Hereinafter, a description is given of a disclosure system which discloses financial reporting data as an example. However, the disclosure system of the present invention can similarly be applied to other systems which disclose electronic data different from the financial reporting data.
As shown in
A description is given based on the financial reporting data disclosure system which is explained in Embodiment 1. For example, the submitter device 102 may be used by a company reporting the composition of finances, the electronic disclosure system 103 may receive a report and may be used by a public institution or the like which widely distributes the contents of the report to the public, the inside reader device 104 may be used by an examiner belonging to the public institution, the report creator device 105 may be used by a securities company or the like which makes an analysis or the like based on a plurality of items of the financial data disclosed, synthesizes the plurality of items of the financial data, and cites a part thereof, to thereby create an investment report for general investors (for example, to create a table for comparing profits of respective companies for the current term based on the financial reporting data of a plurality of companies), and the outside reader device 106 may be used by a general investor who inspects the financial data disclosed by the public institution and a report created by a securities company.
According to Embodiment 1, a description is given of a case where the devices exchange data through the network 101. In contrast to this, the data may also be exchanged by, for example, using a portable recording medium such as an FD, a CD-R, or a USB memory. Alternatively, in a case where the size of data to be exchanged is small, data may be exchanged by using a paper medium on which the data is printed.
The electronic disclosure device 103 may be constructed from an electronic computer 210 having a general configuration, which includes: a CPU 201; a RAM 202 which functions as a work area of the CPU 201; an external storage device 203 such as a hard disk device; a reading device 204 which reads data from a portable storage medium 205 such as a CD-ROM, a DVD-ROM, or an FD; an input device 206 such as a keyboard or a mouse; a display device 207 such as a display; a communication device 208 for performing communication with other devices through a network; and an interface 209 which administers an exchange of data between the above-mentioned constituent elements.
The external storage device 203 of the electronic disclosure device 103 stores a reception registration program (hereinafter, program is referred to as “PG”) 221 and a disclosure PG 222. Those programs are loaded onto the RAM 202 and are embodied as processes of a reception registration processor 241 and a disclosure processor 242, respectively, by the CPU 201. In addition, data (such as a signature secret key 211 and financial reporting data 212) output from and input to those processors is stored in the external storage device 203. It is desirable to make the external storage device 203 tamperproof because the external storage device 203 stores the signature secret key 211 which should be managed under particularly strict control in terms of security.
The submitter device 102, the inside reader device 104, the report creator device 105, and the outside reader device 106 each have a configuration similar to that of the electronic disclosure device 103, except in that: the submitter device 102 stores a submission PG in an external storage device thereof; the inside reader device 104 stores an inspection PG in an external storage device thereof; the report creator device 105 stores an inspection PG and a report creating PG in an external storage device thereof; and the outside reader device 106 stores an inspection PG and a report inspection PG in an external storage device thereof.
The following description is made on the assumption that each program is stored in advance in the external storage device 203. However, each program may also be introduced as necessary to the external storage device 203 or the RAM 202, via the reading device 204, through a recording medium such as an FD, a CD-ROM, or a DVD-ROM available to each device, or may be introduced, via the communication device 208, through a network such as the Internet or through a carrier wave or a digital signal propagating the network, which is a communication medium available to each device.
The financial reporting data created in Step 302 is created in accordance with a format commonly defined for the entire system. For example, the financial reporting data may be created in conformity with a format using an extensible markup language (XML) called extensible business reporting language (XBRL). For details of the XBRL, http://www.xbrl.org/ may, for example, be referred to.
Further, it is preferable to give a signature (a digital signature) of the submitter to the financial reporting data created in Step 302. By giving a signature to data as described above, it is easy to indicate that the submitter has certainly confirmed the contents of the financial reporting data to be submitted, as in the case of a handwritten signature or a seal used in a paper document, by executing a signature verifying procedure in the electronic disclosure device 103, which is the reception device. In addition, there is also a merit in that it is easy to confirm that no falsification or the like has been made to the data after the signature is given (e.g., during communication over a network). Specific examples of a digital signature technique include a well known RSA signature, a DSA signature, an ECDSA signature, and a hysteresis signature. It is also possible to use the signature technique disclosed in Document 4.
