WO2012005555A2 - 전자문서 유통증명서 생성/발급 방법, 전자문서 유통증명서 검증 방법, 및 전자문서 유통시스템 - Google Patents
전자문서 유통증명서 생성/발급 방법, 전자문서 유통증명서 검증 방법, 및 전자문서 유통시스템 Download PDFInfo
- Publication number
- WO2012005555A2 WO2012005555A2 PCT/KR2011/005039 KR2011005039W WO2012005555A2 WO 2012005555 A2 WO2012005555 A2 WO 2012005555A2 KR 2011005039 W KR2011005039 W KR 2011005039W WO 2012005555 A2 WO2012005555 A2 WO 2012005555A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- distribution
- certificate
- message
- electronic document
- entity
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 77
- 238000012795 verification Methods 0.000 claims abstract description 87
- 230000005540 biological transmission Effects 0.000 claims abstract description 59
- 230000008520 organization Effects 0.000 claims description 9
- 239000000344 soap Substances 0.000 claims description 8
- 239000003795 chemical substances by application Substances 0.000 claims description 3
- 230000000694 effects Effects 0.000 description 4
- 230000007774 longterm Effects 0.000 description 4
- 238000010200 validation analysis Methods 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/60—Business processes related to postal services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
Definitions
- the present invention provides a transparent and efficient issuance service in generating, distributing, and storing distribution certificates within a certified electronic address-based electronic document distribution system, and improves the reliability of distribution of electronic documents by ensuring compatibility of certificates.
- the present invention is to solve the above problems, the object of the present invention is to provide a transparent and efficient issuance service in generating, distributing, and storing the distribution certificate in the authorized electronic address based electronic document distribution system, It is to provide a method for generating / issuing an electronic document distribution certificate that can improve the reliability of distribution of electronic documents due to securing compatibility.
- another object of the present invention is to provide a method for verifying a distribution certificate that helps to correctly use the certificate by defining a standardized verification method for the distribution certificate.
- another object of the present invention is to provide an electronic document distribution system that can ensure the reliability of the distribution.
- the sending entity sending a distribution message containing the sender's electronic document to the receiving entity;
- the receiving entity after receiving the distribution message, acquires the necessary information and generates a receipt certificate;
- the receiving entity transmitting the generated receipt certificate to the transmitting entity;
- the sending entity attaches verification information about the digital signature certificate of the reception certificate to the reception certificate after completing verification of the received certificate;
- the sending entity requesting storage by sending a receipt certificate to a third party storage organization; It includes.
- Electronic document distribution certificate verification method for achieving the above object, in the method for verifying the distribution certificate generated / issued in the electronic document distribution system including the transmission and reception entity and the distribution hub Verifying that the format of the distribution certificate complies with the constraints of the predetermined structure and values; Verifying whether the distribution message transmission date, reception date and time, reading date and time, distribution certificate issuance date, certificate verification time point and certificate validity expiration date which are set in the distribution certificate are in sequence; Verifying an electronic signature attached to the distribution certificate; And verifying validity of the certificate that has performed the electronic signature on the distribution certificate, and verifying whether the certificate is the same as the information on the issuer of the distribution certificate. It includes.
- Electronic document distribution method for achieving the above object, in a system for distributing an electronic document, sending and receiving a message based on the electronic address and issuing and managing a distribution certificate for the message transmission and reception Transmitting and receiving entity for distributing the electronic document through the distribution messaging server;
- a distribution hub that registers / manages electronic addresses of the transmitting and receiving entities, sets an electronic document distribution path between the transmitting and receiving entities, and acts as a message transmission agent and issues a distribution certificate when an error occurs in an electronic document distribution process between the transmitting and receiving entities.
- the distribution certificate includes a receipt certificate for non-repudiation of the fact that the message is received by the receiving entity, a transmission certificate for proof of the transmission attempt of the transmitting entity, and a non-repudiation for the receiving message reading fact of the recipient. Include proof of reading.
- the present invention as described above has the effect of providing a transparent and efficient issuance service in generating, distributing, and storing distribution certificates within the authorized electronic address-based electronic document distribution system.
- the present invention as described above has the effect of improving the reliability of the distribution of the electronic document by ensuring the compatibility of the certificate within the authorized electronic address based electronic document distribution system.
- the present invention as described above has an effect of providing a verification method of a distribution certificate that helps correct use of the certificate by defining a standardized verification method of the distribution certificate.
- 1 is a view for explaining the generation and issuance of a distribution certificate according to the present invention.
- FIG. 2 is a view showing a distribution certificate generation and issuance process according to the present invention.
- a method for generating an electronic document distribution certificate includes: (a) transmitting a distribution message including a sender's electronic document to a receiving entity; (b) the receiving entity, after receiving the distribution message, acquires the necessary information and generates a receipt certificate; (c) the receiving entity transmitting the generated receipt certificate to the transmitting entity; (d) the sending entity attaches verification information about the digital signature certificate of the reception certificate to the reception certificate after completing verification of the received certificate; And (e) the sending entity requesting storage by sending a receipt certificate to a third party storage organization; It includes.
- Electronic document distribution certificate authentication method the step of verifying that the format of the distribution certificate conforms to the constraints of the predetermined structure and value; Verifying whether the distribution message transmission date, reception date and time, reading date and time, distribution certificate issuance date, certificate verification time point and certificate validity expiration date which are set in the distribution certificate are in sequence; Verifying an electronic signature attached to the distribution certificate; And verifying validity of the certificate that has performed the electronic signature on the distribution certificate, and verifying whether the certificate is the same as the information on the issuer of the distribution certificate. It includes.
- the transmission and reception entity for transmitting and receiving messages based on the electronic address and distribution through the distribution messaging server for issuing and managing the distribution certificate for the message transmission and reception;
- a distribution hub that registers / manages electronic addresses of the transmitting and receiving entities, sets an electronic document distribution path between the transmitting and receiving entities, and acts as a message transmission agent and issues a distribution certificate when an error occurs in an electronic document distribution process between the transmitting and receiving entities.
- the distribution certificate includes a receipt certificate for non-repudiation of the fact that the message is received by the receiving entity, a transmission certificate for proof of the transmission attempt of the transmitting entity, and a non-repudiation for the receiving message reading fact of the recipient. Include proof of reading.
- Figure 1 illustrates the components related to the generation and issue of distribution certificate in the present invention, each component is as follows 1 ⁇ 4.
- Sending entity (or sending electronic document relay, hereinafter called sending entity, 101): Basically, the sender's electronic document is transmitted to the receiving entity or, if necessary, requested to be sent to the distribution relay server. In relation to the distribution certificate, it verifies the distribution certificate received from the receiving entity or the distribution relay server, and attaches the verification information to the distribution certificate and stores it in the third-party storage institution.
- Receiving entity (or Receiving Electronic Document Repeater, hereinafter Receiving Object, 102): Basically, the electronic document received from the sending entity or distribution relay server is delivered to the recipient.
- the distribution certificate upon receipt of the electronic document from the sending entity or distribution relay server, a receipt certificate is generated and transmitted to the sending entity or distribution relay server as a response message, or as soon as the recipient views the electronic document, It transmits to the sending entity.
- Electronic document distribution hub (or distribution relay server, 103): Basically delivers the electronic document requested from the sending entity to the receiving entity.
- the sender In relation to the distribution certificate, the sender generates and transmits the sender certificate to the sender as soon as it receives a request to send the electronic document to the sender, or delivers the received document to the sender in response to the electronic document. Do this.
- Third Party Archives (Public Offices, Certified Electronic Documents Archives; 104): As a trusting organization, it is responsible for the safekeeping of distribution certificates.
- the obtaining method of the essential information of the electronic document distribution certificate according to the present invention is shown in Table 2 below.
- the system time of distribution messaging server and distribution relay server should be synchronized with the time of outside authorized organization periodically.
- FIG. 1 The overall process related to the electronic document distribution certificate according to the present invention is shown in FIG.
- the receipt certificate is an electronic document distribution certificate that is generated to prove that the electronic document distribution message is received from the sender.
- the processor related to the receipt certificate is shown in Table 3 below.
- the sending entity sends a distribution message containing the sender's electronic document to the receiving entity. 2 After receiving the distribution message, the receiving entity immediately acquires the necessary information and generates a receipt certificate. 3 The receiving entity sends the created receipt to the sending entity. 4 After the sending entity completes the verification of the receipt certificate, the sending entity attaches verification information about the digital signature certificate of the receipt certificate to the receipt certificate. 5 The sending entity sends and stores the receipt certificate to the certified electronic archives.
- the sending certificate is generated by the distribution relay server and sent to the sending entity.
- the certificate related to the transmission certificate is shown in Table 4 below.
- the sending entity sends a distribution message to the receiving entity. 2 If distribution message transmission fails, the sending entity requests distribution message transmission to distribution relay server. 3 The distribution relay server generates a transmission certificate for the requested transmission. 4 The distribution relay server transmits a transmission certificate to the transmission object. 5 After completing the verification of the transmission certificate, the sending entity attaches verification information about the digital signature certificate of the transmission certificate to the transmission certificate. 6 The sending entity keeps the sending certificate in the certified electronic archives. 7 The distribution relay server delivers the distribution message to the receiving entity. 8 The receiving entity generates a receipt certificate immediately after receipt of the electronic document. 9 The receiving entity sends a receipt certificate to the distribution relay server. 10 The distribution relay server forwards the receipt certificate to the sending entity. 11 After the sending entity completes the verification of the receipt certificate, the sending entity attaches verification information about the digital signature certificate of the receipt certificate to the receipt certificate. 12 The sending entity sends and stores the receipt certificate to the certified electronic archives.
- the viewing certificate is a certificate that the receiving entity generates and transmits to the sending entity in order to prove that the recipient has read the message received from the sending entity.
- the process related to the viewing certificate is shown in Table 5 below.
- Table 5 number People One The receiver requests the receiving entity to view the distribution message and views the distribution message received in response. 2 The receiving entity generates a view certificate. 3 After the receiving entity completes the verification of the reading certificate, the receiving entity attaches verification information about the digital signature certificate of the reading certificate to the reading certificate. 4 The sending entity transmits and keeps the reading certificate to the certified electronic archives.
- the distribution certificate is generated and verified by the distribution messaging server and the distribution relay server of the sending and receiving entity.
- the distribution certificate is generated by electronic signature based only on the NPKI certificate.
- the distribution certificate shall be given an ID for identifying the distribution message and an electronic document identifier or electronic document name for identifying the electronic document in the distribution message.
- serial number of the distribution certificate is created by individual send / receive entities, so 32 byte random number is used for uniqueness.
- Distribution messaging server must keep synchronization with visual information of external trust authority to secure reliability of visual information in distribution certificate.
- the certificate of distribution certificate uses only OID (Object Identifier) and name defined in this Technical Specification.
- the sending entity verifies the received distribution certificate, and attaches verification information about the signature certificate of the distribution certificate to the distribution certificate.
- the electronic document distribution certificate is generated by the sending / receiving entity and digitally signed using the NPKI certificate of the sending / receiving entity.
- the basic structure of the electronic document distribution certificate uses the same content identifier as the certificate of the certified electronic archives using the SignedData structure of the CMS standard.
- the contentType of the electronic document distribution certificate is shown in Table 6 below.
- ARCCertInfo SEQUENCE ⁇ version [0] EXPLICIT ARCVersion DEFAULT v1, serialNumber SerialNumber, issuer GeneralNames, dateOfIssue GeneralizedTime, dateOfExpire DateOfExpiration, policy ARCCertificatePolicies, requestInfo RequestInfo, target TargetToCertify, extionsions [1] EXPLICIT Extensions OPTIONAL ⁇
- the serial number of the electronic document distribution certificate should be generated as a unique positive integer using a 32 byte random number. In order to process electronic document distribution certificate, it must be able to process 32 byte serial number.
- the certificate issue date uses the GeneralizedTime format.
- the expiration date of the electronic document distribution certificate must be future than the certificate issuance date, and should be set in sufficient time, taking into account the period for which proof of distribution is required.
- This field consists of policy OID according to the type of electronic document distribution certificate and qualifier information for indicating the type of electronic document distribution certificate. Note that only userNotice is used as the qualifier information and cPSuri is not used.
- the type of electronic document distribution certificate should be displayed using the explicitText field below the userNotice field, and the format should be BMPString.
- the policy OID in the electronic document distribution certificate depends on the certificate type and should use only the value specified in the present invention.
- the OID and Qualifier information according to the electronic document distribution certificate is as follows.
- This field is set to null.
- This field contains the content to be proved.
- This field must set information on distribution message using distributionInfos field below.
- the sender indicates the time when the distribution message was sent.
- the transmission date and time of the receipt certificate and the viewing certificate are the time when the sending entity sent the distribution message, and indicate the value of the TimeStamp field included in the SOAP message in the "message transmission" distribution association message in GeneralizedTime format.
- the transmission date and time of the transmission certificate means the time at which the sending entity requested distribution message to the distribution relay server. Unlike other distribution certificates that use the time value in the distribution-related message, the distribution relay server "request message transmission" distribution message. Note that you must use the time you received the. Regarding the time field, the transmission certificate includes only this field, and does not generate the reception date and time fields.
- the reception date and time is a field generated only in the reception certificate and the viewing certificate, and allows the distribution messaging server of the receiving entity to set the time when the distribution message of the "send message" is received.
- the date and time of reception must be later than the date and time of transmission and must be the same as or earlier than the time of creation of the certificate.
- the viewing date and time is a field generated only in the reading certificate, and sets a time when the distribution messaging server of the receiving entity responds to the "message detail request" of the recipient. This time shall be equal to the value in the GeneralizedTime format of the value of the TimeStamp field included in the SOAP message in the Distribution Association Message that the recipient has responded to.
- the date and time of reading must be the same as or before the time the certificate was generated, and must be the same or later than the date and time of receipt.
- the unique identifier of the distribution message to be issued the electronic document distribution certificate is set as it is.
- the number of electronic document files attached to the distribution message is the number of electronic document files attached to the distribution message.
- the distribution message may be attached with one or more electronic document files, and information about individual files may be set using the DistributedFile structure.
- the individual electronic document file is generated using the hash algorithm of the hashAlg field to generate a hash value and then set in the hashedData field.
- the file identification value does not exist in the distribution message.
- the Content-ID value of the individual electronic document file attached in the MIME format to the entire distribution-related message composed of the multi-part message is set as it is.
- This field may be used optionally, but if the file name field is not used, it must be used. It is recommended to use the file identification value field.
- the file identification value field is used first to be compared with the verification target electronic document file.
- the file name field must be generated, and as a value, the Content-ID value of the individual electronic document file attached in the MIME format to the entire distribution-related message composed of the multi-part message must be set as it is. do. If the file identification value field is generated, the file name field may be omitted, and when generating, a value for assisting in identifying the electronic document file may be set.
- the electronic document distribution certificate profile is shown in Table 17 below.
- public key cryptography algorithm uses RSA and hash algorithm uses SHA256.
- the signerInfos field contains only one signerInfo.
- the subject of the distribution message shall immediately verify the certificate upon receipt of the electronic document distribution certificate.
- Certificate validation is a process of checking whether the conditions for validity as a certificate are satisfied
- certificate content verification is a process of verifying facts by comparing with a distribution message to be proved through a certificate. Therefore, the verification of the contents of the certificate can be seen to be performed to verify the authenticity of the fact of distribution rather than the verification of the certificate.
- the validity of the electronic document distribution certificate is validated through 1 certification format verification, 2 certification time verification, 3 certification digital signature verification, and 4 signature certificate verification. Verification of certificate contents is performed through 5 distribution message comparison verification.
- Certificate format verification is the process of confirming that the format of the certificate of distribution subject to verification complies with the constraints of the structure and values defined in this standard.
- the attestation subject field was created using the distributionInfos field, and does it comply with the rules on whether to create subfields according to the type of certificate presented in the certificate policy?
- the certificate time verification is a process of confirming that the values of each time field set in the distribution certificate are normal at the time point of becoming the verification standard. That is, in this process, it is confirmed that the values of each time field set in the distribution certificate satisfy the rules of Table 18 below compared to the verification reference time point.
- Digital signature verification is a process of verifying the digital signature attached to the distribution certificate in order to guarantee integrity and prevent repudiation of the contents to be proved by the distribution certificate, and follows the general digital signature verification method for signedData of CMS.
- the signing certificate verification is a process of verifying the validity of the certificate that performed the digital signature on the distribution certificate and the identity with the issuer information of the distribution certificate.
- Validation of a digital signature certificate is a procedure that is generally included as part of the digital signature verification process, and is performed through verification of certificate validity period, verification of revocation, and path verification with higher CA certificates. To this end, the certification shall be verified by applying the "Certification Certificate Path Verification Technical Specification [KCAC.TS.CERTVAL]" of the accredited certification system.
- the digital signature certificate If the digital signature certificate has been successfully validated, it must be compared with the issuer information of the distribution certificate. Since the issuer information of the distribution certificate is set to the subject DN value of the digital signature certificate as it is, the two values are extracted and compared and verified.
- the distribution message comparison verification process is not a process of verifying the validity of the distribution certificate, but a process of verifying the authenticity of the distribution fact by comparing and verifying information of the distribution message included in the distribution certificate with the actual distribution message.
- a sending entity When a sending entity receives a distribution certificate after sending or requesting a distribution message, it must perform comparison verification on this distribution message to confirm that the distribution certificate includes information on the distribution message sent by the sending entity.
- the distribution certificate As the importance of the distribution certificate, once the verification of the issued distribution certificate is completed, it is registered and stored in the official electronic archives. However, this provides only a long-term guarantee of the timing and integrity of the distribution certificate. After the validity period of the certificate expires, the validity of the digital signature certificate at the time of issue of the distribution certificate cannot be guaranteed in the long term. In other words, the validity of the distribution certificate cannot be guaranteed after the expiration date of the digital signature certificate. In order to solve this problem, by verifying with the distribution certificate verification information that confirms the validity of the digital signature certificate at the time the distribution certificate is issued, the distribution certificate has expired even after the expiration date of the certificate that performed the digital signature on the distribution certificate has expired. It can enable verification of certificates.
