方法 |
JP2017076221A (ja) * | 2015-10-14 | 2017-04-20 | ネクスト・イット株式会社 | ナンバー復元システム並びに支援装置及び復元支援方法 |
JP2018032908A (ja) * | 2016-08-22 | 2018-03-01 | 日本電気株式会社 | 情報送信方法、情報処理方法、プログラム、復号方法、プログラム |
WO2020153480A1 (ja) * | 2019-01-24 | 2020-07-30 | 株式会社エヌティーアイ | 送受信システム、送信装置、受信装置、方法、並びにコンピュータプログラム |
JP2020120297A (ja) * | 2019-01-24 | 2020-08-06 | 株式会社 エヌティーアイ | 送受信システム、送信装置、受信装置、方法、並びにコンピュータプログラム |
JP2021056435A (ja) * | 2019-10-01 | 2021-04-08 | 株式会社東芝 | 情報処理装置、情報処理方法、およびプログラム |
JP2021096472A (ja) * | 2019-12-13 | 2021-06-24 | 黒川 敦 | 情報処理装置、およびコンピュータープログラム |
JP2022105800A (ja) * | 2021-01-05 | 2022-07-15 | 株式会社岩崎電機製作所 | 情報蓄積システム、および、情報蓄積方法 |
Also Published As
Publication number | Publication date |
---|---|
CN1334951A (zh) | 2002-02-06 |
AU755577B2 (en) | 2002-12-19 |
BR9917009A (pt) | 2002-01-22 |
DE69931967T2 (de) | 2006-10-19 |
EP1193666B1 (en) | 2006-06-14 |
EA003230B1 (ru) | 2003-02-27 |
IL144585A0 (en) | 2002-05-23 |
KR100589579B1 (ko) | 2006-06-15 |
US6957349B1 (en) | 2005-10-18 |
KR20010101753A (ko) | 2001-11-14 |
AU2852999A (en) | 2000-08-18 |
EP1193666A1 (en) | 2002-04-03 |
DE69931967D1 (de) | 2006-07-27 |
ZA200105541B (en) | 2002-02-14 |
EA200100835A1 (ru) | 2001-12-24 |
EP1193666A4 (en) | 2004-03-10 |
JP4039810B2 (ja) | 2008-01-30 |
ES2267251T3 (es) | 2007-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4039810B2 (ja) | 電子情報の安全確保方法 | |
EP1678666B1 (en) | Storage and authentication of data transactions | |
US10269084B2 (en) | Registry | |
JP3656688B2 (ja) | 暗号データ回復方法及び鍵登録システム | |
JP5016749B2 (ja) | 認証された文書の電子的送信、格納および検索システムおよび方法 | |
US5745573A (en) | System and method for controlling access to a user secret | |
US6421779B1 (en) | Electronic data storage apparatus, system and method | |
US8984275B2 (en) | Virtual air gap—VAG system | |
US20050262321A1 (en) | Information processing apparatus and method, and storage medium | |
US20080310619A1 (en) | Process of Encryption and Operational Control of Tagged Data Elements | |
US20100064354A1 (en) | Maidsafe.net | |
JPH11512841A (ja) | 文書認証システムおよび方法 | |
JP2007282295A (ja) | キー寄託機能付き暗号システムおよび方法 | |
SE502424C2 (sv) | Metod och anordning vid certifikathanteringssystem | |
JP2000215280A (ja) | 本人認証システム | |
JPH11339045A (ja) | 電子データ確認及び発行方法、その実施装置、その処理プログラムを記録した媒体並びに電子データ記録媒体 | |
EP1335363A2 (en) | Valid medium management system | |
JP4636494B2 (ja) | Rfidにおける実用的セキュリティ確保の方法 | |
KR20080014795A (ko) | 태그 데이터 요소의 암호화와 동작 제어 프로세스 | |
JP2002064535A (ja) | 内容証明電子メール | |
JP2004302749A (ja) | 契約文書保証システムおよび契約文書の正当性の保証方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 1200100720 Country of ref document: VN Ref document number: 99815903.4 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 09674766 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999909225 Country of ref document: EP Ref document number: 2001/05541 Country of ref document: ZA Ref document number: 200105541 Country of ref document: ZA |
|
ENP | Entry into the national phase |
Ref document number: 2000 596543 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09889160 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 28529/99 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: IN/PCT/2001/00855/MU Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 144585 Country of ref document: IL |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020017009481 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200100835 Country of ref document: EA |
|
WWP | Wipo information: published in national office |
Ref document number: 1020017009481 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1999909225 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 28529/99 Country of ref document: AU |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020017009481 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1999909225 Country of ref document: EP |