Prior to the submitter device 102 actually transmitting the financial reporting data to the electronic disclosure device 103 in Step 303, it is preferable that the submitter device 102 and the electronic disclosure device 103 both perform processing to authenticate each other. An advantage of authenticating, by the electronic disclosure device 103, the submitter device 102 or an entity performing submission processing by using the submitter device 102 lies in that it is possible to prevent registration of improper data submitted by a fake submitter. On the other hand, an advantage of authenticating, by the submitter device 102, the electronic disclosure device 103 lies in that it is possible to prevent information leakage from being caused due to masquerading of the electronic disclosure device 103. Examples of a method of authenticating, by the electronic disclosure device 103, the submitter device 102 or the entity performing submission processing by using the submitter device 102 include: a method of inputting an ID and a password registered in advance in the electronic disclosure device 103; a method of inputting biological information of the submission entity; a method of performing authentication processing using a public key certificate of the submitter; and a method of using an IC card or a USB device for authentication. Examples of a method of authenticating, by the submitter device 102, the electronic disclosure device 103 include a method of performing authentication processing using a public key certificate of the electronic disclosure device 103. One of the methods for performing authentication processing using a public key certificate includes a method of using a function of authenticating a secure socket layer (SSL) (or of mutual authentication) in performing communication between the submitter device 102 and the electronic disclosure device 103. It is preferable to perform communication by using the SSL in terms of ensuring the confidentiality, because data flowing through a communication path is encrypted when using the SSL.
Step 403: Confirm the financial reporting data thus received. Step 404: Set a portion of the financial reporting data thus received unavailable for public inspection by an outside reader, and a reader capable of inspecting the portion.
Examples of the confirmation processing performed in Step 403 include a grammar check of the XBRL (e.g., to confirm whether the data is a well-formed XML document or a valid XML document), checking whether the submission date is appropriate, and checking whether the submitter included in the financial reporting data matches an organization or an entity which has performed the submission processing. In cases where a digital signature of the submitter is given in Step 302, verification processing of the digital signature (including a validation of the public key certificate) is also included in the confirmation processing performed in Step 403. In cases of the financial reporting data described in Embodiment 1, it is desired to disclose the data submitted by a submitter to a reader (including an outside reader) as soon as possible, and therefore the description is given of an exemplary case where the inside reader device 104 does not check the data before the storing process of Step 406. However, unlike these cases, it is also possible to perform checking by using, for example, the inside reader device 104 in performing the confirmation processing of Step 403, so as not to disclose the data in cases where the checking result proves that it is inappropriate to disclose the data. In such cases, the data disclosed by the electronic disclosure device 103 has already been checked by an inside reader.
In setting a portion unavailable for public inspection in Step 404, for example, a predetermined item of the financial reporting data may be set as the portion unavailable for public inspection, or an item notified by the submitter prior to the submission of the financial reporting data, may be set as the portion unavailable for public inspection. The item unavailable for public inspection may be specified and identified by a tag name of the XBRL. As a reader capable of inspecting the portion unavailable for public inspection, an inside reader may be set. The above-mentioned setting information may be recorded and managed by a database program which is activated, for example, on the electronic disclosure device 103. Specific examples of the setting information to be managed may include: a name of the financial reporting data; an identifier uniquely assigned; a name of the submitter; a submission date and time; unavailable-portion specifying information (e.g., a tag name); and an identifier of a reader capable of inspecting a portion unavailable for public inspection. The financial reporting data itself may also be recorded in the database or another database to be managed. Further, a signature given to the financial reporting data in Step 405 may also be recorded in the database or another database to be managed.
The description of Embodiment 1 is made based on cases where an inside reader is capable of inspecting the whole of the financial reporting data including a portion unavailable for public inspection, while an outside reader is capable of inspecting only a part of the data excluding the portion unavailable for public inspection. The present invention is also applicable to cases different from the above-mentioned cases, in which there are a plurality of inside readers or outside readers and different portions of the data are made available for inspection depending on readers. In this case, information to be managed may be appropriately set based on a database or the like. For example, a database or the like may be used to manage data including identifiers of the readers and information specifying a portion available for inspection by each reader identified by each of the reader identifiers (e.g., a tag name).
Embodiment 1 is described based on cases where the sanitizable signature technique disclosed in Document 4 is used as a signature to be given in Step 405. The use of the sanitizable signature makes it possible to confirm that the data extracted for citing in the report created by the report creator device 105 matches the data stored in the electronic disclosure device 103. The processing performed by the report creator device 105 is described later.
The sanitizable signature technique includes a signature creating process, a signature sanitizing process, and a signature verifying process (in addition to those processes, a key creating process is also included as in a general signature technique). Of those processes, the signature sanitizing process is unique to the sanitizable signature technique, and is not performed in the general signature technique. Each of the processes is generally described in the following. Multiple technologies are referred to as sanitizable signature techniques. Hereinbelow, one of the technologies disclosed in Document 4, the entire contents of which is incorporated herein by reference for all purposes, is described as an example. However, the present invention is also applicable to any other case where a sanitizable signature technique different from that disclosed in Document 4 is used.
In the signature creating process, a message M to be given a signature is divided into several blocks (for example, blocks of M_1 . . . M_n). Each of those blocks is a minimum unit that can be sanitized. Next, random numbers (independently of M_i) are generated for each M_i. In the following description, the random numbers are generated as R_1 . . . R_n.
Then, by means of a cryptographic hash function h( ), H_i=h(M_i∥R_i)(i=1 . . . n) is calculated. In the expression, arithmetic symbol “∥” indicates concatenation. Finally, with respect to data obtained by concatenating H_1 . . . H_n, a signature value is generated based on a general signature technique (for example, an RSA signature or a DSA signature) by using a signature secret key. Data including the signature value and the random numbers R_1 . . . R_n is set as a signature created according to the sanitizable signature technique, with respect to the message M (=(M_1 . . . M_n)) to be given a signature.
In the signature sanitizing process, from the received message given a signature, a block to be sanitized (in this case, a block M_j) is first selected from among the blocks M_1 . . . M_n. Next, H_j=h(M_j∥R_j) is calculated. Then, M_j is deleted or replaced with data sanitizing M_j to thereby delete R_j. Data including the signature value contained in the received data, the random numbers R_1 . . . R_n (except R_j), and a hash value H_j is set as a signature with respect to the message which has undergone the signature sanitizing process. It should be noted that the signature sanitizing process is performed without the use of a signature secret key.
In the signature verifying process, H_i=h(M_∥R_i) is first calculated with respect to a block (M_i(i≠j)) that has not been sanitized. The sanitized block (M_j) does not include information on M_j or R_j, while information on H_j is included in the signed message which has been sanitized. Therefore, the information on H_j can be used to obtain H_1 . . . H_n. Accordingly, the data obtained by concatenating H_1 . . . H_n is verified by following a verification procedure in a general signature technique.
In cases where the financial reporting data does not include a portion unavailable for public inspection and a report creator cites the whole of the financial reporting data disclosed rather than citing only a part of the data, a signature such as an RSA signature, a DSA signature, an ECDSA signature, or a hysteresis signature, other than the sanitizable signature, may also be used. Even in cases of using the sanitizable signature technique, those signature technologies may also be used in combination with the sanitizable signature technique. In cases where it is necessary to certify a submission reception date and time, it is desirable that the data be given a time stamp which is configured based on a digital signature technique and other technologies and is difficult to be falsified. The signatured data may be created based on a format conforming to, for example, a standard called XML signature. In cases of using the sanitizable signature, a transform process which provides a signature creating method or a method of transforming data under the verification process according to the standard of the XML signature, for example, may be designed for the sanitizable signature. As regards the XML signature, refer to, for example, http://www.w3.org/TR/xmldsig-core/ for detail.
The signature affixing process of Step 405 and an outline of the financial reporting data which is given a signature are described later.
Step 502: Request inspection of the financial reporting data by transmitting, to the electronic disclosure device 103, the identifier of the financial reporting data for which inspection is requested and the identifier of the reader. (Processing performed by the electronic disclosure device 103 based on the disclosure PG 222)
Step 503: In relation to the financial reporting data specified by the identifier transmitted from the reader device, compare the reader who has read permission, set in Step 404 with the reader specified by the reader identifier transmitted from the reader device, and specify a portion available to the reader.
Step 504: Transmit, to the reader device, the portion of the financial reporting data specified in Step 503 as being available for public inspection, and a signature necessary for verifying the portion available for public inspection. (Processing performed by the reader device based on the inspection PG)
In order to prevent masquerading of the reader and information leakage from being caused due to the masquerading, it is desirable that the electronic disclosure device 103, prior to receiving data from the reader device, authenticate in advance the reader device or the reader operating the reader device. Examples of a method of performing the authentication include, as described above, a method of confirming the reader by using a password, a method of confirming the reader based on biologic information, a method of confirming the reader by using one of a public key encryption technique and a public key infrastructure (PKI) technique, and a method of confirming the reader by using an authentication device such as an IC card or a USB device. One of those methods may be selected or a plurality of those methods may be combined and selected as an appropriate method, in accordance with costs and a value of the information property (e.g., a portion unavailable for public inspection contained in the financial reporting data) to be protected. Also, the electronic disclosure device 103 may provide an access method for an anonymous reader, with respect to the report creator device 105 and the outside reader device 106, which does not require the authentication process described above. In this case, the reader device may transmit an identifier for the anonymous reader, as an identifier for a reader, transmitted to the electronic disclosure device 103 in Step 502. It may also be possible, when the electronic disclosure device 103 cannot receive the identifier for the reader in Step 503, to consider that an anonymous reader is sending an inspection request. For example, a Web server program is operated on the electronic disclosure device 103 while setting up an access screen which does not require the authentication process with respect to the report creator device 105 and the outside reader device 106. With respect to the inside reader device 104, an access screen may be provided for requesting the authentication process which uses an SSL mutual authentication function or the like.
In order to calculate a signature necessary for verifying a portion available for inspection, the signature being transmitted to the reader device, a process corresponding to the sanitizing process in the sanitizable signature technique, may be performed. It should be noted that this process can be performed without the use of the signature secret key of the electronic disclosure device 103. In other words, the reader device or the like can confirm, through the verification of the signature, that the financial reporting data has not been falsified since a point in time at which the financial reporting data is received by the electronic disclosure device 103, except for the portion unavailable for public inspection. According to the sanitizing process of Embodiment 1, a portion other than the portion available for inspection in the financial reporting data may be deleted, instead of replacing the portion with data corresponding to “black”. An advantage of deleting the data lies in the fact that the data size can be reduced. An outline of the sanitizing process according to Embodiment 1 is described later.
According to Embodiment 1, a description is given of an example of a specific report where items of sales are cited from each of the plurality of items of the financial reporting data different from one another submitted from submitters (companies) so as to create a table to compare profits of a plurality of companies, and the table is included in a report to investors. However, the applicable range of the present invention is not limited to this, and the present invention can be applied to other examples.
For example, the present invention can also be applied to cases where a plurality of items of the financial reporting data are submitted by the same submitter (company) in different fiscal years, and items regarding “sales” are extracted therefrom for each fiscal year, to thereby create a table which shows a change in profit of the company. Items to be extracted may be automatically decided based on a predetermined rule, or may be designated by a report creator through the input device 206 of the report creator device 105. An example of the case where the items are designated by a report creator is described later. (Processing performed by the report creator device 105 based on the report creation PG)
In order to specify the portion corresponding to “sales” in Step 602, a tag name indicating “sales” may be retrieved from the financial reporting data which is an XML file. The report created in Steps 606 and 607 may use, for example, an XML file as a format. In this case, in the process of Step 607 for embedding data, the table data and the signatures corresponding to the table data (hereinafter, collectively referred to as “table data” or the like, which can also be described as an XML file, as described later) may be additionally written into an appropriate portion of the XML file in which textural information or the like is described. Alternatively, rather than additionally writing the table data or the like itself, identification information specifying the table data or the like may be additionally written such that the table data can be referred to based on the identification information. General description of the citation process and synthesizing process according to Embodiment 1 is made hereinbelow.
Step 702: Display the report on the display device 207 in the outside reader device 106. In displaying the report, arrange the table in an appropriate position in the textual information, and further arrange a verification button close to (for example, below) the table.
Step 705: Display “the financial data included in the table is confirmed to match the data registered in the electronic disclosure device” when the signature verification result of Step 704 proves verification success, or display “the financial data included in the table may contain data which does not match the data registered in the electronic disclosure device” when the signature verification result of Step 704 proves verification failure.
In Step 702, in order to display the report on the display device 207, the report which is an XML file may be converted into, for example, an HTML by using XSL transformations (XSLT) and displayed by using a Web browser program on the outside reader device 106. Alternatively, the XML file may be converted into a portable document format (PDF) file and displayed by using a PDF file viewer program on the outside reader device 106. The process of converting the data into various files as described above may be performed by the outside reader device 106. Alternatively, the data may be converted into a file in the report creator device 105 in advance and the file obtained through the conversion may be transmitted to the outside reader device 106.
According to the flow shown in
A process of giving a signature through the sanitizable signature technique is summarized as follows. There is a plurality of technologies known as the sanitizable signature technique. Hereinbelow, one of the technologies disclosed in Document 4 is described as an example. However, the present invention is also applicable to any other case where a sanitizable signature technique different from that disclosed in Document 4 is used. For example, there may also be used a sanitizable signature technique as disclosed in Document 4, which is capable of prohibiting additional sanitization of the signature.
It is preferable to adopt a sanitizable signature technique capable of prohibiting additional sanitization, as in cases where, for example, the electronic disclosure device 103 discloses data in a manner that prohibits additional sanitization with respect to the data item (e.g., a company name) that must be cited, because the above-mentioned technique does not allow the report creator device 105 to cite any other data item while leaving off the data item that must be cited. In cases of using another sanitizable signature technique as described above, the sanitizable signature technique being different from the technique described in Embodiment 1, a signature format, a procedure, or the like may also be appropriately changed accordingly, depending on the technique to be used. The “regionInfo” information may be defined by analyzing, every time financial reporting data is submitted, the financial reporting data, or may be defined in advance (i.e., before the data is submitted) in cases where the format of the financial reporting data is predetermined. First, the electronic disclosure device 103 divides the financial reporting data 801 which has originally been submitted, based on the “regionInfo” information. The following description is made based on the assumption that the financial reporting data 801 is divided into regions of M_1 . . . M_n each including data (n=5 in the case of
In order to make clear the correspondence between the financial reporting extraction portion and the signature, in the example of
The process of citing a part of the financial reporting data is performed based on the sanitizing process in the sanitizable signature technique. This process is summarized as follows. In this case, a description is given of the process performed by the report creator device 105 for creating a report (Steps 602 and 603). However, the process performed by the electronic disclosure device 103 for disclosing the financial reporting data including a portion unavailable for public inspection may also follow the same procedure.
Hereinbelow, a description is given of an exemplary case where the report creator device 105 extracts, out of the financial reporting data of ABC Corp. shown in
The process performed by the outside reader device 106 for verifying data cited from the financial reporting data (the process of Step 704) is summarized as follows. In the following, a description is given of a procedure of verifying the financial reporting extraction portion 903 of the ABC Corp. and the signature 905. The data of XYZ Corp. can similarly be verified. By referring to the attribute of the “objectInfo” tag of the signature 905, it is possible to identify that the signature 905 corresponds to the financial reporting extraction portion 903 of ABC Corp. (the same goes for the data of XYZ Corp.). The verification success for both of the companies indicates the success of the verification of the data as a whole which is cited and synthesized as shown in
As has been described in the above, according to Embodiment 1, the electronic disclosure device 103, which has received financial reporting data submitted from the submitter device 102, gives a signature to the financial reporting data according to the sanitizable signature technique and stores the data. The report creator device 105 obtains, from the electronic disclosure device 103, one or more portions available for public inspection, of the financial reporting data given a signature, and creates a report by citing a part of the data or synthesized parts of the data. The outside reader device 106 verifies the signature included in the report obtained from the report creator device 105, to thereby confirm, without making an inquiry to the electronic disclosure device 103, that the data corresponding to the portion cited for inclusion in the report finally configured matches the data stored in the electronic disclosure device 103.
The description of Embodiment 1 has been made on an exemplary case where one electronic disclosure device 103 exists. However, the present invention is also applicable to other cases different from the above where a plurality of the electronic disclosure devices 103 exist. In such cases, the financial reporting data to be synthesized in a report created by the report creator device 105 may include data disclosed by the plurality of electronic disclosure devices 103. For example, financial reporting data submitted by a Japanese company to the electronic disclosure device 103 operated by Japanese public organizations and the like, which discloses the data, may be synthesized with financial reporting data submitted by a U.S. company to another electronic disclosure device 103 operated by U.S. public organizations and the like, and a part of the synthesized data is cited, to thereby create a report in which the data of the Japanese company and the data of the U.S. company are compared with each other.
The description of Embodiment 1 has been made on an exemplary case where the devices are independent of one another. The present invention is similarly applicable to other cases different from the above.
For example, there may be provided an embodiment in which the report creator device 105 matches the submitter device 102. Examples of a situation in which this embodiment works effectively include investor relations (IR) activities in a company. Many companies post their financial reporting data on their websites or the like as part of their investor relations (IR) activities. However, in conventional cases, it is necessary for investors or the like accessing the website to make an inquiry to an electronic disclosure device 103 in order to confirm that the posted data matches the data stored in the electronic disclosure device 103 which is operated by public organizations for widely disclosing the contents reported by each company. According to Embodiment 2, however, the investors or the like can confirm that data posted on a website of a company matches the data stored in the electronic disclosure device 103 by verifying the signature of the electronic disclosure device 103 contained in the data posted on the data on the website of the company.
Further, the investors or the like may create and disclose a report which cites a point of particular note in the financial reporting data of the company, or changes in data values in recent years. According to Embodiment 2, the investors are also capable of confirming that the data cited and synthesized as described above matches the data stored in the electronic disclosure device 103 by verifying the signature of the electronic disclosure device 103 contained in the data posted on the website of the company. Accordingly, Embodiment 2 is effective for companies in terms of improving the quality of investor relation (IR) activities, and also effective for investors by saving them the trouble of having to make an inquiry to the electronic disclosure device 103. Embodiment 2 is also effective for the electronic disclosure device 103 in terms of reducing the processing load thereof due to the reduced number of accesses for confirming data matches.
In each of embodiments described above, a description has been given concerning a disclosure system for financial reporting data, as an example. However, the scope of application of the present invention is not limited to the above, and the present invention is applicable to other disclosure systems. For example, the present invention can be applied to one or more of systems, including a system for disclosing construction application information, a system for disclosing design information of various vehicles, devices, or facilities, a system for disclosing patent application information, a system for disclosing medical information and pharmaceutical information, a system for disclosing damage information in an accident or a disaster, and a system for disclosing evaluation information relating to various contents.
The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that various modifications and changes may be made thereto without departing from the spirit and scope of the invention as set forth in the claims.
Number | Date | Country | Kind |
---|---|---|---|
2006-197565 | Jul 2006 | JP | national |