- the sending entity performs the CRL and ARL, the upper CA certificate, and the Root CA to verify the revocation and path of the digital signature certificate. Collect the certificate.
- the certificate By storing the data together with the distribution certificate in the official electronic archives, the validity of the digital signature certificate at the time of issuance of the distribution certificate is ensured and, as a result, the validity of the distribution certificate.
- the sender After successfully verifying the digital signature certificate, the sender shall include the CRL and ARL, the parent CA certificate and the Root CA certificate used in the verification in the certificates and crls fields in the signedData structure of the distribution certificate.
- the order in which each piece of information is included is irrelevant. It should be noted that the task of simply including each piece of information in the corresponding field should be performed. Because the certificates and crls fields are not the subject of digital signatures for signedData, verification of the distribution certificate will still be successful after the operation is performed.
- SignedData SEQUENCE ⁇ version CMSVersion, digestAlgorithms DigestAlgorithmIdentifiers, encapContentInfo EncapsulatedContentInfo, certificates [0] IMPLICIT CertificateSet OPTIONAL, crls [1] IMPLICIT RevocationInfoChoices OPTIONAL, signerInfosSignerInfos ⁇
- the sending entity shall keep the distribution certificate containing the digital signature certificate verification information in the official electronic archives, thereby enabling long-term verification of the distribution certificate.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
유 형 | 목 적 | 생성주체/시점 | 필수 정보 |
수신증명서 | 수신 개체의 메시지 수신사실에 대한 부인방지 | 수신 개체/수신 직후 | 문서정보, 송신자, 수신자, 송신자 송신시각, 수신자 수신시각 |
송신증명서 | 송신 개체의 송신시도에 대한 증명 | 유통 중계서버/송신의뢰메시지 수신 직후 | 문서정보, 송신자, 수신자, 송신자 송신의뢰시각 |
열람증명서 | 수신자의 수신메시지 열람사실에 대한 부인방지 | 수신 개체/수신자 열람 직후 | 문서정보, 송신자, 수신자, 송신자 송신시각, 수신자 수신시각, 수신자 열람시각 |
유형 | 필수정보 | 정보획득방법 |
수신증명서 | 문서정보, 송신자, 수신자, 송신자 송신시각 | 송신 개체가 전송한 유통 연계 메시지 내의 유통메시지 및 SOAP 메시지의 관련 필드값 이용 |
수신자 수신시각 | 수신 개체의 유통 메시징서버의 수신 시각 이용 | |
송신증명서 | 문서정보, 송신자, 수신자 | 송신 개체가 전송한 유통 연계 메시지 내의 유통메시지의 관련 필드값 이용 |
송신자 송신의뢰시각 | 유통 중계서버의 수신 시각 이용 | |
열람증명서 | 문서정보, 송신자, 수신자, 송신자 송신시각 | 송신 개체가 전송한 유통 연계 메시지 내의 유통메시지 및 SOAP 메시지의 관련 필드값 이용 |
수신자 수신시각 | 수신 개체의 유통 메시징서버의 수신 시각 이용 | |
수신자 열람시각 | 수신자의 문서정보 요청에 대한 수신 개체의 응답 시각 이용 |
번호 | 프 로 세 스 명 |
1 | 송신 개체는 수신 개체에게 송신자의 전자문서를 포함한 유통메시지를 전송한다. |
2 | 수신 개체는 유통메시지를 수신한 후, 즉시 필수정보를 획득하여 수신증명서를 생성한다. |
3 | 수신 개체는 생성한 수신증명서를 송신 개체로 전송한다. |
4 | 송신 개체는 수신증명서에 대한 검증을 완료한 후, 수신증명서의 전자서명 인증서에 대한 검증정보를 수신증명서에 첨부한다. |
5 | 송신 개체는 수신증명서를 공인전자문서보관소에 전송,보관한다. |
번호 | 프 로 세 스 명 |
1 | 송신 개체는 수신 개체에게 유통메시지를 전송한다. |
2 | 유통메시지 전송이 실패하였을 경우 송신 개체는 유통 중계서버로 유통메시지 전송을 의뢰한다. |
3 | 유통 중계서버는 의뢰받은 전송에 대한 송신증명서를 생성한다. |
4 | 유통 중계서버는 송신증명서를 송신개체로 전송한다. |
5 | 송신 개체는 송신증명서에 대한 검증을 완료한 후, 송신증명서의 전자서명 인증서에 대한 검증정보를 송신증명서에 첨부한다. |
6 | 송신개체는 송신증명서를 공인전자문서보관소에 보관한다. |
7 | 유통 중계서버는 유통메시지를 수신 개체로 전달한다. |
8 | 수신 개체는 전자문서 수신 직후 수신증명서를 생성한다. |
9 | 수신 개체는 수신증명서를 유통 중계서버로 전송한다. |
10 | 유통 중계서버는 수신증명서를 송신 개체로 전달한다. |
11 | 송신 개체는 수신증명서에 대한 검증을 완료한 후, 수신증명서의 전자서명 인증서에 대한 검증정보를 수신증명서에 첨부한다. |
12 | 송신 개체는 수신증명서를 공인전자문서보관소에 전송,보관한다. |
번호 | 프 로 세 스 명 |
1 | 수신자는 수신 개체에게 유통메시지 열람을 요청하여 응답으로 전달받은 유통메시지를 열람한다. |
2 | 수신 개체는 열람증명서를 생성한다. |
3 | 수신 개체는 열람증명서에 대한 검증을 완료한 후, 열람증명서의 전자서명 인증서에 대한 검증정보를 열람증명서에 첨부한다. |
4 | 송신 개체는 열람증명서를 공인전자문서보관소에 전송,보관한다. |
id-kiec-arcCertReseponse OBJECT IDENTIFIER ::= { iso(1) member-body(2) korea(410) kiec(200032) certificate(2) 2 }ARCCertResponse ::= CHOICE { arcCertInfo [0] EXPLICIT ARCCertInfo, arcErrorNotice [1] EXPLICIT ARCErrorNotice } |
ARCCertInfo ::= SEQUENCE { version [0] EXPLICIT ARCVersion DEFAULT v1, serialNumber SerialNumber, issuer GeneralNames, dateOfIssue GeneralizedTime, dateOfExpire DateOfExpiration, policy ARCCertificatePolicies, requestInfo RequestInfo, target TargetToCertify, extionsions [1] EXPLICIT Extensions OPTIONAL } |
ARCVersion ::= INTEGER {v1(1), v2(2), v9(9)} |
SerialNumber ::= INTEGER |
GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralNameGeneralName ::= CHOICE { otherName [0] OtherName, rfc822Name [1] IA5String, dNSName [2] IA5String, x400Address [3] ORAddress, directoryName [4] Name, ediPartyName [5] EDIPartyName, uniformResourceIdentifier [6] IA5String, iPAddress [7] OCTET STRING, registeredID [8] OBJECT IDENTIFIER }Name ::= CHOICE { RDNSequence }RDNSequence ::= SEQUENCE OF RelativeDistinguishedNameRelativeDistinguishedName ::= SET OF AttributeTypeAndValueAttributeTypeAndValue ::= SEQUENCE { type AttributeType, value AttributeValue }AttributeType ::= OBJECT IDENTIFIERAttributeValue ::= ANY DEFINED BY AttributeTypeDirectoryString ::= CHOICE { teletexString TeletexString (SIZE (1..MAX)), printableString PrintableString (SIZE (1..MAX)), universalString UniversalString (SIZE (1..MAX)), utf8String UTF8String (SIZE (1..MAX)), bmpString BMPString (SIZE (1..MAX)) } |
DateOfExpiration ::= GeneralizedTime |
ARCCertificatePolicies ::= SEQUENCE SIZE (1..MAX) OF PolicyInformationPolicyInformation ::= SEQUENCE { policyIdentifier CertPolicyId, policyQualifiers SEQUENCE SIZE (1..MAX) OF PolicyQualifierInfo OPTIONAL }CertPolicyId ::= OBJECT IDENTIFIERPolicyQualifierInfo ::= SEQUENCE { policyQualifierId PolicyQualifierId, qualifier ANY DEFINED BY policyQualifierId }PolicyQualifierId ::= OBJECT IDENTIFIER ( id-qt-cps | id-qt-unotice )Qualifier ::= CHOICE { cPSuri CPSuri, userNotice UserNotice }UserNotice ::= SEQUENCE { noticeRef NoticeReference OPTIONAL, explicitText DisplayText OPTIONAL}NoticeReference ::= SEQUENCE { organization DisplayText, noticeNumbers SEQUENCE OF INTEGER }DisplayText ::= CHOICE { ia5String IA5String(SIZE (1..200)), visibleString VisibleString(SIZE (1..200)), bmpString BMPString(SIZE (1..200)), utf8String UTF8String(SIZE (1..200)) } |
증명서 종류 | 정책 OID | Qualifier |
송신 증명서 | 1.2.410.200032.6.1 | "송신 증명서" |
수신 증명서 | 1.2.410.200032.6.2 | "수신 증명서" |
열람 증명서 | 1.2.410.200032.6.3 | "열람 증명서" |
RequestInfo ::= CHOICE { arcCertRequest ARCCertRequest, null NULL } |
TargetToCertify ::= CHOICE { opRecord [0] EXPLICIT OperationRecord, orgAndIssued [1] EXPLICIT OriginalAndIssuedDocumentInfo, dataHash [2] EXPLICIT HashedDataInfo distributionInfos [10] EXPLICIT DistributionInfos } DistributionInfos ::= SEQUENCE OF DistributionInfoDistributionInfo ::= SEQUENCE { senderAdd UTF8String, receiverAdd UTF8String, dateOfSend GeneralizedTime, dateOfReceive [0] EXPLICIT GeneralizedTime OPTIONAL, dateOfReceiveConfirm [1] EXPLICIT GeneralizedTime OPTIONAL, distributionId UTF8String, numberOfFiles INTEGER, distributedFileInfos DistributedFileInfos } |
DistributedFileInfos ::= SEQUENCE OF DistributedFileDistributedFile ::= SEQUENCE { fileHashedData HashedDataInfo, fileId [0] EXPLICIT UTF8String OPTIONAL, fileName [1] EXPLICIT UTF8String OPTIONAL }HashedDataInfo ::= SEQUENCE { hashAlg HashAlgorithm, hashedData BIT STRING }HashAlgorithm ::= AlgorithmIdentifier |
기본필드 | 내용 | 특이사항 |
version | 버전 | v9 |
serialNumber | 일련번호 | 32byte 난수 |
issuer | 증명서 발급자 | 서명인증서의 subject DN |
dateOfIssue | 증명서 발급일 | GeneralizedTime |
dateOfExpire | 증명서 효력 만기일 | GeneralizedTime |
policy | 증명서 정책 | OID : 1.2.410.200032.6.1(송신): 1.2.410.200032.6.2(수신): 1.2.410.200032.6.3(열람) |
requestInfo | 증명서 요청메시지 정보 | null |
target | 증명대상 | distributionInfos 구조 사용 |
senderAdd | 송신자 공인전자주소 | UTF8String |
receiverAdd | 수신자 공인전자주소 | UTF8String |
dateOfSend | 송신일시 | GeneralizedTime, 필수 |
dateOfReceive | 수신일시 | GeneralizedTime, 선택 |
dateOfReceiveConfirm | 수신확인일시 | GeneralizedTime, 선택 |
distributionId | 유통식별자 | UTF8String |
numberOfFiles | 전송파일 개수 | |
distributedFileInfos | 전송파일 정보 | 하나 이상의 DistributedFile |
DistributedFile | ||
fileHashedData | 파일 해쉬값 | SHA256 |
fileId | 파일 ID | fileId와 fileName 두 개 필드 중 하나는 필수 |
fileName | 파일명 |
송신일시<수신일시≤열람 일시≤증명서 발급일≤증명서 검증 시점≤증명서 효력 만기일 |
SignedData ::= SEQUENCE { version CMSVersion, digestAlgorithms DigestAlgorithmIdentifiers, encapContentInfo EncapsulatedContentInfo, certificates [0] IMPLICIT CertificateSet OPTIONAL, crls [1] IMPLICIT RevocationInfoChoices OPTIONAL, signerInfosSignerInfos } |
Claims (17)
- 송수신 개체와 유통허브를 포함하는 전자문서 유통 체계에서 유통증명서를 생성/발급하는 방법에 있어서,(a) 송신 개체는 수신 개체에게 송신자의 전자문서를 포함한 유통 메시지를 전송하는 단계;(b) 수신 개체는 유통 메시지를 수신한 후에 필수 정보를 획득하여 수신증명서를 생성하는 단계;(c) 수신 개체는 생성한 수신증명서를 송신 개체로 전송하는 단계;(d) 송신 개체는 수신한 수신증명서에 대한 검증을 완료한 후에 수신증명서의 전자서명 인증서에 대한 검증정보를 수신증명서에 첨부하는 단계; 및(e) 송신 개체는 수신증명서를 제3자 보관기관에 전송하여 보관을 의뢰하는 단계;를 포함하는 전자문서 유통증명서 생성/발급 방법.
- 제 1 항에 있어서, 상기 (b)단계에서 수신 개체가 수신증명서를 생성할 시에 필요한 필수 정보는 전자문서 정보, 송신자, 수신자, 송신자 송신시각, 수신자 수신시각을 포함하는 것을 특징으로 하는 전자문서 유통증명서 생성/발급 방법.
- 제 1 항에 있어서, 상기 (a)단계에서 송신 개체가 수신 개체에게 유통메시지 전송을 시도하였으나 유통메시지 전송을 실패한 경우에는,(a1) 송신 개체는 유통허브의 유통 중계서버에 유통 메시지 전송을 의뢰하는 단계;(a2) 유통 중계서버는 의뢰받은 전송에 대한 송신증명서를 생성하는 단계;(a3) 유통 중계서버는 송신증명서를 송신 개체로 전송하는 단계;(a4) 송신 개체는 수신한 수신증명서에 대한 검증을 완료한 후에 수신증명서의 전자서명 인증서에 대한 검증정보를 수신증명서에 첨부하는 단계; 및(a5) 송신 개체는 수신증명서를 제3자 보관기관에 전송하여 보관을 의뢰하는 단계;(a6) 유통 중계서버는 유통메시지를 수신 개체로 전달하는 단계;(a7) 수신 개체는 전자문서 수신 직후에 수신증명서를 생성하는 단계;(a8) 수신 개체는 수신증명서를 유통 중계서버로 전송하는 단계;(a9) 유통 중계서버는 수신증명서를 송신 개체로 전달하는 단계; 및(a10) 송신 개체는 상기 (d)단계와 (e)단계를 차례로 수행하는 단계;를 포함하는 것을 특징으로 하는 전자문서 유통증명서 생성/발급 방법.
- 제 3 항에 있어서, 상기 (a2)단계에서 유통 중계서버가 송신증명서를 생성할 시에 필요한 필수 정보는 전자문서 정보, 송신자, 수신자, 송신자 송신의뢰시각을 포함하는 것을 특징으로 하는 전자문서 유통증명서 생성/발급 방법.
- 제 1 항에 있어서, 상기 (e)단계 이후에는,(f1) 수신자는 수신 개체에게 유통메시지 열람을 요청하여 받은 유통메시지를 열람하는 단계;(f2) 수신 개체는 열람증명서를 생성하는 단계;(f3) 수신 열람증명서에 대한 검증을 완료한 후에 열람증명서의 전자서명 인증서에 대한 검증정보를 열람증명서에 첨부하는 단계; 및(f4) 송신 개체는 열람증명서를 제 3 자 보관기관에 전송하여 보관을 의뢰하는 단계;를 포함하는 것을 특징으로 하는 전자문서 유통증명서 생성/발급 방법.
- 제 3 항에 있어서, 상기 (a10)단계 이후에는,(a11) 수신자는 수신 개체에게 유통메시지 열람을 요청하여 받은 유통메시지를 열람하는 단계;(a12) 수신 개체는 열람증명서를 생성하는 단계;(a13) 수신 열람증명서에 대한 검증을 완료한 후에 열람증명서의 전자서명 인증서에 대한 검증정보를 열람증명서에 첨부하는 단계; 및(a14) 송신 개체는 열람증명서를 제 3 자 보관기관에 전송하여 보관을 의뢰하는 단계;를 포함하는 것을 특징으로 하는 전자문서 유통증명서 생성/발급 방법.
- 제 5 항과 제 6 항 중에 선택된 어느 한 항에 있어서, 수신 개체가 열람증명서를 생성할 시에 필요한 필수 정보는 전자문서 정보, 송신자, 수신자, 송신자 송신시각, 수신자 수신시각, 수신자 열람시각을 포함하는 것을 특징으로 하는 전자문서 유통증명서 생성/발급 방법.
- 송수신 개체와 유통허브를 포함하는 전자문서 유통 체계 내에서 생성/발급된 유통증명서를 검증하는 방법에 있어서,유통증명서의 포맷이 미리 정해진 구조 및 값의 제약사항을 준수하고 있는지 검증하는 단계;유통증명서에 설정된 유통메시지 송신 일시, 수신일시, 열람 일시, 유통증명서 발급일, 증명서 검증 시점 및 증명서 효력 만기일이 차례를 이루고 있는지 검증하는 단계;유통증명서에 첨부된 전자서명을 검증하는 단계; 및유통증명서에 전자서명을 수행한 인증서의 유효성 여부를 검증하고, 유통증명서 발급자 정보와의 동일성 여부를 검증하는 단계;를 포함하는 것을 특징으로 하는 전자문서 유통증명서 검증 방법.
- 제 8 항에 있어서, 유통증명서에 포함된 유통메시지의 정보와 실제 유통메시지를 비교 검증하는 단계가 추가로 수행되는 것을 특징으로 하는 전자문서 유통증명서 검증 방법.
- 제 9 항에 있어서, 상기 비교 검증하는 단계는,유통증명서에 포함된 송신자 공인전자주소 및 수신자 공인전자주소는 실제 유통메시지의 송신자 공인전자주소 및 수신자 공인전자주소와 일치하는지 확인하는 단계; 및유통증명서에 포함된 유통 파일 개수는 실제 유통메시지에 첨부된 전자문서 파일의 개수와 동일한지 확인하는 단계;를 포함하는 것을 특징으로 하는 전자문서 유통증명서 검증 방법.
