WO2009084573A1 - 情報流通システム及びそのためのプログラム - Google Patents
情報流通システム及びそのためのプログラム Download PDFInfo
- Publication number
- WO2009084573A1 WO2009084573A1 PCT/JP2008/073556 JP2008073556W WO2009084573A1 WO 2009084573 A1 WO2009084573 A1 WO 2009084573A1 JP 2008073556 W JP2008073556 W JP 2008073556W WO 2009084573 A1 WO2009084573 A1 WO 2009084573A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- terminal
- encrypted
- common key
- original
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims abstract description 147
- 238000003860 storage Methods 0.000 claims abstract description 71
- 238000012545 processing Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims 2
- 230000007246 mechanism Effects 0.000 abstract description 6
- 238000012546 transfer Methods 0.000 abstract description 4
- 230000008520 organization Effects 0.000 description 21
- 238000000034 method Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 9
- 238000007726 management method Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000012423 maintenance Methods 0.000 description 6
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000010076 replication Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/88—Medical equipments
Definitions
- the present invention relates to an information distribution system and a program for realizing the same, and in particular, between a server and a client connected to the Internet network, or between a plurality of information terminals of clients such as Peer to Peer,
- the present invention relates to an information distribution system excellent in information distribution and a program thereof.
- a system that holds information safely and safely delivers information to a necessary place is constituted by a secure storage system and a secure communication system.
- access authentication in the storage (file) system and communication partner authentication are managed separately. These managements are performed by the experts on the center side, and the client (user) who is the original owner of the information cannot specify the accessible person from the terminal side by his / her own intention. .
- the main issue here is the security of information transmission.
- the second is freedom of information transmission. Management of access to information is done "on security" by server-side administrators, the owner of the real information cannot be handled freely and disclosed to a third party that the owner himself is free to trust I can't.
- the encryption storage function is a function for transmitting electronic data such as images and characters in an encrypted state and storing it in the storage means as it is.
- the encryption key for encryption is managed by the user at the transmission source. Therefore, when decrypting the encrypted data, the transmission source user's encryption key must be used. As a result, only the owner of the encryption key who is the user of the transmission source can encrypt and decrypt his own electronic data.
- Patent Document 1 generates a common key on the branch side that is a client. Then, the generated common key is encrypted with the public key and sent to the server side which is the head office. The server side can hold the common key generated on the client side by decrypting the sent information with its own private key.
- Patent Document 1 The technology described in Patent Document 1 is a system that encrypts and decrypts information by both a head office server and a branch office client. Although communication security is guaranteed, there is a risk that data is decrypted on the server side and anyone can refer to it. Once decrypted, information cannot be transferred from the server to another client. Further, it is not possible to specify a client that uses the information, that is, a client that can be transferred, from the client that is the owner of the information. That is, it does not have a mechanism for storing personal information in an encrypted state, or for providing the encrypted and stored information to a server or another client as it is. Information cannot be distributed without an administrator on the server side.
- the present invention when the user's personal information is electronic data, stores the electronic data in the storage means safely while encrypting the user's personal data, and can also trust the stored electronic data.
- An object is to provide an information distribution system and a program therefor that can be safely transmitted to the three parties on a network basis.
- the present invention is an information distribution system for distributing information between a plurality of information terminals connected to a communication network in order to achieve the above object.
- at least one information terminal of the plurality of information terminals performs encrypted communication with other information terminals via a communication network with means for holding a public key and a secret key necessary for information encryption.
- a common key generating means for generating a common key for the information, an original information encryption means for encrypting original information owned by any one of the plurality of information terminals based on the common key, and And a common key encryption means for encrypting the common key using a public key.
- the one information terminal uses a secret key to extract a common key, a common key extracting unit, and based on the extracted common key, the encrypted information of the original information encrypted by the one terminal Decryption processing means for decrypting, encryption signature generation means for generating an encryption signature using a secret key, and a secure communication core in which a program for realizing encrypted communication is installed.
- At least one other information terminal of the plurality of information terminals connected to the communication network is a secure having an original information storage unit that stores the original information encrypted by the one information terminal in an encrypted state.
- the storage has a secure communication core that implements a program for performing encrypted communication of information transmitted and received via a communication network.
- at least one information terminal of the plurality of information terminals connected to the communication network can view the encrypted original information by the information terminal that owns the encrypted original information among the plurality of information terminals.
- a secure communication core that implements a program for performing cryptographic communication is provided.
- each information terminal has an encryption processing block.
- an external box is interposed between each information terminal and the Internet connection section.
- the external box may be provided with a function of performing encryption processing.
- a proxy information terminal proxy server for performing this encryption process may be provided.
- the encryption process is executed by a program installed in each information terminal, external box, or proxy server.
- encrypted communication using an Internet communication network can be executed between a client (user) terminal and a server, or between client terminals. Then, the reference or possession only to a third party who permits the one user who is the owner of the original information (for example, image x) to view or possess the information (for example, image x). Can be allowed. That is, it is possible for the owner to determine whether or not the third party decrypts and refers to the image x stored by the owner and can provide an extremely secure information distribution system. Become. *
- FIG. 1 is a conceptual diagram of an information distribution system according to the first embodiment of the present invention.
- FIG. 2 is a block configuration diagram of the information distribution system according to the first exemplary embodiment of the present invention.
- FIG. 3 is a schematic block diagram illustrating encryption and decryption processing when the information distribution system according to the first embodiment of the present invention is applied as a medical information distribution system.
- FIG. 4 is a flowchart showing the flow of processing up to storage of the encrypted image in the medical information distribution system according to the first embodiment of the present invention shown in FIG.
- FIG. 5 is a flowchart showing the flow of processing up to reference and verification of an encrypted image in the medical information distribution system according to the first embodiment of the present invention shown in FIG.
- FIG. 1 is a conceptual diagram of an information distribution system according to the first embodiment of the present invention.
- FIG. 2 is a block configuration diagram of the information distribution system according to the first exemplary embodiment of the present invention.
- FIG. 3 is a schematic block diagram illustrating encryption and decryption processing
- FIG. 6 is a conceptual diagram of an information distribution system according to the second embodiment of the present invention.
- FIG. 7 is a block diagram showing the function of the external box in the information distribution system according to the second embodiment of the present invention.
- FIG. 8 is a conceptual diagram showing a schematic configuration of an information distribution system according to the third embodiment of the present invention.
- FIG. 9 is a block diagram showing the function of the proxy server (secure communication server) in the information distribution system according to the third embodiment of the present invention.
- a secure communication function that constitutes an essential part of the present invention is a secure information distribution system (STS) in which a secure communication core (STC: Secure Transport Core) and a secure storage system (SSS: Secure Storage System) are organically integrated. : Secure Transport System).
- STC Secure Transport Core
- SSS Secure Storage System
- the secure communication core STC is software placed in, for example, the transport layer in order to realize end-to-end secure communication, and has an extended function to cope with various packet contents. . That is, in the secure communication core STC, all access to information such as registration, reference, and change is authenticated, and all communication is performed by encrypted secure communication, so that communication security is ensured. Further, since the original information is recorded without being decrypted as encrypted at the time of secure communication, even the administrator of the information server computer cannot steal the original information. Therefore, theft of information can be completely prevented.
- the encrypted original information is stored in the center in a state where only the owner of the registered data and the “authorized user” permitted by the owner can use it. This leads to complete prevention of wiretapping and theft of the original information.
- the secure storage system SSS can only store information, and the stored information is not deleted until a certain period of time defined by the owner has passed. Therefore, important information is not accidentally deleted.
- registration, update, and reference of information are recorded as history, if there is a submission request from the owner of the registered data and "authorized user" permitted by this owner, the history record can be presented. It has become. This history record is also protected from falsification and deletion in the same way as the original information.
