WO2005022428A1 - 属性情報提供サーバ、属性情報提供方法、およびプログラム - Google Patents
属性情報提供サーバ、属性情報提供方法、およびプログラム Download PDFInfo
- Publication number
- WO2005022428A1 WO2005022428A1 PCT/JP2004/011831 JP2004011831W WO2005022428A1 WO 2005022428 A1 WO2005022428 A1 WO 2005022428A1 JP 2004011831 W JP2004011831 W JP 2004011831W WO 2005022428 A1 WO2005022428 A1 WO 2005022428A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- virtual
- attribute information
- record
- attribute
- database
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
Definitions
- Attribute information providing server attribute information providing method, and program
- the present invention relates to an attribute information providing server for providing attribute information via a network.
- An attribute certificate certifies what attributes a person has as a user right, while a normal public key certificate proves its identity.
- the specifications are defined in X.509 defined by the IETF (Internet Engineering Task Force) (for example, see Non-patent Document 1.)
- the public key certificate authority (Certification) that issues public key certificates Authority) is performed by an Attribute Authority that is not the same as the Authority.
- SAML Security Assertion Markup Language
- OASIS Structured Information Standards Promotion Association
- the attribute information includes name, address, age, occupation, telephone number, gender, family composition, and the like.
- the human resources department of the company certifies. There are a variety of things from those related to organizational positions to those like personal hobbies.
- the attributes that can be used with the attribute certificate described above are those for which the attribute itself can be proved by a public third party, and from the viewpoint of privacy protection, a third party is a certification authority for personal attributes such as hobbies. It is not suitable to do.
- there are two types of attributes Authorized attribute that is certified by a third party and Discretionary attribute that is completely determined by the individual, and each has different security requirements.
- Patent Literature 1 also discloses a function of dividing additional information and controlling the information to be disclosed according to the information disclosure level.
- a credit center operated by a credit company and the like ranks the credit level of each merchant and thereby determines the information disclosure level.
- the authentication server issues a universal ID, which is a common ID, to a new registrant, and in response to a request for presenting the universal ID, another authentication is performed.
- a universal ID which is a common ID
- another authentication is performed.
- Non-Patent Document 1 FC 3281 on An Internet Attribute Certificate [Search on August 4, 2003] Internet ⁇
- Non-patent Document 2 Liberty Alliance [Search August 4, 2003] Internet
- Patent Document 1 Japanese Patent Application Laid-Open No. 2001-325526 (Pages 4-5, FIG. 1)
- Patent Document 2 JP 2001-244927 A (Page 3-4, FIG. 1)
- a credit card service is a typical business that provides credit services, but here, a credit card company's subscribers subscribe to money up to the amount of credit. There is a settlement service when purchasing goods from stores. Place
- the subject of credit must be trust information other than money.
- the two parties trying to do business do not necessarily belong to the same trustee. And the like. Therefore, it is important to be a member of a reliable organization, to be a member of a reliable organization, to be a member, and to have a history of activities during that period. Become. These are all information that is shared between individuals and their institutions. Also, for trust maturity, there is no need for the two parties to engage in a transaction to belong to the same organization, but a mechanism is needed that can determine whether or not to trust the other party based on the standards that each has. It is. With the current credit card system, responsibilities, credit ranges and transactions are pre-determined, and such a flexible credit-granting mechanism, which is expected on such a network, has not been realized.
- the present invention has been made to solve the above-described technical problems, and an object of the present invention is to use a network such as the Internet to, for example, assign attributes other than money to credit. Realizing an attribute information providing service that enables The
- Yet another object is to provide a part of the subscriber's personal information to the new trader with the subscriber's consent.
- Yet another object is to enable authentication without the privacy information provider knowing with which new trader the subscriber is trying to transact.
- the present invention is directed to an attribute information providing server for providing predetermined attribute information via a network in a database storing attribute information, and a user device connected via the network.
- Receiving means, and means for providing a virtual record to the attribute information receiving apparatus are examples of the attribute information receiving apparatus.
- the means for receiving the extraction instruction allows only the user device to refer to the attribute information regarding the operator of the user device, and permits copying of any attribute when extracting the virtual record. In addition, it is possible to prohibit falsification of arbitrary attributes.
- the attribute information providing server transfers a part of personal information such as the activity history obtained by itself to the attribute information receiving device to the attribute information receiving device under the consent of the user device as a subscriber. When disclosing, it is possible to provide a mechanism for giving credit only to the extent that it has not been tampered with.
- the means for receiving the read request can be characterized in that it is in a state where it is not possible to know from which database the virtual record read request is made for which virtual ID.
- the attribute information providing server to which the present invention is applied generates a virtual record, which is predetermined information selected from attribute information stored in a database, by a generation unit, and generates a key of the virtual record. It is stored in the database by the storage means in association with the virtual ID that becomes.
- user devices connected via a network The virtual record providing means provides a virtual record to the attribute information receiving apparatus based on a request using the virtual ID provided by the attribute information receiving apparatus connected via the network.
- This virtual record providing means can provide a virtual record to the attribute information receiving device in a state where it can know which virtual ID is selected from the database.
- the generating means may be characterized in that information extracted by the user device from the subscriber attribute information stored in the database is generated as a virtual record.
- the virtual record providing means may provide a virtual record to the attribute information receiving device using a 1-out-of-NOT (Oblivious Transfer) protocol.