- 제 9 항에 있어서, 상기 비교 검증하는 단계는,유통증명서가 수신증명서 또는 열람증명서인 경우에, 유통증명서에 포함된 송신 일시가 "메시지 전송" 유통메시지 내의 SOAP 메시지에 포함된 TimeStamp 필드의 값과 일치하는지 확인하는 단계; 및유통증명서가 송신증명서인 경우에, 유통증명서에 포함된 송신 일시는 유통 중계서버가 "메시지 전송 의뢰" 유통메시지를 수신하기에 합리적인 시각인지 확인하는 단계;를 포함하는 것을 특징으로 하는 전자문서 유통증명서 검증 방법.
- 제 9 항에 있어서, 상기 비교 검증하는 단계는,상기 유통증명서가 송신 개체가 수신 개체에게 직접 전송한 "메시지 전송" 유통메시지에 대한 수신증명서 또는 열람증명서인 경우에, 유통증명서의 수신 일시는 수신 개체의 유통 메시징서버가 "메시지 전송" 유통메시지를 수신하기에 합리적인 시각인지 확인하는 단계; 및상기 유통증명서가 송신 개체가 유통허브의 유통 중계서버에 의뢰한 "메시지 전송 의뢰" 유통메시지에 대한 수신증명서 또는 열람증명서인 경우에, 유통증명서의 수신 일시는 수신 개체의 유통 메시징서버가 "메시지 전송" 유통메시지를 수신하기에 합리적인 시각인지 확인하는 단계;를 포함하는 것을 특징으로 하는 전자문서 유통증명서 검증 방법.
- 제 9 항에 있어서, 상기 비교 검증하는 단계는,상기 유통증명서가 열람증명서인 경우에, 유통증명서의 열람 일시는 수신개체가 수신자의 "메시지 상세정보 요청"에 대하여 응답한 유통 연계 메시지 내의 SOAP 메시지에 포함된 TimeStamp 필드 값과 일치하는지 확인하는 단계를 포함하는 것을 특징으로 하는 전자문서 유통증명서 검증 방법.
- 제 9 항에 있어서, 상기 비교 검증하는 단계는,유통증명서에 포함된 유통식별값은 유통증명서 발급 대상 유통메시지의 고유식별값(Identifier)과 일치하는지 확인하는 단계;유통증명서의 유통 문서 정보 내에 포함된 개별파일들의 파일식별값 또는 파일명들이 실제 유통메시지에 첨부된 전자문서 파일의 Content-ID 값들과 모두 일치하는지 확인하는 단계; 및유통증명서의 유통 문서 정보 내에 포함된 개별파일들이 파일 해쉬 정보들이 실제 유통메시지에 첨부된 전자문서 파일들을 해쉬한 값들과 모두 일치하는지 확인하는 단계;를 포함하는 것을 특징으로 하는 전자문서 유통증명서 검증 방법.
- 전자문서를 유통하는 시스템에 있어서,전자주소를 기반으로 메시지를 송수신하고 메시지 송수신에 대한 유통증명서를 발급 및 관리하는 유통 메시징서버를 통해 전자문서를 유통하는 송수신 개체;상기 송수신 개체의 전자주소를 등록/관리하며, 상기 송수신 개체 간의 전자문서 유통 경로를 설정하고, 송수신 개체 간의 전자문서 유통 과정에서 오류가 발생하였을 시에 메시지 전송을 대행하고 유통증명서를 발급하는 유통 허브; 및유통증명서를 전달받아 보관하며, 신뢰할 수 있는 제3자 보관기관;을 포함하며,상기 유통증명서는 수신 개체의 메시지 수신 사실에 대한 부인 방지를 위한 수신증명서와, 송신 개체의 송신시도에 대한 증명을 위한 송신증명서와, 수신자의 수신메시지 열람사실에 대한 부인방지를 위한 열람증명서를 포함하는 것을 특징으로 하는 전자문서 유통 시스템.
- 제 15 항에 있어서, 상기 유통증명서는,유통증명서 구조의 버전, 유통증명서의 식별정보, 유통증명서를 발급하는 주체, 유통증명서의 발급일, 유통증명서의 효력 만기일, 유통증명서 정책, 유통증명서 요청 메시지 정보, 증명 대상을 포함하는 것을 특징으로 하는 전자문서 유통 시스템.
- 제 16 항에 있어서, 상기 증명 대상은,유통메시지를 송신한 송신자의 공인전자주소, 유통메시지를 수신한 수신자의 공인전자주소, 송신자가 유통메시지를 송신한 시각, 수신자가 유통메시지를 수신한 시각, 수신자가 전자문서를 수신한 후 열람한 시각, 유통메시지에 대한 식별값, 유통메시지에 첨부된 전자문서 파일의 개수, 유통메시지에 첨부된 전자문서 각각에 대한 정보, 유통메시지에 첨부된 개별 전자문서 파일의 해쉬값, 유통메시지에 첨부된 개별 전자문서 파일의 식별자, 유통메시지에 첨부된 개별 전자문서 파일의 파일명을 포함하는 것을 특징으로 하는 전자문서 유통 시스템.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG2013001862A SG187005A1 (en) | 2010-07-08 | 2011-07-08 | Method for creating/issuing electronic document distribution certificate, method for verifying electronic document distribution certificate, and system for distributing electronic document |
US13/808,573 US20130110919A1 (en) | 2010-07-08 | 2011-07-08 | Method for creating/issuing electronic document distribution certificate, method for verifying electronic document distribution certificate, and system for distributing electronic document |
JP2013518282A JP2013535859A (ja) | 2010-07-08 | 2011-07-08 | 電子文書流通証明書の生成/発給方法、電子文書流通証明書の検証方法、および電子文書の流通システム |
CN201180035945.1A CN103080958B (zh) | 2010-07-08 | 2011-07-08 | 用于在分发电子文档的系统中产生/发行分发证书的方法 |
EP11803841.3A EP2592594B1 (en) | 2010-07-08 | 2011-07-08 | Method for creating/issuing electronic document distribution certificate and system for distributing electronic document |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20100065985 | 2010-07-08 | ||
KR10-2010-0065985 | 2010-07-08 | ||
KR20100131936A KR20120005364A (ko) | 2010-07-08 | 2010-12-21 | 전자 주소, 및 전자문서 유통 시스템 |
KR10-2010-0131936 | 2010-12-21 | ||
KR10-2010-0131935 | 2010-12-21 | ||
KR20100131935A KR20120005363A (ko) | 2010-07-08 | 2010-12-21 | 전자문서 유통 시스템 및 전자문서 유통 방법 |
KR10-2011-0067188 | 2011-07-07 | ||
KR20110067188A KR101364612B1 (ko) | 2010-07-08 | 2011-07-07 | 전자문서 유통증명서를 생성, 발급 및 검증하는 전자문서 유통 시스템 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2012005555A2 true WO2012005555A2 (ko) | 2012-01-12 |
WO2012005555A3 WO2012005555A3 (ko) | 2012-05-31 |
Family
ID=45611562
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2011/005027 WO2012005546A2 (ko) | 2010-07-08 | 2011-07-08 | 전자문서 유통 시스템 및 전자문서 유통 방법 |
PCT/KR2011/005039 WO2012005555A2 (ko) | 2010-07-08 | 2011-07-08 | 전자문서 유통증명서 생성/발급 방법, 전자문서 유통증명서 검증 방법, 및 전자문서 유통시스템 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2011/005027 WO2012005546A2 (ko) | 2010-07-08 | 2011-07-08 | 전자문서 유통 시스템 및 전자문서 유통 방법 |
Country Status (7)
Country | Link |
---|---|
US (2) | US9143358B2 (ko) |
EP (2) | EP2592594B1 (ko) |
JP (3) | JP2013535859A (ko) |
KR (4) | KR20120005364A (ko) |
CN (2) | CN103080958B (ko) |
SG (3) | SG187006A1 (ko) |
WO (2) | WO2012005546A2 (ko) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140127207A (ko) * | 2012-02-21 | 2014-11-03 | 예이다네트웍스 서비즈 텔레마틱스 에스.에이. | 이동 단말기로의 데이터 메시지 전송의 인증을 위한 방법 |
US9356193B2 (en) | 2013-02-15 | 2016-05-31 | Lg Innotek Co., Ltd. | Light emitting device |
US20220021522A1 (en) * | 2020-07-20 | 2022-01-20 | Fujitsu Limited | Storage medium, relay device, and communication method |
Families Citing this family (83)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8826375B2 (en) * | 2008-04-14 | 2014-09-02 | Lookwithus.Com Inc. | Rich media collaboration system |
US8083129B1 (en) * | 2008-08-19 | 2011-12-27 | United Services Automobile Association (Usaa) | Systems and methods for electronic document delivery, execution, and return |
KR20120005364A (ko) * | 2010-07-08 | 2012-01-16 | 정보통신산업진흥원 | 전자 주소, 및 전자문서 유통 시스템 |
WO2013044284A1 (en) * | 2011-09-30 | 2013-04-04 | Abeyweera Ranganath C | Method, system and apparatus for a communications client program and an associated transfer server for onymous and secure communications |
CN103067338B (zh) * | 2011-10-20 | 2017-04-19 | 上海贝尔股份有限公司 | 第三方应用的集中式安全管理方法和系统及相应通信系统 |
CA2796540A1 (en) * | 2011-11-28 | 2013-05-28 | Pika Technologies Inc. | Transparent bridge device |
US9367560B1 (en) * | 2011-12-14 | 2016-06-14 | Unboundid, Corp. | Method, system and apparatus for synchronizing changes in a directory service |
US20130301830A1 (en) | 2012-05-08 | 2013-11-14 | Hagai Bar-El | Device, system, and method of secure entry and handling of passwords |
US9736121B2 (en) * | 2012-07-16 | 2017-08-15 | Owl Cyber Defense Solutions, Llc | File manifest filter for unidirectional transfer of files |
KR101223674B1 (ko) * | 2012-09-06 | 2013-01-22 | 토피도 주식회사 | 샵 메일 전송 기능을 갖는 이 메일 클라이언트 데몬 시스템 및 이를 이용한 샵 메일 전송 방법 |
US20140082095A1 (en) * | 2012-09-17 | 2014-03-20 | Helen Y. Balinsky | Workflow monitoring |
KR20140048415A (ko) * | 2012-10-12 | 2014-04-24 | 삼성전자주식회사 | 단말기의 전자편지지 다운로드서비스 제공 장치 및 방법 |
US9357382B2 (en) * | 2012-10-31 | 2016-05-31 | Intellisist, Inc. | Computer-implemented system and method for validating call connections |
US8739243B1 (en) | 2013-04-18 | 2014-05-27 | Phantom Technologies, Inc. | Selectively performing man in the middle decryption |
US10776384B1 (en) | 2013-04-30 | 2020-09-15 | Ping Identity Corporation | Method, server and system for criteria-based assured replication |
US9021575B2 (en) | 2013-05-08 | 2015-04-28 | Iboss, Inc. | Selectively performing man in the middle decryption |
US9160718B2 (en) | 2013-05-23 | 2015-10-13 | Iboss, Inc. | Selectively performing man in the middle decryption |
US20140379584A1 (en) * | 2013-06-25 | 2014-12-25 | FraudFree Finance, LLC | Anti-fraud financial transaction method |
US9009461B2 (en) | 2013-08-14 | 2015-04-14 | Iboss, Inc. | Selectively performing man in the middle decryption |
KR101332607B1 (ko) * | 2013-09-02 | 2013-11-25 | 서호진 | 공인전자주소 기반 전자문서유통체계에서 샵 메일의 전달 및 전달된 샵 메일의 유효성 검사 시스템 및 방법 |
US9710808B2 (en) * | 2013-09-16 | 2017-07-18 | Igor V. SLEPININ | Direct digital cash system and method |
US20150135338A1 (en) | 2013-11-13 | 2015-05-14 | Fenwal, Inc. | Digital certificate with software enabling indicator |
KR101425513B1 (ko) * | 2014-02-12 | 2014-08-05 | 주식회사 티모넷 | HSM(Hardware Securit Module)과 인증 APPLET을 이용한 디바이스 인증 시스템 |
US9130996B1 (en) | 2014-03-26 | 2015-09-08 | Iboss, Inc. | Network notifications |
CN103997453B (zh) * | 2014-05-13 | 2018-03-30 | 北京奇虎科技有限公司 | 一种与应用相关的信息处理的方法和装置 |
US9673998B2 (en) * | 2014-05-15 | 2017-06-06 | Futurewei Technologies, Inc. | Differential cache for representational state transfer (REST) API |
US9906367B2 (en) * | 2014-08-05 | 2018-02-27 | Sap Se | End-to-end tamper protection in presence of cloud integration |
CN105337950B (zh) * | 2014-08-14 | 2019-02-19 | 阿里巴巴集团控股有限公司 | 一种表单填充方法及相关终端 |
KR102295570B1 (ko) * | 2014-11-07 | 2021-08-30 | 주식회사 엘지유플러스 | 클라우드 프린팅 환경에서의 워터마크를 이용한 출력물 관리 방법 |
US20160162991A1 (en) * | 2014-12-04 | 2016-06-09 | Hartford Fire Insurance Company | System for accessing and certifying data in a client server environment |
KR102256642B1 (ko) * | 2014-12-04 | 2021-05-27 | 삼성전자주식회사 | 메시지 송수신 장치 및 메시지 송수신 방법 |
US10079833B2 (en) * | 2015-03-30 | 2018-09-18 | Konica Minolta Laboratory U.S.A., Inc. | Digital rights management system with confirmation notification to document publisher during document protection and distribution |
KR101709197B1 (ko) * | 2015-05-21 | 2017-02-22 | (주)데이터코리아 | 어플리케이션을 기반으로 채권잔액확인서를 송수신하는 방법 및 어플리케이션 |
US10175977B2 (en) * | 2015-11-04 | 2019-01-08 | International Business Machines Corporation | User profile based code review |
US10839378B1 (en) * | 2016-01-12 | 2020-11-17 | 21, Inc. | Systems and methods for performing device authentication operations using cryptocurrency transactions |
US11212363B2 (en) | 2016-02-08 | 2021-12-28 | Microstrategy Incorporated | Dossier interface and distribution |
US10791109B2 (en) * | 2016-02-10 | 2020-09-29 | Red Hat, Inc. | Certificate based expiration of file system objects |
US10068074B2 (en) * | 2016-03-25 | 2018-09-04 | Credly, Inc. | Generation, management, and tracking of digital credentials |
US9680801B1 (en) | 2016-05-03 | 2017-06-13 | Iboss, Inc. | Selectively altering references within encrypted pages using man in the middle |
US10291604B2 (en) | 2016-06-03 | 2019-05-14 | Docusign, Inc. | Universal access to document transaction platform |
US20180006823A1 (en) * | 2016-07-01 | 2018-01-04 | Qualcomm Incorporated | Multi-hop secure content routing based on cryptographic partial blind signatures and embedded terms |
WO2018066965A1 (en) * | 2016-10-04 | 2018-04-12 | Samsung Electronics Co., Ltd. | Method and apparatus for transmitting a mission critical data message in a communication system |
CN106789585A (zh) * | 2016-12-27 | 2017-05-31 | 沃通电子认证服务有限公司 | 可验证电子邮件发送时间的方法及装置 |
CN106685979B (zh) * | 2017-01-09 | 2019-05-28 | 北京信息科技大学 | 基于STiP模型的安全终端标识及认证方法及系统 |
JP6536609B2 (ja) * | 2017-03-17 | 2019-07-03 | 富士ゼロックス株式会社 | 管理装置及びドキュメント管理システム |
US11126665B1 (en) | 2017-04-18 | 2021-09-21 | Microstrategy Incorporated | Maintaining dashboard state |
KR101976665B1 (ko) * | 2017-04-25 | 2019-08-28 | 주식회사 포시에스 | 영상 출력 장치들을 활용한 전자문서 정보 처리 장치 및 그의 정보 처리 방법 |
US11347454B2 (en) * | 2017-04-27 | 2022-05-31 | Hewlett-Packard Development Company, L.P. | Controller for a fulfilment service operation |
US11544669B2 (en) * | 2017-06-26 | 2023-01-03 | Oracle Financial Services Software Limited | Computing framework for compliance report generation |
CN107241341B (zh) * | 2017-06-29 | 2020-07-07 | 北京五八信息技术有限公司 | 访问控制方法及装置 |
US11487868B2 (en) * | 2017-08-01 | 2022-11-01 | Pc Matic, Inc. | System, method, and apparatus for computer security |
US11983723B2 (en) | 2017-09-15 | 2024-05-14 | Pearson Education, Inc. | Tracking digital credential usage in a sensor-monitored environment |
KR101951270B1 (ko) * | 2017-09-28 | 2019-02-22 | 주식회사 스마트솔루션 | 메신저 인증 서버를 이용한 문서 발송 시스템 및 그 방법 |
US10803104B2 (en) | 2017-11-01 | 2020-10-13 | Pearson Education, Inc. | Digital credential field mapping |
US10607291B2 (en) * | 2017-12-08 | 2020-03-31 | Nasdaq Technology Ab | Systems and methods for electronic continuous trading of variant inventories |
US10810350B2 (en) * | 2018-01-05 | 2020-10-20 | Jpmorgan Chase Bank, N.A. | System and method for aggregating legal orders |
CN108540528B (zh) * | 2018-03-07 | 2021-12-17 | 胡金钱 | 确认电子文书送达的方法及系统、计算机存储介质 |
CN108804238B (zh) * | 2018-03-29 | 2022-03-04 | 中国工程物理研究院计算机应用研究所 | 一种基于远程过程调用的软总线通信方法 |
CN110324287B (zh) * | 2018-03-31 | 2020-10-23 | 华为技术有限公司 | 接入认证方法、装置及服务器 |
US10742613B2 (en) * | 2018-04-25 | 2020-08-11 | Sap Se | Pluggable framework for AS4 adapter generation |
RU2702505C1 (ru) * | 2018-08-07 | 2019-10-08 | Акционерное общество Инжиниринговая компания "АСЭ" (АО ИК "АСЭ") | Система управления электронным документооборотом |
CN108989055A (zh) * | 2018-08-31 | 2018-12-11 | 密信技术(深圳)有限公司 | 兼容不同类型文件的签名和加密方法、装置及存储介质 |
