摘要:
A key recovery information distribution device is provided between a recoverer device and a key recovery device, recovers a data key for the recoverer device, and reduces the load of the recoverer device. Data is encrypted using the data key and stored with key recovery information. The recoverer device which decrypts the encrypted data distributes the key recovery information to key recovery devices through the key recovery information distribution device to recover key information. A recoverer is authenticated directly between the key recovery device and the recoverer device, and then the key information is transmitted to the recoverer device, and the recoverer device recovers the data key.
摘要:
An apparatus and program for allowing access to authentic documents in the form of electronic original data. A storage means (12, 22) stores registration certificate information containing combination identification information based on a combination of logical identification information uniquely identifying electronic information in logic, and location identification information indicating a physical location of the electronic information. A request means (12, 22) requests access to the electronic information registered as original data information according to the registration certificate information.
摘要:
An apparatus and program for allowing access to authentic documents in the form of electronic original data. A storage means (12, 22) stores registration certificate information containing combination identification information based on a combination of logical identification information uniquely identifying electronic information in logic, and location identification information indicating a physical location of the electronic information. A request means (12, 22) requests access to the electronic information registered as original data information according to the registration certificate information.
摘要:
An electronic document is registered as electronic original data in an apparatus (11) different from the computer environment (12) of a user. At this time, a registration certificate for uniquely identifying the electronic original data (14) is issued, and the user accesses the electronic original data using the issued registration certificate. This allows authenticity of an electronic document to be ensured, and copies or forgeries to be detected.