WO2004090771A1 - Electronic commerce method, electronic commerce system, authentication terminal, and authentication method by agent - Google Patents
Electronic commerce method, electronic commerce system, authentication terminal, and authentication method by agent Download PDFInfo
- Publication number
- WO2004090771A1 WO2004090771A1 PCT/JP2003/004271 JP0304271W WO2004090771A1 WO 2004090771 A1 WO2004090771 A1 WO 2004090771A1 JP 0304271 W JP0304271 W JP 0304271W WO 2004090771 A1 WO2004090771 A1 WO 2004090771A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- orderer
- authentication
- information
- authentication terminal
- terminal
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Definitions
- the present invention relates to a technique used for electronic commerce in which personal authentication is performed using personal authentication information such as a password or digital data (biometric information) representing physical characteristics of the personal.
- personal authentication information such as a password or digital data (biometric information) representing physical characteristics of the personal.
- PKI Public Key Infrastructure
- CA Certificate Authority
- PKI Public Key Infrastructure
- 3 ⁇ 4 ⁇ a Certificate Authority
- CA Certificate Authority
- a user places an order for a product or the like with a trader
- the user's electronic signature is encrypted with a private key and sent to the trader along with a public key.
- the vendor verifies that the transmitted electronic signature can be decrypted with the public key, and verifies the user against CA using the public key to authenticate that the sender is the user.
- PKI guarantees that user information transmitted on the network has not been altered, and that no third party has impersonated the user.
- PKI uses public key encryption to ensure security on the network path. However, if a third party steals and uses the user's private key, PKI cannot determine whether it is an authorized user or an unauthorized use by a third party. Therefore, in addition to PKI, personal authentication that can certify that the individual is using the private key is required. "Words" such as passwords can only confirm whether they know or not, and cannot determine who they are or who they are.
- Biometric information converts the physical characteristics of a user into data Typical biometric information includes fingerprints, palm prints, retina, iris, signs, and voice. By comparing the biometric information registered in advance with the biometric information input by the user, it is possible to confirm that the person who has input the biometric information is the user himself.
- a personal authentication means using biometrics data for example, a method disclosed in Japanese Patent Application Laid-Open No. 2001-297927 (Patent Document 1) is known. In this method, when placing an order for a product, the orderer (user) sends its biometrics information from the ordering terminal to the e-commerce server at the supplier (orderer).
- the e-commerce server sends the orderer's biometric information to an identity verification terminal (verification terminal) located at the store designated by the orderer as the recipient. Thereafter, when the recipient requests delivery of the goods, the store clerk collects the biometric information of the recipient using the personal identification terminal, and obtains the biometric information of the orderer sent from the e-commerce server. Compare with the metrics information, and deliver the product if the biometric information matches.
- identity verification terminal verification terminal
- biometric information must be delivered to the trader, and the biometric information may leak out by mistake. There is a possibility that fraudulent orders can be made and fraudulent transactions can be carried out.
- authentication is performed using biometric information, so that only the orderer can receive the product, and if the orderer cannot receive the product, the agent can receive the product. There was no way to receive the product.
- the present invention has been made in view of the above problems, and reliably prevents misuse of authentication information such as pass-through biometrics information exchanged on a network when performing electronic commerce.
- the first purpose is to enable the receipt of goods, etc., by not only the ordering person but also the agent designated by the ordering person.
- Patent Document 1
- an electronic commerce method [1] of the present invention is a method in which an orderer places an order for goods to a contractor via a network and receives the goods. At the time of ordering, the orderer inputs authentication information for identifying the orderer to the authentication terminal.
- the authentication terminal encrypts the authentication information with a predetermined encryption key, and Sends the encrypted authentication information together with the order slip of the product to the order-receiving party via the network, and holds the authentication information and a decryption key for decrypting the encrypted authentication information;
- the delivery person on the order receiving side inputs the encrypted authentication information received from the authentication terminal at the time of ordering the product to the authentication terminal, and the orderer sets the authentication terminal Of terminal authentication to show that it is the legitimate owner of (1-4)
- the authentication terminal verifies that the orderer is an authorized owner of the authentication terminal by the data transmission, the authentication terminal is input by the delivery person.
- the encrypted authentication information is decrypted with the decryption key held in the authentication terminal, and the decrypted authentication information is compared with the authentication information stored in the authentication terminal. If they match, the ordering person, the delivery person and the order receiving party are notified of the fact. (1-5) Upon receiving the matching check notification from the authentication terminal, the delivery person notifies the ordering person of the product. It is characterized by carrying out delivery.
- the electronic commerce method [2] of the present invention is a method in which an orderer places an order for a product to a contractor via a network and receives the product.
- the orderer The first orderer biometric information for identifying the orderer himself is input to the authentication terminal, and
- the authentication terminal encrypts the first orderer biometric information with a predetermined encryption key. Sending the encrypted first orderer biometrics information together with the ordering slip for the product to the orderer via the network, and a decryption key for decrypting the encrypted first orderer biometrics information.
- the delivery person in charge of the order receiving party sends the encrypted first orderer biometrics information received from the authentication terminal at the time of ordering the product, to the authentication terminal.
- the ordering party The second orderer biometrics information for identifying the purchaser himself entered in the authentication terminal, (2-4) the authentication terminal is input by ⁇ products responsible
- the PC leakage 003 is decrypted using the decryption key held in the authentication terminal, and decrypts the encrypted first orderer biometrics information, and decrypts the first orderer's biometrics information and the second orderer's biometrics. If the biometrics information matches, the orderer, the delivery person and the orderer are notified of the fact, and (2-5) a check match notification from the authentication terminal Upon receipt of the request, the delivery person in charge delivers the product to the orderer.
- the electronic commerce method [3] of the present invention is a method in which an orderer places an order for a product to a contractor via a network, and an agent delegated by the orderer receives the product, (3-1) When ordering the product, the orderer inputs first orderer biometrics information for identifying the orderer to the authentication terminal, and (3-2) the authentication terminal transmits the first orderer biometric information to the authentication terminal. (3-3) When the orderer delegates the receipt of the product to an agent, the orderer transmits the metric information together with the order slip of the product to the orderer via the network. The second orderer biometrics information for identifying the orderer himself is input to the authentication terminal, and the agent sends the first agent biometrics information for identifying the agent himself to the authentication terminal.
- the authentication terminal transmits the second orderer's biometric information.
- the delivery person in charge of the order receiving party receives the information received from the authentication terminal at the time of ordering the product.
- the first orderer biometrics information is input to the authentication terminal, and the agent inputs second agent biometrics information for identifying the agent himself to the authentication terminal.
- the authentication terminal compares the second agent biometric information with the first agent biometric held in the authentication terminal, and when these agent biometric information match, The first orderer's biometric information input by the delivery person is compared with the second orderer's biometric information held in the authentication terminal, and when these orderer's biometric information match, To that effect the agent (3-7) Upon receiving a notice of matching from the authentication terminal, the delivery person executes delivery of the product to the agent. And
- the electronic commerce method [4] of the present invention is a method of borrowing and borrowing money as a product between a borrower as an orderer and a financial institution as a contractor via a network, (4-1) At the time of the loan contract between the orderer and the contractor, the orderer inputs authentication information for identifying the orderer to the authentication terminal, and (4-2) the authentication terminal. Encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information to the contractor via the network, and decrypts the authentication information and the encrypted authentication information. (4-3) When the orderer refunds the money to the orderer, the orderer receives the encrypted certificate received from the authentication terminal at the time of the loan contract.
- the orderer While inputting authentication information to the authentication terminal, the orderer inputs data necessary for decrypting the encrypted authentication information to the authentication terminal, and (4-4) the authentication terminal inputs the data to the authentication terminal.
- the encrypted authentication information input by the contractor is stored in the authentication terminal. Decoded by the decoding key which collates the authentication information stored in the decoded authentication information and authentication in the terminal, it is characterized by storing the verification result in the authentication in the terminal.
- the e-commerce method [5] of the present invention is a method of borrowing or borrowing money as a product between a borrower as an orderer and a financial institution as a contractor via a network.
- the orderer inputs the first orderer biometric information for identifying the orderer to the authentication terminal, and (5-2) the authentication terminal Encrypting the first orderer's biometrics information with a predetermined encryption key, sending the encrypted first orderer's biometrics information to the orderer via the network, and encrypting the first orderer's biometrics information; Holding the decryption key for decrypting the biometric information, (5-3) when the orderer refunds the money to the orderer, the orderer receives the authentication terminal at the time of the money consumption loan contract.
- the encrypted first issuer biometric information input by the contractor is decrypted by the decryption key held in the authentication terminal, and the decrypted first orderer biometric information and the decrypted first orderer biometric information are decrypted.
- the electronic commerce method [6] of the present invention is a method in which a remitter requests a financial institution via a network from a terminal of the remitter to transfer money from an account of the remitter to a receiver.
- (6-1) The recipient inputs authentication information for identifying the recipient to an authentication terminal of the recipient, and (6-2) the authentication terminal uses a predetermined encryption key.
- the authentication information is encrypted, the encrypted authentication information is sent to the terminal of the remitter via the network, and the authentication information and a decryption key for decrypting the encrypted authentication information are held.
- the sender terminal sends the encrypted authentication information from the authentication terminal to the financial institution via the network together with a remittance request, and (6-4) the recipient
- the remittance officer of the financial institution inputs the encrypted authentication information received from the terminal of the sender to the authentication terminal, and Enter the data necessary to decrypt the encrypted authentication information into the authentication terminal, and (6-5)
- the terminal decrypts the encrypted authentication information input by the remittance officer with the decryption key held in the authentication terminal in response to the data transfer, and stores the decrypted authentication information and the decrypted authentication information in the authentication terminal.
- the stored authentication information is compared with the stored authentication information, and when the authentication information matches, the receiver and the remittance representative are notified of the fact. (6-6)
- the verification matching notification from the authentication terminal is received.
- the remittance manager transfers the money from the sender to the recipient.
- An e-commerce method [7] of the present invention is a method in which a remitter requests a financial institution via a network by a terminal of the remitter to transfer money from an account of the remitter to a receiver. (7-1) The recipient inputs first recipient biometrics information for identifying the recipient to an authentication terminal of the recipient, and (7-2) the authentication terminal performs a predetermined encryption.
- the remitter's terminal Encrypts the first recipient biometrics information with a key, sends the encrypted first recipient biometrics information to the remitter's terminal via the network, and Holding the decryption key for decrypting the metrics information, (7-3) the remitter's terminal transmits the encrypted first recipient biometrics information from the authentication terminal together with the remittance request to the network, (7-4) The recipient When receiving money from the remitter, the remittance officer of the financial institution inputs the encrypted first recipient biometrics information received from the remitter's terminal to the authentication terminal, and Inputs the second recipient biometric information for identifying the recipient to the authentication terminal, and (7-5) the authentication terminal transmits the encrypted first reception information entered by the remittance officer.
- Human biometrics information Decrypting with the decryption key held in the authentication terminal, collating the decrypted first recipient biometrics information with the second recipient biometrics information, and if these biometrics information match, it indicates so. (7-6) Notifying the receiver and the remittance clerk, (7-6) receiving the collation match notification from the authentication terminal, the remittance clerk transfers the money from the remitter to the receiver. I have.
- the e-commerce method [8] of the present invention is a method in which a remitter requests a financial institution via a network using a recipient's authentication terminal to transfer money from the remitter's account to the recipient.
- the receiver inputs authentication information for identifying the receiver to the receiver's authentication terminal, and (8-2) the authentication terminal uses the predetermined encryption key to Encrypts the authentication information, sends the encrypted authentication information and the remittance request to the financial institution via the network, and holds the authentication information and a decryption key for decrypting the encrypted authentication information.
- the remittance officer of the financial institution inputs the encrypted authentication information received from the authentication terminal to the authentication terminal.
- the recipient receives the data necessary to decrypt the encrypted authentication information.
- the authentication terminal inputs the encrypted authentication information input by the person in charge of the remittance in accordance with the data, and stores the encrypted authentication information in the authentication terminal. Decrypting with the decryption key, comparing the decrypted authentication information with the authentication information held in the authentication terminal, and when the authentication information matches, notifies the recipient and the remittance officer of the fact, (8-5) The remittance officer transfers the money from the remitter to the recipient in response to the collation coincidence notification from the authentication terminal.
- the electronic commerce method [9] of the present invention is a method in which a remitter requests a financial institution via a network by a recipient's authentication terminal to transfer money from the remitter's account to the recipient.
- the recipient inputs first recipient biometrics information for identifying the recipient to an authentication terminal of the recipient, and (9-2) the authentication terminal Encrypting the first recipient biometrics information with the encryption key of (1), sending the encrypted first recipient biometrics information and the remittance request to the financial institution via the network, and (1) Holding a decryption key for decrypting the recipient biometrics information, (9-3)
- the recipient receives money from the remitter, the remittance manager of the financial institution receives the decryption key from the authentication terminal.
- the encrypted first recipient biome While inputting the Trix information to the authentication terminal, the recipient inputs second recipient biometric information for identifying the recipient to the authentication terminal, and (9-4) the authentication terminal Decrypting the encrypted first recipient biometric information input by the remittance officer with the decryption key held in the authentication terminal, and decrypting the first recipient biometric information and the second recipient
- the biometrics information is compared with the biometrics information. If the biometrics information matches, the receiver and the remittance officer are notified of the fact. (9-5)
- the remittance officer is characterized by transferring money from the sender to the recipient.
- An electronic commerce system [10] of the present invention includes: an orderer-side authentication terminal that performs ordering of goods to a contractor and authenticates the orderer when receiving the goods; A network for exchanging information between the authentication terminal and an order information holding unit for holding the order information sent from the authentication terminal via the network.
- an authentication information input unit for inputting authentication information for identifying the orderer; an encryption unit for encrypting the authentication information input from the authentication information input unit with a predetermined encryption key;
- An output interface unit for sending the encrypted authentication information encrypted by the encryption unit together with an order slip as the order information to the contractor via the network; and an authentication information input unit.
- An authentication information holding unit for holding the authentication information input from the server; a decryption key holding unit for holding a decryption key for decrypting the encrypted authentication information encrypted by the encryption unit;
- a data storage unit for storing data for authenticating that the terminal is an authorized owner of the authentication terminal necessary for decrypting the authenticated authentication information in advance; and
- a data input section for inputting the evening, an input interface for inputting the encrypted authentication information held in the order receiving information holding section when the product is delivered, and a data input section for holding the data in the data holding section.
- the decrypted data is compared with the decrypted data input from the decryption input unit, and when these data match, the use of the decryption key stored in the decryption key storage unit is permitted.
- a decryption unit that decrypts the encrypted authentication information input from the input interface unit using the decryption key; and stores the authentication information decrypted by the decryption unit and the authentication information storage unit. And verify the verification result with the And a collating unit for notifying the orderer of the delivery of the product and the orderer.
- An electronic commerce system [11] includes: an orderer-side authentication terminal that places an order for a product with a contractor and authenticates the orderer when receiving the product; A network for exchanging information between the authentication terminal and an order information holding unit for holding order information sent from the authentication terminal via the network.
- a biometrics information input unit for collecting and inputting the biometric information of the orderer; and, when ordering the product, encrypting the first orderer biometric information input from the biometrics information input unit by the orderer in a predetermined code.
- An encryption unit for encrypting with the key, and the encrypted first orderer biometric information encrypted by the encryption unit together with the order slip as the order information.
- An output interface unit for sending to the contractor via the network; a decryption key holding unit for holding a decryption key for decrypting the encrypted first biometrics information encrypted by the encryption unit.
- An input interface unit for inputting the encrypted first biometric information held in the order information holding unit when the product is delivered, and the decryption key held in the decryption key holding unit.
- a decryption unit for decrypting the encrypted first orderer biometrics information input from the input / output interface; a first orderer biometrics information decrypted by the decryption unit and delivery of the product
- the orderer checks the second orderer's biometrics information input from the biometrics information input section by the orderer, and compares the check result with the orderer, the person in charge of delivery of the product, and It is characterized by comprising a collating unit for notifying the contractor.
- An electronic commerce system [1 2] of the present invention includes: an orderer-side authentication terminal, which performs ordering of goods to a contractor and authenticates the goods received by an agent delegated by the orderer; And a network for exchanging information with the contractor and an order information holding unit on the contractor side for holding order information sent from the authentication terminal via the network.
- the authentication terminal includes: a biometrics information input unit that collects and inputs biometrics information; and a first ordering party input by the orderer input from the biometrics information input unit when ordering the product.
- An encrypting unit for encrypting the metric information with a predetermined encryption key; and the encrypted first orderer biometrics information encrypted by the encrypting unit together with the ordering slip as the order receiving information.
- An agent biometrics information holding unit an input interface unit for inputting the encrypted first orderer biometrics information held in the order information holding unit when the product is delivered, and the agent biometrics
- the first agent biometric information stored in the metric information storage unit is compared with the second agent biometric information input from the biometric information input unit by the agent at the time of delivery of the product.
- the agent authentication unit that permits the use of the decryption key held in the decryption key holding unit, and the verification result by the agent authentication unit is received.
- a decryption unit that decrypts the encrypted first orderer biometrics information input from the input interface unit; and a decryption unit that decrypts the encrypted first orderer biometrics information.
- the first orderer's biometric information is compared with the second orderer's biometric information held in the orderer's biometric information holding unit, and the matching result is compared with the orderer, the delivery person in charge of the product, and the It is characterized by comprising an orderer authentication section that notifies the contractor.
- the authentication terminal [13] of the present invention is such that the orderer places an order for goods to the orderer via the network and authenticates the orderer himself when receiving the goods. This corresponds to the authentication terminal in [10].
- the authentication terminal [14] of the present invention is such that the orderer places an order for goods to the orderer via a network and authenticates the orderer himself when receiving the goods. It corresponds to the authentication terminal in [1 1]. You.
- the authentication terminal [15] of the present invention is for the orderer to place an order for the goods to the orderer via the network, and to authenticate the goods at the time of receiving the goods by the agent delegated by the orderer. This corresponds to the authentication terminal in the commerce system [12] described above.
- the personal authentication method by an agent of the present invention is a method in which the authenticator is authenticated by an agent delegated by the authenticator, and (16-1) the authenticator is the authenticator. (16-2) The authentication terminal inputs the first certifier biometric information for identifying the principal to the authentication terminal, and transmits the first certifier biometric information to the authentication terminal via a network. (16-3) When the certifier delegates to the agent, the certifier sends the second certifier biometric information for identifying the certifier himself. While inputting to the authentication terminal, the agent inputs first agent biometrics information for identifying the agent himself / herself to the authentication terminal.
- the authentication terminal 2 Correspondence between certifier biometric information and the first proxy biometric information (16-5)
- the first certifier biometric information sent to the trader is input to the authentication terminal, and the agent (16-6)
- the authentication terminal inputs the second agent biometrics information for identifying the person into the authentication terminal, and the authentication terminal stores the second agent biometrics information and the authentication information held in the authentication terminal.
- the first biometrics information is compared with the first biometrics information, and if the biometrics information matches, the first biometrics biometric information input and the second biometrics biometric stored in the authentication terminal are input.
- the method is characterized in that the certifier is authenticated by collating with the metrics information.
- the orderer / recipient authentication information and the biometrics information are encrypted and passed to the contractor Z financial institution at the time of ordering the product, and the encrypted information is transmitted to the orderer. / Decrypted only at the recipient's authentication terminal.
- the orderer / recipient receives the goods or money, the person in charge of delivery, the person in charge of the remittance, or the person who places the order Z enters the predetermined information including the above-mentioned encrypted information into the authentication terminal.
- the encrypted information is decrypted, and the identity of the orderer Z recipient is authenticated. Therefore, passwords and biometrics exchanged on the network when conducting e-commerce It is possible to reliably prevent authentication information such as index information from being misused.
- the biometrics information of the agent and the biometrics information of the orderer are stored in the authentication terminal in advance, and the product is delivered (at the time of authenticating the orderer who is the certifier).
- the delivery person contractor
- the agent inputs the biometric information of the orderer sent from the authentication terminal to the authentication terminal
- the agent inputs his or her own biometric information to the authentication terminal.
- the ordering party Z recipient user
- contractor / financial institution trader
- settlement institution settlement institution
- the use of PKI key management, encryption execution
- biometrics information and impersonation due to improper ordering can be reliably prevented
- the Internet, etc. can be used.
- Electronic commerce can be performed with confidence.
- the identity of the orderer can be authenticated by an agent, greatly improving the convenience.
- FIGS. 1A and 1B are diagrams for explaining a first example of the electronic commerce method of the present invention.
- FIG. 2 is a flowchart for explaining the procedure of the first example of the electronic commerce method of the present invention.
- FIG. 3 is a diagram for explaining a second example of the electronic commerce method of the present invention.
- FIG. 4A and FIG. 4B are diagrams for explaining a third example of the electronic commerce method of the present invention.
- FIG. 5 is a flowchart for explaining the procedure of the third example of the electronic commerce method of the present invention.
- FIG. 6A and FIG. 6B are diagrams for explaining a fourth example of the electronic commerce method of the present invention.
- FIG. 7 is a flowchart for explaining the procedure of the fourth example of the electronic commerce method of the present invention.
- FIG. 8 is a diagram for explaining a fifth example of the electronic commerce method of the present invention.
- FIG. 9 is a diagram for explaining a sixth example of the electronic commerce method of the present invention.
- FIG. 10 is a diagram for explaining a seventh example of the electronic commerce method of the present invention.
- FIG. 11A, FIG. 11B and FIG. 11C are diagrams for explaining an eighth example of the electronic commerce method (identity authentication method by an agent) of the present invention.
- FIG. 12A, FIG. 12B and FIG. 12C are diagrams for explaining a ninth example of the electronic commerce method (authentication method by an agent) of the present invention.
- FIG. 13 is a block diagram showing a first configuration example of the electronic commerce system and the authentication terminal of the present invention.
- FIG. 14 is a block diagram showing a second configuration example of the electronic commerce system and the authentication terminal of the present invention.
- FIG. 15 is a block diagram showing a third configuration example of the electronic commerce system and the authentication terminal of the present invention.
- FIG. 16 is a block diagram showing a fourth configuration example of the electronic commerce system and the authentication terminal of the present invention.
- the basic procedure of the electronic commerce method of the present invention, and the personal authentication method by the agent of the present invention The basic procedure of the e-commerce method including is described below.
- FIGS. 1A and 1B are diagrams for explaining a first example of the electronic commerce method of the present invention
- FIG. 2 is a flowchart (step S 11 to S20, S16a, S19a).
- the first example of this e-commerce method is a method in which an orderer places an order for goods to a contractor via a network, and the orderer himself receives the goods.
- the orderer When placing an order for a product, as shown in Fig. 1A, the orderer enters authentication information for identifying the orderer into the authentication terminal 1 owned by the orderer (arrow A11 and step S1). 1).
- the input authentication information is encrypted by a predetermined encryption key (encryption key) held in the authentication terminal 1 (block A11 and step S1).
- the encrypted authentication information is sent to the contractor via the network together with the order slip (order data) of the product (see arrow A12 and step S13).
- the authentication information input in step S11 and a decryption key (decryption key) for decrypting the encrypted authentication information encrypted in step S12 are stored in the authentication terminal 1. Is done.
- an authentication key for example, a pass password
- for performing user authentication as described later when the product is delivered is also stored in advance.
- the authentication terminal 1 is equipped with a medium slot (for example, an input interface unit 20 in FIG. 13) such as a CompactFlash (registered trademark) card.
- the user stores the encrypted authentication information, inserts the medium into the slot, and inputs the encrypted authentication information to the authentication terminal 1.
- the medium for transporting the encrypted authentication information to the authentication terminal 1 is not limited to the compact flash, but may be a PC card, an IC card, a smart media (registered trademark), or a memory stick (registered trademark). It may be a medium.
- the Ordering Party shall provide the data required to decrypt the encrypted authentication information (here, Inputs the personal authentication data for user authentication) to the authentication terminal 1 (arrow A 14).
- the authentication terminal 1 verifies whether the authentication data entered as indicated by the arrow A 14 matches the authentication key stored in the authentication terminal 1 in advance, and attempts to receive the product.
- the authenticating party authenticates that it is an authorized user of the authentication terminal 1 (see block B12 and step S15).
- the authentication terminal 1 informs the user of that fact and places an order. Notifying the supplier and contractor, the delivery person finishes the procedure without delivery (see step S16a).
- the authentication terminal 1 delivers the product in step S14.
- the encrypted authentication information input by the person in charge is decrypted with the decryption key held in the authentication terminal 1 (see block B13 and step S17), and the decrypted authentication information and the authentication at the time of ordering are performed.
- the authentication information stored in the terminal 1 is checked (see block B14 and step S18).
- the authentication terminal 1 recognizes that the current order is not made by the current user of the authentication terminal 1, and determines the collation result.
- the delivery person, the ordering party and the contractor are notified, and the delivery person ends the procedure without delivery (see arrow A15 and step S19a).
- the authentication terminal 1 notifies the collation result to the delivery person, the orderer or the orderer (see arrow A15).
- the delivery person delivers the goods to the orderer, and the contractor executes settlement of the current transaction (see step S20).
- the delivery and notification of the result of authentication and verification in steps S16 and S19 to the orderer is performed, for example, by turning on an LED (Light Emitting Diode) of the authentication terminal 1.
- LED Light Emitting Diode
- the input of information and the encryption have been completed in the authentication terminal 1 owned by the user (orderer).
- the decryption key for decrypting the encrypted data is not output to the outside of the authentication terminal 1, and the order is placed. Since the individual does not need to know what the decryption key is, the risk that the encrypted authentication information is decrypted by a third party can be reduced.
- the authentication information for example, the passcode and the biometrics information
- the recipient of the product is the orderer.
- the authentication terminal 1 owned by the orderer it is possible to prevent information leakage.
- the authentication information input by the orderer was unconditionally encrypted.
- user authentication was performed using an authentication key. May be performed, and encryption may be executed when the orderer authenticates that the user is an authorized user of the authentication terminal 1. In this way, if a third party other than the owner acquires authentication terminal 1, authentication information cannot be encrypted, and this third party cannot use authentication terminal 1.
- FIG. 3 is a diagram for explaining a second example of the electronic commerce method of the present invention.
- the authentication terminal 1 previously holds the orderer's own biometric information instead of the personal authentication key of the first example.
- the ordering procedure is almost the same as that of the first example (see steps 311 to 314 in Fig. 1A and Fig. 2).
- the orderer enters his or her own biometric information instead of the authentication data in the first example (see arrow A14a).
- the authentication terminal 1 verifies whether the biometric information input as described above matches the biometric information stored in the authentication terminal 1 in advance, and receives the product. Authenticates that he is an authorized user of authentication terminal 1 (see block B 1 2a). See).
- Subsequent steps are the same as in the first example above. If the two biometrics information match and the orderer is authenticated as an authorized user of the authentication terminal 1, input is made by the delivery terminal at the authentication terminal 1.
- the encrypted authentication information (see arrow A13) is decrypted with the decryption key held in authentication terminal 1 (see block B13), and the decrypted authentication information and the authentication terminal at the time of order are placed.
- the authentication information stored in 1 is checked (see block B14). If the authentication information matches, the authentication terminal 1 notifies the collation result to the delivery person, the orderer or the orderer (see arrow A15), and the delivery person receives the product from the orderer. At the same time, the contractor will settle the transaction.
- the second embodiment of the electronic commerce method of the present invention can provide the same operation and effect as those of the first embodiment.
- user authentication is performed using an authentication key at the time of delivery, but if the authentication key is a password, if the password is known to a third party, the user is authenticated.
- the authentication terminal 1 is used by three parties.
- the user authentication at the authentication terminal 1 is performed not by a password but by biometric information (for example, fingerprint data), so that only the owner of the authentication terminal 1 uses the authentication terminal 1. It is possible to realize e-commerce with higher security performance.
- FIG. 4A and 4B are diagrams for explaining a third example of the electronic commerce method of the present invention
- FIG. 5 is a flowchart for explaining the procedure of the third example of the electronic commerce method of the present invention (step S2). 1 to S29, S28a).
- the third example of this e-commerce method is also a method in which the orderer places an order for goods to the contractor via the network, and the orderer himself receives the goods.
- the orderer When ordering a product, as shown in Fig. 4A, the orderer enters the first orderer biometric information for identifying the orderer into the authentication terminal 4 owned by the orderer (arrow A 2 1). And step S21).
- the input first orderer biometric information is encrypted by a predetermined encryption key (encryption key) held in the authentication terminal 4 (block B21 and step S2). Two ), And the encrypted first orderer biometric information is sent to the contractor via the network together with the order slip (ordering data) for the product (see arrow A22 and step S23).
- a decryption key (decryption key) for decrypting the encrypted first orderer biometrics information encrypted in step S22 is held in the authentication terminal 4.
- the delivery person on the contractor side sends the encrypted first orderer biometric information received from the authentication terminal 4 when ordering the product, Send to and input the authentication terminal 4 owned by the orderer (see arrow A23 and step S24).
- the authentication terminal 4 is provided with a medium slot (for example, an input interface section 46 in FIG. 15) for a compact flash (registered trademark) card or the like, as in the first example described above.
- Store and bring the encrypted first orderer biometrics information into a medium such as, insert the medium into the slot and input the encrypted first orderer biometrics information to the authentication terminal 4 .
- the encrypted first orderer biometrics information input to the authentication terminal 4 is decrypted by the decryption key held in the authentication terminal 4 (see block B22 and step S25).
- the orderer enters the second orderer biometric information for identifying the orderer himself into the authentication terminal 4 again at the time of delivery (see arrow A24 and step S26). Note that the decoding timing in step S25 and the input timing in step S26 may be reversed.
- the authentication terminal 4 compares the first orderer biometric information decrypted in step S25 with the second orderer biometric information input to the authentication terminal 4 at the time of delivery in step S26. (See block B23 and step S27). If the orderer biometrics information does not match (NO route in step S28), the authentication terminal 4 recognizes that the current order is not from the current user of the authentication terminal 4, and performs the verification. The result is notified to the person in charge of delivery, the orderer or the order receiver, and the person in charge of delivery finishes the procedure without performing delivery (see arrow A25 and step S28a).
- step S28 if the orderer biometrics information matches (YES route in step S28), the authentication terminal 4 sends the collation result to the person in charge of delivery, Notify the orderer and contractor (see arrow A25), the delivery person delivers the goods to the orderer, and the contractor executes the settlement of this transaction (see step S29).
- step S28 notification of the result of authentication and verification to the delivery person and the orderer is performed by, for example, turning on the LED (Light Emitting Diode) of the authentication terminal 4, as in the first example. It is.
- LED Light Emitting Diode
- the orderer verification is performed using the biometric information, not only the same operation and effect as in the first example but also the password can be obtained. It is possible to secure higher security performance than the case where orderer verification is performed using such authentication information.
- FIG. 6A and 6B are diagrams for explaining the fourth example of the electronic commerce method of the present invention
- FIG. 7 is a flowchart for explaining the procedure of the fourth example of the electronic commerce method of the present invention (step S3). 1 to S42, S40a).
- the fourth example of this e-commerce method is also a method in which the orderer places an order for goods to the contractor via the network and the orderer himself receives the goods. This fourth example is shown in Figs. 4A and 4 In the e-commerce method shown in B, the encryption key is automatically generated and the decryption key is deleted at the timing described later.
- the orderer When placing an order for a product, as shown in Fig. 6A, the orderer enters the first orderer biometric information for identifying the orderer into the authentication terminal 4 owned by the orderer (arrow A21). And step S31).
- a predetermined encryption key encryption key
- an encryption key for decrypting the encryption information encrypted by the encryption key are used.
- a decryption key decryption key
- the first orderer biometric information entered in step S31 is encrypted by the encryption key generated in step S32 (see block B21 and step S33), Upon completion of the encryption, the encryption key is deleted (see block B20 and step S34).
- the encrypted first orderer biometric information is sent to the ordering party via the network together with the ordering slip for the product (orders received overnight) (see arrow A22 and step S35).
- Step S 3 The decryption key generated in 2 is held in the authentication terminal 4.
- the contractor on the contractor side receives the encrypted first item received from the authentication terminal 4 when ordering the product, as shown in Fig. 6B.
- Send and input the orderer biometric information to the authentication terminal 4 owned by the orderer (see arrow A23 and step S36).
- the delivery person also stores the encrypted first orderer biometrics information in a medium such as compact flash, and authenticates the encrypted first orderer biometrics information from the medium.
- Input to terminal 4. the encrypted first orderer biometrics information input to the authentication terminal 4 is decrypted by the decryption key held in the authentication terminal 4 (see block B22 and step S37).
- the orderer inputs the second orderer biometric information for identifying the orderer himself into the authentication terminal 4 again at the time of delivery (see arrow A24 and step S38).
- the decoding timing in step S37 and the input timing in step S38 may be reversed.
- the authentication terminal 4 verifies the first orderer biometric information decrypted in step S37 with the second orderer biometric information input to the authentication terminal 4 at the time of delivery in step S38. (See block B23 and step S39). If the orderer biometrics information does not match (NO route in step S40), the authentication terminal 4 recognizes that the current order is not from the current user of the authentication terminal 4 and checks the order. The result is notified to the person in charge of delivery, the orderer or the order receiver, and the person in charge of delivery finishes the procedure without performing delivery (see arrow A25 and step S40a).
- step S40 if the orderer biometrics information matches (YES route in step S40), the authentication terminal 4 deletes the decryption key (see block B24 and step S41 in FIG. 7). ), And notifies the collation result to the delivery person, the ordering party and the order receiving party (see arrow A25), and the delivery person delivers the product to the ordering party, and the ordering party executes the settlement of this transaction (step S42).
- step S40 notification of the result of authentication and verification to the delivery person and the orderer is performed by, for example, turning on the LED (Light Emitting Diode) of the authentication terminal 4, as in the third example. It is.
- the first orderer biometrics information is encrypted and transmitted to the ordering party when ordering the product, but the encryption key required at that time is used. ⁇
- a decryption key is automatically generated in the authentication terminal 4 every time a product is ordered, and the encryption key is deleted when the encryption is completed, and the decryption key is deleted when the orderer verification is completed at the time of delivery. I have.
- the encrypted first orderer biometrics information is valid only for one order, and the encrypted first orderer biometrics information that has completed the prescribed e-commerce is the authentication that generated it. Even terminal 4 will not be able to decrypt.
- the encrypted first orderer biometrics information is leaked to a third party, even if the orderer himself / herself cannot complete the transaction after the transaction is completed, it cannot be decrypted. There is no risk of being misused by the three parties.
- the encrypted first issuer biometrics information brought by the orderer cannot be decrypted by the authentication terminal 4. The orderer can establish that it is not a legitimate order.
- the method of automatically generating an encryption key and a decryption key as described above and erasing these keys at a predetermined timing was applied to the e-commerce method shown in FIGS. 4A and 4B.
- the present invention is not limited to this, and the above-described method is applied to the electronic commerce method shown in FIGS. 1A and 1B and the electronic commerce method shown in FIG. The same operation and effect as in the fourth example can be obtained.
- FIG. 8 is a diagram for explaining a fifth example of the electronic commerce method of the present invention.
- the fifth example of this e-commerce method is also a method in which the orderer places an order for goods to the contractor via the network, and the orderer himself receives the goods.
- This fifth example is shown in Figs. 4A and 4
- PKI is incorporated at the time of order placement, as described later.
- the orderer prior to ordering the product, the orderer receives the orderer's private key A and public key A from the certificate authority (CA) (see arrow A31), and places it in the authentication terminal 4. Hold.
- the contractor receives the contractor's private key B and public key B from the certificate authority (see arrow A32).
- the orderer When placing an order for a product, the orderer receives the contractor's public key B from the contractor and stores it in the authentication terminal 4 owned by the orderer (see arrow A33). Enter the first orderer's biometric information to identify the principal (see arrow A34).
- the authentication terminal 4 encrypts the first orderer's biometrics information (authentication information in the case of the method shown in FIG. 1A) with an encryption key (see block B31), and also signs the orderer's electronic signature. Encrypt with the client's private key A (see block B32). Then, the encrypted first orderer biometric information, the encrypted electronic signature, and the orderer's public key A are further encrypted using the orderer's public key B (see block B33). (See arrow A35).
- the contractor decrypts the information received from the client (authentication terminal 4) with the contractor's private key B, and confirms that the data has not been tampered with or impersonated on the network.
- the present invention is not limited to this.
- the method shown is the same as the fifth example in the e-commerce method shown in FIGS. 1A and 1B, the e-commerce method shown in FIG. 3, and the e-commerce method shown in FIGS. 6A and 6B. This is applied, and the same operation and effect as the fifth example can be obtained.
- FIG. 9 is a diagram for explaining a sixth example of the electronic commerce method of the present invention.
- the sixth example of the commercial transaction method is also a method in which the orderer places an order for goods via the network to the contractor, and the orderer himself receives the goods.
- the ordering method shown in FIGS. 4A and 4B is used.
- the following describes the settlement procedure after delivery in the electronic commerce bow I method shown in more detail. After ordering the product in accordance with the procedure shown in Fig. 4A, when the contractor delivers the product, as shown in Fig. 9, the delivery person on the contractor side receives the encryption received from the authentication terminal 4 when ordering the product. Send the converted first orderer biometric information to the authentication terminal 4 owned by the orderer and enter it (see arrow A41).
- the encrypted first orderer biometrics information input to the authentication terminal 4 is decrypted with the decryption key held in the authentication terminal 4 (see block B41).
- the orderer inputs the second orderer's pyometrics information for identifying the orderer to the authentication terminal 4 again upon delivery (see arrow A42).
- the authentication terminal 4 checks the decrypted first orderer biometric information and the second orderer biometric information input to the authentication terminal 4 at the time of delivery (see block B42). When the orderer biometrics information matches, the authentication terminal 4 notifies the collation result to the person in charge of delivery, the orderer or the contractor (see arrow A43), and the person in charge delivers the product to the orderer. At the same time, the contractor executes the settlement of this transaction.
- the verification result by the authentication terminal 4 is sent from the contractor to the clearing house along with the payment request (see arrow A44), and the clearing house receives the verification result and executes the payment of the product. Notify the ordering party (see arrow A45).
- the delivery and settlement procedure after ordering the product according to the procedure shown in FIG. 4A has been described.
- the settlement methods include the e-commerce method shown in Figs. 1A and 1B, the e-commerce method shown in Fig. 3, the e-commerce method shown in Figs. 6A and 6B, and the e-commerce method shown in Fig. 8. The same is applied to the commercial transaction method as in the sixth example, and the same operation and effect as in the sixth example can be obtained.
- FIG. 10 is a diagram for explaining a seventh example of the electronic commerce method of the present invention.
- the seventh example of this e-commerce method is also a method in which the orderer places an order for goods to the contractor via the network, and the orderer himself receives the goods.
- the PKI mechanism is applied not only to the ordering party and contractor, but also to the decision-making body.
- the orderer-owned authentication terminal 4 holds the orderer's private key A and public key A issued by the certificate authority (CA), as in the fifth example above.
- the public key of the clearing house issued by the CA to the clearing house is sent from the clearing house to the authentication terminal 4 of the ordering party and is retained (see arrow A51).
- the delivery person in charge of the contractor receives the order from the authentication terminal 4 at the time of ordering the goods.
- the encrypted first orderer biometrics information input to the authentication terminal 4 is decrypted with the decryption key held in the authentication terminal 4 (see block B51).
- the orderer inputs the second orderer biometric information for identifying the orderer himself into the authentication terminal 4 again at the time of delivery (see arrow A53).
- the authentication terminal 4 checks the decrypted first orderer biometrics information against the second orderer biometrics information input to the authentication terminal 4 at the time of delivery (see block B51). If the orderer biometrics information matches, the authentication terminal 4 notifies the collation result to the delivery person, the orderer and the contractor (see arrow A54), and the delivery person delivers the product to the orderer. .
- the authentication terminal 4 encrypts the electronic signature of the ordering party with the ordering party's private key A when notifying the ordering result or the settlement institution (see block B 52). , The encrypted electronic signature and the public key A of the ordering party are further encrypted using the public key C of the clearing house (see block B53), and transmitted to the clearing house via the contractor. Send (see arrow A55).
- the clearing house decrypts the encrypted verification result from the authentication terminal 4 with the private key C of the clearing house (which is paired with the public key C issued by the certificate authority in advance) and decrypts the verification result. And executes the settlement of the product according to the decryption and collation result.
- the PKI mechanism can be provided not only to the ordering party and the order receiving party but also to a decision-making body.
- the delivery and settlement procedure after placing an order for a product according to the procedure shown in FIG. 8 has been described.
- the present invention is not limited to this, and the delivery and settlement shown in FIG.
- the method is applied to the e-commerce method shown in Fig. 1A and Fig. 1B, the e-commerce method shown in Fig. 3, and the e-commerce method shown in Figs. 6A and 6B in the same way as in the seventh example.
- the same function and effect as those of the seventh example can be obtained.
- the encrypted authentication information or the encrypted first orderer biometrics in the authentication terminals 1 and 4 owned by the orderer is decrypted, and the decrypted information is compared with the authentication information or the second orderer biometric information entered by the orderer at the time of delivery.
- the orderer can place an order that can authenticate himself only by inputting authentication information or biometrics information into the authentication terminals 1 and 4 when ordering a product.
- the authentication information and biometrics information are encrypted and sent to the contractor, so even if the encrypted information leaks out, it can be prevented from being misused by a malicious third party. .
- FIG. 11A, FIG. 11B and FIG. 11C are diagrams for explaining the eighth example of the electronic commerce method (authentication method by an agent) of the present invention.
- This is a method in which the orderer places an order for goods to the contractor via the network, and the agent appointed by the orderer receives the goods.
- the ordering party uses the authentication terminal 7A owned by the ordering party to identify the ordering party (certifier) as the first orderer. Enter biometrics information (first certifier biometrics information) A (see arrow A61).
- the entered first orderer biometric information A is sent to the orderer (a company that requires the authentication result of the certifier) along with the order slip (order data) for the product via the network. (See arrow A62 and block B61).
- the authentication terminal 7A sends the orderer's second orderer biometric information (the second certifier (Biometrics information) Enter B again (see arrow A63), and the agent delegated by the orderer inputs the first agent biometrics information C for identifying the agent himself (arrow A6). 4), the authentication terminal 7A stores and holds the second orderer biometrics information B and the first agent biometrics information C in association with each other (see block B62).
- the delivery person on the contractor side receives the first item received from the authentication terminal 7A when ordering the product.
- the authentication terminal 7A is equipped with a medium slot such as a CompactFlash (registered trademark) card, as in the first example, and the delivery person is in charge of a medium such as a CompactFlash.
- the first orderer's biometrics information A is stored and brought into the slot, the medium is inserted into the slot, and the first orderer's biometrics information A is input to the authentication terminal 7A.
- the agent again inputs the second agent biometrics information D for identifying the agent itself to the authentication terminal 7A (see arrow A66).
- the authentication terminal 7A compares the first agent biometric information C held in the authentication terminal 7A with the second agent biometric information D newly input by the agent at the time of delivery. Authenticate that the agent trying to receive the goods is an authorized agent delegated by the client (see block B63).
- the authentication terminal 7A informs the delivery staff, the recipient (agent) and the contractor of the fact. Notify and the delivery person ends the procedure without delivery.
- the authenticating terminal 7A uses the first biometric information entered by the delivery person in charge. The metric information A is compared with the biometric information of the second orderer stored in the authentication terminal 7A, and the identity of the orderer (authenticater) is authenticated (see block B64).
- the authentication terminal 7A recognizes that this order is not from the current user of the authentication terminal 7A, and the verification result (authentication result). ) Is notified to the delivery person, agent or contractor (see arrow A67), and the delivery person ends the procedure without delivery. On the other hand, if the orderer biometrics information A and B match, the authentication terminal 7A notifies the collation result (authentication result) to the delivery person, agent or contractor (arrow A67). Delivery) hands over the goods to the agent, and the contractor setstle the transaction.
- the authentication terminal 7A stores the biometric information C of the agent and the biometric information B of the orderer in advance, and At the time (at the time of authentication of the orderer who is the certifier), the delivery person (business person) inputs the biometric information A of the orderer sent from the authentication terminal 7A to the authentication terminal 7A, and the agent Use own biometrics information D as authentication terminal
- the authentication terminal 7A first performs identity authentication of the agent, and if the agent is authenticated as the authorized person (authorized agent), the biometric information of the issuer entered by the delivery person Based on A and the biometric information B of the orderer stored in the authentication terminal 7A in advance, the identity of the orderer (authenticater) is authenticated. Therefore, it is possible to receive not only the ordering person but also the agent designated by the ordering person while receiving the product, etc., while ensuring security, and the convenience is greatly improved.
- the orderer inputs the biometric information A and B at the time of ordering the product and at the time of registering the agent, respectively.
- the input information A for the first time may be stored in the authentication terminal 7A, and when the agent is registered, the stored biometrics information A may be used as the biometrics information B.
- Unauthorized acts such as registering an agent without the authentication terminal 7A being authenticated by an unauthorized agent without obtaining the orderer's authentication may occur. Therefore, as described above, it is desirable that the biometrics information B of the ordering party be input and stored again when the agent is registered.
- FIG. 12A, FIG. 12B and FIG. 12C are diagrams for explaining a ninth example of the electronic commerce method (identity authentication method by an agent) of the present invention.
- the ninth example is also a method in which the orderer places an order for goods to the contractor via a network, and the agent commissioned by the orderer receives the goods.
- the first orderer biometrics information A sent directly from the ordering party to the order receiving party is encrypted. That is, the ninth example is a combination of the methods of the first to seventh examples (particularly, the first or third example) and the method of the eighth example.
- the ordering party When placing an order for a product, as shown in Figure 12A, the ordering party (certifier) sends the first ordering party biome- ter to identify the ordering party (certifier) to the authentication terminal 7 owned by the orderer.
- Matrix information (1st certifier biometrics information) Enter A (see arrow A 71) See).
- the input first orderer biometric information A is encrypted by a predetermined encryption key (encryption key) held in the authentication terminal 7 (see block B71), and
- the encrypted first orderer biometrics information A is sent to the contractor (a company that requires the authentication result of the certifier) via the network together with the order slip for the product (order receipt) (arrow A7). 2 and block B 71).
- a decryption key decryption key for decrypting the encrypted first orderer biometrics information A encrypted in the block B 71 is held in the authentication terminal 7.
- the authentication terminal 7 previously sends the ordering party's second ordering party pieometrics information (the second authenticating party) to identify the ordering person himself / herself.
- Biometrics information) B is input again (see arrow A73), and the agent delegated by the orderer inputs the first agent biometrics information C for identifying the agent itself (arrow A74), the authentication terminal 7 stores and holds the decryption key, the second orderer biometrics information B, and the first agent biometrics information C in association with each other (see block B72).
- the contractor on the contractor side receives the encrypted product received from the authentication terminal 7 when ordering the product.
- the first orderer biometrics information A is sent to the authentication terminal 7 owned by the agent on behalf of the orderer (certifier) and entered (see arrow A75).
- the authentication terminal 7 is equipped with a medium slot such as a compact flash (registered trademark) card, as in the first example, and the delivery person is responsible for encrypting the medium in a medium such as a compact flash.
- the stored first orderer biometrics information A is stored and brought into the slot, and the encrypted first orderer biometrics information A is input to the authentication terminal 7.
- the agent again inputs the second agent pyrometrics information D for identifying the agent himself / herself to the authentication terminal 7 (see arrow A76).
- the authentication terminal 7 compares the first agent biometric information C held in the authentication terminal 7 with the second agent biometric information newly input by the agent at the time of delivery. Verifies Rix information D and authenticates that the agent trying to receive the goods is an authorized agent authorized by the orderer (see block B73).
- the authentication terminal 7 informs the delivery person, the recipient (agent) and the contractor of the fact. Then, the delivery person finishes the procedure without delivery.
- the authentication terminal 7 converts the encrypted biometrics information A input by the delivery person into the authentication information. It is decrypted with the decryption key held in the terminal 7 (see block B 74), and the first orderer biometrics information A decrypted in the block B 74 and the decryption key stored in the authentication terminal ⁇ .
- the ordering party biometrics information B is compared with, and the identity of the ordering party (certifier) is verified (see block B75). If the orderer biometrics information A and B do not match, the authentication terminal 7A recognizes that this order is not from the current user of the authentication terminal 7, and the verification result (authentication result) Is notified to the delivery person, agent or contractor (see arrow A77), and the delivery person ends the procedure without delivery. On the other hand, if the orderer biometrics information A and B match, the authentication terminal 7 notifies the collation result (authentication result) to the delivery person, agent or contractor (see arrow A77). ), The delivery person delivers the goods to the agent, and the contractor executes the settlement of this transaction. As described above, according to the ninth example of the electronic commerce method of the present invention, not only the same operation and effect as the eighth example but also the same operation and effect as the first and third examples can be obtained. Can be
- a method of automatically generating an encryption key and a decryption key and erasing these keys at a predetermined timing as in the fourth example may be applied.
- the methods described in the examples to the seventh example may be applied.
- the first orderer If the biometrics information A and the second orderer's biometrics information B match exactly the same, the authentication terminals 7A and 7 will recognize that the matching does not match (authentication is not possible). It has become.
- biometric information is collected each time.
- the biometrics information is fingerprint data
- the fingerprint data that is collected will differ every time depending on the finger pressure, humidity, temperature, humidity, etc. at the time of fingerprint data collection. Therefore, if the two fingerprint data completely match, it is expected that fingerprint data obtained illegally by some means (for example, by collecting a fingerprint and digitizing it) is used.
- Example 10 In order to eliminate such misconduct, in Example 10, if the biometrics information A and B at the time of orderer authentication at the authentication terminals 7A and 7 completely match, "authentication is not possible" . As a result, higher security performance can be ensured. ⁇
- the first orderer biometric information (first certifier biometric information) is encrypted and the orderer ( The authentication terminal owned by the ordering party (certifier) must encrypt the first ordering party biometric information before encrypting the first ordering party biometric information when ordering the product.
- the authentication terminal owned by the ordering party (certifier) must encrypt the first ordering party biometric information before encrypting the first ordering party biometric information when ordering the product.
- a specific reversible process is performed, and when the product is delivered (at the time of authentication), the decrypted first orderer biometrics information is processed in the reverse order to the reversible process performed when the product was ordered, and the first orderer is processed. Restore biometric information.
- the biometric information is a fingerprint image
- the fingerprint image is expanded and contracted in a specific pattern. For example, the top of the image is stretched vertically, and the bottom of the image is stretched horizontally.
- the parameters of the applied processing are stored in the authentication terminal.
- the fingerprint data is different from the original fingerprint, and the original fingerprint image cannot be obtained by a third party.
- by changing the processing parameters every time It becomes a fingerprint image, making it more difficult to analogize the original fingerprint image.
- the contractor (trader) is a financial institution and the orderer is a financial institution.
- the time of ordering the product corresponds to the time of the loan contract between the borrower and the financial institution
- the time of the above-mentioned ordering of the product corresponds to the time when the borrower or agent borrows money from the financial institution. This corresponds to the time of delivery (at the time of certification).
- the borrower applies for a loan (money consumption loan contract) to a loan company (a contractor, a financial institution) through a network such as the Internet.
- a loan company a contractor, a financial institution
- the borrower's biometrics information (first orderer's biometrics information) is sent to the loan company along with the application.
- the loan company inputs the biometric information received from the borrower at the time of application to the borrower's authentication terminal, and the beneficiary of the loan uses the biometric information to Authentication of the identity of the applicant is performed.
- a thirteenth example (not shown) of the e-commerce method of the present invention is a method of lending and borrowing money as a product between a borrower as an orderer and a financial institution as an orderer through a network. It relates to a method of leaving a history of the borrower making a refund.
- electronic commerce is basically performed in substantially the same procedure as in the first to third examples.
- the first embodiment of the thirteenth example is executed according to the same procedure as in the first example, and specifically, is executed in the following procedures I-1 to I-4.
- the borrower inputs the authentication information for identifying the borrower to the borrower's authentication terminal 1 (see FIGS. 1A and 1B). I do.
- Authentication terminal 1 encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information to the financial institution via the network, and decrypts the authentication information and the encrypted authentication information. And hold the key.
- the financial institution inputs the encrypted authentication information received from the authentication terminal 1 to the authentication terminal 1 at the time of the monetary loan contract, and the borrower Data required to decrypt encrypted authentication information
- a personal authentication key such as a password
- the authentication terminal 1 checks the data entered in the above step 2-3 against the personal authentication key stored in the authentication terminal 1 in advance, and if they match, it is input by the financial institution. Decrypts the encrypted authentication information with the decryption key held in the authentication terminal 1, compares the decrypted authentication information with the authentication information held in the authentication terminal 1, and compares the matching result with the authentication terminal 1. Store in. As a result, it is authenticated that the borrower has made the refund, and the refund history is left in the authentication terminal 1.
- the second embodiment of the thirteenth example is executed by applying the same procedure as that of the second example to the first embodiment of the thirteenth example. That is, in the second embodiment, in step 1-2 above, the authentication terminal 1 (see FIG.
- step 1-3 holds the borrower's biometric information together with the authentication information and the decryption key, and in step 1-3 above.
- the borrower inputs his / her biometric information to the authentication terminal 1 as data necessary for decrypting the encrypted authentication information, and in the above procedure 1-4, the authentication terminal 1
- the input biometrics information is compared with the biometrics information stored in the authentication terminal 1 in advance, and if the biometrics information matches, the encrypted authentication information is stored in the authentication terminal 1. Decrypt with the decryption key.
- the third embodiment of the thirteenth example is executed according to the same procedure as that of the third example, and specifically, is executed in the following procedures I-1 to I-4.
- the borrower (the ordering party) sends the first ordering party's pyrometrics information for identifying the borrower to the borrower's authentication terminal 4 (See Figure 4A and 4B).
- authentication terminal 4 encrypts the first orderer's biometrics information with a predetermined encryption key, sends the encrypted first orderer's biometrics information to the financial institution via the network, and encrypts it. Holds the decryption key for decrypting the first orderer's biometrics information.
- the financial institution inputs the encrypted first orderer biometrics information received from the authentication terminal 4 at the time of the monetary loan contract to the authentication terminal 4,
- the borrower (the ordering party) inputs the second ordering party biometrics information for identifying the borrower into the authentication terminal 4.
- Authentication terminal 4 decrypts the encrypted first orderer biometrics information input by the financial institution with the decryption key held in authentication terminal 4, and decrypts the first orderer biometrics information. It is compared with the second orderer biometrics information input in the above procedure 2-3, and the matching result is stored in the authentication terminal 4. As a result, it is authenticated that the borrower has made the refund, and the refund history is left in the authentication terminal 4.
- the authentication information including the biometric information is used. It is authenticated that the borrower has made a refund by using, and the refund history can be reliably left in the authentication terminals 1 and 4.
- the agent designated by the borrower can authenticate the refund on behalf of the borrower and refund the money.
- the history can be left in the authentication terminal.
- the method described in the fourth to seventh examples may be further applied to the thirteenth example. In this case, the same operation and effect as those in the fourth to seventh examples are obtained. Can be.
- the 14th example (not shown) of the e-commerce method of the present invention is a method in which a remitter requests a financial institution via a network from a remitter's terminal to transfer money from a remitter's account to a receiver. is there. Specifically, the case where the sender and the receiver are separated from each other.-The terminal owned by the sender and the authentication terminal owned by the receiver are connected to be able to communicate with each other via a network. This is a method for remittance to recipients who do not have an account with the above financial institution.
- electronic commerce is basically performed in substantially the same procedure as in the first to third examples.
- the first embodiment of the 14th example is executed according to the same procedure as the above-mentioned first example, and specifically, is executed in the following steps 3-1 to 3-6.
- the recipient inputs authentication information for identifying the recipient to the recipient's own authentication terminal 1 (see Fig. 1A and Fig. 1B).
- the authentication terminal 1 encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information to the sender's terminal via the network, and sends the authentication information and the encrypted authentication information. And a decryption key for decrypting.
- the sender's terminal sends the encrypted authentication information from authentication terminal 1 together with the remittance request to the financial institution via the network.
- the remittance officer of the financial institution enters the encrypted authentication information received from the sender's terminal into the authentication terminal 1 owned by the receiver. And the recipient has the data needed to decrypt the encrypted credentials
- a personal authentication key such as a password
- Authentication terminal 1 checks the data entered in step 3-4 above against the authentication key stored in authentication terminal 1 in advance, and if they match, it is entered by the person in charge of remittance. Decrypts the encrypted authentication information with the decryption key held in the authentication terminal 1, compares the decrypted authentication information with the authentication information held in the authentication terminal 1, and the authentication information matches. If so, notify the recipient and remittance officer.
- the second embodiment of the fourteenth example is executed by applying the same procedure as that of the second example to the first embodiment of the fourteenth example described above. That is, in the second embodiment, in step 3-2 above, the authentication terminal 1 (see FIG. 3) holds the biometric information of the orderer along with the authentication information and the decryption key, and in step 3-4 above. The recipient inputs his / her biometric information to the authentication terminal 1 as a necessary data for decrypting the encrypted authentication information, and in the above step 3-5, the authentication terminal 1 receives the money at the time of receiving the money. The biometric information input by a person is compared with the biometric information stored in the authentication terminal 1 in advance, and if the biometric information matches, the encrypted authentication information is stored in the authentication terminal 1. Decrypt with the decryption key.
- the third embodiment of the fourteenth example is executed according to the same procedure as that of the third example, and specifically, is executed by the following procedures I-1 to I-6.
- the recipient inputs the first recipient biometric information for identifying the recipient to the recipient's authentication terminal 4 (see FIGS. 4A and 4B).
- the authentication terminal 4 encrypts the first recipient biometric information with a predetermined encryption key, sends the encrypted first recipient biometric information to the sender terminal via the network, and encrypts the first recipient biometric information. Holds a decryption key for decrypting the encrypted first recipient biometric information.
- the sender's terminal sends the encrypted first recipient biometrics information from the authentication terminal 4 together with the remittance request to the financial institution via the network.
- -4 When the receiver receives the money from the sender, the remittance officer of the financial institution inputs the encrypted first receiver biometrics information received from the sender's terminal to the authentication terminal 4 and receives it. The person inputs the second recipient biometric information for identifying the recipient to the authentication terminal 4.
- the authentication terminal 4 decrypts the encrypted first recipient biometrics information input by the remittance officer with the decryption key held in the authentication terminal 4, and decrypts the decrypted first recipient biometrics information.
- the information is compared with the second recipient's biometrics information input in step IV-4 above, and if the pieces of the biometrics information match, the fact is notified to the recipient and the person in charge of remittance.
- the remittance officer hands over the money from the sender to the recipient.
- the electronic commerce method of the present invention is used not only for renting money as described in the 12th and 13th examples, but also for remittance from a sender to a receiver.
- a sender remits cash to a recipient
- the 14th example is applied when the sender and the receiver are separated from each other as described above.
- the terminals owned by the recipient are used as the authentication terminals 1 and 4 as described above.
- the recipient goes to the counter of the financial institution with the authentication terminals 1 and 4 and receives money by performing the above steps 3 -4 to 3 -6 or 4 -4 to ⁇ ⁇ -6 at this counter.
- the remittance staff of the financial institution may visit the recipient's home and perform the above steps 3 -4 to 3 -6 or 4 -4 to -6 -6 to transfer the money.
- the agent designated by the recipient replaces the money from the remitter on behalf of the recipient. It will be possible to receive.
- the method described in the fourth to seventh examples may be further applied to the fourteenth example. In this case, the same operation and effect as those in the fourth to seventh examples are obtained. be able to.
- the remittance is sent to a financial institution via a network by a recipient's authentication terminal instead of the sender's terminal as in the above-described 14th example.
- Requesting remittance from the recipient's account to the recipient Specifically, when the sender and the receiver are in the same place, for example, a terminal (a terminal owned by the receiver) at a store such as a shop is used as an authentication terminal, and the account is sent to the financial institution. This is a method for sending money to recipients who do not have it.
- electronic commerce is basically performed in substantially the same procedure as in the first to third examples.
- the first embodiment of the fifteenth example is executed according to the same procedure as in the first example, and specifically, is executed in the following procedures I-1 to I-5.
- the recipient inputs authentication information for identifying the recipient to the recipient's own authentication terminal 1 (see FIGS. 1A and 1B).
- the authentication terminal 1 encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information and the remittance request to the financial institution via the network, and authenticates the authentication information and the encrypted authentication information. And a decryption key for decrypting.
- the authentication terminal 1 checks the data entered in the above step -3-3 against the personal authentication key stored in the authentication terminal 1 in advance, and if they match, it is input by the person in charge of remittance. Decrypts the encrypted authentication information with the decryption key held in the authentication terminal 1, compares the decrypted authentication information with the authentication information held in the authentication terminal 1, and the authentication information matches. If so, notify the recipient and remittance officer.
- remittance officer Upon receipt of the matching notification from authentication terminal 1, remittance officer Deliver the money to the recipient.
- the second embodiment of the fifteenth example is executed by applying the same procedure as that of the second example to the first embodiment of the fifteenth example described above. That is, in the second embodiment, in the above procedure 5-2, the authentication terminal 1 (see FIG. 3) holds the biometric information of the orderer together with the authentication information and the decryption key, and in the above procedure 5-3, The recipient inputs his / her biometric information to the authentication terminal 1 as a necessary data for decrypting the encrypted authentication information, and in the above step 5-4, the authentication terminal 1 The biometric information input by a person is compared with the biometric information stored in the authentication terminal 1 in advance, and when the biometric information matches, the encrypted authentication information is stored in the authentication terminal 1. Decrypt with the stored decryption key.
- the third embodiment of the fifteenth example is executed according to the same procedure as that of the third example, and specifically, is executed by the following procedures I-1 to I-5.
- the recipient inputs the first recipient biometric information for identifying the recipient to the recipient's own authentication terminal 4 (see FIGS. 4A and 4B).
- Authentication terminal 4 encrypts the first recipient biometric information with a predetermined encryption key, and sends the encrypted first recipient biometric information and the remittance request to the financial institution via the network. And holds a decryption key for decrypting the encrypted first recipient biometric information.
- the remittance officer of the financial institution inputs the encrypted first receiver biometrics information received from the authentication terminal 4 to the authentication terminal 4 and receives it.
- the person inputs second recipient biometrics information for identifying the recipient to the authentication terminal 4.
- the authentication terminal 4 decrypts the encrypted first recipient biometrics information input by the remittance officer with the decryption key held in the authentication terminal 4, and decrypts the decrypted first recipient biometrics information.
- the biometrics information is compared with the second recipient biometrics information entered in the above procedure III-3, and when the biometrics information matches, the fact is notified to the recipient and the remitter.
- the fifteenth example applies when the sender and the recipient are at the same place as described above. Specifically, it is applied when the remitter purchases goods at stores such as shops. In this case, the owner of the shop becomes the recipient, and the terminals of the shop provided at the store are used as the authentication terminals 1 and 4.
- the recipient goes out with the authentication terminals 1 and 4 at the counter of the financial institution, and at this window, the above-mentioned procedures -3-3 to -5-5 or ⁇ ⁇ -3 to 6 -5 may be used to receive the money, or the remittance manager of the financial institution visits the recipient's home and performs the above procedure ⁇ ⁇ -3 to 5 -5 or 6- You may transfer money by performing 3 ⁇ 6-5.
- the agent designated by the beneficiary can receive money from the remitter on behalf of the beneficiary. Becomes possible. Further, the method described in the fourth to seventh examples may be further applied to the fifteenth example, and in this case, the same operation and effect as those in the fourth to seventh examples are obtained. Can be.
- FIG. 13 is a block diagram showing a first configuration example of the electronic commerce system and the authentication terminal of the present invention.
- the first configuration example shown in FIG. 13 is for realizing the first and fourth examples of the electronic commerce method described above.
- the e-commerce system of the first configuration example includes an orderer-side authentication terminal 1 that places an order for a product to a contractor and authenticates the orderer when the product is received, and a communication between the authentication terminal 1 and the contractor.
- Network 2 for exchanging information between It comprises an order information holding unit 3 on the order receiving side, which holds the order information sent from the certificate terminal 1 via the network 2.
- the authentication terminal 1 in the first configuration example includes a data input unit 14, an authentication information storage unit 10, an encryption key generation unit 21, an encryption unit 11, an output interface unit 19, and a decryption key storage unit. 12, Password storage unit 13, Input interface unit 20, User authentication unit 15, Authentication information decryption unit 16, Authentication information collation unit 17, and decryption key deletion unit
- the data input section 14 functions as an authentication information input section for inputting authentication information (for example, a password) for identifying the orderer when placing an order for a product, and a password (encrypted when the product is delivered). It functions as a data input unit for inputting data necessary to decrypt authentication information.
- authentication information for example, a password
- the authentication information holding unit 10 holds the authentication information input from the data input unit 14.
- an encryption key generation unit (encryption key generation unit) 21 includes a predetermined encryption key (encryption key) and a decryption key (decryption key for decrypting information encrypted by the encryption key). (Decryption key).
- the encryption unit 11 encrypts the authentication information input from the data input unit 14 with the encryption key generated by the encryption key generation unit 21.
- the output interface unit (output I / F) 19 uses the encrypted authentication information encoded by the encryption unit 11 1 together with the order slip (information on the product name, quantity, amount, delivery address, etc.) and the order information. In addition to sending to the contractor (order information holding unit 3) via the network 2 and notifying the contractor (order information holding unit 3) of the verification result by the authentication information matching unit 17 described later. .
- the decryption key storage unit (decryption key storage unit) 12 stores the decryption key (decryption key) for decrypting the encrypted authentication information generated by the encryption key generation unit 21, and stores the password.
- the unit (data holding unit) 13 stores in advance a password (data necessary for permitting decryption of the encrypted authentication information; data for authenticating that the authentication terminal 1 is the authorized owner; an authentication key). To keep.
- Input interface section (input IZF) 20 holds order information at the time of product delivery This is for inputting the encrypted authentication information held in the unit 3, and is, for example, a slot for a medium such as the compact flash (registered trademark) card described above.
- the user authentication unit (orderer authentication unit) 15 compares the password stored in the password storage unit 13 with the password input from the data input unit 14 by the orderer at the time of delivery of the product, and checks the user of the authentication terminal 1. When these passwords match, the use of the decryption key held in the decryption key holding unit 12 is permitted.
- the authentication information decryption unit (decryption unit) 16 receives the collation result from the orderer authentication unit 15 and uses the decryption key stored in the decryption key storage unit 12 to encrypt the data input from the input interface unit 20.
- the decrypted authentication information is decrypted.
- the authentication information collating unit (collating unit) 17 collates the authentication information decrypted by the decrypting unit 16 with the authentication information held in the authentication information holding unit 10, and compares the collation result with the orderer, the delivery person of the product, and the order receipt. To notify the person.
- the decryption key erasing unit (decryption key erasing unit) 22 erases the decryption key held in the decryption key holding unit 12 upon completion of the verification at the time of delivery of the product (verification by the authentication information verification unit 17). Is what you do.
- the authentication terminal 1 is, for example, a personal computer or the like, and the CPU or the like in the authentication terminal 1 executes a predetermined electronic commerce program, thereby obtaining the above-described encryption key generation unit 21, encryption unit 11, user authentication
- the functions as the section 15, the authentication information decrypting section 16, the authentication information collating section 17, and the decryption key erasing section 22 are realized.
- the electronic commerce program described above is provided in a form recorded on a computer-readable recording medium such as a flexible disk, a CD-ROM, a CD-R, a CD-RW, and a DVD.
- the CPU reads the electronic commerce program from the recording medium, transfers it to the internal storage device or the external storage device, and stores and uses it.
- the electronic commerce program may be recorded on a storage device (recording medium) such as a magnetic disk, an optical disk, or a magneto-optical disk, and provided to the CPU from the storage device via a communication line. .
- magneto-optical disks IC cards, ROM cartridges, magnetic tapes, punch cards, computer internal storage devices (memory such as RAM and ROM), external storage devices, and codes such as bar codes are printed.
- Various computer-readable media such as printed materials can be used.
- the data input unit 14 is constituted by, for example, a keypad touch panel in a personal computer or the like.
- the authentication information storage unit 10, the decryption key storage unit 12, and the password storage unit 13 are, for example, a personal computer or the like. Is composed of RAM.
- the password for authenticating the owner (user) of the authentication terminal 1 is input to the password holding unit 13 of the authentication terminal 1 in advance.
- the orderer inputs authentication information from the data input unit 14 to the authentication terminal 1 when placing an order.
- the authentication information holding unit 10 holds the input authentication information
- the encryption unit 11 encrypts the authentication information
- the information is sent to the order receiving information holding unit 3 of the order receiving party via the Internet.
- the ordering party's ordering information (information on product name, quantity, amount, delivery address, etc.) is also sent to the contractor.
- the decryption key for decrypting the encrypted authentication information is stored in the decryption key storage unit 12 in the authentication terminal 1.
- the encryption key is deleted when the encryption by the encryption unit 11 is completed.
- the contractor sends the encrypted authentication information held in the order information holding unit 3 to the orderer's authentication terminal 1 and enters the input interface unit. 2 Input from 0.
- the encrypted authentication information may be transmitted and input to the authentication terminal 1 via the network 2, or may be input using, for example, a flash compact (registered trademark) card as described above.
- the orderer inputs a password from the data input unit 14, and the user authentication unit 15 determines whether the password in the password storage unit 13 matches the input password. judge.
- the user authentication unit 15 When these passwords match, the user authentication unit 15 outputs a decryption permission signal for permitting decryption of the input encrypted authentication information to the authentication information decryption unit 16.
- the authentication information decryption unit 16 receives the decryption permission signal and receives the decryption key in the decryption key holding unit 12. To decrypt the encrypted authentication information.
- the authentication information collating unit 17 collates the authentication information held in the authentication information holding unit 10 with the authentication information decrypted by the authentication information decrypting unit 16 and determines that the authentication information matches. Check.
- the authentication terminal 1 displays the authentication result on an LED, a liquid crystal panel, or the like, and transmits it as digital data to the order receiving information holding unit 3 of the recipient via the output interface unit 19 and the network 2.
- the encryption key generation unit 21 each time the orderer places an order with the authentication terminal 1, the encryption key generation unit 21 generates an encryption key and a decryption key. Then, when the verification by the authentication information collating unit 17 is completed, the decryption key erasing unit 22 erases the decryption key held in the decryption key holding unit 12.
- FIG. 14 is a block diagram showing a second configuration example of the electronic commerce system and the authentication terminal of the present invention.
- the second configuration example shown in FIG. 14 is for realizing the second and fourth examples of the electronic commerce method described above.
- This second configuration example is also configured almost in the same way as the first configuration example shown in FIG. 13, but in this second configuration example, the biometric information storage unit 13 a is used instead of the password storage unit 13. , And a new biometric sensor 18 is provided.
- the same reference numerals as those described above indicate the same or almost the same parts, and thus the description thereof will be omitted.
- the data input unit 14 in the second configuration example only functions as an authentication information input unit for inputting authentication information (for example, a password) for identifying the orderer when ordering a product.
- the metric sensor 18 functions as a data input unit that collects and inputs biometrics information of the orderer (data required for decrypting the encrypted authentication information) when the product is delivered. is there.
- the biometric information storage unit (data storage unit) 13 a Biometric information to be specified (data required to decrypt encrypted authentication information)
- authentication data as the terminal owner indicating that he is the authorized owner of the authentication terminal 1) is stored in advance.
- the user authentication unit 15 collates the biometric information stored in advance in the biometric information storage unit 13a with the biometric information input from the biometric sensor 18. .
- the user authentication unit 15 performs the personal authentication of the user of the authentication terminal 1 using a password, but the user authentication unit 15 of the second configuration example uses biometric information.
- biometric information refers to human physical characteristics (eg, fingerprint, palm print, retina, iris, capillary pattern, face image, voiceprint, etc.) and specific human actions (signs, gestures, etc.). This is what has been converted into data.
- the biometrics authentication is a method of using two pieces of biometrics information A and B to authenticate that the owner of the biometrics information A and the owner of the biometrics information B are the same. It should be noted that the biometric information described in the present invention includes not only the above-mentioned examples but also all data that can be authenticated by humans, such as physical characteristics of humans and specific actions of humans. It is a thing.
- the encryption key generation unit 21 generates an encryption key and a decryption key.
- the decryption key deletion unit 22 deletes the decryption key stored in the decryption key storage unit 12.
- the fourth example of the e-commerce method described above is realized, and the same operation and effect as those of the second and fourth examples can be obtained.
- FIG. 15 is a block diagram showing a third configuration example of the electronic commerce system and the authentication terminal of the present invention.
- the third configuration example shown in FIG. 15 is for realizing the third and fourth examples of the electronic commerce method described above.
- the e-commerce system of the third configuration example includes an authentication terminal 4 on the orderer side, which places an order for goods to the contractor and authenticates the orderer when receiving the goods, and a communication between the authentication terminal 4 and the contractor.
- the system comprises a network 5 for exchanging information between them, and an order information holding unit 6 on the orderer side, which holds order information sent from the authentication terminal 4 via the network 5.
- the authentication terminal 4 in the third configuration example includes a biometrics sensor 40, an encryption key generation unit 47, an encryption unit 41, an output interface unit 45, a decryption key holding unit 42, an input interface It comprises a unit 46, a biometrics information decryption unit 44, a biometrics authentication unit 43, and a decryption key erasure unit 48.
- the biometrics sensor (biometrics information input unit) 40 is for collecting and inputting the biometrics information of the orderer.
- an encryption key generation unit (encryption key generation unit) 47 includes a predetermined encryption key (encryption key) and a decryption key for decrypting information encrypted by the encryption key. (Decryption key).
- the encryption unit 41 encrypts the first orderer biometric information input from the biometric sensor 40 by the orderer at the time of ordering the product with the encryption key generated by the encryption key generation unit 47. It becomes something.
- the output interface unit (output I / F) 45 is an ordering slip that contains the encrypted first orderer biometrics information encrypted by the encryption unit 41 (information such as product name, quantity, amount, and delivery destination).
- the order information is sent to the order receiving party (order receiving information holding unit 6) via the network 5, and the result of authentication by the biometric authentication unit 43 described later is notified to the order receiving party (order receiving information holding unit 6). It is for doing.
- the decryption key storage unit (decryption key storage unit) 42 stores a decryption key (decryption key) for decrypting the encrypted first orderer biometric information generated by the encryption key generation unit 47. Things.
- the input interface section (input I / F) 46 is used for inputting the encrypted first orderer biometric information stored in the order information storage section 6 when the product is delivered. This is a slot for media such as compact flash (registered trademark) cards.
- the biometrics information decryption unit (decryption unit) 44 uses the decryption key stored in the decryption key storage unit 42 to convert the encrypted first orderer piometrics information input from the input interface unit 46. It is to decrypt.
- the biometrics authentication unit (collation unit) 43 receives the first orderer's biometrics information decrypted by the biometrics information decryption unit 44 and the first orderer's biometrics information input from the biometric sensor 40 at the time of delivery of the product. (2) It compares the biometric information with the orderer, and notifies the orderer, the person in charge of delivery of the product, and the contractor of the result of the comparison.
- the decryption key erasing unit (decryption key erasing unit) 48 stores the decryption key held in the decryption key holding unit 42 when the verification (authentication by the biometric authentication unit 43) at the time of delivery of the product is completed. Is to be erased.
- the authentication terminal 4 of the third configuration example is, for example, a personal computer, and the above-described operation is performed by executing a predetermined electronic commerce program by the CPU or the like in the authentication terminal 4.
- the functions as an encryption key generation unit 47, an encryption unit 41, a biometrics information decryption unit 44, a biometrics authentication unit 43, and a decryption key erasure unit 48 are realized.
- the electronic commerce program described above is provided in a form recorded on a computer-readable recording medium such as a flexible disk, a CD-ROM, a CD-R, a CD-RW, and a DVD.
- the decryption key holding unit 42 is composed of, for example, a RAM in a personal computer or the like.
- the biometric sensor 40 obtains the first orderer biometrics information of the orderer at the time of ordering, and encrypts the information by the encryption unit 41.
- the information is transmitted to the order receiving information holding unit 6 of the contractor. Note that the encryption key is deleted when the encryption by the encryption unit 41 is completed.
- the contractor sends the encrypted first orderer biometrics information in the order information holding unit 6 to the authentication terminal 4 and inputs the information. Enter from evening face part 4 6.
- the encrypted first orderer biometric information may be transmitted and input to the authentication terminal 4 via the network 5, or as described above, for example, by a flash compact (registered trademark) card. May be input.
- the encrypted first orderer's biometrics information is decrypted by the biometrics information decryption unit 44, and the decryption result is transmitted to the biometrics authentication unit 43.
- the authentication terminal 4 collects the orderer's biometrics information (second orderer's biometrics information) again. Then, the second orderer's biometrics information is input to the biometrics authentication unit 43, and the biometrics authentication unit 43 collates the two pieces of biometrics information to authenticate the orderer.
- the authentication terminal 4 displays the authentication result on an LED, a liquid crystal panel, or the like, and transmits it as digital data to the order receiving information holding unit 6 of the contractor through the output interface unit 45 and the network 5.
- the encryption key generation unit 47 each time the orderer places an order with the authentication terminal 4, the encryption key generation unit 47 generates an encryption key and a decryption key.
- the decryption key erasing unit 48 erases the decryption key stored in the decryption key storage unit 42.
- FIG. 16 is a block diagram showing a fourth configuration example of the electronic commerce system and the authentication terminal of the present invention.
- the fourth configuration example shown in FIG. 16 is for realizing the ninth and fourth examples of the electronic commerce method described above.
- the e-commerce system includes an authentication terminal 7 on the orderer side, which places an order for goods to the contractor and authenticates the goods received by an agent delegated by the orderer; It comprises a network 8 for exchanging information with the contractor, and an order information holding unit 9 on the contractor side, which holds the order information sent from the authentication terminal 7 via the network 8. ing.
- the authentication terminal 7 in the fourth configuration example includes a biometrics sensor 70, an encryption key generation unit 79, an encryption unit 71, an output interface unit 77, a decryption key storage. Holding unit 72, biometric information holding unit 73, agent biometric information holding unit 74, input interface unit 78, biometric information decoding unit 76, biometric authentication unit 75, and decryption key erasing unit 80 It is configured with.
- the biometrics sensor (biometrics information input unit) 70 is for collecting and inputting biometrics information.
- the encryption key generation unit (encryption key generation unit) 79 includes a predetermined encryption key (encryption key) and a decryption key for decrypting information encrypted by the encryption key each time a product is ordered. (Decryption key).
- the encryption unit 71 converts the first orderer's biometrics information A input from the biometric sensor 70 by the orderer at the time of ordering the product with the encryption key generated by the encryption key generation unit 79. It is to be encrypted.
- the output interface unit (output IZF) 77 sends the encrypted first orderer biometrics information A, which has been decrypted by the encryption unit 71, to the order slip (such as the product name, quantity, amount, and delivery destination). Information) and the order information to the order recipient (order information holding unit 9) via the network 8, and the authentication result by the biometric authentication unit 75 described later to the order recipient (order information holding unit 9). It is for notification.
- the decryption key storage unit (decryption key storage unit) 72 is a decryption key (decryption key) for decrypting the encrypted first orderer biometrics information A generated by the encryption key generation unit 79. Is held.
- the biometric information storage unit 73 holds the second orderer biometric information B input from the biometric sensor 70 by the orderer when the orderer entrusts the receipt of the product to the agent.
- the agent biometric information storage unit 74 also stores the first agent biometric information C input from the biometric sensor 70 by the agent when the orderer delegates the receiving of the goods to the agent. To keep.
- the input interface section (input I ZF) 78 is used to input the encrypted first orderer biometric information A stored in the order information storage section 9 when the product is delivered.
- the biometrics authentication unit 75 performs a function as an agent authentication unit (agent authentication function) and a function as an orderer authentication unit (orderer authentication function).
- agent authentication function of the biometrics authentication unit ⁇ 5 is input from the biometric sensor 70 by the agent at the time of delivery of the first agent pieometrics information C stored in the agent biometrics information storage unit 74 and the product when delivered.
- the biometrics information decryption unit (decryption unit) 76 receives the result of the verification by the proxy authentication function of the biometrics authentication unit 75 and uses the decryption key held in the decryption key storage unit 72 to input an input interface. It decrypts the encrypted first orderer biometrics information A input from the part 78.
- the orderer authentication function of the biometrics authentication unit 75 was held in the first orderer's biometrics information A decrypted by the biometrics information decryption unit 76 and the orderer's biometrics information storage unit 73. This function matches the second orderer's biometrics information B and notifies the orderer, the person in charge of delivery of the product, and the contractor of the result of the comparison.
- the decryption key erasing unit (decryption key erasing unit) 80 stores the decryption key held in the decryption key holding unit 72 at the time of completion of verification at the time of product delivery (orderer authentication by the biometric authentication unit 75). Is to be erased.
- the authentication terminal 7 of the fourth configuration example is, for example, a personal computer, etc., and the CPU or the like in the authentication terminal 7 executes a predetermined electronic commerce program.
- the functions as an encrypted key generation unit 79, an encryption unit 71, a biometrics information decryption unit 76, a biometrics authentication unit 75, and a decryption key erasure unit 80 are realized.
- the electronic commerce program described above is provided in a form recorded on a computer-readable recording medium such as a flexible disk, a CD-ROM, a CD-R, a CD-RW, and a DVD.
- the decryption key storage unit 72, the biometric information storage unit 73, and the agent biometric information storage unit 74 are composed of, for example, a RAM in a personal computer or the like.
- the authentication terminal 7 obtains the biometric information A of the orderer by the biometric sensor 70 at the time of ordering, encrypts the information by the encryption unit 71, and transmits the encrypted information to the order information storage unit 9 of the contractor.
- the encryption key is deleted when the encryption by the encryption unit 71 is completed.
- the orderer registers an agent acting on behalf of the orderer on the authentication terminal 7.
- the authentication terminal 7 acquires the biometric information B and C of the orderer and the agent, and holds them in the orderer's biometric information storage unit 73 and the agent biometric information storage unit 74, respectively.
- the contractor sends the encrypted biometrics information in the order information holding unit 9 to the authentication terminal 7 and inputs it from the input interface unit 7 8 I do.
- the encrypted first orderer biometric information A may be transmitted and input to the authentication terminal 7 via the network 8, or as described above, for example, by a flash compact (registered trademark) card. May be entered.
- the agent reads the biometrics information D of the agent into the authentication terminal 7.
- a finger is pressed against a fingerprint sensor as a biometric sensor 70 attached to the authentication terminal 7 and a fingerprint is read by this sensor to acquire a fingerprint image (biometric information).
- the biometrics authentication unit 75 compares the biometrics information D input at the time of authentication with the biometrics information C stored in the agent biometrics information storage unit 74, and executes the authentication of the agent.
- the authentication result is output to the biometrics information decryption unit 76.
- the biometrics information decryption unit 76 converts the encrypted biometrics information A input from the input interface 78 into the decryption key stored in the decryption key storage unit 72. To decrypt. Thereafter, the biometric authentication unit 75 compares the decrypted pyrometric information A with the biometric information B stored in the orderer's biometric information storage unit 73, and authenticates the issuer. Execute The authentication terminal 7 displays the authentication result on an LED, a liquid crystal panel, or the like, and transmits it as digital data to the order receiving information holding unit 9 of the contractor via the output interface unit 77 and the network 8.
- the encryption key generation unit 79 each time the orderer places an order with the authentication terminal 7, the encryption key generation unit 79 generates an encryption key and a decryption key.
- the decryption key erasing unit 80 erases the decryption key stored in the decryption key storage unit 72.
- the ninth example of the e-commerce method described with reference to FIGS. 12A to 12C, and FIGS. 6A and 6B The fourth example of the e-commerce method described with reference to FIG. 7 and FIG. 7 is realized, and the same operational effects as those in the ninth example and the fourth example can be obtained.
- the authentication information of the orderer / recipient and the biometric information are encrypted and passed to the contractor Z financial institution, and the encrypted information is The decryption is performed only at the orderer / recipient authentication terminals 1, 4, and 7.
- the person in charge of delivery Z and the person in charge of remittance or the orderer / receiver must input the specified information including the above-mentioned encrypted information into the authentication terminals 1, 4, and 7.
- the encrypted information is decrypted, and the identity of the orderer / recipient is authenticated. Therefore, it is possible to reliably prevent the abuse of authentication information such as passwords and biometrics information exchanged on the networks 2, 5, and 8 when conducting electronic commerce.
- the authentication terminals 7 and 7A hold the biometrics information C of the agent and the biometrics information B of the orderer in advance, and when the goods are delivered (the At the time of authentication of a certain orderer), the person in charge of delivery (contractor) inputs the orderer's biometric information A sent from the authentication terminals 7, 7A to the authentication terminals 7, 7A, and the agent himself
- the biometrics information D of the user is input to the authentication terminals 7 and 7A, and the authentication terminals 7 and 7A first authenticate the identity of the agent, and when the identity of the agent is authenticated,
- the orderer's biometrics information A and the orderer's biometrics information B stored in advance in the authentication terminals 7 and 7A are used to perform the authentication of the orderer (authenticater).
- biometric information can be diverted and spoofing due to improper ordering can be reliably prevented, and electronic commerce using the Internet can be performed with confidence. it can.
- the agent can authenticate the identity of the ordering party, greatly improving convenience.
- the settlement institution can detect fraudulent settlements, and can reliably prevent unsolicited settlement by the ordering party (user) user.
- the information (biometric information, decryption key, etc.) stored in the authentication terminals 1, 4, and 7 is described as only one set, but the present invention is not limited to this. Instead, multiple sets of information used for multiple orders may be stored in association with each order. In this case, for example, index information is added to a part of the information transmitted to the contractor, and the index information is received to determine which information in the memory is to be used for authentication.
- the orderer / recipient authentication information and biometrics information are encrypted and passed to the contractor Z financial institution at the time of ordering the product, and the orderer Z recipient is When receiving goods or money, the person in charge of delivery, the person in charge of remittance, and the orderer / recipient input predetermined information including the above-mentioned encrypted information into the authentication terminal, and the encrypted information is It is decrypted and the identity of the orderer Z recipient is authenticated.
- the present invention provides a method for transmitting power using a network such as the Internet. It is suitable for use in child commerce, and its usefulness is considered to be extremely high.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Authentication information such as passwords and biometrics information communicated over a network when electronic commerce is carried out is reliably prevented from being misappropriated. In ordering a commodity, the orderer enters authentication information into an authentication terminal (1). The authentication terminal (1) encrypts the authentication information, transmits the encrypted authentication information to an order receiver, and holds the authentication information and a decryption key. The person in charge of delivery enters the encrypted authentication information received from the authentication terminal (1) when receiving the order into the authentication terminal (1). The orderer enters data on terminal authentication representing that the orderer is the normal owner of the authentication terminal (1). The authentication terminal (1), if authenticates the orderer as the normal owner of the authentication terminal (1) by using the data, decrypts the encrypted authentication information entered by the person in charge of delivery with the decryption key in the authentication terminal (1), and collates the decrypted authentication information with the authentication information in the authentication terminal (1). The person in charge of delivery delivers the commodity to the orderer if the decrypted authentication information matches the authentication information in the authentication terminal (1).
Description
明 細 書 電子商取引方法, 電子商取引システムおよび認証端末 Description Electronic commerce method, electronic commerce system and authentication terminal
並びに代理人による本人認証方法 技術分野 Authentication method by agent and technical field
本発明は、 パスワードなどの本人認証情報または本人の身体的特徴をあらわす デジタルデータ (バイオメトリクス情報) を用いて本人認証を行なう電子商取引 に用いられる技術に関する。 背景技術 The present invention relates to a technique used for electronic commerce in which personal authentication is performed using personal authentication information such as a password or digital data (biometric information) representing physical characteristics of the personal. Background art
電子商取引において、 本人を認証する方法としては P K I (Public Key Infr astructure) が'ある。 この P K Iでは、 ¾ί、証局 (Certificate Authority:以下、 C Aと記す) が登録ユーザに対して秘密鍵と公開鍵を発行する。 ユーザは、 業者 に対して商品等を発注する際、 ユーザの電子署名を秘密鍵で暗号化し、 公開鍵と ともに業者に送る。 業者は、 送信された電子署名を公開鍵で復号できることを確 認し、 その公開鍵をもとに C Aにユーザの照合を行なうことで、 発信者がユーザ 本人であることを認証する。 P K Iでは、 ネットワーク上で送信したユーザの情 報が改ざんされていないこと、 第三者がユーザになりすましていないことが保証 される。 In electronic commerce, PKI (Public Key Infrastructure) is one of the methods to authenticate a person. In this PKI, ¾ί, a Certificate Authority (hereinafter referred to as CA) issues a private key and a public key to registered users. When a user places an order for a product or the like with a trader, the user's electronic signature is encrypted with a private key and sent to the trader along with a public key. The vendor verifies that the transmitted electronic signature can be decrypted with the public key, and verifies the user against CA using the public key to authenticate that the sender is the user. PKI guarantees that user information transmitted on the network has not been altered, and that no third party has impersonated the user.
P K Iでは、 公開鍵暗号化方式を用いることにより、 ネットワークの経路上で のセキュリティを確保している。 しかし、 ユーザの秘密鍵を第三者が盗み出して 使用した場合、 P K Iは正規のユーザか第三者による不正使用かを判断すること はできない。 そのため、 P K Iとは別に、 確実に本人が秘密鍵を使用しているこ とを証明できる本人認証が必要となる。 パスワードのような "言葉" では、 知つ ているか知らないかを確認できるだけであって、 本人か他人かを判定することは できない。 PKI uses public key encryption to ensure security on the network path. However, if a third party steals and uses the user's private key, PKI cannot determine whether it is an authorized user or an unauthorized use by a third party. Therefore, in addition to PKI, personal authentication that can certify that the individual is using the private key is required. "Words" such as passwords can only confirm whether they know or not, and cannot determine who they are or who they are.
そこで、 パスワードに代わる認証方式として、 バイオメトリクス情報による照 合が提案されている。 バイオメトリクス情報は、 ュ一ザの身体的特徴をデータ化
したものであり、 代表的なバイオメトリクス情報としては、 指紋, 掌紋, 網膜, 虹彩, サイン, 音声などがある。 予め登録されているバイオメトリクス情報と、 ユーザが入力したバイオメトリクス情報とを照合することにより、 いまバイオメ トリクス情報を入力した人がユーザ本人であることを確認することができる。 バイオメトリクスデ一夕を用いた本人認証手段としては、 例えば特開 2 0 0 1 一 2 9 7 2 6 9号公報 (特許文献 1 ) に開示された手法が知られている。 この手 法では、 商品の発注時に、 発注者 (ユーザ) は、 自身のバイオメトリクス情報を 発注端末から業者 (受注者) 側の電子商取引サーバへ送る。 そして、 電子商取引 サーバは、 発注者が受取先として指定した店舗に配置されている本人確認端末 (照合端末) に発注者のバイオメトリクス情報を送る。 この後、 受取人によって 商品の引渡しが要求された場合、 店舗の店員は、 本人確認端末を使用して受取人 のバイオメトリクス情報を採取して電子商取引サーバから送られてきている発注 者のバイオメトリクス情報と照合し、 これらのバイオメトリクス情報が一致した 場合に商品を引き渡す。 Therefore, as an alternative to passwords, verification using biometric information has been proposed. Biometric information converts the physical characteristics of a user into data Typical biometric information includes fingerprints, palm prints, retina, iris, signs, and voice. By comparing the biometric information registered in advance with the biometric information input by the user, it is possible to confirm that the person who has input the biometric information is the user himself. As a personal authentication means using biometrics data, for example, a method disclosed in Japanese Patent Application Laid-Open No. 2001-297927 (Patent Document 1) is known. In this method, when placing an order for a product, the orderer (user) sends its biometrics information from the ordering terminal to the e-commerce server at the supplier (orderer). Then, the e-commerce server sends the orderer's biometric information to an identity verification terminal (verification terminal) located at the store designated by the orderer as the recipient. Thereafter, when the recipient requests delivery of the goods, the store clerk collects the biometric information of the recipient using the personal identification terminal, and obtains the biometric information of the orderer sent from the e-commerce server. Compare with the metrics information, and deliver the product if the biometric information matches.
しかしながら、 このような電子商取引では、 バイオメトリクス情報を業者に受 け渡さなければならないため、 そのバイオメトリクス情報が誤って流出してしま うおそれがあり、 万一、 バイオメトリクス情報が流出すると第三者によって悪用 され、 なりすましによる商品の不正発注 ·不正取引が行なわれる可能性がある。 また、 上述した電子商取引では、 バイオメトリクス情報を用いて認証を行なう ため、 商品は発注者本人しか受け取ることができず、 万一、 発注者が受け取れな いような場合に代理人が商品の受取を行なおうとしても、 その商品を受け取る手 段が無かった。 However, in such electronic commerce, the biometric information must be delivered to the trader, and the biometric information may leak out by mistake. There is a possibility that fraudulent orders can be made and fraudulent transactions can be carried out. In the above-mentioned e-commerce, authentication is performed using biometric information, so that only the orderer can receive the product, and if the orderer cannot receive the product, the agent can receive the product. There was no way to receive the product.
本発明は、 このような課題に鑑み創案されたもので、 電子商取引を行なう際に ネッ卜ワーク上でやり取りされるパスヮ一ドゃバイオメトリクス情報などの認証 情報が悪用されるのを確実に防止することを第 1の目的とするとともに、 商品等 の受取に際して発注者本人だけでなく発注者本人が指定した代理人による受取を 可能にすることを第 2の目的とする。 SUMMARY OF THE INVENTION The present invention has been made in view of the above problems, and reliably prevents misuse of authentication information such as pass-through biometrics information exchanged on a network when performing electronic commerce. The first purpose is to enable the receipt of goods, etc., by not only the ordering person but also the agent designated by the ordering person.
特許文献 1 Patent Document 1
特開 2 0 0 1— 2 9 7 2 6 9号公報
発明の開示 Unexamined Japanese Patent Publication No. 2000-2997269 Disclosure of the invention
上記目的を達成するために、 本発明の電子商取引方法 〔1〕 は、 発注者がネッ トワークを介して受注者に商品を発注し該商品を受け取る方法であって、 (1-1) 該商品の発注時に、 該発注者は該発注者本人を特定するための認証情報を認証端 末に入力し、 (1-2)該認証端末は、 所定の暗号鍵で該認証情報を暗号化し、 暗号 化済み認証情報を該商品の発注伝票とともに該ネットワークを介して該受注者へ 送付するとともに、 該認証情報と該暗号化済み認証情報を復号するための復号鍵 とを保持し、 (1-3)該商品の納品時に、 該受注者側の納品担当は、 該商品の発注 時に該認証端末から受け取つた該暗号化済み認証情報を該認証端末に入力すると ともに、 該発注者は、 該認証端末の正規の所有者であることを示す端末認証のデ 一夕を該認証端末に入力し、 (1-4)該認証端末は、 該デ一夕によって該発注者が 該認証端末の正規の所有者であることを認証したら、 該納品担当によつて入力さ れた該暗号化済み認証情報を、 該認証端末内に保持された該復号鍵で復号し、 復 号認証情報と該認証端末内に保持された該認証情報とを照合し、 これらの認証情 報が一致した場合にその旨を該発注者, 該納品担当および該受注者に通知し、 (1-5)該認証端末からの照合一致通知を受けて、 該納品担当は該商品の該発注者 への受渡しを実行することを特徵としている。 In order to achieve the above object, an electronic commerce method [1] of the present invention is a method in which an orderer places an order for goods to a contractor via a network and receives the goods. At the time of ordering, the orderer inputs authentication information for identifying the orderer to the authentication terminal. (1-2) The authentication terminal encrypts the authentication information with a predetermined encryption key, and Sends the encrypted authentication information together with the order slip of the product to the order-receiving party via the network, and holds the authentication information and a decryption key for decrypting the encrypted authentication information; At the time of delivery of the product, the delivery person on the order receiving side inputs the encrypted authentication information received from the authentication terminal at the time of ordering the product to the authentication terminal, and the orderer sets the authentication terminal Of terminal authentication to show that it is the legitimate owner of (1-4) When the authentication terminal verifies that the orderer is an authorized owner of the authentication terminal by the data transmission, the authentication terminal is input by the delivery person. The encrypted authentication information is decrypted with the decryption key held in the authentication terminal, and the decrypted authentication information is compared with the authentication information stored in the authentication terminal. If they match, the ordering person, the delivery person and the order receiving party are notified of the fact. (1-5) Upon receiving the matching check notification from the authentication terminal, the delivery person notifies the ordering person of the product. It is characterized by carrying out delivery.
本発明の電子商取引方法 〔2〕 は、 発注者がネットワークを介して受注者に商 品を発注し該商品を受け取る方法であって、 (2-1)該商品の発注時に、 該発注者 は該発注者本人を特定するための第 1発注者バイオメトリクス情報を認証端末に 入力し、 (2-2)該認証端末は、 所定の暗号鍵で該第 1発注者バイオメトリクス情 報を暗号化し、 暗号化済み第 1発注者バイオメ卜リクス情報を該商品の発注伝票 とともに該ネットワークを介して該受注者へ送付するとともに、 該暗号化済み第 1発注者バイオメトリクス情報を復号するための復号鍵を保持し、 (2-3)該商品 の納品時に、 該受注者側の納品担当は、 該商品の発注時に該認証端末から受け取 つた該暗号化済み第 1発注者バイオメトリクス情報を該認証端末に入力するとと もに、 該発注者は、 該発注者本人を特定するための第 2発注者バイオメトリクス 情報を該認証端末に入力し、 (2-4)該認証端末は、 該納品担当によって入力され
PC漏 003趣 271 た該暗号化済み第 1発注者バイオメトリクス情報を、 該認証端末内に保持された 該復号鍵で復号し、 復号第 1発注者バイオメトリクス情報と該第 2発注者バイオ メトリクス情報とを照合し、 これらの発注者バイオメトリクス情報が一致した場 合にその旨を該発注者, 該納品担当および該受注者に通知し、 (2-5)該認証端末 からの照合一致通知を受けて、 該納品担当は該商品の該発注者への受渡しを実行 することを特徴としている。 The electronic commerce method [2] of the present invention is a method in which an orderer places an order for a product to a contractor via a network and receives the product. (2-1) When ordering the product, the orderer The first orderer biometric information for identifying the orderer himself is input to the authentication terminal, and (2-2) the authentication terminal encrypts the first orderer biometric information with a predetermined encryption key. Sending the encrypted first orderer biometrics information together with the ordering slip for the product to the orderer via the network, and a decryption key for decrypting the encrypted first orderer biometrics information. (2-3) At the time of delivery of the product, the delivery person in charge of the order receiving party sends the encrypted first orderer biometrics information received from the authentication terminal at the time of ordering the product, to the authentication terminal. And the ordering party The second orderer biometrics information for identifying the purchaser himself entered in the authentication terminal, (2-4) the authentication terminal is input by 該納 products responsible The PC leakage 003 is decrypted using the decryption key held in the authentication terminal, and decrypts the encrypted first orderer biometrics information, and decrypts the first orderer's biometrics information and the second orderer's biometrics. If the biometrics information matches, the orderer, the delivery person and the orderer are notified of the fact, and (2-5) a check match notification from the authentication terminal Upon receipt of the request, the delivery person in charge delivers the product to the orderer.
本発明の電子商取引方法 〔3〕 は、 発注者がネットワークを介して受注者に商 品を発注し、 該発注者が委任した代理人が該商品を受け取る方法であって、 (3- 1)該商品の発注時に、 該発注者は該発注者本人を特定するための第 1発注者バイ オメトリクス情報を認証端末に入力し、 (3-2)該認証端末は、 該第 1発注者バイ オメ卜リクス情報を該商品の発注伝票とともに該ネットワークを介して該受注者 へ送付し、 (3-3)該発注者が該商品の受取を代理人に委任する際、 該発注者は、 該発注者本人を特定するための第 2発注者バイオメトリクス情報を該認証端末に 入力するとともに、 該代理人は、 該代理人本人を特定するための第 1代理人バイ オメトリクス情報を該認証端末に入力し、 (3-4)該認証端末は、 該第 2発注者バ ィオメ卜リクス情報と該第 1代理人バイオメトリクス情報とを対応付けて保持し、 (3-5)該商品の納品時に、 該受注者側の納品担当は、 該商品の発注時に該認証端 末から受け取った該第 1発注者バイオメ卜リクス情報を該認証端末に入力すると ともに、 該代理人は、 該代理人本人を特定するための第 2代理人バイオメ卜リク ス情報を該認証端末に入力し、 (3-6)該認証端末は、 該第 2代理人バイオメトリ クス情報と該認証端末内に保持された該第 1代理人バイオメトリクスとを照合し、 これらの代理人バイオメトリクス情報が一致した場合に該納品担当によって入力 された該第 1発注者バイオメトリクス情報と該認証端末内に保持された該第 2発 注者バイオメトリクス情報とを照合し、 これらの発注者バイオメトリクス情報が 一致した場合にその旨を該代理人, 該納品担当おょぴ該受注者に通知し、 (3-7) 該認証端末からの照合一致通知を受けて、 該納品担当は該商品の該代理人への受 渡しを実行することを特徴としている。 The electronic commerce method [3] of the present invention is a method in which an orderer places an order for a product to a contractor via a network, and an agent delegated by the orderer receives the product, (3-1) When ordering the product, the orderer inputs first orderer biometrics information for identifying the orderer to the authentication terminal, and (3-2) the authentication terminal transmits the first orderer biometric information to the authentication terminal. (3-3) When the orderer delegates the receipt of the product to an agent, the orderer transmits the metric information together with the order slip of the product to the orderer via the network. The second orderer biometrics information for identifying the orderer himself is input to the authentication terminal, and the agent sends the first agent biometrics information for identifying the agent himself to the authentication terminal. (3-4) The authentication terminal transmits the second orderer's biometric information. (3-5) At the time of delivery of the product, the delivery person in charge of the order receiving party receives the information received from the authentication terminal at the time of ordering the product. The first orderer biometrics information is input to the authentication terminal, and the agent inputs second agent biometrics information for identifying the agent himself to the authentication terminal. -6) The authentication terminal compares the second agent biometric information with the first agent biometric held in the authentication terminal, and when these agent biometric information match, The first orderer's biometric information input by the delivery person is compared with the second orderer's biometric information held in the authentication terminal, and when these orderer's biometric information match, To that effect the agent (3-7) Upon receiving a notice of matching from the authentication terminal, the delivery person executes delivery of the product to the agent. And
本発明の電子商取引方法 〔4〕 は、 発注者たる借受人と受注者たる金融機関と の間でネットワークを介して商品としての金銭の貸借を行なう方法であって、
(4-1)該発注者と該受注者との金銭消費貸借契約時に、 該発注者は該発注者本人 を特定するための認証情報を認証端末に入力し、 (4-2)該認証端末は、 所定の暗 号鍵で該認証情報を暗号化し、 暗号化済み認証情報を該ネットワークを介して該 受注者へ送付するとともに、 該認証情報と該暗号化済み認証情報を復号するため の復号鍵とを保持し、 (4-3)該発注者が該受注者に該金銭の返金を行なう際に、 該受注者は、 該金銭消費貸借契約時に該認証端末から受け取つた該暗号化済み認 証情報を該認証端末に入力するとともに、 該発注者は、 該暗号化済み認証情報を 復号するために必要なデータを該認証端末に入力し、 (4-4)該認証端末は、 該デ —夕に応じて、 該受注者によって入力された該暗号化済み認証情報を、 該認証端 末内に保持された該復号鍵で復号し、 復号認証情報と該認証端末内に保持された 該認証情報とを照合し、 その照合結果を該認証端末内に格納することを特徴とし ている。 The electronic commerce method [4] of the present invention is a method of borrowing and borrowing money as a product between a borrower as an orderer and a financial institution as a contractor via a network, (4-1) At the time of the loan contract between the orderer and the contractor, the orderer inputs authentication information for identifying the orderer to the authentication terminal, and (4-2) the authentication terminal. Encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information to the contractor via the network, and decrypts the authentication information and the encrypted authentication information. (4-3) When the orderer refunds the money to the orderer, the orderer receives the encrypted certificate received from the authentication terminal at the time of the loan contract. While inputting authentication information to the authentication terminal, the orderer inputs data necessary for decrypting the encrypted authentication information to the authentication terminal, and (4-4) the authentication terminal inputs the data to the authentication terminal. -In the evening, the encrypted authentication information input by the contractor is stored in the authentication terminal. Decoded by the decoding key which collates the authentication information stored in the decoded authentication information and authentication in the terminal, it is characterized by storing the verification result in the authentication in the terminal.
本発明の電子商取引方法 〔5〕 は、 発注者たる借受人と受注者たる金融機関と の間でネットワークを介して商品としての金銭の贷借を行なう方法であって、 (5-1)該発注者と該受注者との金銭消費貸借契約時に、 該発注者は該発注者本人 を特定するための第 1発注者バイオメトリクス情報を認証端末に入力し、 (5-2) 該認証端末は、 所定の暗号鍵で該第 1発注者バイオメトリクス情報を暗号化し、 暗号化済み第 1発注者バイオメトリクス情報を該ネットワークを介して該受注者 へ送付するとともに、 該暗号化済み第 1発注者バイオメトリクス情報を復号する ための復号鍵を保持し、 (5-3)該発注者が該受注者に該金銭の返金を行なう際に、 該受注者は、 該金銭消費貸借契約時に該認証端末から受け取つた該暗号化済み第 1発注者バイオメトリクス情報を該認証端末に入力するとともに、 該発注者は、 該発注者本人を特定するための第 2発注者バイオメトリクス情報を該認証端末に 入力し、 (5-4)該認証端末は、 該受注者によって入力された該暗号化済み第 1発 注者バイオメ卜リクス情報を、 該認証端末内に保持された該復号鍵で復号し、 復 号第 1発注者バイオメ卜リクス情報と該第 2発注者バイオメ卜リクス情報とを照 合し、 その照合結果を該認証端末内に格納することを特徴としている。 The e-commerce method [5] of the present invention is a method of borrowing or borrowing money as a product between a borrower as an orderer and a financial institution as a contractor via a network. At the time of the loan contract between the orderer and the contractor, the orderer inputs the first orderer biometric information for identifying the orderer to the authentication terminal, and (5-2) the authentication terminal Encrypting the first orderer's biometrics information with a predetermined encryption key, sending the encrypted first orderer's biometrics information to the orderer via the network, and encrypting the first orderer's biometrics information; Holding the decryption key for decrypting the biometric information, (5-3) when the orderer refunds the money to the orderer, the orderer receives the authentication terminal at the time of the money consumption loan contract. The encrypted first ordering party biometric received from And inputting the second orderer biometrics information for identifying the orderer to the authentication terminal, and (5-4) the authentication terminal: The encrypted first issuer biometric information input by the contractor is decrypted by the decryption key held in the authentication terminal, and the decrypted first orderer biometric information and the decrypted first orderer biometric information are decrypted. (2) It is characterized by collating with the orderer biometric information and storing the collation result in the authentication terminal.
本発明の電子商取引方法 〔6〕 は、 送金者が、 該送金者の端末によりネットヮ ークを介して金融機関に、 該送金者の口座から受取人への送金を依頼する方法で
あって、 (6-1)該受取人は該受取人本人を特定するための認証情報を、 該受取人 の認証端末に入力し、 (6-2)該認証端末は、 所定の暗号鍵で該認証情報を暗号化 し、 暗号化済み認証情報を該ネットワークを介して該送金者の端末へ送付すると ともに、 該認証情報と該暗号化済み認証情報を復号するための復号鍵とを保持し、 (6-3)該送金者の端末は、 該認証端末からの該暗号化済み認証情報を、 送金依頼 とともに、 該ネットワークを介して該金融機関に送付し、 (6-4)該受取人が該送 金者からの金銭を受け取る際に、 該金融機関の送金担当は、 該送金者の端末から 受け取つた該暗号化済み認証情報を該認証端末に入力するとともに、 該受取人は、 該暗号化済み認証情報を復号するために必要なデータを該認証端末に入力し、 (6-5)該認証端末は、 該デ一夕に応じて、 該送金担当によって入力された該暗号 化済み認証情報を、 該認証端末内に保持された該復号鍵で復号し、 復号認証情報 と該認証端末内に保持された該認証情報とを照合し、 これらの認証情報が一致し た場合にその旨を該受取人および該送金担当に通知し、 (6-6)該認証端末からの 照合一致通知を受けて、 該送金担当は該送金者からの金銭を該受取人に受け渡す ことを特徴としている。 The electronic commerce method [6] of the present invention is a method in which a remitter requests a financial institution via a network from a terminal of the remitter to transfer money from an account of the remitter to a receiver. (6-1) The recipient inputs authentication information for identifying the recipient to an authentication terminal of the recipient, and (6-2) the authentication terminal uses a predetermined encryption key. The authentication information is encrypted, the encrypted authentication information is sent to the terminal of the remitter via the network, and the authentication information and a decryption key for decrypting the encrypted authentication information are held. (6-3) The sender terminal sends the encrypted authentication information from the authentication terminal to the financial institution via the network together with a remittance request, and (6-4) the recipient When receiving the money from the sender, the remittance officer of the financial institution inputs the encrypted authentication information received from the terminal of the sender to the authentication terminal, and Enter the data necessary to decrypt the encrypted authentication information into the authentication terminal, and (6-5) The terminal decrypts the encrypted authentication information input by the remittance officer with the decryption key held in the authentication terminal in response to the data transfer, and stores the decrypted authentication information and the decrypted authentication information in the authentication terminal. The stored authentication information is compared with the stored authentication information, and when the authentication information matches, the receiver and the remittance representative are notified of the fact. (6-6) The verification matching notification from the authentication terminal is received. The remittance manager transfers the money from the sender to the recipient.
本発明の電子商取引方法 〔7〕 は、 送金者が、 該送金者の端末によりネットヮ —クを介して金融機関に、 該送金者の口座から受取人への送金を依頼する方法で あって、 (7-1)該受取人は該受取人本人を特定するための第 1受取人バイオメト リクス情報を、 該受取人の認証端末に入力し、 (7-2)該認証端末は、 所定の暗号 鍵で該第 1受取人バイオメトリクス情報を暗号化し、 暗号化済み第 1受取人バイ オメトリクス情報を該ネットワークを介して該送金者の端末へ送付するとともに、 該暗号化済み第 1受取人バイオメトリクス情報を復号するための復号鍵を保持し、 (7-3)該送金者の端末は、 該認証端末からの該暗号化済み第 1受取人バイォメト リクス情報を、 送金依頼とともに、 該ネットワークを介して該金融機関に送付し、 (7-4)該受取人が該送金者からの金銭を受け取る際に、 該金融機関の送金担当は、 該送金者の端末から受け取つた該暗号化済み第 1受取人バイオメトリクス情報を 該認証端末に入力するとともに、 該受取人は、 該受取人本人を特定するための第 2受取人バイオメトリクス情報を該認証端末に入力し、 (7-5)該認証端末は、 該 送金担当によって入力された該暗号化済み第 1受取人バイオメ卜リクス情報を、
該認証端末内に保持された該復号鍵で復号し、 復号第 1受取人バイオメトリクス 情報と該第 2受取人バイオメトリクス情報とを照合し、 これらのバイオメトリク ス情報が一致した場合にその旨を該受取人および該送金担当に通知し、 (7-6)該 認証端末からの照合一致通知を受けて、 該送金担当は該送金者からの金銭を該受 取人に受け渡すことを特徴としている。 An e-commerce method [7] of the present invention is a method in which a remitter requests a financial institution via a network by a terminal of the remitter to transfer money from an account of the remitter to a receiver. (7-1) The recipient inputs first recipient biometrics information for identifying the recipient to an authentication terminal of the recipient, and (7-2) the authentication terminal performs a predetermined encryption. Encrypts the first recipient biometrics information with a key, sends the encrypted first recipient biometrics information to the remitter's terminal via the network, and Holding the decryption key for decrypting the metrics information, (7-3) the remitter's terminal transmits the encrypted first recipient biometrics information from the authentication terminal together with the remittance request to the network, (7-4) The recipient When receiving money from the remitter, the remittance officer of the financial institution inputs the encrypted first recipient biometrics information received from the remitter's terminal to the authentication terminal, and Inputs the second recipient biometric information for identifying the recipient to the authentication terminal, and (7-5) the authentication terminal transmits the encrypted first reception information entered by the remittance officer. Human biometrics information, Decrypting with the decryption key held in the authentication terminal, collating the decrypted first recipient biometrics information with the second recipient biometrics information, and if these biometrics information match, it indicates so. (7-6) Notifying the receiver and the remittance clerk, (7-6) receiving the collation match notification from the authentication terminal, the remittance clerk transfers the money from the remitter to the receiver. I have.
本発明の電子商取引方法 〔8〕 は、 送金者が、 受取人の認証端末によりネット ワークを介して金融機関に、 該送金者の口座から該受取人への送金を依頼する方 法であって、 (8-1)該受取人は該受取人本人を特定するための認証情報を、 該受 取人の認証端末に入力し、 (8-2)該認証端末は、 所定の暗号鍵で該認証情報を暗 号化し、 暗号化済み認証情報と送金依頼とを該ネットワークを介して該金融機関 へ送付するとともに、 該認証情報と該暗号化済み認証情報を復号するための復号 鍵とを保持し、 (8-3)該受取人が該送金者からの金銭を受け取る際に、 該金融機 関の送金担当は、 該認証端末から受け取つた該暗号化済み認証情報を該認証端末 に入力するとともに、 該受取人は、 該暗号化済み認証情報を復号するために必要 なデータを該認証端末に入力し、 (8-4)該認証端末は、 該データに応じて、 該送 金担当によつて入力された該暗号化済み認証情報を、 該認証端末内に保持された 該復号鍵で復号し、 復号認証情報と該認証端末内に保持された該認証情報とを照 合し、 これらの認証情報が一致した場合にその旨を該受取人および該送金担当に 通知し、 (8-5)該認証端末からの照合一致通知を受けて、 該送金担当は該送金者 からの金銭を該受取人に受け渡すことを特徴としている。 The e-commerce method [8] of the present invention is a method in which a remitter requests a financial institution via a network using a recipient's authentication terminal to transfer money from the remitter's account to the recipient. (8-1) The receiver inputs authentication information for identifying the receiver to the receiver's authentication terminal, and (8-2) the authentication terminal uses the predetermined encryption key to Encrypts the authentication information, sends the encrypted authentication information and the remittance request to the financial institution via the network, and holds the authentication information and a decryption key for decrypting the encrypted authentication information. (8-3) When the receiver receives money from the sender, the remittance officer of the financial institution inputs the encrypted authentication information received from the authentication terminal to the authentication terminal. In addition, the recipient receives the data necessary to decrypt the encrypted authentication information. (8-4) The authentication terminal inputs the encrypted authentication information input by the person in charge of the remittance in accordance with the data, and stores the encrypted authentication information in the authentication terminal. Decrypting with the decryption key, comparing the decrypted authentication information with the authentication information held in the authentication terminal, and when the authentication information matches, notifies the recipient and the remittance officer of the fact, (8-5) The remittance officer transfers the money from the remitter to the recipient in response to the collation coincidence notification from the authentication terminal.
本発明の電子商取引方法 〔9〕 は、 送金者が、 受取人の認証端末によりネッ卜 ワークを介して金融機関に、 該送金者の口座から該受取人への送金を依頼する方 法であって、 (9-1)該受取人は該受取人本人を特定するための第 1受取人バイオ メトリクス情報を、 該受取人の認証端末に入力し、 (9-2)該認証端末は、 所定の 暗号鍵で該第 1受取人バイオメ卜リクス情報を暗号化し、 暗号化済み第 1受取人 バイオメトリクス情報と送金依頼とを該ネットワークを介して該金融機関へ送付 するとともに、 該暗号化済み第 1受取人バイオメトリクス情報を復号するための 復号鍵を保持し、 (9-3)該受取人が該送金者からの金銭を受け取る際に、 該金融 機関の送金担当は、 該認証端末から受け取った該暗号化済み第 1受取人バイオメ
トリクス情報を該認証端末に入力するとともに、 該受取人は、 該受取人本人を特 定するための第 2受取人バイオメトリクス情報を該認証端末に入力し、 (9-4)該 認証端末は、 該送金担当によって入力された該暗号化済み第 1受取人バイオメト リクス情報を、 該認証端末内に保持された該復号鍵で復号し、 復号第 1受取人バ ィオメトリクス情報と該第 2受取人パイオメトリクス情報とを照合し、 これらの バイオメトリクス情報が一致した場合にその旨を該受取人および該送金担当に通 知し、 (9-5)該認証端末からの照合一致通知を受けて、 該送金担当は該送金者か らの金銭を該受取人に受け渡すことを特徴としている。 The electronic commerce method [9] of the present invention is a method in which a remitter requests a financial institution via a network by a recipient's authentication terminal to transfer money from the remitter's account to the recipient. (9-1) the recipient inputs first recipient biometrics information for identifying the recipient to an authentication terminal of the recipient, and (9-2) the authentication terminal Encrypting the first recipient biometrics information with the encryption key of (1), sending the encrypted first recipient biometrics information and the remittance request to the financial institution via the network, and (1) Holding a decryption key for decrypting the recipient biometrics information, (9-3) When the recipient receives money from the remitter, the remittance manager of the financial institution receives the decryption key from the authentication terminal. The encrypted first recipient biome While inputting the Trix information to the authentication terminal, the recipient inputs second recipient biometric information for identifying the recipient to the authentication terminal, and (9-4) the authentication terminal Decrypting the encrypted first recipient biometric information input by the remittance officer with the decryption key held in the authentication terminal, and decrypting the first recipient biometric information and the second recipient The biometrics information is compared with the biometrics information. If the biometrics information matches, the receiver and the remittance officer are notified of the fact. (9-5) Upon receiving the matching match notification from the authentication terminal, The remittance officer is characterized by transferring money from the sender to the recipient.
本発明の電子商取引システム 〔1 0〕 は、 受注者に対する商品の発注を行なう とともに該商品の受取時に発注者本人の認証を行なう、 発注者側の認証端末と、 該認証端末と該受注者との間で情報のやり取りを行なうネットワークと、 該認証 端末から該ネットワークを介して送られてきた受注情報を保持する、 該受注者側 の受注情報保持部とをそなえ、 該認証端末が、 該商品の発注時に、 該発注者本人 を特定するための認証情報を入力する認証情報入力部と、 該認証情報入力部から 入力された該認証情報を所定の暗号鍵で暗号化する暗号化部と、 該暗号化部によ つて暗号化された暗号化済み認証情報を発注伝票とともに、 該受注情報として、 該ネットワークを介して該受注者へ送付する出力インタフェース部と、 該認証情 報入力部から入力された該認証情報を保持する認証情報保持部と、 該暗号化部に よって暗号化された暗号化済み認証情報を復号するための復号鍵を保持する復号 鍵保持部と、 該暗号化済み認証情報を復号するために必要な該認証端末の正規の 所有者であることを認証するデータを予め保持するデ一夕保持部と、 該商品の納 品時に、 該発注者により前記デ一夕を入力するデータ入力部と、 該商品の納品時 に、 該受注情報保持部に保持されている該暗号化済み認証情報を入力する入カイ ン夕フェース部と、 該デー夕保持部に保持されたデ一夕と該デ一夕入力部から入 力されたデ一夕とを照合し、 これらのデータが一致した場合に、 該復号鍵保持部 に保持された該復号鍵の使用を許可する発注者認証部と、 該発注者認証部による 照合結果を受けて、 該復号鍵を用いて、 該入力イン夕フェース部から入力された 該暗号化済み認証情報を復号する復号部と、 該復号部によって復号された認証情 報と該認証情報保持部に保持された認証情報とを照合し、 その照合結果を該発注
者, 該商品の納品担当および該受注者に通知する照合部とをそなえて構成されて いることを特徴としている。 An electronic commerce system [10] of the present invention includes: an orderer-side authentication terminal that performs ordering of goods to a contractor and authenticates the orderer when receiving the goods; A network for exchanging information between the authentication terminal and an order information holding unit for holding the order information sent from the authentication terminal via the network. At the time of ordering, an authentication information input unit for inputting authentication information for identifying the orderer; an encryption unit for encrypting the authentication information input from the authentication information input unit with a predetermined encryption key; An output interface unit for sending the encrypted authentication information encrypted by the encryption unit together with an order slip as the order information to the contractor via the network; and an authentication information input unit. An authentication information holding unit for holding the authentication information input from the server; a decryption key holding unit for holding a decryption key for decrypting the encrypted authentication information encrypted by the encryption unit; A data storage unit for storing data for authenticating that the terminal is an authorized owner of the authentication terminal necessary for decrypting the authenticated authentication information in advance; and A data input section for inputting the evening, an input interface for inputting the encrypted authentication information held in the order receiving information holding section when the product is delivered, and a data input section for holding the data in the data holding section. The decrypted data is compared with the decrypted data input from the decryption input unit, and when these data match, the use of the decryption key stored in the decryption key storage unit is permitted. Receiving the verification result by the orderer authentication unit A decryption unit that decrypts the encrypted authentication information input from the input interface unit using the decryption key; and stores the authentication information decrypted by the decryption unit and the authentication information storage unit. And verify the verification result with the And a collating unit for notifying the orderer of the delivery of the product and the orderer.
本発明の電子商取引システム 〔1 1〕 は、 受注者に対する商品の発注を行なう とともに該商品の受取時に発注者本人の認証を行なう、 発注者側の認証端末と、 該認証端末と該受注者との間で情報のやり取りを行なうネットワークと、 該認証 端末から該ネットワークを介して送られてきた受注情報を保持する、 該受注者側 の受注情報保持部とをそなえ、 該認証端末が、 該発注者のバイオメ卜リクス情報 を採取して入力するバイオメトリクス情報入力部と、 該商品の発注時に、 該発注 者によって該バイオメトリクス情報入力部から入力された第 1発注者バイオメト リクス情報を所定の暗号鍵で暗号化する暗号化部と、 該暗号化部によって暗号化 された暗号化済み第 1発注者バイオメトリクス情報を発注伝票とともに、 該受注 情報として、 該ネットワークを介して該受注者へ送付する出力インタフェース部 と、 該暗号化部によって暗号化された暗号化済み第 1バイオメトリクス情報を復 号するための復号鍵を保持する復号鍵保持部と、 該商品の納品時に、 該受注情報 保持部に保持されている該暗号化済み第 1バイオメトリクス情報を入力する入力 インタフェース部と、 該復号鍵保持部に保持された該復号鍵を用いて、 該入カイ ン夕フエース部から入力された該暗号化済み第 1発注者バイオメトリクス情報を 復号する復号部と、 該復号部によって復号された第 1発注者バイオメ卜リクス情 報と該商品の納品時に該発注者によって該バイオメトリクス情報入力部から入力 された第 2発注者バイオメ卜リクス情報とを照合し、 その照合結果を該発注者, 該商品の納品担当および該受注者に通知する照合部とをそなえて構成されている ことを特徴としている。 An electronic commerce system [11] according to the present invention includes: an orderer-side authentication terminal that places an order for a product with a contractor and authenticates the orderer when receiving the product; A network for exchanging information between the authentication terminal and an order information holding unit for holding order information sent from the authentication terminal via the network. A biometrics information input unit for collecting and inputting the biometric information of the orderer; and, when ordering the product, encrypting the first orderer biometric information input from the biometrics information input unit by the orderer in a predetermined code. An encryption unit for encrypting with the key, and the encrypted first orderer biometric information encrypted by the encryption unit together with the order slip as the order information. An output interface unit for sending to the contractor via the network; a decryption key holding unit for holding a decryption key for decrypting the encrypted first biometrics information encrypted by the encryption unit. An input interface unit for inputting the encrypted first biometric information held in the order information holding unit when the product is delivered, and the decryption key held in the decryption key holding unit. A decryption unit for decrypting the encrypted first orderer biometrics information input from the input / output interface; a first orderer biometrics information decrypted by the decryption unit and delivery of the product At times, the orderer checks the second orderer's biometrics information input from the biometrics information input section by the orderer, and compares the check result with the orderer, the person in charge of delivery of the product, and It is characterized by comprising a collating unit for notifying the contractor.
本発明の電子商取引システム 〔1 2〕 は、 受注者に対する商品の発注を行なう とともに、 発注者が委任した代理人による該商品の受取時に認証を行なう、 発注 者側の認証端末と、 該認証端末と該受注者との間で情報のやり取りを行なうネッ トワークと、 該認証端末から該ネットワークを介して送られてきた受注情報を保 持する、 該受注者側の受注情報保持部とをそなえ、 該認証端末が、 バイオメトリ クス情報を採取して入力するバイオメトリクス情報入力部と、 該商品の発注時に、 該発注者によって該バイオメトリクス情報入力部から入力された第 1発注者バイ
オメトリクス情報を所定の暗号鍵で暗号化する暗号化部と、 該暗号化部によって 暗号化された暗号化済み第 1発注者バイオメ卜リクス情報を発注伝票とともに、 該受注情報として、 該ネットワークを介して該受注者へ送付する出力インタフエ —ス部と、 該暗号化部によって暗号化された暗号化済み第 1バイオメトリクス情 報を復号するための復号鍵を保持する復号鍵保持部と、 該発注者が該商品の受取 を該代理人に委任する際に該発注者によって該バイオメトリクス情報入力部から 入力された第 2発注者バイオメトリクス情報を保持する発注者バイオメトリクス 情報保持部と、 該発注者が該商品の受取を該代理人に委任する際に該代理人によ つて該パイオメトリクス情報入力部から入力された第 1代理人バイオメトリクス 情報を保持する代理人バイオメトリクス情報保持部と、 該商品の納品時に、 該受 注情報保持部に保持されている該暗号化済み第 1発注者バイオメトリクス情報を 入力する入力インタフェース部と、 該代理人バイオメトリクス情報保持部に保持 された該第 1代理人バイオメトリクス情報と該商品の納品時に該代理人によって 該バイオメトリクス情報入力部から入力された第 2代理人バイオメトリクス情報 とを照合し、 これらの代理人バイオメトリクス情報が一致した場合に、 該復号鍵 保持部に保持された該復号鍵の使用を許可する代理人認証部と、 該代理人認証部 による照合結果を受けて、 該復号鍵を用いて、 該入力インタフェース部から入力 された該暗号化済み第 1発注者バイオメトリクス情報を復号する復号部と、 該復 号部によって復号された第 1発注者バイオメ卜リクス情報と該発注者バイオメ卜 リクス情報保持部に保持された第 2発注者バイオメトリクス情報とを照合し、 そ の照合結果を該発注者, 該商品の納品担当および該受注者に通知する発注者認証 部とをそなえて構成されていることを特徴としている。 An electronic commerce system [1 2] of the present invention includes: an orderer-side authentication terminal, which performs ordering of goods to a contractor and authenticates the goods received by an agent delegated by the orderer; And a network for exchanging information with the contractor and an order information holding unit on the contractor side for holding order information sent from the authentication terminal via the network. The authentication terminal includes: a biometrics information input unit that collects and inputs biometrics information; and a first ordering party input by the orderer input from the biometrics information input unit when ordering the product. An encrypting unit for encrypting the metric information with a predetermined encryption key; and the encrypted first orderer biometrics information encrypted by the encrypting unit together with the ordering slip as the order receiving information. An output interface unit to be sent to the contractor via the first order, a decryption key holding unit for holding a decryption key for decrypting the encrypted first biometric information encrypted by the encryption unit, An orderer biometric information holding unit that holds the second orderer biometric information input from the biometric information input unit by the orderer when the orderer delegates the receipt of the product to the agent; When the orderer delegates the receipt of the goods to the agent, the agent holds the first agent biometrics information input by the agent from the pyrometric information input unit. An agent biometrics information holding unit, an input interface unit for inputting the encrypted first orderer biometrics information held in the order information holding unit when the product is delivered, and the agent biometrics The first agent biometric information stored in the metric information storage unit is compared with the second agent biometric information input from the biometric information input unit by the agent at the time of delivery of the product. When the agent biometrics information matches, the agent authentication unit that permits the use of the decryption key held in the decryption key holding unit, and the verification result by the agent authentication unit is received. A decryption unit that decrypts the encrypted first orderer biometrics information input from the input interface unit; and a decryption unit that decrypts the encrypted first orderer biometrics information. The first orderer's biometric information is compared with the second orderer's biometric information held in the orderer's biometric information holding unit, and the matching result is compared with the orderer, the delivery person in charge of the product, and the It is characterized by comprising an orderer authentication section that notifies the contractor.
本発明の認証端末 〔1 3〕 は、 発注者がネットワークを介して受注者に商品の 発注を行なうとともに、 該商品の受取時に発注者本人の認証を行なうものであつ て、 上述した電子商取引システム 〔1 0〕 における認証端末に対応するものであ る。 The authentication terminal [13] of the present invention is such that the orderer places an order for goods to the orderer via the network and authenticates the orderer himself when receiving the goods. This corresponds to the authentication terminal in [10].
本発明の認証端末 〔1 4〕 は、 発注者がネットワークを介して受注者に商品の 発注を行なうとともに、 該商品の受取時に発注者本人の認証を行なうものであつ て、 上述した電子商取引システム 〔1 1〕 における認証端末に対応するものであ
る。 The authentication terminal [14] of the present invention is such that the orderer places an order for goods to the orderer via a network and authenticates the orderer himself when receiving the goods. It corresponds to the authentication terminal in [1 1]. You.
本発明の認証端末 〔1 5〕 は、 発注者がネットワークを介して受注者に商品の 発注を行なうとともに、 該発注者が委任した代理人による該商品の受取時に認証 を行なうものであって、 上述した商取引システム 〔1 2〕 における認証端末に対 応するものである。 The authentication terminal [15] of the present invention is for the orderer to place an order for the goods to the orderer via the network, and to authenticate the goods at the time of receiving the goods by the agent delegated by the orderer. This corresponds to the authentication terminal in the commerce system [12] described above.
本発明の代理人による本人認証方法 〔1 6〕 は、 認証者が委任した代理人によ つて該認証者の本人認証を行なう方法であつて、 (16-1)該認証者は該認証者本人 を特定するための第 1認証者バイオメトリクス情報を認証端末に入力し、 (16-2) 該認証端末は、 該第 1認証者バイオメトリクス情報を、 ネットワークを介して、 該認証者の本人認証結果を必要とする業者へ送付し、 (16-3)該認証者が該代理人 に委任する際、 該認証者は、 該認証者本人を特定するための第 2認証者バイオメ トリクス情報を該認証端末に入力するとともに、 該代理人は、 該代理人本人を特 定するための第 1代理人バイオメトリクス情報を該認証端末に入力し、 (16-4)該 認証端末は、 該第 2認証者バイオメトリクス情報と該第 1代理人バイオメ卜リク ス情報とを対応付けて保持し、 (16-5)該認証者の本人認証時に、 該業者に送付さ れた該第 1認証者バイオメトリクス情報が該認証端末に入力されるとともに、 該 代理人は、 該代理人本人を特定するための第 2代理人バイオメトリクス情報を該 認証端末に入力し、 (16-6)該認証端末は、 該第 2代理人バイオメトリクス情報と 該認証端末内に保持された該第 1代理人バイオメトリクスとを照合し、 これらの 代理人バイオメトリクス情報が一致した場合に、 入力された該第 1認証者バイォ メトリクス情報と該認証端末内に保持された該第 2認証者バイオメ卜リクス情報 とを照合し、 該認証者の本人認証を行なうことを特徴としている。 The personal authentication method by an agent of the present invention [16] is a method in which the authenticator is authenticated by an agent delegated by the authenticator, and (16-1) the authenticator is the authenticator. (16-2) The authentication terminal inputs the first certifier biometric information for identifying the principal to the authentication terminal, and transmits the first certifier biometric information to the authentication terminal via a network. (16-3) When the certifier delegates to the agent, the certifier sends the second certifier biometric information for identifying the certifier himself. While inputting to the authentication terminal, the agent inputs first agent biometrics information for identifying the agent himself / herself to the authentication terminal. (16-4) The authentication terminal 2 Correspondence between certifier biometric information and the first proxy biometric information (16-5) At the time of authentication of the authenticator, the first certifier biometric information sent to the trader is input to the authentication terminal, and the agent (16-6) The authentication terminal inputs the second agent biometrics information for identifying the person into the authentication terminal, and the authentication terminal stores the second agent biometrics information and the authentication information held in the authentication terminal. The first biometrics information is compared with the first biometrics information, and if the biometrics information matches, the first biometrics biometric information input and the second biometrics biometric stored in the authentication terminal are input. The method is characterized in that the certifier is authenticated by collating with the metrics information.
上述した本発明によれば、 商品の発注時等に発注者/受取人の認証情報やバイ オメ卜リクス情報が暗号化されて受注者 Z金融機関へ渡され、 その暗号化情報は、 発注者/受取人の認証端末においてのみ復号される。 発注者/受取人が商品や金 銭の受け取る際には、 納品担当ノ送金担当や発注者 Z受取人が上記暗号化情報を 含む所定の情報を認証端末に入力することにより、 この認証端末において、 上記 暗号化情報が復号され、 発注者 Z受取人の本人認証が行なわれる。 従って、 電子 商取引を行なう際にネットワーク上でやり取りされるパスワードやバイオメトリ
クス情報などの認証情報が悪用されるのを確実に防止することができる。 According to the present invention described above, the orderer / recipient authentication information and the biometrics information are encrypted and passed to the contractor Z financial institution at the time of ordering the product, and the encrypted information is transmitted to the orderer. / Decrypted only at the recipient's authentication terminal. When the orderer / recipient receives the goods or money, the person in charge of delivery, the person in charge of the remittance, or the person who places the order Z enters the predetermined information including the above-mentioned encrypted information into the authentication terminal. The encrypted information is decrypted, and the identity of the orderer Z recipient is authenticated. Therefore, passwords and biometrics exchanged on the network when conducting e-commerce It is possible to reliably prevent authentication information such as index information from being misused.
また、 本発明によれば、 認証端末に代理人のバイオメ卜リクス情報と発注者の バイオメトリクス情報とを予め保持させておき、 商品の納品時 (認証者である発 注者の本人認証時) に、 納品担当 (業者) が認証端末から送付された発注者のバ ィオメトリクス情報を認証端末に入力するとともに、 代理人が自身のパイオメト リクス情報を認証端末に入力し、 この認証端末において、 まず代理人の本人認証 を行なつて代理人が本人であることが認証されると、 納品担当によつて入力され た発注者のバイオメトリクス情報と認証端末に予め保持されている発注者のバイ オメトリクス情報とによって、 発注者 (認証者) の本人認証が行なわれる。 従つ て、 商品等の受取に際して発注者本人だけでなく発注者本人が指定した代理人に よる受取が、 セキュリティを確保しながら可能になり、 利便性が大幅に向上する。 このように本発明によれば、 発注者 Z受取人 (ユーザ), 受注者/金融機関 (業者) および決済機関のそれぞれについて、 以下の作用効果が得られる。 Further, according to the present invention, the biometrics information of the agent and the biometrics information of the orderer are stored in the authentication terminal in advance, and the product is delivered (at the time of authenticating the orderer who is the certifier). In addition, the delivery person (contractor) inputs the biometric information of the orderer sent from the authentication terminal to the authentication terminal, and the agent inputs his or her own biometric information to the authentication terminal. Once the identity of the person is verified by authenticating the person, the biometric information of the orderer entered by the delivery person and the biometrics of the orderer stored in the authentication terminal in advance With the information, the identity of the orderer (certifier) is verified. Therefore, it is possible to receive the goods, etc. not only by the ordering party but also by the agent designated by the ordering party while securing security, and the convenience is greatly improved. As described above, according to the present invention, the following operation and effect can be obtained for each of the ordering party Z recipient (user), contractor / financial institution (trader), and settlement institution.
発注者/受取人 (ユーザ) については、 P K I利用 (鍵の管理, 暗号化実行) を簡略化できるほか、 バイオメトリクス情報の流用や不正発注によるなりすまし 行為が確実に防止され、 インターネット等を用いた電子商取引を安心して行なう ことができる。 また、 代理人による発注者の本人認証が可能になり、 利便性が大 幅に向上する。 For the orderer / recipient (user), the use of PKI (key management, encryption execution) can be simplified, the use of biometrics information and impersonation due to improper ordering can be reliably prevented, and the Internet, etc., can be used. Electronic commerce can be performed with confidence. In addition, the identity of the orderer can be authenticated by an agent, greatly improving the convenience.
受注者/金融機関 (業者) については、 不正発注を検出しその不正発注が行な われるのを確実に防止でき、 不正取引による商品の不正詐取を確実に防止するこ とができる。 With regard to the contractor / financial institution (trader), it is possible to detect fraudulent orders and reliably prevent the fraudulent orders from being placed, and to reliably prevent fraudulent fraud of products due to fraudulent transactions.
決済機関については、 不正決済を検出でき、 発注者 (ユーザ) ュ一ザの意図し ない決済が行なわれるのを確実に防止することができる。 図面の簡単な説明 As for the clearing house, fraudulent payments can be detected, and payments unintended by the ordering user (user) can be reliably prevented from being performed. BRIEF DESCRIPTION OF THE FIGURES
図 1 Aはおよび図 1 Bは本発明の電子商取引方法の第 1例を説明するための図 である。 FIGS. 1A and 1B are diagrams for explaining a first example of the electronic commerce method of the present invention.
図 2は本発明の電子商取引方法の第 1例の手順を説明するためのフローチヤ一 トである。
図 3は本発明の電子商取引方法の第 2例を説明するための図である。 FIG. 2 is a flowchart for explaining the procedure of the first example of the electronic commerce method of the present invention. FIG. 3 is a diagram for explaining a second example of the electronic commerce method of the present invention.
図 4 Aおよび図 4 Bは本発明の電子商取引方法の第 3例を説明するための図で ある。 FIG. 4A and FIG. 4B are diagrams for explaining a third example of the electronic commerce method of the present invention.
図 5は本発明の電子商取引方法の第 3例の手順を説明するためのフローチヤ一 卜である。 FIG. 5 is a flowchart for explaining the procedure of the third example of the electronic commerce method of the present invention.
図 6 Aおよび図 6 Bは本発明の電子商取引方法の第 4例を説明するための図で ある。 FIG. 6A and FIG. 6B are diagrams for explaining a fourth example of the electronic commerce method of the present invention.
図 7は本発明の電子商取引方法の第 4例の手順を説明するためのフローチヤ一 卜である。 FIG. 7 is a flowchart for explaining the procedure of the fourth example of the electronic commerce method of the present invention.
図 8は本発明の電子商取引方法の第 5例を説明するための図である。 FIG. 8 is a diagram for explaining a fifth example of the electronic commerce method of the present invention.
図 9は本発明の電子商取引方法の第 6例を説明するための図である。 FIG. 9 is a diagram for explaining a sixth example of the electronic commerce method of the present invention.
図 1 0は本発明の電子商取引方法の第 7例を説明するための図である。 FIG. 10 is a diagram for explaining a seventh example of the electronic commerce method of the present invention.
図 1 1 A, 図 1 1 Bおよび図 1 1 Cは本発明の電子商取引方法 (代理人による 本人認証方法) の第 8例を説明するための図である。 FIG. 11A, FIG. 11B and FIG. 11C are diagrams for explaining an eighth example of the electronic commerce method (identity authentication method by an agent) of the present invention.
図 1 2 A, 図 1 2 Bおよび図 1 2 Cは本発明の電子商取引方法 (代理人による 本人認証方法) の第 9例を説明するための図である。 FIG. 12A, FIG. 12B and FIG. 12C are diagrams for explaining a ninth example of the electronic commerce method (authentication method by an agent) of the present invention.
図 1 3は本発明の電子商取引システムおよび認証端末の第 1構成例を示すプロ ック図である。 FIG. 13 is a block diagram showing a first configuration example of the electronic commerce system and the authentication terminal of the present invention.
図 1 4は本発明の電子商取引システムおよび認証端末の第 2構成例を示すプロ ック図である。 FIG. 14 is a block diagram showing a second configuration example of the electronic commerce system and the authentication terminal of the present invention.
図 1 5は本発明の電子商取引システムおよび認証端末の第 3構成例を示すプロ ック図である。 FIG. 15 is a block diagram showing a third configuration example of the electronic commerce system and the authentication terminal of the present invention.
図 1 6は本発明の電子商取引システムおよび認証端末の第 4構成例を示すプロ ック図である。 発明を実施するための最良の形態 FIG. 16 is a block diagram showing a fourth configuration example of the electronic commerce system and the authentication terminal of the present invention. BEST MODE FOR CARRYING OUT THE INVENTION
以下、 図面を参照して本発明の実施の形態を説明する。 Hereinafter, embodiments of the present invention will be described with reference to the drawings.
〔1〕 本発明の電子商取引方法 (代理人による本人認証方法) [1] Electronic commerce method of the present invention (identity authentication method by agent)
本発明の電子商取引方法の基本的手順や、 本発明の代理人による本人認証方法
を含む電子商取引方法の基本的手順について、 以下に説明する。 The basic procedure of the electronic commerce method of the present invention, and the personal authentication method by the agent of the present invention The basic procedure of the e-commerce method including is described below.
〔1一 1〕 本発明の電子商取引方法の第 1例 [1-1] First Example of Electronic Commerce Method of the Present Invention
図 1 Aはおよび図 1 Bは本発明の電子商取引方法の第 1例を説明するための図、 図 2は本発明の電子商取引方法の第 1例の手順を説明するためのフローチャート (ステップ S 1 1〜S 2 0, S 1 6 a , S 1 9 a ) である。 この電子商取引方法 の第 1例は、 発注者がネットワークを介して受注者に商品を発注し、 その商品を 発注者自身が受け取る方法である。 FIGS. 1A and 1B are diagrams for explaining a first example of the electronic commerce method of the present invention, and FIG. 2 is a flowchart (step S 11 to S20, S16a, S19a). The first example of this e-commerce method is a method in which an orderer places an order for goods to a contractor via a network, and the orderer himself receives the goods.
商品の発注時、 図 1 Aに示すように、 発注者は、 発注者の所有する認証端末 1 に、 発注者本人を特定するための認証情報を入力する (矢印 A 1 1およびステツ プ S 1 1参照)。 認証端末 1において、 入力された認証情報は、 この認証端末 1 内に保持されている所定の暗号化キー (暗号鍵) によって暗号化され (ブロック When placing an order for a product, as shown in Fig. 1A, the orderer enters authentication information for identifying the orderer into the authentication terminal 1 owned by the orderer (arrow A11 and step S1). 1). In the authentication terminal 1, the input authentication information is encrypted by a predetermined encryption key (encryption key) held in the authentication terminal 1 (block
B 1 1およびステップ S 1 2参照)、 その暗号済み認証情報は、 商品の発注伝票 (受注データ) とともにネットワークを介して受注者へ送付される (矢印 A 1 2 およびステツプ S 1 3参照)。 このとさ、 ステップ S 1 1で入力された認証情報 と、 ステップ S 1 2で暗号化された暗号化済み認証情報を復号するための復号キ 一 (復号鍵) とが認証端末 1内に保持される。 なお、 認証端末 1内には、 商品の 納品時に後述するごとくユーザ認証を行なうための本人認証鍵 (例えばパスヮ一 ド) も予め保持されている。 B11 and step S12), the encrypted authentication information is sent to the contractor via the network together with the order slip (order data) of the product (see arrow A12 and step S13). At this time, the authentication information input in step S11 and a decryption key (decryption key) for decrypting the encrypted authentication information encrypted in step S12 are stored in the authentication terminal 1. Is done. In the authentication terminal 1, an authentication key (for example, a pass password) for performing user authentication as described later when the product is delivered is also stored in advance.
次に、 受注者が商品を納品する際、 図 1 Bに示すように、 受注者側の納品担当 は、 商品の発注時に認証端末 1から受け取った暗号化済み認証情報を、 発注者の 所有する認証端末 1に送付 ·入力する (矢印 A 1 3およびステップ S 1 4参照)。 認証端末 1は、 例えばコンパクトフラッシュ (登録商標) カード等の媒体用スロ ット (例えば図 1 3の入力インタフェース部 2 0 ) を装備しており、 納品担当は、 コンパクトフラッシュ等の媒体内に暗号化済み認証情報を格納して持ってきて、 その媒体をスロットに挿入して暗号化済み認証情報を認証端末 1に入力する。 暗 号化済み認証情報を認証端末 1へ搬送するための媒体は、 コンパクトフラッシュ に限定されるものではなく、 P Cカード, I Cカード, スマートメディア (登録 商標), メモリスティック (登録商標) などの各種媒体であってもよい。 Next, when the contractor delivers the product, as shown in Fig. 1B, the delivery person on the contractor side owns the encrypted authentication information received from the authentication terminal 1 when ordering the product. Send to authentication terminal 1 · Enter (see arrow A 13 and step S 14). The authentication terminal 1 is equipped with a medium slot (for example, an input interface unit 20 in FIG. 13) such as a CompactFlash (registered trademark) card. The user stores the encrypted authentication information, inserts the medium into the slot, and inputs the encrypted authentication information to the authentication terminal 1. The medium for transporting the encrypted authentication information to the authentication terminal 1 is not limited to the compact flash, but may be a PC card, an IC card, a smart media (registered trademark), or a memory stick (registered trademark). It may be a medium.
また、 発注者は、 暗号化済み認証情報を復号するために必要なデータ (ここで
はユーザ認証を行なうための本人認証データ) を認証端末 1に入力する (矢印 A 1 4 )。 そして、 認証端末 1において、 矢印 A 1 4で示すごとく入力された本人 認証データが、 認証端末 1内に予め保持されている本人認証鍵と一致するか否か を検証し、 商品を受け取ろうとしている発注者が、 認証端末 1の正規ユーザであ ることを認証する (ブロック B 1 2およびステップ S 1 5参照)。 In addition, the Ordering Party shall provide the data required to decrypt the encrypted authentication information (here, Inputs the personal authentication data for user authentication) to the authentication terminal 1 (arrow A 14). The authentication terminal 1 verifies whether the authentication data entered as indicated by the arrow A 14 matches the authentication key stored in the authentication terminal 1 in advance, and attempts to receive the product. The authenticating party authenticates that it is an authorized user of the authentication terminal 1 (see block B12 and step S15).
本人認証データと本人認証鍵とが不一致で発注者が認証端末 1の正規ユーザで はないと認定された場合 (ステップ S 1 6の N Oルート)、 認証端末 1は、 その 旨を納品担当, 発注者や受注者に通知し、 納品担当は、 納品を行なうことなく手 続を終了する (ステップ S 1 6 a参照)。 一方、 本人認証データと本人認証鍵と がー致し発注者が認証端末 1の正規ユーザであると認証された場合 (ステツプ S 1 6の Y E Sルート)、 認証端末 1では、 ステップ S 1 4で納品担当によって入 力された暗号化済み認証情報が、 認証端末 1内に保持された復号キーで復号され (ブロック B 1 3およびステップ S 1 7参照)、 さらに、 復号された認証情報と 発注時に認証端末 1内に保持された認証情報とが照合される (ブロック B 1 4お よびステップ S 1 8参照)。 If the authentication data and the authentication key do not match and it is determined that the orderer is not a legitimate user of the authentication terminal 1 (NO route in step S16), the authentication terminal 1 informs the user of that fact and places an order. Notifying the supplier and contractor, the delivery person finishes the procedure without delivery (see step S16a). On the other hand, if the authentication data and the authentication key match and the orderer is authenticated as an authorized user of the authentication terminal 1 (YES route in step S16), the authentication terminal 1 delivers the product in step S14. The encrypted authentication information input by the person in charge is decrypted with the decryption key held in the authentication terminal 1 (see block B13 and step S17), and the decrypted authentication information and the authentication at the time of ordering are performed. The authentication information stored in the terminal 1 is checked (see block B14 and step S18).
これらの認証情報が不一致であつた場合 (ステップ S 1 9の N Oルート)、 認 証端末 1は、 今回の発注が認証端末 1の現在のユーザによるものではないものと 認識し、 その照合結果を納品担当, 発注者や受注者に通知するとともに、 納品担 当は、 納品を行なうことなく手続を終了する (矢印 A 1 5およびステップ S 1 9 a参照)。 一方、 これらの認証情報が一致した場合 (ステップ S 1 9の Y E Sル 一ト)、 認証端末 1は、 その照合結果を納品担当, 発注者や受注者に通知し (矢 印 A 1 5参照)、 納品担当は商品を発注者に受け渡すとともに受注者は今回の取 引の決済を実行する (ステップ S 2 0参照)。 If the authentication information does not match (NO route in step S19), the authentication terminal 1 recognizes that the current order is not made by the current user of the authentication terminal 1, and determines the collation result. The delivery person, the ordering party and the contractor are notified, and the delivery person ends the procedure without delivery (see arrow A15 and step S19a). On the other hand, if the authentication information matches (YES route in step S19), the authentication terminal 1 notifies the collation result to the delivery person, the orderer or the orderer (see arrow A15). The delivery person delivers the goods to the orderer, and the contractor executes settlement of the current transaction (see step S20).
なお、 ステップ S 1 6 , S 1 9での認証 ·照合結果の納品担当や発注者への通 知は、 例えば、 認証端末 1の L E D (Light Emitting Diode) を点灯させるこ とによって行なわれる。 Note that the delivery and notification of the result of authentication and verification in steps S16 and S19 to the orderer is performed, for example, by turning on an LED (Light Emitting Diode) of the authentication terminal 1.
本発明の電子商取引方法の第 1例では、 ユーザ (発注者) の所有する認証端末 1内で情報の入力や暗号化を完了している。 暗号化データ (暗号化済み認証情 報) を復号するための復号キ一を認証端末 1の外部に出力することは無く、 発注
者本人も復号キーが何であるかを知っておく必要がないため、 暗号化済み認証情 報が第三者によって復号される危険を低減させることができる。 In the first example of the electronic commerce method of the present invention, the input of information and the encryption have been completed in the authentication terminal 1 owned by the user (orderer). The decryption key for decrypting the encrypted data (encrypted authentication information) is not output to the outside of the authentication terminal 1, and the order is placed. Since the individual does not need to know what the decryption key is, the risk that the encrypted authentication information is decrypted by a third party can be reduced.
このように、 本発明の電子商取引方法の第 1例によれば、 認証情報 (例えばパ スヮ一ド, バイオメトリクス情報) を用いることで、 商品の受取人が発注者本人 であることの認証を実現するとともに、 発注者が所持する認証端末 1内で全ての 処理を行なうことで、 情報の流出を防ぐことが可能になる。 As described above, according to the first example of the electronic commerce method of the present invention, by using the authentication information (for example, the passcode and the biometrics information), it is verified that the recipient of the product is the orderer. As well as performing all processing in the authentication terminal 1 owned by the orderer, it is possible to prevent information leakage.
なお、 認証端末を受注者側に用意し、 必要な情報 (認証情報, 復号キー, 本人 認証鍵) を発注者の所持する媒体 (例えば I Cカード) に保存しておく手法も考 えられるが、 このような手法では、 受注者側の所持する認証端末に情報を受け渡 す必要がある。 受注者側が悪意ある業者であった場合、 これらの情報を悪用され るおそれがある。 従って、 本発明のように、 これら情報は発注者本人の所持する 認証端末 1内で保持し、 外部には一切出力しないことが望ましい。 It is also conceivable to prepare an authentication terminal at the contractor and store the necessary information (authentication information, decryption key, authentication key) on the medium (for example, an IC card) owned by the orderer. In such a method, it is necessary to pass information to the authentication terminal possessed by the contractor. If the contractor is a malicious trader, this information may be misused. Therefore, as in the present invention, it is desirable that such information be held in the authentication terminal 1 owned by the orderer himself and not output to the outside at all.
また、 商品の発注時には、 上記第 1例では、 発注者によって入力された認証情 報を無条件で暗号化したが、 商品の納品時の処理と同様、 本人認証鍵を用いてュ —ザ認証を行ない、 発注者が認証端末 1の正規ュ一ザであることを認証した場合 に暗号化を実行するようにしてもよい。 このようにすれば、 認証端末 1を所有者 以外の第三者が取得した場合、 認証情報の暗号化を実行できず、 この第三者は認 証端末 1を使用することができない。 Also, when ordering a product, in the first example above, the authentication information input by the orderer was unconditionally encrypted. However, as in the process at the time of delivery of the product, user authentication was performed using an authentication key. May be performed, and encryption may be executed when the orderer authenticates that the user is an authorized user of the authentication terminal 1. In this way, if a third party other than the owner acquires authentication terminal 1, authentication information cannot be encrypted, and this third party cannot use authentication terminal 1.
〔1 — 2〕 本発明の電子商取引方法の第 2例 [1-2] Second example of electronic commerce method of the present invention
図 3は本発明の電子商取引方法の第 2例を説明するための図である。 FIG. 3 is a diagram for explaining a second example of the electronic commerce method of the present invention.
本発明の電子商取引方法の第 2例では、 認証端末 1には、 上記第 1例の本人認 証鍵に代えて発注者自身のバイオメトリクス情報が予め保持されている。 In the second example of the electronic commerce method of the present invention, the authentication terminal 1 previously holds the orderer's own biometric information instead of the personal authentication key of the first example.
この第 2例でも、 発注時の手順は、 上記第 1例の手順 (図 1 Aや図 2のステツ プ3 1 1〜3 1 4参照) とほぼ同様であるが、 商品の納品時には、 図 3に示すよ うに、 発注者により、 第 1例の認証データの代わりに、 自身のバイオメトリクス 情報が入力される (矢印 A 1 4 a参照)。 そして、 認証端末 1において、 上述の ごとく入力されたバイオメ卜リクス情報が、 認証端末 1内に予め保持されている バイオメトリクス情報と一致するか否かを検証し、 商品を受け取ろうとしている 発注者が、 認証端末 1の正規ユーザであることを認証する (ブロック B 1 2 a参
照)。 In this second example, the ordering procedure is almost the same as that of the first example (see steps 311 to 314 in Fig. 1A and Fig. 2). As shown in Fig. 3, the orderer enters his or her own biometric information instead of the authentication data in the first example (see arrow A14a). Then, the authentication terminal 1 verifies whether the biometric information input as described above matches the biometric information stored in the authentication terminal 1 in advance, and receives the product. Authenticates that he is an authorized user of authentication terminal 1 (see block B 1 2a). See).
これ以降の手順は、 上記第 1例と同様であり、 2つのバイオメ卜リクス情報が 一致し発注者が認証端末 1の正規ユーザであると認証されると、 認証端末 1では、 納品担当によって入力された暗号化済み認証情報 (矢印 A 1 3参照) が、 認証端 末 1内に保持された復号キーで復号され (ブロック B 1 3参照)、 さらに、 復号 された認証情報と発注時に認証端末 1内に保持された認証情報とが照合される (ブロック B 1 4参照)。 そして、 これらの認証情報が一致した場合に、 認証端 末 1は、 その照合結果を納品担当, 発注者や受注者に通知し (矢印 A 1 5参照)、 納品担当は商品を発注者に受け渡すとともに受注者は今回の取引の決済を実行す る。 Subsequent steps are the same as in the first example above.If the two biometrics information match and the orderer is authenticated as an authorized user of the authentication terminal 1, input is made by the delivery terminal at the authentication terminal 1. The encrypted authentication information (see arrow A13) is decrypted with the decryption key held in authentication terminal 1 (see block B13), and the decrypted authentication information and the authentication terminal at the time of order are placed. The authentication information stored in 1 is checked (see block B14). If the authentication information matches, the authentication terminal 1 notifies the collation result to the delivery person, the orderer or the orderer (see arrow A15), and the delivery person receives the product from the orderer. At the same time, the contractor will settle the transaction.
このように、 本発明の電子商取引方法の第 2例でも、 上記第 1例と同様の作用 効果が得られる。 しかし、 上記第 1例では、 納品時に本人認証鍵によるユーザ認 証を行なっているが、 この本人認証鍵がパスワードである場合、 万一、 そのパス ワードを第三者に知られると、 その第三者によつて認証端末 1を使用されてしま う。 これに対し、 上記第 2例では、 認証端末 1でのユーザ認証を、 パスワードで はなくバイオメトリクス情報 (例えば指紋データ) によって行なうことにより、 認証端末 1の所有者本人しかこの認証端末 1を使用できないようにすることがで き より高いセキュリティ性能を確保した電子商取引を実現することができる。 As described above, the second embodiment of the electronic commerce method of the present invention can provide the same operation and effect as those of the first embodiment. However, in the first example described above, user authentication is performed using an authentication key at the time of delivery, but if the authentication key is a password, if the password is known to a third party, the user is authenticated. The authentication terminal 1 is used by three parties. On the other hand, in the second example, the user authentication at the authentication terminal 1 is performed not by a password but by biometric information (for example, fingerprint data), so that only the owner of the authentication terminal 1 uses the authentication terminal 1. It is possible to realize e-commerce with higher security performance.
[ 1 - 3 ] 本発明の電子商取引方法の第 3例 [1-3] Third Example of Electronic Commerce Method of the Present Invention
図 4 Aおよび図 4 Bは本発明の電子商取引方法の第 3例を説明するための図、 図 5は本発明の電子商取引方法の第 3例の手順を説明するためのフローチャート (ステップ S 2 1〜S 2 9, S 2 8 a ) である。 この電子商取引方法の第 3例も、 発注者がネットワークを介して受注者に商品を発注し、 その商品を発注者自身が 受け取る方法である。 4A and 4B are diagrams for explaining a third example of the electronic commerce method of the present invention, and FIG. 5 is a flowchart for explaining the procedure of the third example of the electronic commerce method of the present invention (step S2). 1 to S29, S28a). The third example of this e-commerce method is also a method in which the orderer places an order for goods to the contractor via the network, and the orderer himself receives the goods.
商品の発注時、 図 4 Aに示すように、 発注者は、 発注者の所有する認証端末 4 に、 発注者本人を特定するための第 1発注者バイオメトリクス情報を入力する (矢印 A 2 1およびステップ S 2 1参照)。 認証端末 4において、 入力された第 1発注者バイオメトリクス情報は、 この認証端末 4内に保持されている所定の喑 号化キー (暗号鍵) によって暗号化され (ブロック B 2 1およびステップ S 2 2
参照)、 その暗号済み第 1発注者バイオメトリクス情報は、 商品の発注伝票 (受 注データ) とともにネットワークを介して受注者へ送付される (矢印 A 2 2およ びステップ S 2 3参照)。 このとき、 ステップ S 2 2で喑号化された暗号化済み 第 1発注者バイオメトリクス情報を復号するための復号キー (復号鍵) が認証端 末 4内に保持される。 When ordering a product, as shown in Fig. 4A, the orderer enters the first orderer biometric information for identifying the orderer into the authentication terminal 4 owned by the orderer (arrow A 2 1). And step S21). In the authentication terminal 4, the input first orderer biometric information is encrypted by a predetermined encryption key (encryption key) held in the authentication terminal 4 (block B21 and step S2). Two ), And the encrypted first orderer biometric information is sent to the contractor via the network together with the order slip (ordering data) for the product (see arrow A22 and step S23). At this time, a decryption key (decryption key) for decrypting the encrypted first orderer biometrics information encrypted in step S22 is held in the authentication terminal 4.
次に、 受注者が商品を納品する際、 図 4 Bに示すように、 受注者側の納品担当 は、 商品の発注時に認証端末 4から受け取った暗号化済み第 1発注者バイオメト リクス情報を、 発注者の所有する認証端末 4に送付 ·入力する (矢印 A 2 3およ びステツプ S 2 4参照)。 認証端末 4は、 上記第 1例と同様、 例えばコンパクト フラッシュ (登録商標) カード等の媒体用スロット (例えば図 1 5の入力インタ フェース部 4 6 ) を装備しており、 納品担当は、 コンパクトフラッシュ等の媒体 内に暗号ィヒ済み第 1発注者バイオメトリクス情報を格納して持ってきて、 その媒 体をスロットに挿入して暗号化済み第 1発注者バイオメトリクス情報を認証端末 4に入力する。 そして、 認証端末 4に入力された暗号化済み第 1発注者バイオメ トリクス情報は、 認証端末 4内に保持された復号キーで復号される (ブロック B 2 2およびステップ S 2 5参照)。 Next, when the contractor delivers the product, as shown in Fig. 4B, the delivery person on the contractor side sends the encrypted first orderer biometric information received from the authentication terminal 4 when ordering the product, Send to and input the authentication terminal 4 owned by the orderer (see arrow A23 and step S24). The authentication terminal 4 is provided with a medium slot (for example, an input interface section 46 in FIG. 15) for a compact flash (registered trademark) card or the like, as in the first example described above. Store and bring the encrypted first orderer biometrics information into a medium such as, insert the medium into the slot and input the encrypted first orderer biometrics information to the authentication terminal 4 . Then, the encrypted first orderer biometrics information input to the authentication terminal 4 is decrypted by the decryption key held in the authentication terminal 4 (see block B22 and step S25).
また、 発注者は、 納品時に再度、 発注者本人を特定するための第 2発注者バイ オメトリクス情報を認証端末 4に入力する (矢印 A 2 4およびステップ S 2 6参 照)。 なお、 ステップ S 2 5での復号タイミングとステップ S 2 6での入力タイ ミングは逆であっても構わない。 In addition, the orderer enters the second orderer biometric information for identifying the orderer himself into the authentication terminal 4 again at the time of delivery (see arrow A24 and step S26). Note that the decoding timing in step S25 and the input timing in step S26 may be reversed.
この後、 認証端末 4では、 ステップ S 2 5で復号された第 1発注者バイオメト リクス情報とステップ S 2 6で納品時に認証端末 4に入力された第 2発注者バイ オメトリクス情報とが照合される (ブロック B 2 3およびステップ S 2 7参照)。 これらの発注者バイオメトリクス情報が不一致であった場合 (ステップ S 2 8 の N Oルート)、 認証端末 4は、 今回の発注が認証端末 4の現在のユーザによる ものではないものと認識し、 その照合結果を納品担当, 発注者や受注者に通知し、 納品担当は、 納品を行なうことなく手続を終了する (矢印 A 2 5およびステップ S 2 8 a参照)。 一方、 これらの発注者バイオメトリクス情報が一致した場合 (ステップ S 2 8の Y E Sルート)、 認証端末 4は、 その照合結果を納品担当,
発注者や受注者に通知し (矢印 A 2 5参照)、 納品担当は商品を発注者に受け渡 すとともに受注者は今回の取引の決済を実行する (ステップ S 2 9参照)。 Thereafter, the authentication terminal 4 compares the first orderer biometric information decrypted in step S25 with the second orderer biometric information input to the authentication terminal 4 at the time of delivery in step S26. (See block B23 and step S27). If the orderer biometrics information does not match (NO route in step S28), the authentication terminal 4 recognizes that the current order is not from the current user of the authentication terminal 4, and performs the verification. The result is notified to the person in charge of delivery, the orderer or the order receiver, and the person in charge of delivery finishes the procedure without performing delivery (see arrow A25 and step S28a). On the other hand, if the orderer biometrics information matches (YES route in step S28), the authentication terminal 4 sends the collation result to the person in charge of delivery, Notify the orderer and contractor (see arrow A25), the delivery person delivers the goods to the orderer, and the contractor executes the settlement of this transaction (see step S29).
なお、 ステップ S 2 8での認証 ·照合結果の納品担当や発注者への通知は、 上 記第 1例と同様、 例えば、 認証端末 4の L E D (Light Emitting Diode) を点 灯させることによって行なわれる。 In step S28, notification of the result of authentication and verification to the delivery person and the orderer is performed by, for example, turning on the LED (Light Emitting Diode) of the authentication terminal 4, as in the first example. It is.
このように、 本発明の電子商取引方法の第 3例によれば、 発注者照合がバイオ メトリクス情報を用いて行なわれるので、 上記第 1例と同様の作用効果が得られ るだけでなく、 パスヮード等の認証情報により発注者照合を行なう場合よりも高 いセキュリティ性能を確保することができる。 As described above, according to the third example of the e-commerce method of the present invention, since the orderer verification is performed using the biometric information, not only the same operation and effect as in the first example but also the password can be obtained. It is possible to secure higher security performance than the case where orderer verification is performed using such authentication information.
〔1一 4〕 本発明の電子商取引方法の第 4例 [1-1-4] Fourth example of electronic commerce method of the present invention
図 6 Aおよび図 6 Bは本発明の電子商取引方法の第 4例を説明するための図、 図 7は本発明の電子商取引方法の第 4例の手順を説明するためのフローチャート (ステップ S 3 1〜S 4 2 , S 4 0 a ) である。 この電子商取引方法の第 4例も、 発注者がネットワークを介して受注者に商品を発注し、 その商品を発注者自身が 受け取る方法であるが、 この第 4例は、 図 4 Aおよび図 4 Bに示す電子商取引方 法において、 後述するタイミングで暗号化キ一の自動生成および復号キーの消去 を行なうようにしたものである。 6A and 6B are diagrams for explaining the fourth example of the electronic commerce method of the present invention, and FIG. 7 is a flowchart for explaining the procedure of the fourth example of the electronic commerce method of the present invention (step S3). 1 to S42, S40a). The fourth example of this e-commerce method is also a method in which the orderer places an order for goods to the contractor via the network and the orderer himself receives the goods. This fourth example is shown in Figs. 4A and 4 In the e-commerce method shown in B, the encryption key is automatically generated and the decryption key is deleted at the timing described later.
商品の発注時、 図 6 Aに示すように 発注者は、 発注者の所有する認証端末 4 に、 発注者本人を特定するための第 1発注者バイオメ卜リクス情報を入力する (矢印 A 2 1およびステップ S 3 1参照)。 認証端末 4においては、 第 1発注者 バイオメトリクス情報が入力されると、 その都度、 所定の暗号化キー (暗号鍵) と、 この暗号化キーによって暗号化された暗号化情報を復号するための復号キー (復号鍵) とが自動生成される (ブロック B 2 0およびステップ S 3 2参照)。 そして、 ステップ S 3 1で入力された第 1発注者バイオメトリクス情報は、 ス テツプ S 3 2で生成された暗号化キーによって暗号化され (ブロック B 2 1およ びステップ S 3 3参照)、 暗号化を完了すると暗号化キーは削除される (プロッ ク B 2 0およびステップ S 3 4参照)。 また、 暗号済み第 1発注者バイオメトリ クス情報は、 商品の発注伝票 (受注デ一夕) とともにネットワークを介して受注 者へ送付される (矢印 A 2 2およびステップ S 3 5参照)。 なお、 ステップ S 3
2で生成された復号キ一は認証端末 4内に保持される。 When placing an order for a product, as shown in Fig. 6A, the orderer enters the first orderer biometric information for identifying the orderer into the authentication terminal 4 owned by the orderer (arrow A21). And step S31). In the authentication terminal 4, each time the first orderer's biometrics information is input, a predetermined encryption key (encryption key) and an encryption key for decrypting the encryption information encrypted by the encryption key are used. A decryption key (decryption key) is automatically generated (see block B20 and step S32). Then, the first orderer biometric information entered in step S31 is encrypted by the encryption key generated in step S32 (see block B21 and step S33), Upon completion of the encryption, the encryption key is deleted (see block B20 and step S34). Also, the encrypted first orderer biometric information is sent to the ordering party via the network together with the ordering slip for the product (orders received overnight) (see arrow A22 and step S35). Step S 3 The decryption key generated in 2 is held in the authentication terminal 4.
次に、 受注者が商品を納品する際、 図 6 Bに示すように、 上記第 3例と同様、 受注者側の納品担当は、 商品の発注時に認証端末 4から受け取つた暗号化済み第 1発注者バイオメトリクス情報を、 発注者の所有する認証端末 4に送付 ·入力す る (矢印 A 2 3およびステップ S 3 6参照)。 また、 納品担当は、 例えばコンパ クトフラッシュ等の媒体内に暗号化済み第 1発注者バイオメトリクス情報を格納 して持ってきて、 その媒体から暗号化済み第 1発注者バイオメ卜リクス情報を認 証端末 4に入力する。 そして、 認証端末 4に入力された暗号化済み第 1発注者バ ィオメトリクス情報は、 認証端末 4内に保持された復号キーで復号される (プロ ック B 2 2およびステップ S 3 7参照)。 Next, as shown in Fig. 6B, when the contractor delivers the product, as in the third example, the contractor on the contractor side receives the encrypted first item received from the authentication terminal 4 when ordering the product, as shown in Fig. 6B. Send and input the orderer biometric information to the authentication terminal 4 owned by the orderer (see arrow A23 and step S36). The delivery person also stores the encrypted first orderer biometrics information in a medium such as compact flash, and authenticates the encrypted first orderer biometrics information from the medium. Input to terminal 4. Then, the encrypted first orderer biometrics information input to the authentication terminal 4 is decrypted by the decryption key held in the authentication terminal 4 (see block B22 and step S37).
また、 発注者は、 納品時に再度、 発注者本人を特定するための第 2発注者バイ オメトリクス情報を認証端末 4に入力する (矢印 A 2 4およびステップ S 3 8参 照)。 なお、 上記第 3例と同様、 ステップ S 3 7での復号タイミングとステップ S 3 8での入力タイミングは逆であっても構わない。 Further, the orderer inputs the second orderer biometric information for identifying the orderer himself into the authentication terminal 4 again at the time of delivery (see arrow A24 and step S38). As in the third example, the decoding timing in step S37 and the input timing in step S38 may be reversed.
この後、 認証端末 4では、 ステップ S 3 7で復号された第 1発注者バイオメト リクス情報とステップ S 3 8で納品時に認証端末 4に入力された第 2発注者バイ オメ卜リクス情報とが照合される (ブロック B 2 3およびステップ S 3 9参照)。 これらの発注者バイオメトリクス情報が不一致であった場合 (ステップ S 4 0 の N Oルート)、 認証端末 4は、 今回の発注が認証端末 4の現在のユーザによる ものではないものと認識し、 その照合結果を納品担当, 発注者や受注者に通知し、 納品担当は、 納品を行なうことなく手続を終了する (矢印 A 2 5およびステップ S 4 0 a参照)。 一方、 これらの発注者バイオメトリクス情報が一致した場合 (ステップ S 4 0の Y E Sルート)、 認証端末 4は、 復号キ一を消去してから (ブロック B 2 4および図 7のステップ S 4 1参照)、 その照合結果を納品担当, 発注者や受注者に通知し (矢印 A 2 5参照)、 納品担当は商品を発注者に受け渡 すとともに受注者は今回の取引の決済を実行する (ステップ S 4 2参照)。 After that, the authentication terminal 4 verifies the first orderer biometric information decrypted in step S37 with the second orderer biometric information input to the authentication terminal 4 at the time of delivery in step S38. (See block B23 and step S39). If the orderer biometrics information does not match (NO route in step S40), the authentication terminal 4 recognizes that the current order is not from the current user of the authentication terminal 4 and checks the order. The result is notified to the person in charge of delivery, the orderer or the order receiver, and the person in charge of delivery finishes the procedure without performing delivery (see arrow A25 and step S40a). On the other hand, if the orderer biometrics information matches (YES route in step S40), the authentication terminal 4 deletes the decryption key (see block B24 and step S41 in FIG. 7). ), And notifies the collation result to the delivery person, the ordering party and the order receiving party (see arrow A25), and the delivery person delivers the product to the ordering party, and the ordering party executes the settlement of this transaction (step S42).
なお、 ステップ S 4 0での認証 ·照合結果の納品担当や発注者への通知は、 上 記第 3例と同様、 例えば、 認証端末 4の L E D (Light Emitting Diode) を点 灯させることによって行なわれる。
上述のごとく、 本発明の電子商取引方法の第 4例では、 商品の発注時に第 1発 注者バイオメトリクス情報を暗号化して受注者に送信しているが、 その際に必要 となる暗号化キーゃ復号キーを、 商品の発注毎に認証端末 4内で自動生成し、 喑 号化完了時で暗号化キーを消去するとともに、 納品時に発注者照合を完了した時 点で復号キーを消去している。 これにより、 暗号化済み第 1発注者バイオメトリ クス情報は、 1回の発注についてのみ有効であり、 所定の電子商取引を完了した 暗号化済み第 1発注者バイオメトリクス情報は、 それを生成した認証端末 4であ つても復号することができなくなる。 In step S40, notification of the result of authentication and verification to the delivery person and the orderer is performed by, for example, turning on the LED (Light Emitting Diode) of the authentication terminal 4, as in the third example. It is. As described above, in the fourth example of the e-commerce method of the present invention, the first orderer biometrics information is encrypted and transmitted to the ordering party when ordering the product, but the encryption key required at that time is used.ゃ A decryption key is automatically generated in the authentication terminal 4 every time a product is ordered, and the encryption key is deleted when the encryption is completed, and the decryption key is deleted when the orderer verification is completed at the time of delivery. I have. As a result, the encrypted first orderer biometrics information is valid only for one order, and the encrypted first orderer biometrics information that has completed the prescribed e-commerce is the authentication that generated it. Even terminal 4 will not be able to decrypt.
従って、 万一、 暗号化済み第 1発注者バイオメトリクス情報が第三者に流出し たとしても、 取引が終了していれば発注者本人であっても復号することができず、 それを第三者に悪用されるおそれがない。 また、 ユーザ (発注者) の意図してい ない納品が行なわれたとき、 受注者 (納品担当) が持ってきた暗号化済み第 1発 注者バイオメトリクス情報を認証端末 4で復号できないことによって、 発注者は、 それが正規の発注でないことを立証することができる。 Therefore, even if the encrypted first orderer biometrics information is leaked to a third party, even if the orderer himself / herself cannot complete the transaction after the transaction is completed, it cannot be decrypted. There is no risk of being misused by the three parties. In addition, when a delivery is performed that is not intended by the user (the orderer), the encrypted first issuer biometrics information brought by the orderer (the person in charge of the delivery) cannot be decrypted by the authentication terminal 4. The orderer can establish that it is not a legitimate order.
このように、 本発明の電子商取引方法の第 4例によれば、 上記第 3例と同様の 作用効果が得られるだけでなく、 より高いセキュリティ性能を確保することがで さる。 As described above, according to the fourth example of the electronic commerce method of the present invention, not only the same operation and effect as those of the third example described above can be obtained, but also higher security performance can be ensured.
なお、 第 4例では、 上述のごとく暗号化キ一および復号キーを自動生成すると ともに所定タイミングでこれらのキ一を消去する手法を、 図 4 Aおよび図 4 Bに 示す電子商取引方法に適用した場合について説明したが、 本発明は、 これに限定 されるものではなく、 上記手法は、 図 1 Aおよび図 1 Bに示す電子商取引方法や 図 3に示す電子商取引方法にも、 上記第 4例と同様に適用され、 上記第 4例と同 様の作用効果を得ることができる。 In the fourth example, the method of automatically generating an encryption key and a decryption key as described above and erasing these keys at a predetermined timing was applied to the e-commerce method shown in FIGS. 4A and 4B. Although the case has been described, the present invention is not limited to this, and the above-described method is applied to the electronic commerce method shown in FIGS. 1A and 1B and the electronic commerce method shown in FIG. The same operation and effect as in the fourth example can be obtained.
〔1一 5〕 本発明の電子商取引方法の第 5例 [1-1-5] Fifth example of electronic commerce method of the present invention
図 8は本発明の電子商取引方法の第 5例を説明するための図である。 この電子 商取引方法の第 5例も、 発注者がネットワークを介して受注者に商品を発注し、 その商品を発注者自身が受け取る方法であるが、 この第 5例は、 図 4 Aおよび図 4 Bに示す電子商取引方法において、 発注時に、 後述するごとく P K Iを組み込 んだものである。
図 8に示すように、 商品の発注に先立ち、 発注者は、 認証局 (C A) から発注 者の秘密鍵 Aと公開鍵 Aの発行を受け (矢印 A 3 1参照)、 認証端末 4内に保持 させる。 同様に、 受注者も認証局から受注者の秘密鍵 Bと公開鍵 Bの発行を受け る (矢印 A 3 2参照)。 FIG. 8 is a diagram for explaining a fifth example of the electronic commerce method of the present invention. The fifth example of this e-commerce method is also a method in which the orderer places an order for goods to the contractor via the network, and the orderer himself receives the goods. This fifth example is shown in Figs. 4A and 4 In the e-commerce method shown in B, PKI is incorporated at the time of order placement, as described later. As shown in Fig. 8, prior to ordering the product, the orderer receives the orderer's private key A and public key A from the certificate authority (CA) (see arrow A31), and places it in the authentication terminal 4. Hold. Similarly, the contractor receives the contractor's private key B and public key B from the certificate authority (see arrow A32).
商品の発注時、 発注者は、 受注者から受注者の公開鍵 Bを受信し、 発注者の所 有する認証端末 4内に保持させるとともに (矢印 A 3 3参照)、 認証端末 4に、 発注者本人を特定するための第 1発注者バイオメトリクス情報を入力する (矢印 A 3 4参照)。 認証端末 4では、 第 1発注者バイオメトリクス情報 (図 1 Aに示 す方法の場合は認証情報) を暗号化キーにて暗号化するとともに (ブロック B 3 1参照)、 発注者の電子署名を発注者の秘密鍵 Aで暗号化する (ブロック B 3 2 参照)。 そして、 暗号化済み第 1発注者バイオメトリクス情報, 暗号化済み電子 署名および発注者の公開鍵 Aを、 受注者の公開鍵 Bを用いてさらに暗号化し (ブ ロック B 3 3参照)、 受注者に送信する (矢印 A 3 5参照)。 受注者は、 発注者 (認証端末 4 ) から受信した情報を受注者の秘密鍵 Bで復号し、 ネットワーク上 でデータの改ざんやなりすましが行なわれていないことを確認する。 When placing an order for a product, the orderer receives the contractor's public key B from the contractor and stores it in the authentication terminal 4 owned by the orderer (see arrow A33). Enter the first orderer's biometric information to identify the principal (see arrow A34). The authentication terminal 4 encrypts the first orderer's biometrics information (authentication information in the case of the method shown in FIG. 1A) with an encryption key (see block B31), and also signs the orderer's electronic signature. Encrypt with the client's private key A (see block B32). Then, the encrypted first orderer biometric information, the encrypted electronic signature, and the orderer's public key A are further encrypted using the orderer's public key B (see block B33). (See arrow A35). The contractor decrypts the information received from the client (authentication terminal 4) with the contractor's private key B, and confirms that the data has not been tampered with or impersonated on the network.
その後の、 受注者が商品を納品する際の手順は、 図 4 Aを参照しながら説明し た通りである。 The subsequent procedure for the contractor to deliver the product is as described with reference to Fig. 4A.
このように、 本発明の電子商取引方法の第 5例によれば、 上記第 3例と同様の 作用効果が得られるだけでなく、 商品の発注時に P K Iを組み込むことにより、 ネットワーク上での情報の改ざんやなりすましを防ぐことができ、 より高いセキ ユリティ性能を確保することができる。 As described above, according to the fifth example of the e-commerce method of the present invention, not only the same operation and effect as in the third example described above can be obtained, but also the information Falsification and spoofing can be prevented, and higher security performance can be secured.
なお、 第 5例では、 図 4 Aおよび図 4 Bに示す電子商取引方法において、 商品 発注時に P K Iを組み込んだ場合について説明したが、 本発明は、 これに限定さ れるものではなく、 図 8に示す手法は、 図 1 Aおよび図 1 Bに示す電子商取引方 法や、 図 3に示す電子商取引方法や、 図 6 Aおよび図 6 Bに示す電子商取引方法 にも、 上記第 5例と同様に適用され、 上記第 5例と同様の作用効果を得ることが できる。 In the fifth example, in the electronic commerce method shown in FIGS. 4A and 4B, the case where the PKI is incorporated at the time of ordering the product has been described. However, the present invention is not limited to this. The method shown is the same as the fifth example in the e-commerce method shown in FIGS. 1A and 1B, the e-commerce method shown in FIG. 3, and the e-commerce method shown in FIGS. 6A and 6B. This is applied, and the same operation and effect as the fifth example can be obtained.
〔1一 6〕 本発明の電子商取引方法の第 6例 [11-6] Sixth example of electronic commerce method of the present invention
図 9は本発明の電子商取引方法の第 6例を説明するための図である。 この電子
商取引方法の第 6例も、 発注者がネットワークを介して受注者に商品を発注し、 その商品を発注者自身が受け取る方法であるが、 この第 6例では、 図 4 Aおよび 図 4 Bに示す電子商取弓 I方法における納品後の決済手順をより詳細に説明する。 商品の発注を図 4 Aに示す手順で行なった後、 受注者が商品を納品する際、 図 9に示すように、 受注者側の納品担当は、 商品の発注時に認証端末 4から受け取 つた暗号化済み第 1発注者バイオメトリクス情報を、 発注者の所有する認証端末 4に送付 ·入力する (矢印 A 4 1参照)。 そして、 認証端末 4に入力された暗号 化済み第 1発注者バイオメトリクス情報は、 認証端末 4内に保持された復号キー で復号される (ブロック B 4 1参照)。 また、 発注者は、 納品時に再度、 発注者 本人を特定するための第 2発注者パイオメトリクス情報を認証端末 4に入力する (矢印 A 4 2参照)。 FIG. 9 is a diagram for explaining a sixth example of the electronic commerce method of the present invention. This electron The sixth example of the commercial transaction method is also a method in which the orderer places an order for goods via the network to the contractor, and the orderer himself receives the goods.In this sixth example, the ordering method shown in FIGS. 4A and 4B is used. The following describes the settlement procedure after delivery in the electronic commerce bow I method shown in more detail. After ordering the product in accordance with the procedure shown in Fig. 4A, when the contractor delivers the product, as shown in Fig. 9, the delivery person on the contractor side receives the encryption received from the authentication terminal 4 when ordering the product. Send the converted first orderer biometric information to the authentication terminal 4 owned by the orderer and enter it (see arrow A41). Then, the encrypted first orderer biometrics information input to the authentication terminal 4 is decrypted with the decryption key held in the authentication terminal 4 (see block B41). In addition, the orderer inputs the second orderer's pyometrics information for identifying the orderer to the authentication terminal 4 again upon delivery (see arrow A42).
この後、 認証端末 4では、 復号された第 1発注者バイオメトリクス情報と納品 時に認証端末 4に入力された第 2発注者バイオメトリクス情報とが照合される (ブロック B 4 2参照)。 これらの発注者バイオメトリクス情報が一致した場合、 認証端末 4は、 その照合結果を納品担当, 発注者や受注者に通知し (矢印 A 4 3 参照)、 納品担当は商品を発注者に受け渡すとともに受注者は今回の取引の決済 を実行する。 Thereafter, the authentication terminal 4 checks the decrypted first orderer biometric information and the second orderer biometric information input to the authentication terminal 4 at the time of delivery (see block B42). When the orderer biometrics information matches, the authentication terminal 4 notifies the collation result to the person in charge of delivery, the orderer or the contractor (see arrow A43), and the person in charge delivers the product to the orderer. At the same time, the contractor executes the settlement of this transaction.
その際、 認証端末 4による照合結果が決済の依頼とともに受注者から決済機関 へ送付され (矢印 A 4 4参照)、 決済機関は、 その照合結果を受けて商品の決済 を実行し、 決済結果を発注者に通知する (矢印 A 4 5参照)。 At that time, the verification result by the authentication terminal 4 is sent from the contractor to the clearing house along with the payment request (see arrow A44), and the clearing house receives the verification result and executes the payment of the product. Notify the ordering party (see arrow A45).
このように、 本発明の電子商取引方法の第 6例によれば、 上記第 3例と同様の 作用効果が得られるだけでなく、 決済を実行する際に、 決済機関が認証端末 4の 照合結果を受信して決済を行なうことにより、 商品の受け渡し前に決済が実行さ れることを防ぎ、 さらに不正な発注による決済の実行を未然に防ぐことができ、 より高いセキュリティ性能を確保することができる。 As described above, according to the sixth example of the electronic commerce method of the present invention, not only the same operation and effect as in the third example described above can be obtained, but also when the settlement institution executes the settlement, Payment by receiving the payment, it is possible to prevent the payment from being executed before the delivery of the product, and to prevent the execution of the payment due to improper ordering, thereby ensuring higher security performance. .
なお、 第 6例では、 図 4 Aに示す手順で商品発注を行なった後の納品 ·決済手 順について説明したが、 本発明は、 これに限定されるものではなく、 図 9に示す 納品 ·決済手法は、 図 1 Aおよび図 1 Bに示す電子商取引方法や、 図 3に示す電 子商取引方法や、 図 6 Aおよび図 6 Bに示す電子商取引方法や、 図 8に示す電子
商取引方法にも、 上記第 6例と同様に適用され、 上記第 6例と同様の作用効果を 得ることができる。 Note that, in the sixth example, the delivery and settlement procedure after ordering the product according to the procedure shown in FIG. 4A has been described. However, the present invention is not limited to this, and the delivery and settlement procedure shown in FIG. The settlement methods include the e-commerce method shown in Figs. 1A and 1B, the e-commerce method shown in Fig. 3, the e-commerce method shown in Figs. 6A and 6B, and the e-commerce method shown in Fig. 8. The same is applied to the commercial transaction method as in the sixth example, and the same operation and effect as in the sixth example can be obtained.
〔1— 7〕 本発明の電子商取引方法の第 7例 [1-7] Seventh example of electronic commerce method of the present invention
図 1 0は本発明の電子商取引方法の第 7例を説明するための図である。 この電 子商取引方法の第 7例も、 発注者がネットワークを介して受注者に商品を発注し、 その商品を発注者自身が受け取る方法であるが、 この第 7例では、 図 8に示す電 子商取引方法において、 P K Iの仕組みを発注者や受注者だけでなく決裁機関に まで適用したものである。 FIG. 10 is a diagram for explaining a seventh example of the electronic commerce method of the present invention. The seventh example of this e-commerce method is also a method in which the orderer places an order for goods to the contractor via the network, and the orderer himself receives the goods. In the child commerce method, the PKI mechanism is applied not only to the ordering party and contractor, but also to the decision-making body.
図 1 0に示すように、 発注者所有の認証端末 4には、 上記第 5例と同様、 認証 局 (C A) から発行された発注者の秘密鍵 Aと公開鍵 Aが保持されるとともに、 認証局から決済機関に対して発行された、 この決済機関の公開鍵じが、 決済機関 から発注者の認証端末 4に送付されて保持されている (矢印 A 5 1参照)。 As shown in FIG. 10, the orderer-owned authentication terminal 4 holds the orderer's private key A and public key A issued by the certificate authority (CA), as in the fifth example above. The public key of the clearing house issued by the CA to the clearing house is sent from the clearing house to the authentication terminal 4 of the ordering party and is retained (see arrow A51).
そして、 商品の発注を図 8に示す手順で行なった後、 受注者が商品を納品する 際、 図 1 0に示すように、 受注者側の納品担当は、 商品の発注時に認証端末 4か ら受け取った暗号化済み第 1発注者バイオメトリクス情報を、 発注者の所有する 認証端末 4に送付 ·入力する (矢印 A 5 2参照)。 そして、 認証端末 4に入力さ れた暗号化済み第 1発注者バイオメトリクス情報は、 認証端末 4内に保持された 復号キーで復号される (ブロック B 5 1参照)。 また、 発注者は、 納品時に再度、 発注者本人を特定するための第 2発注者バイオメ卜リクス情報を認証端末 4に入 力する (矢印 A 5 3参照)。 Then, after ordering the goods according to the procedure shown in Fig. 8, when the contractor delivers the goods, as shown in Fig. 10, the delivery person in charge of the contractor receives the order from the authentication terminal 4 at the time of ordering the goods. Send the received encrypted first orderer biometrics information to the authentication terminal 4 owned by the orderer and enter it (see arrow A52). Then, the encrypted first orderer biometrics information input to the authentication terminal 4 is decrypted with the decryption key held in the authentication terminal 4 (see block B51). In addition, the orderer inputs the second orderer biometric information for identifying the orderer himself into the authentication terminal 4 again at the time of delivery (see arrow A53).
この後、 認証端末 4では、 復号された第 1発注者バイオメトリクス情報と納品 時に認証端末 4に入力された第 2発注者バイオメトリクス情報とが照合される (プロック B 5 1参照)。 これらの発注者バイオメトリクス情報が一致した場合、 認証端末 4は、 その照合結果を納品担当, 発注者および受注者に通知し (矢印 A 5 4参照)、 納品担当は商品を発注者に受け渡す。 Thereafter, the authentication terminal 4 checks the decrypted first orderer biometrics information against the second orderer biometrics information input to the authentication terminal 4 at the time of delivery (see block B51). If the orderer biometrics information matches, the authentication terminal 4 notifies the collation result to the delivery person, the orderer and the contractor (see arrow A54), and the delivery person delivers the product to the orderer. .
また、 認証端末 4は、 上記照合結果を受注者や決済機関に通知する際に、 発注 者の電子署名を発注者の秘密鍵 Aで暗号化するとともに (ブロック B 5 2参照)、 上記照合結果, 暗号化済み電子署名および発注者の公開鍵 Aを、 決済機関の公開 鍵 Cを用いてさらに暗号化し (ブロック B 5 3参照)、 受注者経由で決済機関に
送信する (矢印 A 5 5参照)。 The authentication terminal 4 encrypts the electronic signature of the ordering party with the ordering party's private key A when notifying the ordering result or the settlement institution (see block B 52). , The encrypted electronic signature and the public key A of the ordering party are further encrypted using the public key C of the clearing house (see block B53), and transmitted to the clearing house via the contractor. Send (see arrow A55).
そして、 決済機関は、 認証端末 4からの暗号化済み照合結果を決済機関の秘密 鍵 C (予め認証局によって発行された、 公開鍵 Cと対になっているもの) で復号 して復号照合結果を取得し、 その復号照合結果に応じて商品の決済を実行する。 このように、 本発明の電子商取引方法の第 7例によれば、 上記第 5例と同様の 作用効果が得られるだけでなく、 P K Iの仕組みを発注者や受注者だけでなく決 裁機関にまで適用し、 決済機関において復号照合結果を用いて決済を実行するこ とにより、 ネットワーク上での改ざんやなりすましを除去し、 より確実な本人認 証が可能な電子商取引を実現することができる。 Then, the clearing house decrypts the encrypted verification result from the authentication terminal 4 with the private key C of the clearing house (which is paired with the public key C issued by the certificate authority in advance) and decrypts the verification result. And executes the settlement of the product according to the decryption and collation result. As described above, according to the seventh example of the electronic commerce method of the present invention, not only the same operation and effect as those of the fifth example described above can be obtained, but also the PKI mechanism can be provided not only to the ordering party and the order receiving party but also to a decision-making body. By using the result of decryption and collation by the payment institution, the falsification and impersonation on the network can be removed, and electronic commerce that can perform more reliable personal authentication can be realized.
なお、 第 7例では、 図 8に示す手順で商品発注を行なった後の納品 ·決済手順 について説明したが、 本発明は、 これに限定されるものではなく、 図 1 0に示す 納品 ·決済手法は、 図 1 Aおよび図 1 Bに示す電子商取引方法や、 図 3に示す電 子商取引方法や、 図 6 Aおよび図 6 Bに示す電子商取引方法にも、 上記第 7例と 同様に適用され、 上記第 7例と同様の作用効果を得ることができる。 Note that, in the seventh example, the delivery and settlement procedure after placing an order for a product according to the procedure shown in FIG. 8 has been described. However, the present invention is not limited to this, and the delivery and settlement shown in FIG. The method is applied to the e-commerce method shown in Fig. 1A and Fig. 1B, the e-commerce method shown in Fig. 3, and the e-commerce method shown in Figs. 6A and 6B in the same way as in the seventh example. Thus, the same function and effect as those of the seventh example can be obtained.
上述した本発明の電子商取引方法の第 1例〜第 7例では、 商品の納品時に、 発 注者所有の認証端末 1 , 4内で暗号化済み認証情報または暗号化済み第 1発注者 バイオメトリクス情報を復号し、 復号された情報を、 発注者が納品時に入力した 認証情報または第 2発注者バイオメトリクス情報と照合する。 これにより、 発注 者は、 商品発注時に認証端末 1 , 4に認証情報またはバイオメトリクス情報を入 力するだけで自分自身の認証が可能な発注を行なうことができる。 その際、 認証 情報やバイオメトリクス情報は暗号化されて受注者に送付されるため、 その暗号 化済み情報が万一流出したとしても、 悪意ある第三者に悪用されることを防ぐこ とができる。 また、 P K Iを利用する場合、 秘密鍵や公開鍵を認証端末 1, 4内 に保持し、 認証情報またはバイオメトリクス情報により管理することで、 高度な セキュリティ性能の鍵管理を簡単に行なうことができる。 一方、 受注者は、 商品 の納品時や決済時に発注者の本人認証を確実に行なうことができるため、 悪意あ る人物による不正取引を排除することが可能となり、 ビジネスリスクを低減でき る。 In the first to seventh examples of the e-commerce method of the present invention described above, at the time of product delivery, the encrypted authentication information or the encrypted first orderer biometrics in the authentication terminals 1 and 4 owned by the orderer. The information is decrypted, and the decrypted information is compared with the authentication information or the second orderer biometric information entered by the orderer at the time of delivery. As a result, the orderer can place an order that can authenticate himself only by inputting authentication information or biometrics information into the authentication terminals 1 and 4 when ordering a product. At this time, the authentication information and biometrics information are encrypted and sent to the contractor, so even if the encrypted information leaks out, it can be prevented from being misused by a malicious third party. . In addition, when using PKI, by maintaining private keys and public keys in the authentication terminals 1 and 4 and managing them with authentication information or biometric information, key management with high security performance can be performed easily. . On the other hand, the contractor can reliably perform the identity authentication of the orderer at the time of delivery and settlement of the product, thereby eliminating fraudulent transactions by a malicious person and reducing business risk.
〔1一 8〕 本発明の電子商取引方法の第 8例
ところで、 上述した電子商取引方法では、 必ず発注者本人が納品を受けなけれ ばならず、 代理人による商品の受取はできない。 一般に商品の発注者と受取人と は異なることが多く、 発注者が委任した正規の代理人であれば発注者が発注した 商品を受け取れるようにすべきである。 [1-1 8] Eighth Example of Electronic Commerce Method of the Present Invention By the way, in the e-commerce method described above, the ordering party must always receive the delivery, and the agent cannot receive the goods. In general, the orderer and the recipient of the product are often different, and an authorized representative delegated by the orderer should be able to receive the item ordered by the orderer.
図 1 1 A, 図 1 1 Bおよび図 1 1 Cは本発明の電子商取引方法 (代理人による 本人認証方法) の第 8例を説明するための図で、 この電子商取引方法の第 8例は、 発注者がネットワークを介して受注者に商品を発注し、 発注者が委任した代理人 が商品を受け取る方法である。 FIG. 11A, FIG. 11B and FIG. 11C are diagrams for explaining the eighth example of the electronic commerce method (authentication method by an agent) of the present invention. This is a method in which the orderer places an order for goods to the contractor via the network, and the agent appointed by the orderer receives the goods.
商品の発注時、 図 1 1 Aに示すように、 発注者 (認証者) は、 発注者所有の認 証端末 7 Aに、 発注者本人 (認証者本人) を特定するための第 1発注者バイオメ トリクス情報 (第 1認証者バイオメトリクス情報) Aを入力する (矢印 A 6 1参 照)。 認証端末 7 Aにおいて、 入力された第 1発注者バイオメトリクス情報 Aは、 商品の発注伝票 (受注データ) とともにネットワークを介して受注者 (認証者の 本人認証結果を必要とする業者) へ送付される (矢印 A 6 2およびブロック B 6 1参照)。 When placing an order for a product, as shown in Fig. 11A, the ordering party (certifier) uses the authentication terminal 7A owned by the ordering party to identify the ordering party (certifier) as the first orderer. Enter biometrics information (first certifier biometrics information) A (see arrow A61). At the authentication terminal 7A, the entered first orderer biometric information A is sent to the orderer (a company that requires the authentication result of the certifier) along with the order slip (order data) for the product via the network. (See arrow A62 and block B61).
その後、 商品の受取時に発注者が本人認証を行なえない場合、 発注者が商品の 受取を代理人に委任することになる。 その際 (代理人登録時)、 図 1 1 Bに示す ように、 前もって、 認証端末 7 Aに、 発注者が、 発注者本人を特定するための第 2発注者バイオメトリクス情報 (第 2認証者バイオメトリクス情報) Bを改めて 入力するとともに (矢印 A 6 3参照)、 発注者が委任した代理人が、 代理人本人 を特定するための第 1代理人バイオメトリクス情報 Cを入力し (矢印 A 6 4参 照)、 認証端末 7 Aは、 第 2発注者バイオメトリクス情報 Bと第 1代理人バイォ メトリクス情報 Cとを対応付けて格納 ·保持する (プロック B 6 2参照)。 Thereafter, if the orderer cannot authenticate the user when receiving the goods, the orderer will delegate the goods to an agent. At this time (at the time of agent registration), as shown in Fig. 11B, the authentication terminal 7A sends the orderer's second orderer biometric information (the second certifier (Biometrics information) Enter B again (see arrow A63), and the agent delegated by the orderer inputs the first agent biometrics information C for identifying the agent himself (arrow A6). 4), the authentication terminal 7A stores and holds the second orderer biometrics information B and the first agent biometrics information C in association with each other (see block B62).
次に、 受注者が商品を納品する際 (認証者の本人認証時)、 図 1 1 Cに示すよ うに、 受注者側の納品担当は、 商品の発注時に認証端末 7 Aから受け取った第 1 発注者バイオメトリクス情報 Aを、 発注者 (認証者) に代わって代理人が所持し ている認証端末 7 Aに送付 ·入力する (矢印 A 6 5参照)。 このとき、 認証端末 7 Aは、 上記第 1例と同様、 例えばコンパクトフラッシュ (登録商標) カード等 の媒体用スロットを装備しており、 納品担当は、 コンパクトフラッシュ等の媒体
内に第 1発注者バイオメトリクス情報 Aを格納して持ってきて、 その媒体をスロ ッ卜に挿入して第 1発注者バイオメトリクス情報 Aを認証端末 7 Aに入力する。 また、 代理人は、 納品時 (認証時) に再度、 代理人本人を特定するための第 2 代理人バイオメトリクス情報 Dを認証端末 7 Aに入力する (矢印 A 6 6参照)。 そして、 認証端末 7 Aは、 この認証端末 7 Aに保持された第 1代理人バイオメ トリクス情報 Cと、 納品時に代理人によつて改めて入力された第 2代理人バイォ メトリクス情報 Dとを照合し、 商品を受け取ろうとしている代理人が、 発注者に よって委任された正規代理人であることを認証する (ブロック B 6 3参照)。 これらの代理人バイオメトリクス情報 C, Dが不一致で受取入が正規代理人で はないと認定された場合、 認証端末 7 Aは、 その旨を納品担当, 受取人 (代理 人) や受注者に通知し、 納品担当は、 納品を行なうことなく手続を終了する。 一 方、 これらの代理人バイオメトリクス情報 C, Dがー致し受取人が正規代理人で あると認証された場合、 認証端末 7 Aでは、 納品担当によつて入力された第 1発 注者バイオメトリクス情報 Aと認証端末 7 A内に保持された第 2発注者バイオメ トリクス情報とが照合され、 発注者 (認証者) の本人認証が行なわれる (プロッ ク B 6 4参照)。 Next, when the contractor delivers the product (at the time of authentication of the certifier), as shown in Fig. 11C, the delivery person on the contractor side receives the first item received from the authentication terminal 7A when ordering the product. Send the orderer biometrics information A to the authentication terminal 7A owned by the agent on behalf of the orderer (certifier) and enter it (see arrow A65). At this time, the authentication terminal 7A is equipped with a medium slot such as a CompactFlash (registered trademark) card, as in the first example, and the delivery person is in charge of a medium such as a CompactFlash. The first orderer's biometrics information A is stored and brought into the slot, the medium is inserted into the slot, and the first orderer's biometrics information A is input to the authentication terminal 7A. At the time of delivery (at the time of authentication), the agent again inputs the second agent biometrics information D for identifying the agent itself to the authentication terminal 7A (see arrow A66). Then, the authentication terminal 7A compares the first agent biometric information C held in the authentication terminal 7A with the second agent biometric information D newly input by the agent at the time of delivery. Authenticate that the agent trying to receive the goods is an authorized agent delegated by the client (see block B63). If the proxy biometrics information C and D do not match and the receipt is recognized as not an authorized representative, the authentication terminal 7A informs the delivery staff, the recipient (agent) and the contractor of the fact. Notify and the delivery person ends the procedure without delivery. On the other hand, if these agent biometric information C and D are matched and the recipient is authenticated as an authorized agent, the authenticating terminal 7A uses the first biometric information entered by the delivery person in charge. The metric information A is compared with the biometric information of the second orderer stored in the authentication terminal 7A, and the identity of the orderer (authenticater) is authenticated (see block B64).
これらの発注者バイオメトリクス情報 A, Bが不一致であった場合、 認証端末 7 Aは 今回の発注が認証端末 7 Aの現在のユーザによるものではないものと認 識し、 その照合結果 (認証結果) を納品担当, 代理人や受注者に通知し (矢印 A 6 7参照)、 納品担当は、 納品を行なうことなく手続を終了する。 一方、 これら の発注者バイオメ卜リクス情報 A, Bがー致した場合、 認証端末 7 Aは、 その照 合結果 (認証結果) を納品担当, 代理人や受注者に通知し (矢印 A 6 7参照)、 納品担当は商品を代理人に受け渡すとともに受注者は今回の取引の決済を実行す る。 If the orderer biometrics information A and B do not match, the authentication terminal 7A recognizes that this order is not from the current user of the authentication terminal 7A, and the verification result (authentication result). ) Is notified to the delivery person, agent or contractor (see arrow A67), and the delivery person ends the procedure without delivery. On the other hand, if the orderer biometrics information A and B match, the authentication terminal 7A notifies the collation result (authentication result) to the delivery person, agent or contractor (arrow A67). Delivery) hands over the goods to the agent, and the contractor setstle the transaction.
このように、 本発明の電子商取引方法の第 8例によれば、 認証端末 7 Aに代理 人のバイオメトリクス情報 Cと発注者のバイオメトリクス情報 Bとを予め保持さ せておき、 商品の納品時 (認証者である発注者の本人認証時) に、 納品担当 (業 者) が認証端末 7 Aから送付された発注者のバイオメトリクス情報 Aを認証端末 7 Aに入力するとともに、 代理人が自身のバイオメトリクス情報 Dを認証端末に
入力し、 この認証端末 7 Aにおいて、 まず代理人の本人認証を行なって代理人が 本人 (正規代理人) であることが認証されると、 納品担当によって入力された発 注者のバイオメトリクス情報 Aと認証端末 7 Aに予め保持されている発注者のバ ィオメトリクス情報 Bとによって、 発注者 (認証者) の本人認証が行なわれる。 従って、 商品等の受取に際して発注者本人だけでなく発注者本人が指定した代理 人による受取が、 セキュリティを確保しながら可能になり、 利便性が大幅に向上 する。 As described above, according to the eighth example of the e-commerce method of the present invention, the authentication terminal 7A stores the biometric information C of the agent and the biometric information B of the orderer in advance, and At the time (at the time of authentication of the orderer who is the certifier), the delivery person (business person) inputs the biometric information A of the orderer sent from the authentication terminal 7A to the authentication terminal 7A, and the agent Use own biometrics information D as authentication terminal The authentication terminal 7A first performs identity authentication of the agent, and if the agent is authenticated as the authorized person (authorized agent), the biometric information of the issuer entered by the delivery person Based on A and the biometric information B of the orderer stored in the authentication terminal 7A in advance, the identity of the orderer (authenticater) is authenticated. Therefore, it is possible to receive not only the ordering person but also the agent designated by the ordering person while receiving the product, etc., while ensuring security, and the convenience is greatly improved.
なお、 図 1 1 A〜図 1 1 Cでは図示されていないが、 ブロック B 6 4での発注 者の認証完了後、 認証端末 7 A内のバイオメトリクス情報 Bおよび Cは削除する ことが望ましい。 これにより、 代理人による本人認証は一度しか行なうことがで きず、 代理人による濫用を制御することができる。 Although not shown in FIGS. 11A to 11C, it is desirable to delete the biometric information B and C in the authentication terminal 7A after the authentication of the orderer in block B64 is completed. As a result, authentication by the agent can be performed only once, and abuse by the agent can be controlled.
また、 この第 8例において、 発注者は、 商品発注時と代理人登録時とのそれぞ れにおいて、 パイオメトリクス情報 A, Bを入力している。 1 回目 (商品発注 時) の入力情報 Aを認証端末 7 Aに保持し、 代理人登録時に、 その保持されたバ ィオメトリクス情報 Aをバイオメトリクス情報 Bとして用いてもよいが、 この場 合、 不正な代理人が認証端末 7 Aを発注者の認証を得ぬままに代理人登録を行な うなどの不正行為が起こりえる。 そこで、 上述したように、 代理人登録時に改め て発注者のバイオメトリクス情報 Bを入力 '格納することが望ましい。 In the eighth example, the orderer inputs the biometric information A and B at the time of ordering the product and at the time of registering the agent, respectively. The input information A for the first time (at the time of ordering the product) may be stored in the authentication terminal 7A, and when the agent is registered, the stored biometrics information A may be used as the biometrics information B. Unauthorized acts such as registering an agent without the authentication terminal 7A being authenticated by an unauthorized agent without obtaining the orderer's authentication may occur. Therefore, as described above, it is desirable that the biometrics information B of the ordering party be input and stored again when the agent is registered.
〔1一 9〕 本発明の電子商取引方法の第 9例 [11-9] Ninth Example of Electronic Commerce Method of the Present Invention
図 1 2 A, 図 1 2 Bおよび図 1 2 Cは本発明の電子商取引方法 (代理人による 本人認証方法) の第 9例を説明するための図である。 この第 9例も、 発注者がネ ットヮ一クを介して受注者に商品を発注し、 発注者が委任した代理人が商品を受 け取る方法であるが、 この第 9例では、 上記第 8例において発注者側から受注者 側へそのまま送付されていた第 1発注者バイオメトリクス情報 Aを暗号ィヒするよ うになつている。 つまり、 第 9例では、 上記第 1例〜第 7例の手法 (特に第 1例 もしくは第 3例の手法) と上記第 8例の手法とを組み合わせたものである。 商品の発注時、 図 1 2 Aに示すように、 発注者 (認証者) は、 発注者所有の認 証端末 7に、 発注者本人 (認証者本人) を特定するための第 1発注者バイオメ卜 リクス情報 (第 1認証者バイオメトリクス情報) Aを入力する (矢印 A 7 1参
照)。 認証端末 7において、 入力された第 1発注者バイオメトリクス情報 Aは、 この認証端末 7内に保持されている所定の暗号化キー (暗号鍵) によって暗号化 され (ブロック B 7 1参照)、 その暗号済み第 1発注者バイオメトリクス情報 A は、 商品の発注伝票 (受注デ一夕) とともにネットワークを介して受注者 (認証 者の本人認証結果を必要とする業者) へ送付される (矢印 A 7 2およびブロック B 7 1参照)。 このとき、 ブロック B 7 1で暗号化された暗号化済み第 1発注者 バイオメ卜リクス情報 Aを復号するための復号キー (復号鍵) が認証端末 7内に 保持される。 FIG. 12A, FIG. 12B and FIG. 12C are diagrams for explaining a ninth example of the electronic commerce method (identity authentication method by an agent) of the present invention. The ninth example is also a method in which the orderer places an order for goods to the contractor via a network, and the agent commissioned by the orderer receives the goods. In the eight cases, the first orderer biometrics information A sent directly from the ordering party to the order receiving party is encrypted. That is, the ninth example is a combination of the methods of the first to seventh examples (particularly, the first or third example) and the method of the eighth example. When placing an order for a product, as shown in Figure 12A, the ordering party (certifier) sends the first ordering party biome- ter to identify the ordering party (certifier) to the authentication terminal 7 owned by the orderer. Matrix information (1st certifier biometrics information) Enter A (see arrow A 71) See). At the authentication terminal 7, the input first orderer biometric information A is encrypted by a predetermined encryption key (encryption key) held in the authentication terminal 7 (see block B71), and The encrypted first orderer biometrics information A is sent to the contractor (a company that requires the authentication result of the certifier) via the network together with the order slip for the product (order receipt) (arrow A7). 2 and block B 71). At this time, a decryption key (decryption key) for decrypting the encrypted first orderer biometrics information A encrypted in the block B 71 is held in the authentication terminal 7.
その後、 商品の受取時に発注者が本人認証を行なえない場合、 発注者が商品の 受取を代理人に委任することになる。 その際 (代理人登録時)、 図 1 2 Bに示す ように、 前もって、 認証端末 7に、 発注者が、 発注者本人を特定するための第 2 発注者パイオメ卜リクス情報 (第 2認証者バイオメトリクス情報) Bを改めて入 力するとともに (矢印 A 7 3参照)、 発注者が委任した代理人が、 代理人本人を 特定するための第 1代理人バイオメ卜リクス情報 Cを入力し (矢印 A 7 4参照)、 認証端末 7は、 上記復号キーと第 2発注者バイオメトリクス情報 Bと第 1代理人 バイオメトリクス情報 Cとを対応付けて格納 ·保持する (ブロック B 7 2参照)。 次に、 受注者が商品を納品する際 (認証者の本人認証時)、 図 1 2 Cに示すよ うに、 受注者側の納品担当は、 商品の発注時に認証端末 7から受け取った暗号化 済み第 1発注者バイオメトリクス情報 Aを、 発注者 (認証者) に代わって代理人 が所持している認証端末 7に送付 ·入力する (矢印 A 7 5参照)。 このとさ、 認 証端末 7は、 上記第 1例と同様、 例えばコンパクトフラッシュ (登録商標) カー ド等の媒体用スロットを装備しており、 納品担当は、 コンパクトフラッシュ等の 媒体内に暗号化済み第 1発注者バイオメトリクス情報 Aを格納して持ってきて、 その媒体をスロットに揷入して暗号化済み第 1発注者バイオメトリクス情報 Aを 認証端末 7に入力する。 Thereafter, if the orderer cannot authenticate the user when receiving the goods, the orderer will delegate the goods to an agent. At this time (at the time of agent registration), as shown in FIG. 12B, the authentication terminal 7 previously sends the ordering party's second ordering party pieometrics information (the second authenticating party) to identify the ordering person himself / herself. Biometrics information) B is input again (see arrow A73), and the agent delegated by the orderer inputs the first agent biometrics information C for identifying the agent itself (arrow A74), the authentication terminal 7 stores and holds the decryption key, the second orderer biometrics information B, and the first agent biometrics information C in association with each other (see block B72). Next, when the contractor delivers the product (at the time of authentication of the certifier), as shown in Fig. 12C, the contractor on the contractor side receives the encrypted product received from the authentication terminal 7 when ordering the product. The first orderer biometrics information A is sent to the authentication terminal 7 owned by the agent on behalf of the orderer (certifier) and entered (see arrow A75). At this time, the authentication terminal 7 is equipped with a medium slot such as a compact flash (registered trademark) card, as in the first example, and the delivery person is responsible for encrypting the medium in a medium such as a compact flash. The stored first orderer biometrics information A is stored and brought into the slot, and the encrypted first orderer biometrics information A is input to the authentication terminal 7.
また、 代理人は、 納品時 (認証時) に再度、 代理人本人を特定するための第 2 代理人パイオメトリクス情報 Dを認証端末 7に入力する (矢印 A 7 6参照)。 At the time of delivery (at the time of authentication), the agent again inputs the second agent pyrometrics information D for identifying the agent himself / herself to the authentication terminal 7 (see arrow A76).
そして、 認証端末 7は、 この認証端末 7に保持された第 1代理人バイオメトリ クス情報 Cと、 納品時に代理人によって改めて入力された第 2代理人バイオメト
リクス情報 Dとを照合し、 商品を受け取ろうとしている代理人が、 発注者によつ て委任された正規代理人であることを認証する (ブロック B 7 3参照)。 Then, the authentication terminal 7 compares the first agent biometric information C held in the authentication terminal 7 with the second agent biometric information newly input by the agent at the time of delivery. Verifies Rix information D and authenticates that the agent trying to receive the goods is an authorized agent authorized by the orderer (see block B73).
これらの代理人バイオメトリクス情報 C, Dが不一致で受取人が正規代理人で はないと認定された場合、 認証端末 7は、 その旨を納品担当, 受取人 (代理人) や受注者に通知し、 納品担当は、 納品を行なうことなく手続を終了する。 一方、 これらの代理人バイオメトリクス情報 C, Dがー致し受取人が正規代理人である と認証された場合、 認証端末 7では、 納品担当によって入力された暗号化済みバ ィオメトリクス情報 Aが、 認証端末 7内に保持された復号キーで復号され (プロ ック B 7 4参照)、 さらに、 ブロック B 7 4で復号された第 1発注者バイオメト リクス情報 Aと認証端末 Ί内に保持された第 2発注者バイオメトリクス情報 Bと が照合され、 発注者 (認証者) の本人認証が行なわれる (ブロック B 7 5参照)。 これらの発注者バイオメトリクス情報 A, Bが不一致であった場合、 認証端末 7 Aは、 今回の発注が認証端末 7の現在のユーザによるものではないものと認識 し、 その照合結果 (認証結果) を納品担当, 代理人や受注者に通知し (矢印 A 7 7参照)、 納品担当は、 納品を行なうことなく手続を終了する。 一方、 これらの 発注者バイオメ卜リクス情報 A, Bがー致した場合、 認証端末 7は、 その照合結 果 (認証結果) を納品担当, 代理人や受注者に通知し (矢印 A 7 7参照)、 納品 担当は商品を代理人に受け渡すとともに受注者は今回の取引の決済を実行する。 このように、 本発明の電子商取引方法の第 9例によれば、 上記第 8例と同様の 作用効果が得られるだけでなく、 上記第 1例や上記第 3例と同様の作用効果を得 ることができる。 If the proxy biometrics information C and D do not match and the recipient is recognized as not an authorized representative, the authentication terminal 7 informs the delivery person, the recipient (agent) and the contractor of the fact. Then, the delivery person finishes the procedure without delivery. On the other hand, if the proxy biometrics information C and D are matched and the recipient is authenticated as an authorized proxy, the authentication terminal 7 converts the encrypted biometrics information A input by the delivery person into the authentication information. It is decrypted with the decryption key held in the terminal 7 (see block B 74), and the first orderer biometrics information A decrypted in the block B 74 and the decryption key stored in the authentication terminal Ί. (2) The ordering party biometrics information B is compared with, and the identity of the ordering party (certifier) is verified (see block B75). If the orderer biometrics information A and B do not match, the authentication terminal 7A recognizes that this order is not from the current user of the authentication terminal 7, and the verification result (authentication result) Is notified to the delivery person, agent or contractor (see arrow A77), and the delivery person ends the procedure without delivery. On the other hand, if the orderer biometrics information A and B match, the authentication terminal 7 notifies the collation result (authentication result) to the delivery person, agent or contractor (see arrow A77). ), The delivery person delivers the goods to the agent, and the contractor executes the settlement of this transaction. As described above, according to the ninth example of the electronic commerce method of the present invention, not only the same operation and effect as the eighth example but also the same operation and effect as the first and third examples can be obtained. Can be
なお、 この第 9例においても、 上記第 4例のごとく暗号化キーおよび復号キ一 を自動生成するとともに所定タイミングでこれらのキーを消去する手法を適用し てもよいし、 さらに、 上記第 5例〜第 7例で説明した手法を適用してもよい。 Also in the ninth example, a method of automatically generating an encryption key and a decryption key and erasing these keys at a predetermined timing as in the fourth example may be applied. The methods described in the examples to the seventh example may be applied.
〔 1一 1 0〕 本発明の電子商取引方法の第 1 0例 [111] 10th Example of Electronic Commerce Method of the Present Invention
本発明の電子商取引方法の第 1 0例 (図示省略) では、 上述した第 8例や第 9 例の発注者認証 (ブロック B 6 4 , B 7 5参照) を行なった際に第 1発注者バイ オメトリクス情報 Aと第 2発注者バイオメトリクス情報 Bとの照合結果が完全同 一であった場合、 認証端末 7 A, 7は、 照合不一致 (認証不可) と認定するよう
になっている。 In the tenth example (not shown) of the e-commerce method of the present invention, when the orderer authentication (see blocks B64 and B75) of the eighth and ninth examples described above is performed, the first orderer If the biometrics information A and the second orderer's biometrics information B match exactly the same, the authentication terminals 7A and 7 will recognize that the matching does not match (authentication is not possible). It has become.
一般に、 バイオメトリクス情報は、 毎回異なる情報が採取されるのが普通であ る。 例えば、 バイオメトリクス情報が指紋データである場合、 指紋デ一夕採取時 における指の圧力, 湿り気, 気温, 湿度などによって、 採取される指紋データは 毎回異なってくる。 従って、 2つの指紋データが完全に一致する場合、 何らかの 手段 (例えば指紋を採取してデジタル化するなど) を用いて不正に取得した指紋 データを用いていることが予測される。 Generally, different biometric information is collected each time. For example, if the biometrics information is fingerprint data, the fingerprint data that is collected will differ every time depending on the finger pressure, humidity, temperature, humidity, etc. at the time of fingerprint data collection. Therefore, if the two fingerprint data completely match, it is expected that fingerprint data obtained illegally by some means (for example, by collecting a fingerprint and digitizing it) is used.
このような不正行為を除去するために、 第 1 0例では、 認証端末 7 A, 7での 発注者認証時のバイオメトリクス情報 A, Bが完全に一致するときは 「認証不 可」 としている。 これにより、 より高いセキュリティ性能を確保することができ る。 · In order to eliminate such misconduct, in Example 10, if the biometrics information A and B at the time of orderer authentication at the authentication terminals 7A and 7 completely match, "authentication is not possible" . As a result, higher security performance can be ensured. ·
〔 1一 1 1〕 本発明の電子商取引方法の第 1 1例 [111] 1st Example of Electronic Commerce Method of the Present Invention
本発明の電子商取引方法の第 1 1例 (図示省略) では、 上述した電子商取引方 法のうち、 第 1発注者バイオメトリクス情報 (第 1認証者バイオメトリクス情 報) を暗号化して受注者 (業者) に送付するものにおいて、 発注者 (認証者) の 所有する認証端末は、 商品の発注時に第 1発注者バイオメトリクス情報を暗号化 する前に、 この第 1発注者バイオメトリクス情報に対して特定の可逆加工を施し、 商品の納品時 (認証時) に、 復号された第 1発注者バイオメトリクス情報に対し て、 商品の発注時に行なった可逆加工と逆の加工を施し、 第 1発注者バイオメト リクス情報を復元する。 In the eleventh example (not shown) of the e-commerce method of the present invention, among the e-commerce methods described above, the first orderer biometric information (first certifier biometric information) is encrypted and the orderer ( The authentication terminal owned by the ordering party (certifier) must encrypt the first ordering party biometric information before encrypting the first ordering party biometric information when ordering the product. A specific reversible process is performed, and when the product is delivered (at the time of authentication), the decrypted first orderer biometrics information is processed in the reverse order to the reversible process performed when the product was ordered, and the first orderer is processed. Restore biometric information.
これにより、 万一、 暗号化済み第 1発注者バイオメトリクス情報の暗号化が破 られたとしても、 そのバイオメトリクス情報の第三者による流用を防ぐことがで き、 より高いセキュリティ性能を確保することができる。 As a result, even if the encryption of the encrypted first metric biometrics information is broken, it can be prevented from being diverted by a third party, and higher security performance can be secured. be able to.
具体的には、 バイオメトリクス情報が指紋画像である場合、 指紋画像を特定の パターンで伸縮させる。 例えば、 画像の上側は縦に引き伸ばし、 画像の下側は横 に引き伸ばすなどの加工を施す。 このとき、 施した加工のパラメ一夕 (引き伸ば しの重み係数) は認証端末内に保持しておく。 この加工を加えることで、 指紋デ 一夕は元の指紋とは異なるものになっており、 オリジナルの指紋画像を第三者が 取得できなくなる。 さらに、 加工のパラメータを毎回変えることで、 毎回異なる
指紋画像となり、 オリジナルの指紋画像の類推を一層困難なものにすることがで さる。 Specifically, when the biometric information is a fingerprint image, the fingerprint image is expanded and contracted in a specific pattern. For example, the top of the image is stretched vertically, and the bottom of the image is stretched horizontally. At this time, the parameters of the applied processing (weighting factors for enlargement) are stored in the authentication terminal. With this processing, the fingerprint data is different from the original fingerprint, and the original fingerprint image cannot be obtained by a third party. Furthermore, by changing the processing parameters every time, It becomes a fingerprint image, making it more difficult to analogize the original fingerprint image.
〔 1一 1 2〕 本発明の電子商取引方法の第 1 2例 [111] 1st and 2nd examples of the electronic commerce method of the present invention
本発明の電子商取引方法の第 1 2例 (図示省略) では、 上述した電子商取引方 法の第 1例〜第 1 1例において、 受注者 (業者) が金融機関であり、 発注者が金 融機関から金銭を借り受ける借受人であり、 発注者と受注者との間で金銭を商品 として賃借する。 この場合、 商品の発注時が、 借受人と金融機関との金銭消費貸 借契約時が、 上述した商品の発注時に対応し、 借受人もしくは代理人が金融機関 から金銭を借り受ける時点が、 商品の納品時 (認証時) に対応することになる。 このように、 本発明の電子商取引方法の第 1例〜第 1 1例を用いて、 商品とし ての金銭をやり取りすることにより、 金銭贷借のビジネスを確立することができ る。 In a first example (not shown) of the e-commerce method according to the present invention, in the first to eleventh examples of the e-commerce method described above, the contractor (trader) is a financial institution and the orderer is a financial institution. A borrower who borrows money from an institution, and rents money as a product between the ordering party and the contractor. In this case, the time of ordering the product corresponds to the time of the loan contract between the borrower and the financial institution, and the time of the above-mentioned ordering of the product corresponds to the time when the borrower or agent borrows money from the financial institution. This corresponds to the time of delivery (at the time of certification). As described above, by using the first to eleventh examples of the electronic commerce method of the present invention, it is possible to establish a money borrowing business by exchanging money as commodities.
具体的に説明すると、 借受人 (発注者) は、 インタ一ネット等のネットワーク を介してローン会社 (受注者, 金融機関) にローンの申し込み (金銭消費貸借契 約) を行なう。 その際、 申し込みとともに借受人のバイオメトリクス情報 (第 1 発注者バイオメトリクス情報) をローン会社に送付する。 ローン会社は、 借受人 に金銭を渡す際、 申し込み時に借受人から受け取ったバイオメ卜リクス情報を借 受人の認証端末に入力し、 そのバイオメトリクス情報を用いて、 金銭の受取人が、 借受を申し込んだ本人であることの認証が実行される。 Specifically, the borrower (the ordering party) applies for a loan (money consumption loan contract) to a loan company (a contractor, a financial institution) through a network such as the Internet. At that time, the borrower's biometrics information (first orderer's biometrics information) is sent to the loan company along with the application. When delivering money to the borrower, the loan company inputs the biometric information received from the borrower at the time of application to the borrower's authentication terminal, and the beneficiary of the loan uses the biometric information to Authentication of the identity of the applicant is performed.
これまで、 金銭の貸借を行なう場合、 借受人 (発注者) は、 ローン会社の窓口 あるいは口一ン会社の A T M (Automated Teller Machine)端末に出向いて金銭 消費貸借契約を行なっていたが、 この第 1 2例で説明したように上記第 1例〜第 1 1例を適用することで、 インタ一ネット等により自宅で金銭消費貸借契約を行 ない、 借受人 (発注者) 本人が自宅で、 もしくは、 借受人 (発注者) の指定した 代理人が金銭を受け取ることができる。 Until now, when lending or lending money, the borrower (the ordering party) had to go to the teller's window or the ATM (Automated Teller Machine) terminal of the leasing company to make a money consumption loan agreement. 12 As explained in the second example, by applying the first to eleventh examples above, a loan contract for money consumption can be made at home using the Internet, etc. The agent designated by the borrower (the ordering party) can receive the money.
また、 口一ン会社 (金融機関) では、 これまで無人店舗などを街中に配置する ことで顧客を獲得していた。 しかし、 無人店舗の A TM端末では夜間に強盗に遭 うなどの問題が発生しており、 このような問題がローン会社にとってビジネス上 のリスクとなっていた。 そこで、 上述した第 1 2例で説明した方法を用いること
で、 借受人は認証端末さえ所持していればインターネットカフェなどのインター ネットに接続可能な場所でローンの申し込みを行ない、 ローン会社はもよりの有 人店舗 (支店) から店員を派遣して金銭の受け渡しを行なうことができるように なる。 従って、 ローン会社は無人店舗を展開する必要が無くなり、 強盗などのピ ジネスリスクを大幅に低減できる。 Until now, a leading company (financial institution) has acquired customers by arranging unmanned stores and other places in the city. However, ATM terminals in unmanned stores had problems such as being robbed at night, and such problems had become a business risk for loan companies. Therefore, the method described in the first and second examples described above should be used. If the borrower has an authentication terminal, he or she can apply for a loan at an Internet cafe or other location that can be connected to the Internet, and the loan company dispatches a clerk from a manned store (branch) to make money. Can be delivered. Therefore, loan companies do not need to open unmanned stores, which can significantly reduce business risks such as robbery.
〔 1一 1 3〕 本発明の電子商取引方法の第 1 3例 [111] 13th Example of Electronic Commerce Method of the Present Invention
本発明の電子商取引方法の第 1 3例 (図示省略) は、 発注者たる借受人と受注 者たる金融機関との間でネットワークを介して商品としての金銭の貸借を行なう 方法であって、 特に、 借受人が返金を行なった傺の履歴を残す方法に係るもので ある。 この第 1 3例では、 以下に第 1〜第 3実施態様として説明するように、 基 本的に上記第 1例〜第 3例とほぼ同様の手順で電子商取引が行なわれる。 A thirteenth example (not shown) of the e-commerce method of the present invention is a method of lending and borrowing money as a product between a borrower as an orderer and a financial institution as an orderer through a network. It relates to a method of leaving a history of the borrower making a refund. In the thirteenth example, as will be described below as first to third embodiments, electronic commerce is basically performed in substantially the same procedure as in the first to third examples.
第 1 3例の第 1実施態様は、 上記第 1例と同様の手順に従って実行されるもの で、 具体的には下記手順① -1〜① -4で実行される。 The first embodiment of the thirteenth example is executed according to the same procedure as in the first example, and specifically, is executed in the following procedures I-1 to I-4.
① -1 借受人と金融機関との金銭消費貸借契約時に、 借受人は借受人本人を 特定するための認証情報を、 借受人所有の認証端末 1 (図 1 A, 図 1 B参照) に 入力する。 ① -1 At the time of the loan contract between the borrower and the financial institution, the borrower inputs the authentication information for identifying the borrower to the borrower's authentication terminal 1 (see FIGS. 1A and 1B). I do.
① -2認証端末 1は、 所定の暗号化キーで認証情報を暗号化し、 暗号化済み 認証情報をネットワークを介して金融機関へ送付するとともに 認証情報と暗号 化済み認証情報を復号するための復号キーとを保持する。 ① -2 Authentication terminal 1 encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information to the financial institution via the network, and decrypts the authentication information and the encrypted authentication information. And hold the key.
① -3 借受人が金融機関に金銭の返金を行なう際に、 金融機関は、 金銭消費 貸借契約時に認証端末 1から受け取つた暗号化済み認証情報を認証端末 1に入力 するとともに、 借受人は、 暗号化済み認証情報を復号するために必要なデータ ① -3 When the borrower refunds money to the financial institution, the financial institution inputs the encrypted authentication information received from the authentication terminal 1 to the authentication terminal 1 at the time of the monetary loan contract, and the borrower Data required to decrypt encrypted authentication information
(例えばパスヮード等の本人認証鍵) を認証端末 1に入力する。 (For example, a personal authentication key such as a password) is input to the authentication terminal 1.
① -4認証端末 1は、 上記手順① -3 で入力されたデータと認証端末 1に予め 保持されている本人認証鍵とを照合し、 これらが一致した場合、 金融機関によつ て入力された暗号化済み認証情報を、 認証端末 1内に保持された復号キーで復号 し、 復号された認証情報と認証端末 1内に保持された認証情報とを照合し、 その 照合結果を認証端末 1内に格納する。 これにより、 借受人本人が返金を行なって いることが認証され、 その返金履歴が認証端末 1内に残されることになる。
また、 第 1 3例の第 2実施態様は、 上述した第 1 3例の第 1実施態様に、 上記 第 2例と同様の手順を適用して実行されるものである。 つまり、 この第 2実施態 様では、 上記手順① -2 で、 認証端末 1 (図 3参照) は、 認証情報および復号キ —とともに借受人のバイオメトリクス情報を保持し、 上記手順① -3 で、 借受人 は、 暗号化済み認証情報を復号するために必要なデータとして自身のバイオメト リクス情報を認証端末 1に入力し、 上記手順① -4で、 認証端末 1は、 金銭返金 時に借受人によって入力されたバイオメトリクス情報と認証端末 1内に予め保持 されているバイオメトリクス情報とを照合し、 これらのバイオメトリクス情報が 一致した場合に、 暗号化済み認証情報を、 認証端末 1内に保持された復号キーで 復号する。 ①-4 The authentication terminal 1 checks the data entered in the above step ②-3 against the personal authentication key stored in the authentication terminal 1 in advance, and if they match, it is input by the financial institution. Decrypts the encrypted authentication information with the decryption key held in the authentication terminal 1, compares the decrypted authentication information with the authentication information held in the authentication terminal 1, and compares the matching result with the authentication terminal 1. Store in. As a result, it is authenticated that the borrower has made the refund, and the refund history is left in the authentication terminal 1. The second embodiment of the thirteenth example is executed by applying the same procedure as that of the second example to the first embodiment of the thirteenth example. That is, in the second embodiment, in step ①-2 above, the authentication terminal 1 (see FIG. 3) holds the borrower's biometric information together with the authentication information and the decryption key, and in step ①-3 above. However, the borrower inputs his / her biometric information to the authentication terminal 1 as data necessary for decrypting the encrypted authentication information, and in the above procedure ①-4, the authentication terminal 1 The input biometrics information is compared with the biometrics information stored in the authentication terminal 1 in advance, and if the biometrics information matches, the encrypted authentication information is stored in the authentication terminal 1. Decrypt with the decryption key.
さらに、 第 1 3例の第 3実施態様は、 上記第 3例と同様の手順に従って実行さ れるもので、 具体的には下記手順② -1〜② -4で実行される。 Furthermore, the third embodiment of the thirteenth example is executed according to the same procedure as that of the third example, and specifically, is executed in the following procedures I-1 to I-4.
② -1 借受人と金融機関との金銭消費貸借契約時に、 借受人 (発注者) は借 受人本人を特定するための第 1発注者パイオメトリクス情報を、 借受人所有の認 証端末 4 (図 4 A, 図 4 B参照) に入力する。 ②-1 At the time of the loan contract between the borrower and the financial institution, the borrower (the ordering party) sends the first ordering party's pyrometrics information for identifying the borrower to the borrower's authentication terminal 4 ( (See Figure 4A and 4B).
② -2認証端末 4は、 所定の暗号化キーで第 1発注者バイオメトリクス情報 を暗号化し、 暗号化済み第 1発注者バイオメ卜リクス情報をネットワークを介し て金融機関へ送付するとともに、 暗号化済み第 1発注者バイオメトリクス情報を 復号するための復号キーを保持する。 ② -2 authentication terminal 4 encrypts the first orderer's biometrics information with a predetermined encryption key, sends the encrypted first orderer's biometrics information to the financial institution via the network, and encrypts it. Holds the decryption key for decrypting the first orderer's biometrics information.
② -3借受人が金融機関に金銭の返金を行なう際に、 金融機関は、 金銭消費 貸借契約時に認証端末 4から受け取つた暗号化済み第 1発注者バイオメトリクス 情報を認証端末 4に入力するとともに、 借受人 (発注者) は、 借受人本人を特定 するための第 2発注者バイオメトリクス情報を認証端末 4に入力する。 ②-3 When the borrower refunds money to the financial institution, the financial institution inputs the encrypted first orderer biometrics information received from the authentication terminal 4 at the time of the monetary loan contract to the authentication terminal 4, The borrower (the ordering party) inputs the second ordering party biometrics information for identifying the borrower into the authentication terminal 4.
② -4認証端末 4は、 金融機関によって入力された暗号化済み第 1発注者バ ィオメトリクス情報を、 認証端末 4内に保持された復号キーで復号し、 復号され た第 1発注者バイオメトリクス情報と上記手順② -3 で入力された第 2発注者バ ィオメトリクス情報とを照合し、 その照合結果を認証端末 4内に格納する。 これ により、 借受人本人が返金を行なっていることが認証され、 その返金履歴が認証 端末 4内に残されることになる。
この第 1 3例の方法を用いることにより、 上記第 1 2例の方法で金銭を借り受 けた借受人がローン会社 (金融機関) に返金する際、 上述のごとく、 バイオメト リクス情報を含む認証情報を用いて借受人本人が返金を行なっていることが認証 され、 その返金履歴を認証端末 1 , 4内に確実に残することができる。 ② -4 Authentication terminal 4 decrypts the encrypted first orderer biometrics information input by the financial institution with the decryption key held in authentication terminal 4, and decrypts the first orderer biometrics information. It is compared with the second orderer biometrics information input in the above procedure ②-3, and the matching result is stored in the authentication terminal 4. As a result, it is authenticated that the borrower has made the refund, and the refund history is left in the authentication terminal 4. By using the method of the 13th example, when the borrower who borrowed money by the method of the 12th example described above returns to the loan company (financial institution), as described above, the authentication information including the biometric information is used. It is authenticated that the borrower has made a refund by using, and the refund history can be reliably left in the authentication terminals 1 and 4.
なお、 この第 1 3例に上記第 8例〜第 1 0例で説明した方法をさらに適用する ことにより、 借受人に代わって、 この借受人指定の代理人が返金認証を行なえる とともにその返金履歴を認証端末に残すことができる。 また、 この第 1 3例に上 記第 4例〜第 7例で説明した方法をさらに適用してもよく、 この場合、 上記第 4 例〜第 7例のそれぞれと同様の作用効果を得ることができる。 In addition, by further applying the methods described in the eighth to tenth examples to the thirteenth example, the agent designated by the borrower can authenticate the refund on behalf of the borrower and refund the money. The history can be left in the authentication terminal. The method described in the fourth to seventh examples may be further applied to the thirteenth example. In this case, the same operation and effect as those in the fourth to seventh examples are obtained. Can be.
〔1— 1 4〕 本発明の電子商取引方法の第 1 4例 [1-1 4] 14th Example of Electronic Commerce Method of the Present Invention
本発明の電子商取引方法の第 1 4例 (図示省略) は、 送金者が、 この送金者の 端末によりネットワークを介して金融機関に、 送金者の口座から受取人への送金 を依頼する方法である。 具体的には、 送金者と受取人とが離れた場所に居る場合 であって-. 送金者所有の端末と受取人所有の認証端末がネッ卜ワークを介して相 互に通信可能に接続されており、 上記金融機関に口座を有していない受取人に送 金するための方法である。 この第 1 4例では、 以下に第 1〜第 3実施態様として 説明するように、 基本的に上記第 1例〜第 3例とほぼ同様の手順で電子商取引が 行なわれる。 The 14th example (not shown) of the e-commerce method of the present invention is a method in which a remitter requests a financial institution via a network from a remitter's terminal to transfer money from a remitter's account to a receiver. is there. Specifically, the case where the sender and the receiver are separated from each other.-The terminal owned by the sender and the authentication terminal owned by the receiver are connected to be able to communicate with each other via a network. This is a method for remittance to recipients who do not have an account with the above financial institution. In the fourteenth example, as will be described below as first to third embodiments, electronic commerce is basically performed in substantially the same procedure as in the first to third examples.
第 1 4例の第 1実施態様は、 上記第 1例と同様の手順に従って実行されるもの で、 具体的には下記手順③ -1〜③ -6で実行される。 The first embodiment of the 14th example is executed according to the same procedure as the above-mentioned first example, and specifically, is executed in the following steps ③-1 to ③-6.
③ -1 受取人は受取人本人を特定するための認証情報を、 受取人所有の認証 端末 1 (図 1 A, 図 1 B参照) に入力する。 ③ -1 The recipient inputs authentication information for identifying the recipient to the recipient's own authentication terminal 1 (see Fig. 1A and Fig. 1B).
③ -2認証端末 1は、 所定の暗号化キ一で認証情報を暗号化し、 暗号化済み 認証情報をネッ卜ワークを介して送金者の端末へ送付するとともに、 認証情報と 暗号化済み認証情報を復号するための復号キーとを保持する。 ③ -2 The authentication terminal 1 encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information to the sender's terminal via the network, and sends the authentication information and the encrypted authentication information. And a decryption key for decrypting.
③ -3 送金者の端末は、 認証端末 1からの暗号化済み認証情報を、 送金依頼 とともに、 ネットワークを介して金融機関に送付する。 ③ -3 The sender's terminal sends the encrypted authentication information from authentication terminal 1 together with the remittance request to the financial institution via the network.
③ -4受取人が送金者からの金銭を受け取る際に、 金融機関の送金担当は、 送金者の端末から受け取った暗号化済み認証情報を受取人所有の認証端末 1に入
力するとともに、 受取人は、 暗号化済み認証情報を復号するために必要なデータ③ -4 When the receiver receives the money from the sender, the remittance officer of the financial institution enters the encrypted authentication information received from the sender's terminal into the authentication terminal 1 owned by the receiver. And the recipient has the data needed to decrypt the encrypted credentials
(例えばパスヮード等の本人認証鍵) を認証端末 1に入力する。 (For example, a personal authentication key such as a password) is input to the authentication terminal 1.
③ -5認証端末 1は、 上記手順③ -4で入力されたデータと認証端末 1に予め 保持されている本人認証鍵とを照合し、 これらが一致した場合、 送金担当によつ て入力された暗号化済み認証情報を、 認証端末 1内に保持された復号キーで復号 し、 復号された認証情報と認証端末 1内に保持された認証情報とを照合し、 これ らの認証情報が一致した場合にその旨を受取人および送金担当に通知する。 ③ -5 Authentication terminal 1 checks the data entered in step ③-4 above against the authentication key stored in authentication terminal 1 in advance, and if they match, it is entered by the person in charge of remittance. Decrypts the encrypted authentication information with the decryption key held in the authentication terminal 1, compares the decrypted authentication information with the authentication information held in the authentication terminal 1, and the authentication information matches. If so, notify the recipient and remittance officer.
③ -6認証端末 1からの照合一致通知を受けて、 送金担当は送金者からの金 銭を受取人に受け渡す。 (3) Upon receiving the matching notification from the -6 authentication terminal 1, the remittance officer hands over the money from the sender to the recipient.
また、 第 1 4例の第 2実施態様は、 上述した第 1 4例の第 1実施態様に、 上記 第 2例と同様の手順を適用して実行されるものである。 つまり、 この第 2実施態 様では、 上記手順③ -2 で、 認証端末 1 (図 3参照) は、 認証情報および復号キ 一とともに発注者のバイオメトリクス情報を保持し、 上記手順③ -4で、 受取人 は、 暗号化済み認証情報を復号するために必要なデ一夕として自身のバイオメト リクス情報を認証端末 1に入力し、 上記手順③ -5 で、 認証端末 1は、 金銭受取 時に受取人によって入力されたバイオメトリクス情報と認証端末 1内に予め保持 されているバイオメトリクス情報とを照合し、 これらのバイオメトリクス情報が 一致した場合に、 暗号化済み認証情報を 認証端末 1内に保持された復号キーで 復号する。 Further, the second embodiment of the fourteenth example is executed by applying the same procedure as that of the second example to the first embodiment of the fourteenth example described above. That is, in the second embodiment, in step ③-2 above, the authentication terminal 1 (see FIG. 3) holds the biometric information of the orderer along with the authentication information and the decryption key, and in step ③-4 above. The recipient inputs his / her biometric information to the authentication terminal 1 as a necessary data for decrypting the encrypted authentication information, and in the above step ③-5, the authentication terminal 1 receives the money at the time of receiving the money. The biometric information input by a person is compared with the biometric information stored in the authentication terminal 1 in advance, and if the biometric information matches, the encrypted authentication information is stored in the authentication terminal 1. Decrypt with the decryption key.
さらに、 第 1 4例の第 3実施態様は、 上記第 3例と同様の手順に従つて実行さ れるもので、 具体的には下記手順④ -1〜④ -6で実行される。 Further, the third embodiment of the fourteenth example is executed according to the same procedure as that of the third example, and specifically, is executed by the following procedures I-1 to I-6.
④ -1 受取人は受取人本人を特定するための第 1受取人バイオメトリクス情 報を、 受取人の認証端末 4 (図 4 A, 図 4 B参照) に入力する。 ④-1 The recipient inputs the first recipient biometric information for identifying the recipient to the recipient's authentication terminal 4 (see FIGS. 4A and 4B).
④ -2 認証端末 4は、 所定の暗号化キーで第 1受取人バイオメトリクス情報 を暗号化し、 暗号化済み第 1受取人バイオメトリクス情報をネットワークを介し て送金者の端末へ送付するとともに、 暗号化済み第 1受取人バイオメトリクス情 報を復号するための復号鍵を保持する。 ' ④-2 The authentication terminal 4 encrypts the first recipient biometric information with a predetermined encryption key, sends the encrypted first recipient biometric information to the sender terminal via the network, and encrypts the first recipient biometric information. Holds a decryption key for decrypting the encrypted first recipient biometric information. '
④ -3 送金者の端末は、 認証端末 4からの暗号化済み第 1受取人バイオメト リクス情報を、 送金依頼とともに、 ネットワークを介して金融機関に送付する。
④ -4受取人が送金者からの金銭を受け取る際に、 金融機関の送金担当は、 送金者の端末から受け取つた暗号化済み第 1受取人バイオメトリクス情報を認証 端末 4に入力するとともに、 受取人は、 受取人本人を特定するための第 2受取人 バイオメトリクス情報を認証端末 4に入力する。 ④-3 The sender's terminal sends the encrypted first recipient biometrics information from the authentication terminal 4 together with the remittance request to the financial institution via the network. -4 -4 When the receiver receives the money from the sender, the remittance officer of the financial institution inputs the encrypted first receiver biometrics information received from the sender's terminal to the authentication terminal 4 and receives it. The person inputs the second recipient biometric information for identifying the recipient to the authentication terminal 4.
④ -5 認証端末 4は、 送金担当によって入力された暗号化済み第 1受取人バ ィオメトリクス情報を、 認証端末 4内に保持された復号キーで復号し、 復号され た第 1受取人バイオメトリクス情報と上記手順④ -4 で入力された第 2受取人バ ィオメトリクス情報とを照合し、 これらのパイオメトリクス情報が一致した場合 にその旨を受取人および送金担当に通知する。 ④ -5 The authentication terminal 4 decrypts the encrypted first recipient biometrics information input by the remittance officer with the decryption key held in the authentication terminal 4, and decrypts the decrypted first recipient biometrics information. The information is compared with the second recipient's biometrics information input in step IV-4 above, and if the pieces of the biometrics information match, the fact is notified to the recipient and the person in charge of remittance.
④ -6 認証端末 4からの照合一致通知を受けて、 送金担当は送金者からの金 銭を受取人に受け渡す。 ④-6 Upon receiving the matching match notification from the authentication terminal 4, the remittance officer hands over the money from the sender to the recipient.
この第 1 4例のように、 本発明の電子商取引方法は、 第 1 2例や第 1 3例で説 明した金銭の賃借のほか、 送金者から受取人への送金にも利用される。 これまで、 送金者が受取人に現金を送金する場合、 送金者の口座から受取人の口座へ送金す る口座間送金か、 送金者が所持する現金を現金書留にて送金する手段が一般的で あつたが、 上記第 1 4例の方法を用いることにより、 送金者の口座から受取人へ 直接、 受取人の口座を経ることなく送金することができる。 これにより、 受取人 が口座間送金可能な口座を所持していない場合であっても送金が可能となる。 特に、 第 1 4例では、 上述した通り送金者と受取人とが離れた場所に居る場合 に適用される。 具体的には、 送金者が、 例えばイン夕一ネットショッピングを行 なったことに伴いショップ (受取人) に送金する場合や、 遠隔地の家族に仕送り を行なう場合に適用される。 この場合、 上述した通り、 受取人所有の端末が認証 端末 1, 4として用いられる。 また、 受取人が金融機関の窓口に認証端末 1, 4 を所持して出向き、 この窓口で上記手順③ -4〜③ -6 もしくは④ -4〜④ -6 を行な つて金銭を受け取ってもよいし、 金融機関の送金担当が受取人の自宅まで訪問し、 その自宅で上記手順③ -4〜③ -6 もしくは④ -4〜④ -6 を行なって金銭を受け渡し てもよい。 As in the 14th example, the electronic commerce method of the present invention is used not only for renting money as described in the 12th and 13th examples, but also for remittance from a sender to a receiver. Until now, when a sender remits cash to a recipient, it is common practice to transfer money from the sender's account to the recipient's account, or to transfer the cash held by the sender by registered mail. However, by using the method of the 14th example, it is possible to transfer money directly from the sender's account to the receiver without going through the receiver's account. This allows remittance even if the recipient does not have an account that can transfer money between accounts. In particular, the 14th example is applied when the sender and the receiver are separated from each other as described above. Specifically, this applies to the case where the sender remits money to a shop (recipient) due to, for example, online shopping on the Internet, or to send money to a remote family member. In this case, the terminals owned by the recipient are used as the authentication terminals 1 and 4 as described above. Also, if the recipient goes to the counter of the financial institution with the authentication terminals 1 and 4 and receives money by performing the above steps ③ -4 to ③ -6 or ④ -4 to こ の -6 at this counter. Alternatively, the remittance staff of the financial institution may visit the recipient's home and perform the above steps ③ -4 to ③ -6 or ④ -4 to -6 -6 to transfer the money.
なお、 この第 1 4例に上記第 8例〜第 1 0例で説明した方法をさらに適用する ことにより、 受取人に代わって、 この受取人指定の代理人が送金者からの金銭を
受け取ることが可能になる。 また、 この第 1 4例に上記第 4例〜第 7例で説明し た方法をさらに適用してもよく、 この場合、 上記第 4例〜第 7例のそれぞれと同 様の作用効果を得ることができる。 In addition, by further applying the method described in the eighth example to the tenth example to the 14th example, the agent designated by the recipient replaces the money from the remitter on behalf of the recipient. It will be possible to receive. Further, the method described in the fourth to seventh examples may be further applied to the fourteenth example. In this case, the same operation and effect as those in the fourth to seventh examples are obtained. be able to.
〔 1一 1 5〕 本発明の電子商取引方法の第 1 5例 [1-15-1] 15th example of electronic commerce method of the present invention
本発明の電子商取引方法の第 1 5例 (図示省略) は、 送金者が、 上記第 1 4例 のごとく送金者の端末ではなく、 受取人の認証端末によりネットワークを介して 金融機関に、 送金者の口座から受取人への送金を依頼する方法である。 具体的に は、 送金者と受取人とが同じ場所に居る場合であって、 例えばショップ等の店頭 にある端末 (受取人所有の端末) が認証端末として用いられ、 上記金融機関に口 座を有していない受取人に送金するための方法である。 この第 1 5例では、 以下 に第 1〜第 3実施態様として説明するように、 基本的に上記第 1例〜第 3例とほ ぼ同様の手順で電子商取引が行なわれる。 In the fifteenth example (not shown) of the e-commerce method of the present invention, the remittance is sent to a financial institution via a network by a recipient's authentication terminal instead of the sender's terminal as in the above-described 14th example. Requesting remittance from the recipient's account to the recipient. Specifically, when the sender and the receiver are in the same place, for example, a terminal (a terminal owned by the receiver) at a store such as a shop is used as an authentication terminal, and the account is sent to the financial institution. This is a method for sending money to recipients who do not have it. In the fifteenth example, as will be described below as first to third embodiments, electronic commerce is basically performed in substantially the same procedure as in the first to third examples.
第 1 5例の第 1実施態様は、 上記第 1例と同様の手順に従って実行されるもの で、 具体的には下記手順⑤ -1〜⑤ -5で実行される。 The first embodiment of the fifteenth example is executed according to the same procedure as in the first example, and specifically, is executed in the following procedures I-1 to I-5.
⑤ -1 受取人は受取人本人を特定するための認証情報を、 受取人所有の認証 端末 1 (図 1 A, 図 1 B参照) に入力する。 ⑤ -1 The recipient inputs authentication information for identifying the recipient to the recipient's own authentication terminal 1 (see FIGS. 1A and 1B).
⑤ -2認証端末 1は、 所定の暗号化キーで認証情報を暗号化し、 暗号化済み 認証情報と送金依頼とをネットワークを介して金融機関へ送付するとともに、 認 証情報と暗号化済み認証情報を復号するための復号キーとを保持する。 ⑤-2 The authentication terminal 1 encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information and the remittance request to the financial institution via the network, and authenticates the authentication information and the encrypted authentication information. And a decryption key for decrypting.
(D-3 受取人が送金者からの金銭を受け取る際に、 金融機関の送金担当は、 認証端末 1から受け取つた暗号化済み認証情報を認証端末 1に入力するとともに、 受取人は、 暗号化済み認証情報を復号するために必要なデータ (例えばパスヮー ド等の本人認証鍵) を認証端末 1に入力する。 (D-3 When the receiver receives the money from the sender, the remittance officer of the financial institution inputs the encrypted authentication information received from the authentication terminal 1 to the authentication terminal 1, and the receiver The data necessary for decrypting the authenticated authentication information (for example, a personal authentication key such as a password) is input to the authentication terminal 1.
⑤ -4認証端末 1は、 上記手順⑤ -3 で入力されたデータと認証端末 1に予め 保持されている本人認証鍵とを照合し、 これらが一致した場合、 送金担当によつ て入力された暗号化済み認証情報を、 認証端末 1内に保持された復号キーで復号 し、 復号された認証情報と認証端末 1内に保持された認証情報とを照合し、 これ らの認証情報が一致した場合にその旨を受取人および送金担当に通知する。 -4-4 The authentication terminal 1 checks the data entered in the above step -3-3 against the personal authentication key stored in the authentication terminal 1 in advance, and if they match, it is input by the person in charge of remittance. Decrypts the encrypted authentication information with the decryption key held in the authentication terminal 1, compares the decrypted authentication information with the authentication information held in the authentication terminal 1, and the authentication information matches. If so, notify the recipient and remittance officer.
⑤ -5認証端末 1からの照合一致通知を受けて、 送金担当は送金者からの金
銭を受取人に受け渡す。 -5 -5 Upon receipt of the matching notification from authentication terminal 1, remittance officer Deliver the money to the recipient.
また、 第 1 5例の第 2実施態様は、 上述した第 1 5例の第 1実施態様に、 上記 第 2例と同様の手順を適用して実行されるものである。 つまり、 この第 2実施態 様では、 上記手順⑤ -2 で、 認証端末 1 (図 3参照) は、 認証情報および復号キ 一とともに発注者のバイオメトリクス情報を保持し、 上記手順⑤ -3 で、 受取人 は、 暗号化済み認証情報を復号するために必要なデ一夕として自身のバイオメト リクス情報を認証端末 1に入力し、 上記手順⑤ -4で、 認証端末 1は、 金銭受取 時に受取人によって入力されたバイオメトリクス情報と認証端末 1内に予め保持 されているバイオメトリクス情報とを照合し、 これらのバイオメトリクス情報が 一致した場合に、 暗号化済み認証情報を、 認証端末 1内に保持された復号キーで 復号する。 Further, the second embodiment of the fifteenth example is executed by applying the same procedure as that of the second example to the first embodiment of the fifteenth example described above. That is, in the second embodiment, in the above procedure ⑤-2, the authentication terminal 1 (see FIG. 3) holds the biometric information of the orderer together with the authentication information and the decryption key, and in the above procedure ⑤-3, The recipient inputs his / her biometric information to the authentication terminal 1 as a necessary data for decrypting the encrypted authentication information, and in the above step ⑤-4, the authentication terminal 1 The biometric information input by a person is compared with the biometric information stored in the authentication terminal 1 in advance, and when the biometric information matches, the encrypted authentication information is stored in the authentication terminal 1. Decrypt with the stored decryption key.
さらに、 第 1 5例の第 3実施態様は、 上記第 3例と同様の手順に従って実行さ れるもので、 具体的には下記手順⑥ -1〜⑥ -5で実行される。 Further, the third embodiment of the fifteenth example is executed according to the same procedure as that of the third example, and specifically, is executed by the following procedures I-1 to I-5.
⑥ -1 受取人は受取人本人を特定するための第 1受取人バイオメトリクス情 報を、 受取人所有の認証端末 4 (図 4 A, 図 4 B参照) に入力する。 ⑥-1 The recipient inputs the first recipient biometric information for identifying the recipient to the recipient's own authentication terminal 4 (see FIGS. 4A and 4B).
⑥ -2認証端末 4は、 所定の暗号化キーで第 1受取人バイオメトリクス情報 を暗号化し、 暗号化済み第 1受取人バイオメ卜リクス情報と送金依頼とをネット ワークを介して金融機関へ送付するとともに、 暗号化済み第 1受取人バイオメ卜 リクス情報を復号するための復号キ一を保持する。 ⑥-2 Authentication terminal 4 encrypts the first recipient biometric information with a predetermined encryption key, and sends the encrypted first recipient biometric information and the remittance request to the financial institution via the network. And holds a decryption key for decrypting the encrypted first recipient biometric information.
⑥ -3 受取人が送金者からの金銭を受け取る際に、 金融機関の送金担当は、 認証端末 4から受け取つた暗号化済み第 1受取人バイオメトリクス情報を認証端 末 4に入力するとともに、 受取人は、 受取人本人を特定するための第 2受取人バ ィオメトリクス情報を認証端末 4に入力する。 -3 -3 When the receiver receives the money from the sender, the remittance officer of the financial institution inputs the encrypted first receiver biometrics information received from the authentication terminal 4 to the authentication terminal 4 and receives it. The person inputs second recipient biometrics information for identifying the recipient to the authentication terminal 4.
⑥ -4認証端末 4は、 送金担当によって入力された暗号化済み第 1受取人バ ィオメトリクス情報を、 認証端末 4内に保持された復号キーで復号し、 復号され た第 1受取人バイオメトリクス情報と上記手順⑥ -3 で入力された第 2受取人バ ィオメトリクス情報とを照合し、 これらのバイオメトリクス情報が一致した場合 にその旨を受取人および送金担当に通知する。 -4-4 The authentication terminal 4 decrypts the encrypted first recipient biometrics information input by the remittance officer with the decryption key held in the authentication terminal 4, and decrypts the decrypted first recipient biometrics information. The biometrics information is compared with the second recipient biometrics information entered in the above procedure III-3, and when the biometrics information matches, the fact is notified to the recipient and the remitter.
⑥ -5 認証端末 4からの照合一致通知を受けて、 送金担当は送金者からの金
銭を受取人に受け渡す。 -5 -5 Receipt of a matching match from authentication terminal 4 Deliver the money to the recipient.
この第 1 5例の方法を用いることにより、 第 1 4例と同様、 送金者の口座から 受取人へ直接、 受取人の口座を経ることなく送金することができる。 これにより、 受取人が口座間送金可能な口座を所持していない場合であっても送金が可能とな る。 By using the method of the fifteenth example, it is possible to transfer money directly from the sender's account to the receiver without going through the receiver's account, as in the first example. This allows remittance even if the recipient does not have an account that allows remittance between accounts.
特に、 第 1 5例では、 上述した通り送金者と受取人とが同じ場所にいる場合に 適用される。 具体的には、 送金者がショップ等の店頭で商品を購入する場合など に適用される。 この場合、 ショップの経営者等が受取人になるほか、 店頭にそな えられたショップの端末が認証端末 1, 4として用いられる。 また、 第 1 5例に おいても、 第 1 4例と同様、 受取人が金融機関の窓口に認証端末 1 , 4を所持し て出向き、 この窓口で上記手順⑤ -3〜⑤ -5 もしくは⑥ -3〜⑥ -5 を行なって金銭 を受け取ってもよいし、 金融機関の送金担当が受取人の自宅まで訪問し、 その自 宅で上記手順上記手順⑤ -3〜⑤ -5 もしくは⑥ -3〜⑥ -5 を行なって金銭を受け渡 してもよい。 In particular, the fifteenth example applies when the sender and the recipient are at the same place as described above. Specifically, it is applied when the remitter purchases goods at stores such as shops. In this case, the owner of the shop becomes the recipient, and the terminals of the shop provided at the store are used as the authentication terminals 1 and 4. Also, in the 15th example, as in the 14th example, the recipient goes out with the authentication terminals 1 and 4 at the counter of the financial institution, and at this window, the above-mentioned procedures -3-3 to -5-5 orよ い -3 to ⑥ -5 may be used to receive the money, or the remittance manager of the financial institution visits the recipient's home and performs the above procedure そ の -3 to ⑤ -5 or ⑥- You may transfer money by performing 3 ~ ⑥-5.
なお、 この第 1 5例に上記第 8例〜第 1 0例で説明した方法をさらに適用する ことにより、 受取人に代わって、 この受取人指定の代理人が送金者からの金銭を 受け取ることが可能になる。 また、 この第 1 5例に上記第 4例〜第 7例で説明し た方法をさらに適用してもよく この場合、 上記第 4例〜第 7例のそれぞれと同 様の作用効果を得ることができる。 By further applying the method described in the eighth to tenth examples to the fifteenth example, the agent designated by the beneficiary can receive money from the remitter on behalf of the beneficiary. Becomes possible. Further, the method described in the fourth to seventh examples may be further applied to the fifteenth example, and in this case, the same operation and effect as those in the fourth to seventh examples are obtained. Can be.
〔2〕 本発明の電子商取引システムおよび認証端末 [2] Electronic commerce system and authentication terminal of the present invention
本発明の電子商取引システムおよび認証端末の構成例およびその動作について、 以下に説明する。 A configuration example and operation of the electronic commerce system and the authentication terminal of the present invention will be described below.
〔 2— 1〕 電子商取引システムおよび認証端末の第 1構成例 [2-1] First configuration example of e-commerce system and authentication terminal
図 1 3は本発明の電子商取引システムおよび認証端末の第 1構成例を示すプロ ック図である。 この図 1 3に示す第 1構成例は、 上述した電子商取引方法の第 1 例および第 4例を実現するためのものである。 FIG. 13 is a block diagram showing a first configuration example of the electronic commerce system and the authentication terminal of the present invention. The first configuration example shown in FIG. 13 is for realizing the first and fourth examples of the electronic commerce method described above.
この第 1構成例の電子商取引システムは、 受注者に対する商品の発注を行なう とともに商品の受取時に発注者本人の認証を行なう、 発注者側の認証端末 1と、 この認証端末 1と受注者との間で情報のやり取りを行なうネットワーク 2と、 認
証端末 1からネットワーク 2を介して送られてきた受注情報を保持する、 受注者 側の受注情報保持部 3とをそなえて構成されている。 The e-commerce system of the first configuration example includes an orderer-side authentication terminal 1 that places an order for a product to a contractor and authenticates the orderer when the product is received, and a communication between the authentication terminal 1 and the contractor. Network 2 for exchanging information between It comprises an order information holding unit 3 on the order receiving side, which holds the order information sent from the certificate terminal 1 via the network 2.
そして、 この第 1構成例における認証端末 1は、 データ入力部 14, 認証情報 保持部 10, 暗号化キー生成部 21, 暗号化部 1 1, 出力イン夕フェース部 1 9, 復号キ一保持部 12, パスワード保持部 13, 入力インタフェース部 20, ュ一 ザ認証部 15, 認証情報復号部 16, 認証情報照合部 17および復号キー消去部 The authentication terminal 1 in the first configuration example includes a data input unit 14, an authentication information storage unit 10, an encryption key generation unit 21, an encryption unit 11, an output interface unit 19, and a decryption key storage unit. 12, Password storage unit 13, Input interface unit 20, User authentication unit 15, Authentication information decryption unit 16, Authentication information collation unit 17, and decryption key deletion unit
22をそなえて構成されている。 It is configured with 22.
データ入力部 14は、 商品の発注時に、 発注者本人を特定するための認証情報 (例えばパスワード) を入力する認証情報入力部としての機能と、 商品の納品時 に発注者によりパスワード (暗号化済み認証情報を復号するために必要なデー タ) を入力するデータ入力部としての機能を果たすものである。 The data input section 14 functions as an authentication information input section for inputting authentication information (for example, a password) for identifying the orderer when placing an order for a product, and a password (encrypted when the product is delivered). It functions as a data input unit for inputting data necessary to decrypt authentication information.
認証情報保持部 10は、 データ入力部 14から入力された認証情報を保持する ものである。 The authentication information holding unit 10 holds the authentication information input from the data input unit 14.
暗号化キー生成部 (暗号鍵生成部) 21は、 商品の発注を行なう都度、 所定の 暗号化キー (暗号鍵) と、 この暗号化キーによって暗号化された情報を復号する ための復号キー (復号鍵) を生成するものである。 Each time a product is ordered, an encryption key generation unit (encryption key generation unit) 21 includes a predetermined encryption key (encryption key) and a decryption key (decryption key for decrypting information encrypted by the encryption key). (Decryption key).
暗号化部 1 1は、 データ入力部 14から入力された認証情報を、 暗号化キー生 成部 21によって生成された暗号化キーで暗号化するものである。 The encryption unit 11 encrypts the authentication information input from the data input unit 14 with the encryption key generated by the encryption key generation unit 21.
出力インタフェース部 (出力 I/F) 19は、 暗号化部 1 1によって喑号化さ れた暗号化済み認証情報を発注伝票 (品名, 個数, 金額, 納入先などの情報) と ともに、 受注情報として、 ネットワーク 2を介して受注者 (受注情報保持部 3 ) へ送付するほか、 後述する認証情報照合部 17による照合結果を受注者 (受注情 報保持部 3) へ通知するためのものである。 The output interface unit (output I / F) 19 uses the encrypted authentication information encoded by the encryption unit 11 1 together with the order slip (information on the product name, quantity, amount, delivery address, etc.) and the order information. In addition to sending to the contractor (order information holding unit 3) via the network 2 and notifying the contractor (order information holding unit 3) of the verification result by the authentication information matching unit 17 described later. .
復号キー保持部 (復号鍵保持部) 12は、 暗号化キ一生成部 21によって生成 された、 暗号化済み認証情報を復号するための復号キー (復号鍵) を保持するも のであり、 パスワード保持部 (データ保持部) 13は、 パスワード (暗号化済み 認証情報の復号を許可するために必要なデータ;認証端末 1の正規所有者である ことを認証するためのデータ;本人認証鍵) を予め保持するものである。 The decryption key storage unit (decryption key storage unit) 12 stores the decryption key (decryption key) for decrypting the encrypted authentication information generated by the encryption key generation unit 21, and stores the password. The unit (data holding unit) 13 stores in advance a password (data necessary for permitting decryption of the encrypted authentication information; data for authenticating that the authentication terminal 1 is the authorized owner; an authentication key). To keep.
入力インタフェース部 (入力 IZF) 20は、 商品の納品時に、 受注情報保持
部 3に保持されている暗号化済み認証情報を入力するためのもので、 例えば前述 したコンパクトフラッシュ (登録商標) カード等の媒体用スロットである。 Input interface section (input IZF) 20 holds order information at the time of product delivery This is for inputting the encrypted authentication information held in the unit 3, and is, for example, a slot for a medium such as the compact flash (registered trademark) card described above.
ユーザ認証部 (発注者認証部) 15は、 パスワード保持部 13に予め保持され たパスヮードと商品の納品時に発注者によりデータ入力部 14から入力されたパ スワードとを照合して認証端末 1のユーザの本人認証を行なうもので、 これらの パスワードが一致した場合に、 復号キー保持部 12に保持された復号キーの使用 を許可するものである。 The user authentication unit (orderer authentication unit) 15 compares the password stored in the password storage unit 13 with the password input from the data input unit 14 by the orderer at the time of delivery of the product, and checks the user of the authentication terminal 1. When these passwords match, the use of the decryption key held in the decryption key holding unit 12 is permitted.
認証情報復号部 (復号部) 16は、 発注者認証部 15による照合結果を受けて、 復号キー保持部 12に保持された復号キーを用いて、 入力イン夕フェース部 20 から入力された暗号化済み認証情報を復号するものである。 The authentication information decryption unit (decryption unit) 16 receives the collation result from the orderer authentication unit 15 and uses the decryption key stored in the decryption key storage unit 12 to encrypt the data input from the input interface unit 20. The decrypted authentication information is decrypted.
認証情報照合部 (照合部) 17は、 復号部 16によって復号された認証情報と 認証情報保持部 10に保持された認証情報とを照合し、 その照合結果を発注者, 商品の納品担当および受注者に通知するものである。 The authentication information collating unit (collating unit) 17 collates the authentication information decrypted by the decrypting unit 16 with the authentication information held in the authentication information holding unit 10, and compares the collation result with the orderer, the delivery person of the product, and the order receipt. To notify the person.
復号キー消去部 (復号鍵消去部) 22は、 商品の納品時における照合 (認証情 報照合部 17による照合) を完了した時点で復号キ一保持部 12に保持された復 号キ一を消去するものである。 The decryption key erasing unit (decryption key erasing unit) 22 erases the decryption key held in the decryption key holding unit 12 upon completion of the verification at the time of delivery of the product (verification by the authentication information verification unit 17). Is what you do.
ここで、 認証端末 1は例えばパーソナルコンピュータ等であり、 認証端末 1内 の C P U等が所定の電子商取引プログラムを実行することにより、 上述した喑号 化キー生成部 21, 暗号化部 11, ユーザ認証部 15, 認証情報復号部 16, 認 証情報照合部 17および復号キ一消去部 22としての機能が実現されるようにな つている。 上述した電子商取引プログラムは、 例えばフレキシブルディスク, C D— ROM, CD-R, CD-RW, D VD等のコンピュータ読取可能な記録媒 体に記録された形態で提供される。 この場合、 CPUはその記録媒体から電子商 取引プログラムを読み取って内部記憶装置または外部記憶装置に転送し格納して 用いる。 また、 その電子商取引プログラムを、 例えば磁気ディスク, 光ディスク, 光磁気ディスク等の記憶装置 (記録媒体) に記録しておき、 その記憶装置から通 信回線を介して C P Uに提供するようにしてもよい。 Here, the authentication terminal 1 is, for example, a personal computer or the like, and the CPU or the like in the authentication terminal 1 executes a predetermined electronic commerce program, thereby obtaining the above-described encryption key generation unit 21, encryption unit 11, user authentication The functions as the section 15, the authentication information decrypting section 16, the authentication information collating section 17, and the decryption key erasing section 22 are realized. The electronic commerce program described above is provided in a form recorded on a computer-readable recording medium such as a flexible disk, a CD-ROM, a CD-R, a CD-RW, and a DVD. In this case, the CPU reads the electronic commerce program from the recording medium, transfers it to the internal storage device or the external storage device, and stores and uses it. Further, the electronic commerce program may be recorded on a storage device (recording medium) such as a magnetic disk, an optical disk, or a magneto-optical disk, and provided to the CPU from the storage device via a communication line. .
さらに、 本実施形態における記録媒体としては、 上述したフレキシブルデイス ク, CD— ROM, CD-R, CD-RW, DVD, 磁気ディスク, 光ディスク,
光磁気ディスクのほか、 I Cカード, R OMカートリッジ, 磁気テープ, パンチ カード, コンピュータの内部記憶装置 (R AMや R OMなどのメモリ), 外部記 憶装置等や、 バーコードなどの符号が印刷された印刷物等の、 コンピュータ読取 可能な種々の媒体を利用することができる。 Further, as the recording medium in the present embodiment, the above-mentioned flexible disk, CD-ROM, CD-R, CD-RW, DVD, magnetic disk, optical disk, In addition to magneto-optical disks, IC cards, ROM cartridges, magnetic tapes, punch cards, computer internal storage devices (memory such as RAM and ROM), external storage devices, and codes such as bar codes are printed. Various computer-readable media such as printed materials can be used.
なお、 デ一夕入力部 1 4は、 例えばパーソナルコンピュータ等におけるキーポ 一ドゃタツチパネルによって構成され、 認証情報保持部 1 0, 復号キー保持部 1 2およびパスワード保持部 1 3は、 例えばパーソナルコンピュータ等における R AMによって構成される。 The data input unit 14 is constituted by, for example, a keypad touch panel in a personal computer or the like. The authentication information storage unit 10, the decryption key storage unit 12, and the password storage unit 13 are, for example, a personal computer or the like. Is composed of RAM.
上述のごとく構成された第 1構成例では、 認証端末 1 のパスワード保持部 1 3に、 予め認証端末 1の所有者 (ユーザ) の認証を行なうためのパスワードを入 力しておく。 発注者は、 発注時に認証情報をデータ入力部 1 4から認証端末 1 に入力する。 認証端末 1 内では、 認証情報保持部 1 0が入力された認証情報を 保持し、 暗号化部 1 1がその認証情報を暗号化して出カインタフエース部 1 9か ら出力し、 ネットワーク 2を経由して受注者の受注情報保持部 3に送信する。 こ のとき、 受注者には発注者の発注情報 (品名、 個数、 金額、 納入先などの情報) も併せて送信される。 暗号化済み認証情報を復号するための復号キーは、 認証端 末 1内の復号キー保持部 1 2に保持されている。 なお、 暗号化キ一は、 暗号化部 1 1による暗号化が完了すると削除される。 In the first configuration example configured as described above, the password for authenticating the owner (user) of the authentication terminal 1 is input to the password holding unit 13 of the authentication terminal 1 in advance. The orderer inputs authentication information from the data input unit 14 to the authentication terminal 1 when placing an order. In the authentication terminal 1, the authentication information holding unit 10 holds the input authentication information, the encryption unit 11 encrypts the authentication information, outputs the encrypted authentication information from the output interface unit 19, and connects the network 2 The information is sent to the order receiving information holding unit 3 of the order receiving party via the Internet. At this time, the ordering party's ordering information (information on product name, quantity, amount, delivery address, etc.) is also sent to the contractor. The decryption key for decrypting the encrypted authentication information is stored in the decryption key storage unit 12 in the authentication terminal 1. The encryption key is deleted when the encryption by the encryption unit 11 is completed.
発注者の認証時 (商品の納品時) には、 受注者 (納品担当) は受注情報保持部 3に保持されている暗号化済み認証情報を発注者の認証端末 1 に送信し入カイ ンタフェース部 2 0から入力する。 このとさ、 暗号化済み認証情報は、 ネットヮ ーク 2を介して認証端末 1に送信 ·入力されてもよいし、 前述した通り、 例えば フラッシュコンパクト (登録商標) カードによって入力されてもよい。 そして、 認証端末 1 では、 発注者がデータ入力部 1 4からパスワードを入力し、 ユーザ 認証部 1 5にてパスヮード保持部 1 3内のパスヮードと入力されたパスヮードと がー致するか否かを判定する。 When the orderer is authenticated (when the product is delivered), the contractor (delivery manager) sends the encrypted authentication information held in the order information holding unit 3 to the orderer's authentication terminal 1 and enters the input interface unit. 2 Input from 0. At this time, the encrypted authentication information may be transmitted and input to the authentication terminal 1 via the network 2, or may be input using, for example, a flash compact (registered trademark) card as described above. In the authentication terminal 1, the orderer inputs a password from the data input unit 14, and the user authentication unit 15 determines whether the password in the password storage unit 13 matches the input password. judge.
これらのパスワードが一致した場合、 ユーザ認証部 1 5は、 入力された暗号化 済み認証情報の復号を許可する復号許可信号を認証情報復号部 1 6に出力する。 認証情報復号部 1 6は、 復号許可信号を受け、 復号キー保持部 1 2内の復号キ一
を用いて暗号化済み認証情報を復号する。 そして、 認証情報照合部 1 7は、 認証 情報保持部 1 0内に保持されている認証情報と認証情報復号部 1 6によって復号 された認証情報とを照合し、 これらの認証情報が一致することを確認する。 認証 端末 1は、 この認証結果を L E Dや液晶パネルなどに表示するとともに、 デジ夕 ルデータとして、 出力インタフェース部 1 9およびネットワーク 2を通じて、 受 注者の受注情報保持部 3に送信する。 When these passwords match, the user authentication unit 15 outputs a decryption permission signal for permitting decryption of the input encrypted authentication information to the authentication information decryption unit 16. The authentication information decryption unit 16 receives the decryption permission signal and receives the decryption key in the decryption key holding unit 12. To decrypt the encrypted authentication information. Then, the authentication information collating unit 17 collates the authentication information held in the authentication information holding unit 10 with the authentication information decrypted by the authentication information decrypting unit 16 and determines that the authentication information matches. Check. The authentication terminal 1 displays the authentication result on an LED, a liquid crystal panel, or the like, and transmits it as digital data to the order receiving information holding unit 3 of the recipient via the output interface unit 19 and the network 2.
また、 第 1構成例では、 発注者が認証端末 1で発注を行なう都度、 暗号化キー 生成部 2 1が、 暗号化キーおよび復号キーを生成している。 そして、 認証情報照 合部 1 7による照合を完了した時点で、 復号キー消去部 2 2が、 復号キー保持部 1 2に保持されている復号キ一を消去している。 Further, in the first configuration example, each time the orderer places an order with the authentication terminal 1, the encryption key generation unit 21 generates an encryption key and a decryption key. Then, when the verification by the authentication information collating unit 17 is completed, the decryption key erasing unit 22 erases the decryption key held in the decryption key holding unit 12.
このようにして、 図 1 3に示す第 1構成例によれば、 図 1 A, 図 I Bおよび図 2を参照しながら説明した電子商取引方法の第 1例と、 図 6 A, 図 6 Bおよび図 7を参照しながら説明した電子商取引方法の第 4例とが実現され、 これら第 1例 および第 4例と同様の作用効果を得ることができる。 Thus, according to the first configuration example shown in FIG. 13, the first example of the e-commerce method described with reference to FIGS. 1A, IB, and FIG. The fourth example of the e-commerce method described with reference to FIG. 7 is realized, and the same operation and effect as those of the first and fourth examples can be obtained.
C 2 - 2 ] 電子商取引システムおよび認証端末の第 2構成例 C 2-2] Second configuration example of electronic commerce system and authentication terminal
図 1 4は本発明の電子商取引システムおよび認証端末の第 2構成例を示すプロ ック図である。 この図 1 4に示す第 2構成例は、 上述した電子商取引方法の第 2 例および第 4例を実現するためのものである。 この第 2構成例も、 図 1 3に示す 第 1構成例とほぼ同様に構成されているが、 この第 2構成例では、 パスワード保 持部 1 3に代えてバイオメトリクス情報保持部 1 3 aがそなえられるとともに、 バイオメトリクスセンサ 1 8が新たにそなえられている。 なお、 図 1 4中、 既述 の符号と同一の符号は同一もしくはほぼ同一の部分を示しているので、 その説明 は省略する。 FIG. 14 is a block diagram showing a second configuration example of the electronic commerce system and the authentication terminal of the present invention. The second configuration example shown in FIG. 14 is for realizing the second and fourth examples of the electronic commerce method described above. This second configuration example is also configured almost in the same way as the first configuration example shown in FIG. 13, but in this second configuration example, the biometric information storage unit 13 a is used instead of the password storage unit 13. , And a new biometric sensor 18 is provided. Note that in FIG. 14, the same reference numerals as those described above indicate the same or almost the same parts, and thus the description thereof will be omitted.
第 2構成例におけるデータ入力部 1 4は、 商品の発注時に、 発注者本人を特定 するための認証情報 (例えばパスワード) を入力する認証情報入力部としての機 能のみを果たすものであり、 バイオメトリクスセンサ 1 8は、 商品の納品時に、 発注者のバイオメトリクス情報 (暗号化済み認証情報を復号するために必要なデ 一夕) を採取して入力するデータ入力部としての機能を果たすものである。 また、 バイオメトリクス情報保持部 (データ保持部) 1 3 aは、 発注者本人を
特定するバイオメ卜リクス情報 (暗号化済み認証情報を復号するために必要なデThe data input unit 14 in the second configuration example only functions as an authentication information input unit for inputting authentication information (for example, a password) for identifying the orderer when ordering a product. The metric sensor 18 functions as a data input unit that collects and inputs biometrics information of the orderer (data required for decrypting the encrypted authentication information) when the product is delivered. is there. In addition, the biometric information storage unit (data storage unit) 13 a Biometric information to be specified (data required to decrypt encrypted authentication information)
—タ;認証端末 1の正規の所有者であることを示す端末所有者としての認証用の データ) を予め保持するものである。 -Data; authentication data as the terminal owner indicating that he is the authorized owner of the authentication terminal 1) is stored in advance.
そして、 第 2構成例では、 ユーザ認証部 1 5が、 バイオメトリクス情報保持部 1 3 aに予め保持されているバイオメトリクス情報とバイオメトリクスセンサ 1 8から入力されたバイオメ卜リクス情報とを照合する。 Then, in the second configuration example, the user authentication unit 15 collates the biometric information stored in advance in the biometric information storage unit 13a with the biometric information input from the biometric sensor 18. .
第 1構成例のュ一ザ認証部 1 5では、 パスワードを用いて認証端末 1のユーザ の本人認証を行なっているが、 この第 2構成例のユーザ認証部 1 5では、 バイオ メトリクス情報を用いて認証端末 1のユーザの本人認証 (つまりバイオメトリク ス認証) を行なっている。 ここで、 バイオメトリクス情報とは、 人間の身体的特 徵 (例えば、 指紋, 掌紋, 網膜, 虹彩, 毛細血管パターン, 顔画像, 声紋など) や、 人間の特定の動作 (サイン, 身振りなど) をデータ化したもののことをいう。 また、 バイオメトリクス認証とは、 2つのバイオメトリクス情報 A, Bを用いて、 バイオメトリクス情報 Aの所有者とバイオメトリクス情報 Bの所有者が同一であ ることを認証する方式である。 なお、 本発明で述べているバイオメトリクス情報 とは、 上記に挙げた例だけでなく、 人間の身体的特徴および人間の特定の動作な ど、 人間の認証が可能な全てのデ一夕を含むものである。 In the first configuration example, the user authentication unit 15 performs the personal authentication of the user of the authentication terminal 1 using a password, but the user authentication unit 15 of the second configuration example uses biometric information. Authentication of the user of the authentication terminal 1 (that is, biometrics authentication). Here, biometric information refers to human physical characteristics (eg, fingerprint, palm print, retina, iris, capillary pattern, face image, voiceprint, etc.) and specific human actions (signs, gestures, etc.). This is what has been converted into data. The biometrics authentication is a method of using two pieces of biometrics information A and B to authenticate that the owner of the biometrics information A and the owner of the biometrics information B are the same. It should be noted that the biometric information described in the present invention includes not only the above-mentioned examples but also all data that can be authenticated by humans, such as physical characteristics of humans and specific actions of humans. It is a thing.
また、 第 2構成例でも、 第 1構成例と同様、 発注者が認証端末 1で発注を行な う都度、 暗号化キー生成部 2 1が、 暗号化キーおよび復号キ一を生成している。 そして、 認証情報照合部 1 7による照合を完了した時点で、 復号キー消去部 2 2 が、 復号キ一保持部 1 2に保持されている復号キーを消去している。 Also, in the second configuration example, similarly to the first configuration example, each time the orderer places an order with the authentication terminal 1, the encryption key generation unit 21 generates an encryption key and a decryption key. . When the verification by the authentication information verification unit 17 is completed, the decryption key deletion unit 22 deletes the decryption key stored in the decryption key storage unit 12.
このようにして、 図 1 4に示す第 2構成例によれば、 図 3を参照しながら説明 した電子商取引方法の第 2例と、 図 6 A, 図 6 Bおよび図 7を参照しながら説明 した電子商取引方法の第 4例とが実現され、 これら第 2例および第 4例と同様の 作用効果を得ることができる。 Thus, according to the second configuration example shown in FIG. 14, the second example of the e-commerce method described with reference to FIG. 3 and the second example of the electronic commerce method described with reference to FIG. 6A, FIG. 6B, and FIG. The fourth example of the e-commerce method described above is realized, and the same operation and effect as those of the second and fourth examples can be obtained.
〔2— 3〕 電子商取引システムおよび認証端末の第 3構成例 [2-3] Third configuration example of e-commerce system and authentication terminal
図 1 5は本発明の電子商取引システムおよび認証端末の第 3構成例を示すプロ ック図である。 この図 1 5に示す第 3構成例は、 上述した電子商取引方法の第 3 例および第 4例を実現するためのものである。
この第 3構成例の電子商取引システムは、 受注者に対する商品の発注を行なう とともに商品の受取時に発注者本人の認証を行なう、 発注者側の認証端末 4と、 この認証端末 4と受注者との間で情報のやり取りを行なうネットワーク 5と、 認 証端末 4からネットワーク 5を介して送られてきた受注情報を保持する、 受注者 側の受注情報保持部 6とをそなえて構成されている。 FIG. 15 is a block diagram showing a third configuration example of the electronic commerce system and the authentication terminal of the present invention. The third configuration example shown in FIG. 15 is for realizing the third and fourth examples of the electronic commerce method described above. The e-commerce system of the third configuration example includes an authentication terminal 4 on the orderer side, which places an order for goods to the contractor and authenticates the orderer when receiving the goods, and a communication between the authentication terminal 4 and the contractor. The system comprises a network 5 for exchanging information between them, and an order information holding unit 6 on the orderer side, which holds order information sent from the authentication terminal 4 via the network 5.
そして、 この第 3構成例における認証端末 4は、 バイオメトリクスセンサ 4 0 , 暗号化キー生成部 4 7, 暗号化部 4 1 , 出力インタフェース部 4 5 , 復号キ一保 持部 4 2 , 入力インタフェース部 4 6, バイオメトリクス情報復号部 4 4, バイ オメトリクス認証部 4 3および復号キ一消去部 4 8をそなえて構成されている。 バイオメトリクスセンサ (バイオメトリクス情報入力部) 4 0は、 発注者のバ ィオメトリクス情報を採取して入力するものである。 The authentication terminal 4 in the third configuration example includes a biometrics sensor 40, an encryption key generation unit 47, an encryption unit 41, an output interface unit 45, a decryption key holding unit 42, an input interface It comprises a unit 46, a biometrics information decryption unit 44, a biometrics authentication unit 43, and a decryption key erasure unit 48. The biometrics sensor (biometrics information input unit) 40 is for collecting and inputting the biometrics information of the orderer.
暗号化キー生成部 (暗号鍵生成部) 4 7は、 商品の発注を行なう都度、 所定の 暗号化キー (暗号鍵) と、 この暗号化キーによって暗号化された情報を復号する ための復号キ一 (復号鍵) を生成するものである。 Each time a product is ordered, an encryption key generation unit (encryption key generation unit) 47 includes a predetermined encryption key (encryption key) and a decryption key for decrypting information encrypted by the encryption key. (Decryption key).
暗号化部 4 1は、 商品の発注時に発注者によってバイオメトリクスセンサ 4 0 から入力された第 1発注者バイオメトリクス情報を、 暗号化キー生成部 4 7によ つて生成された暗号化キーで暗号化するものである。 The encryption unit 41 encrypts the first orderer biometric information input from the biometric sensor 40 by the orderer at the time of ordering the product with the encryption key generated by the encryption key generation unit 47. It becomes something.
出力インタフェース部 (出力 I / F) 4 5は、 暗号化部 4 1によって暗号化さ れた暗号化済み第 1発注者バイオメトリクス情報を発注伝票 (品名, 個数, 金額, 納入先などの情報) とともに、 受注情報として、 ネットワーク 5を介して受注者 (受注情報保持部 6 ) へ送付するほか、 後述するバイオメ卜リクス認証部 4 3に よる認証結果を受注者 (受注情報保持部 6 ) へ通知するためのものである。 The output interface unit (output I / F) 45 is an ordering slip that contains the encrypted first orderer biometrics information encrypted by the encryption unit 41 (information such as product name, quantity, amount, and delivery destination). At the same time, the order information is sent to the order receiving party (order receiving information holding unit 6) via the network 5, and the result of authentication by the biometric authentication unit 43 described later is notified to the order receiving party (order receiving information holding unit 6). It is for doing.
復号キー保持部 (復号鍵保持部) 4 2は、 暗号化キー生成部 4 7によって生成 された、 暗号化済み第 1発注者バイオメトリクス情報を復号するための復号キー (復号鍵) を保持するものである。 The decryption key storage unit (decryption key storage unit) 42 stores a decryption key (decryption key) for decrypting the encrypted first orderer biometric information generated by the encryption key generation unit 47. Things.
入力インタフェース部 (入力 I / F ) 4 6は、 商品の納品時に、 受注情報保持 部 6に保持されている暗号化済み第 1発注者バイオメ卜リクス情報を入力するた めのもので、 例えば前述したコンパクトフラッシュ (登録商標) カード等の媒体 用スロッ卜である。
バイオメトリクス情報復号部 (復号部) 4 4は、 復号キー保持部 4 2に保持さ れた復号キーを用いて、 入力インタフェース部 4 6から入力された暗号化済み第 1発注者パイオメトリクス情報を復号するものである。 The input interface section (input I / F) 46 is used for inputting the encrypted first orderer biometric information stored in the order information storage section 6 when the product is delivered. This is a slot for media such as compact flash (registered trademark) cards. The biometrics information decryption unit (decryption unit) 44 uses the decryption key stored in the decryption key storage unit 42 to convert the encrypted first orderer piometrics information input from the input interface unit 46. It is to decrypt.
バイオメトリクス認証部 (照合部) 4 3は、 バイオメトリクス情報復号部 4 4 によって復号された第 1発注者パイオメ卜リクス情報と商品の納品時に発注者に よってバイオメトリクスセンサ 4 0から入力された第 2発注者バイオメトリクス 情報とを照合し、 その照合結果を発注者, 商品の納品担当および受注者に通知す るものである。 The biometrics authentication unit (collation unit) 43 receives the first orderer's biometrics information decrypted by the biometrics information decryption unit 44 and the first orderer's biometrics information input from the biometric sensor 40 at the time of delivery of the product. (2) It compares the biometric information with the orderer, and notifies the orderer, the person in charge of delivery of the product, and the contractor of the result of the comparison.
復号キー消去部 (復号鍵消去部) 4 8は、 商品の納品時における照合 (バイオ メトリクス認証部 4 3による認証) を完了した時点で復号キ一保持部 4 2に保持 された復号キ一を消去するものである。 The decryption key erasing unit (decryption key erasing unit) 48 stores the decryption key held in the decryption key holding unit 42 when the verification (authentication by the biometric authentication unit 43) at the time of delivery of the product is completed. Is to be erased.
ここで、 第 1構成例と同様、 第 3構成例の認証端末 4も、 例えばパーソナルコ ンピュー夕等であり、 認証端末 4内の C P U等が所定の電子商取引プログラムを 実行することにより、 上述した暗号化キー生成部 4 7, 暗号化部 4 1 , バイオメ トリクス情報復号部 4 4 , バイオメトリクス認証部 4 3および復号キ一消去部 4 8としての機能が実現されるようになっている。 上述した電子商取引プログラム は、 例えばフレキシブルディスク , C D - R OM, C D - R, C D - RW, D V D等のコンピュータ読取可能な記録媒体に記録された形態で提供される。 なお、 復号キ一保持部 4 2は、 例えばパーソナルコンピュータ等における R AMによつ て構成される。 Here, similarly to the first configuration example, the authentication terminal 4 of the third configuration example is, for example, a personal computer, and the above-described operation is performed by executing a predetermined electronic commerce program by the CPU or the like in the authentication terminal 4. The functions as an encryption key generation unit 47, an encryption unit 41, a biometrics information decryption unit 44, a biometrics authentication unit 43, and a decryption key erasure unit 48 are realized. The electronic commerce program described above is provided in a form recorded on a computer-readable recording medium such as a flexible disk, a CD-ROM, a CD-R, a CD-RW, and a DVD. Note that the decryption key holding unit 42 is composed of, for example, a RAM in a personal computer or the like.
上述のごとく構成された第 3構成例の認証端末 4では、 バイオメトリクスセン サ 4 0により発注時に発注者の第 1発注者バイオメトリクス情報を取得し、 これ を暗号化部 4 1で暗号化して受注者の受注情報保持部 6に送信する。 なお、 暗号 化キ一は、 暗号化部 4 1による暗号化が完了すると削除される。 In the authentication terminal 4 of the third configuration example configured as described above, the biometric sensor 40 obtains the first orderer biometrics information of the orderer at the time of ordering, and encrypts the information by the encryption unit 41. The information is transmitted to the order receiving information holding unit 6 of the contractor. Note that the encryption key is deleted when the encryption by the encryption unit 41 is completed.
—方、 発注者の認証時 (商品の納品時) には、 受注者 (納品担当) は受注情報 保持部 6内の暗号化済み第 1発注者バイオメトリクス情報を認証端末 4に送信し 入力イン夕フェース部 4 6から入力する。 このとき、 暗号化済み第 1発注者バイ オメ卜リクス情報は、 ネットワーク 5を介して認証端末 4に送信 ·入力されても よいし、 前述した通り、 例えばフラッシュコンパクト (登録商標) カードによつ
て入力されてもよい。 ' そして、 認証端末 4では、 暗号化済み第 1発注者バイオメトリクス情報をバイ オメトリクス情報復号部 4 4により復号し、 その復号結果をパイオメトリクス認 証部 4 3に送信する。 ここで、 認証端末 4は、 再度、 発注者のバイオメトリクス 情報 (第 2発注者バイオメトリクス情報) を採取する。 そして、 この第 2発注者 バイオメトリクス情報をバイオメトリクス認証部 4 3に入力し、 バイオメトリク ス認証部 4 3ではこれら 2つのバイオメトリクス情報を照合して発注者の本人認 証を行なう。 認証端末 4は、 この認証結果を L E Dや液晶パネルなどに表示する とともに、 デジタルデータとして、 出力インタフエ一ス部 4 5およびネットヮ一 ク 5を通じて、 受注者の受注情報保持部 6に送信する。 On the other hand, when the orderer is authenticated (when the product is delivered), the contractor (delivery manager) sends the encrypted first orderer biometrics information in the order information holding unit 6 to the authentication terminal 4 and inputs the information. Enter from evening face part 4 6. At this time, the encrypted first orderer biometric information may be transmitted and input to the authentication terminal 4 via the network 5, or as described above, for example, by a flash compact (registered trademark) card. May be input. 'Then, in the authentication terminal 4, the encrypted first orderer's biometrics information is decrypted by the biometrics information decryption unit 44, and the decryption result is transmitted to the biometrics authentication unit 43. Here, the authentication terminal 4 collects the orderer's biometrics information (second orderer's biometrics information) again. Then, the second orderer's biometrics information is input to the biometrics authentication unit 43, and the biometrics authentication unit 43 collates the two pieces of biometrics information to authenticate the orderer. The authentication terminal 4 displays the authentication result on an LED, a liquid crystal panel, or the like, and transmits it as digital data to the order receiving information holding unit 6 of the contractor through the output interface unit 45 and the network 5.
また、 第 3構成例でも、 発注者が認証端末 4で発注を行なう都度、 暗号化キー 生成部 4 7が、 暗号化キーおよび復号キーを生成している。 そして、 バイオメト リクス認証部 4 3による認証を完了した時点で、 復号キ一消去部 4 8が、 復号キ —保持部 4 2に保持されている復号キ一を消去している。 Also, in the third configuration example, each time the orderer places an order with the authentication terminal 4, the encryption key generation unit 47 generates an encryption key and a decryption key. When the authentication by the biometrics authentication unit 43 is completed, the decryption key erasing unit 48 erases the decryption key stored in the decryption key storage unit 42.
このようにして、 図 1 5に示す第 3構成例によれば、 図 4 A, 図 4 Bおよび図 5を参照しながら説明した電子商取引方法の第 3例と、 図 6 A, 図 6 Bおよび図 7を参照しながら説明した電子商取引方法の第 4例とが実現され、 これら第 3例 および第 4例と同様の作用効果を得ることができる。 Thus, according to the third configuration example shown in FIG. 15, the third example of the e-commerce method described with reference to FIGS. 4A, 4B and 5, and FIGS. 6A and 6B The fourth example of the e-commerce method described with reference to FIG. 7 is realized, and the same operation and effect as those of the third and fourth examples can be obtained.
〔 2— 4〕 電子商取引システムおよび認証端末の第 4構成例 [2-4] Fourth configuration example of e-commerce system and authentication terminal
図 1 6は本発明の電子商取引システムおよび認証端末の第 4構成例を示すプロ ック図である。 この図 1 6に示す第 4構成例は、 上述した電子商取引方法の第 9 例および第 4例を実現するためのものである。 FIG. 16 is a block diagram showing a fourth configuration example of the electronic commerce system and the authentication terminal of the present invention. The fourth configuration example shown in FIG. 16 is for realizing the ninth and fourth examples of the electronic commerce method described above.
この第 4構成例の電子商取引システムは、 受注者に対する商品の発注を行なう とともに発注者が委任した代理人による商品の受取時に認証を行なう、 発注者側 の認証端末 7と、 この認証端末 7と受注者との間で情報のやり取りを行なうネッ トワーク 8と、 認証端末 7からネットワーク 8を介して送られてきた受注情報を 保持する、 受注者側の受注情報保持部 9とをそなえて構成されている。 The e-commerce system according to the fourth configuration example includes an authentication terminal 7 on the orderer side, which places an order for goods to the contractor and authenticates the goods received by an agent delegated by the orderer; It comprises a network 8 for exchanging information with the contractor, and an order information holding unit 9 on the contractor side, which holds the order information sent from the authentication terminal 7 via the network 8. ing.
そして、 この第 4構成例における認証端末 7は、 バイオメトリクスセンサ 7 0, 暗号化キー生成部 7 9 , 暗号化部 7 1 , 出力インタフェース部 7 7 , 復号キー保
持部 7 2 , バイオメトリクス情報保持部 7 3 , 代理人バイオメトリクス情報保持 部 7 4 , 入力インタフェース部 7 8, バイオメトリクス情報復号部 7 6 , バイオ メトリクス認証部 7 5および復号キー消去部 8 0をそなえて構成されている。 バイオメトリクスセンサ (バイオメトリクス情報入力部) 7 0は、 バイオメト リクス情報を採取して入力するものである。 The authentication terminal 7 in the fourth configuration example includes a biometrics sensor 70, an encryption key generation unit 79, an encryption unit 71, an output interface unit 77, a decryption key storage. Holding unit 72, biometric information holding unit 73, agent biometric information holding unit 74, input interface unit 78, biometric information decoding unit 76, biometric authentication unit 75, and decryption key erasing unit 80 It is configured with. The biometrics sensor (biometrics information input unit) 70 is for collecting and inputting biometrics information.
暗号化キー生成部 (暗号鍵生成部) 7 9は、 商品の発注を行なう都度、 所定の 暗号化キー (暗号鍵) と、 この暗号化キーによって暗号化された情報を復号する ための復号キー (復号鍵) を生成するものである。 The encryption key generation unit (encryption key generation unit) 79 includes a predetermined encryption key (encryption key) and a decryption key for decrypting information encrypted by the encryption key each time a product is ordered. (Decryption key).
暗号化部 7 1は、 商品の発注時に発注者によってバイオメトリクスセンサ 7 0 から入力された第 1発注者パイオメトリクス情報 Aを、 暗号化キー生成部 7 9に よつて生成された暗号化キーで暗号化するものである。 The encryption unit 71 converts the first orderer's biometrics information A input from the biometric sensor 70 by the orderer at the time of ordering the product with the encryption key generated by the encryption key generation unit 79. It is to be encrypted.
出力インタフェース部 (出力 I ZF) 7 7は、 暗号化部 7 1によって喑号化さ れた暗号化済み第 1発注者バイオメトリクス情報 Aを発注伝票 (品名, 個数, 金 額, 納入先などの情報) とともに、 受注情報として、 ネットワーク 8を介して受 注者 (受注情報保持部 9 ) へ送付するほか、 後述するバイオメトリクス認証部 7 5による認証結果を受注者 (受注情報保持部 9 ) へ通知するためのものである。 復号キー保持部 (復号鍵保持部) 7 2は、 暗号化キ一生成部 7 9によって生成 された、 暗号化済み第 1発注者バイオメトリクス情報 Aを復号するための復号キ 一 (復号鍵) を保持するものである。 The output interface unit (output IZF) 77 sends the encrypted first orderer biometrics information A, which has been decrypted by the encryption unit 71, to the order slip (such as the product name, quantity, amount, and delivery destination). Information) and the order information to the order recipient (order information holding unit 9) via the network 8, and the authentication result by the biometric authentication unit 75 described later to the order recipient (order information holding unit 9). It is for notification. The decryption key storage unit (decryption key storage unit) 72 is a decryption key (decryption key) for decrypting the encrypted first orderer biometrics information A generated by the encryption key generation unit 79. Is held.
バイオメトリクス情報保持部 7 3は、 発注者が商品の受取を代理人に委任する 際に、 発注者によってバイオメトリクスセンサ 7 0から入力された第 2発注者パ ィオメトリクス情報 Bを保持するものであり、 代理人バイオメ卜リクス情報保持 部 7 4は、 やはり発注者が商品の受取を代理人に委任する際に、 代理人によって バイオメトリクスセンサ 7 0から入力された第 1代理人バイオメトリクス情報 C を保持するものである。 The biometric information storage unit 73 holds the second orderer biometric information B input from the biometric sensor 70 by the orderer when the orderer entrusts the receipt of the product to the agent. The agent biometric information storage unit 74 also stores the first agent biometric information C input from the biometric sensor 70 by the agent when the orderer delegates the receiving of the goods to the agent. To keep.
入力イン夕フエ一ス部 (入力 I ZF) 7 8は、 商品の納品時に、 受注情報保持 部 9に保持されている暗号化済み第 1発注者バイオメトリクス情報 Aを入力する ためのもので、 例えば前述したコンパクトフラッシュ (登録商標) 力一ド等の媒 体用スロットである。
バイオメトリクス認証部 7 5は、 代理人認証部としての機能 (代理人認証機 能) と発注者認証部としての機能 (発注者認証機能) とを果たすものである。 バ ィオメトリクス認証部 Ί 5の代理人認証機能は、 代理人バイオメトリクス情報保 持部 7 4に保持された第 1代理人パイオメトリクス情報 Cと商品の納品時に代理 人によってバイオメトリクスセンサ 7 0から入力された第 2代理人バイオメトリ クス情報 Dとを照合し、 これらの代理人バイオメ卜リクス情報 A, Bがー致した 場合に、 復号キー保持部 7 2に保持された復号キーの使用を許可する機能である。 バイオメトリクス情報復号部 (復号部) 7 6は、 バイオメトリクス認証部 7 5 の代理人認証機能による照合結果を受けて、 復号キー保持部 7 2に保持された復 号キーを用いて、 入力インタフェース部 7 8から入力された暗号化済み第 1発注 者バイオメトリクス情報 Aを復号するものである。 The input interface section (input I ZF) 78 is used to input the encrypted first orderer biometric information A stored in the order information storage section 9 when the product is delivered. For example, a slot for a medium such as the compact flash (registered trademark) force described above. The biometrics authentication unit 75 performs a function as an agent authentication unit (agent authentication function) and a function as an orderer authentication unit (orderer authentication function). The agent authentication function of the biometrics authentication unit Ί 5 is input from the biometric sensor 70 by the agent at the time of delivery of the first agent pieometrics information C stored in the agent biometrics information storage unit 74 and the product when delivered. When the proxy biometrics information A and B match each other, the use of the decryption key stored in the decryption key storage unit 72 is permitted. Function. The biometrics information decryption unit (decryption unit) 76 receives the result of the verification by the proxy authentication function of the biometrics authentication unit 75 and uses the decryption key held in the decryption key storage unit 72 to input an input interface. It decrypts the encrypted first orderer biometrics information A input from the part 78.
また、 バイオメ卜リクス認証部 7 5の発注者認証機能は、 バイオメトリクス情 報復号部 7 6によって復号された第 1発注者バイオメトリクス情報 Aと発注者バ ィオメトリクス情報保持部 7 3に保持された第 2発注者バイオメトリクス情報 B とを照合し、 その照合結果を発注者, 商品の納品担当および受注者に通知する機 能である。 The orderer authentication function of the biometrics authentication unit 75 was held in the first orderer's biometrics information A decrypted by the biometrics information decryption unit 76 and the orderer's biometrics information storage unit 73. This function matches the second orderer's biometrics information B and notifies the orderer, the person in charge of delivery of the product, and the contractor of the result of the comparison.
復号キー消去部 (復号鍵消去部) 8 0は、 商品の納品時における照合 (バイオ メトリクス認証部 7 5による発注者認証) を完了した時点で復号キー保持部 7 2 に保持された復号キ一を消去するものである。 The decryption key erasing unit (decryption key erasing unit) 80 stores the decryption key held in the decryption key holding unit 72 at the time of completion of verification at the time of product delivery (orderer authentication by the biometric authentication unit 75). Is to be erased.
ここで、 第 1構成例と同様、 第 4構成例の認証端末 7も、 例えばパーソナルコ ンピュ一夕等であり、 認証端末 7内の C P U等が所定の電子商取引プログラムを 実行することにより、 上述した暗号化キー生成部 7 9, 暗号化部 7 1, バイオメ トリクス情報復号部 7 6 , バイオメトリクス認証部 7 5および復号キー消去部 8 0としての機能が実現されるようになっている。 上述した電子商取引プログラム は、 例えばフレキシブルディスク, C D - R OM, C D - R , C D - RW, D V D等のコンピュータ読取可能な記録媒体に記録された形態で提供される。 なお、 復号キー保持部 7 2 , バイオメトリクス情報保持部 7 3および代理人バイオメ卜 リクス情報保持部 7 4は、 例えばパーソナルコンピュータ等における R AMによ つて構成される。
上述のごとく構成された第 4構成例では、 代理人による発注者の本人認証が実 現される。 認証端末 7は、 発注時にバイオメトリクスセンサ 7 0により発注者の バイオメトリクス情報 Aを取得し、 これを暗号化部 7 1で暗号化して受注者の受 注情報保持部 9に送信する。 なお、 暗号化キーは、 暗号化部 7 1による暗号化が 完了すると削除される。 次に、 発注者は発注者の本人認証を代行する代理人を認 証端末 7に登録する。 認証端末 7は、 発注者および代理人のバイオメトリクス情 報 B, Cを取得し、 これらをそれぞれ発注者パイオメ卜リクス情報保持部 7 3お よび代理人バイオメトリクス情報保持部 7 4に保持する。 Here, similarly to the first configuration example, the authentication terminal 7 of the fourth configuration example is, for example, a personal computer, etc., and the CPU or the like in the authentication terminal 7 executes a predetermined electronic commerce program. The functions as an encrypted key generation unit 79, an encryption unit 71, a biometrics information decryption unit 76, a biometrics authentication unit 75, and a decryption key erasure unit 80 are realized. The electronic commerce program described above is provided in a form recorded on a computer-readable recording medium such as a flexible disk, a CD-ROM, a CD-R, a CD-RW, and a DVD. The decryption key storage unit 72, the biometric information storage unit 73, and the agent biometric information storage unit 74 are composed of, for example, a RAM in a personal computer or the like. In the fourth configuration example configured as described above, the authentication of the orderer by the agent is realized. The authentication terminal 7 obtains the biometric information A of the orderer by the biometric sensor 70 at the time of ordering, encrypts the information by the encryption unit 71, and transmits the encrypted information to the order information storage unit 9 of the contractor. Note that the encryption key is deleted when the encryption by the encryption unit 71 is completed. Next, the orderer registers an agent acting on behalf of the orderer on the authentication terminal 7. The authentication terminal 7 acquires the biometric information B and C of the orderer and the agent, and holds them in the orderer's biometric information storage unit 73 and the agent biometric information storage unit 74, respectively.
一方、 発注者の認証時 (商品の納品時) には、 受注者 (納品担当) は受注情報 保持部 9の暗号化済みバイオメトリクス情報を認証端末 7に送信し入カインタフ エース部 7 8から入力する。 このとさ、 暗号化済み第 1発注者バイオメ卜リクス 情報 Aは、 ネットワーク 8を介して認証端末 7に送信 ·入力されてもよいし、 前 述した通り、 例えばフラッシュコンパクト (登録商標) カードによって入力され てもよい。 On the other hand, when the orderer is authenticated (when the product is delivered), the contractor (delivery manager) sends the encrypted biometrics information in the order information holding unit 9 to the authentication terminal 7 and inputs it from the input interface unit 7 8 I do. At this time, the encrypted first orderer biometric information A may be transmitted and input to the authentication terminal 7 via the network 8, or as described above, for example, by a flash compact (registered trademark) card. May be entered.
そして、 代理人は、 代理人のバイオメトリクス情報 Dを認証端末 7 に読み込 ませる。 例えば指紋を用いた照合であれば、 認証端末 7に付設されたバイオメ卜 リクスセンサ 7 0としての指紋センサに指を押し付けてこのセンサに指紋を読み 込ませ、 指紋画像 ひ ィオメ卜リクス情報) を取得する。 バイオメトリクス認証 部 7 5は、 認証時に入力されたバイオメトリクス情報 Dと代理人バイオメトリク ス情報保持部 7 4に保持されているバイオメトリクス情報 Cとを照合し、 代理人 の本人認証を実行する。 その認証結果はバイオメトリクス情報復号部 7 6に出力 される。 代理人認証結果が 「OK」 であれば、 バイオメトリクス情報復号部 7 6 は、 入力インタフェース 7 8から入力された暗号化済みバイオメトリクス情報 A を、 復号キー保持部 7 2に保持された復号キーで復号する。 この後、 バイオメト リクス認証部 7 5は、 復号されたパイオメトリクス情報 Aと発注者バイオメトリ クス情報保持部 7 3に保持されているバイオメトリクス情報 Bとを照合して、 発 注者の本人認証を実行する。 認証端末 7は、 この認証結果を L E Dや液晶パネル などに表示するとともに、 デジタルデータとして、 出力インタフェース部 7 7お よびネットワーク 8を通じて、 受注者の受注情報保持部 9に送信する。
また、 第 4構成例では、 発注者が認証端末 7で発注を行なう都度、 暗号化キー 生成部 7 9が、 暗号化キーおよび復号キーを生成している。 そして、 バイオメ卜 リクス認証部 7 5による認証を完了した時点で、 復号キー消去部 8 0が、 復号キ —保持部 7 2に保持されている復号キ一を消去している。 Then, the agent reads the biometrics information D of the agent into the authentication terminal 7. For example, in the case of collation using a fingerprint, a finger is pressed against a fingerprint sensor as a biometric sensor 70 attached to the authentication terminal 7 and a fingerprint is read by this sensor to acquire a fingerprint image (biometric information). I do. The biometrics authentication unit 75 compares the biometrics information D input at the time of authentication with the biometrics information C stored in the agent biometrics information storage unit 74, and executes the authentication of the agent. The authentication result is output to the biometrics information decryption unit 76. If the proxy authentication result is "OK", the biometrics information decryption unit 76 converts the encrypted biometrics information A input from the input interface 78 into the decryption key stored in the decryption key storage unit 72. To decrypt. Thereafter, the biometric authentication unit 75 compares the decrypted pyrometric information A with the biometric information B stored in the orderer's biometric information storage unit 73, and authenticates the issuer. Execute The authentication terminal 7 displays the authentication result on an LED, a liquid crystal panel, or the like, and transmits it as digital data to the order receiving information holding unit 9 of the contractor via the output interface unit 77 and the network 8. Further, in the fourth configuration example, each time the orderer places an order with the authentication terminal 7, the encryption key generation unit 79 generates an encryption key and a decryption key. When the authentication by the biometrics authentication unit 75 is completed, the decryption key erasing unit 80 erases the decryption key stored in the decryption key storage unit 72.
このようにして、 図 1 6に示す第 4構成例によれば、 図 1 2 A〜図 1 2 Cを参 照しながら説明した電子商取引方法の第 9例と、 図 6 A, 図 6 Bおよび図 7を参 照しながら説明した電子商取引方法の第 4例とが実現され、 これら第 9例および 第 4例と同様の作用効果を得ることができる。 Thus, according to the fourth configuration example shown in FIG. 16, the ninth example of the e-commerce method described with reference to FIGS. 12A to 12C, and FIGS. 6A and 6B The fourth example of the e-commerce method described with reference to FIG. 7 and FIG. 7 is realized, and the same operational effects as those in the ninth example and the fourth example can be obtained.
〔3〕 本発明の効果 [3] Effects of the present invention
上述した本発明の実施形態によれば、 商品の発注時等に発注者/受取人の認証 情報やバイオメ卜リクス情報が暗号化されて受注者 Z金融機関へ渡され、 その暗 号化情報は、 発注者/受取人の認証端末 1 , 4, 7においてのみ復号される。 発 注者/受取人が商品や金銭の受け取る際には、 納品担当 Z送金担当や発注者/受 取人が上記暗号化情報を含む所定の情報を認証端末 1 , 4 , 7に入力することに より、 認証端末 1 , 4 , 7において、 上記暗号化情報が復号され、 発注者/受取 人の本人認証が行なわれる。 従って、 電子商取引を行なう際にネットワーク 2, 5, 8上でやり取りされるパスワードやバイオメトリクス情報などの認証情報が 悪用されるのを確実に防止することができる。 According to the above-described embodiment of the present invention, at the time of ordering a product or the like, the authentication information of the orderer / recipient and the biometric information are encrypted and passed to the contractor Z financial institution, and the encrypted information is The decryption is performed only at the orderer / recipient authentication terminals 1, 4, and 7. When the orderer / recipient receives goods or money, the person in charge of delivery Z and the person in charge of remittance or the orderer / receiver must input the specified information including the above-mentioned encrypted information into the authentication terminals 1, 4, and 7. Thus, in the authentication terminals 1, 4, and 7, the encrypted information is decrypted, and the identity of the orderer / recipient is authenticated. Therefore, it is possible to reliably prevent the abuse of authentication information such as passwords and biometrics information exchanged on the networks 2, 5, and 8 when conducting electronic commerce.
また、 本発明の実施形態によれば、 認証端末 7 , 7 Aに代理人のバイオメトリ クス情報 Cと発注者のバイオメトリクス情報 Bとを予め保持させておき、 商品の 納品時 (認証者である発注者の本人認証時) に、 納品担当 (業者) が認証端末 7, 7 Aから送付された発注者のバイオメ卜リクス情報 Aを認証端末 7, 7 Aに入力 するとともに、 代理人が自身のバイオメトリクス情報 Dを認証端末 7, 7 Aに入 力し、 この認証端末 7 , 7 Aにおいて、 まず代理人の本人認証を行なって代理人 が本人であることが認証されると、 納品担当によって入力された発注者のバイオ メトリクス情報 Aと認証端末 7 , 7 Aに予め保持されている発注者のバイオメ卜 リクス情報 Bとによって、 発注者 (認証者) の本人認証が行なわれる。 従って、 商品等の受取に際して発注者本人だけでなく発注者本人が指定した代理人による 受取が、 セキュリティを確保しながら可能になり、 利便性が大幅に向上する。
このように本発明の実施形態によれば、 発注者 Z受取人 (ユーザ) については、Further, according to the embodiment of the present invention, the authentication terminals 7 and 7A hold the biometrics information C of the agent and the biometrics information B of the orderer in advance, and when the goods are delivered (the At the time of authentication of a certain orderer), the person in charge of delivery (contractor) inputs the orderer's biometric information A sent from the authentication terminals 7, 7A to the authentication terminals 7, 7A, and the agent himself The biometrics information D of the user is input to the authentication terminals 7 and 7A, and the authentication terminals 7 and 7A first authenticate the identity of the agent, and when the identity of the agent is authenticated, The orderer's biometrics information A and the orderer's biometrics information B stored in advance in the authentication terminals 7 and 7A are used to perform the authentication of the orderer (authenticater). Therefore, not only the ordering person but also the agent designated by the ordering person at the time of receiving the goods etc. can be received while ensuring security, and the convenience is greatly improved. As described above, according to the embodiment of the present invention, regarding the orderer Z and the recipient (user),
P K I利用 (鍵の管理, 暗号化実行) を簡略化できるほか、 バイオメトリクス情 報の流用や不正発注によるなりすまし行為が確実に防止され、 インタ一ネット等 を用いた電子商取引を安心して行なうことができる。 また、 代理人による発注者 の本人認証が可能になり、 利便性が大幅に向上する。 In addition to simplifying the use of PKI (key management and encryption), biometric information can be diverted and spoofing due to improper ordering can be reliably prevented, and electronic commerce using the Internet can be performed with confidence. it can. In addition, the agent can authenticate the identity of the ordering party, greatly improving convenience.
また、 受注者 Z金融機関 (業者) については、 不正発注を検出しその不正発注 が行なわれるのを確実に防止でき、 不正取引による商品の不正詐取を確実に防止 することができる。 In addition, with respect to the contractor Z financial institution (trader), it is possible to reliably detect fraudulent orders and prevent the fraudulent orders from being placed, and to reliably prevent fraudulent fraud of products due to fraudulent transactions.
さらに、 決済機関については、 不正決済を検出でき、 発注者 (ユーザ) ユーザ の意図しない決済が行なわれるのを確実に防止することができる。 In addition, the settlement institution can detect fraudulent settlements, and can reliably prevent unsolicited settlement by the ordering party (user) user.
〔4〕 その他 [4] Other
なお、 本発明は上述した実施形態に限定されるものではなく、 本発明の趣旨を 逸脱しない範囲で種々変形して実施することができる。 It should be noted that the present invention is not limited to the above-described embodiment, and can be implemented with various modifications without departing from the spirit of the present invention.
例えば、 上述した実施形態では、 認証端末 1 , 4 , 7に格納される情報 (バイ オメトリクス情報, 復号キーなど) は一組のみとして説明しているが、 本発明は、 これに限定されるものではなく、 複数回の発注に用いた複数組の情報を各発注に 対応させて格納してもよい。 この場合、 例えば受注者に対して送信した情報の一 部分にインデックス情報を付加し、 このインデックス情報を受信して、 メモリ内 のどの情報を用いて認証を行なうか判断するように構成する。 産業上の利用可能性 For example, in the above-described embodiment, the information (biometric information, decryption key, etc.) stored in the authentication terminals 1, 4, and 7 is described as only one set, but the present invention is not limited to this. Instead, multiple sets of information used for multiple orders may be stored in association with each order. In this case, for example, index information is added to a part of the information transmitted to the contractor, and the index information is received to determine which information in the memory is to be used for authentication. Industrial applicability
以上のように、 本発明によれば、 商品の発注時等に発注者/受取人の認証情報 やバイオメトリクス情報が暗号化されて受注者 Z金融機関へ渡され、 発注者 Z受 取人が商品や金銭の受け取る際には、 納品担当 Z送金担当や発注者/受取人が上 記暗号化情報を含む所定の情報を認証端末に入力することにより、 この認証端末 において、 上記暗号化情報が復号され、 発注者 Z受取人の本人認証が行なわれる。 これにより、 電子商取引を行なう際にネットワーク上でやり取りされるパスヮー ドゃバイオメトリクス情報などが悪用されるのを確実に防止することができる。 従って、 本発明は、 インターネット等のネットワークを利用して行なわれる電
子商取引に用いて好適であり、 その有用性は極めて高いものと考えられる。
As described above, according to the present invention, the orderer / recipient authentication information and biometrics information are encrypted and passed to the contractor Z financial institution at the time of ordering the product, and the orderer Z recipient is When receiving goods or money, the person in charge of delivery, the person in charge of remittance, and the orderer / recipient input predetermined information including the above-mentioned encrypted information into the authentication terminal, and the encrypted information is It is decrypted and the identity of the orderer Z recipient is authenticated. As a result, it is possible to reliably prevent passwords and biometrics information exchanged on a network from being misused when conducting electronic commerce. Therefore, the present invention provides a method for transmitting power using a network such as the Internet. It is suitable for use in child commerce, and its usefulness is considered to be extremely high.
Claims
1 . 発注者がネットワークを介して受注者に商品を発注し該商品を受け取る電子 商取引方法であって、 1. An e-commerce method in which an orderer places an order for goods to a contractor via a network and receives the goods.
該商品の発注時に、 該発注者は該発注者本人を特定するための認証情報を認証 端末に入力し、 When ordering the product, the orderer enters authentication information for identifying the orderer into the authentication terminal,
該認証端末は、 所定の暗号鍵で該認証情報を暗号化し、 暗号化済み認証情報を 該商品の発注伝票とともに該ネットワークを介して該受注者へ送付するとともに、 該認証情報と該暗号化済み認証情報を復号するための復号鍵とを保持し、 The authentication terminal encrypts the authentication information with a predetermined encryption key, sends the encrypted authentication information together with the order slip of the product to the orderer via the network, and transmits the authentication information and the encrypted Holding a decryption key for decrypting the authentication information,
該商品の納品時に、 該受注者側の納品担当は、 該商品の発注時に該認証端末か ら受け取つた該暗号化済み認証情報を該認証端末に入力するとともに、 該発注者 は、 該認証端末の正規の所有者であることを示す端末認証のデータを該認証端末 に入力し、 At the time of delivery of the product, the delivery person on the order receiving side inputs the encrypted authentication information received from the authentication terminal to the authentication terminal when ordering the product, and the orderer enters the authentication terminal. Terminal authentication data indicating that the user is a legitimate owner of the authentication terminal,
該認証端末は、 該データによつて該発注者が該認証端末の正規の所有者である ことを認証したら、 該納品担当によつて入力された該暗号化済み認証情報を、 該 認証端末内に保持された該復号鍵で復号し、 復号認証情報と該認証端末内に保持 された該認証情報とを照合し、 これらの認証情報が一致した場合にその旨を該発 注者, 該納品担当および該受注者に通知し、 When the authentication terminal authenticates that the orderer is a legitimate owner of the authentication terminal based on the data, the authentication terminal transmits the encrypted authentication information input by the delivery person in the authentication terminal. And decrypts the decryption authentication information with the authentication information stored in the authentication terminal. If the authentication information matches, the fact that the issuer, the delivery Notify the responsible person and the contractor,
該認証端末からの照合一致通知を受けて、 該納品担当は該商品の該発注者への 受渡しを実行することを特徴とする、 電子商取引方法。 An electronic commerce method, characterized in that the delivery person in charge of delivery receives the matching match notification from the authentication terminal and delivers the product to the orderer.
2 . 該認証端末は、 該認証情報および該復号鍵とともに該発注者のバイオメトリ クス情報を保持し、 2. The authentication terminal holds the biometric information of the orderer together with the authentication information and the decryption key,
該商品の納品時に、 該発注者は、 該認証端末の正規の所有者であることを示す 端末所有者としての認証用のデータとして自身のバイオメトリクス情報を該認証 端末に入力し、 該認証端末は、 該商品の納品時に入力されたバイオメトリクス情 報と該認証端末内に予め保持されているバイオメトリクス情報とを照合し、 これ らのバイオメ卜リクス情報が一致した場合に、 該暗号化済み認証情報を、 該認証 端末内に保持された該復号鍵で復号することを特徴とする、 請求の範囲第 1項に
記載の電子商取引方法。 Upon delivery of the product, the orderer inputs his / her biometrics information to the authentication terminal as data for authentication as a terminal owner indicating that he is the authorized owner of the authentication terminal; Compares the biometric information entered at the time of delivery of the product with the biometric information stored in the authentication terminal in advance, and if the biometric information matches, the encrypted The authentication information is decrypted by using the decryption key held in the authentication terminal. The e-commerce method described.
3 . 発注者がネットワークを介して受注者に商品を発注し該商品を受け取る電子 商取引方法であって、 3. An e-commerce method in which an orderer places an order for goods to a contractor via a network and receives the goods.
該商品の発注時に、 該発注者は該発注者本人を特定するための第 1発注者バイ オメトリクス情報を認証端末に入力し、 When ordering the product, the orderer inputs first orderer biometrics information for identifying the orderer to the authentication terminal,
該認証端末は、 所定の暗号鍵で該第 1発注者バイオメ卜リクス情報を暗号化し、 暗号化済み第 1発注者バイオメトリクス情報を該商品の発注伝票とともに該ネッ トワークを介して該受注者へ送付するとともに、 該暗号化済み第 1発注者バイォ メトリクス情報を復号するための復号鍵を保持し、 The authentication terminal encrypts the first orderer biometric information with a predetermined encryption key, and transmits the encrypted first orderer biometric information together with the order slip of the product to the orderer via the network. Sending, and holding a decryption key for decrypting the encrypted first orderer biometrics information,
該商品の納品時に、 該受注者側の納品担当は、 該商品の発注時に該認証端末か ら受け取った該暗号化済み第 1発注者バイオメトリクス情報を該認証端末に入力 するとともに、 該発注者は、 該発注者本人を特定するための第 2発注者バイオメ トリクス情報を該認証端末に入力し、 At the time of delivery of the product, the delivery person in charge of the order receiving party inputs the encrypted first orderer biometrics information received from the authentication terminal at the time of ordering the product to the authentication terminal, and Enters the second orderer biometric information for identifying the orderer into the authentication terminal,
該認証端末は、 該納品担当によって入力された該暗号化済み第 1発注者バイォ メトリクス情報を、 該認証端末内に保持された該復号鍵で復号し、 復号第 1発注 者バイオメトリクス情報と該第 2発注者バイオメトリクス情報とを照合し、 これ らの発注者パイオメトリクス情報が一致した場合にその旨を該発注者, 該納品担 当およぴ該受注者に通知し、 The authentication terminal decrypts the encrypted first orderer biometrics information input by the delivery charge using the decryption key held in the authentication terminal, and decrypts the first orderer biometrics information and the decrypted first orderer biometrics information. The second orderer's biometrics information is compared with the second orderer's biometrics information. If the two orderer's biometrics information match, the fact is notified to the orderer, the delivery manager and the orderer,
該認証端末からの照合一致通知を受けて、 該納品担当は該商品の該発注者への 受渡しを実行することを特徴とする、 電子商取引方法。 An electronic commerce method, characterized in that the delivery person in charge of delivery receives the matching match notification from the authentication terminal and delivers the product to the orderer.
4. 該認証端末は、 認証局が発行した該発注者の秘密鍵および公開鍵を保持する とともに、 該受注者から該発注者に送付された、 該認証局発行の受注者の公開鍵 を保持し、 4. The authentication terminal holds the private key and public key of the orderer issued by the certificate authority, and holds the public key of the orderer issued by the certificate authority sent from the orderer to the orderer. And
該認証端末は、 該商品の発注時に、 該受注者の公開鍵でさらに暗号化された該 暗号化済み認証情報と、 該発注者の公開鍵と、 該発注者の秘密鍵で暗号化された、 該発注者本人を特定する電子署名とを該受注者へ送付し、 At the time of ordering the product, the authentication terminal is encrypted with the encrypted authentication information further encrypted with the orderer's public key, the orderer's public key, and the orderer's private key. Sending an electronic signature identifying the orderer to the orderer,
該受注者は、 該受注者の秘密鍵を用いて、 該所定の暗号鍵で暗号化された該喑
号化済み認証情報を得ることを特徴とする、 請求の範囲第 1項または第 2項に記 載の電子商取引方法。 The contractor uses the contractor's secret key and encrypts the data with the predetermined encryption key. The electronic commerce method according to claim 1 or 2, wherein encrypted authentication information is obtained.
5 . 該認証端末は、 認証局が発行した該発注者の秘密鍵および公開鍵を保持する とともに、 該受注者から該発注者に送付された、 該認証局発行の受注者の公開鍵 を保持し、 5. The authentication terminal holds the private key and public key of the orderer issued by the certificate authority, and also holds the public key of the orderer issued by the certificate authority sent from the orderer to the orderer. And
該認証端末は、 該商品の発注時に、 該受注者の公開鍵でさらに暗号化された該 暗号化済み第 1発注者パイオメ卜リクス情報と、 該発注者の公開鍵と、 該発注者 の秘密鍵で暗号化された、 該発注者本人を特定する電子署名とを該受注者へ送付 し、 The authentication terminal, when ordering the product, encrypts the encrypted first orderer pieometric information further encrypted with the orderer's public key, the orderer's public key, and the orderer's secret. Sends an electronic signature, which is encrypted with a key and identifies the orderer, to the orderer,
該受注者は、 該受注者の秘密鍵を用いて、 該所定の暗号鍵で暗号化された該喑 号化済み第 1発注者バイオメトリクス情報を得ることを特徴とする、 請求の範囲 第 3項に記載の電子商取引方法。 The third orderer, using the contractor's secret key, obtains the encrypted first orderer biometrics information encrypted with the predetermined encryption key. Electronic commerce method described in the section.
6 . 該認証端末による照合結果が決済機関に送付され、 該決済機関は、 該照合結 果を受けて該商品の決済を実行することを特徴とする、 請求の範囲第 1項〜第 3 項のいずれか一項に記載の電子商取引方法。 6. The verification result by the authentication terminal is sent to a clearing house, and the clearing house executes the payment of the product in response to the verification result. The electronic commerce method according to any one of the above.
7 . 発注者がネットワークを介して受注者に商品を発注し、 該発注者が委任した 代理人が該商品を受け取る電子商取引方法であって、 7. An electronic commerce method in which an orderer places an order for goods to a contractor via a network, and an agent delegated by the orderer receives the goods.
該商品の発注時に、 該発注者は該発注者本人を特定するための第 1発注者バイ オメトリクス情報を認証端末に入力し、 When ordering the product, the orderer inputs first orderer biometrics information for identifying the orderer to the authentication terminal,
該認証端末は、 該第 1発注者パイオメ卜リクス情報を該商品の発注伝票ととも に該ネットワークを介して該受注者へ送付し、 The authentication terminal sends the first orderer pieometrics information to the orderer via the network together with the order slip for the product;
該発注者が該商品の受取を代理人に委任する際、 該発注者は、 該発注者本人を 特定するための第 2発注者バイオメ卜リクス情報を該認証端末に入力するととも に、 該代理人は、 該代理人本人を特定するための第 1代理人バイオメトリクス情 報を該認証端末に入力し、 When the orderer delegates the receipt of the product to an agent, the orderer inputs the second orderer biometric information for identifying the orderer into the authentication terminal, and inputs the second orderer biometric information to the authentication terminal. The person inputs first agent biometrics information for identifying the agent himself / herself into the authentication terminal,
該認証端末は、 該第 2発注者バイオメトリクス情報と該第 1代理人バイオメ卜
リクス情報とを対応付けて保持し、 The authentication terminal includes the second orderer biometric information and the first agent biometric information. Rix information in association with it,
該商品の納品時に、 該受注者側の納品担当は、 該商品の発注時に該認証端末か ら受け取つた該第 1発注者バイオメトリクス情報を該認証端末に入力するととも に、 該代理人は、 該代理人本人を特定するための第 2代理人バイオメトリクス情 報を該認証端末に入力し、 At the time of delivery of the product, the delivery person on the orderer side inputs the first orderer biometrics information received from the authentication terminal at the time of ordering the product to the authentication terminal, and the agent Inputting the second agent biometric information for identifying the agent into the authentication terminal;
該認証端末は、 該第 2代理人バイオメトリクス情報と該認証端末内に保持され た該第 1代理人バイオメトリクスとを照合し、 これらの代理人バイオメトリクス 情報が一致した場合に該納品担当によって入力された該第 1発注者バイオメトリ クス情報と該認証端末内に保持された該第 2発注者バイオメトリクス情報とを照 合し、 これらの発注者バイオメトリクス情報が一致した場合にその旨を該代理人, 該納品担当および該受注者に通知し、 The authentication terminal compares the second agent biometric information with the first agent biometric held in the authentication terminal, and when the agent biometric information matches, the delivery terminal The first orderer's biometric information input is compared with the second orderer's biometric information held in the authentication terminal, and when these orderer's biometric information match, the fact is matched. Notify the agent, the delivery person and the contractor,
該認証端末からの照合一致通知を受けて、 該納品担当は該商品の該代理人への 受渡しを実行することを特徴とする、 電子商取引方法。 An electronic commerce method, characterized in that the delivery person in charge of delivery receives the matching match notification from the authentication terminal and delivers the product to the agent.
8 . 該商品の発注時に、 該認証端末は、 所定の暗号鍵で該第 1発注者バイオメト リクス情報を暗号化し暗号化済み第 1発注者バイオメトリクス情報として該受注 者へ送付するとともに、 該暗号化済み第 1発注者バイオメ卜リクス情報を復号す るための復号鍵を該第 2発注者バイオメトリクス情報および該第 1代理人バイォ メトリクス情報に対応付けて保持し、 8. When ordering the product, the authentication terminal encrypts the first orderer biometric information with a predetermined encryption key, sends the encrypted first orderer biometric information to the orderer, and transmits the encrypted first orderer biometric information to the orderer. A decryption key for decrypting the converted first orderer biometrics information in association with the second orderer biometrics information and the first agent biometrics information, and
該商品の納品時に、 該納品担当は、 該第 1発注者バイオメトリクス情報として 該暗号化第 1発注者バイオメトリクス情報を該認証端末に入力し、 該認証端末は、 上記代理人バイオメトリクス情報が一致した場合に、 該納品担当によって入力さ れた該暗号化第 1発注者バイオメトリクス情報を、 該認証端末内に保持された該 復号鍵で復号し、 復号第 1発注者バイオメトリクス情報と該第 2発注者バイオメ トリクス情報との照合を行なうことを特徴とする、 請求の範囲第 7項に記載の電 子商取引方法。 At the time of delivery of the product, the delivery person inputs the encrypted first orderer biometric information to the authentication terminal as the first orderer biometric information, and the authentication terminal transmits the agent biometric information. If they match, the encrypted first orderer biometric information input by the delivery person is decrypted with the decryption key held in the authentication terminal, and the decrypted first orderer biometric information and the decrypted first orderer biometric information are decrypted. 8. The electronic commerce method according to claim 7, wherein the e-commerce method is collated with the second orderer biometric information.
9 . 該認証端末は、 該第 1発注者バイオメトリクス情報と該第 2発注者バイオメ トリクス情報とが完全に同一であった場合には、 照合不一致とすることを特徴と
する、 請求の範囲第 7項または第 8項に記載の電子商取引方法。 9. The authentication terminal is characterized in that when the first orderer's biometric information and the second orderer's biometric information are completely the same, the authentication terminal does not match. The electronic commerce method according to claim 7 or claim 8.
1 0 . 該認証端末は、 該商品の発注時に該第 1発注者バイオメトリクス情報を暗 号化する前に、 該第 1発注者バイオメトリクス情報に対して可逆加工を施し、 該 商品の納品時に、 該復号第 1発注者バイオメトリクス情報に対して、 該商品の発 注時に行なった可逆加工と逆の加工を施し、 該第 1発注者バイオメトリクス情報 を復元することを特徴とする、 請求の範囲第 3項, 第 5項および第 8項のいずれ か一項に記載の電子商取引方法。 10. The authentication terminal performs reversible processing on the first orderer biometric information before encrypting the first orderer biometric information when ordering the product, and performs The decrypted first orderer biometric information is subjected to a process reverse to the reversible process performed when the product was ordered, and the first orderer biometric information is restored. The electronic commerce method according to any one of paragraphs 3, 5, and 8.
1 1 . 該受注者が金融機関であり、 該発注者が該金融機関から該商品としての金 銭を借り受ける借受人であり、 該商品の発注時が、 該借受人と該金融機関との金 銭消費貸借契約時であり、 該商品の納品時が、 該借受人が該金融機関から該商品 としての金銭を受け取る時点であることを特徴とする、 請求の範囲第 1項〜第 6 項のいずれか一項に記載の電子商取引方法。 1 1. The contractor is a financial institution, the ordering party is a borrower who borrows money as the product from the financial institution, and the ordering of the product is made by the borrower and the financial institution. Claims 1 to 6 characterized in that at the time of the loan contract, the time of delivery of the product is the time at which the lessee receives money as the product from the financial institution. An electronic commerce method according to any one of the preceding claims.
1 2 . 該受注者が金融機関であり、 該発注者が該金融機関から該商品としての金 銭を借り受ける借受人であり、 該商品の発注時が、 該借受人と該金融機関との金 銭消費貸借契約時であり、 該商品の納品時が、 該代理人が該金融機関から該商品 としての金銭を受け取る時点であることを特徴とする、 請求の範囲第 7項〜第 9 項のいずれか一項に記載の電子商取引方法。 1 2. The contractor is a financial institution, the orderer is a borrower who borrows the money as the product from the financial institution, and the ordering of the product is made between the borrower and the financial institution. Claims 7 to 9 characterized in that at the time of a loan contract, the time of delivery of the product is the time at which the agent receives money as the product from the financial institution. An electronic commerce method according to any one of the preceding claims.
1 3 . 該認証端末は、 該商品の発注を行なう都度、 該所定の暗号鍵および該復号 鍵を自動生成し、 該商品の納品時における照合を完了した時点で該認証装置内の 該復号鍵を消去することを特徴とする、 請求の範囲第 1項〜第 1 2項のいずれか 一項に記載の電子商取引方法。 13. The authentication terminal automatically generates the predetermined encryption key and the decryption key each time an order for the product is issued, and when the verification at the time of delivery of the product is completed, the decryption key in the authentication device. The electronic commerce method according to any one of claims 1 to 12, wherein the electronic commerce method is characterized in that:
1 4. 受注者に対する商品の発注を行なうとともに該商品の受取時に発注者本人 の認証を行なう、 発注者側の認証端末 (1 ) と、 1 4. An orderer-side authentication terminal (1) that places an order for goods to the contractor and authenticates the orderer when receiving the goods.
該認証端末 (1 ) と該受注者との間で情報のやり取りを行なうネットワーク
(2) と、 A network for exchanging information between the authentication terminal (1) and the contractor (2) and
該認証端末 (1) から該ネットワーク (2) を介して送られてきた受注情報を 保持する、 該受注者側の受注情報保持部 (3) とをそなえ、 An order information holding unit (3) for holding the order information sent from the authentication terminal (1) via the network (2);
該認証端末 (1) が、 The authentication terminal (1)
該商品の発注時に、 該発注者本人を特定するための認証情報を入力する認証情 報入力部 (14) と、 An authentication information input unit (14) for inputting authentication information for identifying the orderer when ordering the product;
該認証情報入力部 (14) から入力された該認証情報を所定の暗号鍵で暗号ィ匕 する暗号化部 (11) と、 An encryption unit (11) for encrypting the authentication information input from the authentication information input unit (14) with a predetermined encryption key;
該暗号化部 (11) によって暗号化された暗号化済み認証情報を発注伝票とと もに、 該受注情報として、 該ネットワーク (2) を介して該受注者へ送付する出 力インタフェース部 (19) と、 An output interface unit (19) for sending the encrypted authentication information encrypted by the encryption unit (11) together with an ordering slip as the order receiving information to the order receiving party via the network (2). ) When,
該認証情報入力部 (14) から入力された該認証情報を保持する認証情報保持 部 (10) と、 An authentication information holding unit (10) for holding the authentication information input from the authentication information input unit (14);
該暗号化部 (11) によって暗号化された暗号化済み認証情報を復号するため の復号鍵を保持する復号鍵保持部 (12) と、 A decryption key storage unit (12) for storing a decryption key for decrypting the encrypted authentication information encrypted by the encryption unit (11);
該暗号化済み認証情報を復号するために必要な該認証端末の正規の所有者であ ることを認証するデータを予め保持するデータ保持部 (13) と、 A data holding unit (13) for holding in advance data for authenticating that the terminal is an authorized owner of the authentication terminal necessary for decrypting the encrypted authentication information;
該商品の納品時に、 該発注者により前記デ一夕を入力するデ一夕入力部 (14, 18) と、 A data input unit (14, 18) for inputting the data by the orderer when the goods are delivered;
該商品の納品時に、 該受注情報保持部 (3) に保持されている該暗号化済み認 証情報を入力する入力インタフェース部 (20) と、 An input interface unit (20) for inputting the encrypted authentication information held in the order information holding unit (3) when delivering the product;
該データ保持部 (13) に保持されたデータと該デ一夕入力部 (14, 18) から入力されたデータとを照合し、 これらのデータが一致した場合に、 該復号鍵 保持部 (12) に保持された該復号鍵の使用を許可する発注者認証部 (15) と、 該発注者認証部 (15) による照合結果を受けて、 該復号鍵を用いて、 該入力 インタフェース部 (20) から入力された該暗号化済み認証情報を復号する復号 部 (16) と、 The data held in the data holding unit (13) is compared with the data input from the data input unit (14, 18), and when these data match, the decryption key holding unit (12 )), Receiving the collation result by the orderer authentication unit (15) for permitting use of the decryption key held in (1) and the orderer authentication unit (15), and using the decryption key, the input interface unit (20). ), A decryption unit (16) for decrypting the encrypted authentication information,
該復号部 (16) によって復号された認証情報と該認証情報保持部 (10) に 保持された認証情報とを照合し、 その照合結果を該発注者, 該商品の納品担当お
よび該受注者に通知する照合部 (17) とをそなえて構成されていることを特徴 とする、 電子商取引システム。 The authentication information decrypted by the decryption unit (16) is compared with the authentication information stored in the authentication information storage unit (10), and the result of the verification is referred to the orderer, the person in charge of delivery of the product. An electronic commerce system, comprising: a checker (17) for notifying the orderer.
15. 発注者がネットワーク (2) を介して受注者に商品の発注を行なうととも に、 該商品の受取時に発注者本人の認証を行なう認証端末であって、 15. An authentication terminal that allows the orderer to place an order for goods via the network (2) to the contractor, and to authenticate the orderer when receiving the goods.
該商品の発注時に、 該発注者本人を特定するための認証情報を入力する認証情 報入力部 (14) と、 An authentication information input unit (14) for inputting authentication information for identifying the orderer when ordering the product;
該認証情報入力部 (14) から入力された該認証情報を所定の暗号鍵で暗号化 する暗号化部 (11) と、 An encryption unit (11) for encrypting the authentication information input from the authentication information input unit (14) with a predetermined encryption key;
該暗号化部 (11) によって暗号化された暗号化済み認証情報を発注伝票とと もに、 該ネットワーク (2) を介して該受注者へ送付する出力インタフェース部 (19) と、 An output interface unit (19) for sending the encrypted authentication information encrypted by the encryption unit (11) together with an ordering slip to the order receiver via the network (2);
該認証情報入力部 (14) から入力された該認証情報を保持する認証情報保持 部 (10) と、 An authentication information holding unit (10) for holding the authentication information input from the authentication information input unit (14);
該暗号化部 (11) によって暗号化された暗号化済み認証情報を復号するため の復号鍵を保持する復号鍵保持部 (12) と、 A decryption key storage unit (12) for storing a decryption key for decrypting the encrypted authentication information encrypted by the encryption unit (11);
該認証端末の正規所有者であることを認証するためのデータを予め保持するデ 一夕保持部 (13) と、 A data storage unit (13) for storing in advance data for authenticating that the terminal is an authorized owner of the authentication terminal;
該商品の納品時に、 該発注者により前記デ一夕を入力するデータ入力部 (14, 18) と、 A data input unit (14, 18) for inputting the data by the orderer upon delivery of the product;
該商品の納品時に、 該商品の発注時に該受注者が受け取つた該暗号化済み認証 情報を入力する入カインタフェース部 (20) と、 An input interface unit (20) for inputting the encrypted authentication information received by the contractor when ordering the product when the product is delivered;
該データ保持部 (13) に保持されたデータと該データ入力部 (14, 18) から入力されたデ一夕とを照合し、 これらのデータが一致した場合に、 該復号鍵 保持部 (12) に保持された該復号鍵の使用を許可する発注者認証部 (15) と、 該発注者認証部 (15) による照合結果を受けて、 該復号鍵を用いて、 該入力 インタフェース部 (20) から入力された該暗号化済み認証情報を復号する復号 部 (16) と、 The data held in the data holding unit (13) is compared with the data input from the data input unit (14, 18), and when these data match, the decryption key holding unit (12 )), Receiving the collation result by the orderer authentication unit (15) for permitting use of the decryption key held by the orderer authentication unit (15), and using the decryption key, the input interface unit (20). ), A decryption unit (16) for decrypting the encrypted authentication information,
該復号部 (16) によって復号された認証情報と該認証情報保持部 (10) に
保持された認証情報とを照合し、 その照合結果を該発注者, 該商品の納品担当お よび該受注者に通知する照合部 (1 7 ) とをそなえて構成されていることを特徴 とする、 認証端末。 The authentication information decrypted by the decryption unit (16) and the authentication information holding unit (10) It is characterized by comprising a collating unit (17) for collating with the held authentication information and notifying the collation result to the orderer, the person in charge of delivery of the product, and the orderer. , Authentication terminal.
1 6 . 認証者が委任した代理人によって該認証者の本人認証を行なう、 代理人に よる本人認証方法であって、 1 6. A personal authentication method performed by an agent, in which the authenticator authenticates the individual by an agent delegated by the authenticator,
該認証者は該認証者本人を特定するための第 1認証者バイオメ卜リクス情報を 認証端末に入力し、 The certifier inputs first certifier biometric information for identifying the certifier into the authentication terminal,
該認証端末は、 該第 1認証者バイオメトリクス情報を、 ネットワークを介して、 該認証者の本人認証結果を必要とする業者へ送付し、 The authentication terminal sends the first certifier biometrics information via a network to a company that requires the authentication result of the certifier,
該認証者が該代理人に委任する際、 When the certifier delegates to the agent,
該認証者は、 該認証者本人を特定するための第 2認証者バイオメトリクス情報 を該認証端末に入力するとともに、 該代理人は、 該代理人本人を特定するための 第 1代理人バイオメトリクス情報を該認証端末に入力し、 The certifier inputs second certifier biometrics information for identifying the certifier to the authentication terminal, and the proxy sets a first proxy biometrics for identifying the proxy. Input information into the authentication terminal,
該認証端末は、 該第 2認証者バイオメトリクス情報と該第 1代理人バイオメ卜 リクス情報とを対応付けて保持し、 The authentication terminal holds the second certifier biometric information and the first proxy biometric information in association with each other,
該認証者の本人認証時に、 該業者に送付された該第 1認証者バイオメトリクス 情報が該認証端末に入力されるとともに、 該代理人は、 該代理人本人を特定する ための第 2代理人バイオメトリクス情報を該認証端末に入力し、 At the time of authentication of the certifier, the first certifier biometrics information sent to the trader is input to the authentication terminal, and the agent is a second agent for identifying the agent. Inputting biometric information to the authentication terminal,
該認証端末は、 該第 2代理人バイオメ卜リクス情報と該認証端末内に保持され た該第 1代理人バイオメトリクスとを照合し、 これらの代理人バイオメトリクス 情報が一致した場合に、 入力された該第 1認証者バイオメ卜リクス情報と該認証 端末内に保持された該第 2認証者バイオメトリクス情報とを照合し、 該認証者の 本人認証を行なうことを特徴とする、 代理人による本人認証方法。
The authentication terminal compares the second agent biometrics information with the first agent biometrics held in the authentication terminal. Comparing the biometric information of the first certifier with the biometric information of the second certifier held in the authentication terminal, and performing identity authentication of the certifier. Authentication method.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004570547A JP4078352B2 (en) | 2003-04-03 | 2003-04-03 | Authentication terminal, electronic commerce program, and computer-readable recording medium recording the program |
PCT/JP2003/004271 WO2004090771A1 (en) | 2003-04-03 | 2003-04-03 | Electronic commerce method, electronic commerce system, authentication terminal, and authentication method by agent |
US11/131,426 US20050222932A1 (en) | 2003-04-03 | 2005-05-18 | Electronic commerce method, electronic commerce system, certificate terminal, and principal certification method by agent |
US12/491,023 US7979357B2 (en) | 2003-04-03 | 2009-06-24 | Electronic commerce method, electronic commerce system, certificate terminal, and principal certification method by agent |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2003/004271 WO2004090771A1 (en) | 2003-04-03 | 2003-04-03 | Electronic commerce method, electronic commerce system, authentication terminal, and authentication method by agent |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/131,426 Continuation US20050222932A1 (en) | 2003-04-03 | 2005-05-18 | Electronic commerce method, electronic commerce system, certificate terminal, and principal certification method by agent |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004090771A1 true WO2004090771A1 (en) | 2004-10-21 |
Family
ID=33156423
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/004271 WO2004090771A1 (en) | 2003-04-03 | 2003-04-03 | Electronic commerce method, electronic commerce system, authentication terminal, and authentication method by agent |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP4078352B2 (en) |
WO (1) | WO2004090771A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008040987A (en) * | 2006-08-09 | 2008-02-21 | Nec Corp | System for personal information protection by proxy application, personal information protection method, and personal information protection program |
JP2010152841A (en) * | 2008-12-26 | 2010-07-08 | Seiko Epson Corp | Electronic settlement card with personal authentication and electronic settlement method using the card |
JP2013152589A (en) * | 2012-01-25 | 2013-08-08 | Japan Research Institute Ltd | Information processing system, deliverer information terminal, server device, settlement card, information processing method, and program |
JP2017017469A (en) * | 2015-06-30 | 2017-01-19 | 株式会社インフォディオ | Addition type signature device and contract management system using the same |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001297269A (en) * | 2000-04-13 | 2001-10-26 | Nec Corp | Identifying method, method and system for article delivery, and machine-readable recording medium with recorded program |
JP2002109439A (en) * | 2000-09-29 | 2002-04-12 | Ricoh Co Ltd | Electronic account settlement system, ic card, electronic settlement equipment and recording medium in which the program is recorded |
JP2003050952A (en) * | 2001-08-07 | 2003-02-21 | Dainippon Printing Co Ltd | Article ordering and order reception system |
-
2003
- 2003-04-03 WO PCT/JP2003/004271 patent/WO2004090771A1/en active Application Filing
- 2003-04-03 JP JP2004570547A patent/JP4078352B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001297269A (en) * | 2000-04-13 | 2001-10-26 | Nec Corp | Identifying method, method and system for article delivery, and machine-readable recording medium with recorded program |
JP2002109439A (en) * | 2000-09-29 | 2002-04-12 | Ricoh Co Ltd | Electronic account settlement system, ic card, electronic settlement equipment and recording medium in which the program is recorded |
JP2003050952A (en) * | 2001-08-07 | 2003-02-21 | Dainippon Printing Co Ltd | Article ordering and order reception system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008040987A (en) * | 2006-08-09 | 2008-02-21 | Nec Corp | System for personal information protection by proxy application, personal information protection method, and personal information protection program |
JP2010152841A (en) * | 2008-12-26 | 2010-07-08 | Seiko Epson Corp | Electronic settlement card with personal authentication and electronic settlement method using the card |
JP2013152589A (en) * | 2012-01-25 | 2013-08-08 | Japan Research Institute Ltd | Information processing system, deliverer information terminal, server device, settlement card, information processing method, and program |
JP2017017469A (en) * | 2015-06-30 | 2017-01-19 | 株式会社インフォディオ | Addition type signature device and contract management system using the same |
Also Published As
Publication number | Publication date |
---|---|
JP4078352B2 (en) | 2008-04-23 |
JPWO2004090771A1 (en) | 2006-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11880815B2 (en) | Device enrollment system and method | |
JP5050066B2 (en) | Portable electronic billing / authentication device and method | |
RU2648944C2 (en) | Methods, devices, and systems for secure provisioning, transmission and authentication of payment data | |
US11157905B2 (en) | Secure on device cardholder authentication using biometric data | |
US7089214B2 (en) | Method for utilizing a portable electronic authorization device to approve transactions between a user and an electronic transaction system | |
US7635084B2 (en) | Electronic transaction systems and methods therefor | |
JP4388039B2 (en) | Internet payment system | |
US20090198618A1 (en) | Device and method for loading managing and using smartcard authentication token and digital certificates in e-commerce | |
US20030154376A1 (en) | Optical storage medium for storing, a public key infrastructure (pki)-based private key and certificate, a method and system for issuing the same and a method for using | |
WO2004066177A1 (en) | Card settlement method using portable electronic device having fingerprint sensor | |
JP2009048627A (en) | Method and apparatus for performing delegated transaction | |
US7979357B2 (en) | Electronic commerce method, electronic commerce system, certificate terminal, and principal certification method by agent | |
EP3186739B1 (en) | Secure on device cardholder authentication using biometric data | |
US20240291812A1 (en) | Token processing system and method | |
JP6691582B2 (en) | User authentication method and authentication management method | |
TWM589842U (en) | Mobile trading desk with real-name phone | |
JP2005512225A (en) | Automated rights management and payment system for embedded content | |
JP4078352B2 (en) | Authentication terminal, electronic commerce program, and computer-readable recording medium recording the program | |
US20030070078A1 (en) | Method and apparatus for adding security to online transactions using ordinary credit cards | |
CN1360265B (en) | Portable electronic license device | |
JP2002158655A (en) | Certifying device, collating device and electronic certificate system with which these devices are connected | |
JP2020115386A (en) | Authentication in ubiquitous environment | |
CN117981274A (en) | Remote identity interaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004570547 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11131426 Country of ref document: US |