WO2024038630A1 - 認証システム及び認証方法 - Google Patents
認証システム及び認証方法 Download PDFInfo
- Publication number
- WO2024038630A1 WO2024038630A1 PCT/JP2023/006152 JP2023006152W WO2024038630A1 WO 2024038630 A1 WO2024038630 A1 WO 2024038630A1 JP 2023006152 W JP2023006152 W JP 2023006152W WO 2024038630 A1 WO2024038630 A1 WO 2024038630A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- information
- attribute
- registration
- signature
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Definitions
- the present invention relates to an authentication system and an authentication method that perform personal authentication and certification processing of personal attribute information.
- Online identity verification is usually performed to present and prove attribute information about the user when creating an account for some online service or receiving service provision. For example, when opening a bank account, you need to prove basic attributes such as name, address, and date of birth, and when purchasing conference tickets at a student discount price, you must present your student ID and identify yourself as a student. need to be proven. At this time, the service provider needs to verify the authenticity of the attribute information presented and certified by the user, and at the same time authenticate that the user who presented the attribute information is indeed the person in question regarding the attribute information.
- Patent Document 1 discloses an online identity verification method using an electronic identification card and face authentication.
- the system when a registrant presents an electronic identification card and face to the system, the system reads the electronic certificate and the face image stored in the IC chip of the electronic identification card, and takes a picture of the registrant's face. and sends this information to the authentication server.
- the authentication server compares the face image of the registrant with the photographed face image of the registrant, and also verifies the electronic certificate. If face matching and electronic certificate verification are successful, online identity verification will be considered successful. In this way, this document simultaneously realizes attribute certification using an electronic certificate and personal authentication using face authentication.
- Patent Document 1 has a problem in terms of convenience when verifying online identity.
- One of the convenience issues is that the user must present electronic identification to the system each time.
- Another convenience issue is that the method of personal authentication is limited to facial recognition using the facial image stored in the electronic identification card, and the accuracy of authentication is insufficient. , it is difficult to respond to changes over time, there are problems with social acceptance, and privacy protection is insufficient.
- Another problem with convenience is that by transmitting personal information such as facial images and electronic certificates to the service providing server, more personal information than necessary is disclosed.
- the main purpose of the present invention is to provide a highly convenient authentication system.
- one of the typical authentication systems of the present invention maintains an electronic certificate issued to an individual in advance and a signature key of the principal corresponding to the electronic certificate in association with each other.
- a signature device a registration terminal that generates registration authentication information from the registration biometric information of the registrant and generates a principal signature for the registration authentication information using the signature device;
- the present invention is characterized by comprising an issuing server that verifies a principal's signature using the digital certificate to confirm that the registrant is the same person as the principal of the digital certificate.
- one of the representative authentication methods of the present invention includes a step in which the registration terminal generates registration authentication information from the registration biometric information of the registrant, and an electronic certificate issued to the individual in advance and the a signature device that holds the principal's signature key in association with the digital certificate generates a principal's signature for the registration authentication information, and an issuing server generates the principal's signature with the registration authentication information , a step of verifying using the electronic certificate to confirm that the registrant is the same person as the principal of the electronic certificate.
- the service provision server can be It becomes possible to authenticate the person and prove the attributes while disclosing the minimum necessary attribute information.
- FIG. 1 is a block diagram showing the functional configuration of a first embodiment of the present invention.
- FIG. It is a flow chart showing registration processing in the first example of the present invention. It is a flowchart which shows the authentication processing in the 1st example of this invention.
- FIG. 2 is a block diagram showing the functional configuration of a second embodiment of the present invention. It is a flowchart which shows the registration process in the 2nd Example of this invention. It is a flowchart which shows the authentication process in the 2nd Example of this invention.
- FIG. 2 is a block diagram showing the hardware configuration of a registration terminal, a user terminal, an authentication server, an issuing server, a signature device, a service providing server, and a PDS in the first and second embodiments of the present invention.
- an electronic certificate is data that includes an individual's public key and basic attributes (name, date of birth, gender, address, etc.) with an electronic signature generated using the signature key of the institution. , is data whose authenticity can be verified using the public key of the institution.
- the signature device is used to generate and register a certificate for the registrant's biometric information and attribute information under reliable identity verification, allowing the user to use various online services.
- the present invention relates to a system that uses biometric authentication to easily and safely authenticate the person and prove attribute information about the person, which is necessary when using a service.
- FIG. 1 shows the system configuration of the biometric authentication system in this embodiment.
- This system includes a registration terminal 100, a user terminal 110, an authentication server 120, a signature device 130, a service providing server 140, and a network 150.
- the registration terminal 100 includes a biosensor 101, a template generation function 102, a signature device authentication function 103, and a storage unit 104.
- the user terminal 110 includes a service request function 111, a biosensor 112, an authentication template generation function 113, a disclosure attribute selection consent confirmation function 114, and a storage unit 115.
- the registration terminal 100 and the user terminal 110 may be the same terminal that has both functions.
- the authentication server 120 includes a certificate verification function 121, a signature verification function 122, an ID issuance function 123, a person verification function 124, an attribute certificate issuance function 125, a user database (DB) 126, and a server signature key management unit 127. be done.
- the signature device 130 includes an identity verification function 131, a signature generation function 132, and a storage unit 133.
- the storage unit 133 stores identity verification information, a signature key, and an electronic certificate.
- the signature device 130 may be a smart card such as a My Number card that can be connected to the registration terminal 100 via a contact or non-contact communication channel, or a mobile device such as a smartphone that can be used for registration. It may be a server that can be connected to the registration terminal 100 via the same or a short distance wireless communication path as the terminal 100, or a server that can communicate with the registration terminal 100 via the network 150.
- a digital certificate includes the principal's public key, basic attributes, and a signature by an authority. Furthermore, the electronic signature generated by the principal's signature key can be verified by the principal's public key. The same applies to the signature device 430 in Example 2, which will be described later.
- the service providing server 140 includes an attribute certificate requesting function 141, an attribute certificate verifying function 142, and a service providing function 143.
- FIG. 7 shows the hardware configuration of the registration terminal 100, user terminal 110, authentication server 120, signature device 130, and service providing server 140 in this embodiment. These can be composed of a CPU 700, memory 701, storage 702, input device 703, output device 704, and communication device 705 as shown in the figure.
- the registration terminal 100 starts a registration process in response to an operation by a registrant or an operator, and sends a registration request to the authentication server 120 (S201).
- the authentication server 120 generates a challenge code and transmits it to the registration terminal 100 (S202).
- the challenge code may include one or more of a random number sequence, time information, and session ID.
- the authentication server 120 also holds the generated challenge code.
- the biosensor 101 of the registration terminal 100 acquires the registration biometric information of the registrant (S203).
- biological information refers to parts of the body, such as the face, hands, fingers, eyes, veins, irises, and retina, that are exposed to light of any predetermined wavelength, such as visible light, infrared light, near-infrared light, or X-rays. It may be a captured image or a moving image, an audio signal when speaking, or signal information obtained as a result of various body measurements. It may also be data obtained by measuring handwritten signs, gestures, or actions. The same applies to the biometric information in the authentication processing of this embodiment and the registration processing and authentication processing in the second embodiment, which will be described later.
- the template generation function 102 extracts the registration feature amount from the registration biometric information and generates a template by encoding it (S204).
- the registered feature amount may be expressed in a format such as an image, a signal, a vector, a bit string, or one or more numerical values.
- encoding may be data conversion including discretization, binarization, encryption, unidirectional conversion, and the like.
- the template may be a protected template (Protected Template) generated by a so-called template protection technology (Biometric Template Protection). The same applies to the authentication template in step S307, which will be described later.
- the registration terminal 100 receives the input of the registrant's additional attribute information in response to the registrant's operation (S205).
- the additional attribute information is information regarding the registrant that is not included in the electronic certificate. For example, information such as email address, phone number, medical history and health information, family structure, occupation, interests, and hobbies may be included.
- the registration terminal 100 performs device authentication to confirm the authenticity of the signature device 130, and receives from the registrant the input of identification information for the signature device 130 to confirm the identity of the registrant (S206).
- the personal identification information may include one or more of a personal identification number, a password, and biometric information.
- the signature device 130 proves its authenticity to the registration terminal 100, receives the identification information via the registration terminal 100, and compares it with pre-stored identification information (S207). . If the verification is successful, it can be confirmed that the registrant is the same person who received the electronic certificate. If the verification fails, the registration terminal 100 requests the input of personal identification information again, or terminates the process as identification failure.
- the registration terminal 100 transmits the template, the additional attribute information, and the challenge code to the signature device 130, and requests an electronic signature and an electronic certificate for these data (S208).
- the signature device 130 generates an electronic signature (hereinafter referred to as the principal's signature) using the principal's signature key for the set of the template, the additional attribute information, and the challenge code, and transmits it to the registration terminal 100 together with the electronic certificate (S209). .
- the registration terminal 100 transmits the template, the additional attribute information, the person's signature, and the electronic certificate to the authentication server 120, and makes a registration request (S210).
- the authentication server 120 verifies the authenticity and validity of the digital certificate (S211).
- Authenticity verification here includes a process of verifying the electronic signature included in the electronic certificate using the public key of the corresponding institution. Further, validity verification includes processing to confirm that the electronic certificate is within its validity period and that it is not included in the revocation list managed by the institution.
- the registration terminal 100 may perform some or all of these processes by inquiring an external system.
- the authentication server 120 verifies the principal's signature using the electronic certificate (S212). If the verification is successful, the authentication server 120 confirms that the registrant who entered the biometric information that became the basis of the template and the additional attribute information is the same person as the person who issued the electronic certificate. can do. If the verification fails, a reprocessing request or error information is sent to the registration terminal 100, and the process ends. Note that by comparing the challenge code with the person's signature applied to it with the challenge code generated in S202, it can be confirmed that the person's signature was generated after the challenge code.
- the authentication server 120 issues an authentication ID for identifying the registrant (S213).
- the authentication server 120 registers the template, the additional attribute information, the person's signature, and the electronic certificate in the user DB 126 using the authentication ID as a key (S214).
- the authentication ID is also transmitted to the registration terminal 100.
- the registration terminal 100 outputs or stores the authentication ID (S215). When outputting, it may be displayed on a screen as text or a binary code, sent to a predetermined e-mail address, or printed and output on paper. Further, if the registration terminal 100 and the user terminal 110 are the same terminal, the information may be stored in the storage unit 104 (same as the storage unit 115).
- the user terminal 110 receives a user's operation and transmits a service request to the service providing server 140 (S300).
- the service request may be a request to open a new service account, or may be a request for various services for an account that has already been opened.
- the service providing server 140 determines the attributes (for example, name, address, date of birth, etc.) that the user needs to prove by disclosure according to the type and content of the service request, and sends them to the user terminal 110.
- An attribute certificate including attribute information is requested (S301).
- the user terminal 110 selects disclosure attributes that include the requested attribute (S302). This process may be performed automatically by the user terminal 110, or may be performed by the user for selection.
- the user terminal 110 obtains the user's consent to provide the disclosed attributes to the service provider (S303). Specifically, processing is performed such as displaying a button on the screen for selecting whether or not to consent, and having the user press the button.
- the authentication ID and disclosure attribute are transmitted to the authentication server 120 (S304).
- the authentication ID may be input by the user, or may be read out if stored in the storage unit 115.
- the authentication server 120 searches the user DB 126 using the authentication ID as a key, and reads out the template, the additional attribute information, and the electronic certificate (S305). Then, it is confirmed that all of the disclosed attributes are included in the electronic certificate or the additional attribute information. If there is a disclosure attribute that is not included, an error is sent to the user terminal 110. If all are included, an authentication template is requested from the user terminal 110 in order to start user authentication. Note that when template protection technology is used, information necessary for that purpose (cipher key, conversion parameters, auxiliary information, random numbers, etc.) may be transmitted to the user terminal 110.
- the biometric sensor 112 of the user terminal 110 acquires the registrant's authentication biometric information (S306).
- the authentication template generation function 113 of the user terminal 110 extracts an authentication feature amount from the authentication biometric information and encodes it to generate an authentication template (S307).
- the user terminal 110 transmits the authentication template to the authentication server 120.
- the authentication server 120 compares the authentication template with the template (S308). If the verification is successful, it is confirmed that the user is the same person as the registrant, and therefore the person who issued the electronic certificate. In particular, by using biometric information, it is possible to strongly guarantee the identity of the user and the registrant. If the verification fails, the authentication template is requested again from the user terminal 110, or the process is terminated as authentication failure.
- the authentication server 120 selects information regarding the disclosed attribute (hereinafter referred to as disclosed attribute information) from the electronic certificate and the additional attribute information (S309).
- the authentication server 120 uses the server signature key managed by the server signature key management unit 127 to apply an electronic signature (hereinafter referred to as a server signature) to the information obtained by adding supplementary information as necessary to the disclosed attribute information. is generated, assigned, and issued as an attribute certificate, and the attribute certificate is sent directly to the service providing server 140 or sent to the service providing server 140 via the user terminal 110 (S310).
- the data format of the attribute certificate may follow any existing technology format.
- the supplementary information may include an attribute confirmation level and an authentication result.
- the attribute confirmation level refers to information on which institution the attribute information was written in the electronic certificate issued by, and how the authentication server 120 verified the authenticity of the attribute information in the registration process. Contains information such as.
- the authentication result includes information such as the verification result (success or failure, verification score, etc.) in step (S308) and the authentication means (face recognition, vein authentication, etc.).
- the service providing server 140 verifies the attribute certificate (S311). Specifically, the server signature given to the attribute certificate is verified using the public key of the authentication server 120.
- the public key may be requested from the authentication server 120 and sent, or a public key registered in advance in a public database (repository) or blockchain may be referenced. Next, by referring to the attribute information, attribute confirmation level, and authentication result written in the certificate, it is confirmed that the conditions necessary for providing the service are satisfied.
- the service providing server 140 provides a service to the user terminal 110 if the above conditions are met (S312). If the requirements are not met, service will be refused.
- biometric information can be obtained by utilizing an electronic certificate issued by a trusted institution, a signature device that manages a signature key and has an identity verification function, and biometric authentication technology. It can be guaranteed that the registrant and the person in charge of the electronic certificate are the same person. More specifically, the registration terminal can generate a template only when the signature device successfully verifies the registrant's identity based on the template generated from the registrant's biometric information and the challenge code received from the issuing server during registration. Assign a personal signature. This ensures that the principal of the electronic certificate confirmed by the signature device and the registrant who provided the biometric information are operating the same registration terminal at the same time, and therefore the registrant and the principal of the electronic certificate are The sameness is guaranteed.
- the biometric information is not limited to the face, and any biometric information such as veins and fingerprints can be used.
- a public electronic certificate public identity can be guaranteed.
- a My Number card as the signature device and a smartphone equipped with a My Number card reading function as the registration terminal 100
- the registrant can easily perform the registration process while staying at home or the like.
- the authentication process by comparing the authentication template generated from the user's biometric information with the template, the identity of the user and the registrant can be strongly guaranteed based on biometric authentication. It is possible to strongly guarantee that the user and the principal of the electronic certificate are the same person.
- the minimum attributes necessary for providing the service are selected, and the authenticity of the attributes is cryptographically verifiable. Can be disclosed to the provider and certified.
- FIG. 4 shows the system configuration of the biometric authentication system in this embodiment.
- This system includes a registration terminal 400, a user terminal 410, an issuing server 420, a signature device 430, a service providing server 440, a PDS 450, and a network 460.
- the registration terminal 400 includes a biometric sensor 401, an authentication key pair generation function 402, a protection template generation function 403, a signature device authentication function 404, a signature generation function 405, and a storage unit 406.
- the user terminal 410 is configured with a service request function 411, a biosensor 412, an authentication key restoration function 413, a disclosure attribute selection consent confirmation function 414, an authentication partial attribute certificate generation function 415, and a storage unit 416.
- Registration terminal 400 and user terminal 410 may be the same terminal that has both functions.
- the issuing server 420 includes a certificate verification function 421, a signature verification function 422, an authentication attribute certificate issuing function 423, and a server signature key management section 424.
- the signature device 430 includes an identity verification function 431, a signature generation function 432, and a storage section 433.
- the storage unit 433 stores personal identification information, personal signature keys, and electronic certificates.
- the service providing server 440 includes an authentication part attribute proof requesting function 441, an authentication part attribute verification function 442, and a service providing function 443.
- the PDS 450 includes an authentication part attribute verification function 451 and a user DB 452.
- PDS may be realized as a storage server or cloud service on a network, or may be realized as an internal function of registration terminal 400 or user terminal 410.
- FIG. 7 shows the hardware configuration of the registration terminal 400, user terminal 410, issuing server 420, signature device 430, service providing server 440, and PDS 450 in this embodiment.
- These can be composed of a CPU 700, memory 701, storage 702, input device 703, output device 704, and communication device 705 as shown in the figure.
- Each function described in FIGS. 1 and 4 can be realized by the CPU 700 reading out a program stored in the storage 702 into the memory 701 and executing it.
- some or all of the programs may be stored in the storage 702 in advance, or programs stored in external storage may be stored in the storage 702 via a network or a portable storage medium. good.
- each storage and storage medium is non-volatile (or non-transitory).
- each of the devices shown in FIGS. 1 and 4 may have a configuration in which two or more devices cooperate through communication or the like to realize their functions.
- the registration terminal 400 starts a registration process in response to an operation by a registrant or an operator, and sends a registration request to the issuing server 420 (S500).
- the issuing server 420 generates a challenge code and transmits it to the registration terminal 400 (S501).
- the challenge code may include one or more of a random number sequence, time information, and session ID.
- the biosensor 401 of the registration terminal 400 acquires the registration biometric information of the registrant and extracts the registration feature amount (S502).
- the registration terminal 400 generates an authentication key pair (S503).
- the authentication key pair includes an authentication private key S and an authentication public key.
- the authentication key pair generation function 402 generates a random number sequence, and uses the random number to execute a key generation function in a predetermined electronic signature algorithm.
- a predetermined electronic signature method a general electronic certification algorithm (RSA, ECDSA, etc.) may be used, or an electronic signature algorithm (such as BBS+) that realizes zero-knowledge proof of the selected attribute, or A redactable signature algorithm, an anonymous credential algorithm, or a group signature algorithm may also be used.
- the registration terminal 400 generates a protection template from the biometric characteristics for registration (S504). Any existing technology can be used to generate the protection template. Two methods will be explained below.
- the registration feature amount is input to the generation function (Gen) of Fuzzy Extractor, and a uniform random number (random string) R and auxiliary information (helper string) P are calculated as outputs.
- the uniform random number R is input to a pseudo-random function to generate a pseudo-random number sequence of a predetermined length, and this is used as an authentication key pair.
- the auxiliary information P is then used as a protection template.
- the registration feature amount is input to the generation function (Gen) of Fuzzy Extractor, and a uniform random number (random string) R and auxiliary information (helper string) P are calculated as outputs.
- the uniform random number R is input to a pseudorandom function to generate a pseudorandom number sequence of a predetermined length, and this is used as the common key K of the common key cryptosystem (for example, AES).
- a set (C, P) of the ciphertext C obtained by encrypting the authentication private key S with the common key K and the auxiliary information P is used as a protection template.
- the registration terminal 400 receives input of additional attributes from the user (S505).
- the registration terminal 400 performs device authentication to confirm the authenticity of the signature device 430, and receives from the registrant the input of identification information for the signature device 130 to confirm the identity of the registrant (S506).
- the personal identification information may include one or more of a personal identification number, a password, and biometric information.
- the signature device 430 proves its authenticity to the registration terminal 400, receives the identification information via the registration terminal 400, and compares it with pre-stored identification information (S507). . If the verification is successful, it can be confirmed that the registrant is the same person who received the electronic certificate. If the verification fails, the registration terminal 400 requests input of the identification information again, or terminates the process as identification failure.
- the registration terminal 400 transmits the authentication public key, the additional attribute information, and the challenge code to the signature device 430, and requests an electronic signature and an electronic certificate for these data (S508).
- the signature device 430 generates an electronic signature (hereinafter referred to as the principal's signature) using the principal's signature key for the set of the authentication public key, the additional attribute information, and the challenge code, and transmits it to the registration terminal 400 together with the electronic certificate. (S509).
- the registration terminal 400 generates an electronic signature (hereinafter referred to as a self-signature) using the authentication private key S for the set of the authentication public key, the additional attribute information, the challenge code, the person's signature, and the electronic certificate. (S510).
- the registration terminal 400 transmits the authentication public key, the additional attribute information, the person's signature, the electronic certificate, and the self-signature together with an authentication attribute certificate issuance request to the issuing server 420 (S511).
- the issuing server 420 verifies the authenticity and validity of the electronic certificate (S512).
- Authenticity verification here includes a process of verifying the electronic signature included in the electronic certificate using the public key of the corresponding institution. Further, validity verification includes processing to confirm that the electronic certificate is within its validity period and that it is not included in the revocation list managed by the institution.
- the registration terminal 400 may perform some or all of these processes by inquiring an external system.
- the issuing server 420 verifies the principal's signature using the electronic certificate (S513). If the verification is successful, the issuing server 420 can confirm that the registrant who generated the authentication public key is the same person as the person who issued the electronic certificate. If the verification fails, a reprocessing request or error information is sent to the registration terminal 400, and the process ends.
- the issuing server 420 verifies the self-signature using the authentication public key (S514). If the verification is successful, the issuing server 420 can more strongly confirm that the registrant who generated the authentication public key is the same person as the person who issued the electronic certificate. If the verification fails, a reprocessing request or error information is sent to the registration terminal 400, and the process ends.
- the issuing server 420 stores each attribute written in the digital certificate, the additional attribute information, the authentication public key, the expiration date, the issuing server information, the attribute confirmation level, and the certificate ID. For a set of information that includes all or part of it, an electronic signature is generated and given using a server signature key managed by the server signature key management unit 424 of the issuing server 420, and the data is issued as an authentication attribute certificate and registered. It is transmitted to the terminal 400 (S515).
- the attribute confirmation level includes information such as information on which institution the attribute information was written in the electronic certificate issued by, how the issuing server 420 verified the authenticity of the attribute information in the registration process, etc. Contains information.
- the certificate ID is an ID for uniquely identifying the authentication attribute certificate, and is generated by the issuing server 420.
- the data format of the attribute certificate may follow any existing technology format.
- general electronic certification algorithms RSA, ECDSA, etc.
- algorithms that realize zero-knowledge proof of selected attributes BSS+, etc.
- redacted signatures A redactable signature algorithm, an anonymous credential algorithm, or a group signature algorithm may also be used.
- the registration terminal 400 transmits the authentication attribute certificate together with the protection template to the PDS 450 (S517).
- the PDS 450 associates the authentication attribute certificate with the protection template and registers it in the user DB 452 using the certificate ID as a key.
- the registration terminal 400 outputs or stores the certificate ID (S518). When outputting, it may be displayed on a screen as text or a two-dimensional code, sent to a predetermined e-mail address, or printed and output on paper. Further, if the registration terminal 400 and the user terminal 410 are the same terminal, the information may be stored in the storage unit 406 (same as the storage unit 416).
- the user terminal 410 receives a user's operation and transmits a service request to the service providing server 440 (S600).
- the service request may be a request to open a new service account, or may be a request for various services for an account that has already been opened.
- the service providing server 440 determines the attributes (for example, name, address, date of birth, etc.) that the user needs to prove by disclosure according to the type and content of the service request, and sends them to the user terminal 410.
- An attribute certificate including attribute information is requested (S601).
- the user terminal 410 transmits the certificate ID to the PDS 450 and requests an authentication attribute certificate (S602).
- the authentication ID may be input by the user, or may be read out if stored in the storage unit 416.
- the PDS 450 searches the user DB 452 using the certificate ID as a key, reads the authentication attribute certificate and the protection template, and sends the protection template to the user terminal 410 (S603).
- the biosensor 412 of the user terminal 410 acquires the user's biometric information for authentication, and extracts the feature amount for authentication from the biometric information for authentication (S604).
- the user terminal 410 restores the authentication private key S' from the authentication feature amount and the protection template (S605).
- any existing technology method can be used. Below, methods for restoring the authentication secret key S' will be explained, which correspond to the two methods using the Fuzzy Extractor described in the above steps (S503) and (S504).
- the authentication feature amount and the auxiliary information P are input to a regeneration function (Rep) of Fuzzy Extractor, and a random number R' is calculated as an output.
- the random number R' is input to a pseudo-random function to generate a pseudo-random number sequence of a predetermined length, which is used as an authentication key pair, and one of the pairs, the authentication private key S', is extracted. Due to the characteristics of Fuzzy Extractor, when the authentication feature is sufficiently close to the registration feature, that is, when it is determined that the user is the same person as the registrant, the random number R' is the uniform random number. Therefore, the authentication secret key S' matches the authentication secret key S.
- the authentication feature amount and the auxiliary information P included in the protection template (C, P) are input to a regeneration function (Rep) of Fuzzy Extractor, and a random number R' is output.
- the random number R' is input to a pseudo-random function to generate a pseudo-random number sequence of a predetermined length, and this is used as the common key K' of the common key cryptosystem (for example, AES).
- the common key K' of the common key cryptosystem (for example, AES).
- the data obtained by decrypting the ciphertext C included in the protection template (C, P) with the common key K' is set as the authentication secret key S'.
- the random number R' matches the uniform random number R, and therefore the common key K' is the same as the common key K. Therefore, the authentication private key S' also matches the authentication private key S.
- the user terminal 410 executes an authentication protocol with the PDS 450 using the authentication private key S' (S606).
- the PDS 450 executes an authentication protocol with the user terminal 410 using the authentication public key included in the authentication attribute certificate (S607). If authentication is successful, PDS 450 sends the authentication attribute certificate to user terminal 410.
- the PDS 450 transmits an authentication challenge code to the user terminal 410, the user terminal 410 generates an authentication signature based on the authentication private key S' and transmits it to the PDS 450, and the PDS 450
- the authentication signature may be verified using the authentication public key, and if the verification is successful, the authentication is successful; if the verification is unsuccessful, the authentication is failed.
- the user terminal 410 selects disclosure attributes that include the attributes requested in the above step (S601) (S608). This process may be performed automatically by the user terminal 410, or may be performed by the user for selection. If there is an attribute that is not included in the authentication attribute certificate among the requested attributes, an error is output and the process is terminated.
- the user terminal 410 obtains the user's consent to provide the disclosed attributes to the service provider (S609). Specifically, processing is performed such as displaying a button on the screen for selecting whether or not to consent, and having the user press the button.
- the user terminal 410 converts the authentication attribute certificate, deletes or conceals attribute information other than the disclosed attribute, and adds user authentication information based on the authentication private key S' to obtain the authentication partial attribute certificate. It is generated and transmitted to the service providing server 440 (S610).
- the format of the authentication partial attribute proof may follow any existing technology format.
- the process of deleting or concealing the attribute information is determined according to the authentication attribute certificate generation algorithm described in the above step (S515). For example, when using BBS+, a zero-knowledge proof that selectively discloses the disclosure attribute information of the authentication attribute certificate and keeps the rest secret is generated using the authentication private key S'.
- a redacted signature a signature is generated and given using the authentication private key S' for data in which attribute information other than the disclosed attribute is redacted in the authentication attribute certificate. , is the authentication partial attribute proof.
- the service providing server 440 verifies the authentication partial attribute proof (S611). Specifically, with respect to the attribute information, user authentication information, public key for authentication, etc. included in the authentication partial attribute certificate, it is confirmed that the attribute information is certainly part of the authentication attribute certificate issued by the issuing server 420. It is also confirmed that the user authentication information is successfully verified using the authentication public key. At this time, the service providing server 440 may use the public key of the issuing server 420 registered in advance in a public DB (repository) or blockchain.
- the service providing server 440 refers to the user's attribute information and attribute confirmation level certified by the authentication partial attribute certification, confirms that the conditions necessary for providing the service are satisfied, and confirms that the conditions are satisfied. If so, the service is provided to the user terminal 410 (S612). If the requirements are not met, service will be refused.
- an electronic certificate issued by a trusted institution a signature device that manages a signature key and has an identity verification function, biometric authentication technology, and template protection technology are utilized.
- a protection template is created and saved by linking the registrant's biometric information and the authentication private key, and the biometric information is kept confidential by adding the person's signature using a signature device to the authentication public key.
- the biometric information is not limited to the face, and any biometric information such as veins and fingerprints can be used.
- public identity can be guaranteed.
- the registrant can easily perform the registration process while staying at home.
- the authentication process by comparing the authentication template generated from the user's biometric information with the template, the identity of the user and the registrant can be strongly guaranteed based on biometric authentication. It is possible to strongly guarantee that the user and the principal of the electronic certificate are the same person.
- the minimum attributes necessary for providing the service are selected, and the authenticity of the attributes is cryptographically verifiable. It is possible to certify disclosure to the provider.
- the disclosed authentication system includes a signature device 130, 430 that holds an electronic certificate issued to an individual in advance and a principal signature key corresponding to the electronic certificate, and a registrant.
- a registration terminal 100, 400 that generates registration authentication information from the registration biometric information and generates a principal signature for the registration authentication information using the signature device; , an authentication server 120 or an issuance server 420 as an issuance server that verifies using the electronic certificate to confirm that the registrant is the same person as the person who issued the electronic certificate.
- a highly convenient authentication system and authentication method can be provided. Specifically, by using a signature device such as an electronic identification card only once at the time of registration, the user can thereafter perform personal authentication and attribute verification each time by simply presenting biometric information.
- any biometric authentication means such as vein authentication and fingerprint authentication can be used.
- only the minimum attribute information necessary for providing the service can be disclosed and certified to the service providing server.
- the registration terminal 100 includes a biosensor 101 as a sensor that acquires registration biometric information of a registrant, and a template generation function 102 as a registration authentication information generation unit that generates registration authentication information of the registrant. and a signature device authentication function 103 as a signature device authentication unit that uses the signature device 130 to generate a principal signature for the registration authentication information.
- the signature device 130 includes an identity verification function 131 as an identity verification section, a signature generation function 132 as a signature generation section, and a storage section 133 as a signature device storage section.
- the signature device storage section holds the electronic certificate issued to the individual in advance, the principal signature key corresponding to the electronic certificate, and identity verification information, and the identity verification section: It includes a function of verifying that the user of the signature device is the principal of the digital certificate by comparing the input information with the identity verification information.
- the authentication server 120 as the issuing server includes a certificate verification function 121 as a certificate verification section, a signature verification function 122 as a signature verification section, an attribute certificate issuing function 125 as an attribute certificate issuing section, and a server.
- a server signature key management unit 127 that manages signature keys.
- the certificate verification unit includes a function of verifying the validity and authenticity of the electronic certificate, and the signature verification unit verifies the registration authentication information and the person's signature using the electronic certificate.
- the attribute certificate issuing unit has a function of verifying that the registrant is the same person as the principal of the electronic certificate by verifying, and the attribute certificate issuing unit verifies the verification result by the certificate verification unit and the signature verification. It has a function of generating and attaching an electronic signature using the server signature key to the set of attribute information regarding the individual based on the verification result by the department, and issuing the data as an attribute certificate. In this way, since the registration terminal, signature device, and issuing server have each function, it is possible to provide an efficient and convenient authentication system and authentication method.
- the electronic certificate may include one or more attribute information regarding the individual, and the set of attribute information may include one or more attribute information included in the electronic certificate. Further, the set of attribute information may include the registration authentication information. Further, the registration authentication information generation unit may have a function of generating a template from the registration biometric information, and the registration authentication information may include the template. In this way, information about individuals and registration authentication information can be managed, and efficient authentication using biometric information is possible.
- the registration authentication information generation unit has a function of generating a pseudo-random number sequence and auxiliary information from the registration biometric information, and a function of generating an authentication private key and an authentication public key from the pseudo-random number sequence. , and a function of generating a protection template including the auxiliary information, and the registration authentication information may include the authentication public key. According to this configuration, highly secure authentication using biometric information can be realized.
- the registration authentication information generation unit has a function of generating a pseudo-random number sequence and auxiliary information from the registration biometric information, a function of generating a common key from the pseudo-random number sequence, an authentication private key and an authentication information. a function of generating a public key; a function of generating an encrypted private key by encrypting the authentication private key using the common key; and generating a protection template including the encrypted private key and the auxiliary information.
- the registration authentication information may include the authentication public key. According to this configuration, authentication using biometric information and other authentication can be used together.
- the user terminal further includes a sensor that acquires biometric information for authentication of a user, and an authentication template generation unit that generates an authentication template from the biometric information for authentication.
- the issuing server includes a user database and a person verification unit, the user database includes a function of registering and searching the electronic certificate and the registration authentication information regarding the registrant, and the person verification unit includes a function of comparing the registration authentication information and the authentication template to calculate a person verification result, and the attribute certificate issuing unit has a function of generating the attribute certificate according to the person verification result. It is also possible to have a configuration including.
- the user terminal includes a consent confirmation unit that confirms consent or disagreement of the user regarding the disclosure of the attribute information included in the attribute certificate, and the attribute certificate issuing unit is configured such that the consent confirmation unit
- the attribute certificate may be issued on the condition that the consent of the user is confirmed.
- the user terminal includes a function of selecting one or more attributes to be permitted for disclosure in response to a user's operation, and the attribute certificate issuing unit selects attributes other than the disclosure attribute. It is also possible to issue the attribute certificate with exclusion. With this configuration, an authentication system that discloses necessary attribute information while increasing convenience can be realized with a relatively simple configuration.
- the user terminal includes a sensor that acquires biometric information for authentication of the user, an authentication key recovery unit, and an authentication partial attribute certificate generation unit
- the authentication key restoration unit includes a function of restoring the authentication private key from the protection template and the authentication biometric information
- the authentication partial attribute certificate generation unit restores the authentication private key from the attribute certificate and the authentication private key.
- the authentication partial attribute proof includes a function of generating an authentication partial attribute proof from a user who is proving the authenticity of part or all of the attribute information of the attribute certificate.
- the configuration may be such that the information can prove to a third party that the registrant is the registrant himself/herself.
- the user terminal includes a consent confirmation unit that confirms consent or disagreement of the user regarding the disclosure of the attribute information included in the authentication partial attribute certificate, and the authentication partial attribute certificate generation unit includes the consent confirmation unit.
- the authentication partial attribute proof may be generated on the condition that the user's consent has been confirmed.
- the user terminal includes a function of selecting one or more attributes to be permitted to be disclosed as a disclosure attribute in response to a user's operation, and the authentication partial attribute proof generation unit selects an attribute other than the disclosure attribute.
- the configuration may be such that the authentication partial attribute proof is generated by excluding the authentication partial attribute proof. With this configuration, there is no need to store personal information on the server, and services can be provided with relatively low load and cost. Additionally, users can have their personal information more under their control.
- the present invention is not limited to the above-described embodiments, and includes various modifications.
- the embodiments described above are described in detail to explain the present invention in an easy-to-understand manner, and the present invention is not necessarily limited to having all the configurations described.
- the authentication server 120 of the first embodiment described above may be configured to be divided into a registration server and an authentication server.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
また、代表的な本発明の認証方法の一つは、登録端末が、登録者の登録用生体情報から登録用認証情報を生成するステップと、予め個人に対して発行された電子証明書と前記電子証明書に対応する本人署名鍵とを対応付けて保持する署名装置が、前記登録用認証情報に対して本人署名を生成するステップと、発行サーバが、前記登録用認証情報と前記本人署名を、前記電子証明書を用いて検証することで、前記登録者が前記電子証明書の本人と同一人物であることを確認するステップと、を含むことを特徴とする。
上記態様によれば、オンライン本人確認において、電子的身分証明書を毎回提示することなく、また顔認証に限定せず任意の生体認証手段を利用可能とし、更にサービス提供サーバに対してサービス提供のための必要最小限の属性情報を開示しつつ、本人認証と属性証明とが可能になる。
図1に、本実施例における生体認証システムのシステム構成を示す。本システムは、登録端末100、ユーザ端末110、認証サーバ120、署名装置130、サービス提供サーバ140、ネットワーク150を備えて構成される。
ユーザ端末110は、サービス要求機能111、生体センサ112、認証テンプレート生成機能113、開示属性選択同意確認機能114、記憶部115を備えて構成される。登録端末100とユーザ端末110は、両方の機能を兼ね備えた同一の端末であってもよい。
図7に、本実施例における登録端末100、ユーザ端末110、認証サーバ120、署名装置130、サービス提供サーバ140のハードウェア構成を示す。これらは図のようにCPU700、メモリ701、ストレージ702、入力装置703、出力装置704、通信装置705とから構成することができる。
まず登録端末100が、登録者またはオペレータの操作を受けて登録処理を開始し、登録要求を認証サーバ120へ送信する(S201)。
認証サーバ120はチャレンジコードを生成し、登録端末100へ送信する(S202)。チャレンジコードには乱数列、時刻情報、セッションIDのうち1つ以上を含めてもよい。また、認証サーバ120は、生成したチャレンジコードを保持する。
登録端末100は、認証サーバ120に対して、前記テンプレートと前記追加属性情報と前記本人署名と前記電子証明書を送信し、登録要求を行う(S210)。
認証サーバ120は、前記テンプレートと前記追加属性情報と前記本人署名と前記電子証明書を、前記認証IDをキーとして、ユーザDB126に登録する(S214)。また前記認証IDを登録端末100へ送信する。
まずユーザ端末110が、ユーザの操作を受けて、サービス提供サーバ140へサービス要求を送信する(S300)。ここでサービス要求は、新たにサービスアカウントを開設する要求であってもよいし、既に開設済みのアカウントに対する各種のサービス要求であってもよい。
ユーザ端末110の認証テンプレート生成機能113が、前記認証用生体情報から認証用特徴量を抽出し、これを符号化することで認証テンプレートを生成する(S307)。
ユーザ端末110は当該認証テンプレートを認証サーバ120へ送信する。
認証サーバ120は前記認証テンプレートと前記テンプレートを照合する(S308)。照合に成功すれば、当該ユーザが、前記登録者と同一人物であり、従って前記電子証明書の本人とも同一人物であることが確認される。特に生体情報を用いることで、ユーザと登録者の同一性を強く保証することができる。照合失敗した場合はユーザ端末110に対して再度認証テンプレートを要求するか、認証失敗として処理を終了する。
認証サーバ120は、前記開示属性情報に、必要に応じて補足情報を付与した情報に対して、サーバ署名鍵管理部127に管理されているサーバ署名鍵を用いて電子署名(以下、サーバ署名)を生成、付与し、属性証明書として発行するとともに、この属性証明書をサービス提供サーバ140に直接送信するか、またはユーザ端末110を介してサービス提供サーバ140に送信する(S310)。属性証明書のデータ形式は、任意の既存技術の形式に従えばよい。また前記補足情報は、属性確認レベルや、認証結果を含んでもよい。ここで属性確認レベルとは、当該属性情報がどの機関により発行された電子証明書に記載されていたかの情報や、登録処理において認証サーバ120が当該属性情報の真正性をどのように検証したか、などの情報を含む。また認証結果とは、ステップ(S308)の照合結果(成功か失敗か、あるいは照合スコアなど)や認証手段(顔認証、静脈認証など)などの情報を含む。
図4に、本実施例における生体認証システムのシステム構成を示す。本システムは、登録端末400、ユーザ端末410、発行サーバ420、署名装置430、サービス提供サーバ440、PDS450、ネットワーク460を備えて構成される。
署名装置430は、本人確認機能431、署名生成機能432、記憶部433を備えて構成される。記憶部433は、本人確認用情報、本人署名鍵、電子証明書を格納している。
サービス提供サーバ440は、認証部分属性証明要求機能441、認証部分属性検証機能442、サービス提供機能443を備えて構成される。
図1及び図4に記載した各機能は、ストレージ702に格納されたプログラムをCPU700がメモリ701に読みだして実行することにより具現化できる。ここで、一部または全部のプログラムは、予めストレージ702に格納されていても良いし、外部のストレージに格納されたプログラムが、ネットワーク経由あるいは可搬型記憶媒体経由で、ストレージ702に格納されても良い。各ストレージと記憶媒体は、不揮発性(又は非一時的)であることが好適である。また、図1及び図4に示した各装置は、2つ以上の装置が通信等を介して協働し、その機能を実現する構成であってもよい。
まず登録端末400が、登録者またはオペレータの操作を受けて登録処理を開始し、登録要求を発行サーバ420へ送信する(S500)。
発行サーバ420はチャレンジコードを生成し登録端末400へ送信する(S501)。チャレンジコードには乱数列、時刻情報、セッションIDのうち1つ以上を含めてもよい。
登録端末400が認証用鍵ペアを生成する(S503)。当該認証用鍵ペアは、認証用秘密鍵Sと認証用公開鍵とを備える。具体的な処理としては、認証用鍵ペア生成機能402が、乱数列を生成し、当該乱数を用いて所定の電子署名アルゴリズムにおける鍵生成関数を実行する。ここで所定の電子署名方式としては、一般的な電子証明アルゴリズム(RSAやECDSAなど)を用いてもよいし、選択された属性のゼロ知識証明を実現する電子署名アルゴリズム(BBS+など)や、墨塗り署名(Redactable Signature)アルゴリズム、匿名属性認証(Anonymous Credential)アルゴリズム、グループ署名アルゴリズムを用いてもよい。
保護テンプレートの生成は、任意の既存技術を用いることができる。以下では2通りの方法を説明する。
登録端末400は、署名装置430の真正性を確認するための機器認証を行うとともに、署名装置130が登録者の本人性を確認するための本人確認情報の入力を登録者より受ける(S506)。ここで本人確認情報は、暗証番号、パスワード、生体情報のうち1つ以上を含んでも良い。
登録端末400は、発行サーバ420に対し、認証属性証明書発行要求とともに、前記認証用公開鍵と前記追加属性情報と前記本人署名と前記電子証明書と前記自己署名を送信する(S511)。
PDS450は、前記認証属性証明書と前記保護テンプレートを紐づけ、前記証明書IDをキーとして、ユーザDB452に登録する。
まずユーザ端末410が、ユーザの操作を受けて、サービス提供サーバ440へサービス要求を送信する(S600)。ここでサービス要求は、新たにサービスアカウントを開設する要求であってもよいし、既に開設済みのアカウントに対する各種のサービス要求であってもよい。
ユーザ端末410が、前記認証用特徴量と前記保護テンプレートから認証用秘密鍵S’を復元する(S605)。
具体的な方法としては、任意の既存技術の方法を用いることができる。以下では、前述のステップ(S503)(S504)において記載した、Fuzzy Extractorを用いた2通りの方法に対応する、認証用秘密鍵S’の復元方法を説明する。
PDS450は、前記認証属性証明書に含まれる前記認証用公開鍵を用いて、ユーザ端末410との間で認証プロトコルを実行する(S607)。認証に成功したら、PDS450が認証属性証明書をユーザ端末410に送信する。
このような構成により、利便性の高い認証システム及び認証方法を提供できる。具体的には、ユーザは電子身分証明書などの署名装置を登録時に1回だけ利用することで、以降では毎回の本人認証と属性証明を、生体情報の提示のみで実現することができる。また顔認証に限らず、静脈認証、指紋認証など任意の生体認証手段を利用することができる。更にサービス提供サーバに対しては、サービス提供に必要な最小限の属性情報のみを開示し証明することができる。
そして、前記署名装置130は、本人確認部としての本人確認機能131と、署名生成部としての署名生成機能132と、署名装置記憶部としての記憶部133を含む。
前記署名装置記憶部は、予め個人に対して発行された前記電子証明書と、前記電子証明書に対応する前記本人署名鍵と、本人確認用情報と、を保持し、前記本人確認部は、入力された情報を前記本人確認用情報と照合することで、前記署名装置の利用者が前記電子証明書の本人であることを確認する機能を含む。
前記発行サーバとしての認証サーバ120は、証明書検証部としての証明書検証機能121、署名検証部しての署名検証機能122と、属性証明書発行部としての属性証明書発行機能125と、サーバ署名鍵を管理するサーバ署名鍵管理部127と、を含む。
そして、前記証明書検証部は、前記電子証明書の有効性と真正性を検証する機能を含み、前記署名検証部は、前記登録用認証情報と前記本人署名を、前記電子証明書を用いて検証することで、前記登録者が前記電子証明書の本人と同一人物であることを確認する機能を有し、前記属性証明書発行部は、前記証明書検証部による検証結果と、前記署名検証部による検証結果を受けて、前記個人に関する属性情報の集合に対して前記サーバ署名鍵による電子署名を生成し付与したデータを、属性証明書として発行する機能を有する。
このように、登録端末、署名装置、発行サーバが各機能を有することにより、効率的で利便性の高い認証システム及び認証方法を提供できる。
また、前記属性情報の集合は、前記登録用認証情報を含んでよい。
また、前記登録用認証情報生成部は、前記登録用生体情報からテンプレートを生成する機能を有し、前記登録用認証情報は、前記テンプレートを含む構成であってもよい。
このように、個人に関する情報と、登録用認証情報を管理し、生体情報を利用した効率的な認証が可能である。
この構成によれば、生体情報を利用したセキュリティ性の高い認証が実現できる。
この構成によれば、生体情報を利用した認証と他の認証とを併用可能となる。
このとき、前記ユーザ端末は、前記属性証明書に含まれる属性情報の開示に関わるユーザの同意または不同意を確認する同意確認部を含み、前記属性証明書発行部は、前記同意確認部がユーザの同意を確認できたことを条件として前記属性証明書を発行する構成としてもよい。
また、このとき、前記ユーザ端末は、ユーザの操作を受けて開示を許可する1つ以上の属性を開示属性として選択する機能を含み、前記属性証明書発行部は、前記開示属性以外の属性を除外して前記属性証明書を発行する構成としてもよい。
この構成では、利便性を高めつつ必要な属性情報を開示する認証システムを比較的簡易な構成で実現できる。
このとき、前記ユーザ端末は、前記認証部分属性証明に含まれる属性情報の開示に関わるユーザの同意または不同意を確認する同意確認部を含み、前記認証部分属性証明生成部は、前記同意確認部がユーザの同意を確認できたことを条件として前記認証部分属性証明を生成するよう構成してもよい。
また、このとき、前記ユーザ端末は、ユーザの操作を受けて開示を許可する1つ以上の属性を開示属性として選択する機能を含み、前記認証部分属性証明生成部は、前記開示属性以外の属性を除外して前記認証部分属性証明を生成する構成としてもよい。
この構成では、サーバに個人情報を置く必要が無く、比較的低負荷かつ低コストでサービスを実現できる。また、ユーザは、個人情報をより自分の管理下に置くことができる。
例えば、上記の実施例1の認証サーバ120を、登録用サーバと認証用のサーバに分けた構成としてもよい。
101 生体センサ
102 テンプレート生成機能
103 署名装置認証機能
104 記憶部104
110 ユーザ端末
111 サービス要求機能
112 生体センサ
113 認証テンプレート生成機能
114 開示属性選択同意確認機能
115 記憶部
120 認証サーバ
121 証明書検証機能
122 署名検証機能
123 ID発行機能
124 本人照合機能
125 属性証明書発行機能
126 ユーザDB
127 サーバ署名鍵管理部
130 署名装置
131 本人確認機能
132 署名生成機能
133 記憶部133
140 サービス提供サーバ
141 属性証明書要求機能
142 属性証明書検証機能
143 サービス提供機能
150 ネットワーク
400 登録端末
401 生体センサ
402 認証用鍵ペア生成機能
403 保護テンプレート生成機能
404 署名装置認証機能
405 署名生成機能
406 記憶部
410 ユーザ端末
411 サービス要求機能
412 生体センサ
413 認証用鍵復元機能
414 開示属性選択同意確認機能
415 認証部分属性証明生成機能
416 記憶部
420 発行サーバ
421 証明書検証機能
422 署名検証機能
423 認証属性証明書発行機能
424 サーバ署名鍵管理部
430 署名装置
431 本人確認機能
432 署名生成機能
433 記憶部
440 サービス提供サーバ
441 認証部分属性証明要求機能
442 認証部分属性検証機能
443 サービス提供機能
450 PDS
451 認証部分属性検証機能
452 ユーザDB
460 ネットワーク
700 CPU
701 メモリ
702 ストレージ
703 入力装置
704 出力装置
705 通信装置
Claims (14)
- 予め個人に対して発行された電子証明書と前記電子証明書に対応する本人署名鍵とを対応付けて保持する署名装置と、
登録者の登録用生体情報から登録用認証情報を生成し、前記署名装置を用いて前記登録用認証情報に対して本人署名を生成する登録端末と、
前記登録用認証情報と前記本人署名を、前記電子証明書を用いて検証することで、前記登録者が前記電子証明書の本人と同一人物であることを確認する発行サーバと、
を備えたことを特徴とする認証システム。 - 前記登録端末は、登録者の登録用生体情報を取得するセンサと、前記登録者の登録用認証情報を生成する登録用認証情報生成部と、前記署名装置を用いて前記登録用認証情報に対して本人署名を生成する署名装置認証部とを含み、
前記署名装置は、本人確認部と、署名生成部と、署名装置記憶部とを含み、
前記署名装置記憶部は、予め個人に対して発行された前記電子証明書と、前記電子証明書に対応する前記本人署名鍵と、本人確認用情報と、を保持し、
前記本人確認部は、入力された情報を前記本人確認用情報と照合することで、前記署名装置の利用者が前記電子証明書の本人であることを確認する機能を含み、
前記発行サーバは、証明書検証部と、署名検証部と、属性証明書発行部と、サーバ署名鍵を管理するサーバ署名鍵管理部と、を含み、
前記証明書検証部は、前記電子証明書の有効性と真正性を検証する機能を含み、
前記署名検証部は、前記登録用認証情報と前記本人署名を、前記電子証明書を用いて検証することで、前記登録者が前記電子証明書の本人と同一人物であることを確認する機能を有し、
前記属性証明書発行部は、前記証明書検証部による検証結果と、前記署名検証部による検証結果を受けて、前記個人に関する属性情報の集合に対して前記サーバ署名鍵による電子署名を生成し付与したデータを、属性証明書として発行する機能を有する
ことを特徴とする、請求項1に記載の認証システム。 - 前記電子証明書は、前記個人に関する1つ以上の属性情報を含み、
前記属性情報の集合は、前記電子証明書に含まれる1つ以上の属性情報を含む
ことを特徴とする、請求項2に記載の認証システム。 - 前記属性情報の集合は、前記登録用認証情報を含む
ことを特徴とする、請求項2に記載の認証システム。 - 前記登録用認証情報生成部は、前記登録用生体情報からテンプレートを生成する機能を有し、
前記登録用認証情報は、前記テンプレートを含む
ことを特徴とする、請求項2に記載の認証システム。 - 前記登録用認証情報生成部は、前記登録用生体情報から疑似乱数列と補助情報とを生成する機能と、前記疑似乱数列から認証用秘密鍵と認証用公開鍵とを生成する機能と、前記補助情報を含む保護テンプレートを生成する機能とを含み、
前記登録用認証情報は、前記認証用公開鍵を含む
ことを特徴とする、請求項2に記載の認証システム。 - 前記登録用認証情報生成部は、前記登録用生体情報から疑似乱数列と補助情報とを生成する機能と、前記疑似乱数列から共通鍵を生成する機能と、認証用秘密鍵と認証用公開鍵とを生成する機能と、前記共通鍵を用いて前記認証用秘密鍵を暗号化して暗号化秘密鍵を生成する機能と、前記暗号化秘密鍵と前記補助情報とを含む保護テンプレートを生成する機能とを含み、
前記登録用認証情報は、前記認証用公開鍵を含む
ことを特徴とする、請求項2に記載の認証システム。 - ユーザ端末をさらに含み、
前記ユーザ端末は、ユーザの認証用生体情報を取得するセンサと、前記認証用生体情報から認証テンプレートを生成する認証テンプレート生成部とを含み、
前記発行サーバは、ユーザデータベースと、本人照合部を含み、
前記ユーザデータベースは、前記登録者に関する前記電子証明書と前記登録用認証情報を登録し検索する機能を含み、
前記本人照合部は、前記登録用認証情報と、前記認証テンプレートとを照合して本人照合結果を算出する機能を含み、
前記属性証明書発行部は、前記本人照合結果に応じて前記属性証明書を生成する機能を含む
ことを特徴とする、請求項2に記載の認証システム。 - 前記ユーザ端末は、前記属性証明書に含まれる属性情報の開示に関わるユーザの同意または不同意を確認する同意確認部を含み、
前記属性証明書発行部は、前記同意確認部がユーザの同意を確認できたことを条件として前記属性証明書を発行する、
ことを特徴とする、請求項8に記載の認証システム。 - 前記ユーザ端末は、ユーザの操作を受けて開示を許可する1つ以上の属性を開示属性として選択する機能を含み、
前記属性証明書発行部は、前記開示属性以外の属性を除外して前記属性証明書を発行する、
ことを特徴とする、請求項8に記載の認証システム。 - ユーザ端末を含み、
前記ユーザ端末は、ユーザの認証用生体情報を取得するセンサと、認証用鍵復元部と、認証部分属性証明生成部とを含み、
前記認証用鍵復元部は、前記保護テンプレートと前記認証用生体情報から前記認証用秘密鍵を復元する機能を含み、
前記認証部分属性証明生成部は、前記属性証明書と前記認証用秘密鍵とから、認証部分属性証明を生成する機能を含み、
前記認証部分属性証明は、前記属性証明書の一部または全ての属性情報の真正性を証明しつつ、当該属性情報の証明を行っているユーザが登録者本人であることをも、第三者に対して証明することができる情報である
ことを特徴とする、請求項6に記載の認証システム。 - 前記ユーザ端末は、前記認証部分属性証明に含まれる属性情報の開示に関わるユーザの同意または不同意を確認する同意確認部を含み、
前記認証部分属性証明生成部は、前記同意確認部がユーザの同意を確認できたことを条件として前記認証部分属性証明を生成する、
ことを特徴とする、請求項11に記載の認証システム。 - 前記ユーザ端末は、ユーザの操作を受けて開示を許可する1つ以上の属性を開示属性として選択する機能を含み、
前記認証部分属性証明生成部は、前記開示属性以外の属性を除外して前記認証部分属性証明を生成する、
ことを特徴とする、請求項11に記載の認証システム。 - 登録端末が、登録者の登録用生体情報から登録用認証情報を生成するステップと、
予め個人に対して発行された電子証明書と前記電子証明書に対応する本人署名鍵とを対応付けて保持する署名装置が、前記登録用認証情報に対して本人署名を生成するステップと、
発行サーバが、前記登録用認証情報と前記本人署名を、前記電子証明書を用いて検証することで、前記登録者が前記電子証明書の本人と同一人物であることを確認するステップと、
を含むことを特徴とする認証方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202380053039.7A CN119522552A (zh) | 2022-08-16 | 2023-02-21 | 认证系统及认证方法 |
KR1020257000669A KR20250020653A (ko) | 2022-08-16 | 2023-02-21 | 인증 시스템 및 인증 방법 |
EP23854670.9A EP4539388A1 (en) | 2022-08-16 | 2023-02-21 | Authentication system and authentication method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2022-129733 | 2022-08-16 | ||
JP2022129733A JP2024027032A (ja) | 2022-08-16 | 2022-08-16 | 認証システム及び認証方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024038630A1 true WO2024038630A1 (ja) | 2024-02-22 |
Family
ID=89941639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2023/006152 WO2024038630A1 (ja) | 2022-08-16 | 2023-02-21 | 認証システム及び認証方法 |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP4539388A1 (ja) |
JP (1) | JP2024027032A (ja) |
KR (1) | KR20250020653A (ja) |
CN (1) | CN119522552A (ja) |
WO (1) | WO2024038630A1 (ja) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002073566A (ja) * | 2000-08-31 | 2002-03-12 | Sony Corp | 個人認証適用データ処理システム、個人認証適用データ処理方法、および情報処理装置、並びにプログラム提供媒体 |
US20030115475A1 (en) * | 2001-07-12 | 2003-06-19 | Russo Anthony P. | Biometrically enhanced digital certificates and system and method for making and using |
JP2004341897A (ja) * | 2003-05-16 | 2004-12-02 | Nippon Telegr & Teleph Corp <Ntt> | 属性証明情報生成装置、属性証明情報要求装置、属性証明情報発行システム、属性認証システム |
JP2005333596A (ja) * | 2004-05-21 | 2005-12-02 | Toshiba Corp | 電子申請システム、電子申請装置 |
JP2011023854A (ja) * | 2009-07-14 | 2011-02-03 | Sony Corp | 情報処理装置、情報処理方法およびプログラム |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022024281A1 (ja) | 2020-07-29 | 2022-02-03 | 日本電気株式会社 | 認証サーバ、認証システム、認証要求処理方法及び記憶媒体 |
-
2022
- 2022-08-16 JP JP2022129733A patent/JP2024027032A/ja active Pending
-
2023
- 2023-02-21 EP EP23854670.9A patent/EP4539388A1/en active Pending
- 2023-02-21 WO PCT/JP2023/006152 patent/WO2024038630A1/ja active Application Filing
- 2023-02-21 KR KR1020257000669A patent/KR20250020653A/ko active Pending
- 2023-02-21 CN CN202380053039.7A patent/CN119522552A/zh active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002073566A (ja) * | 2000-08-31 | 2002-03-12 | Sony Corp | 個人認証適用データ処理システム、個人認証適用データ処理方法、および情報処理装置、並びにプログラム提供媒体 |
US20030115475A1 (en) * | 2001-07-12 | 2003-06-19 | Russo Anthony P. | Biometrically enhanced digital certificates and system and method for making and using |
JP2004341897A (ja) * | 2003-05-16 | 2004-12-02 | Nippon Telegr & Teleph Corp <Ntt> | 属性証明情報生成装置、属性証明情報要求装置、属性証明情報発行システム、属性認証システム |
JP2005333596A (ja) * | 2004-05-21 | 2005-12-02 | Toshiba Corp | 電子申請システム、電子申請装置 |
JP2011023854A (ja) * | 2009-07-14 | 2011-02-03 | Sony Corp | 情報処理装置、情報処理方法およびプログラム |
Also Published As
Publication number | Publication date |
---|---|
CN119522552A (zh) | 2025-02-25 |
JP2024027032A (ja) | 2024-02-29 |
KR20250020653A (ko) | 2025-02-11 |
EP4539388A1 (en) | 2025-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110741369B (zh) | 使用电子身份进行安全生物统计认证 | |
CN107251477B (zh) | 用于安全地管理生物计量数据的系统和方法 | |
JP5859953B2 (ja) | 生体認証システム、通信端末装置、生体認証装置、および生体認証方法 | |
US12166881B2 (en) | Digital notarization using a biometric identification service | |
JP7139414B2 (ja) | 認証端末、認証装置、並びにこれを用いた認証方法及びシステム | |
JP7458661B2 (ja) | 本人確認のための生体デジタル署名生成 | |
KR100449484B1 (ko) | 공개키 기반 구조 인증시스템에서 생체정보를 이용한인증서 발급 방법 | |
WO2023017580A1 (ja) | アバター認証システム、アバター認証方法 | |
CN113892099A (zh) | 信息处理装置和信息处理方法 | |
JP7375917B2 (ja) | 認証サーバ、認証システム、認証サーバの制御方法及びプログラム | |
JP7375918B2 (ja) | 認証サーバ、認証システム、認証サーバの制御方法及びプログラム | |
WO2023239760A1 (en) | Computer-implemented user identity verification method | |
WO2022024281A1 (ja) | 認証サーバ、認証システム、認証要求処理方法及び記憶媒体 | |
EP3937037A1 (en) | A system and method for digital identity authentication based on biometric data | |
WO2021205660A1 (ja) | 認証サーバ、認証システム、認証サーバの制御方法及び記憶媒体 | |
JP2000215280A (ja) | 本人認証システム | |
KR100546775B1 (ko) | 생체정보를 이용한 인증서 발급 및 인증 방법 | |
JP6841781B2 (ja) | 認証サーバ装置、認証システム及び認証方法 | |
JP2020102741A (ja) | 認証システム、認証方法、及び、認証プログラム | |
WO2024038630A1 (ja) | 認証システム及び認証方法 | |
KR100715651B1 (ko) | 얼굴영상 기반의 패스워드를 이용한 제3자 인증 시스템 및방법 | |
JP7341207B2 (ja) | 端末およびその制御方法、並びにプログラム | |
JP7641926B2 (ja) | テンプレート管理システム及びテンプレート管理方法 | |
JP7099975B2 (ja) | 認証情報管理サーバ装置、認証情報管理システム及び認証情報管理方法 | |
JP7522391B2 (ja) | サーバ、システム、方法及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23854670 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20257000669 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020257000669 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023854670 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2023854670 Country of ref document: EP Effective date: 20250109 |
|
WWP | Wipo information: published in national office |
Ref document number: 1020257000669 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2023854670 Country of ref document: EP |