WO2006018890A1 - メモリカード、データ交換システム及びデータ交換方法 - Google Patents
メモリカード、データ交換システム及びデータ交換方法 Download PDFInfo
- Publication number
- WO2006018890A1 WO2006018890A1 PCT/JP2004/011964 JP2004011964W WO2006018890A1 WO 2006018890 A1 WO2006018890 A1 WO 2006018890A1 JP 2004011964 W JP2004011964 W JP 2004011964W WO 2006018890 A1 WO2006018890 A1 WO 2006018890A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- unit
- certificate
- signature
- memory card
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to a memory card, a data exchange system, and a data exchange method for exchanging data safely.
- IC cards for identification cards, membership cards, and examination tickets.
- the IC card can have a writable / readable area.
- One organization writes information to the IC card, and the IC card owner or another organization reads the information from the IC card, so that information can be exchanged and shared.
- Patent Document 1 presents a mechanism whereby another medical institution can refer to medical information when the medical institution on the patient's IC card writes the medical information.
- Patent Document 1 JP 2000-285189 A
- a system that uses the IC card uses an IC, such as an automated teller machine (ATM).
- ATM automated teller machine
- PIN Personal Identification Number
- the system into which the IC card is inserted must be a reliable system that does not illegally store or use the PIN information entered by the user. Therefore, in systems using IC cards that require PIN input, mutual authentication is generally performed between the IC card and the system into which the IC card is inserted. In order to perform mutual authentication, it is necessary to securely share the key information in the common key cryptosystem and securely hold the public / private key pair in the public key cryptosystem.
- An object of the present invention is to write information that can be read only by an IC card owner without inputting a PIN, and to authenticate and tamper the creator of the written information.
- the data power written on the IC card can be read only by the IC card owner, the author of the written data can be identified, and the written data has been altered. It is to guarantee that it is lazy.
- the memory card of the present invention comprises:
- a confidential data receiving unit that receives confidential data generated by the writing device by encrypting data from the writing device
- a public storage unit that stores confidential data received by the confidential data reception unit; an authentication data reception unit that receives authentication data transmitted by the reader; an authentication data storage unit that stores regular authentication data;
- An authentication unit that performs authentication by comparing authentication data received by the authentication data receiving unit with regular authentication data stored in the authentication data storage unit;
- a private storage unit for storing data obtained by decrypting confidential data stored in the public storage unit when the authentication performed by the authentication unit is successful
- a card data transmission unit that transmits data stored in the private storage unit to the reading device when the authentication performed by the authentication unit is successful.
- the confidential data stored in the public storage unit is transmitted to the reading device, and the memory card further includes:
- a card data receiving unit that receives from the reading device the data obtained by decrypting the confidential data transmitted by the card data transmitting unit;
- the authentication performed by the authentication unit is successful, the data received by the card data receiving unit is received. Storing data.
- the memory card further includes:
- a card certificate storage for storing a certificate including the first public key
- a certificate transmission unit that transmits the certificate stored in the card certificate storage unit to the writing device
- a card secret key storage unit that stores a first secret key that forms a pair with the first public key; a card common key reception unit that receives an encrypted common key transmitted by the reader; and the card secret A common key decryption unit for decrypting the common key received by the card common key reception unit using the first secret key stored in the key storage unit;
- a card common key transmitting unit that transmits the common key decrypted by the common key decrypting unit to the reading device.
- PIN personal identification number
- the memory card further includes:
- a data acquisition unit for acquiring data obtained by decrypting confidential data stored in the public storage unit
- the data acquired by the data acquisition unit is stored.
- the memory card further includes:
- a card certificate storage for storing a certificate including the first public key
- a certificate transmission unit that transmits the certificate stored in the card certificate storage unit to the writing device
- a card secret key storage unit that stores a first secret key that forms a pair with the first public key, and a signature data acquisition unit that acquires encrypted signature data from confidential data stored in the public storage unit;
- a common key acquisition unit for acquiring an encrypted common key from confidential data stored in the public storage unit;
- a common key decryption unit for decrypting the common key acquired by the common key acquisition unit using the first secret key stored in the card secret key storage unit;
- a signature data decryption unit for decrypting the signature data obtained by the signature data obtaining unit using the common key decrypted by the common key decryption unit;
- a digital signature obtaining unit for obtaining a digital signature from the signature data decrypted by the signature data decrypting unit
- a certificate acquisition unit for acquiring a certificate including a second public key from the signature data decrypted by the signature data decryption unit;
- a system certificate verification unit that verifies the certificate acquired by the certificate acquisition unit and acquires a second public key included in the certificate
- a digital signature verification unit that verifies the digital signature acquired by the digital signature acquisition unit using the data acquired by the data acquisition unit and the second public key acquired by the system certificate verification unit;
- the signature data decrypting unit obtains data from the decrypted signature data.
- the memory card further includes:
- CA certificate authority
- the certificate acquired by the certificate acquisition unit is verified based on the certificate acquired by the certificate authority communication unit.
- PIN personal identification number
- the data exchange system of the present invention comprises:
- a writing device for writing data a reading device for reading data, receiving data from the writing device, storing the received data, and transmitting the stored data to the reading device
- a memory card With a memory card
- the memory card is
- the writing device includes:
- a data storage unit for storing data input by the input unit
- a confidential data generation unit that encrypts data stored in the data storage unit to generate confidential data
- a confidential data transmission unit that transmits the confidential data generated by the confidential data generation unit to the confidential data reception unit;
- a reader data receiver for receiving confidential data transmitted by the card data transmitter
- a data acquisition unit for acquiring data obtained by decrypting confidential data received by the reader data reception unit
- An output unit for outputting data acquired by the data acquisition unit
- a reading device data transmitting unit for transmitting data acquired by the data acquiring unit to the card data receiving unit;
- An authentication data transmitting unit configured to transmit the authentication data input by the operation unit to the authentication data receiving unit.
- the data exchange system of the present invention comprises:
- a writing device for writing data a reading device for reading data; a memory card for receiving data from the writing device, storing the received data, and transmitting the stored data to the reading device;
- the memory card is
- the writing device includes: An input section for inputting data;
- a data storage unit for storing data input by the input unit
- a certificate receiver for receiving the certificate transmitted by the certificate transmitter
- a card certificate verification unit that verifies a certificate received by the certificate reception unit and obtains a first public key included in the certificate
- a system private key storage for storing a second private key
- a digital signature generation unit that generates a digital signature using the data stored in the data storage unit and the second secret key stored in the system secret key storage unit;
- a system certificate storage unit for storing a certificate including a second public key paired with the second private key
- a signature data generation unit that generates signature data using the data stored in the data storage unit, the digital signature generated by the digital signature generation unit, and the certificate stored in the system certificate storage unit;
- a common key generation unit for generating a common key
- a signature data encryption unit that encrypts the signature data generated by the signature data using the common key generated by the common key generation unit;
- a common key encryption unit that encrypts the common key generated by the common key generation unit using the first public key acquired by the card certificate verification unit;
- a confidential data generation unit that generates confidential data using the signature data encrypted by the signature data encryption unit and the common key encrypted by the common key encryption unit;
- a confidential data transmission unit that transmits the confidential data generated by the confidential data generation unit to the confidential data reception unit;
- a reader data receiver for receiving confidential data transmitted by the card data transmitter
- a signature data acquisition unit that acquires encrypted signature data from confidential data received by the reader data reception unit
- An encrypted common key is obtained from confidential data received by the reader data receiving unit.
- a common key acquisition unit to obtain;
- a reading device common key transmission unit that transmits the encrypted common key acquired by the common key acquisition unit to the card common key reception unit;
- a reader common key receiver for receiving the decrypted common key transmitted by the card common key transmitter
- a signature data decrypting unit that decrypts the signature data obtained by the signature data obtaining unit using the common key received by the reader common key receiving unit;
- a data acquisition unit for acquiring data from the signature data decrypted by the signature data decryption unit
- a digital signature obtaining unit for obtaining a digital signature from the signature data decrypted by the signature data decrypting unit
- a certificate acquisition unit that acquires a certificate from the signature data decrypted by the signature data decryption unit
- a system certificate verification unit that verifies the certificate acquired by the certificate acquisition unit and acquires a second public key included in the certificate
- a digital signature verification unit that verifies the digital signature acquired by the digital signature acquisition unit using the data acquired by the data acquisition unit and the second public key acquired by the system certificate verification unit;
- An output unit that outputs data acquired by the data acquisition unit based on a result of verification performed by the digital signature verification unit
- a reading device data transmitting unit for transmitting data acquired by the data acquiring unit to the card data receiving unit;
- an authentication data transmitting unit that transmits authentication data input by the operation unit to an authentication data receiving unit.
- the data exchange system of the present invention comprises:
- a writing device for writing data a reading device for reading data, receiving data from the writing device, storing the received data, and transmitting the stored data to the reading device
- a memory card With a memory card
- the memory card is
- the writing device includes:
- a data storage unit for storing data input by the input unit
- a confidential data generation unit that encrypts data stored in the data storage unit to generate confidential data
- a confidential data transmission unit that transmits the confidential data generated by the confidential data generation unit to the confidential data reception unit;
- An authentication data transmitting unit that transmits the authentication data input by the operation unit to the authentication data receiving unit;
- the apparatus includes a reading device data receiving unit that receives data transmitted by the card data transmitting unit, and an output unit that outputs data received by the reading device data receiving unit.
- the data exchange system of the present invention comprises:
- a writing device for writing data a reading device for reading data; a memory card for receiving data from the writing device, storing the received data, and transmitting the stored data to the reading device;
- the memory card is
- the writing device includes:
- a data storage unit for storing data input by the input unit
- a certificate receiver for receiving the certificate transmitted by the certificate transmitter
- the certificate received by the certificate receiver is verified and the first public information included in the certificate A card certificate verification unit for obtaining a key;
- a system private key storage for storing a second private key
- a digital signature generation unit that generates a digital signature using the data stored in the data storage unit and the second secret key stored in the system secret key storage unit;
- a system certificate storage unit for storing a certificate including a second public key paired with the second private key
- a signature data generation unit that generates signature data using the data stored in the data storage unit, the digital signature generated by the digital signature generation unit, and the certificate stored in the system certificate storage unit;
- a common key generation unit for generating a common key
- a signature data encryption unit that converts the signature data generated by the signature data using the common key generated by the common key generation unit
- a common key encryption unit that encrypts the common key generated by the common key generation unit using the first public key acquired by the card certificate verification unit;
- a confidential data generation unit that generates confidential data using the signature data encrypted by the signature data encryption unit and the common key encrypted by the common key encryption unit;
- a confidential data transmission unit that transmits the confidential data generated by the confidential data generation unit to the confidential data reception unit;
- An authentication data transmitting unit that transmits the authentication data input by the operation unit to the authentication data receiving unit;
- the apparatus includes a reading device data receiving unit that receives data transmitted by the card data transmitting unit, and an output unit that outputs data received by the reading device data receiving unit.
- the memory card is
- Authentication is performed by comparing the received authentication data with the stored regular authentication data. If the authentication is successful, the data received from the reader is stored.
- the writing device includes:
- the input authentication data is transmitted to the memory card.
- the memory card further includes:
- the writing device further comprises:
- the acquired certificate is verified, the second public key included in the certificate is acquired, the acquired digital signature is verified using the acquired data and the second public key, and the verification result is based on the verification result.
- the acquired data is output.
- the memory card is
- Confidential data generated by encrypting data by the writing device is stored in the writing device power.
- the received authentication data is authenticated against the stored regular authentication data, and if the authentication is successful, the stored data is transmitted to the reading device, and the writing device is
- the received data is output.
- the memory card further includes:
- the acquired certificate is verified, the second public key included in the certificate is acquired, the acquired digital signature is verified using the acquired data and the second public key, and the writing device
- the received data is output.
- information that can only be read by the IC card owner can be written on the IC card without entering a PIN, and authentication of the creator of the written information and prevention of tampering can be realized.
- the power of data written on the IC card can only be read by the owner of the IC card, the author of the written data can be specified, and the written data has been altered. It is possible to guarantee that it is not.
- Embodiments 1 and 2 are assumed to be memory cards having a certificate authentication function, which are referred to as secure memory cards.
- IC cards with the same functions as memory cards are also applicable.
- first and second embodiments as an example of a writing device, other devices can be used as long as they have the ability to explain using a PC (personal computer) and the function of writing data to a memory card. But it is applicable.
- a mobile phone will be used as an example of a reading device, but other devices can be applied as long as they have a function of reading data from a memory card. .
- a medication instruction is safely stored in a pharmacy using a secure memory card. Can be provided to users.
- Fig. 1 shows the outline of the interaction between the user and the pharmacy as follows.
- the user 104 provides the prescription issued from the hospital and the secure memory card 101 inserted into the mobile phone 103 at the reception of the pharmacy.
- the user 104 attaches the secure memory card 101 to the mobile phone 103 and looks at the content of the medication instruction.
- the user 104 has the secure memory card 101 attached to the mobile phone 103.
- you enter the pharmacy you will receive a paper prescription and a secure memory card 101 taken out from your mobile phone 103.
- the secure memory card 101 is attached to the PC 102, and the medication instruction for the medicine is written to the secure memory card 101 using the PC 102. .
- the medicine 104 and the secure memory card 101 are given to the user 104.
- the user 104 attaches the secure memory card 101 to the mobile phone 103 and browses the medication instruction on the screen of the mobile phone 103.
- FIG. 2 shows a configuration of secure memory card 101 and PC 102 in the system according to the present embodiment.
- FIG. 2 shows a configuration of secure memory card 101 and PC 102 in the system according to the present embodiment.
- FIG. 3 shows the configuration of the secure memory card 101 and the mobile phone 103 in the system according to the present embodiment.
- This system consists of a secure memory card 101, a user 102 who owns the secure memory card 101, writes information that can be read only by the secure memory card 101, a PC 102, and a mobile phone 103 that reads and displays information from the secure memory card 101. .
- the secure memory card 101 is common to a card secret key storage unit 208 for storing a secret key in a public key cryptosystem such as RSA (Rivest Shamir Adleman) or oval ⁇ , and a card that receives a common key from the mobile phone 103.
- Certificate sending unit 201 secure memory card owner only knows, authentication data storage unit 205 for storing PIN, authentication data receiving unit 207 for receiving PIN entered in mobile phone 103, authentication unit 206 for PIN verification If the correct PIN is entered Private storage unit 203 that can be read / written only from the outside, card data reception unit 204 that receives data from the mobile phone 103, public storage unit 210 that can be read / written from the outside without PIN verification, and confidential data reception unit that receives confidential data from the PC 102 211, a card data transmission unit 212 for transmitting data to the mobile phone 103.
- confidential data is, for example, EnvelopedData disclosed in RFC-2630 ("Cryptographic Message Syntax," IETF Network Working Group, R. Housley, RFC-2630, June 1999). It is composed of the data subject to issue and the encrypted common key used for the sign of the subject data.
- the data to be encrypted is signature data.
- the signature data is, for example, SignedData disclosed in RFC-2630. Data that the PC102 user wants to send to the owner of the secure memory card 101, such as a medication instruction, and the PC102 or PC102 user It consists of a digital signature and a certificate.
- the PC 102 which writes data that can only be read by the user 104 to the secure memory card 101, has an input unit 213 that receives input from a user such as the pharmacy 105, a data storage unit 215 that stores input data, and the like.
- Certificate receiving unit 214 that receives a certificate from the secure memory card 101, a card certificate verification unit 216 that verifies the validity of this certificate, and a system secret that stores a private key in a public key cryptosystem such as RSA or elliptic encryption Key storage unit 2 18, system certificate storage unit 217 for storing a public key certificate paired with this private key, digital signature generation unit 220 for generating a digital signature, and data and system stored in data storage unit 215
- the signature data generation unit 219 generates signature data using the certificate stored in the certificate storage unit 217 and the digital signature generated by the digital signature generation unit 220.
- Each unit having a cryptographic function performs encryption / decryption, hash calculation, random number generation, etc. of a common key cryptosystem or public key cryptosystem.
- the PC 102 has a display unit such as a liquid crystal display (LCD).
- the mobile phone 103 owned by the user 104 includes a reading device data transmission unit 226 that transmits data to the secure memory card 101, a reading device data reception unit 239 that receives data from the secure memory card 101, and a secure memory card Common key acquisition unit 237 for acquiring a common key included in confidential data received from 101, reader common key transmission unit 241 for transmitting this common key to secure memory card 101, and a common key decrypted by secure memory card 101 Is received from the secure memory card 101, a signature data acquisition unit 240 that acquires signature data included in confidential data received from the secure memory card 101, and a signature data decryption unit that decrypts the signature data 238, data acquisition unit 227 for acquiring data such as medication instructions from the decrypted signature data, decrypted signature A digital signature acquisition unit 232 that acquires a digital signature from data, a digital signature verification unit 231 that verifies the validity of the digital signature, a certificate acquisition unit 236 that acquires a certificate from the decrypted signature data, System certificate verification to
- FIG. 4 is a sequence diagram showing a process of writing a medication instruction form that can be read only by the user 104 to the secure memory card 101 without using a PIN, using the PC 102 in the pharmacy.
- FIG. 5 is a flowchart showing the same processing.
- the pharmacist 105 identifies the medication instruction issued to the user 104 by the PC 102, and attaches the secure memory card 101 to the PC 102 in the pharmacy. Then, the pharmacist instructs the PC 102 to issue a medication instruction form from the input unit 213 of the PC 102.
- the data storage unit 215 of the PC 102 stores the input medication instruction data. The subsequent processing flow is described below.
- the PC 102 sends a certificate acquisition request to the secure memory card 101.
- the certificate transmission unit 201 of the secure memory card 101 reads the certificate of the user 104 from the card certificate storage unit 202 and sends it to the PC 102.
- the certificate receiving unit 214 of the PC 102 receives this certificate (S501).
- the card certificate verification unit 216 verifies the obtained certificate of the user 104 (hereinafter referred to as a user certificate) (S502).
- the card certificate verification unit 216 holds a certificate issued by a trusted certificate authority (CA) and a certificate revocation list (CRL) and uses it for certificate verification.
- CA trusted certificate authority
- CTL certificate revocation list
- the digital signature generation unit 220 uses the private key stored in the system private key storage unit 218 to apply a digital signature to the medication instruction. Generate.
- the medication data, digital signature, and certificate stored in the system certificate storage unit 217 (hereinafter referred to as a pharmacy certificate) In 219, the data is combined to generate signature data (S503).
- the common key generation unit 221 randomly generates a common key.
- the signature data encryption unit 222 encrypts the signature data with the common key.
- the common key encryption unit 223 encrypts the common key with the public key included in the user certificate.
- the confidential data generation unit 224 combines the encrypted medication instruction and the encrypted common key to generate confidential data (S504).
- the confidential data is transmitted from the confidential data transmitting unit 225 of the PC 102 to the confidential data receiving unit 211 of the secure memory card 101.
- the secure memory card 101 writes the received confidential data as a file in the public storage unit 210 (S505).
- the file name for example, a name such as “medication instruction 20040401” and the date of creation and the name of the file should be given. Since this writing process is a writing process to the public storage unit 210, a PIN input operation is not necessary.
- FIG. 6 is a sequence diagram showing a process of browsing the medication instruction written in the secure memory card 101 using the mobile phone 103 owned by the user 104.
- FIG. 7 is a flowchart showing the same processing.
- the user 104 who has received the secure memory card 101 at the pharmacy attaches the secure memory card 101 to the mobile phone 103.
- the mobile phone 103 acquires a file list in the public storage unit 210 of the secure memory card 101 (S701).
- the user 104 selects a medication instruction from the list using the operation unit 228. At this time, the file list may be displayed on the output unit 229 for the IJ user 104.
- the secure memory card 101 that has received the request to acquire the selected file from the mobile phone 103 retrieves the medication instruction form that is the confidential data of the confidential data from the public storage unit 210 and transmits the card data. Transmitted from unit 212.
- the reading device data receiving unit 239 of the mobile phone 103 receives this confidential file (S702).
- the mobile phone 103 decodes the read confidential data, and the common key acquisition unit 237 acquires the encrypted common key.
- the signature data acquisition unit 240 acquires the signature data of the medication instruction encrypted with the common key.
- the reading device common key transmitting unit 241 transmits the signed common key to the secure memory card 101.
- SE The cure memory card 101 receives the common key at the card common key receiving unit 242 and decrypts the common key using the secret key stored in the card private key storage unit 208 at the common key decryption unit 235. To do.
- the decrypted common key is transmitted to the mobile phone 103 by the card common key transmission unit 209.
- the cellular phone 103 receives the decrypted common key at the reader common key receiving unit 233.
- the signature data decrypting unit 238 decrypts the signature data of the encrypted medication instruction using this common key (S703).
- the decrypted signature data is separated into a medication instruction, a digital signature, and a pharmacy certificate, and passed to a data acquisition unit 227, a digital signature acquisition unit 232, and a certificate acquisition unit 236, respectively. Then, the system certificate verification unit 234 verifies the pharmacy certificate acquired by the certificate acquisition unit 236.
- the system certificate verification unit 234 holds a certificate issued by a trusted certificate authority and a certificate revocation list and uses them for certificate verification. In the pharmacy certificate verification process, it is also possible to obtain certificate authority certificates and certificate revocation lists from outside by communication.
- the digital signature verification unit 231 verifies the validity of the digital signature using the medication instruction, the public key included in the pharmacy certificate, and the digital signature. (S704).
- the mobile phone 103 transmits a request to store the medication instruction in the private storage unit 203 to the secure memory card 101 (S706).
- secure memory card 101 requests mobile phone 103 to enter a PIN.
- a PIN input window may be displayed on the output unit 229, and the user 104 may be allowed to input a PIN in a predetermined field of the PIN input window.
- the input PIN is transmitted from the authentication data transmitting unit 230 of the mobile phone 103 to the authentication data receiving unit 207 of the secure memory card 101.
- the authentication unit 206 of the secure memory card 101 compares the received PIN with the PIN stored in the authentication data storage unit 205 to verify the PIN and perform authentication. Authentication failed If the verification result is NG, the process ends.
- the reading device data transmission unit 226 of the mobile phone 103 transmits the medication instruction file to the secure memory card 101.
- the card data receiving unit 204 of the secure memory card 101 receives this file and stores it in the private storage unit 203 (S708). Thereafter, the encrypted medication instruction in the public storage unit 210 may be deleted.
- the pharmacist 105 does not need to input the PIN of the secure memory card 101 when writing the medication instruction into the secure memory card 101. You don't need to ask a known user 104 to enter your PIN.
- the medication instructions are signed data with a digital signature of the pharmacy, the medication instructions are not falsified by verifying the signature data using the mobile phone 103, and the medication instructions are You can confirm that it was created.
- the signature data including the medication instruction is entered so that only the user 104 who is the owner of the secure memory card 101 can decrypt it, the medication instruction is not the owner of the secure memory card 101. Will not be seen by snooping. If the user wishes to view the medication instruction again, only the PIN input and verification process is required, and encryption processes such as decryption and signature verification are not required.
- FIG. 8 shows the configuration of the system according to the present embodiment.
- the unit 236, the common key acquisition unit 237, the signature data decryption unit 238, and the signature data acquisition unit 240 are transferred to the secure memory card 101.
- the configuration of the PC 102 that writes data to the secure memory card 101 is omitted in FIG. 8, it is the same as that of the first embodiment (FIG. 2).
- FIG. 9 is a sequence diagram showing a process of browsing the medication instruction written in the secure memory card 101 using the mobile phone 103 owned by the user 104.
- FIG. 10 is a flowchart showing the same processing.
- the user 104 who received the secure memory card 101 at the pharmacy, sends Insert your memory card 101.
- the secure memory card 101 confirms whether there is a confidential file of the medication instruction in the public storage unit 210 (S1001).
- the secure memory card 101 decrypts and verifies the confidential file in the public storage unit 210, and transmits an approval request for moving to the private storage unit 203 to the mobile phone 103.
- the cellular phone 103 displays this consent request on the output unit 229.
- the user 104 communicates the intention of consent via the operation unit 228, a consent notice is transmitted from the mobile phone 103 to the secure memory card 101.
- the secure memory card 101 decodes the confidential file, and the common key acquisition unit 237 acquires the encrypted common key.
- the signature data acquisition unit 240 acquires the signature data of the medication instruction encrypted with the common key.
- the common key decryption unit 235 decrypts the common key using the secret key of the secure memory card 101.
- the secret key of the secure memory card 101 is the one stored in the card secret key storage unit 208.
- the signature data decryption unit 238 decrypts the signature data of the encrypted medication instruction using the decrypted common key (S1002).
- the decrypted signature data is separated into a medication instruction, a digital signature, and a pharmacy certificate, and passed to a data acquisition unit 227, a digital signature acquisition unit 232, and a certificate acquisition unit 236, respectively.
- the system certificate verification unit 234 verifies the pharmacy certificate acquired by the certificate acquisition unit 236.
- the system certificate verification unit 234 holds a certificate issued by a trusted certificate authority and a certificate revocation list and uses them for certificate verification.
- the secure memory card 101 has a certificate authority communication unit (not shown), and this certificate authority communication unit obtains the certificate authority certificate and the certificate revocation list from the outside by communication in the pharmacy certificate verification process. This form is also possible.
- the digital signature verification unit 231 verifies the validity of the digital signature using the medication instruction, the public key included in the pharmacy certificate, and the digital signature (S1003). .
- the process is terminated.
- the validity of the digital signature is confirmed (verification result is ⁇ K)
- the medication instruction document acquired by the data acquisition unit 227 is copied to the private storage unit 203 (S1004).
- the secure memory card 101 stores the parent of the medication instruction.
- the exhibition file is deleted from the public storage unit 210 (S1005).
- the cellular phone 103 requests a file list in the private storage unit 203 of the secure memory card 101 (S1006).
- the secure memory card 101 requests the mobile phone 103 to input a PIN.
- the user 104 inputs a PIN using the operation unit 228 (S1007).
- a PIN input window may be displayed on the output unit 229, and the user 104 may be allowed to input a PIN in a predetermined field of the PIN input window.
- the input PIN is transmitted from authentication data transmission unit 230 of mobile phone 103 to authentication data reception unit 207 of secure memory card 101.
- the authentication unit 206 of the secure memory card 101 compares the received PIN with the PIN stored in the authentication data storage unit 205 to verify the PIN and perform authentication. If authentication fails (verification result is NG), the process ends. When the authentication is successful (verification result is OK), the card data transmission unit 212 of the secure memory card 101 transmits the file list to the mobile phone 103. The reading device data receiving unit 239 of the mobile phone 103 receives this file list and outputs it to the output unit 229 (S1008).
- This file list includes the medication instruction files that have already been transferred from the public storage unit 210 to the private storage unit 203.
- the card data transmission unit 212 of the secure memory card 101 transmits the medication instruction file to the mobile phone 103.
- the reading device data receiving unit 239 of the mobile phone 103 receives this file and outputs it to the output unit 229, so that the user 104 can view the medication instruction (S1009).
- the secure memory card 101 decrypts the confidential data, and uses the digital signature or certificate included in the confidential data, so that the medication instruction document included in the confidential data is also used. It is possible to confirm the validity of the data. Therefore, it is not necessary to mount these functions in the mobile phone 103 in advance.
- Embodiments 1 and 2 described above only the user 104 who is the owner of the secure memory card 101 can view the data on the medication instruction, but a plurality of users can use the same secure memory card. It is also possible to use 101.
- the PC 102 of the pharmacy stores the data on the medication instruction document.
- the power using the example of writing to your memory card 101 The present invention can also be applied to a case where a writing device having the same function at another location writes other types of data to the secure memory card 101. .
- a public storage area in which data can be written without authentication of the memory card, authentication by PIN authentication
- PIN storage area for storing PINs known only to the card user
- a certificate storage unit and an encryption format processing unit, a certificate verification unit that verifies the obtained certificate, and that has the encryption function necessary for generating signature data, confidential data, and certificate verification Card data writing device characterized in that it comprises a card, and a card characterized in that it comprises a certificate verification unit, a cipher format processing unit, and a signal unit in order to decrypt confidential data and verify signature data. It is characterized by the power of a data browsing device.
- the memory card In a memory card system in which data is written to a memory card or IC card, and the written data is read by the cardholder, the memory card is a public storage area where data can be written without authentication. Private storage area that can be read and written only when authenticated, card owner's certificate is stored and cannot be written, but can be read without authentication, and the card user's private key is stored Private key storage area, PIN storage area for storing PINs known only to the card user, certificate storage section, encryption format processing section, number section, card used for decryption of confidential data and verification of signature data
- a control unit that controls external processing requests, external event notifications, and internal processing while accessing information in each storage area Cell, characterized In order to generate a cure memory card, signature data, and confidential data, a secret key storage unit, a certificate storage unit, and an encryption format processing unit are provided, and a certificate verification unit that verifies the obtained certificate is provided.
- Card data writing device characterized in that it has an encryption unit that generates signature data and confidential data and has the
- the secure memory card 101, the PC 102, and the mobile phone 103 can be realized by a computer.
- the secure memory card 101, the PC 102, and the mobile phone 103 include a CPU (Central Processing Unit) that executes a program.
- a CPU Central Processing Unit
- the CPU is connected via a bus to ROM (Read Only Memory), RAM (Random Access Memory), communication board, display device, KZB (keyboard), mouse, FDD.
- ROM Read Only Memory
- RAM Random Access Memory
- KZB keyboard
- mouse FDD.
- the RAM is an example of a volatile memory.
- ROM, FDD, CDD, magnetic disk device, and optical disk device are examples of nonvolatile memory. These are examples of a storage device, a storage unit, or a storage unit.
- the data and information handled by the secure memory card 101, the PC 102, and the mobile phone 103 of each of the embodiments described above are stored in a storage device, a storage unit, or a storage unit, and are stored in the respective units of the secure memory card 101, the PC 102, and the mobile phone 103. , Recorded and read out.
- the communication board is connected to, for example, a LAN (Internet area network) such as a LAN, the Internet, or ISDN.
- a LAN Internet area network
- the Internet such as a LAN, the Internet, or ISDN.
- the magnetic disk device stores an operating system ( ⁇ S), a window system, a program group, and a file group (database).
- ⁇ S operating system
- window system window system
- program group program group
- file group database
- the program group is executed by the CPU, ⁇ S, and window system.
- Each part of the secure memory card 101, the PC 102, and the mobile phone 103 may be configured by a program that can be operated by a computer or a part thereof. Alternatively, it may be implemented with firmware stored in ROM. Or software Or it may be implemented in hardware or a combination of software, hardware and firmware.
- the program group stores a program that causes the CPU to execute the processing described as "part" in the description of the embodiment.
- These programs are created in a computer language such as C language, HTML, SGML, or XML, for example.
- the above program is stored in another recording medium such as a magnetic disk device, FD (Flexible Disk), optical disk, CD (compact disk), MD (mini disk), DVD (Digital Versatile Disk), etc. Is read and executed.
- FD Flexible Disk
- CD compact disk
- MD mini disk
- DVD Digital Versatile Disk
- FIG. 1 is a schematic diagram showing exchanges between users of the data exchange system according to the first and second embodiments.
- FIG. 2 is a block diagram showing a configuration of a writing device and a memory card according to the first embodiment.
- FIG. 3 is a block diagram showing a configuration of a memory card and a reading device according to the first embodiment.
- FIG. 4 is a sequence diagram showing processing performed by the writing device and the memory card according to the first embodiment.
- FIG. 5 is a flowchart showing processing performed by the writing device and the memory card according to the first embodiment.
- FIG. 6 is a sequence diagram showing processing performed by the memory card and the reading device according to the first embodiment.
- FIG. 7 is a flowchart showing processing performed by the memory card and the reading device according to the first embodiment.
- FIG. 8 is a block diagram showing a configuration of a memory card and a reading device according to the first embodiment.
- FIG. 9 is a sequence diagram showing processing performed by the memory card and the reading device according to the first embodiment.
- FIG. 10 is a flowchart showing processing performed by the memory card and the reading device according to the first embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04771925.7A EP1785878B2 (en) | 2004-08-20 | 2004-08-20 | Memory card, data exchanging system, and data exchanging method |
JP2006531136A JP4485528B2 (ja) | 2004-08-20 | 2004-08-20 | メモリカード、データ交換システム及びデータ交換方法 |
CNB2004800436636A CN100447764C (zh) | 2004-08-20 | 2004-08-20 | 存储卡、数据交换系统和数据交换方法 |
PCT/JP2004/011964 WO2006018890A1 (ja) | 2004-08-20 | 2004-08-20 | メモリカード、データ交換システム及びデータ交換方法 |
US11/658,538 US8074266B2 (en) | 2004-08-20 | 2004-08-20 | Memory card, data exchange system, and data exchange method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/011964 WO2006018890A1 (ja) | 2004-08-20 | 2004-08-20 | メモリカード、データ交換システム及びデータ交換方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006018890A1 true WO2006018890A1 (ja) | 2006-02-23 |
Family
ID=35907287
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/011964 WO2006018890A1 (ja) | 2004-08-20 | 2004-08-20 | メモリカード、データ交換システム及びデータ交換方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8074266B2 (ja) |
EP (1) | EP1785878B2 (ja) |
JP (1) | JP4485528B2 (ja) |
CN (1) | CN100447764C (ja) |
WO (1) | WO2006018890A1 (ja) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011203820A (ja) * | 2010-03-24 | 2011-10-13 | Alps System Integration Co Ltd | 電子ファイル管理システム及び電子ファイル管理プログラム |
JP2011217182A (ja) * | 2010-03-31 | 2011-10-27 | Toshiba Corp | メモリチップ、情報記憶システム、読み出し装置 |
JP2013009426A (ja) * | 2012-09-24 | 2013-01-10 | Toshiba Corp | メモリチップ |
JP2017523743A (ja) * | 2014-05-26 | 2017-08-17 | ラズロ・326・エルエルシー | 暗号化された電子賭博チケット |
CN112534775A (zh) * | 2018-08-06 | 2021-03-19 | 锡克拜控股有限公司 | 数字文件防伪保护 |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2837944B1 (fr) * | 2002-03-26 | 2004-07-09 | Oberthur Card Syst Sa | Procede et dispositif de validation automatique d'un programme informatique utilisant des fonctions de cryptographie |
WO2006076804A1 (en) | 2005-01-21 | 2006-07-27 | Certicom Corp. | Elliptic curve random number generation |
US8171293B2 (en) * | 2005-12-30 | 2012-05-01 | Apple Inc. | Receiver non-repudiation via a secure device |
TWI377576B (en) * | 2007-08-22 | 2012-11-21 | Security flash memory with an apparatus for encryption and decryption, and method for accessing security flash memory | |
US9443068B2 (en) * | 2008-02-20 | 2016-09-13 | Micheal Bleahen | System and method for preventing unauthorized access to information |
JPWO2010001544A1 (ja) * | 2008-07-01 | 2011-12-15 | パナソニック株式会社 | ドライブ装置、コンテンツ再生装置、記録装置、データ読み出し方法、プログラム、記録媒体、および集積回路 |
JP4747288B2 (ja) * | 2009-04-03 | 2011-08-17 | 株式会社バッファロー | 外付け記憶装置及びその制御方法 |
JP5178839B2 (ja) * | 2009-11-27 | 2013-04-10 | 株式会社東芝 | メモリチップ |
US8578161B2 (en) * | 2010-04-01 | 2013-11-05 | Intel Corporation | Protocol for authenticating functionality in a peripheral device |
FR2960330B1 (fr) * | 2010-05-19 | 2012-06-29 | Thales Sa | Procede d'emission d'information a destination d'une application hebergee sur un support multi-application, et support associe |
US8949929B2 (en) * | 2011-08-10 | 2015-02-03 | Qualcomm Incorporated | Method and apparatus for providing a secure virtual environment on a mobile device |
US11232093B2 (en) * | 2012-03-02 | 2022-01-25 | Pure Storage, Inc. | Slice migration in a dispersed storage network |
CN103632174B (zh) * | 2012-08-27 | 2017-10-03 | 天津中兴智联科技有限公司 | 公私有状态标签的操作方法及装置 |
US9235717B1 (en) * | 2013-02-25 | 2016-01-12 | Mobile Iron, Inc. | Secure copy and paste of mobile app data |
JP6182371B2 (ja) | 2013-06-28 | 2017-08-16 | ルネサスエレクトロニクス株式会社 | 半導体集積回路を含むシステム |
JP2015194947A (ja) * | 2014-03-31 | 2015-11-05 | ソニー株式会社 | 情報処理装置及びコンピュータプログラム |
US9584492B2 (en) * | 2014-06-23 | 2017-02-28 | Vmware, Inc. | Cryptographic proxy service |
US10963881B2 (en) * | 2015-05-21 | 2021-03-30 | Mastercard International Incorporated | Method and system for fraud control of blockchain-based transactions |
CN108352984B (zh) * | 2015-11-05 | 2021-06-01 | 三菱电机株式会社 | 安全装置和安全方法 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09282393A (ja) * | 1996-04-12 | 1997-10-31 | Hitachi Ltd | 保健医療カードとオンラインデータベースの連携方法 |
JPH11203439A (ja) * | 1997-11-13 | 1999-07-30 | Nippon Telegr & Teleph Corp <Ntt> | Icカード及びicカードの動作方法 |
US6038551A (en) | 1996-03-11 | 2000-03-14 | Microsoft Corporation | System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer |
JP2003108952A (ja) * | 2001-10-01 | 2003-04-11 | Matsushita Electric Ind Co Ltd | 情報管理システム、情報端末装置 |
JP2004021755A (ja) * | 2002-06-19 | 2004-01-22 | Hitachi Ltd | 記憶装置 |
JP2004038270A (ja) * | 2002-06-28 | 2004-02-05 | Ntt Communications Kk | 個人情報アクセス制御方法、端末、システム、並びに、プログラム |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000285189A (ja) | 1999-03-31 | 2000-10-13 | Ntt Data Corp | 電子カルテ |
JP3389186B2 (ja) * | 1999-04-27 | 2003-03-24 | 松下電器産業株式会社 | 半導体メモリカード及び読み出し装置 |
JP2002279062A (ja) | 2001-03-19 | 2002-09-27 | Toshiba Corp | 個人情報管理システム及び個人情報管理方法 |
JP3947864B2 (ja) | 2001-12-20 | 2007-07-25 | 株式会社日立製作所 | 端末装置および失効情報ファイル作成装置 |
JP2004199138A (ja) * | 2002-12-16 | 2004-07-15 | Matsushita Electric Ind Co Ltd | メモリデバイスとそれを使用する電子機器 |
-
2004
- 2004-08-20 US US11/658,538 patent/US8074266B2/en not_active Expired - Fee Related
- 2004-08-20 WO PCT/JP2004/011964 patent/WO2006018890A1/ja active Application Filing
- 2004-08-20 EP EP04771925.7A patent/EP1785878B2/en not_active Expired - Lifetime
- 2004-08-20 JP JP2006531136A patent/JP4485528B2/ja not_active Expired - Fee Related
- 2004-08-20 CN CNB2004800436636A patent/CN100447764C/zh not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6038551A (en) | 1996-03-11 | 2000-03-14 | Microsoft Corporation | System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer |
JPH09282393A (ja) * | 1996-04-12 | 1997-10-31 | Hitachi Ltd | 保健医療カードとオンラインデータベースの連携方法 |
JPH11203439A (ja) * | 1997-11-13 | 1999-07-30 | Nippon Telegr & Teleph Corp <Ntt> | Icカード及びicカードの動作方法 |
JP2003108952A (ja) * | 2001-10-01 | 2003-04-11 | Matsushita Electric Ind Co Ltd | 情報管理システム、情報端末装置 |
JP2004021755A (ja) * | 2002-06-19 | 2004-01-22 | Hitachi Ltd | 記憶装置 |
JP2004038270A (ja) * | 2002-06-28 | 2004-02-05 | Ntt Communications Kk | 個人情報アクセス制御方法、端末、システム、並びに、プログラム |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011203820A (ja) * | 2010-03-24 | 2011-10-13 | Alps System Integration Co Ltd | 電子ファイル管理システム及び電子ファイル管理プログラム |
JP2011217182A (ja) * | 2010-03-31 | 2011-10-27 | Toshiba Corp | メモリチップ、情報記憶システム、読み出し装置 |
JP2013009426A (ja) * | 2012-09-24 | 2013-01-10 | Toshiba Corp | メモリチップ |
JP2017523743A (ja) * | 2014-05-26 | 2017-08-17 | ラズロ・326・エルエルシー | 暗号化された電子賭博チケット |
CN112534775A (zh) * | 2018-08-06 | 2021-03-19 | 锡克拜控股有限公司 | 数字文件防伪保护 |
CN112534775B (zh) * | 2018-08-06 | 2024-03-01 | 锡克拜控股有限公司 | 数字文件防伪保护 |
Also Published As
Publication number | Publication date |
---|---|
EP1785878B1 (en) | 2013-07-31 |
EP1785878A4 (en) | 2009-06-17 |
JP4485528B2 (ja) | 2010-06-23 |
JPWO2006018890A1 (ja) | 2008-05-01 |
CN1993684A (zh) | 2007-07-04 |
EP1785878B2 (en) | 2016-08-10 |
CN100447764C (zh) | 2008-12-31 |
US20080295180A1 (en) | 2008-11-27 |
US8074266B2 (en) | 2011-12-06 |
EP1785878A1 (en) | 2007-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4485528B2 (ja) | メモリカード、データ交換システム及びデータ交換方法 | |
EP3395006B1 (en) | Method for managing a trusted identity | |
US9979709B2 (en) | Methods for secure restoration of personal identity credentials into electronic devices | |
KR101863953B1 (ko) | 전자 서명 서비스 시스템 및 방법 | |
EP1379930B1 (en) | Security method for transferring shared keys | |
US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
EP1733504A1 (en) | Authentication between device and portable storage | |
TW201223225A (en) | Method for personal identity authentication utilizing a personal cryptographic device | |
KR100739324B1 (ko) | 전자처방전 전달 시스템 및 그 방법 | |
KR101933090B1 (ko) | 전자 서명 제공 방법 및 그 서버 | |
JP2003134108A (ja) | 電子署名システム、電子署名検証装置、電子署名検証方法、プログラム、及び記録媒体 | |
US11522722B2 (en) | Communication apparatus and communication method | |
US12120247B2 (en) | Owner identity confirmation system, certificate authority server and owner identity confirmation method | |
US12120248B2 (en) | Owner identity confirmation system, terminal and owner identity confirmation method | |
JP2012044430A (ja) | 携帯型情報装置及び暗号化通信プログラム | |
JP2009060528A (ja) | 鍵設定方法および鍵設定システム | |
JP2002312725A (ja) | Icカードの更新方法及びシステム | |
WO2024014017A1 (ja) | メッセージ提示システム、提示用装置、及びメッセージ提示方法 | |
EP4231583A1 (en) | Methods and arrangements for establishing digital identity | |
JP4912809B2 (ja) | 電子署名サーバ、電子署名システム及び電子署名方法 | |
JP2007006319A (ja) | 鍵交換システム、端末装置及びプログラム | |
Shtanko et al. | Schemes for Data and User Authentication in Distributed GIS | |
JP2008294552A (ja) | 秘密鍵制御装置、秘密鍵制御システムおよび秘密鍵制御プログラム | |
JP2006005810A (ja) | アプリケーションの利用者認証方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006531136 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200480043663.6 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11658538 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004771925 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004771925 Country of ref document: EP |