- the attribute information providing server to which the present invention is applied includes, for each customer, a database storing customer records including a plurality of pieces of attribute information, and a user device operated by the customer.
- the customer record of the customer is read from the database based on the request of the customer, and the customer record display section to be provided to the user device via the network, and the selection of the predetermined attribute information from the customer record via the network from the user device are selected.
- a virtual record generation unit that generates a virtual record based on the attribute selection unit received and the attribute information selected from the customer records based on the selection received by the attribute selection unit, and stores the generated virtual record in a database.
- the database capability reads the corresponding virtual record and provides the attribute information receiving device with the virtual record reference. And a processing unit.
- the virtual record generator compares the attribute content of the original customer record with the attribute content of the generated virtual record and verifies that the attribute has not been tampered with.
- the virtual ID provided to the user device by the virtual ID issuing unit can be characterized in that the ID of the customer record is an unlinkable ID.
- the attribute information providing server to which the present invention is applied stores a record including a plurality of pieces of attribute information by a record storage unit, and stores the record stored by the record storage unit.
- the virtual record generated by the predetermined attribute information selected via the network from among the above is stored by the virtual record storage means. Then, the virtual record selected from the virtual record storage means is disclosed via the network by the virtual record disclosure means in a state where the user cannot know which virtual record is selected.
- the virtual record storage means stores a virtual record in association with a virtual ID as a key, and the virtual record disclosing means does not know which virtual ID has been selected. Is characterized by receiving a disclosure request using a virtual ID. More specifically, the virtual record disclosing means realizes the disclosure of the virtual record by using the oblivious transfer (Oblivious Transfer) encryption technology.
- the attribute information providing method to which the present invention is applied also has a plurality of attribute information based on a request from a user device made via a network.
- the attribute information of the virtual record stored in the database has not been falsified from the attribute information of the customer record.
- the method includes a step of receiving a request, a step of reading a corresponding virtual record from a database based on the information reference request, and a step of providing the read virtual record to an attribute information receiving device via a network.
- This information reference request is characterized by being made using a 1-out-of-NOT (Oblivious Transfer) protocol.
- the attribute information providing method to which the present invention is applied is a virtual ID which is a key in which a virtual record generated by selecting a predetermined attribute from customer records for each customer is generated as a key.
- the virtual ID using this virtual ID is stored in the database stored in association with A step of receiving a code acquisition request and a step of reading a virtual record corresponding to the virtual ID from the database and disclosing the virtual record in response to the acquisition request. It is characterized in that when receiving an acquisition request, which virtual ID is selected is concealed. Receiving a selection of a predetermined attribute of the customer's own customer record via the customer's own computer device;
- a convenience functioning as an attribute information providing server for providing attribute information via a network can be grasped as a program configured to realize each of these functions.
- this program When this program is provided to a computer, for example, the program may be provided in a state of being installed on a computer as a server, or may be provided on a storage medium in which the program to be executed by the computer is readable by the computer. The form to provide is considered.
- the storage medium corresponds to, for example, a DVD or CD-ROM medium.
- a program is read by a DVD or CD-ROM reader or the like, and the program is stored and executed in a flash ROM or the like.
- These programs may be provided, for example, by a program transmission device via a network.
- a program to which the present invention is applied stores, on the basis of a request from a user device made via a network, a computer from a database in which records having a plurality of pieces of attribute information are stored.
- a function of reading the specified record a function of providing the read predetermined record to the user device via the network, and a selection of the user device power for the predetermined record information and the predetermined attribute information via the network.
- a program to which the present invention is applied stores a predetermined program from records stored in a computer functioning as an attribute information providing server for providing attribute information via a network.
- the function of storing the virtual record generated by selecting the attribute of the virtual ID in the database in association with the key virtual ID, and the virtual ID using the virtual ID with the power of the selected virtual ID kept secret A function to receive a record acquisition request and a function to read the virtual record corresponding to the virtual ID from the database and disclose the virtual record in response to the acquisition request are realized.
- an institution having attribute information provides, for example, a part of the attribute information of a specific individual to a third party. Can be provided.
- FIG. 1 is a diagram showing an overall configuration of an attribute information providing system (credit providing system) to which the present embodiment is applied.
- an attribute information providing server personal information server
- a user device 30 used by a subscriber of the attribute information providing system as a client terminal 30, and an attribute that is a client terminal used by a new business operator
- An information receiving device (credit information receiving device) 50 is provided, and these are connected via a network 70 such as the Internet.
- This network 70 may be a public or wide area network such as the Internet or a local network.
- the system of the present embodiment can be constructed by using a public database server provided on the Internet as the attribute information providing server 10, or the system of the present embodiment can be constructed in a closed form such as a corporate intranet. You can also.
- the attribute information providing server 10 which is a server managed by the service provider, manages personal information of the member (user device 30) and transaction information with the member, and authenticates the attribute based on the consent of the member. Issue a virtual ID token (VID token) to perform
- the virtual ID token is formed by including, for example, the URL of the attribute information providing server 10 in the virtual ID (VID).
- the user device 3 which is a member of the service provider
- the attribute to be disclosed to the attribute information receiving device 50 which is a new trader
- the attribute information providing server 10 is requested to issue a VID token.