CN109150516A (zh) * | 2018-08-31 | 2019-01-04 | 密信技术(深圳)有限公司 | 浏览器文件的签名及/或加密方法、装置、浏览器及介质 |
KR102158299B1 (ko) * | 2019-01-23 | 2020-09-21 | 소프트캠프 주식회사 | 영업비밀에 관한 네트워크 기반의 문서 보호시스템 |
US10645197B1 (en) * | 2019-04-19 | 2020-05-05 | Clario Tech Limited | Method and a system for a secure link-up to a non-secure synchronous connection and a machine-readable carrier configured for performing the method |
JP7367443B2 (ja) | 2019-10-09 | 2023-10-24 | 富士通株式会社 | 本人確認プログラム、管理装置及び本人確認方法 |
JP2021060915A (ja) * | 2019-10-09 | 2021-04-15 | 富士通株式会社 | 本人確認プログラム、制御装置及び本人確認方法 |
EP4099646A4 (en) | 2020-04-30 | 2023-07-26 | Beijing Bytedance Network Technology Co., Ltd. | METHOD AND DEVICE FOR EXCHANGE OF INFORMATION, ELECTRONIC DEVICE AND RECORDING MEDIUM |
CN113591439B (zh) * | 2020-04-30 | 2023-07-11 | 抖音视界有限公司 | 一种信息交互方法、装置、电子设备及存储介质 |
FR3110801A1 (fr) * | 2020-05-25 | 2021-11-26 | Orange | Procédé de délégation de la livraison de contenus à un serveur cache |
CN111651196B (zh) * | 2020-06-24 | 2024-06-21 | 腾讯科技(深圳)有限公司 | 文档发布方法、装置及服务器 |
KR102337677B1 (ko) | 2020-07-16 | 2021-12-09 | (주)휴먼스케이프 | 디지털 검증 지문 삽입 시스템 및 그 방법 |
KR102337673B1 (ko) | 2020-07-16 | 2021-12-09 | (주)휴먼스케이프 | 데이터 열람 검증 시스템 및 그 방법 |
TWI759908B (zh) * | 2020-10-15 | 2022-04-01 | 威聯通科技股份有限公司 | 產生授權允許名單的方法與利用其之資安系統 |
JP7526655B2 (ja) * | 2020-12-10 | 2024-08-01 | 富士通株式会社 | 情報処理プログラム、情報処理方法、情報処理装置および情報処理システム |
KR102261527B1 (ko) | 2021-01-14 | 2021-06-08 | 성균관대학교산학협력단 | 인휠 모터를 장착한 차량의 토크 벡터링 제어 장치 및 방법 |
US11556696B2 (en) * | 2021-03-15 | 2023-01-17 | Avaya Management L.P. | Systems and methods for processing and displaying messages in digital communications |
CN113126936B (zh) * | 2021-04-23 | 2022-04-12 | 深圳市爱商在线科技有限公司 | 一种适配多种文档类型的打印控件 |
KR102470713B1 (ko) * | 2021-04-29 | 2022-11-25 | (주)소프트제국 | 블록체인 did 기반 증명서 유통 서비스 제공 방법 및 장치 |
JP2023018431A (ja) | 2021-07-27 | 2023-02-08 | 富士通株式会社 | 情報処理プログラム、情報処理装置、および情報処理方法 |
KR102599089B1 (ko) * | 2021-10-06 | 2023-11-03 | 효성티앤에스 주식회사 | 전자문서 생성 방법 및 장치, 컴퓨터 판독 가능한 기록 매체 및 컴퓨터 프로그램 |
KR102498461B1 (ko) * | 2022-04-25 | 2023-02-13 | 주식회사 디엠테크컨설팅 | 싱글사인온 제조정보 통합관리 시스템를 이용한 통합관리 방법 |
KR102479174B1 (ko) * | 2022-07-05 | 2022-12-20 | (주)링크허브 | 보안 전자 서명 관리 시스템 및 그 방법 |
Family Cites Families (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2887806B2 (ja) * | 1989-08-18 | 1999-05-10 | 富士ゼロックス株式会社 | ネットワークシステム及びメールゲートウエイ |
JPH0535562A (ja) * | 1991-07-31 | 1993-02-12 | Toshiba Corp | 情報処理システムの文書管理装置 |
GB2287619A (en) * | 1994-03-03 | 1995-09-20 | Ibm | Security device for data communications networks |
JPH07297822A (ja) * | 1994-04-21 | 1995-11-10 | Hitachi Ltd | メッセージ伝送システム |
JPH08307448A (ja) * | 1995-04-28 | 1996-11-22 | Nippon Telegr & Teleph Corp <Ntt> | 電子メールにおける受信通知方法およびその方法を適用した電子メール通信システム |
JP3453459B2 (ja) * | 1995-06-19 | 2003-10-06 | キヤノン株式会社 | 電子メールシステム及びその制御方法、並びに通信端末装置及びその制御方法 |
US6327656B2 (en) * | 1996-07-03 | 2001-12-04 | Timestamp.Com, Inc. | Apparatus and method for electronic document certification and verification |
US6584565B1 (en) * | 1997-07-15 | 2003-06-24 | Hewlett-Packard Development Company, L.P. | Method and apparatus for long term verification of digital signatures |
EP1116193A1 (en) * | 1998-09-21 | 2001-07-18 | International Business Machines Corporation | Method of improving security in electronic transactions |
JP2000183951A (ja) | 1998-12-18 | 2000-06-30 | Pfu Ltd | 暗号化システムおよび記録媒体 |
US7966372B1 (en) * | 1999-07-28 | 2011-06-21 | Rpost International Limited | System and method for verifying delivery and integrity of electronic messages |
WO2001010090A1 (en) * | 1999-07-28 | 2001-02-08 | Tomkow Terrance A | System and method for verifying delivery and integrity of electronic messages |
US6775771B1 (en) | 1999-12-14 | 2004-08-10 | International Business Machines Corporation | Method and system for presentation and manipulation of PKCS authenticated-data objects |
GB2361081A (en) * | 2000-04-07 | 2001-10-10 | Digitalsecu Co Ltd | Apparatus and method for storing log files on a once only recordable medium |
JP2002082880A (ja) * | 2000-06-28 | 2002-03-22 | Oregadare Inc | メッセージの送受信管理方法及びメッセージの送受信管理システム |
US20020059525A1 (en) * | 2000-11-10 | 2002-05-16 | Estes Timothy A. | Authenticating the contents of e-documents |
US20090144382A1 (en) * | 2001-01-09 | 2009-06-04 | Benninghoff Iii Charles F | Method for certifying and unifying delivery of electronic packages |
US8179555B2 (en) | 2002-03-08 | 2012-05-15 | Hewlett-Packard Development Company, L.P. | Printing and finishing capability for customized document production system and method |
US7707624B2 (en) * | 2002-11-26 | 2010-04-27 | Rpost International Limited | System for, and method of, proving the transmission, receipt and content of a reply to an electronic message |
JP4001047B2 (ja) * | 2003-04-23 | 2007-10-31 | 村田機械株式会社 | 中継装置 |
JP2005108063A (ja) * | 2003-10-01 | 2005-04-21 | Hitachi Ltd | 暗号化データ変換装置を利用した電子自治体共用サーバ及び暗号化データ復号化装置を利用した電子自治体用端末 |
KR100579147B1 (ko) * | 2004-01-29 | 2006-05-12 | (주)드림투리얼리티 | 전자문서파일의 위변조 검증 전자문서관리시스템 및 그를이용한 방법 |
CA2561335C (en) * | 2004-04-08 | 2013-03-19 | International Business Machines Corporation | Method and system for linking certificates to signed files |
ATE342625T1 (de) * | 2004-08-31 | 2006-11-15 | Opportunity Solutions As | Vorrichtung zur behandlung von e-mails in einer mehrbenutzer-umgebung |
KR100653512B1 (ko) | 2005-09-03 | 2006-12-05 | 삼성에스디에스 주식회사 | 전자문서 관리 및 보관 시스템, 이 시스템에서 수행되는전자문서의 등록방법 및 이용방법 |
JP2007179145A (ja) * | 2005-12-27 | 2007-07-12 | Brother Ind Ltd | アドレス情報検索システム、およびアドレス情報検索プログラム |
KR100816184B1 (ko) * | 2006-08-10 | 2008-03-21 | 한국전자거래진흥원 | 전자문서의 불변경성과 사실증명을 수행하는전자문서보관소 시스템 및 그 시스템에서 수행되는전자문서 등록방법, 열람방법, 발급방법, 이관방법, 증명서발급방법 |
JP5029616B2 (ja) * | 2006-12-22 | 2012-09-19 | 富士通株式会社 | 検証装置、検証方法および検証プログラム |
US20080168536A1 (en) * | 2007-01-10 | 2008-07-10 | Rueckwald Mark C | System and methods for reduction of unwanted electronic correspondence |
CN101017544B (zh) * | 2007-02-15 | 2010-12-01 | 江苏国盾科技实业有限责任公司 | 含电子印章数字证书的合体印章签署认证方法 |
WO2008120334A1 (ja) * | 2007-03-28 | 2008-10-09 | Fujitsu Limited | 証明書検証方法及び証明書検証装置 |
KR100978906B1 (ko) * | 2007-09-12 | 2010-08-31 | 정보통신산업진흥원 | 전자문서 관리 시스템 및 그 운용 방법, 상기 방법을구현하는 프로그램이 저장된 기록매체 |
KR100969313B1 (ko) * | 2007-09-12 | 2010-07-09 | 정보통신산업진흥원 | 전자문서 증명서 발급 방법 및 이를 위한 전자문서 보관시스템, 상기 방법을 구현하는 프로그램이 저장된 기록매체 |
KR100932266B1 (ko) * | 2007-10-12 | 2009-12-16 | 주식회사 하나은행 | 전자문서중계 서비스 제공 방법 |
US8739292B2 (en) * | 2008-03-04 | 2014-05-27 | Apple Inc. | Trust exception management |
US8732452B2 (en) | 2008-06-23 | 2014-05-20 | Microsoft Corporation | Secure message delivery using a trust broker |
JP2010093354A (ja) * | 2008-10-03 | 2010-04-22 | Sanyo Electric Co Ltd | 通信装置 |
US8255685B2 (en) * | 2009-03-17 | 2012-08-28 | Research In Motion Limited | System and method for validating certificate issuance notification messages |
JP5105291B2 (ja) * | 2009-11-13 | 2012-12-26 | セイコーインスツル株式会社 | 長期署名用サーバ、長期署名用端末、長期署名用端末プログラム |
KR20120005364A (ko) * | 2010-07-08 | 2012-01-16 | 정보통신산업진흥원 | 전자 주소, 및 전자문서 유통 시스템 |
-
2010
- 2010-12-21 KR KR20100131936A patent/KR20120005364A/ko active Search and Examination
- 2010-12-21 KR KR20100131935A patent/KR20120005363A/ko active Search and Examination
-
2011
- 2011-07-07 KR KR1020110067185A patent/KR101266086B1/ko active IP Right Grant
- 2011-07-07 KR KR20110067188A patent/KR101364612B1/ko active IP Right Grant
- 2011-07-08 CN CN201180035945.1A patent/CN103080958B/zh not_active Expired - Fee Related
- 2011-07-08 US US13/808,576 patent/US9143358B2/en not_active Expired - Fee Related
- 2011-07-08 JP JP2013518282A patent/JP2013535859A/ja active Pending
- 2011-07-08 SG SG2013001870A patent/SG187006A1/en unknown
- 2011-07-08 WO PCT/KR2011/005027 patent/WO2012005546A2/ko active Application Filing
- 2011-07-08 SG SG10201505317XA patent/SG10201505317XA/en unknown
- 2011-07-08 US US13/808,573 patent/US20130110919A1/en not_active Abandoned
- 2011-07-08 EP EP11803841.3A patent/EP2592594B1/en not_active Not-in-force
- 2011-07-08 CN CN201180043451.8A patent/CN103124981B/zh not_active Expired - Fee Related
- 2011-07-08 WO PCT/KR2011/005039 patent/WO2012005555A2/ko active Application Filing
- 2011-07-08 EP EP11803832.2A patent/EP2602758B1/en not_active Not-in-force
- 2011-07-08 JP JP2013518281A patent/JP2013535858A/ja active Pending
- 2011-07-08 SG SG2013001862A patent/SG187005A1/en unknown
-
2016
- 2016-07-08 JP JP2016135934A patent/JP2016195440A/ja active Pending
Non-Patent Citations (1)
Title |
---|
See references of EP2592594A4 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140127207A (ko) * | 2012-02-21 | 2014-11-03 | 예이다네트웍스 서비즈 텔레마틱스 에스.에이. | 이동 단말기로의 데이터 메시지 전송의 인증을 위한 방법 |
KR102015403B1 (ko) * | 2012-02-21 | 2019-08-28 | 예이다네트웍스 서비즈 텔레마틱스 에스.에이. | 이동 단말기로의 데이터 메시지 전송의 인증을 위한 방법 |
US9356193B2 (en) | 2013-02-15 | 2016-05-31 | Lg Innotek Co., Ltd. | Light emitting device |
US20220021522A1 (en) * | 2020-07-20 | 2022-01-20 | Fujitsu Limited | Storage medium, relay device, and communication method |
Also Published As
Publication number | Publication date |
---|---|
CN103080958B (zh) | 2016-12-07 |
JP2013535859A (ja) | 2013-09-12 |
SG10201505317XA (en) | 2015-08-28 |
KR101364612B1 (ko) | 2014-02-20 |
JP2016195440A (ja) | 2016-11-17 |
WO2012005546A2 (ko) | 2012-01-12 |
SG187005A1 (en) | 2013-02-28 |
EP2602758B1 (en) | 2016-08-24 |
KR101266086B1 (ko) | 2013-05-27 |
KR20120005363A (ko) | 2012-01-16 |
KR20120005393A (ko) | 2012-01-16 |
EP2592594A2 (en) | 2013-05-15 |
CN103124981B (zh) | 2016-12-07 |
EP2592594A4 (en) | 2014-05-14 |
WO2012005555A3 (ko) | 2012-05-31 |
US20130110919A1 (en) | 2013-05-02 |
JP2013535858A (ja) | 2013-09-12 |
EP2592594B1 (en) | 2016-08-17 |
US20130117400A1 (en) | 2013-05-09 |
EP2602758A2 (en) | 2013-06-12 |
WO2012005546A3 (ko) | 2012-05-31 |
CN103124981A (zh) | 2013-05-29 |
KR20120005364A (ko) | 2012-01-16 |
EP2602758A4 (en) | 2014-01-22 |
US9143358B2 (en) | 2015-09-22 |
SG187006A1 (en) | 2013-02-28 |
KR20120005392A (ko) | 2012-01-16 |
CN103080958A (zh) | 2013-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012005555A2 (ko) | 전자문서 유통증명서 생성/발급 방법, 전자문서 유통증명서 검증 방법, 및 전자문서 유통시스템 | |
WO2020147383A1 (zh) | 基于区块链系统的流程审批方法、装置、系统及非易失性存储介质 | |
WO2017065389A1 (ko) | 블록체인을 기반으로 하는 공인인증서 발급시스템과 이를 이용한 블록체인을 기반으로 하는 공인인증서 발급방법 및 블록체인을 기반으로 하는 공인인증서 인증시스템과 이를 이용한 블록체인을 기반으로 하는 공인인증서 인증방법 | |
CA2378672C (en) | System and methods for proving dates in digital data files | |
WO2017104899A1 (ko) | 블록체인을 기반으로 하는 공인인증서 인증시스템 및 이를 이용한 인증방법 | |
WO2017171165A1 (ko) | 블록체인을 기반으로 하는 공인인증서 발급시스템과 이를 이용한 블록체인을 기반으로 하는 공인인증서 발급방법 | |
US20050160272A1 (en) | System and method for providing trusted time in content of digital data files | |
WO2017022917A1 (ko) | 블록체인을 기반으로 하는 공인인증서 발급시스템 | |
WO2006124894A2 (en) | System and methods for distributing trusted time | |
US9391775B2 (en) | Signature method and device | |
WO2002030041A2 (en) | Electronically verified digital signature and document delivery system and method | |
CN102739626A (zh) | 时间同步方法和装置、时间戳设备以及可信时间服务器 | |
WO2022196851A1 (ko) | 백신 접종의 인증 및 접종 후 사후 관리를 제공하기 위한 방법 및 그 시스템 | |
JP2002116695A (ja) | データ送受信システム、電子メール配信システム、データ送信方法、データ受信システム | |
JP2000196583A (ja) | 同報通信システム | |
WO2018120311A1 (zh) | 可验证电子邮件发送时间的方法及装置 | |
Pinkas et al. | Electronic Signature Formats for long term electronic signatures | |
Adams et al. | RFC3161: Internet X. 509 public key infrastructure time-stamp protocol (TSP) | |
WO2024090628A1 (ko) | 분산 id 기반 서비스의 암복호화 통신 방법 및 장치 | |
JP2003198539A (ja) | 電子公証システム及び電子公証方法 | |
You et al. | On the efficient implementation of fair non-repudiation | |
JP4262181B2 (ja) | メール配送システム、メール配送方法、メール配送プログラムおよびメール中継装置 | |
WO2022196850A1 (ko) | 백신 접종 디지털 인증서를 발급하고 증명하는 방법 및 그 시스템 | |
JP2004104596A (ja) | タイムスタンプメールサーバシステム | |
WO2021096206A1 (ko) | 개인url매체나 비밀정보나 기타들로 사용자를 확인해서 otp서비스를 지원할 수 있는 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201180035945.1 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11803841 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13808573 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2013518282 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2011803841 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011803841 Country of ref document: EP |