摘要:
An electronic document authenticity assurance technique and an information disclosure system both of which can compatibly realize the assurance of the authenticity of disclosure documents and the deletion of information inappropriate for disclosure. An electronic document is divided into constituent elements and an electronic signature is affixed to an arbitrary subset of a set including all the constituent elements. Otherwise, an electronic signature is affixed to data obtained by binding each of the constituent elements to information specifying the relationship between a respective one of the constituent elements and the structure of the electronic document. Otherwise, the hash values of the respective constituent elements are calculated and an electronic signature is affixed to data obtained by binding the calculated hash values together. Otherwise, random numbers generated for the respective constituent elements are bound together, then the hash values of the respective random-numbered constituent elements are calculated, and then an electronic signature is affixed to data obtained by binding the calculated hash values together.
摘要:
According to the invention, techniques for authenticating that a digitally signed document is genuine. Specific embodiments according to the present invention can determine whether a digital signature was generated by a digital signature generator, or if the digital signature was generated by a third party posing as the digital signature generator. Specific embodiments can provide independent verification of digital signer identity based upon prior signed messages, time/date stamps, and the like. Techniques according to the present invention can be embodied in methods, apparatus, computer software and systems.
摘要:
According to the invention, techniques for authenticating that a digitally signed document is genuine. Specific embodiments according to the present invention can determine whether a digital signature was generated by a digital signature generator, or if the digital signature was generated by a third party posing as the digital signature generator. Specific embodiments can provide independent verification of digital signer identity based upon prior signed messages, time/date stamps, and the like. Techniques according to the present invention can be embodied in methods, apparatus, computer software and systems.
摘要:
According to the invention, techniques for authenticating that a digitally signed document is genuine. Specific embodiments according to the present invention can determine whether a digital signature was generated by a digital signature generator, or if the digital signature was generated by a third party posing as the digital signature generator. Specific embodiments can provide independent verification of digital signer identity based upon prior signed messages, time/date stamps, and the like. Techniques according to the present invention can be embodied in methods, apparatus, computer software and systems.
摘要:
A distributed object system comprising at least one object distributing server, at least one client terminal and at least one server object execution server according to the present invention, including: an object distributing server for storing an object program to which an electronic signature is affixed; a client terminal including means for down-loading the object program from the object distributing server, means for verifying the electronic signature affixed to the object program, means for executing the client object program when the completeness of the object program is confirmed and the user of the client terminal beforehand permits execution of the client object program which is electronically signed by a signatory, and means for transmitting the electronic signature affixed to the object program to a server object execution server; and a server object execution server including means for verifying the signature received, and means for supplying services to the user of the client terminal when the completeness of the object program is confirmed and the user and the object program permit use of the services in advance, which makes it possible to prevent a client object which is down-loaded to a client terminal through a network and executed therein from carrying out unjustified processing (not intended by a user using the client terminal) by using authority of the user.
摘要:
An information service system including a plurality of receiving stations and information service facilities. The information service facilities include a memory circuit which stores beforehand a distribution destination information set of receiving station identifiers allocated to the receiving stations, distribution destination information set being disposed in a predetermined order within the memory circuit, a memory circuit for storing a plurality of information to be supplied to receiving stations, an enciphering circuit for generating an enciphering key for optical receiving stations within a group which performs broadcast communications, and enciphering the service information with the enciphering key, and a circuit for transmitting the enciphered service information and service destination codes of service destination receiving stations encoded from the distribution destination information set, through broadcast communications. Each receiving station includes a memory circuit for storing beforehand its own identifier and the distribution destination information set of the group which performs broadcast communications, a receiver unit for receiving the enciphered service information and the service destination codes from the information service facilities, and a deciphering circuit for generating a deciphering key corresponding to the distribution destination information set in accordance with the received service destination codes and the corresponding, and previously stored distribution destination information, only when the own identifier of the receiving station is contained in the service destination codes, and the deciphering the enciphered service information with the deciphering key.
摘要:
There are provided an encipher method of enciphering message data made by a microcomputer or the like at a high speed by using encipher keys which have previously been stored in a smart card or the like and a decipher method of deciphering the ciphertext made by the encipher method at a high speed by using the encipher keys. The encipher method and the decipher method are suitable for, particularly, a 32-bit microcomputer and include a process expressed by the function Rot.sub.2 i(x) (i=2, 3, 4) in each process. Rot.sub.2 i(x) is the process to circular shift a data train x of 32 bits to the left or right by 2.sup.i bits (i=2, 3, 4).
摘要:
There are provided an encipher method of enciphering message data made by a microcomputer or the like at a high speed by using encipher keys which have previously been stored in a smart card or the like and a decipher method of deciphering the ciphertext made by the encipher method at a high speed by using the encipher keys. The encipher method and the decipher method are suitable for, particularly, a 32-bit microcomputer and include a process expressed by the function Rot.sub.2 i(x) (i=2, 3, 4) in each process. Rot.sub.2 i(x) is the process to circular shift a data train x of 32 bits to the left or right by 2.sup.i bits (i=2, 3, 4).
摘要:
A mediation can be requested to a computer connected to a communications network when transacting parties A and B effect an electronic transaction and trouble takes place during the transaction. The transaction is effected by a procedure where the transacting party B transmits its preliminary digital signature to the transacting party A. When the transacting party B agrees with the contract document M transacting part A has submitted, the transacting parties A and B exchange their formal signature with each other. These signatures are obtained by coding data including a hash total h(M) obtained by transforming the contract docmument M, identifiers of the transacting parties A and B and a data identifier indicating whether the data are prepared for the preliminary on the formal signature by the public key cryptosystem using a secrete key for one of the transaction parties. When a trouble takes place, the mediation organization decodes the signatures submitted by the transacting parties as evidences by using a public key and checks as the basic of h(M) and the identifiers of the transacting parties whether the evidence data concern the same transaction or not. Finally, it decides the sort of the signatures based on the data identifiers and deduces a conclusion of the mediation.
摘要:
A data encrypting system according to the CBC system involves a limitation in a range of a numerical value which expresses data (smaller than a predetermined integer N). The encrypting system has an encrypting apparatus including a block encrypting section for receiving data, which is expressed by an integer value X smaller than a predetermined integer value N, for executing a data conversionC=enc (X)where 0.ltoreq.C.ltoreq.N-1 using an RSA algorithm, and for outputting C; and an arithmetic operating section connected to receive data, as one input, which is expressed by an integer value M smaller than the integer value N, and the output C of the block encrypting section as the other input, for performing an arithmetic operation for both of the inputs so that a resultant arithmetic value is smaller than the integer value N, and for outputting the arithmetic value as an input of the block encrypting section. Further, a decoding apparatus has a block decoding section for receiving data which is expressed by an integer value C smaller than the integer value N, for executing an inverse conversionY=dec (C)of the encrypting for the input signal by using the RSA algorithm; and a modulo subtracting section for subtracing the input data C from the output Y of the block decoding section and for outputting a remainder M'M'=Y-C (mod N)which is derived by dividing a resultant subtracted value by the integer value N.