Nothing Special   »   [go: up one dir, main page]

JPH10327145A - Authentication system - Google Patents

Authentication system

Info

Publication number
JPH10327145A
JPH10327145A JP9134723A JP13472397A JPH10327145A JP H10327145 A JPH10327145 A JP H10327145A JP 9134723 A JP9134723 A JP 9134723A JP 13472397 A JP13472397 A JP 13472397A JP H10327145 A JPH10327145 A JP H10327145A
Authority
JP
Japan
Prior art keywords
verifier
prover
digital signature
information
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP9134723A
Other languages
Japanese (ja)
Inventor
Junji Ito
淳史 伊藤
Masaaki Hiroya
政彰 広谷
Takeshi Teramura
健 寺村
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Priority to JP9134723A priority Critical patent/JPH10327145A/en
Publication of JPH10327145A publication Critical patent/JPH10327145A/en
Pending legal-status Critical Current

Links

Abstract

PROBLEM TO BE SOLVED: To provide an authentication system capable of confirming a verifier while protecting the anonymity of the verifier without needing a database by preparing a pair of open information and secret information by the verifier A, transmitting the open information to a certifier B, transmitting data S, for which a digital signature is added to that information, from the certifier to the verifier A and transmitting the data S from the verifier A to the certifier B in case of utilization. SOLUTION: The verifier A prepares open information I=J×J (J is secret information) through a random number generator 11, stores J in a memory 13 and transmits I to the cerfier B. The certifier B transmits data expressing I and '1 discount' 'discount of 10%' as permitted contents to the verifier A while adding a digital signature to them. The verifier A stores these data in a memory 13. When ordering merchandise, the verifier A generates a random number T through the random number generator 11 and transmits the data with the digital signature and R=T×R to the certifier B. After the digital signature is confirmed, the certifier B selects the random number X out of either '0' or '1' through a random number generator 21 and transmits data to the verifier A.

Description

【発明の詳細な説明】DETAILED DESCRIPTION OF THE INVENTION

【0001】[0001]

【発明の属する技術分野】本発明は通信ネットワークを
用いて2者間でサービス提供を行うシステムに関し、特
に通信相手の認証方式に関する。
[0001] 1. Field of the Invention [0002] The present invention relates to a system for providing a service between two parties using a communication network, and more particularly to an authentication method for a communication partner.

【0002】[0002]

【従来の技術】従来の通信ネットワークを用いた認証シ
ステムでは、認証局と呼ばれる第3者機関を利用してい
た。認証局を利用したシステムの構成を図6に示す。登
録段階において、証明者Aは公開情報Iと秘密情報Jの
ペアを生成し、公開情報Iを認証局Cに送信する。認証
局Cでは、保証者Aの身元を確認し、公開情報Iに認証
局Cのデジタル署名を付加した認証書Nを作成し、証明
者Aに送信する。利用段階では、証明者Aは検証者Bに
認証書Nを送信し、検証者Bは認証書Nに付加された認
証局Cのデジタル署名を確認し、その認証書Nに含まれ
ている公開情報Iをもとに証明者Aの認証を行う。ま
た、複数回の利用段階に対して登録段階は一回であるこ
とが一般的である。このような利用形態としては例えば
(MasterCard and VISA,Secure Electronic
Transaction(SET)Specification Book3,Au
g.1996)があり、認証書の形態としては(ITU
Rec.X.509(1993),ISO/IEC959
4−8:1995)がある。
2. Description of the Related Art In a conventional authentication system using a communication network, a third party called a certificate authority is used. FIG. 6 shows the configuration of a system using a certificate authority. In the registration stage, the prover A generates a pair of the public information I and the secret information J, and transmits the public information I to the certificate authority C. The certificate authority C confirms the identity of the guarantor A, creates a certificate N in which the digital signature of the certificate authority C is added to the public information I, and transmits the certificate N to the prover A. In the use stage, the prover A sends the certificate N to the verifier B, and the verifier B confirms the digital signature of the certificate authority C attached to the certificate N, and the public key included in the certificate N The certifier A is authenticated based on the information I. Further, it is general that the registration stage is once for a plurality of use stages. Examples of such a use form include (MasterCard and VISA, Secure Electronic)
Transaction (SET) Specification Book3, Au
g. 1996), and the form of the certificate is (ITU
Rec. X. 509 (1993), ISO / IEC959
4-8: 1995).

【0003】[0003]

【発明が解決しようとする課題】しかしながら、従来の
認証局を用いた認証方式では取引に関して第三者機関で
ある認証局Cが必要になり、そのデータベース管理も大
変である。また、異なる取引に同じ認証書Nを用いるた
めに、登録の回数は少なくてすむが、異なる取引間でユ
ーザーの同一性が認証者に判明してしまう。さらに、認
証局Cは取引について何ら保証を与えず、認証書Nは証
明者Aの身元を保証する機能しか有しない。
However, in the conventional authentication method using a certificate authority, a certificate authority C, which is a third party, is required for transactions, and its database management is also difficult. In addition, since the same certificate N is used for different transactions, the number of registrations can be reduced, but the identity of the user between different transactions becomes apparent to the authenticator. Further, the certificate authority C does not provide any guarantee for the transaction, and the certificate N has only the function of assuring the identity of the prover A.

【0004】本発明の目的は、証明者の匿名性を守りな
がら証明者を認証し、データベースが不要な認証方式を
提供する事にある。また、本発明の他の目的は、取引内
容をも保証するような認証方式を提供することにある。
An object of the present invention is to provide an authentication method in which a prover is authenticated while protecting the anonymity of the prover and a database is not required. Another object of the present invention is to provide an authentication system that guarantees the contents of a transaction.

【0005】[0005]

【課題を解決するための手段】この発明の検証方式に関
わる第1の発明は、登録段階において、証明者Aが乱数
発生器によって公開情報Iと秘密情報Jのペアを作成
し、その公開情報Iを検証者Bに送信し、検証者Bはそ
の公開情報Iにデジタル署名を付加したデータSを証明
者Aに送信する。利用段階においては、証明者Aが上記
デジタル署名付き公開情報Sを検証者Bに送信し、検証
者BはSに付加されたデジタル署名を確認した後にその
公開情報Iを用いて認証を行う事により認証局に個人情
報を登録することなく証明者Aの検証を行う事が可能に
なる。また、検証者Bのデジタル署名を用いることによ
り、検証者Bは登録段階においてデータベースに証明者
Aの公開情報Iを登録する必要がないので記憶装置を準
備する必要がない。
According to a first aspect of the present invention, in a registration step, a prover A creates a pair of public information I and secret information J by a random number generator, I is transmitted to the verifier B, and the verifier B transmits data S obtained by adding a digital signature to the public information I to the prover A. In the use stage, the prover A transmits the public information S with the digital signature to the verifier B, and the verifier B verifies the digital signature added to the S, and then performs authentication using the public information I. Thereby, it becomes possible to verify the prover A without registering personal information in the certificate authority. In addition, by using the digital signature of the verifier B, the verifier B does not need to register the public information I of the prover A in the database at the registration stage, and thus does not need to prepare a storage device.

【0006】また、第2の発明は、登録段階において、
証明者Aが乱数発生器によって公開情報Iと秘密情報J
のペアを作成し、その公開情報Iを検証者Bに送信し、
検証者Bはその公開情報Iに許可内容Mを付加し、さら
にデジタル署名を付加したデータSを証明者Aに送信す
る。利用段階においては、証明者Aが上記デジタル署名
付き公開情報Sを検証者Bに送信し、検証者BはSに付
加されたデジタル署名を確認した後にその公開情報Iを
用いて認証を行い、さらにSに含まれている許可内容M
にしたがってサービスを行う。これにより認証局に個人
情報を登録することなく証明者Aの検証を行う事が可能
になる。また、検証者Bのデジタル署名を用いることに
より、検証者Bは登録段階においてデータベースに証明
者Aの公開情報Iを登録する必要がないので記憶装置を
準備する必要がなく、さらにサービス内容の識別も可能
である。
[0006] In the second invention, at the registration stage,
The prover A uses the random number generator to make public information I and secret information J
And sends the public information I to the verifier B,
The verifier B adds the permission contents M to the public information I, and transmits the data S to which the digital signature is added to the prover A. In the use stage, the prover A transmits the above-mentioned public information S with the digital signature to the verifier B, and the verifier B verifies the digital signature added to S and performs authentication using the public information I, Further, the permission contents M included in S
Service is performed according to. As a result, it becomes possible to verify the prover A without registering personal information in the certificate authority. Also, by using the digital signature of the verifier B, the verifier B does not need to register the public information I of the prover A in the database at the registration stage, so that there is no need to prepare a storage device, and furthermore, identification of service contents. Is also possible.

【0007】また、第3の発明は公開情報Iと秘密情報
Jを取引毎に生成することにより、異なる取引間に同一
の証明者が関与していることを検証者に知らせることな
く認証ができる。
In the third invention, authentication can be performed without informing the verifier that the same prover is involved in different transactions by generating the public information I and the secret information J for each transaction. .

【0008】さらに、第4の発明では公開情報Iと秘密
情報Jとして例えばRSA(R.L.Rivest,A.Shami
r,and L.M.Adleman,“AMethod for Obtainin
gDigital Signatures and Public-Key Cryptosyst
ems”,Communicationsof the ACM,Vol.21
(2),pp.120−126,February 1978.)
の公開鍵と秘密鍵を利用することにより、後日第三者で
ある調停者に通信の記録を提示することで証明者が取引
を否認することを防止している。
Furthermore, in the fourth invention, the public information I and the secret information J are, for example, RSA (RL Rivest, A. Shami).
r, and L. M. Adleman, “AMethod for Obtainin
gDigital Signatures and Public-Key Cryptosyst
ems ", Communications of the ACM, Vol.
(2), pp. 120-126, February 1978. )
Utilizing the public key and private key of the third party prevents the certifier from denying the transaction by presenting the communication record to a third party arbitrator at a later date.

【0009】[0009]

【発明の実施の形態】第1の実施例を以下に述べる。図
1はこの発明の原理をあらわす構成図である。証明者A
が用いる情報処理装置1は乱数発生器11、演算処理器
12、メモリ13を備え、検証者Bが用いる情報処理装
置2は、乱数発生器21、演算処理器22、メモリ23
を備えていて、上記情報処理装置1、2の間は通信ネッ
トワーク3を通じて接続されている。
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS A first embodiment will be described below. FIG. 1 is a block diagram showing the principle of the present invention. Prover A
The information processing device 1 used by the verifier B includes a random number generator 11, an arithmetic processor 12, and a memory 13. The information processor 2 used by the verifier B includes a random number generator 21, an arithmetic processor 22, and a memory 23.
The information processing apparatuses 1 and 2 are connected via a communication network 3.

【0010】本実施例では認証に用いる公開情報として
Fiat−Shamir法(USP第4,748,66
8号)を用いる。以下の数式では底となる、二つの素数
の積Nによる剰余計算(mod N)が省略されてい
る。本実施例における登録手順を図2に示す。証明者A
は上記乱数発生器1によって公開情報としてI=J×J
を作成し、秘密情報Jをメモリ13に記憶し、公開情報
Iを検証者Bへ送信する。検証者Bは上記公開情報Iと
許可内容である「1割引」をあらわすデータにデジタル
署名をつけて証明者Aに送信する。証明者Aはこのデジ
タル署名付きデータをメモリ13に記憶させる。
In this embodiment, Fiat-Shamir method (USP 4,748,66) is used as public information used for authentication.
No. 8) is used. In the following equation, the remainder calculation (mod N) based on the product N of two prime numbers is omitted. FIG. 2 shows a registration procedure in this embodiment. Prover A
Is I = J × J as public information by the random number generator 1
Is created, the secret information J is stored in the memory 13, and the public information I is transmitted to the verifier B. The verifier B attaches a digital signature to the public information I and data representing "1 discount", which is the permitted content, and transmits the data to the prover A. The prover A stores the data with the digital signature in the memory 13.

【0011】後日、商品を注文する際の利用手順を図3
に示す。証明者Aは乱数発生器11により乱数Tを生成
し、上記メモリ13に格納してあるデジタル署名付きデ
ータと、R=T×Tを検証者Bに送信する。検証者Bは
前記データのデジタル署名を確認した後に、乱数発生器
21によって乱数Xを{0,1}のどちらから選択し 認証の精度を上げることができる。この実施例において
は、Fiat−Shamir法が否認・偽造防止機能が
ないために検証者が取引内容を偽造することが可能であ
る。
FIG. 3 shows a use procedure for ordering a product at a later date.
Shown in The prover A generates a random number T by the random number generator 11 and transmits the data with the digital signature stored in the memory 13 and R = T × T to the verifier B. After verifying the digital signature of the data, the verifier B selects the random number X from {0, 1} using the random number generator 21. The accuracy of authentication can be improved. In this embodiment, since the Fiat-Shamir method has no repudiation / forgery prevention function, it is possible for a verifier to forge transaction contents.

【0012】つぎに本発明の他の実施例を以下に述べ
る。第1の実施例と同様に図1はこの発明の原理をあら
わす構成図である。証明者Aが用いる情報処理装置1は
乱数発生器11、演算処理器12、メモリ13を備え、
検証者Bが用いる情報処理装置2は、乱数発生器21、
演算処理器22、メモリ23を備えていて、上記情報処
理装置1、2の間は通信ネットワーク3を通じて接続さ
れている。
Next, another embodiment of the present invention will be described below. FIG. 1 is a block diagram showing the principle of the present invention, similarly to the first embodiment. The information processing device 1 used by the prover A includes a random number generator 11, an arithmetic processor 12, and a memory 13,
The information processing device 2 used by the verifier B includes a random number generator 21,
The information processing apparatus includes an arithmetic processor 22 and a memory 23, and the information processing apparatuses 1 and 2 are connected to each other through a communication network 3.

【0013】本実施例における登録手順を図4に示す。
証明者Aは上記乱数発生器1によって公開情報として例
えば上記RSAにおける公開鍵KPAと秘密鍵KSAを作成
し、秘密鍵KSAをメモリ13に記憶し、公開鍵KPAを$
100に相当する電子マネーとともに検証者Bへ送信す
る。検証者Bは$100の電子マネーを受け取った後
に、上記公開鍵KPAと$100をあらわすデータにデジ
タル署名をつけたデータSを作成し証明者Aに送信す
る。証明者Aはこのデジタル署名付きデータSをメモリ
13に記憶させる。
FIG. 4 shows a registration procedure in this embodiment.
Prover A creates a public key K PA and the secret key K SA, for example in the RSA as public information by the random number generator 1, and stores the secret key K SA in the memory 13, the public key K PA $
It is transmitted to the verifier B together with the electronic money corresponding to 100. After receiving the electronic money of $ 100, the verifier B creates data S in which a digital signature is attached to the data representing the public key KPA and the $ 100, and transmits the data S to the prover A. The prover A stores the data S with the digital signature in the memory 13.

【0014】後日、商品の欠陥などで払い戻しを行う場
合の利用手順を図5に示す。証明者Aは上記メモリ13
に格納してあるデジタル署名付きデータSを検証者Bに
送信し、検証者Bは前記データのデジタル署名を確認し
た後に、乱数発生器21によって乱数Rを生成し、証明
者Aに送信する。証明者Aは乱数Rに上記秘密鍵KSA
用いてデジタル署名を行い、これを検証者Bに送信す
る。検証者Bは送られてきたデータのデジタル署名を確
認して証明者Aが登録段階で$100送ったおくり主で
あることを認証し、$100相当の電子マネーを返金す
る。この方式では、RSAの非対象暗号を用いることに
より証明者Aが払い戻しの事実を否認することを防止す
ることが可能になる。本実施例ではデジタル署名方式が
否認・偽造防止能力を有しているので検証者が認証記録
を偽造することを防ぐことができる。
FIG. 5 shows a use procedure in the case where a refund is made at a later date due to a defective product or the like. Prover A uses the memory 13
Is transmitted to the verifier B. After the verifier B confirms the digital signature of the data, the verifier B generates a random number R by the random number generator 21 and transmits it to the prover A. The prover A digitally signs the random number R using the secret key K SA , and transmits the digital signature to the verifier B. The verifier B confirms the digital signature of the transmitted data, authenticates that the prover A has sent $ 100 at the registration stage, and refunds the electronic money corresponding to $ 100. In this method, it is possible to prevent the prover A from denying the fact of the refund by using the asymmetric encryption of the RSA. In this embodiment, since the digital signature method has the denial / forgery prevention capability, it is possible to prevent the verifier from falsifying the authentication record.

【0015】以上の実施例では公開情報としてRSAの
公開鍵やFiat−Shamir法の公開情報等を用い
たが、その外の公開情報を用いた認証方式でも同様のこ
とを行うことが可能である。
In the above embodiment, the public key of the RSA, the public information of the Fiat-Shamir method, and the like are used as the public information. However, the same can be performed by an authentication method using other public information. .

【0016】[0016]

【発明の効果】本発明によれば、取引毎に公開情報を作
成し、その公開情報に検証者のデジタル署名を付加した
ものを後日認証に用いる事により、証明者のプライバシ
ーを守り、また事前にデータベースに登録する作業も必
要なく、認証を行う事が可能になる。
According to the present invention, public information is created for each transaction, and the public information added with a digital signature of a verifier is used for authentication at a later date, so that the privacy of the prover can be protected. It is possible to perform authentication without the need to register the data in the database.

【図面の簡単な説明】[Brief description of the drawings]

【図1】本発明のシステム構成図である。FIG. 1 is a system configuration diagram of the present invention.

【図2】第1の実施例における登録段階の処理手順をあ
らわす図である。
FIG. 2 is a diagram illustrating a processing procedure at a registration stage in the first embodiment.

【図3】第1の実施例における利用段階の処理手順をあ
らわす図である。
FIG. 3 is a diagram illustrating a processing procedure in a use stage according to the first embodiment.

【図4】第2の実施例における登録段階の処理手順をあ
らわす図である。
FIG. 4 is a diagram illustrating a processing procedure at a registration stage in a second embodiment.

【図5】第2の実施例における利用段階の処理手順をあ
らわす図である。
FIG. 5 is a diagram illustrating a processing procedure in a use stage according to a second embodiment.

【図6】従来技術のシステム構成図である。FIG. 6 is a system configuration diagram of a conventional technique.

【図7】従来技術の処理フローである。FIG. 7 is a processing flow of a conventional technique.

【符号の説明】[Explanation of symbols]

1…証明者側情報処理装置、 2…検証者側情報
処理装置、2…検証者側情報処理装置、 11、2
1…乱数発生器、12、22…演算器、
13、23…メモリ、3…通信ネットワーク。
DESCRIPTION OF SYMBOLS 1 ... Prover side information processing apparatus, 2 ... Verifier side information processing apparatus, 2 ... Verifier side information processing apparatus, 11, 2
1: random number generator, 12, 22: arithmetic unit,
13, 23 ... memory, 3 ... communication network.

Claims (4)

【特許請求の範囲】[Claims] 【請求項1】証明者Aと検証者Bとから構成されたシス
テムで、通信相手の身元を確認する利用者の認証方式に
おいて、 証明者Aが公開情報IとIと対になる秘密情報Jを作成
し、前記公開情報Iを検証者Bに送信し、検証者Bは前
記公開情報Iに検証者Bのデジタル署名を付加したデー
タSを作成し、Sを証明者Aに送信する利用登録段階
と、 証明者Aが上記デジタル署名を付加したデータSを検証
者Bに送信し、検証者BがSに付加されている検証者B
のデジタル署名を確認後、Sに含まれている公開情報I
を用いて証明者Aの認証を行う利用者認証段階、 とを有することを特徴とする認証方式。
In a system comprising a prover A and a verifier B, in a user authentication method for confirming the identity of a communication partner, secret information J in which the prover A is paired with public information I and I is provided. And transmits the public information I to the verifier B. The verifier B creates data S in which the digital signature of the verifier B is added to the public information I, and transmits the S to the prover A. Step, the prover A sends the data S to which the digital signature has been added to the verifier B, and the verifier B
After confirming the digital signature of the public information I included in S
A user authentication step of performing authentication of the prover A by using the authentication method.
【請求項2】証明者Aと検証者Bとから構成されたシス
テムで、通信相手の身元を確認する利用者の認証方式に
おいて、 証明者Aが公開情報IとIと対になる秘密情報Jを作成
し、前記公開情報Iを検証者Bに送信し、検証者Bは前
記公開情報Iと許可内容Mとに検証者Bのデジタル署名
を付加したデータSを作成し、Sを証明者Aに送信する
利用登録段階と、 証明者Aが上記デジタル署名を付加したデータSを検証
者Bに送信し、検証者BがSに付加されている検証者B
のデジタル署名を確認後、Sに含まれている公開情報I
を用いて証明者Aの認証を行い、認証が成功した場合に
限りSに含まれている許可内容Mにしたがってサービス
を提供する利用者認証段階、 とを有することを特徴とする認証方式。
2. A system comprising a prover A and a verifier B. In a user authentication method for confirming the identity of a communication partner, secret information J in which the prover A is paired with public information I and I The public information I is transmitted to the verifier B, and the verifier B creates the data S in which the digital signature of the verifier B is added to the public information I and the permission contents M, and transmits the S to the prover A. And the prover A sends the data S with the digital signature added thereto to the verifier B, and the verifier B adds the digital signature to the verifier B.
After confirming the digital signature of the public information I included in S
A user authentication step of performing authentication of the prover A using the authentication method and providing a service in accordance with the permission contents M included in S only when the authentication is successful.
【請求項3】請求項1または2に記載の認証方式におい
て、 認証を行うごとに上記公開情報Iと上記秘密情報Jを作
成し直す事を特徴とする認証方式。
3. The authentication method according to claim 1, wherein said public information I and said secret information J are re-created each time authentication is performed.
【請求項4】請求項1から3に記載の認証方式におい
て、 上記公開情報Iと上記秘密情報Jの組として、デジタル
署名の公開鍵と秘密鍵を用い、 検証者Bは認証の際に用いたデータを調停者Cに送信
し、前記調停者Cが認証の際に用いたデータに証明者A
のデジタル署名が付加されている事を確認する事によ
り、証明者Aが検証者Bによって認証された事実を前記
調停者Cが確認することを可能にすることを特徴とする
認証方式。
4. The authentication method according to claim 1, wherein a public key and a secret key of a digital signature are used as a set of the public information I and the secret information J, and the verifier B uses the public key and the private key for authentication. The data transmitted to the arbitrator C is transmitted to the arbitrator C.
An authentication method wherein the arbitrator C can confirm the fact that the prover A has been authenticated by the verifier B by confirming that the digital signature has been added.
JP9134723A 1997-05-26 1997-05-26 Authentication system Pending JPH10327145A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP9134723A JPH10327145A (en) 1997-05-26 1997-05-26 Authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP9134723A JPH10327145A (en) 1997-05-26 1997-05-26 Authentication system

Publications (1)

Publication Number Publication Date
JPH10327145A true JPH10327145A (en) 1998-12-08

Family

ID=15135104

Family Applications (1)

Application Number Title Priority Date Filing Date
JP9134723A Pending JPH10327145A (en) 1997-05-26 1997-05-26 Authentication system

Country Status (1)

Country Link
JP (1) JPH10327145A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007135062A (en) * 2005-11-11 2007-05-31 Nippon Hoso Kyokai <Nhk> Personal information protection system, its signature key update method and personal information collection method, key management device and key generation program, signature key generator and signature key generation program, personal information management device and personal information collection program, and content decoder and personal information management program
US9864989B2 (en) 1999-06-18 2018-01-09 Cria Inc. Method and apparatus for ordering goods, services, and content over an internetwork using a virtual payment account
US11093623B2 (en) 2011-12-09 2021-08-17 Sertainty Corporation System and methods for using cipher objects to protect data
CN114638622A (en) * 2022-03-18 2022-06-17 贵州省电子证书有限公司 Wine anti-counterfeiting tracing method
US11386409B2 (en) 2016-03-04 2022-07-12 Sertintyone Corporation Systems and methods for media codecs and containers
US11423400B1 (en) 1999-06-18 2022-08-23 Stripe, Inc. Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account
US12072989B2 (en) 2011-12-09 2024-08-27 Sertainty Corporation System and methods for using cipher objects to protect data

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9864989B2 (en) 1999-06-18 2018-01-09 Cria Inc. Method and apparatus for ordering goods, services, and content over an internetwork using a virtual payment account
US9864990B2 (en) 1999-06-18 2018-01-09 Cria Inc. Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account
US9928509B2 (en) 1999-06-18 2018-03-27 Cria Inc. Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account
US11423400B1 (en) 1999-06-18 2022-08-23 Stripe, Inc. Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account
US11551211B1 (en) 1999-06-18 2023-01-10 Stripe, Inc. Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account
JP2007135062A (en) * 2005-11-11 2007-05-31 Nippon Hoso Kyokai <Nhk> Personal information protection system, its signature key update method and personal information collection method, key management device and key generation program, signature key generator and signature key generation program, personal information management device and personal information collection program, and content decoder and personal information management program
US11093623B2 (en) 2011-12-09 2021-08-17 Sertainty Corporation System and methods for using cipher objects to protect data
US12072989B2 (en) 2011-12-09 2024-08-27 Sertainty Corporation System and methods for using cipher objects to protect data
US11386409B2 (en) 2016-03-04 2022-07-12 Sertintyone Corporation Systems and methods for media codecs and containers
CN114638622A (en) * 2022-03-18 2022-06-17 贵州省电子证书有限公司 Wine anti-counterfeiting tracing method

Similar Documents

Publication Publication Date Title
Horn et al. Authentication and payment in future mobile systems
US6553493B1 (en) Secure mapping and aliasing of private keys used in public key cryptography
US7673144B2 (en) Cryptographic system for group signature
Horn et al. Authentication protocols for mobile network environment value-added services
US7490069B2 (en) Anonymous payment with a verification possibility by a defined party
US6292897B1 (en) Undeniable certificates for digital signature verification
US6237096B1 (en) System and method for electronic transmission storage and retrieval of authenticated documents
US8650403B2 (en) Crytographic method for anonymous authentication and separate identification of a user
EP0824814B1 (en) Methods and apparatus for authenticating an originator of a message
US6789193B1 (en) Method and system for authenticating a network user
US6072874A (en) Signing method and apparatus using the same
JP2638525B2 (en) Electronic signature verification device
US20030190046A1 (en) Three party signing protocol providing non-linkability
US20070277013A1 (en) Method for transmitting protected information to a plurality of recipients
Bella et al. Formal verification of cardholder registration in SET
JP2001509926A (en) Data card verification device
JP2005065315A (en) Encryption method for electronic commerce
JPH11231781A (en) Method and device for authentication
Horn et al. Authentication and payment in future mobile systems
US7366911B2 (en) Methods and apparatus for computationally-efficient generation of secure digital signatures
JPH10327145A (en) Authentication system
Song et al. How to make e-cash with non-repudiation and anonymity
Varadharajan et al. On the design of efficient RSA-based off-line electronic cash schemes
CN115131018A (en) Block chain based private transaction method and related product
JP2697876B2 (en) Electronic bidding system