WO2008041286A1 - Processeur d'informations et procédé de gestion d'informations - Google Patents
Processeur d'informations et procédé de gestion d'informations Download PDFInfo
- Publication number
- WO2008041286A1 WO2008041286A1 PCT/JP2006/319513 JP2006319513W WO2008041286A1 WO 2008041286 A1 WO2008041286 A1 WO 2008041286A1 JP 2006319513 W JP2006319513 W JP 2006319513W WO 2008041286 A1 WO2008041286 A1 WO 2008041286A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- user
- specific
- information processing
- biometric
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Definitions
- the present invention relates to an information processing apparatus or the like that includes a chip that is mounted in an information processing apparatus and executes predetermined processing independently.
- a plurality of information processing apparatuses mutually perform data communication via a communication network such as the Internet.
- a method of encrypting data by performing encryption processing and authenticating authorized users For example, a method of performing electronic authentication is being performed.
- Patent Document 1 proposes an information management apparatus that can flexibly and rigorously update a program and data for executing an authentication process.
- Patent Document 1 International Publication No. 2005Z106620 Pamphlet
- the IC card may be transferred to a malicious third party and the encryption key stored in the IC card may be used illegally. For this reason, the method in which a user carries an IC card is not always safe.
- the present invention has been made to solve the above-described problems caused by the prior art.
- the user can safely manage an encryption key unique to the user without carrying the IC card.
- An object of the present invention is to provide an information processing apparatus and an information management method capable of improving the reliability of encryption processing using an encryption key and electronic authentication.
- the present invention is an information processing apparatus including a chip that is implemented in an information processing apparatus and independently executes a predetermined process.
- the chip includes a storage means for storing user-specific information in which user's biological information is associated with specific information used when executing a specific process corresponding to the user, and a user's Information processing means for searching for specific information corresponding to the acquired biological information when the biological information is acquired, and performing predetermined processing using the searched specific information It is characterized by.
- the unique information includes information on an encryption key unique to a user, and the information processing unit performs encryption of information using the encryption key. It is characterized by.
- the unique information includes encryption key information based on a user-specific common key encryption method, and the information processing means uses the encryption key to generate an electronic signature. It is characterized by creating.
- the present invention is characterized in that, in the above-mentioned invention, the user-specific information is stored in association with a plurality of different pieces of biological information and the single specific information.
- the user-specific information is a single piece of biological information.
- a plurality of different pieces of unique information are stored in association with each other.
- the present invention is characterized in that, in the above-mentioned invention, the user-specific information stores a plurality of different biological information and a plurality of different specific information in association with each other.
- the user-specific information may further include user authority information indicating a user authority with respect to a device and Z or software installed in the information processing apparatus, and the biological information. And storing the information in association with each other, and the information processing means performs access control to the device and Z or software installed in the information processing device based on the user authority information corresponding to the biological information.
- the present invention is an information management method for an information processing device that is mounted in an information processing device and includes a chip that executes predetermined processing independently.
- the unique information includes information on an encryption key unique to a user, and the information processing step executes encryption of information using the encryption key. It is characterized by.
- the unique information includes encryption key information based on a user-specific common key encryption method, and the information processing step uses the encryption key to create an electronic signature. It is characterized by creating.
- the present invention is characterized in that, in the above-mentioned invention, the user-specific information is stored in association with a plurality of different biological information and the single specific information.
- the present invention is characterized in that, in the above-mentioned invention, the user specific information stores a single piece of biological information and a plurality of different pieces of specific information in association with each other.
- the present invention is characterized in that, in the above-mentioned invention, the user-specific information stores a plurality of different biological information and a plurality of different specific information in association with each other.
- the present invention is the above invention, wherein the user specific information is the information processing apparatus.
- User authority information indicating the authority of the user with respect to the device and z or software installed in the computer is further stored in association with the biological information, and the information processing step stores user authority information corresponding to the biological information. Accordingly, access control is performed on the device and Z or software installed in the information processing device.
- the present invention is an information management program for an information processing apparatus that is mounted in an information processing apparatus and includes a chip that executes a predetermined process independently.
- the storage procedure for storing the user specific information associated with the specific information used when executing the specific process corresponding to the user in the storage device, and the biometric information of the user acquired.
- An information processing procedure for searching the user-specific information corresponding to the biometric information with the user-specific information and executing a predetermined process using the searched specific information is executed by the chip.
- the unique information includes information on an encryption key unique to a user, and the information processing procedure executes encryption of information using the encryption key. It is characterized by.
- the unique information includes encryption key information based on a common key encryption method unique to a user, and the information processing procedure uses the encryption key to generate an electronic signature. It is characterized by creating.
- the present invention is characterized in that, in the above-mentioned invention, the user-specific information stores a plurality of different biological information and a single piece of the unique information in association with each other.
- the present invention is characterized in that, in the above-mentioned invention, the user specific information stores a single piece of biological information and a plurality of different pieces of specific information in association with each other.