- the owner of the information can entrust the execution of the permission authority for the user to another organization or a third party (agent). Then, the entrusted agent can execute the authority that only the owner can have within a range permitted by the owner only to the specific user. Thereby, the "availability" of this information distribution system can be improved.
- the secure storage system SSS when there is an action such as referencing or changing the original information, the time, accessor, action content, etc. are recorded as a log. This information is also kept unchanged by anyone, so that accurate tracing can be performed later.
- a proxy server that can use an STS by using a proxy server that performs the STS function even in a client terminal that does not have the secure communication system STS function.
- the system of this example has improved "availability". This will also be described later with reference to FIGS.
- a client terminal (standard personal computer) 2 having a Web browser display function communicates with a data center computer 11 functioning as a server computer on the data center side. It is connected via the Internet 21, which is a type of network.
- the data center computer 11 includes a Web server 12 and a secure storage server group 13.
- the driver 3 is installed in the client terminal 2 and the driver 14 is installed in the data center computer 11, but the functions of the secure communication core described later are mounted on these drivers 3 and 14. Has been.
- FIG. 2 is a functional block diagram showing functions of the information terminal 2 and the data center computer 11 configured to realize the secure communication system of this example.
- the client-side information terminal 2 includes functions of an application for storing and referring to information to be described later, a security communication program, and a maintenance application.
- the application for storing and referencing information includes a Web browser, and for example, an image is displayed or referred to using the Web browser.
- the security communication program includes a secure communication core and a secure communication extension / authentication function.
- the secure communication core performs security for mutual authentication, exchange of encryption keys, and encryption / decryption using encryption keys for information transmitted / received to / from other information terminals including the data center server 11 via the Internet 21.
- the secure communication core performs flexible grouping for permitting or denying connection between information terminals depending on the type of TCP / IP-based application, and also has a function for editing and processing an information data stream.
- it since it has a function of selecting an extended function corresponding to an application according to the packet contents, it is possible to secure the existing application without modifying it.
- the secure communication extension / authentication function first encrypts the common key for encrypting the stored information with the public key of the information owner for the creator of the information. Has a function to allow reference. Secondly, the information owner has a function of extracting the common key when encrypted, decrypting the information (data), and passing the decrypted data to the application. Third, the information owner has a function of encrypting a common key with a public key of a third party approved by the owner and allowing a trusted third party to refer to the information. Fourthly, it has a function for the information user (trusted third party) to extract the common key when encrypted, decrypt the information (data), and pass the decrypted data to the application.
- the secure communication extension / authentication function shown in FIG. 2 has a role of transparently providing service functions of the security communication core STC and the security storage system SSS to the information distribution application.
- transparently provided means to be executed without requiring the user to be aware of or making any changes to the application other than actions such as authentication that the user should be aware of, as described above. Means.
- Secure communication extension / authentication functions include data streams of major application protocols such as HTTP (Hyper Text Transfer Protocol), FTP (File Transfer Protocol), SMTP (Send Mail Transfer Protocol), POP3 (Post Office Protocol version 3), etc. Provides general mechanisms or functions such as signing, compression, encryption / decryption, decompression, and verification.
- HTTP Hyper Text Transfer Protocol
- FTP File Transfer Protocol
- SMTP Send Mail Transfer Protocol
- POP3 Post Office Protocol version 3
- This secure communication extension / authentication function it is possible to safely maintain or store a plurality of encryption keys, and to provide access to a mechanism in which a secret key is deposited.
- PKI Public Key Infrastructure
- the data center computer 11 shown in FIG. 2 includes an application that stores and references information, a security communication program, an encrypted storage application, and a maintenance application.
- the application that stores and refers to the information communicates the encrypted information with the application of the client terminal via the Web server, and stores the encrypted information in the secure storage of the encrypted storage application, or the It has a function to refer to the stored encryption information.
- the secure communication program has the same function as the information terminal 2 and performs secure communication with the information terminal 2 via the Internet 21.
- the secure communication extension / authentication function further has a function of adding the creator's signature to the encrypted original information in addition to the function of the information terminal 2. Thereby, falsification of information can be prevented more reliably.
- the encrypted storage application of the data center server 11 includes a secure storage service and a replication service.
- the secure storage service stores user-specific information in a plurality of user-specific storages 16 of the secure storage 15 in an encrypted manner so as to maintain confidentiality.
- a signature by the registrant is added so that the validity of the information can be confirmed. It can also be confirmed that the information has not been tampered with.
- the replication service in the encrypted storage application is a service that automatically connects the data center 11 to a plurality of other centers and synchronizes information on the secure storage.
- information stored and stored in one center is stored in another center at the same time or with a set time lag.
- This function is a function to ensure availability.
- the maintenance application secure communication management service of the information terminal 2 and the data center computer 11 manages a public key of a third party trusted by the owner.
- this maintenance application creates and distributes secure communication programs to the information terminals of users who use this system for the first time, and performs license management and setting changes, operation monitoring, log collection, etc. Yes.
- the encryption storage application stores the encryption key in the user-specific storage 16 in a state where only the owner of the registration information and the “authorized user” (trusted third party) permitted by the owner can use the encryption key. I try to keep it. Then, registration, update, and reference of registration information are recorded as a history, and a history record can be presented by a request for submission of the owner of the registration information and a “authorized user” permitted by the owner.
- the original information is stored in the secure storage 15 held by the original information server by encrypted secure communication.
- the server computer administrator can save the original information. Furthermore, the signature of the creator is added to the original information. For this reason, the stored original information is not changed by anyone other than the creator who signed. Even if the creator changes or adds the original information, the change / addition is recorded as new original information, which also prevents the original information from being falsified.
- a reference index which is an example of a mechanism for controlling reference to original information.
- the original information can be decoded and referenced only through the reference index.
- This reference index includes the link L to the original information and the encryption key of the original information encrypted with the public key of the referrer. Therefore, the referrer can decrypt the reference index with his / her private key and decrypt and read the original information.
- the owner of the original information can obtain the public key of the target person who is permitted to refer, create a reference index for the referrer, and permit the reference by permitting delivery. That is, only the owner can add a reference index. This makes it possible to realize ownership of the owner and authentication of the referrer.
- FIG. 3 is a detailed description of the information distribution system according to this example, and the institution 2A, which is the creator, is an institution that creates the original information x.
- the institution 2A which is the creator, is an institution that creates the original information x.
- the organization 2B is the owner of the original information, and becomes the patient B0 in the medical information distribution system of this example.
- the institution 2C is a user who can see the original information x, and in this example, the doctor C0, who is a reliable third party, corresponds.
- These institutions 2A to 2C are connected to the data center computer 11, and the following processing is performed using the secure storage 15 of the data center computer 11.
- the creator 2A (examination institution) creates an image x as original information owned by the owner 2B (patient) and stores it in the original information database (DB). Then, the encryption key (k) is generated by the secure communication core of the terminal of the institution 2A, and the image x is encrypted and stored by this encryption key (k). Thereafter, based on the generated encryption key (k), information is exchanged between the terminals or between the terminal and the center.
- the institution 2A (examination institution) registers the image x as the original information and at the same time registers that the owner of the image x is the institution 2B (patient). That is, it is registered that the ownership of the image x belongs to the institution 2B (patient).
- the original information image x is naturally encrypted and communicated at the time of communication, but is stored in an encrypted state even when stored in the secure storage 15 of the data center computer 11.
- the data registered in the secure storage 15 of the data center computer 11 is unique and cannot be tampered with by any other person. That is, it is possible to give the right to decrypt data only to a reliable third party approved by the institution 2B (patient) as the owner, for example, only the institution 2C (doctor) as a legitimate user.
- the organization 2A that is the creator of the original information is the examination organization A0
- the organization 2B that is the owner of the original information is the patient B0
- the organization that is the user of the original information Assume that 2C is a doctor C0, and information terminals possessed by the respective institutions are 2A to 2C.
- the information terminal 2A of the examination institution A0 holds a public key A, a secret key a, and its own ID that are paired in advance
- the information terminal 2B of the patient B0 has a public key B, a secret key b, and its own ID. Holds ID
- the information terminal 2C of the doctor C0 holds the public key C, the secret key c, and its own ID.
- index information is generated, and original information x obtained by compressing and encrypting plaintext original information x is stored in a database.
- original information x includes other than the image, since it is shown as the image x in FIG. 3, hereinafter, the original information x and the image x are treated as the same.
- the index information E (A, k) means information obtained by encrypting the encryption key (k) with the public key A of the examination organization A0.
- the index information E (B, k) and E (C, k) are It means information obtained by encrypting the encryption key (k) with the public keys B and C, respectively.
- the link information L (x) is information indicating the location of data such as a URL and a file name.
- the link information L (x) means information indicating where the encrypted image x is in the secure storage 15. is doing.
- the secure storage of the data center computer 11 stores an image x obtained by compressing and encrypting plain text original information (image x). This information is represented as C (k, x). That is, it means that the information is the image x encrypted with the encryption key k. In addition to the encrypted information C (k, x), the secure storage of the center computer 11 also stores S (a, x) indicating the signature (evidence) of the examination institution A0 that stores the image x. ing.
- an image x obtained by digitizing an image of the patient B0 taken by the examination organization A0 is generated (step S1).
- the examination organization A0 becomes the “data registrant” and the patient B0 becomes the “data owner”.
- the doctor C0 is positioned as a “data user” who has obtained permission to refer to data from the patient B0 who is the “data owner”. It is the patient B0 that usually gives the doctor C0 permission to refer to the data, but the patient B0 can also perform the permission work on behalf of the examination facility A0.
- this information distribution system can be used for general purposes such as electronic management of assets such as stock certificates as well as medical sites.
- step S2 generation and exchange of an encryption key using a common key is performed (step S2). That is, in the system configuration shown in FIG. 3, the process of step S2 performs mutual authentication between the secure communication core on the terminal side and the secure communication core on the center side, and generates the encryption key k using a common key.
- the secure communication core of the information terminal 2A of the examination organization A0 is connected to the secure communication core on the center side via the Internet 21, and the image x is transferred to the data center using the secure communication core on the center side. It transmits to the computer 11.
- the examination authority A 0 and the secure communication core of the data center computer 11 authenticate each other and exchange encryption keys. It is.
- the image x is compressed and encrypted using the common key k generated in step S2, and stored in the user-specific storage 16 of the data center computer 11 (step S3).
- the compressed information encrypted with the encryption key k is assumed to be C (k, x).
- a signature S (a, x, lux) is added as additional information of the encrypted information C (k, x).
- “a” is the private key of the examination institution A0
- “x” is the image
- lux” is the content of the signature.
- the signature content “lax” corresponds to, for example, a profile of the examination such as the examination institution A0, the location, and the imaging date / time.
- the encrypted image x is stored in the user-specific storage 16 of the center computer 11 as a set (with signature) of [C (k, x) and S (a, x, lux)]. (Step S4).
- the information terminal 2A of the examination organization A0 encrypts the common key k with the public key A of the examination organization A0.
- This encrypted information is set to E (A, k) (step S5).
- link information L (x) linked to the entity of the encrypted image x on the user-specific storage 16 is generated (step S6).
- the information E (A, k) generated in step S5 and the link information L (x) are paired to generate index information for the examination organization A0 (step S7).
- the information terminal 2A of the examination institution A0 encrypts the common key k with the public key B of the patient B0 in order to disclose the secure information of the image x to the patient B0.
- This is set to E (B, k) (step S8).
- the link information linked to the entity of the encrypted image x on the user-specific storage 16 is L (x) (step S9), and E (B, k) and L ( x) is a pair, and index information for patient B0 is generated (step S10).
- the common key k is encrypted with the public key C of the doctor C0 at the information terminal 2A of the examination organization A0 or the information terminal 2B of the patient B0. This is to allow the doctor C0 to view the encrypted image x.
- the information of the common key k encrypted with the public key C is assumed to be E (C, k) (step S11).
- link information linked to the entity of the encrypted image x on the user-specific storage 16 is set to L (x) (step S12).
- the information E (C, k) and L (x) obtained in step S12 are paired and used as index information for the doctor C0 (step S13).
- the index information based on the public key of each terminal so that the image x owned by the patient B0 can be viewed at each information terminal of the examination organization A0, the patient B0, and the doctor C0.
- the process up to generating is explained.
- These pieces of index information are provided to the information terminals 2A, 2B, and 2C of the examination organization A0, the patient B0, and the doctor C0 through the Internet 21 as a secure storage service in the data center computer 11, respectively.
- the information terminal 2B of the patient B0 communicates with the data center computer 11 through the secure communication core, and stores E (B, k) in its own index information [E (B, k) and L (x)].
- This E (B, k) is decrypted with the private key b paired with its own public key B, and the common key k is extracted (step S14).
- the information terminal 2B of the patient B0 uses the common key k to link the encrypted images x [C (k, x) and S (a, x, C) of the link destination based on the link information L (x). lax)] is decoded (step S15). Thereby, the user's own image x can be referred to (step S16).
- the patient B0 uses the information terminal 2B to check whether or not the image is his / her own image x, and the image x [C (k, x) and the image stored in the secure storage 15 of the data center computer 11 are used.
- S (a, x, lax)] is accessed to obtain the signature S (a, x, lax) in the encrypted image x.
- the authenticity of the image x can be confirmed by decrypting the signature S (a, x, lax) with the public key A paired with the private key a of the examination organization A0 (step S17).
- the verification of the property ends (step S18).
- the doctor C0's information terminal 2C communicates with the data center computer 11 in the same manner as described above, and E (C, K) in its own index information [E (C, k) and L (x)].
- k) can be decrypted with the private key c paired with its own public key C to extract the common key k.
- the encrypted image x [C (k, x) and S (a, x, lax)] ahead of the link information L (x) is accessed with the common key k.
- C (k, x) in the image x the image x of the patient B0 can be referred to.
- the information terminal 2A of the examination institution A0 performs image compression / encryption and encrypted communication from the Web browser. .
- the program indicated by the driver 3 in FIG. 1 is installed (implemented) in each information terminal 2A to 2C.
- the program indicated by the driver 14 is also installed (implemented) in the data center computer 11.
- encrypted communication using the Internet 21 between the information terminals 2A to 2C and the data center computer 11 can be executed.
- only the third party permitted by the medical examination organization A0 who is the registrant of the original image x or the patient B0 who is the owner of the original image, that is, the doctor C0 having the information terminal 2C is encrypted. It is possible to decode the converted image x and refer to the image x.
- the information distribution system of this example is a highly secure system that can be used by referring to the information only by the information owner or the person to whom the registrant has given permission.
- the encrypted image x which is data registered in the secure storage 15 of the data center computer 11, is unique and compliant data that no one can change.
- the encrypted image x cannot be decrypted and referred to. Therefore, this is also a system with extremely high security. Can do. Further, as described above, the patient B0 can verify that his / her image x is valid by a very simple operation.
- the information terminal 2 which is a client terminal holds a public key and a secret key, and a common key is generated when communicating with the data center computer 11 via the Internet 21. The Then, an encryption process for encrypting the original information is performed using the generated common key, and the common key is encrypted using the public key of another information terminal. Index information for publishing the encrypted information of the original information to other information terminals, which is composed of the encrypted common key and link information to the encrypted information of the original information, is generated.
- the common key is extracted using the secret key, and the encrypted information of the original information is decrypted with the extracted common key.
- Communication between all information terminals is performed by encrypted communication, and a program for executing the security communication system for that purpose is installed in all information terminals.
- the data center computer 11 generates at least a common key, encrypts communication of information transmitted / received via a communication network, stores original information encrypted information, generates index information related to the original information encrypted information, and the like. A program to do this is implemented. Note that the program installed in the data center computer 11 may be held in the information terminal 2 on the client side. That is, an application system with high security can be provided in the same manner by reversing the possession form of each program held by the client information terminal 2 and the data center computer 11.
- the encryption communication and processing between the information terminal as a client and the center computer as a server have been described.
- one of them does not have to be a server.
- the present invention can be similarly applied to encrypted communication between information terminals such as Peer to Peer.
- the second embodiment of the present invention also includes a client-side information terminal 2 having a Web browser display function and a data center computer 11 as in the first embodiment.
- This is a system connected via the Internet network 21.
- the point that the data center computer 11 is provided with a Web server 12 and a secure storage server group 13 is the same as the system of the first embodiment (see FIG. 1).
- the difference from the first embodiment is that external boxes 31 and 32 are provided between the client-side information terminal 2 and the Internet network 21 and between the data center computer 11 and the Internet network 21, respectively.
- the external box has all of the secure communication core, the secure communication extension / authentication function, and the like possessed by the information terminal 2 of the first embodiment. That is, the external boxes 31 and 32 are used as proxy devices for the client terminal 2 and the center computer 11 shown in FIG.
- the external boxes 31 and 32 dedicated devices are usually used. However, dedicated software can be mounted on general-purpose devices such as general PCs and used as appliances (Appliances).
- the external boxes (proxy devices) 31 and 32 have a security communication core that performs encryption / decryption with an encryption key of information transmitted / received via the Internet 21, and It includes a secure communication management service function that is a maintenance application. Further, it is configured to include a user mode application for managing public keys and an HTTP application extension.
- the information terminal 2 as the client does not need to be equipped with a secure communication application.
- all the external Box 31 will act for you. That is, the information terminal 2 on the client side is connected to the external box 31, and the data center computer 11 is connected to the external box 32.
- encrypted communication using the Internet 21 can be executed between the two.
- the external box 31 is externally attached to the information terminal 2 and the external box 32 is externally attached to the data center computer 11.
- the encryption communication can be realized between the client side information terminal 2 and the data center computer 11 simply by connecting both the external boxes 31 and 32. Since only the external box is added as described above, even if a computer system that is already in operation is used, encrypted communication and processing can be realized relatively easily.
- the information terminal 2 as a client is a normal PC having a display function of a Web browser. That is, the information terminal 2 is, for example, a Windows (registered trademark) personal computer, and is a PC on which SSL (encryption technology: Secure Socket Layer) for normal encryption communication is mounted as standard.
- SSL Encryption technology: Secure Socket Layer
- a secure communication server 41 is provided as a proxy center (proxy server: Application Service Provider). ing.
- the secure communication server 41 performs encrypted communication using, for example, SSL implemented as a standard via the client-side information terminal 2 and the Internet (Internet network) 21 and communicates with the Web server 12 of the data center computer 11. It is connected so that encryption communication can be performed via the Internet 21.
- the secure communication server (proxy server) 41 can also perform authentication between the client information terminal 2 and the proxy server 41 in, for example, a transport layer below the SSL application layer. Yes.
- the secure communication server 41 is installed with a driver 3A that is substantially the same as the driver 3 (see FIG. 1) of the system of the first embodiment.
- the Web server 12 of the data center computer 11 is installed.
- a driver 14 corresponding to the driver of the first embodiment is installed.
- the secure communication server 41 includes a proxy server (Web + application) and an SSL application that realizes encryption processing (SSL) between the data center computer 11 and the information terminal 2.
- a proxy server Web + application
- SSL secure processing
- it includes a security communication application that encrypts and decrypts information to be transmitted and received using an encryption key, and further includes a user mode application that is software for managing a public encryption key;
- a driver 3A including an HTTP application extension is installed.
- the communication between the client information terminal 2 and the secure communication server 41 via the Internet 21 is executed by SSL encryption communication.
- the communication between the secure communication server 41 and the Web server 12 of the data center computer 11 via the Internet 21 is configured to be executed by encrypted communication similar to the first embodiment.
- A) Information is distributed by end-to-end secure communication, and is stored encrypted at the receiving destination at the time of communication.
- Information is clearly defined by the owner, and only trusted users authorized by the owner can access the information.
- C) Information is retained without being tampered with. Changes to the information are recorded as new information.
- E) These secure mechanisms are incorporated without the user or application being aware.
- system of the third embodiment of the present invention is an ASP (Application Service Provider) type that interposes the secure communication server 41 of the proxy center, it is used by many users who use Windows (registered trademark) personal computers. It becomes an easy system.
- ASP Application Service Provider
- the present invention can be widely applied to encrypted communication of all information and decryption processing by a specific user, as well as application to encrypted communication of an image at the medical site as described above and decryption processing by a specific user.
- Information distribution system 2.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
このように、情報を安全に保持し、必要なところに安全に届けるシステムは、安全なストレージシステムと、安全な通信システムによって構成される。
ここで、暗号化する際の暗号鍵は、送信元のユーザが管理する。したがって、暗号化したデータを復号化する際には、送信元のユーザの暗号鍵を用いなければならない。このことによって、送信元のユーザである暗号鍵の所有者だけが、自分自身の電子データを暗号化し、復号化することができるのである。
まず、複数の情報端末の中の少なくとも一の情報端末は、情報の暗号化に必要な公開鍵及び秘密鍵を保持する手段と、通信網を介しての他の情報端末と暗号化通信を行うための共通鍵を生成する共通鍵生成手段と、共通鍵に基づいて、複数の情報端末の中のいずれかの情報端末が所有している元情報を暗号化する元情報暗号化手段と、この共通鍵を公開鍵を用いて暗号化する共通鍵暗号化手段と、を備えている。
また、通信網に接続される複数の情報端末の中の少なくとも一つの情報端末は、複数の情報端末の中で、暗号化した元情報を所有する情報端末がその暗号化した元情報を見ることを許可した情報端末を認証する許可端末認証手段と、共通鍵の暗号化情報を元情報の暗号化情報へリンクさせるためのリンク情報を生成するリンク情報生成手段と、このリンク情報と共通鍵および元情報の暗号化情報を複数の情報端末の中の一の端末及び許可された他の情報端末に公開するためのインデックス情報を生成するインデックス情報生成手段と、通信網を介して送受する情報の暗号通信を行うためのプログラムを実装するセキュア通信コアを、備えている。
なお、この場合、上記暗号化処理は、各情報端末や外付Box、あるいは代行サーバにインストールされるプログラムによって実行されるものである。
また、情報の登録、更新、参照は履歴として記録されるので、登録データの所有者及びこの所有者が許可した「正当な利用者」からの提出要求があれば、その履歴記録を提示できるようになっている。なお、この履歴記録も、元情報と同様の方法で、改竄や削除から保護される。
以下、本発明の第1の実施形態例(以下、「本例」ということもある)に係る情報流通システムの構成とその動作について図1~5を参照して詳細に説明する。なお、本例では、クライアント端末とデータセンタのサーバとの暗号化通信、及びクライアント端末とサーバにおける情報処理として説明しているが、Peer to Peer(クライアント端末同士)でも同様に実現できることは当然である。ここでは、クライアント端末とサーバとを総称して情報処理端末と呼ぶことにする。
データセンタコンピュータ11は、Webサーバ12とセキュアストレージサーバ群13を含んでいる。
図2に示すように、クライアント側の情報端末2は、後述する情報の格納や参照を行うアプリケーション、セキュリティ通信プログラム、メンテナンス系のアプリケーションの機能から構成されている。
ここで、情報の格納と参照を行うアプリケーションは、Webブラウザを含み、このWebブラウザを用いて、例えば画像の表示や参照を行っている。
更に、セキュア通信コアは、TCP/IPベースのアプリケーションの種類によって、情報端末間の接続の許可あるいは拒否を行う柔軟なグルーピングを行うとともに、情報のデータストリームを編集・加工する機能も備えている。また、パケット内容によりアプリケーションに対応した拡張機能を選択する機能も有しているので、既存のアプリケーションを改造することなくセキュア化を図ることができる。
情報を格納及び参照するアプリケーションは、Webサーバを介してクライアント端末のアプリケーションとの間で暗号化した情報を通信するとともに、この暗号化した情報を暗号化ストレージアプリケーションのセキュアストレージに格納し、あるいはその格納した暗号化情報を参照させる機能を有する。
この時、検診機関A0が「データの登録者」になり、患者B0が「データの所有者」になる。医師C0は、「データの所有者」である患者B0からデータを参照する許可を得た「データの利用者」の位置づけとなる。この医師C0にデータの参照許可を与えるのは、通常は患者B0であるが、患者B0は、この許可の仕事を検診機関A0に代行させて行うこともできる。この情報流通システムは、医療現場を事例に限らず、株券などの資産を電子的に管理する等、汎用的に利用できることはいうまでもない。
そして、この生成された共通鍵により、元情報を暗号化する暗号化処理が行われるとともに、他の情報端末の公開鍵を使用して共通鍵を暗号化する。この暗号化した共通鍵と元情報の暗号化情報へのリンク情報からなる、元情報の暗号化情報を他の情報端末に公開するためのインデックス情報を生成している。
次に、図6、図7を参照して本発明の第2の実施形態例としての情報流通システムについて説明する。
この外付Box31、32としては、通常は専用機器が用いられるが、一般のPC等の汎用機器に専用のソフトウエアを搭載してアプライアンス(Appliance)として用いることもできる。
次に、図8、図9を参照して本発明の第3の実施形態例に係る情報流通システム及びそのプログラムについて説明する。
このセキュア通信サーバ41は、クライアント側の情報端末2とインターネット(インターネット網)21とを介して例えば標準実装されたSSLを使用して暗号通信を行うとともに、データセンタコンピュータ11のWebサーバ12との間でインターネット21を介して暗号通信を行うことができるように接続されている。
また、第1の実施形態例と同様に、送受する情報の暗号鍵による暗号化・復号化を行うセキュリティ通信アプリケーションを含み、更に、公開暗号鍵を管理するためのソフトウエアであるユーザモードアプリケーションと、HTTPアプリケーション拡張を含むドライバ3Aがインストールされている。
また、第1、第2の実施形態例の場合と同様に、暗号化されて登録されたデータである特定の情報は、一切の変更不可の状態で保存される。更に、データセンタコンピュータ11側でも、秘密鍵を有しないことから当該情報を復号、参照することができず、この点からも極めてセキュリティ性の高いシステムとすることができる。
(a)情報はEnd to Endの安全な通信によって配信され、受信先で、通信時に暗号化されたまま格納される。
(b)情報は所有者が明確に定義され、所有者が許可する信頼できる利用者のみが情報にアクセスすることができる。
(c)情報は改竄を受けることなく保持される。情報に対する変更は新たな情報として記録される。
(d)情報に対する参照、更新、削除などのアクセスは、記録され、この記録も改竄を受けずに保持される。
(e)これらのセキュアな仕組みは、ユーザやアプリケーションが意識することなく組み込まれる。
2・・・・・クライアント端末(情報端末)
2A・・・・作成者(検診機関)の情報端末
2B・・・・所有者(患者)の情報端末
2C・・・・利用者(医師)の情報端末
3、3A、14・・・・・ドライバ
11・・・・データセンタコンピュータ
12・・・・Webサーバ
13・・・・セキュアストレージサーバ群
15・・・・セキュアストレージ
16・・・・ユーザ別ストレージ
21・・・・インターネット
31、32・・・・外付Box
41・・・・代行センタ(セキュア通信サーバ)
A0・・・・検診機関
B0・・・・患者
C0・・・・医師
A、B、C・・・公開鍵
a、b、c・・・秘密鍵
x・・・・・画像
Claims (9)
- 通信網に接続される複数の情報端末間で情報を流通させる情報流通システムであって、
前記複数の情報端末の中の少なくとも一の情報端末は、
前記通信網を介しての他の情報端末と暗号化通信を行うための共通鍵を生成する共通鍵生成手段と、
前記共通鍵に基づいて、前記複数の情報端末の中のいずれかの情報端末が所有している元情報を暗号化する元情報暗号化手段と、
共通鍵の暗号化に必要な公開鍵及び秘密鍵を保持する手段と、
前記共通鍵を公開鍵によって暗号化する共通鍵暗号化手段と、
前記秘密鍵を使用して前記暗号化された共通鍵を抽出する共通鍵抽出手段と、
前記抽出した共通鍵に基づいて、前記一の端末が暗号化した元情報の暗号化情報を復号する復号化処理手段と、
前記秘密鍵を使用して暗号化署名を生成する暗号化署名生成手段と、
前記暗号通信を実現するためのプログラムを実装したセキュア通信コアと、を備え、
前記複数の情報端末の中の前記他の情報端末のうち、少なくとも一つの情報端末は、
前記一の情報端末で暗号化した元情報を暗号化した状態で格納する元情報格納部を持つセキュアストレージを有し、
また、少なくとも一つの情報端末は、前記複数の情報端末の中で、前記暗号化した元情報を所有する情報端末が前記元情報を見ることを許可した情報端末を認証する許可端末認証手段と、
前記共通鍵の暗号化情報を前記元情報の暗号化情報へリンクさせるためのリンク情報を生成するリンク情報生成手段と、
前記リンク情報と前記元情報の暗号化情報を前記複数の情報端末の中の前記一の端末及び前記許可された他の情報端末に公開するためのインデックス情報を生成するインデックス情報生成手段と、
前記通信網を介して送受する情報の暗号通信を行うためのプログラムを実装するセキュア通信コアを、
備えることを特徴とする情報流通システム。
- 前記複数の情報端末の中の少なくとも一の情報端末は、暗号化する元情報を持つ所有者または該所有者が持つ元情報を作成する作成者が保有するコンピュータであり、
前記複数の情報端末の中の前記他の情報端末のうち、少なくとも一つの情報端末は、前記一の情報端末と暗号化通信を行い、セキュアストレージに格納するサーバとしての機能を実現する情報端末であり、
前記他の情報端末の中の一つの情報端末では、登録される元情報には作成者の署名が加えられることで、改ざんの有無を検出するようにし、
前記格納される元情報は修正や削除が許されず、登録のみが許され、前記元情報に修正が加えられた場合は、新たな情報として登録されるとともに、
情報の喪失を防ぐために、前記元情報を登録する情報端末が連携する他のサーバのセキュアストレージに自動的に元情報をバックアップする、
請求の範囲1に記載の情報流通システム。
- 元情報への参照・修正などのアクセスを、アクセス種類、アクセス者端末、アクセス時間とともに記録するアクセス履歴記録手段を備え、
前記アクセス履歴は元情報と同様に、前記元情報を登録する情報端末が連携する他のサーバのセキュアストレージに自動的にバックアップする、
請求の範囲1または2に記載の情報流通システム。 - 前記複数の情報端末の中の少なくとも一つの情報端末は、前記セキュアストレージに格納した元情報へのリンク情報とアクセス者の認証を行うインデックスを持つ情報端末である、
請求の範囲1~3のいずれかに記載の情報流通システム。
- 前記一の情報端末及び前記複数の情報端末の中の他の情報端末のうち、少なくとも一つの情報端末に実装される、前記通信網を介して送受する情報の暗号通信を行うためのプログラムは、アプリケーション層の下位層にインストールした状態で含まれることを特徴とする請求の範囲1~4のいずれかに記載の情報流通システム。
- 通信網に接続される複数の情報端末間で情報を流通させる情報流通システムであって、
前記複数の情報端末の中の一の情報端末及び前記複数の情報端末の中の少なくとも一つの他の情報端末と、前記通信網との接続は、外付Boxを介して行われ、
前記一の情報端末は、情報の所有者、情報の作成者、または情報の利用者が利用する情報端末であり、
前記複数の情報端末の中の少なくとも一つの他の情報端末は、前記一の情報端末で作成された元情報を暗号化した状態で保存するセキュアストレージを備えた情報端末であり、
前記外付Boxには、
前記通信網を介しての他の情報端末と暗号化通信を行うための共通鍵を生成する共通鍵生成手段と、
前記共通鍵に基づいて、前記複数の情報端末の中のいずれかの情報端末が所有している元情報を暗号化する元情報暗号化手段と、
共通鍵の暗号化に必要な公開鍵及び秘密鍵を保持する手段と、
前記共通鍵を公開鍵によって暗号化する共通鍵暗号化手段と、
前記秘密鍵を使用して前記暗号化された共通鍵を抽出する共通鍵抽出手段と、
前記抽出した共通鍵に基づいて、前記一の端末が暗号化した元情報の暗号化情報を復号する復号化処理手段と、
前記秘密鍵を使用して暗号化署名を生成する暗号化署名生成手段と、
前記複数の情報端末の中で、前記暗号化した元情報を所有する情報端末が前記元情報を見ることを許可した情報端末を認証する許可端末認証手段と、
前記共通鍵の暗号化情報を前記元情報の暗号化情報へリンクさせるためのリンク情報を生成するリンク情報生成手段と、
前記リンク情報と前記元情報の暗号化情報を前記複数の情報端末の中の前記一の端末及び前記許可された他の情報端末に公開するためのインデックス情報を生成するインデックス情報生成手段と、
前記通信網を介して送受する情報の暗号通信を行うためのプログラムを実装するセキュア通信コアと、
が設けられることを特徴とする情報流通システム。
- 通信網に接続される複数の情報端末間で情報を流通させる情報流通システムであって、
前記複数の情報端末の中の一の情報端末または前記複数の情報端末の中の少なくとも一つの他の情報端末と、前記通信網との間の暗号化通信は、代行サーバを介して行われ、
前記代行サーバと前記複数の情報端末の中の前記一の情報端末との間の通信は、暗号化通信によって行われ、
前記代行サーバには、
前記通信網を介しての他の情報端末と暗号化通信を行うための共通鍵を生成する共通鍵生成手段と、
前記共通鍵に基づいて、前記複数の情報端末の中のいずれかの情報端末が所有している元情報を暗号化する元情報暗号化手段と、
共通鍵の暗号化に必要な公開鍵及び秘密鍵を保持する手段と、
前記共通鍵を公開鍵によって暗号化する共通鍵暗号化手段と、
前記秘密鍵を使用して前記暗号化された共通鍵を抽出する共通鍵抽出手段と、
前記抽出した共通鍵に基づいて、前記一の端末が暗号化した元情報の暗号化情報を復号する復号化処理手段と、
前記秘密鍵を使用して暗号化署名を生成する暗号化署名生成手段と、
前記複数の情報端末の中で、前記暗号化した元情報を所有する情報端末が前記元情報を見ることを許可した情報端末を認証する許可端末認証手段と、
前記共通鍵の暗号化情報を前記元情報の暗号化情報へリンクさせるためのリンク情報を生成するリンク情報生成手段と、
前記リンク情報と前記元情報の暗号化情報を前記複数の情報端末の中の前記一の端末及び前記許可された他の情報端末に公開するためのインデックス情報を生成するインデックス情報生成手段と、
前記通信網を介して送受する情報の暗号通信を行うためのプログラムを実装するセキュア通信コアと、
が設けられることを特徴とする情報流通システム。 - 通信網に接続される複数の情報端末の中の一の情報端末と前記複数の情報端末の中の他の情報端末との間で情報を流通させる情報流通システムであって、
前記複数の情報端末の中の少なくとも一つの情報端末に、
元情報を見ることのできる情報端末に参照を許可する権限を所有者の持つ情報端末から移管された代行者の情報端末が設けられ、
前記代行者の情報端末には、
前記通信網を介しての他の情報端末と暗号化通信を行うための共通鍵を生成する共通鍵生成手段と、
前記共通鍵に基づいて、前記複数の情報端末の中のいずれかの情報端末が所有している元情報を暗号化する元情報暗号化手段と、
共通鍵の暗号化に必要な公開鍵及び秘密鍵を保持する手段と、
前記共通鍵を公開鍵によって暗号化する共通鍵暗号化手段と、
前記秘密鍵を使用して前記暗号化された共通鍵を抽出する共通鍵抽出手段と、
前記抽出した共通鍵に基づいて、前記一の端末が暗号化した元情報の暗号化情報を復号する復号化処理手段と、
前記秘密鍵を使用して暗号化署名を生成する暗号化署名生成手段と、
前記複数の情報端末の中で、前記暗号化した元情報を所有する情報端末が前記元情報を見ることを許可した情報端末を認証する許可端末認証手段と、
前記共通鍵の暗号化情報を前記元情報の暗号化情報へリンクさせるためのリンク情報を生成するリンク情報生成手段と、
前記リンク情報と前記元情報の暗号化情報を前記複数の情報端末の中の前記一の端末及び前記許可された他の情報端末に公開するためのインデックス情報を生成するインデックス情報生成手段と、
前記通信網を介して送受する情報の暗号通信を行うためのプログラムを実装するセキュア通信コアと、
が設けられることを特徴とする情報流通システム。 - 通信網に接続される複数の情報端末の中の一の情報端末と前記複数の情報端末の中の少なくとも一つの他の情報端末との間で情報を流通させるために、前記一の情報端末及び/または前記他の情報端末に実装されるコンピュータプログラムであって、
前記通信網を介しての他の情報端末と暗号化通信を行うための共通鍵を生成する共通鍵生成手段と、
前記共通鍵に基づいて、前記複数の情報端末の中のいずれかの情報端末が所有している元情報を暗号化する元情報暗号化手段と、
共通鍵の暗号化に必要な公開鍵及び秘密鍵を保持する手段と、
前記共通鍵を公開鍵によって暗号化する共通鍵暗号化手段と、
前記秘密鍵を使用して前記暗号化された共通鍵を抽出する共通鍵抽出手段と、
前記抽出した共通鍵に基づいて、前記一の端末が暗号化した元情報の暗号化情報を復号する復号化処理手段と、
前記秘密鍵を使用して暗号化署名を生成する暗号化署名生成手段と、
前記暗号通信を実現するためのプログラムを実装したセキュア通信コアと、を備え、
前記複数の情報端末の中の前記他の情報端末のうち、少なくとも一つの情報端末は、
前記一の情報端末で暗号化した元情報を暗号化した状態で格納する元情報格納部を持つセキュアストレージを有し、
また、少なくとも一つの情報端末は、前記複数の情報端末の中で、前記暗号化した元情報を所有する情報端末が前記元情報を見ることを許可した情報端末を認証する許可端末認証手段と、
前記共通鍵の暗号化情報を前記元情報の暗号化情報へリンクさせるためのリンク情報を生成するリンク情報生成手段と、
前記リンク情報と前記元情報の暗号化情報を前記複数の情報端末の中の前記一の端末及び前記許可された他の情報端末に公開するためのインデックス情報を生成するインデックス情報生成手段と、
を前記一の情報端末であるコンピュータまたは前記他の情報端末で実現するためのコンピュータプログラム。
Priority Applications (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2009548059A JP5554066B2 (ja) | 2007-12-27 | 2008-12-25 | 情報流通システム、情報端末及びプログラム |
KR1020107016729A KR101150833B1 (ko) | 2007-12-27 | 2008-12-25 | 정보 유통 시스템 및 그를 실현하기 위한 프로그램 |
CN2008801230465A CN101919202B (zh) | 2007-12-27 | 2008-12-25 | 信息流通系统和用于信息流通系统的程序 |
AU2008344384A AU2008344384B2 (en) | 2007-12-27 | 2008-12-25 | Information distribution system and program for the same |
CA2714196A CA2714196C (en) | 2007-12-27 | 2008-12-25 | Information distribution system and program for the same |
EP08867631A EP2234323A1 (en) | 2007-12-27 | 2008-12-25 | Information distribution system and program for the same |
US12/810,658 US8407477B2 (en) | 2007-12-27 | 2008-12-25 | Information distribution system and program for the same |
IL206610A IL206610A0 (en) | 2007-12-27 | 2010-06-24 | Information distribution system and program for the same |
US13/770,281 US8824674B2 (en) | 2007-12-27 | 2013-02-19 | Information distribution system and program for the same |
US14/151,369 US20140129836A1 (en) | 2007-12-27 | 2014-01-09 | Information distribution system and program for the same |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2007337732 | 2007-12-27 | ||
JP2007-337732 | 2007-12-27 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/810,658 A-371-Of-International US8407477B2 (en) | 2007-12-27 | 2008-12-25 | Information distribution system and program for the same |
US13/770,281 Continuation US8824674B2 (en) | 2007-12-27 | 2013-02-19 | Information distribution system and program for the same |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009084573A1 true WO2009084573A1 (ja) | 2009-07-09 |
Family
ID=40824287
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2008/073556 WO2009084573A1 (ja) | 2007-12-27 | 2008-12-25 | 情報流通システム及びそのためのプログラム |
Country Status (9)
Country | Link |
---|---|
US (3) | US8407477B2 (ja) |
EP (1) | EP2234323A1 (ja) |
JP (2) | JP5554066B2 (ja) |
KR (1) | KR101150833B1 (ja) |
CN (1) | CN101919202B (ja) |
AU (1) | AU2008344384B2 (ja) |
CA (1) | CA2714196C (ja) |
IL (1) | IL206610A0 (ja) |
WO (1) | WO2009084573A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018074478A (ja) * | 2016-11-01 | 2018-05-10 | 株式会社リコー | データ処理システム、データ処理装置、データ処理方法およびプログラム |
JP7492805B1 (ja) | 2022-11-21 | 2024-05-30 | 株式会社野村総合研究所 | コンテンツ管理システム、コンテンツ管理方法、及びコンテンツ管理プログラム |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2008344384B2 (en) * | 2007-12-27 | 2012-12-20 | Keiko Ogawa | Information distribution system and program for the same |
US8782402B2 (en) * | 2010-02-25 | 2014-07-15 | Bank Of America Corporation | System and method for secure communications |
JP2013031151A (ja) | 2011-06-20 | 2013-02-07 | Renesas Electronics Corp | 暗号通信システムおよび暗号通信方法 |
DE102011083062A1 (de) | 2011-09-20 | 2013-03-21 | Hoccer GmbH | System und Verfahren zur sicheren spontanen Übermittlung vertraulicher Daten über unsichere Verbindungen und Vermittlungsrechner |
US9135460B2 (en) * | 2011-12-22 | 2015-09-15 | Microsoft Technology Licensing, Llc | Techniques to store secret information for global data centers |
KR20140029984A (ko) * | 2012-08-31 | 2014-03-11 | 한국전자통신연구원 | 의료정보 데이터베이스 운영 시스템의 의료정보 관리 방법 |
KR101926052B1 (ko) * | 2014-05-12 | 2018-12-06 | 삼성에스디에스 주식회사 | 출입 관리 시스템 및 방법 |
FR3022716B1 (fr) * | 2014-06-24 | 2018-05-11 | Outscale | Procede de partage de fichiers numeriques entre plusieurs ordinateurs, et ordinateur, ensemble de stockage de donnees et systeme de partage de fichiers numeriques associes |
CN104618104B (zh) * | 2014-12-15 | 2019-11-29 | 惠州Tcl移动通信有限公司 | 配件、电子设备及实现配件认证的系统 |
TWI554908B (zh) | 2015-11-03 | 2016-10-21 | 澧達科技股份有限公司 | 資料加密系統 |
US10178128B2 (en) * | 2015-12-11 | 2019-01-08 | Cloudflare, Inc. | Methods and apparatuses for enabling HSTS policy for a subdomain of a domain |
US9992175B2 (en) * | 2016-01-08 | 2018-06-05 | Moneygram International, Inc. | Systems and method for providing a data security service |
US10805080B2 (en) * | 2017-01-06 | 2020-10-13 | Microsoft Technology Licensing, Llc | Strong resource identity in a cloud hosted system |
KR101980432B1 (ko) * | 2017-04-18 | 2019-05-20 | 현대비에스앤씨 (주) | 개인 정보 처리를 위한 장치 및 방법 |
JP7077873B2 (ja) * | 2018-08-29 | 2022-05-31 | 日本電気株式会社 | 情報処理装置、情報処理方法、およびプログラム |
JP7077872B2 (ja) * | 2018-08-29 | 2022-05-31 | 日本電気株式会社 | 情報処理装置、情報処理方法、およびプログラム |
JP7093717B2 (ja) * | 2018-11-28 | 2022-06-30 | 株式会社日立製作所 | ネットワークシステム |
JP6909452B2 (ja) * | 2018-12-18 | 2021-07-28 | 株式会社岩手銀行 | 情報処理方法、情報処理装置、プログラムならびに情報処理システム |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002305513A (ja) | 2001-04-05 | 2002-10-18 | Canon Software Inc | 情報通信システム及び情報端末及びその制御方法及びコンピュータプログラム並びに記憶媒体 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU757557B2 (en) | 1997-11-13 | 2003-02-27 | Intellectual Ventures I Llc | File transfer system |
JP2000196585A (ja) * | 1998-10-08 | 2000-07-14 | Matsushita Electric Ind Co Ltd | コンテンツを記録した記録媒体、デジタルデ―タ記録装置、デジタルデ―タ再生装置、パッケ―ジを作成するコンテンツパッケ―ジング装置、コンテンツ再生装置、コンピュ―タ読み取り可能な記録媒体、記録方法、再生方法、パッケ―ジング方法、コンテンツパッケ―ジング装置と、コンテンツ再生装置とからなるシステム。 |
JP2004013564A (ja) * | 2002-06-07 | 2004-01-15 | Nippon Hoso Kyokai <Nhk> | 視聴回数制限コンテンツ生成装置、視聴回数制限コンテンツ再生装置、視聴回数制限コンテンツ配信方法、視聴回数制限コンテンツ配信プログラムおよび視聴回数制限コンテンツ再生プログラム |
TW576063B (en) | 2002-07-10 | 2004-02-11 | Benq Corp | Device and method for securing information associated with a subscriber in a communication apparatus |
KR101037838B1 (ko) * | 2003-04-25 | 2011-05-31 | 애플 인크. | 보안 네트워크를 통한 콘텐츠의 분배 방법 및 그 시스템 |
JP2005115565A (ja) * | 2003-10-06 | 2005-04-28 | Nec Soft Ltd | 医療情報信託システムおよびそのサービスの提供方法 |
EP1549010B1 (en) * | 2003-12-23 | 2008-08-13 | Motorola Inc. | Rekeying in secure mobile multicast communications |
CN1332353C (zh) * | 2004-04-28 | 2007-08-15 | 英华达(上海)电子有限公司 | 一种实现图像版权控制的方法 |
CN101014925B (zh) * | 2004-07-15 | 2012-07-04 | 高通股份有限公司 | 分组数据通信中的加密数据流的承载控制 |
US8275632B2 (en) * | 2004-07-23 | 2012-09-25 | Privit, Inc. | Privacy compliant consent and data access management system and methods |
KR101496424B1 (ko) * | 2004-10-08 | 2015-02-27 | 코닌클리케 필립스 엔.브이. | Drm 시스템을 위한 사용자 기반 콘텐트 키 암호화 |
JP4723909B2 (ja) * | 2005-05-27 | 2011-07-13 | 株式会社日立製作所 | データ交換方法、データ交換管理装置およびデータ交換管理プログラム |
US20070124310A1 (en) * | 2005-07-26 | 2007-05-31 | Novo Innovations, Inc. | Distributed Computing System to Enable the Secure Exchange of Information Between Remotely Located Healthcare Applications |
JP4795812B2 (ja) * | 2006-02-22 | 2011-10-19 | 富士通セミコンダクター株式会社 | セキュアプロセッサ |
GB2436910B (en) * | 2006-04-03 | 2011-02-16 | Identum Ltd | Electronic Data Communication System |
JP4442583B2 (ja) * | 2006-04-24 | 2010-03-31 | コニカミノルタビジネステクノロジーズ株式会社 | 画像処理装置、画像処理方法及び画像処理用プログラム |
AU2008344384B2 (en) * | 2007-12-27 | 2012-12-20 | Keiko Ogawa | Information distribution system and program for the same |
-
2008
- 2008-12-25 AU AU2008344384A patent/AU2008344384B2/en not_active Ceased
- 2008-12-25 CN CN2008801230465A patent/CN101919202B/zh active Active
- 2008-12-25 EP EP08867631A patent/EP2234323A1/en not_active Withdrawn
- 2008-12-25 CA CA2714196A patent/CA2714196C/en not_active Expired - Fee Related
- 2008-12-25 US US12/810,658 patent/US8407477B2/en not_active Expired - Fee Related
- 2008-12-25 JP JP2009548059A patent/JP5554066B2/ja active Active
- 2008-12-25 WO PCT/JP2008/073556 patent/WO2009084573A1/ja active Application Filing
- 2008-12-25 KR KR1020107016729A patent/KR101150833B1/ko not_active IP Right Cessation
-
2010
- 2010-06-24 IL IL206610A patent/IL206610A0/en unknown
-
2013
- 2013-02-19 US US13/770,281 patent/US8824674B2/en active Active
-
2014
- 2014-01-09 US US14/151,369 patent/US20140129836A1/en not_active Abandoned
- 2014-04-14 JP JP2014082521A patent/JP5809316B2/ja active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002305513A (ja) | 2001-04-05 | 2002-10-18 | Canon Software Inc | 情報通信システム及び情報端末及びその制御方法及びコンピュータプログラム並びに記憶媒体 |
Non-Patent Citations (2)
Title |
---|
KAZUNORI SEKI ET AL.: "Ango o Riyo shita Atarashii Software Ryutsu Keitai no Teian", INFORMATION PROCESSING SOCIETY OF JAPAN KENKYU HOKOKU, vol. 93, no. 68, 18 August 1993 (1993-08-18), pages 19 - 28, XP008137683 * |
YASUAKI TAKEBE ET AL.: "Jisedai P2P Content Kokan System -Content no Seigosei Iji to Kodo na Joho Kensaku no Jitsugen", MULTIMEDIA TSUSHIN TO BUNSAN SHORI WORKSHOP RONBUNSHU, vol. 2003, no. 19, 10 December 2003 (2003-12-10), pages 73 - 78, XP008137684 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018074478A (ja) * | 2016-11-01 | 2018-05-10 | 株式会社リコー | データ処理システム、データ処理装置、データ処理方法およびプログラム |
JP7492805B1 (ja) | 2022-11-21 | 2024-05-30 | 株式会社野村総合研究所 | コンテンツ管理システム、コンテンツ管理方法、及びコンテンツ管理プログラム |
WO2024111360A1 (ja) * | 2022-11-21 | 2024-05-30 | 株式会社野村総合研究所 | コンテンツ管理システム、コンテンツ管理方法、及びコンテンツ管理プログラム |
Also Published As
Publication number | Publication date |
---|---|
JP2014161078A (ja) | 2014-09-04 |
CA2714196C (en) | 2012-03-27 |
EP2234323A1 (en) | 2010-09-29 |
AU2008344384A8 (en) | 2010-08-19 |
JP5554066B2 (ja) | 2014-07-23 |
CA2714196A1 (en) | 2009-07-09 |
KR20100103645A (ko) | 2010-09-27 |
AU2008344384B2 (en) | 2012-12-20 |
US20140129836A1 (en) | 2014-05-08 |
US20130163754A1 (en) | 2013-06-27 |
CN101919202B (zh) | 2013-03-13 |
US8824674B2 (en) | 2014-09-02 |
CN101919202A (zh) | 2010-12-15 |
JP5809316B2 (ja) | 2015-11-10 |
KR101150833B1 (ko) | 2012-06-14 |
US8407477B2 (en) | 2013-03-26 |
AU2008344384A2 (en) | 2010-08-05 |
JPWO2009084573A1 (ja) | 2011-05-19 |
IL206610A0 (en) | 2010-12-30 |
US20100281265A1 (en) | 2010-11-04 |
AU2008344384A1 (en) | 2009-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5809316B2 (ja) | 情報流通システム、情報端末及びプログラム | |
US10432394B2 (en) | Method and system for sharing encrypted content | |
Barker et al. | Recommendation for key management part 3: Application-specific key management guidance | |
JP4600851B2 (ja) | コンピュータシステム間でメッセージを通信するための安全なコンテキストの確立 | |
US20100017599A1 (en) | Secure digital content management using mutating identifiers | |
EP1847942A1 (en) | Privacy protection system | |
US20030081774A1 (en) | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure | |
US9356926B1 (en) | Security system | |
US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
JP2004509399A (ja) | ネットワークにわたって配布されるオブジェクトを保護するためのシステム | |
Barker et al. | Sp 800-57. recommendation for key management, part 1: General (revised) | |
Pangalos et al. | Developing a Public Key Infrastructure for a secure regional e-Health environment | |
US11153288B2 (en) | System and method for monitoring leakage of internal information by analyzing encrypted traffic | |
US20240214187A1 (en) | System and Method of Creating Symmetric Keys Using Elliptic Curve Cryptography | |
JP2007006319A (ja) | 鍵交換システム、端末装置及びプログラム | |
Lopez Pimentel et al. | Symmetric cryptography protocol for signing and authenticating digital documents | |
Pimentel et al. | A Web Service for Signing and Authenticating Digital Documents based on Symmetric Cryptography Protocol | |
Pimentel et al. | A Secure Framework to Authenticate Remotely Digital Documents based on The TLS Protocol | |
Mehta | A Fortified Identity Based Encryption (FIBE) For E-Health Management System in Cloud | |
Priya et al. | Web Service Based Reliable-Sheltered Medi Helper | |
JP2003309546A (ja) | 情報授受方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200880123046.5 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08867631 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2009548059 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12810658 Country of ref document: US Ref document number: 2714196 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008344384 Country of ref document: AU |
|
REEP | Request for entry into the european phase |
Ref document number: 2008867631 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008867631 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 5219/DELNP/2010 Country of ref document: IN |
|
ENP | Entry into the national phase |
Ref document number: 2008344384 Country of ref document: AU Date of ref document: 20081225 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20107016729 Country of ref document: KR Kind code of ref document: A |