- the attribute information receiving device 50 which is an optional partner as an attribute receiver, receives an attribute certificate for establishing a trust relationship via the attribute information providing server 10 when performing a new transaction with the user device 30.
- the attribute information providing server 10 issues a VID token with the user device 30 as a subscriber, and references a virtual record with the attribute information receiving device 50 as a new business partner. Done. Of these, those that refer to the VID token while keeping it secret are referred to as VID confidential references. The function of the attribute information providing server 10 will be described later in detail.
- the user device 30 acquires a VID token from the attribute information providing server 10 and transmits a VID token for passing the VID token to the attribute information receiving device 50.
- the user device 30 In the acquisition of the VID token, the user device 30 communicates with the attribute information providing server 10 using a predetermined Web browser. At this time, by using a signaling and authentication function such as SSL (Secure Sockets Layer), it is possible to prevent a third party from seeing the information.
- a signaling and authentication function such as SSL (Secure Sockets Layer)
- the authentication of the user device 30 can also use Basic authentication or the like defined by normal HTTP (Hypertext Transfer Protocol).
- the user device 30 transmits the obtained VID token to the attribute information receiving device 50 using a mail protocol such as SMTP (Simple Mail Transfer Protocol).
- SMTP Simple Mail Transfer Protocol
- the attribute information receiving device 50 obtains a VID token from the user device 30 and obtains a virtual record from the attribute information providing server 10.
- a VID token is acquired from the user device 30 by ordinary mail software or the like.
- Acquisition of virtual records includes normal acquisition and VID concealment acquisition.
- the virtual record is acquired by connecting to the attribute information providing server 10 using the URL included in the VID token and presenting the VID.
- the OT protocol described later is performed between the attribute information receiving device 50 and the attribute information providing server 10 to obtain the desired information. You can get certain attributes.
- the first encryption technology is Oblivious Transfer (OT).
- Oblivious Transfer is a protocol between a server with ⁇ pieces of information and a client who wants to read one of them (between two parties). Can be read, but the server cannot know which one was read. That is, the client (for example, the attribute information receiving device 50) can receive only one of the ⁇ pieces of information held by the attribute information providing server 10 which is the information provider, and determines which one is selected by the attribute. The information providing server 10 cannot know.
- the details are described in the literature [Naor, M. and Pinkas, B .: Oblivious Transfer and Polynomial Evaluation, in proc. Of STOC, 1999.], but the details are omitted here.
- the second cryptographic technique is homomorphism of cryptographic functions.
- Epk (X) with homomorphism is
- Epkl (Epk2 (X)) Epk2 (Epkl (X))
- FIG. 2 is a flowchart showing a process executed by each device of the attribute information providing system.
- a virtual ID token (VID token) including a virtual ID (VID: VirtuallD) is issued from the user device 30 to the attribute information providing server 10 via the network 70.
- a request is made (step 201).
- the user device 30 selects which personal information (customer record) to disclose under the VID token (step 202).
- the attribute information providing server 10 a part of the attribute is copied with respect to a GID (Globally-unique ID) described later, and is registered in a database (described later) using the virtual ID as a key (step 203).
- GID Globally-unique ID
- a VID token is issued from the attribute information providing server 10 to the user device 30 via the network 70 (step 204).
- a VID token is passed from the user device 30 to the attribute information receiving device 50,
- the transaction request including the virtual ID is output via the network 70 (Step 205).
- the attribute information receiving device 50 presents the acquired virtual ID to the attribute information providing server 10 and requests disclosure of the accompanying attribute information (Step 206).
- the attribute information providing server 10 discloses the attribute using the virtual ID as a key as credit information, that is, the reference information (virtual record) of the virtual ID to the attribute information receiving device 50 (step 207). In this way, the attribute information receiving device 50 that has acquired the virtual record can use the user device 30
- the user is notified via the network 70 of the consent of the transaction, and the transaction is started between the user device 30 and the attribute information receiving device 50 (step 208).
- FIG. 3 is a diagram schematically illustrating a hardware configuration example of a computer device suitable for realizing the attribute information providing server 10, the user device 30, and the attribute information receiving device 50 of the present embodiment.
- the computer device shown in FIG. 3 includes a CPU (Central Processing Unit) 101 as an arithmetic means, an M / B (mother board) chipset 102, this M / B chipset 102 and a CPU bus.
- a main memory 103 connected to the CPU 101, a video card 104 connected to the CPU 101 via an M / B chipset 102 and an AGP (Accelerated Graphics Port) are also provided.
- a magnetic disk device (HDD) 105 connected to the M / B chipset 102 via a PCI (Peripheral Component Interconnect) bus, and a network interface 106.
- PCI Peripheral Component Interconnect
- a floppy disk drive 108 connected to the M / B chipset 102 from the PCI bus via a low-speed bus such as a bridge circuit 107 and an ISA Ondustry Standard Architecture) bus, and a keyboard / mouse 109 are provided. .
- FIG. 3 merely shows an example of a hardware configuration of a computer device that realizes the present embodiment, and various other configurations can be adopted as long as the present embodiment is applicable.
- the video card 104 instead of providing the video card 104, only the video memory may be mounted and the CPU 101 may process image data.
- ATA AT It is also possible to provide a drive such as a CD-R (Compact Disc Recordable) or a DVD-RAM (Digital Versatile Disc Random Access Memory) via an interface such as Attachment or SCSI (Small Computer System Interface).
- the attribute information providing server 10 includes a customer record display unit 11 and an attribute selection unit 12, which function as a means for receiving a pull-out instruction, as a VID issuing function, and a virtual record generation unit.
- a virtual record generating unit 13 that functions and a VID token issuing unit 14 that functions as one of virtual ID providing means are provided.
- a virtual record reference processing unit 18 and a virtual record issuing unit 19 are provided as a virtual record reference function (virtual record providing means).
- a database 20 for storing customer records and virtual records of the user device 30 as a subscriber is provided by using, for example, the magnetic disk device 105 shown in FIG.
- the record of personal information is stored for each customer by using a GID (Globally-unique ID) as a key as a customer record having a plurality of attributes. Then, a part of the attributes copied from here is registered using the virtual ID as a key. As shown in Fig. 5, even in the case of information of the same individual, only a part of the GID attribute is copied in the virtual ID, and the virtual IDs "V010101" and "V010011" In each case, different attribute information is selected. In the attribute certification of the virtual ID attribute, unnecessary attributes are filtered. Further, for example, as in the virtual ID “V010011” shown in FIG. 5, the name part can be filtered as an anonymous attribute.
- GID Globally-unique ID
- the virtual ID When issuing a virtual ID, the virtual ID is an unlinkable ID with the GID.
- the attribute power of the GID in which only the required attributes are real IDs, is copied.
- the virtual ID field can be handled exactly the same as the real ID, and is configured so as to be indistinguishable from a real ID record with missing attributes.
- the customer record display unit 11 When issuing a virtual ID, the customer record display unit 11 extracts a customer record of the user device 30 as a subscriber from the database 20 and refers to the extracted content for reference. For example, it is displayed on a display (not shown) of the user device 30.
- the customer record displayed here is, for example, a record having a GID as a primary key and a plurality of attributes such as a name and an address, as shown in FIG.
- the customer record display section 11 can display a virtual record generated by selecting a predetermined attribute together with the GID so that the virtual record can be referred to.
- the attribute selection unit 12 causes the user device 30 as a subscriber to extract (select) only the attributes to be presented to the attribute information receiving device 50 as a new business partner from the displayed attributes.
- the virtual record generation unit 13 creates a new record in which only the attributes extracted by the user device 30 are copied.
- an ID that does not conflict with the GID that is the primary key of the existing record is generated, and this is used as a virtual ID.
- the domain in which the value of the virtual ID is defined is sufficiently large, and that a person who does not know the virtual ID does not accidentally search for the virtual ID by a brute force attack or the like.
- the generated virtual record is stored in the database 20.
- the VID token issuing unit 14 issues, as a VID token, the virtual ID generated by the virtual record generating unit 13 and the URL set ⁇ VID, URL ⁇ of its own Sano (attribute information providing server 10).
- the virtual record reference processing unit 18 executes a normal reference process or a VID concealment reference process when referring to a virtual record.
- the attribute information receiving device 50 that has received the VID token from the user device 30 is connected to the attribute information providing server 10 by accessing the URL included in the VID token using, for example, a browser as described above.
- the virtual record reference processing unit 18 searches for a virtual record from the database 20 based on the virtual ID presented from the attribute information receiving device 50, and the virtual record issuing unit 19 displays the display of the attribute information receiving device 50 (shown in FIG. Display the search results.
- the attribute information receiving device 50 can acquire the attribute information in the virtual record by vigorous display. In some cases, the attribute is provided to the attribute information providing server 10 by the virtual record reference processing unit 18 and the virtual record issuing unit 19, so that the attribute information is indeed included in the attribute information providing server 10. Proof services can also be added.
- the confidential reference is to acquire a virtual record while keeping the virtual ID secret from the attribute information providing server 10, and the OT (ObliviousTransfer) described above is used. Below is a brief OT,
- the attribute information providing server 10 randomly determines a secret value $ t_s ⁇ inZ_q $ in advance.
- the attribute information receiving device 50 randomly selects the secret key $ t_u $ from $ Z_q $, and
- a first-order polynomial $ Y (x) $ that passes through two points $ ⁇ (0, Q_0), (h, Q_u) ⁇ $ is uniquely determined using, for example, Lagrange's interpolation method. .
- the attribute information receiving apparatus 50 has the secret key $ t_u $ corresponding thereto, and thus can decrypt the ElGamal ciphertext returned from the attribute information providing server 10. Therefore, one piece of secret information can be obtained.
- the virtual ID (VID) of the attribute information receiving device 50 can be set as follows in the order of the entire customer record. .
- the attribute information providing server 10 can make the setting possible by using a one-way hash function H0 and publishing a list of H (VID). Where the Nosh function H The algorithm shall be public. Also, for example, the attribute information receiving device 50, which is a new business operator, can know what virtual ID the user has in the H (VID) list.
- the H (VID) -th record can be acquired by the OT protocol.
- the user may specify a value other than the H (VID) corresponding to the virtual ID owned by the user.
- another hash function H'O is used and the virtual record is used in advance. Is encrypted using H as the key and (VID) as the key.
- the algorithm of this hash function H ' is also made public. In summary, it is configured as follows.
- the virtual record for example, based on the virtual ID obtained from the user device 30, the virtual record
- the user device 30 as a subscriber uses a predetermined browser to provide attribute information managed by a personal information handling company via a network 70. Configured to enter server 10. Then, only the necessary information extracted from the personal attribute table stored in the database 20 on the attribute information providing server 10 is registered as a virtual record, and a virtual ID is issued as a key for this. Was. Thereafter, the user device 30 sends the virtual ID and the information required for authentication to the attribute information receiving device 50, which is a new trader, and the attribute information receiving device 50 uses the virtual ID to send the attribute information to the attribute information providing server 10. You are logged in. Then, the attribute information receiving device 50 obtains the information data registered in the virtual record from the attribute information providing server 10, thereby obtaining the attribute data. , It is possible to determine whether the business partner is reliable and start the business.
- the user device 30 can read only its own attribute record on the attribute information providing server 10.
- the attribute information receiving device 50 can read only the virtual record by the virtual ID (+ password) passed from the attribute information providing server 10. At this time, the following privacy requirements can be added as needed.
- the attribute information providing server 10 determines which virtual ID power, that is, which user device 30 to pass the virtual record. I can't know (I can't). As
- the above requirements (1) and (3) are easily realized by using the conventional authentication mechanism.
- the requirement (2) above can be implemented as a server-side check when registering a virtual record as follows.
- the issuance of the virtual record and the virtual ID on the attribute information providing server 10 is performed as follows.
- the personal information record is registered on the database 20 with the ID GID as a primary key.
- the user device 30 as a subscriber creates an empty record using a virtual ID (VID) unrelated to the GID as a key.
- VIP virtual ID
- the attribute information providing server 10 calculates the OR of the attribute part of the original record and the attribute part of the virtual record, and verifies that the result is equal to the attribute part of the original record. That is,
- an organization having personal information provides a part of personal information to a third party at the request of the individual. Institutions with this personal information will be able to develop businesses that provide it. Also, the subscriber (user device 30) can easily obtain necessary credit on the Internet (network 70). As an organization that has personal information (attribute information providing server 10), personal information can be obtained with the consent of subscribers (user devices 30) who can also access financial institutions, ISPs (Internet Service Providers), and online shopping sites. Because it is issued, there is no privacy issue.
- ISPs Internet Service Providers
- the new trader (attribute information receiving device 50) can see the passed information as sufficient credit information is optional for the new trader (attribute information receiving device 50). Furthermore, the provider of personal information (attribute information providing server 10) is responsible only for the information to be disclosed if it is equivalent to the information it has (it has not been falsified), and the credit information itself There is no need to guarantee the legitimacy of For example, it does not guarantee the validity of a subscriber (user device 30) registering false information when registering his / her own information.
- the attribute record itself is handled by the subscriber (user device 30) and personal information, and is shared by the trader (attribute information providing server 10) (attribute registered by the subscriber itself). And the activity history information such as the deposit amount), the subscriber (user device 30) can read only his / her own attribute record on the attribute information providing server 10.
- the subscriber (user device 30) cannot copy any attribute in the original attribute record and cannot falsify it. This allows the subscriber to certify only attributes such as the amount of money without specifying the name.
- the new trader (attribute information receiving apparatus 50) can read only the virtual record by the virtual ID (+ password) to which the subscriber (user apparatus 30) has also been passed. That is, since the authentication is performed only by the virtual ID on the side of the new trader (attribute information receiving device 50), the personal information handling company (attribute information providing server 10) can know who has access to the virtual record. I can't do that. As a result, it is clarified that the delivery of the virtual ID is the responsibility of the subscriber (user device 30). Further, the personal information handling company (attribute information providing server 10) requests the virtual ID of any subscriber (user device 30) by 1-out-of-NOT. I do not know if there is.
- the subscriber (user device 30) can handle which personal information he / she intends to take with the new operator I (attribute information receiving device 50). Only authentication can be received without being known to the attribute information providing server 10). As a result, the protection of the privacy of the subscriber (user device 30) is strengthened, and the personal information trader (attribute information providing server 10) is provided with a service that does not require unnecessary information to be known. Becomes possible.
- Examples of utilization of the present invention include a server used as an attribute information providing server, a computer device such as a PC used as a user device and an attribute information receiving device, and the like, which are connected via a network such as the Internet.
- a Web-connected system configuration is possible.
- the attribute information providing server applied as a service provider can be an ISP (Internet Service Provider), a financial institution, a shop site, or the like. The higher the social trust as a service provider, the more valuable the credit service.
- FIG. 1 is a diagram showing an overall configuration of an attribute information providing system (credit providing system) to which the present embodiment is applied.
- FIG. 2 is a flowchart showing a process executed by each device of the attribute information providing system.
- FIG. 3 is a diagram schematically showing an example of a hardware configuration of a computer device suitable for realizing the attribute information providing server, the user device, and the attribute information receiving device of the present embodiment.
- FIG. 4 is a diagram showing a functional configuration in an attribute information providing server of the present embodiment.
- FIG. 5 is a diagram showing an example of a customer record and a virtual record displayed on a display of a user device.
- Attribute information providing server personal information server
- 11 customer record display unit
- 12 attribute selection unit
- 13 virtual record generation unit
- 14 VID token issuing unit
- 18 virtual Record reference processing unit
- 19 Virtual record issuing unit
- 20 Database
- 30 User device
- 50 Attribute information receiving device (credit information receiving device)
- 70 Network
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005513423A JP5078257B2 (ja) | 2003-08-28 | 2004-08-18 | 属性情報提供サーバ、属性情報提供方法、およびプログラム |
US10/568,513 US8122511B2 (en) | 2003-08-28 | 2004-08-18 | Attribute information providing method |
US13/343,049 US8713691B2 (en) | 2003-08-28 | 2012-01-04 | Attribute information providing system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003304882 | 2003-08-28 | ||
JP2003-304882 | 2003-08-28 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/568,513 Continuation US8122511B2 (en) | 2003-08-28 | 2004-08-18 | Attribute information providing method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005022428A1 true WO2005022428A1 (ja) | 2005-03-10 |
Family
ID=34269282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/011831 WO2005022428A1 (ja) | 2003-08-28 | 2004-08-18 | 属性情報提供サーバ、属性情報提供方法、およびプログラム |
Country Status (4)
Country | Link |
---|---|
US (2) | US8122511B2 (ja) |
JP (1) | JP5078257B2 (ja) |
CN (1) | CN1842817A (ja) |
WO (1) | WO2005022428A1 (ja) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006319410A (ja) * | 2005-05-10 | 2006-11-24 | Kddi Corp | ユーザ情報管理方法およびシステム |
JP2008541206A (ja) * | 2005-04-19 | 2008-11-20 | マイクロソフト コーポレーション | ネットワーク商取引 |
JP2009123154A (ja) * | 2007-11-19 | 2009-06-04 | Hitachi Ltd | 属性証明書管理方法及び装置 |
JP2010506306A (ja) * | 2006-10-05 | 2010-02-25 | マイクロソフト コーポレーション | プライバシーの発行 |
JP2010225074A (ja) * | 2009-03-25 | 2010-10-07 | Kddi R & D Laboratories Inc | 信頼性保証サーバおよびサービス連携システム |
US8069256B2 (en) * | 2005-08-23 | 2011-11-29 | Mehran Randall Rasti | System and method to curb identity theft |
US8996423B2 (en) | 2005-04-19 | 2015-03-31 | Microsoft Corporation | Authentication for a commercial transaction using a mobile module |
CN109600443A (zh) * | 2018-12-14 | 2019-04-09 | 北京向上心科技有限公司 | 客户端功能模块后台运营系统及方法 |
JP2020106927A (ja) * | 2018-12-26 | 2020-07-09 | 富士通株式会社 | 情報処理システム、情報処理プログラム、情報処理方法及び情報処理装置 |
JP2021179857A (ja) * | 2020-05-14 | 2021-11-18 | 株式会社日立製作所 | データ生成支援装置、データ生成支援方法、及びデータ生成支援システム |
WO2022130507A1 (ja) * | 2020-12-15 | 2022-06-23 | 日本電信電話株式会社 | ユーザ情報管理システム、ユーザ情報管理方法、ユーザエージェントおよびプログラム |
JP7378650B1 (ja) * | 2022-06-29 | 2023-11-13 | 三菱電機株式会社 | 個人情報確認装置、個人情報確認方法及び個人認証サーバ |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5078257B2 (ja) | 2003-08-28 | 2012-11-21 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 属性情報提供サーバ、属性情報提供方法、およびプログラム |
JP4408692B2 (ja) * | 2003-12-19 | 2010-02-03 | 富士通株式会社 | 通信装置管理プログラム |
US7698734B2 (en) * | 2004-08-23 | 2010-04-13 | International Business Machines Corporation | Single sign-on (SSO) for non-SSO-compliant applications |
US7788729B2 (en) * | 2005-03-04 | 2010-08-31 | Microsoft Corporation | Method and system for integrating multiple identities, identity mechanisms and identity providers in a single user paradigm |
US20100325297A1 (en) * | 2005-04-13 | 2010-12-23 | Romney Todd H | Apparatus, system, and method for facilitating electronic communication and privacy of electronic records based on a personal contact |
JP5208549B2 (ja) * | 2008-03-25 | 2013-06-12 | 株式会社東芝 | 通信装置、システム、送信方法及びプログラム |
EP2182464B1 (en) * | 2008-11-04 | 2018-04-04 | Amadeus S.A.S. | Method and system for storing and retrieving information |
US20120101915A1 (en) * | 2008-12-11 | 2012-04-26 | Yanchao Fu | Commission based sale on e-commerce |
US8849246B2 (en) | 2010-08-27 | 2014-09-30 | Wherepro, Llc | Operation of a computing device involving wireless tokens |
JPWO2012067214A1 (ja) * | 2010-11-15 | 2014-05-19 | 日本電気株式会社 | 情報処理装置、情報処理方法、及び、プログラム |
KR20120061308A (ko) * | 2010-12-03 | 2012-06-13 | 삼성전자주식회사 | 휴대용 단말기에서 데이터 베이스를 제어하기 위한 장치 및 방법 |
US9116728B2 (en) * | 2010-12-21 | 2015-08-25 | Microsoft Technology Licensing, Llc | Providing a persona-based application experience |
US9003507B2 (en) * | 2012-03-23 | 2015-04-07 | Cloudpath Networks, Inc. | System and method for providing a certificate to a third party request |
DE102013101834B4 (de) | 2013-02-25 | 2024-06-27 | Bundesdruckerei Gmbh | System und Verfahren zur Erstellung eines digitalen Attributzertifikats mit einer Attributnetzwerkentität und einer Zertifizierungsnetzwerkentität |
US20150199645A1 (en) * | 2014-01-15 | 2015-07-16 | Bank Of America Corporation | Customer Profile View of Consolidated Customer Attributes |
US9923942B2 (en) | 2014-08-29 | 2018-03-20 | The Nielsen Company (Us), Llc | Using messaging associated with adaptive bitrate streaming to perform media monitoring for mobile platforms |
US10068256B2 (en) * | 2014-10-08 | 2018-09-04 | Microsoft Technology Licensing, Llc | User directed information collections |
US11456876B2 (en) * | 2015-03-26 | 2022-09-27 | Assa Abloy Ab | Virtual credentials and licenses |
US10482455B2 (en) * | 2015-05-01 | 2019-11-19 | Capital One Services, Llc | Pre-provisioned wearable token devices |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11149504A (ja) * | 1997-11-17 | 1999-06-02 | Hitachi Ltd | 個人情報管理方法および装置 |
JP2002082955A (ja) * | 2000-09-11 | 2002-03-22 | Dat Japan Kk | 可変長データベース装置及びアクセス方法 |
JP2002203109A (ja) * | 2000-12-28 | 2002-07-19 | Credit Information Center Corp | データベースへのアクセス許可システム、アクセス許可方法、及びデータベース管理装置 |
JP2002366730A (ja) * | 2001-06-06 | 2002-12-20 | Hitachi Ltd | 個人情報管理方法及びその実施システム並びにその処理プログラム |
JP2003150725A (ja) * | 2002-05-20 | 2003-05-23 | Business System Design:Kk | 個人情報汎用的多目的利用サービスシステム |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4926479A (en) * | 1988-04-29 | 1990-05-15 | Massachusetts Institute Of Technology | Multiprover interactive verification system |
US6311214B1 (en) * | 1995-07-27 | 2001-10-30 | Digimarc Corporation | Linking of computers based on optical sensing of digital data |
US5903721A (en) * | 1997-03-13 | 1999-05-11 | cha|Technologies Services, Inc. | Method and system for secure online transaction processing |
US6714979B1 (en) * | 1997-09-26 | 2004-03-30 | Worldcom, Inc. | Data warehousing infrastructure for web based reporting tool |
US6587836B1 (en) * | 1997-09-26 | 2003-07-01 | Worldcom, Inc. | Authentication and entitlement for users of web based data management programs |
US6915271B1 (en) * | 1998-03-11 | 2005-07-05 | The Product Engine, Inc. | Method and system for delivering redeeming dynamically and adaptively characterized promotional incentives on a computer network |
US6505300B2 (en) * | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6182142B1 (en) * | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources |
US6453353B1 (en) * | 1998-07-10 | 2002-09-17 | Entrust, Inc. | Role-based navigation of information resources |
US6834272B1 (en) * | 1999-08-10 | 2004-12-21 | Yeda Research And Development Company Ltd. | Privacy preserving negotiation and computation |
US7290056B1 (en) * | 1999-09-09 | 2007-10-30 | Oracle International Corporation | Monitoring latency of a network to manage termination of distributed transactions |
CA2395498C (en) * | 1999-12-24 | 2013-08-27 | Telstra New Wave Pty Ltd | A virtual token |
US7359507B2 (en) * | 2000-03-10 | 2008-04-15 | Rsa Security Inc. | Server-assisted regeneration of a strong secret from a weak secret |
CA2305249A1 (en) * | 2000-04-14 | 2001-10-14 | Branko Sarcanin | Virtual safe |
WO2002005061A2 (en) * | 2000-07-06 | 2002-01-17 | David Paul Felsher | Information record infrastructure, system and method |
JP2002342170A (ja) * | 2001-05-16 | 2002-11-29 | Sharp Corp | 個人情報の管理方法、管理装置および管理システムならびに個人情報管理プログラムおよびそれを記録した記録媒体 |
WO2003055132A1 (en) | 2001-12-21 | 2003-07-03 | Sony Computer Entertainment Inc. | Methods and apparatus for secure distribution of program content |
JP5078257B2 (ja) | 2003-08-28 | 2012-11-21 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 属性情報提供サーバ、属性情報提供方法、およびプログラム |
-
2004
- 2004-08-18 JP JP2005513423A patent/JP5078257B2/ja not_active Expired - Fee Related
- 2004-08-18 US US10/568,513 patent/US8122511B2/en not_active Expired - Fee Related
- 2004-08-18 CN CNA2004800246947A patent/CN1842817A/zh active Pending
- 2004-08-18 WO PCT/JP2004/011831 patent/WO2005022428A1/ja active Application Filing
-
2012
- 2012-01-04 US US13/343,049 patent/US8713691B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11149504A (ja) * | 1997-11-17 | 1999-06-02 | Hitachi Ltd | 個人情報管理方法および装置 |
JP2002082955A (ja) * | 2000-09-11 | 2002-03-22 | Dat Japan Kk | 可変長データベース装置及びアクセス方法 |
JP2002203109A (ja) * | 2000-12-28 | 2002-07-19 | Credit Information Center Corp | データベースへのアクセス許可システム、アクセス許可方法、及びデータベース管理装置 |
JP2002366730A (ja) * | 2001-06-06 | 2002-12-20 | Hitachi Ltd | 個人情報管理方法及びその実施システム並びにその処理プログラム |
JP2003150725A (ja) * | 2002-05-20 | 2003-05-23 | Business System Design:Kk | 個人情報汎用的多目的利用サービスシステム |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008541206A (ja) * | 2005-04-19 | 2008-11-20 | マイクロソフト コーポレーション | ネットワーク商取引 |
US8996423B2 (en) | 2005-04-19 | 2015-03-31 | Microsoft Corporation | Authentication for a commercial transaction using a mobile module |
JP2006319410A (ja) * | 2005-05-10 | 2006-11-24 | Kddi Corp | ユーザ情報管理方法およびシステム |
US8069256B2 (en) * | 2005-08-23 | 2011-11-29 | Mehran Randall Rasti | System and method to curb identity theft |
JP2010506306A (ja) * | 2006-10-05 | 2010-02-25 | マイクロソフト コーポレーション | プライバシーの発行 |
JP2009123154A (ja) * | 2007-11-19 | 2009-06-04 | Hitachi Ltd | 属性証明書管理方法及び装置 |
JP2010225074A (ja) * | 2009-03-25 | 2010-10-07 | Kddi R & D Laboratories Inc | 信頼性保証サーバおよびサービス連携システム |
CN109600443A (zh) * | 2018-12-14 | 2019-04-09 | 北京向上心科技有限公司 | 客户端功能模块后台运营系统及方法 |
JP2020106927A (ja) * | 2018-12-26 | 2020-07-09 | 富士通株式会社 | 情報処理システム、情報処理プログラム、情報処理方法及び情報処理装置 |
JP2021179857A (ja) * | 2020-05-14 | 2021-11-18 | 株式会社日立製作所 | データ生成支援装置、データ生成支援方法、及びデータ生成支援システム |
JP7431100B2 (ja) | 2020-05-14 | 2024-02-14 | 株式会社日立製作所 | データ生成支援装置、データ生成支援方法、及びデータ生成支援システム |
WO2022130507A1 (ja) * | 2020-12-15 | 2022-06-23 | 日本電信電話株式会社 | ユーザ情報管理システム、ユーザ情報管理方法、ユーザエージェントおよびプログラム |
JP7501668B2 (ja) | 2020-12-15 | 2024-06-18 | 日本電信電話株式会社 | ユーザ情報管理システム、ユーザ情報管理方法、ユーザエージェントおよびプログラム |
JP7378650B1 (ja) * | 2022-06-29 | 2023-11-13 | 三菱電機株式会社 | 個人情報確認装置、個人情報確認方法及び個人認証サーバ |
Also Published As
Publication number | Publication date |
---|---|
JP5078257B2 (ja) | 2012-11-21 |
US20120117657A1 (en) | 2012-05-10 |
US8122511B2 (en) | 2012-02-21 |
JPWO2005022428A1 (ja) | 2007-11-01 |
US8713691B2 (en) | 2014-04-29 |
US20060200671A1 (en) | 2006-09-07 |
CN1842817A (zh) | 2006-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5078257B2 (ja) | 属性情報提供サーバ、属性情報提供方法、およびプログラム | |
US11750617B2 (en) | Identity authentication and information exchange system and method | |
EP3132564B1 (en) | Identity verification system and associated methods | |
JP4274421B2 (ja) | 擬似匿名によるネットワーク上におけるユーザーおよびグループ認証方法およびシステム | |
Windley | Digital identity | |
JP5165598B2 (ja) | 秘密鍵とのアカウントリンク | |
US20070261114A1 (en) | Method and system for secure sharing of personal information | |
US20030158960A1 (en) | System and method for establishing a privacy communication path | |
US20150213131A1 (en) | Domain name searching with reputation rating | |
US20030088517A1 (en) | System and method for controlling access and use of private information | |
WO2007137368A1 (en) | Method and system for verification of personal information | |
CA2832754A1 (en) | Method and system for enabling merchants to share tokens | |
US20120278876A1 (en) | System, method and business model for an identity/credential service provider | |
US20110055547A1 (en) | Personal information management and delivery mechanism | |
CN101291217A (zh) | 网络身份认证方法 | |
US20060026692A1 (en) | Network resource access authentication apparatus and method | |
US20040243802A1 (en) | System and method employed to enable a user to securely validate that an internet retail site satisfied pre-determined conditions | |
WO2001090968A1 (en) | A system and method for establishing a privacy communication path | |
JP2004341832A (ja) | 個人情報管理方法及びシステム、開示用識別子発行装置、個人情報開示装置 | |
WO2021124498A1 (ja) | 保証制御方法、情報処理装置および保証制御プログラム | |
Palfrey et al. | Digital identity interoperability and einnovation | |
US20240086936A1 (en) | Decentralized Identity Methods and Systems | |
KR20210087640A (ko) | 빅데이터 기반 증명 서비스 방법 | |
Gasser et al. | Case study: Digital identity interoperability and eInnovation | |
Plateaux et al. | Online user's registration respecting privacy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480024694.7 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10568513 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005513423 Country of ref document: JP |
|
WWP | Wipo information: published in national office |
Ref document number: 10568513 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |