Abstract:
The invention enables a provider and a retailer of digital contents to issue an electronic license to a consumer without wasting its own resources. A retailer sells digital contents to a consumer via the Internet. The retailer requests a license-issuing center to issue an electronic license corresponding to the digital contents and the user of the contents and receives the generated license. The user receives the license from the retailer via the Internet. The terminal used by the user certifies that he/she is a legitimate user using his/her license when he/she uses the digital contents provided from the provider. When the license is verified, the user can use the digital contents.
Abstract:
Integrity of data is to be ensured in a simple manner. A data verifier generates a signature generation request from data to be signed and signature request time, and sends the request to a data generator. The data generator extracts the data to be signed from the signature generation request, and its signature generation unit generates a signature for the data. A key generation unit generates a key from a previous key, the signature request time in the signature generation request, and the identifier of the data generator, and an encryptor encrypts the signature. After that, the encrypted signature and the like are returned to the data verifier, which generates a decrypting key with a key generation unit from the previous key, the signature request time, and the identifier of the data generator, then extracts an encrypted signature, and decrypts it with a decryptor. A signature verification unit checks whether or not the result of decrypting is the correct signature.
Abstract:
Booking venders are to be enabled to issue booking certificates without having to consume their own resources. Advance booking is made and sent to a retailer from a consumer terminal via the Internet. The retailer requests a booking certificate issuing center to issue a booking certificate associated with the product or the booking party, and receives the booking certificate issued from the booking certificate issuing center. The consumer terminal receives the booking certificate from the retailer via the Internet, and uses it to have itself verified to be the legitimate booking party by a verifying apparatus associated with a provider. The booking party can receive the supply of the booked product or service if its booking certificate is successfully verified.
Abstract:
Distributors can verify a signature without acquisition of a certificate for each signer from the certificate authority. A signature part calculates a hash value of distribution information and sets it to a variable h (step S412). Signer private information is taken out from a first signer private information storage part and set to the variable d (step S413). A signature key information selection part takes out signature key information corresponding to a product identifier pid from a signature key information storage part and sets it to the variable t, n (step S414). A signature part calculates a first signature value to the variable h by use of signer private information d and sets it to the variable r1 (step S415). A distribution information generating part calculates a second signature value to the variable h by use of a signature key information t according to the variable h (step S416). A signature value to the final variable h is calculated by use of the results r1 and r2.
Abstract:
An application of a client includes a proof data generation device, a command generation device, and a command issuing device. A command and proof data are sent to a server from the application of the client, and a command management device of the server receives them. A proof data verification device verifies the access right of a user to the application on the basis of the proof data, and enables a data storage device to be accessed in accordance with the command, if the verification is successful. The data storage device, used instead of a commonly used hard disk drive, includes a phase change type optical memory or a phase separation type optical memory to execute write once recording. Thus, the access to the data storage device is flexibly controlled.
Abstract:
A method and a system for authentication whereby authentication characteristic information is not disclosed to a third party when a verifier uses a verification device of a limited scale to authenticate a user's rights or qualifications. A ticket issuing device interacts with the user's interactive device having a secret function f to calculate document secret information &mgr; based on a document m (data) to be transmitted to the interactive device, whereby the user is issued a ticket t generated from authentication characteristic information x and the document secret information &pgr;. Upon receipt of the document m, the interactive device generates the document secret information using its unique secret function f to perform an interaction based on the generated information. The interaction involves output of a commitment r, input of a challenge c, and an output of a response &sgr;. The user converts the interaction (r, c, &sgr;) into another interaction (r, c, s) using the ticket t to effect Guillou-Quisquater authentication.
Abstract:
The present invention provides a device for authenticating user's access rights to resources, which comprises first memory means for storing challenging data, second memory means for storing unique identifying information of the user, third memory means for storing proof support information which is a result of executing predetermined computations to the unique identifying information of the user and unique security characteristic information of the device, response generation means for generating a response from the challenging data stored in the first memory means, the unique identifying information stored in the second memory means and the proof support information stored in the third memory means, and verification means for verifying the legitimacy of the response by verifying that the response, the challenging data and the unique security characteristic information of the device satisfy a specific predefined relation.
Abstract:
The present invention provides a device for authenticating user's access rights to resources, which comprises first memory means for storing challenging data, second memory means for storing unique identifying information of the user, third memory means for storing proof support information which is a result of executing predetermined computations to the unique identifying information of the user and unique security characteristic information of the device, response generation means for generating a response from the challenging data stored in the first memory means, the unique identifying information stored in the second memory means and the proof support information stored in the third memory means, and verification means for verifying the legitimacy of the response by verifying that the response, the challenging data and the unique security characteristic information of the device satisfy a specific predefined relation.