- the present invention is characterized in that, in the above-mentioned invention, the user specific information stores a plurality of different biological information and a plurality of different specific information in association with each other.
- the user-specific information further includes user authority information indicating a user's authority for the device and Z or software installed in the information processing device, and the biometric information. And storing the information in association with each other, and the information processing procedure performs access control to the device and Z or software installed in the information processing device based on the user authority information corresponding to the biological information.
- the chip that independently executes the predetermined process associates the biometric information of the user with the specific information used when executing the specific process corresponding to the user.
- the user-specific information corresponding to the acquired biometric information is searched for, and predetermined processing is performed using the searched specific information.
- the unique information includes the information of the encryption key unique to the user, and the encryption of the information is performed using this encryption key. Therefore, the user always carries the encryption key. Even without this, encryption of information can be executed using a user-specific encryption key.
- the unique information includes! /, The encryption key information based on the common key encryption method unique to the user, and creates an electronic signature using the encryption key. Even if the user does not always carry the encryption key, the user can create an electronic signature with the user-specific encryption key.
- the user specific information stores a plurality of different biometric information and a single specific information in association with each other, so that fine access control to devices, systems, and programs is performed. This is possible.
- the user unique information is stored in association with a single piece of biological information and a plurality of different unique information, so that fine access control to devices, systems, and programs is performed. This is possible.
- the user specific information stores a plurality of different biological information and a plurality of different specific information in association with each other, so that fine access control to devices, systems, and programs is performed. This can be done.
- the user-specific information further includes the user authority information indicating the authority of the user with respect to the device and Z or software installed in the information processing apparatus and the biometric information. Based on the user authority information corresponding to the user's biometric information, access control for the device and Z or software installed in the information processing device is performed. Z or software The safety against this can be improved.
- FIG. 1 is a diagram for explaining an overview and features of an information processing apparatus that is useful in this embodiment.
- FIG. 2 is a functional block diagram showing a configuration of an information processing apparatus that works well with the present embodiment.
- FIG. 3 is an explanatory diagram showing an electronic certificate stored in a memory Z storage.
- FIG. 4 is an explanatory diagram showing in-device information stored in the memory Z storage.
- FIG. 5 is a functional block diagram showing a configuration of a biometric authentication processing unit.
- FIG. 6 is a diagram illustrating an example of a data structure of a bio-information management table.
- FIG. 7 is a diagram illustrating an example of a data structure of an account information management table.
- FIG. 8 is a diagram showing an example of a data structure of comparison source bio-information.
- FIG. 9 is a diagram showing an example of the data structure of virtual IC card management information.
- FIG. 10 is a diagram illustrating an example of a data structure of an authority information management table.
- FIG. 11 is a flowchart showing a processing procedure of initial registration processing.
- FIG. 12 is a flowchart showing a processing procedure for virtual IC card allocation processing.
- FIG. 13 is a diagram illustrating a hardware configuration of the information processing apparatus.
- FIG. 1 is a diagram for explaining the outline and features of an information processing apparatus that is useful in this embodiment.
- the information processing apparatus 100 that works on the present embodiment is mounted with a security chip 150 (for example, an LSI having a biometric authentication function as disclosed in WO 2005Z106620 pamphlet), Virtual IC (Integrated) in security chip 150 circuit) cards (virtual IC cards each store encryption keys, etc., which serve as user authentication information).
- a security chip 150 for example, an LSI having a biometric authentication function as disclosed in WO 2005Z106620 pamphlet
- Virtual IC (Integrated) in security chip 150 circuit) cards virtual IC cards each store encryption keys, etc., which serve as user authentication information.
- the information processing apparatus 100 creates an account based on various types of biological information of the user (information such as the user's fingerprint, iris, vein, and facial appearance), and associates the created account with a virtual IC card.
- biometric information registered in the account is not single, but various biometric information according to the user is registered.
- account 1 is associated with virtual IC cards 1, 2, and 3
- account 2 is associated with virtual IC cards 2 and 3
- Account 3 is associated with virtual IC card 3.
- the information processing apparatus 100 acquires the biological information of the user from the biological sensor, the information processing apparatus 100 searches for a virtual IC card associated with the acquired biological information (an account corresponding to the biological information)
- Various processing is executed using the searched virtual IC card.
- the information processing apparatus 100 acquires biological information corresponding to account 1 (biological information that works on the vein of the user's right hand) and the acquired biological information is equal to the pre-registered biological information
- the virtual information Various processing is performed using smart cards 1, 2, and 3.
- the information processing apparatus 100 stores different accounts and virtual IC cards in association with the features of the biometric information in the security chip 150, and stores the biometric information of the user.
- various processes are executed using a virtual IC card associated with the acquired biometric information, so the user does not have to carry the IC card and the burden on the user is reduced.
- the information registered in the power account described for registering biometric information in an account is not limited to biometric information, and an IDZ password may be registered (see account 4 in FIG. 1).
- FIG. 2 is a functional block diagram showing the configuration of the information processing apparatus that works on the present embodiment.
- the information processing apparatus 100 includes a communication IZF (interface) 110, a biosensor 120, a CPU 130, a memory Z storage 140, and a security chip 150.
- Various software 160 is installed in the information processing apparatus 100, and The utility chip 150 can acquire information regarding the software 160. Further, the security chip 150 can also acquire information related to peripheral devices connected to the information processing apparatus 100.
- Communication IZF 110 controls the interface between the network and the inside, and controls the input and output of data from external devices.
- a modem or a LAN (Local Area Network) adapter may be employed as the communication IZF 110.
- the information processing apparatus 100 is connected to the certificate authority terminal and the service provider terminal (vendors and manufacturers that develop execution programs and various data for various services, via the communication IZF110. Data communication with a service provider terminal managed by a company that manufactures or sells the information processing apparatus 100).
- Examples of the biometric sensor 120 include a fingerprint sensor, a camera, and a microphone.
- the fingerprint sensor is a device that detects irregularities on the fingerprint of a finger at an interval of about 50 m and converts it into an electrical signal. Examples of fingerprint reading methods include semiconductor, optical, pressure-sensitive, and thermal-sensitive methods. Be mentioned.
- the camera is a biological sensor that photographs the iris and retina of the eyeball.
- a microphone is a biometric sensor that detects a voiceprint that represents the characteristics of a voice.
- the CPU 130 is a device that controls processing of the entire information processing apparatus.
- the memory Z storage 140 is a storage device that stores various information used in the security chip 150 and the like.
- the memory Z storage 140 may be provided in any area inside the security chip 150 or outside the security chip 150 as long as it is in the information processing apparatus 100. When provided in the security chip 150, the memory Z storage 140 can be prevented from being removed or tampered with.
- FIG. 3 is an explanatory diagram showing an electronic certificate stored in the memory Z storage 140
- FIG. 4 is an explanatory diagram showing in-device information stored in the memory Z storage 140. As shown in FIG.
- electronic certificates Ca to Cz are stored for each person to be proved.
- “Certified person” includes persons certified by electronic certificates Ca to Cz, such as users, manufacturers, vendors, and certificate authorities.
- the electronic certificates Ca to Cz contain version information, signature algorithm, issuer name, expiration date, public key, and other related information.
- the electronic certificates Ca to Cz are encrypted and stored by the in-device information authentication processing unit 155 included in the security chip 150! RU
- the security chip 150 is mounted on the main board of the information processing apparatus 100.
- the security chip 150 is a chip that provides only basic functions for realizing security and privacy.
- the security chip 150 is defined by TCG (Trusted Computing Group) specifications.
- TCG Trusted Computing Group
- the security chip 150 includes therein an LSI unique key storage unit 151, a communication authentication processing unit 152, a monitoring processing unit 153, a verification processing unit 154, an in-device information authentication processing unit 155, and an organism.
- An authentication processing unit 156 includes therein an LSI unique key storage unit 151, a communication authentication processing unit 152, a monitoring processing unit 153, a verification processing unit 154, an in-device information authentication processing unit 155, and an organism.
- An authentication processing unit 156 An authentication processing unit 156.
- the LSI unique key storage unit 151 is a storage unit that stores an encryption key unique to the security chip 150.
- the communication authentication processing unit 152 is a processing unit that guarantees the safety of communication performed outside the information processing apparatus 100, for example, a service provider terminal connected via a network, a terminal of a certificate authority, etc. It is. Specifically, the communication authentication processing unit 152 performs identity authentication (PKI (Public Key Infrastructure) authentication) using an electronic certificate using a certificate authority, so that a person who communicates with the outside can be properly authorized by the certificate authority. You can determine whether you are a registered person or not.
- PKI Public Key Infrastructure
- the monitoring processing unit 153 is a processing unit that monitors the exchange of information in the information processing apparatus 100, and the inspection processing unit 154 has been authenticated by the communication authentication processing unit 152 for safety of communication with the outside. In this case, it is a processing unit that performs verification of validity and consistency of information input to the security chip 150 from the outside.
- the in-device information authentication processing unit 155 is a processing unit that authenticates information (in-device information) in the information processing device 100 or the security chip 150.
- This in-device information is called environmental information.
- information about peripheral devices that have acquired the capabilities of peripheral devices connected to the information processing device 100 for example, device name and version information
- information about software 160 installed in the information processing device 100 for example, software names
- Version information various information stored in the memory Z storage 140 (for example, electronic certificates), etc.
- the in-device information authentication processing unit 155 performs confidential management of information stored in the memory Z storage 140. Specifically, the information acquired by the in-device information authentication processing unit 155 is encrypted with the unique encryption key stored in the LSI unique key storage unit 151 and stored in the memory Z storage 140. On the other hand, when there is a call from other hardware, etc., the decryption key (stored in the LSI unique key storage unit 151) that is paired with the encryption key is decrypted! To do. By this encryption key and decryption key processing, it can be authenticated that the information processing device 100 has been tampered with.
- the biometric authentication processing unit 156 is a processing unit that acquires the biometric information of the user and assigns the virtual IC card information to the user who uses the biometric information based on the acquired biometric information.
- FIG. 5 is a functional block diagram showing the configuration of the biometric authentication processing unit 156. As shown in the figure, the biometric authentication processing unit 156 includes a storage unit 157, an IZF unit 158, an account information management unit 159, and a biometric information comparison unit 160.
- the storage unit 157 is a storage unit that stores various types of information.
- the bio information management table 157a, the account information management table 157b, the comparison source bio information 157c, the virtual IC card management information 157d, and the authority information management Table 157e is stored.
- the bio-information management table 157a is a table that stores information such as safety for various bio-processes (biometric authentication processes).
- FIG. 6 is a diagram showing an example of the data structure of the bio-information management table 157a.
- the bioinformation management table 157a associates various bioprocessing methods (biometric authentication using fingerprints, irises, veins, facial features, etc.) with information on safety, identity rejection rate, and error rate of others. I remember.
- the account information management table 157b is a table that stores information in which an account is associated with an authentication method corresponding to the account.
- FIG. 7 is a diagram showing an example of the data structure of the account information management table 157b. As shown in the figure, this account information
- the management table 157b includes account identification information for identifying an account, an authentication method, and detailed information. Specifically, in the first row of the account information management table 157b, it is shown that the authentication method of “Account 1” is “Biometric authentication” and “Biometric information to be authenticated is a vein of the right hand”. ing.
- the fourth row of the account information management table 157b indicates that the authentication method of “Account 4” is “IDZ password”, and the IDZ password is “OO O / XXXX”.
- the comparison source bio-information 157c is information in which the account identification information stored in the account information management table 157b is associated with biometric information (biological information itself).
- FIG. 8 is a diagram showing an example of the data structure of the comparison source bioinformation.
- the comparison source bio-information 157c is account identification information and biometric information. Specifically, in the first row of the comparison source bio-information 157c, the bio-information corresponding to the account 1 (the bio-information of the vein on the right hand of the user) is stored.
- the virtual IC card management information 157d is information in which virtual IC card information corresponding to an account is associated.
- FIG. 9 is a diagram showing an example of the data structure of the virtual IC card management information 157d. As shown in the figure, this virtual IC card management information includes identification information for identifying each virtual IC card, association account information indicating an associated account, public key information, and secret key information. It consists of authority information, electronic certificate and password.
- the virtual IC card identified by the identification information "100001" is associated with "account 1".
- the public key information recorded on the virtual IC card is “Public key A”
- the private key information is “Private key A”
- the authority information is “Administrator”
- the digital certificate is “C1”
- the password power is “00”. ⁇ ”.
- the user corresponding to account 1 does not carry an IC card, but creates various kinds of processing (for example, an electronic signature using the private key A) via the virtual IC card with the identification information “100001”. Processing or cryptographic processing)
- the authority information management table 157e is a table that stores authority information and hardware and software information accessible by the authority information.
- Figure 10 shows the authority information It is a figure which shows an example of the data structure of the management table 157e.
- the right information management table 157e includes right information, access permission hardware, and access permission software.
- the hardware that can be accessed by the authority information "Administrator” is "D1, D2, D3, D4--"
- the accessible software is "Sa, Sb , Sc, Sd ','”.
- the IZF unit 158 is a processing unit that performs data communication with the biometric sensor 120 and other devices in the information processing apparatus 100.
- the account information management unit 159 manages the bio information management table 157a, the account information management table 157b, the comparison source bio information 157c, the virtual IC card management information 157d, and the authority information management table 15 7e stored in the storage unit 157. This is a processing unit that executes a process that works for initial registration of the biometric information of the user.
- the account information management unit 159 when receiving an initial registration request for user biometric information, authenticates the user with a password or the like (for example, the user logs in with Administrator authority), and then the bio information management table. 157a is output to a display (not shown), and the bio authentication method is selected.
- a password or the like for example, the user logs in with Administrator authority
- the account information management unit 159 When a user selects a bio-authentication method using an input device and the account information management unit 159 obtains bio-authentication method information, a new account is generated and a bio-authentication method is generated. The biometric information corresponding to is acquired. At this point, the account information management unit 159 registers the new account and the authentication method and detailed information corresponding to this account in the account information management table 157b, and also registers the new account and biometric information in the comparison source bio information 157c. And register.
- the account information management unit 159 requests the user for biometric information corresponding to the newly registered account and virtual IC card information associated with the strong account, and the requested biometric information is If authenticated, register various information corresponding to the new account in the virtual IC card management information 157d. Note that if the requested biometric information does not match the newly registered biometric information, the account information management unit 159 outputs an error. [0069] Here, it is also possible for the account information management unit 159 to register the IDZ password instead of the vital biometric information described in the case of registering the biometric information of the user in the initial registration. In this case, the account information management unit 159 registers the new account and the IDZ password in association with each other in the account information management table 157b.
- the biometric information comparison unit 160 is a processing unit that assigns a virtual IC card to a user based on the biometric information of the user when a virtual IC card use request is received. Specifically, when receiving a virtual IC card assignment request via the user power input device, the biometric information comparison unit 160 outputs the account information management table 157b to select an account.
- the biometric information comparison unit 160 acquires the account information (selected by the user)
- the biometric information corresponding to the account is stored in the biometric information.
- the biometric information acquired from the sensor 120 is compared with the biometric information corresponding to the account, and it is determined whether or not the biometric information matches each other. If the biometric information matches, a virtual IC card corresponding to a strong account can be assigned to the user.
- a user assigned a virtual IC card (see FIG. 9) identified by the identification number “10001” uses various information stored in the virtual IC card.
- encryption processing electronic authentication processing, and the like can be executed.
- the device / processing unit installed in the information processing apparatus 100 uses the information registered in the virtual IC card to perform encryption processing (acquires information created by the user and encrypts the acquired information. Etc.), digital authentication (using a common key cryptosystem, attaching an electronic signature to information created by the user, etc.), and other processing.
- the biometric information comparison unit 160 compares the authority information registered in the virtual IC card management information 157d with the authority information management table 157e, and performs access control from the user. That is, the biometric information comparison unit 160 outputs an error or the like when the user does not have access authority to the nodeware or software that is the target of the access request from the user.
- FIG. 11 is a flowchart showing the procedure of the initial registration process. As shown in the figure, when an initial registration request is accepted, the account information management unit 159 outputs a bio-information management table 157a (step S101), and accepts a bio-processing method (step S102).
- the account information management unit 159 creates a new account (step S103), acquires biometric information to be registered in the account, associates the account with the biometric information, and sets the account information management table 157b and Various information is registered in the comparison source bio-information 157c (step S104).
- the account information management unit 159 acquires biometric information corresponding to the newly created account again, compares the acquired biometric information with the biometric information corresponding to the account, and performs authentication (step). (S105), if authentication is successful (when each biometric information matches) (Step S106, Yes), obtain various authentication information corresponding to the account (various information registered in the virtual IC card) Then, various authentication information is registered in the virtual IC card management information 157d (step S107).
- step S106 determines whether or not the number of authentication failures is a predetermined number or more (step S108). If the number of authentication failures is less than the predetermined number (step S109, No) ), And proceeds to step S106. If the number of authentication failures is a predetermined number or more (step S109, Yes), an error is output (step S110).
- FIG. 12 is a flowchart showing the processing procedure of the virtual IC card assignment processing.
- the biometric information comparison unit 160 when acquiring a virtual IC card assignment request, the biometric information comparison unit 160 outputs the account information management table 157b (step S201), and accepts an account selection (step S202). ).
- the biometric information comparison unit 160 acquires biometric information corresponding to the account, and compares the acquired biometric information with the biometric information corresponding to the account registered in the comparison source bioinformation 157c. (Step S203) If authentication succeeds (when each biometric information matches) (Step S204, Yes), various authentication information corresponding to the user is assigned. Hit (Step S205).
- step S204 if the authentication fails (step S204, No), it is determined whether the number of authentication failures is a predetermined number or more (step S206). If the number of authentication failures is less than the predetermined number (step S207, No) ), And proceeds to step S203. If the number of authentication failures is greater than or equal to the predetermined number (step S207, Yes), an error is output (step S208).
- the biometric authentication processing unit 156 stores virtual IC card information in association with an account, and uses the virtual IC card for the user according to the biometric information input from the user. Since it is assigned, the user does not need to carry an IC card and the burden on the user is reduced.
- the information processing apparatus 100 has the security chip 150 that executes predetermined processing independently, and the virtual IC card information and the security chip 150 are installed in the security chip 150.
- the user's biometric information is registered in association with each other.
- the biometric authentication processing unit 156 acquires the biometric information of the user from the biometric sensor 120
- the biometric authentication processing unit 156 searches for virtual IC card information (various authentication information) corresponding to the acquired biometric information, and performs a search.
- the information processing device 100 executes encryption processing, digital signature processing, etc. according to the various authentication information, and the user does not have to carry the card all the time. Convenience is improved.
- biometric identity authentication and virtual IC card information are only one-to-one. It is possible to perform fine-grained access control for systems and programs. With this mechanism, multiple virtual IC card information is prepared for a single user. In addition, it is possible to appropriately use the encryption key that is used as access control information or stored internally for each event.
- the information processing apparatus 100 shows an example in which various processes are executed using a virtual IC card stored in the security chip 150, the present invention is not limited to this. It is also possible to read various authentication information from the existing IC card and perform encryption processing and electronic authentication.
- FIG. 13 is a diagram illustrating a hardware configuration of the information processing apparatus.
- the information processing apparatus includes a CPU 11, ROM 12, RAM 13, HDD (node disk drive) 14, HD (node disk) 15, FDD (flexible disk drive) 16, and FD ( Flexible disk) 17, display 18, communication IZF 19, input keys (including keyboard and mouse) 20, biosensor 21, and security chip 22.
- ROM read only memory
- RAM random access memory
- the CPU 11 controls the entire information processing apparatus.
- the ROM 12 stores programs such as a boot program.
- the RAM 13 is used as a work area for the CPU 11.
- the HDD 14 controls the read Z write of data to the HD 15 according to the control of the CPU 11.
- the HD 15 stores data written under the control of the HDD 14.
- the FDD 16 controls data read / write to the FD 17 according to the control of the CPU 11.
- the FD17 stores the data written under the control of the FDD16, and causes the information processing apparatus to read the data stored in the FD17.
- the removable recording medium may be the power of FD17, CD-ROM (CD-R, CD-RW), MO, DVD (Digital Versatile Disk), memory card, or the like.
- the display 18 displays data such as documents, images, and function information as well as cursors, icons, or tool boxes.
- a CRT, a TFT liquid crystal display, a plasma display, or the like can be adopted as the display 18.
- the communication IZF 19 corresponds to the communication IZF 110 shown in FIG. 2, and is connected to a network 23 such as the Internet.
- the input key 20 has keys for inputting characters, numbers, various instructions, etc., and inputs data. Also, touch panel input pads and numeric keys obviously.
- the biometric sensor 21 and the security chip 22 correspond to the biometric sensor 120 and the security chip 150 shown in FIG.
- the security chip 22 stores various programs 22a for realizing the various processing units shown in FIG. 2, and various processes of powerful program power are executed.
- the various processes correspond to the communication authentication processing unit 152, the monitoring processing unit 153, the verification processing unit 154, the in-device information authentication processing unit 155, and the biometric authentication processing unit 156 shown in FIG.
- the security chip 150 stores various data 22b (corresponding to information stored in the memory Z storage 140 and the storage unit 157) used for executing various processes.
- each component of each illustrated device is functionally conceptual and does not necessarily need to be physically configured as illustrated.
- the specific form of distribution / integration of each device is not limited to the one shown in the figure, and all or a part thereof is functionally or physically distributed in an arbitrary unit according to various loads and usage conditions. ⁇ Can be integrated and configured.
- the information processing apparatus and the information management method according to the present invention are useful for an information processing system that executes various types of processing using information unique to a user. It is suitable for reducing the burden and preventing leakage of personal information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006800559353A CN101512540B (zh) | 2006-09-29 | 2006-09-29 | 信息处理装置及其方法 |
PCT/JP2006/319513 WO2008041286A1 (fr) | 2006-09-29 | 2006-09-29 | Processeur d'informations et procédé de gestion d'informations |
JP2008537344A JP4900392B2 (ja) | 2006-09-29 | 2006-09-29 | 情報処理装置および情報管理方法 |
EP06810893.5A EP2071484B1 (en) | 2006-09-29 | 2006-09-29 | Information processor and information management method |
US12/385,009 US20110179284A1 (en) | 2006-09-29 | 2009-03-27 | Information processing apparatus and information managing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2006/319513 WO2008041286A1 (fr) | 2006-09-29 | 2006-09-29 | Processeur d'informations et procédé de gestion d'informations |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/385,009 Continuation US20110179284A1 (en) | 2006-09-29 | 2009-03-27 | Information processing apparatus and information managing method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008041286A1 true WO2008041286A1 (fr) | 2008-04-10 |
Family
ID=39268153
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/319513 WO2008041286A1 (fr) | 2006-09-29 | 2006-09-29 | Processeur d'informations et procédé de gestion d'informations |
Country Status (5)
Country | Link |
---|---|
US (1) | US20110179284A1 (ja) |
EP (1) | EP2071484B1 (ja) |
JP (1) | JP4900392B2 (ja) |
CN (1) | CN101512540B (ja) |
WO (1) | WO2008041286A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015001787A (ja) * | 2013-06-13 | 2015-01-05 | コニカミノルタ株式会社 | クラウドサーバー、クラウド印刷システムおよびコンピュータープログラム |
JP2017510909A (ja) * | 2015-01-08 | 2017-04-13 | バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド | 指紋認証方法、装置、インテリジェント端末及びコンピュータ記憶媒体 |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7318550B2 (en) * | 2004-07-01 | 2008-01-15 | American Express Travel Related Services Company, Inc. | Biometric safeguard method for use with a smartcard |
US20090307140A1 (en) * | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
US20100161488A1 (en) | 2008-12-22 | 2010-06-24 | Paul Michael Evans | Methods and systems for biometric verification |
DE102009005810A1 (de) * | 2009-01-22 | 2010-07-29 | Jäger, Hubert, Dr. | Einrichtung zur Generierung eines virtuellen Netzgängers |
US8863253B2 (en) | 2009-06-22 | 2014-10-14 | Beyondtrust Software, Inc. | Systems and methods for automatic discovery of systems and accounts |
US9160545B2 (en) * | 2009-06-22 | 2015-10-13 | Beyondtrust Software, Inc. | Systems and methods for A2A and A2DB security using program authentication factors |
JP5476086B2 (ja) | 2009-10-16 | 2014-04-23 | フェリカネットワークス株式会社 | Icチップ、情報処理装置およびプログラム |
CN101815291A (zh) * | 2010-03-22 | 2010-08-25 | 中兴通讯股份有限公司 | 一种自动登录客户端的方法和系统 |
US8862767B2 (en) | 2011-09-02 | 2014-10-14 | Ebay Inc. | Secure elements broker (SEB) for application communication channel selector optimization |
US8887232B2 (en) * | 2012-02-27 | 2014-11-11 | Cellco Partnership | Central biometric verification service |
US9009817B1 (en) * | 2013-03-12 | 2015-04-14 | Open Invention Network, Llc | Virtual smart card to perform security-critical operations |
WO2015001970A1 (ja) * | 2013-07-05 | 2015-01-08 | 日本電信電話株式会社 | 不正アクセス検知システム及び不正アクセス検知方法 |
KR102204247B1 (ko) * | 2014-02-19 | 2021-01-18 | 삼성전자 주식회사 | 전자 장치의 생체 정보 처리 방법 및 장치 |
CN104036200B (zh) * | 2014-06-20 | 2017-12-12 | 宇龙计算机通信科技(深圳)有限公司 | 基于指纹标记的数据分类及加密方法、系统及移动终端 |
CN104361278A (zh) * | 2014-10-25 | 2015-02-18 | 国家电网公司 | 计算机用户身份认证方法 |
US10263959B2 (en) | 2014-11-28 | 2019-04-16 | Samsung Electronics Co., Ltd. | Method for communicating medical data |
KR20160066728A (ko) | 2014-12-03 | 2016-06-13 | 삼성전자주식회사 | 생체 정보를 저장하는 nfc 패키지 및 전자 기기 |
CN108667608B (zh) * | 2017-03-28 | 2021-07-27 | 阿里巴巴集团控股有限公司 | 数据密钥的保护方法、装置和系统 |
US10977361B2 (en) | 2017-05-16 | 2021-04-13 | Beyondtrust Software, Inc. | Systems and methods for controlling privileged operations |
KR102488001B1 (ko) * | 2018-01-22 | 2023-01-13 | 삼성전자주식회사 | 오디오 신호를 이용하여 사용자를 인증하는 전자 장치 및 그 방법 |
JP7235055B2 (ja) * | 2018-12-12 | 2023-03-08 | 日本電気株式会社 | 認証システム、クライアントおよびサーバ |
GB2584018B (en) | 2019-04-26 | 2022-04-13 | Beyondtrust Software Inc | Root-level application selective configuration |
JP7414545B2 (ja) * | 2020-01-20 | 2024-01-16 | 株式会社東芝 | 携帯可能な認証デバイス、icカードおよび認証システム |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002001328A2 (en) * | 2000-06-27 | 2002-01-03 | Intel Corporation | Biometric-based authentication in a nonvolatile memory device |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07234940A (ja) * | 1994-02-24 | 1995-09-05 | Mitsubishi Electric Corp | 個人判別装置 |
KR0161349B1 (ko) * | 1995-01-20 | 1998-11-16 | 무라따 야스따까 | 압전 자기 조성물 |
US6035398A (en) * | 1997-11-14 | 2000-03-07 | Digitalpersona, Inc. | Cryptographic key generation using biometric data |
US6160903A (en) * | 1998-04-24 | 2000-12-12 | Dew Engineering And Development Limited | Method of providing secure user access |
US6671392B1 (en) * | 1998-12-25 | 2003-12-30 | Nippon Telegraph And Telephone Corporation | Fingerprint recognition apparatus and data processing method |
ES2245305T3 (es) * | 1999-04-22 | 2006-01-01 | Veridicom, Inc. | Autenticacion biometrica de alta seguridad usando pares de encriptacion clave publica/clave privada. |
US20020038427A1 (en) * | 2000-09-28 | 2002-03-28 | Krieger Michael F. | Biometric device |
SE0003464L (sv) * | 2000-09-28 | 2002-03-29 | Netmage Ab | Metod och system för att förbättra inloggningssäkerheten i nätverkstillämpningar |
JP2002271320A (ja) * | 2001-03-13 | 2002-09-20 | Sony Corp | 情報処理装置及び方法、並びに記憶媒体 |
JP2003050783A (ja) * | 2001-05-30 | 2003-02-21 | Fujitsu Ltd | 複合認証システム |
US20040093503A1 (en) * | 2002-11-13 | 2004-05-13 | Dombrowski James Douglas | Acquisition and storage of human biometric data for self identification |
JP2005268951A (ja) * | 2004-03-16 | 2005-09-29 | Nec Corp | 携帯電話機 |
US20060015423A1 (en) * | 2004-07-14 | 2006-01-19 | Ballenger Todd K | Integrated method loan and financial planning system and method |
JP4095639B2 (ja) * | 2004-12-22 | 2008-06-04 | キヤノン株式会社 | 画像処理装置及び画像処理装置の制御方法 |
DE112007000144T5 (de) * | 2006-01-26 | 2009-04-02 | Kabushiki Kaisha Toshiba | Anlagenüberwachungs-Steuervorrichtung |
JP5019274B2 (ja) * | 2007-01-24 | 2012-09-05 | 株式会社村田製作所 | 共振アクチュエータ |
-
2006
- 2006-09-29 EP EP06810893.5A patent/EP2071484B1/en not_active Ceased
- 2006-09-29 CN CN2006800559353A patent/CN101512540B/zh not_active Expired - Fee Related
- 2006-09-29 WO PCT/JP2006/319513 patent/WO2008041286A1/ja active Application Filing
- 2006-09-29 JP JP2008537344A patent/JP4900392B2/ja not_active Expired - Fee Related
-
2009
- 2009-03-27 US US12/385,009 patent/US20110179284A1/en not_active Abandoned
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002001328A2 (en) * | 2000-06-27 | 2002-01-03 | Intel Corporation | Biometric-based authentication in a nonvolatile memory device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015001787A (ja) * | 2013-06-13 | 2015-01-05 | コニカミノルタ株式会社 | クラウドサーバー、クラウド印刷システムおよびコンピュータープログラム |
US9436423B2 (en) | 2013-06-13 | 2016-09-06 | Konica Minolta, Inc. | Cloud printing system permits unauthorized user to use MFP without exceeding constraints set for correlated quest account |
JP2017510909A (ja) * | 2015-01-08 | 2017-04-13 | バイドゥ オンライン ネットワーク テクノロジー (ベイジン) カンパニー リミテッド | 指紋認証方法、装置、インテリジェント端末及びコンピュータ記憶媒体 |
Also Published As
Publication number | Publication date |
---|---|
CN101512540B (zh) | 2011-12-07 |
EP2071484A4 (en) | 2014-06-04 |
CN101512540A (zh) | 2009-08-19 |
JP4900392B2 (ja) | 2012-03-21 |
JPWO2008041286A1 (ja) | 2010-01-28 |
US20110179284A1 (en) | 2011-07-21 |
EP2071484B1 (en) | 2019-12-11 |
EP2071484A1 (en) | 2009-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4900392B2 (ja) | 情報処理装置および情報管理方法 | |
US11764954B2 (en) | Secure circuit for encryption key generation | |
KR101043306B1 (ko) | 정보 처리 장치, 정보 관리 방법, 및 정보 관리 프로그램을 기억한 컴퓨터 판독 가능한 기억 매체 | |
US8272050B2 (en) | Data managing device equipped with various authentication functions | |
CA2786271C (en) | Anytime validation for verification tokens | |
EP3416334A1 (en) | Portable biometric identity on a distributed data storage layer | |
US20070118758A1 (en) | Processing device, helper data generating device, terminal device, authentication device and biometrics authentication system | |
US20050228993A1 (en) | Method and apparatus for authenticating a user of an electronic system | |
EP3586472B1 (en) | Trusted key server | |
CN101841418A (zh) | 手持多功能电子认证器及其服务系统 | |
US20090249079A1 (en) | Information processing apparatus and start-up method | |
JP4833294B2 (ja) | 情報処理装置および起動方法 | |
JP4253167B2 (ja) | 個人情報アクセス制御方法、端末、システム、並びに、プログラム | |
KR101069793B1 (ko) | 정보 처리 장치, 정보 관리 방법, 및 정보 관리 프로그램을 기억한 컴퓨터 판독 가능한 기억 매체 | |
WO2022255151A1 (ja) | データ管理システム、データ管理方法、及び非一時的記録媒体 | |
Sanzi et al. | Identification and Adaptive Trust Negotiation in Interconnected Systems | |
JP2004272551A (ja) | 認証用証明書と端末装置 | |
JP2004021591A (ja) | 管理装置及び認証装置 | |
Vossaert et al. | Client-side biometric verification based on trusted computing | |
JP2004254020A (ja) | 認証局システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680055935.3 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 06810893 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008537344 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006810893 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020097006432 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |