Embodiments described herein relate generally to an information management system, an authentication device, and a personal information server.
In recent years, a self-sovereign identity system has been considered. A self-sovereign identity system is a system based on the concept of an individual managing data from conventional centralized data management. A self-sovereign identity system is envisioned to receive and provide personal qualification information using a mobile device such as a smartphone or a personal computer (PC).
In the conventional centralized system, the platform provider collectively manages data; thus, there is a large risk in terms of privacy and data protection such as the leakage of personal information of a large number of people or the occurrence of large-scale unauthorized use of data by a third person when there is a security attack to the collectively managed data. In contrast, in a self-sovereign identity system, it is expected that the risk related to data protection is reduced by distributed information management, data handling by an individual, and one-to-one data transfer to and from a reliable person.
However, individuals such as elderly people are often unfamiliar with the operation of information devices such as a smartphone and a PC. Individuals who are unfamiliar with the use of such information devices may have difficulty managing their own data with a self-sovereign identity system. Thus, in order to implement a self-sovereign identity system, an operation using a user interface or the like that is easy to understand is necessary. Also, in a self-sovereign identity system, a user himself/herself needs to manage and store information such as a secret key safely. If it is assumed that a user himself/herself safely stores information, there is a concern about, for example, the leakage of a key due to an attack by a computer virus or the like in a smartphone or a PC possessed by the user.
Hereinafter, embodiments will be described with reference to the drawings.
First, a procedure for issuing (registering) an authentication device used in an information management system according to an embodiment will be described.
In the configuration example shown in
The IC card 2 is an example of an authentication device having a function of performing biometric authentication. The IC card 2 as an authentication device is issued to each individual, and has a function of authenticating the holder using biological information.
The IC card 2 as an authentication device includes a biometric sensor 20 for acquiring biological information as authentication information acquired from a person. In the embodiment, descriptions will be provided assuming that the IC card 2 as an authentication device is a fingerprint authentication card (a fingerprint sensor card) having, as the biometric sensor 20, a fingerprint sensor that reads a fingerprint, which is an example of biological information. The IC card 2 performs fingerprint authentication (biometric authentication) as identity verification by collating a fingerprint read by the fingerprint sensor (biometric sensor) 20 with a fingerprint of a holder (registrant) registered in advance in a memory in the IC card 2.
The authentication device according to the embodiment is not limited to the fingerprint sensor card which is an IC card provided with a fingerprint sensor. For example, the authentication device may be a portable electronic device that performs biometric authentication using biological information other than fingerprints, or may be hardware such as a smartphone.
In the embodiment, it is assumed that the holder of the IC card 2 has a personal information server 4 for managing information such as personal information and qualification information of the holder. The personal information server 4 is called a repository. The personal information server 4 constitutes a self-sovereign identity system that manages information in a distributed manner for each individual and allows each individual to handle data. The self-sovereign identity system differs from a centralized data management system which makes a platform provider collectively manage data, and securely transfers data such as personal qualification information managed in a distributed manner by the personal information server 4 of each individual by utilizing personal authentication via an authentication device, thereby improving privacy protection of the data.
The personal information server 4 is provided for each holder of the IC card 2 who is a target person who manages personal information such as qualification information. The personal information server 4 stores personal information such as qualification information as information on the holder of the IC card 2. The personal information server 4 has a function of securely communicating with the IC card 2 through mutual authentication with the IC card 2 as an authentication device. The personal information server 4, which is a repository of the holder of the IC card 2, is connected to the network. The location of the personal information server (the location of the server) is indicated by an address over the network such as a URL.
The terminal 1 is an information processing device that includes a card interface for communicating with the IC card 2 as an authentication device and a network interface for communicating with the registration apparatus 3. The terminal 1 may be any terminal as long as it can mediate communication between the IC card and the registration apparatus 3. The terminal 1 is not limited to a device that includes a card interface (card reader-writer) that communicates with the IC card 2, and may be a device that includes an interface for connecting to a card reader-writer as an external device. The terminal 1 is, for example, a user terminal such as a smartphone, tablet PC, personal computer (PC), or the like operated by the user.
The registration apparatus 3 is an apparatus that functions to communicate with an external apparatus via a network and manages a hardware security module (HSM) 3A in which personal information is registered. The registration apparatus 3 is, for example, a server operated by a public organization, and manages the HSM 3A that stores personal information including biological (fingerprint) information of each individual managed by the public organization and a URL of a repository (a location of a server such as an address).
The HSM 3A is a device that securely stores information. In the embodiment, the HSM 3A has a function of performing fingerprint verification (biometric authentication) between the stored registered fingerprint information and the fingerprint information provided via the terminal 1 and the registration apparatus 3 and acquired by the IC card 2. The HSM 3A further has a function of generating a key pair consisting of a secret key and a public key and securely storing the secret key.
Next, a configuration of a control system in the IC card 2 as an authentication device according to an embodiment will be described.
The IC card 2 is an authentication device that is activated (becomes operable) by power supplied from an external device. The IC card 2 is also referred to as a smart card. As shown in
In the configuration example shown in
The processor 21 includes a circuit that executes various types of processing. The processor 21 is, for example, a central processing unit (CPU). The processor 21 controls the entire IC card 2. The processor 21 implements various processing functions by executing the programs stored in the ROM 22 or the data memory 24. However, some or all of the various functions executed by the processor 21, which will be described later, may be implemented by a hardware circuit.
The ROM 22 is a non-volatile memory that functions as a program memory. A control program, control data, and the like are stored in advance in the ROM 22. The ROM 22 is incorporated into the IC card 2 in a state where a control program, control data, and the like are stored in the ROM 22 in a manufacturing stage. The control program and the control data stored in the ROM 22 are incorporated in advance according to the specifications of the IC card 2. For example, a program for causing the processor 21 to execute processing corresponding to a command received from an external device (card reader-writer) is stored in the ROM 22.
The RAM 23 is a volatile memory that functions as a working memory. The RAM 23 also functions as a buffer for temporarily storing data that is being processed by the processor 21, etc. For example, the RAM 23 functions as a communication buffer that temporarily stores data transmitted and received to and from an external device via the communication interface 25.
The data memory 24 is a non-volatile memory in which data can be written and rewritten. The data memory 24 is composed of, for example, an electrically erasable programmable read only memory (EEPROM (registered trademark)) or the like. A program and various kinds of data according to the operational use of the IC card 2 are written in the data memory 24. A program file, a data file, etc., are defined in the data memory 24, and a control program and various kinds of data are written in these files. Some or all areas of the data memory 24 are tamper-resistant, and data can be stored securely. For example, information such as key information is stored in a storage area of the data memory 24 that can securely store data.
The data memory 24 has a storage area 24a for storing biological information of the holder of the IC card 2. If the IC card 2 is a fingerprint sensor card for performing biometric authentication using a fingerprint, fingerprint information as biological information of the user as the holder is written in the storage area 24a of the IC card 2. In the embodiment described below, it is assumed that the user holds the IC card 2 in a state where fingerprint information as biological information of the holder is written in the storage area 24a of the data memory 24.
The communication interface 25 includes a communication control unit and an interface unit, and constitutes a communication unit. The communication interface 25 is an interface for communication connection with the card interfaces (card reader-writers) included in the terminal devices such as the terminal 1 and a counter terminal 5 (see
If the IC card 2 is realized as a non-contact IC card, the communication interface 25 forms a communication unit that communicates in a non-contact (wireless) manner with the card interfaces included in the terminal devices or the card reader-writers (RWs) connected to the terminal devices via an interface. In this case, the communication interface 25 includes an antenna for transmitting and receiving radio waves, and is formed of, for example, a modulation circuit for generating radio waves to be transmitted from the antenna and a demodulation circuit for generating a signal from radio waves received by the antenna.
If the IC card 2 is realized as a contact IC card, the communication interface 25 forms a communication unit that communicates in a contact manner with the card interfaces included in the terminal devices or the card RW connected to the terminal devices via an interface. In this case, the communication interface 25 includes a contact portion that physically and electrically contacts a contact portion provided in the card RW, and is formed of, for example, a communication control circuit that controls transmission and reception of a signal via the contact portion.
The biometric sensor 20 is an example of an authentication information acquisition unit that acquires authentication information. The biometric sensor 20 is a sensor that acquires biological information of a person as authentication information used for an authentication process. In the embodiment, the biometric sensor 20 is a fingerprint sensor that reads fingerprint information (a fingerprint image) of a user. The fingerprint sensor 20 as a biometric sensor is provided so that a sensor for reading a fingerprint is exposed on the surface of the card main body C, and reads a fingerprint of a finger of a person held over the exposed sensor portion. Fingerprint verification is performed by collating the fingerprint information read by the fingerprint sensor 20 with the fingerprint information stored in the storage area 24a of the data memory 24.
The biometric sensor 20 is not limited to a fingerprint sensor, and may be a sensor that acquires biological information other than a fingerprint (such as a palm print, a vein, an iris, etc.). If the IC card 2 is provided with a sensor for acquiring biological information other than a fingerprint, the IC card 2 may be provided with a function of performing biometric authentication corresponding to the biological information acquired by the sensor (e.g., an IC chip that executes palm print verification, vein verification, iris verification, etc.).
Next, a configuration of the registration apparatus 3 for issuing (registering) the IC card 2 as an authentication device used in the information management system according to an embodiment will be described.
As shown in
The processor 31 executes various kinds of processing by executing programs. The processor 31 is, for example, a central processing unit (CPU). The processor 31 is connected to each unit in the registration apparatus 3 via a system bus and transmits and receives data to and from each unit. The processor 31 performs operations such as control and data processing in the registration apparatus 3 in cooperation with the ROM 32 and the RAM 33.
The ROM (read only memory) 32 is a non-volatile memory that stores a program, control data, and the like for implementing basic operations of the registration apparatus 3.
The RAM (random access memory) 33 is a volatile memory that temporarily stores data. The RAM 33 functions as a working memory if the processor 31 executes a program.
The data memory 34 is a storage unit for storing various kinds of data. The data memory 34 is formed of a non-volatile memory in which data can be rewritten. For example, the data memory 34 stores an OS program, an application program, operation setting information, and the like.
The communication unit 35 is a communication interface for communicating with an external device. The communication unit 35 may perform wireless communication or wired communication. In the embodiment, the communication unit 35 communicates with the terminal 1 used by a user via a wide-area network such as the Internet. Through the communication unit 35, the processor 31 executes secure communication with the IC card 2 via the terminal 1.
The interface 36 is an interface for accessing the HSM 3A. The interface 36 may be any interface that complies with the interface standard of the HSM 3A. The HSM 3A may be a device connected to the registration apparatus 3 connected via the interface 36.
The HSM 3A securely stores information including the fingerprint information as biological information of the holder of the IC card 2 and the address (URL) of the repository. The HSM 3A also has functions of performing biometric verification between biological information input from the registration apparatus 3 and stored biological information and outputting the biometric verification result. The HSM 3A can securely implement biometric verification since it can perform biometric verification without outputting the stored biological information to the outside.
Next, an issuing process for issuing (registering) the IC card 2 used in the information management system according to an embodiment will be described.
In the operation example shown in
IC card 2 and the HSM 3A are assumed to have functions of securely communicating with each other via the terminal 1 and the registration apparatus 3.
The processor 21 of the IC card 2 connects to the terminal 1 via the communication I/F 25, and communicates with the registration apparatus 3 via the network communication function of the terminal 1. When the communication state with the registration apparatus 3 is established via the terminal 1, the processor 21 of the IC card 2 executes mutual authentication between the IC card 2 and the HSM 3A (ST11).
When the mutual authentication between the IC card 2 and the HSM 3A is successful, the processor 21 of the IC card 2 transmits the fingerprint information of the holder of the IC card 2 stored in the storage area 24a of the data memory 24 to the HSM 3A of the registration apparatus 3 (ST12). The HSM 3A performs fingerprint verification between the fingerprint information acquired from the IC card 2 and the stored registered fingerprint information (ST13). If the fingerprint information acquired from the IC card 2 successfully matches the registered fingerprint information, the HSM 3A notifies the IC card 2 of the successful matching via the registration apparatus 3 and the terminal 1 (ST14).
After the fingerprint verification of the fingerprint information acquired from the IC card 2 is successful, the HSM 3A generates a key pair consisting of a secret key and a public key (ST15). When the key pair is generated, the HSM 3A securely stores (registers) the generated secret key (ST16). After registering the secret key, the HSM 3A transmits the public key to the IC card 2 (ST19).
On the other hand, if the processor 21 of the IC card 2 receives a notification that the fingerprint verification of the fingerprint read by the fingerprint sensor 20 in the HSM 3A is successful, the processor 21 generates a key pair consisting of a secret key and a public key (ST17). When the key pair is generated, the processor 21 stores (registers) the generated secret key in a secure storage area of the data memory 24 (ST18). After storing the secret key, the processor 21 transmits a public key corresponding to the stored secret key to the HSM 3A (ST19).
That is, each of the IC card 2 and the HSM 3A, which have succeeded in mutual authentication, generates a key pair consisting of a secret key and a public key if the fingerprint information acquired by the IC card 2 and the fingerprint information stored by the HSM 3A successfully match each other. The IC card 2 and the HSM 3A store the secret keys generated by themselves and exchange public keys corresponding to the secret keys. The IC card 2 and the HSM 3A can encrypt and verify the data by using the key pairs generated by the IC card 2 and the HSM 3A themselves.
When the HSM 3A obtains the public key generated by the IC card 2, the HSM 3A digitally signs the public key generated by the IC card 2 and the URL of the repository of the holder of the IC card 2 by using the private key (ST20). When the digitally signed public key and URL are generated, the HSM 3A transmits the generated digitally signed public key and URL to the IC card 2 (ST21).
The IC card 2 receives the digitally signed public key and URL generated by the HSM 3A via the communication interface 25. If the processor 21 of the IC card 2 receives the digitally signed public key and URL from the HSM 3A, the processor 21 stores the digitally signed public key and URL from the HSM 3A in the data memory 24 (ST22). The processor 21 of the IC card 2 verifies the public key generated by the IC card 2 and digitally signed by the HSM 3A, thereby verifying the correctness of the URL (the URL of the repository of the holder) received together with the public key generated by the IC card 2 itself.
Next, a process of providing the qualification information stored in the personal information server 4, which is a repository of the holder of the IC card 2, in the information management system according to an embodiment and a process of registering the qualification information in the personal information server 4 in the information management system according to an embodiment will be described.
In the configuration example shown in
As shown in
The counter terminal 5 is an information processing device that includes a card interface for communicating with the IC card 2 as an authentication device and a network interface for communicating with the personal information server 4 via a network. The counter terminal 5 has a function of mediating communication between the IC card 2 and the personal information server 4. The counter terminal 5 connects the IC card 2 presented by a user to the card interface, and acquires information such as qualification information of the holder of the IC card 2 held by the personal information server 4. For example, the counter terminal 5 acquires the qualification information of the holder of the IC card 2 held by the personal information server 4, and performs procedures for various services for the person based on the acquired qualification information. The counter terminal 5 may be configured to perform a procedure for registering (writing) information such as qualification information of the holder of the IC card 2 in the personal information server 4. For example, the counter terminal 5 requests that the qualification information of the holder of the IC card 2 be written in the personal information server 4, which is a repository of the person.
The personal information server 4 is a repository of the holder of the IC card 2. As described above, the personal information server 4 manages information (e.g., personal information such as qualification information) of the holder of the IC card 2. The personal information server 4 provides the information on the holder of the IC card 2 stored therein in response to a request from the terminal device to which the IC card 2 is connected. Also, the personal information server 4 registers (stores) information such as new qualification information as the information on the holder of the IC card 2 in response to a request from the terminal device to which the IC card 2 is connected.
As shown in
The processor 41 executes various kinds of processing by executing programs. The processor 31 is, for example, a central processing unit (CPU). The processor 41 transmits and receives data to and from each unit of the personal information server 4 via a system bus. The processor 41 performs operations such as control and data processing in the personal information server 4 in cooperation with the ROM 42 and the RAM 43.
The ROM (read only memory) 42 is a non-volatile memory that stores a program, control data, and the like for implementing basic operations of the personal information server 4.
The RAM (random access memory) 43 is a volatile memory that temporarily stores data. The RAM 43 functions as a working memory if the processor 41 executes a program.
The data memory 44 is a storage unit for storing various kinds of data. The data memory 44 is formed of a non-volatile memory in which data can be rewritten. For example, the data memory 44 stores an OS program, an application program, operation setting information, and the like.
The communication unit 45 is a communication interface for communicating with an external device. The communication unit 45 may perform wireless communication or wired communication. In the embodiment, the communication unit 45 communicates with the counter terminal 5 via a wide-area network such as the Internet. Through the communication unit 45, the processor 41 executes secure communication with the IC card 2 via the counter terminal 5.
Next, an information providing process for providing information held by the personal information server 4 using the IC card 2 in the information management system according to an embodiment will be described.
In the description of the operation example shown in
A clerk at the counter who accepts the procedure for starting the service inputs an instruction to start the procedure for starting the service to an operation unit (not shown) of the counter terminal 5 in response to a request from the user, and presents the IC card 2 as an authentication device held by the user to an IC card interface (not shown) of the counter terminal 5. When the user presents the IC card 2 to the counter terminal 5, the counter terminal 5 provides a fingerprint verification command to the IC card 2 (ST31).
The IC card 2 receives the fingerprint verification command from the counter terminal 5 through the communication interface 25. When the IC card 2 receives the fingerprint verification command, the processor 21 of the IC card 2 reads a fingerprint using the fingerprint sensor 20, and executes fingerprint verification for verifying the fingerprint read by the fingerprint sensor 20 with the fingerprint of the holder held in the storage area 24a (ST32).
When the processor 21 of the IC card 2 executes the fingerprint verification in response to the fingerprint verification command, the processor 21 transmits the result of the fingerprint verification to the counter terminal 5. Here, it is assumed that the fingerprint verification in the IC card 2 is successful. When the fingerprint verification is successful, the processor 21 notifies the counter terminal 5 of the successful fingerprint verification as a response to the fingerprint verification command (ST33).
When the counter terminal 5 receives the notification that the fingerprint verification is successful from the IC card 2, the counter terminal 5 displays the success of the fingerprint verification on a display (not shown) of the counter terminal 5. Thus, the clerk who operates the counter terminal 5 confirms that the person who presents the IC card 2 is the holder of the IC card 2. After confirming that the person who presents the
IC card 2 is the holder of the IC card 2, the clerk instructs the operation unit of the counter terminal 5 to acquire the information indicating a storage location (repository) of the information on the holder of the IC card 2. The counter terminal 5 provides a read command for requesting the reading of the information indicating the repository of the holder (herein, the URL of the repository) to the IC card 2 in response to the operation instruction (ST34).
The IC card 2 receives the read command requesting the reading of the URL of the repository from the counter terminal 5 through the communication interface 25. When the IC card 2 receives the read command, the processor 21 of the IC card 2 reads, from the data memory 24, the URL of the repository specified to be read by the command. The processor 21 generates response data to the read command, in which the URL of the repository read from the data memory 24 is set, and transmits the generated response data to the counter terminal 5 (ST35).
When the counter terminal 5 receives the response data including the URL of the repository from the IC card 2, the counter terminal 5 accesses the URL of the repository acquired from the IC card 2. As a result, the personal information server 4 as the repository of the holder of the IC card 2 and the counter terminal 5 start communication via the network.
The processor 41 of the personal information server 4 receives the access from the counter terminal 5 via the communication unit 45 and establishes a session with the counter terminal 5 (ST36). When the processor 41 of the personal information server 4 establishes a session with the counter terminal 5, the processor 41 receives terminal identification information for identifying the counter terminal 5 from the counter terminal 5 (ST37).
When the processor 41 of the personal information server 4 receives the terminal identification information of the counter terminal 5, the processor 41 executes mutual authentication with the IC card 2 connected to the counter terminal 5 specified by the received terminal identification information (ST38). The personal information server 4 and the IC card 2 perform mutual authentication for authenticating each other by communicating with each other via the network and the counter terminal 5. When the mutual authentication is successful, the processor 41 of the personal information server 4 and the processor 21 of the IC card 2 establish a secure channel via the counter terminal 5 (ST39).
When the processor 41 of the personal information server 4 establishes a secure channel with the IC card 2, the processor 41 acquires a public key ID indicating a public key of the counter terminal 5 from the counter terminal 5 (ST40). When the processor 41 of the personal information server 4 acquires the public key ID of the counter terminal 5, the processor 41 acquires the public key of the counter terminal 5 indicated by the public key ID (ST41). When the processor 41 of the personal information server 4 acquires the public key of the counter terminal 5, the processor 41 transmits a command for requesting the generation of a key pair to the IC card 2 (ST42).
The IC card 2 receives the command for requesting the generation of a key pair from the personal information server 4 through the communication interface 25 via the counter terminal 5. If the IC card 2 receives the command for requesting the generation of a key pair from the personal information server 4, the processor 21 of the IC card 2 generates a key pair consisting of a secret key and a public key (ST43). When the processor 21 generates the key pair, the processor 21 stores the generated secret key and the public key ID indicating the public key in the data memory 24 (ST44).
The processor 21 stores at least the secret key in a secure memory area of the data memory 24. After storing the secret key and the public key ID, the processor 21 of the IC card 2 transmits the public key and the public key ID to the personal information server 4 through secure communication with the personal information server 4 via the counter terminal 5 (ST45).
The personal information server 4 receives the public key and the public key ID from the IC card 2 via the counter terminal 5. The processor 41 of the personal information server 4 stores the public key received from the IC card 2 in the data memory 44 (ST46). When the processor 41 of the personal information server 4 stores the public key of the IC card 2, the processor 41 transmits the public key ID indicating the public key of the IC card 2 to the counter terminal 5 through the communication unit 45 via the network (ST47).
The counter terminal 5 acquires the public key ID indicating the public key of the IC card 2 from the personal information server 4 (ST48). Thus, the counter terminal 5 can acquire the public key of the IC card 2 disclosed by the personal information server 4. In this state, the counter terminal 5 can acquire the information on the holder of the IC card 2 managed by the personal information server 4.
That is, after acquiring the public key ID of the IC card, the counter terminal 5 specifies the information (qualification information) to be acquired as information on the holder of the IC card 2 in order to start providing a service such as opening an account to the holder of the IC card 2 (ST51). For example, the counter terminal 5 displays the qualification information to be acquired on the display. The clerk at the counter verifies the qualification information to be acquired that is displayed on the display and instructs the acquisition of the qualification information through the operation unit. When the qualification information to be acquired is specified, the counter terminal 5 transmits, to the personal information server 4, a read request including identification information (a qualification information identifier) indicating the qualification information to be acquired (ST52).
The personal information server 4 receives the request for reading the qualification information of the holder of the IC card 2 from the counter terminal 5 through the communication unit 45 (ST53). When the personal information server 4 receives the request for reading the qualification information from the counter terminal 5, the processor 41 of the personal information server 4 acquires the qualification information requested to be read (ST53).
The processor 41 of the personal information server 4 specifies the qualification information to be read by the qualification information identifier included in the read request, and reads the specified qualification information from the information on the holder of the IC card 2 stored in the data memory 44. When the processor 41 reads the qualification information requested to be read, the processor 41 transmits the qualification information read from the data memory 44 to the IC card 2 with which the processor 41 has established the secure channel (ST54).
The IC card 2 receives the qualification information of the holder of the IC card 2 read from the data memory 44 by the personal information server 4 through secure communication with the personal information server 4. When the IC card 2 receives the qualification information from the personal information server 4, the processor 21 of the IC card 2 gives a digital signature to the received qualification information (ST55). The processor 21 uses the secret key stored in the data memory 24 in ST44 described above to give a digital signature to the qualification information received from the personal information server 4. After giving a signature to the qualification information from the personal information server 4, the processor 21 transmits, to the personal information server 4, the signed qualification information with the digital signature (ST56).
The personal information server 4 receives the qualification information signed by the IC card 2 through secure communication with the IC card 2. When the personal information server 4 receives the signed qualification information from the IC card 2, the processor 41 of the personal information server 4 stores the received signed qualification information in the RAM 43 or the data memory 44.
The processor 41 of the personal information server 4 issues a one-time token while holding the qualification information signed by the IC card 2 (ST56). When the processor 41 issues a one-time token, the processor 41 encrypts the one-time token and transmits the encrypted one-time token to the IC card 2 through secure messaging with the IC card 2 (ST57).
The IC card 2 receives the encrypted one-time token from the personal information server 4 via the counter terminal 5 through secure messaging. When the IC card 2 receives the encrypted token through secure messaging from the personal information server 4, the processor 21 of the IC card 2 decrypts the received data to acquire the one-time token (ST58). The processor 21 also verifies the authenticator of the secure messaging from the personal information server (ST59).
After verifying the authenticator of the secure messaging from the personal information server 4, the processor 21 of the IC card 2 supplies the counter terminal 5 with the token (one-time token) acquired from the personal information server 4 (ST60).
The counter terminal 5 acquires the one-time token decrypted by the IC card 2 from the IC card 2 connected to the card interface. The counter terminal 5 transmits the one-time token acquired from the IC card 2 to the personal information server 4 (ST61). The one-time token is data that is issued, encrypted, and transmitted by the personal information server 4 to the IC card 2. After the one-time token encrypted by the personal information server 4 is decrypted using the IC card 2, the counter terminal 5 acquires the decrypted one-time token. Thus, if the encryption by the personal information server 4 and the decryption by the IC card 2 are executed normally, the one-time token transmitted from the counter terminal 5 to the personal information server 4 matches the one-time token originally generated by the personal information server 4.
The personal information server 4 transmits the encrypted one-time token to the IC card 2 through secure messaging, and then receives the one-time token (challenge data of the one-time token) from the counter terminal 5. When the personal information server 4 receives the one-time token from the counter terminal 5, the processor 41 of the personal information server 4 verifies whether the one-time token received from the counter terminal 5 matches the one-time token issued by the personal information server 4 and transmitted to the IC card 2 through secure messaging (ST62).
If the token received from the counter terminal 5 matches the one-time token issued by the processor 41 of the personal information server 4, the processor 41 stores, in the data memory 44, history information indicating that the qualification information is provided to the counter terminal 5 (ST63), and transmits the qualification information signed by the IC card 2 and stored in the RAM or the like to the counter terminal 5 (ST64).
The counter terminal 5 transmits the one-time token received from the IC card 2 to the personal information server 4, and then receives the qualification information signed by the IC card 2 from the personal information server 4. When the counter terminal 5 receives the qualification information signed by the IC card 2 from the personal information server 4, the counter terminal 5 acquires the public key of the IC card 2 using the public key ID acquired from the personal information server 4 in ST48. The counter terminal 5 acquires the qualification information of the holder of the IC card 2 by decrypting the qualification information signed by the IC card 2 using the public key of the IC card 2 (ST65).
According to the above process, by connecting the IC card held by the user to the counter terminal and performing fingerprint authentication, it is possible to provide the information on the holder of the IC card stored in the personal information server to the counter terminal. Thus, the user can provide information such as the qualification information of the user stored in the personal information server to the counter terminal by simply performing fingerprint authentication using the IC card without performing complicated operations, and can perform operations such as displaying the qualification information of the user on the display of the counter terminal.
According to the embodiment described above, the personal information server transmits, to the IC card, the qualification information of the holder of the IC card requested from the counter terminal after the holder of the IC card is verified by the fingerprint authentication. The IC card transmits, to the personal information server, signed qualification information obtained by digitally signing the qualification information received from the personal information server. The personal information server provides the counter terminal with the qualification information signed by the IC card and acquired from the IC card. The counter terminal receives the qualification information signed by the IC card from the personal information server and acquires the qualification information using the public key of the IC card. That is, the information management system according to the embodiment can provide the counter terminal with the qualification information stored in the personal information server after digitally signing the qualification information using the IC card whose holder has been identified by the biometric authentication, and can safely provide the counter terminal with the qualification information stored in the personal information server.
Also, according to the embodiment described above, the personal information server issues a one-time token and transmits the issued one-time token to the IC card through secure messaging. The IC card decrypts the one-time token received from the personal information server through secure messaging, and transmits the decrypted one-time token to the counter terminal. The counter terminal transmits the one-time token decrypted by the IC card to the personal information server. The personal information server provides the information on the holder of the IC card to the counter terminal if the one-time token received from the counter terminal is correct. Thus, the information stored in the personal information server can be provided to the counter terminal after it is confirmed that the one-time token transmitted by the counter terminal is a valid one-time token obtained via the IC card whose holder has been identified by the biometric authentication.
Next, an information providing process for providing information held by the personal information server 4 using the IC card 2 in the information management system according to an embodiment will be described.
The operation example shown in
The process shown in
The counter terminal 5 and the personal information server 4 indicated by the URL of the repository establish a communication session through the same procedure as the procedure of ST36 shown in
The IC card 2 and the personal information server 4 further establish a secure channel by performing mutual authentication through the same process as the process of ST38 to ST37 shown in
The personal information server 4 acquires the public key of the counter terminal 5 through the same process as the process of ST40 to ST41 shown in
Further, through the same process as the process of ST40 to ST41 shown in
After the counter terminal 5 acquires the public key of the IC card 2, the qualification information to be registered (stored) (the information to be written) in the personal information server 4, which is the repository of the holder of the IC card 2, is specified to the counter terminal 5 (ST71). Herein, it is assumed that the counter terminal 5 is in a state of holding new qualification information of the holder of the IC card 2 to be registered in the personal information server 4.
For example, the counter terminal 5 displays the qualification information to be registered (stored) in the personal information server 4, which is the repository of the holder of the IC card 2, on the display. The clerk at the counter verifies the qualification information to be registered in the repository that is displayed on the display, and instructs the storage of the qualification information through the operation unit. When the qualification information to be registered in the repository is specified, the counter terminal 5 transmits a request for writing the qualification information to be registered (write information) to the personal information server 4 (ST72).
The personal information server 4 receives the request for writing the qualification information as the information on the holder of the IC card 2 from the counter terminal 5 through the communication unit 45. When the personal information server 4 receives the request for writing the qualification information from the counter terminal 5, the processor 41 of the personal information server 4 issues a one-time token (ST73). When the processor 41 issues a one-time token, the processor 41 encrypts the one-time token and transmits the encrypted one-time token to the IC card 2 through the secure messaging with the IC card 2 (ST74).
The IC card 2 receives the encrypted one-time token from the personal information server 4 through secure messaging. When the processor 21 of the IC card 2 receives data including the encrypted one-time token from the personal information server 4 through secure messaging, the processor 21 decrypts the encrypted one-time token included in the received data (ST75). The processor 21 also verifies the authenticator of the secure messaging from the personal information server 4 (ST76).
After verifying the authenticator of the secure messaging from the personal information server 4, the processor 21 of the IC card 2 supplies the counter terminal 5 with the decrypted one-time token included in the data received from the personal information server 4 (ST77).
The counter terminal 5 receives the one-time token decrypted by the IC card 2 from the IC card 2 connected to the card interface. When the counter terminal 5 receives the one-time token from the IC card 2, the counter terminal 5 gives a signature to the qualification information to be registered (stored) as the information on the holder of the IC card 2 in the personal information server 4 as the repository (ST78). The counter terminal 5 holds a secret key corresponding to the public key reported to the personal information server 4, and uses the secret key to give a digital signature to the qualification information to be stored in the personal information server 4.
If the counter terminal 5 digitally signs the qualification information to be registered using its own secret key, the counter terminal 5 transmits, to the personal information server 4, data including the one-time token (challenge data of the one-time token) acquired from the IC card 2, the qualification information identifier for identifying the qualification information, and the signed qualification information (ST79).
After transmitting the one-time token to the IC card 2 through secure messaging, the personal information server 4 receives data including the one-time token, the signature information identifier, and the signed qualification information from the counter terminal 5. When the processor 41 of the personal information server 4 receives data including the one-time token from the counter terminal 5, the processor 41 verifies whether the one-time token received from the counter terminal 5 matches the one-time token issued by the personal information server 4 itself and transmitted to the IC card 2 through secure messaging (ST80).
If the one-time token received from the counter terminal 5 matches the one-time token issued by the processor 41 of the personal information server 4, the processor 41 stores, in the data memory 44, history information indicating that the qualification information requested to be registered by the counter terminal 5 is to be written (ST81). The processor 41 decrypts the signed qualification information received from the counter terminal 5 using the public key of the counter terminal 5, and writes the decrypted qualification information as the qualification information of the holder of the IC card 2 in the data memory 44 (ST82). After writing the qualification information (write information), the processor 41 notifies the counter terminal 5 that the qualification information requested to be registered has been properly written (ST83).
According to the above process, the IC card held by the user is connected to the counter terminal and fingerprint authentication is performed, whereby the counter terminal can write new information on the holder of the IC card in the personal information server. Thus, the user can store, in the personal information server, information such as his/her own new qualification information displayed on the display by the counter terminal by simply performing fingerprint authentication using the IC card without performing complicated operations.
According to the embodiment described above, after the holder of the IC card is verified by the fingerprint authentication, the counter terminal requests the personal information server indicated by the URL of the repository acquired from the IC card to write new qualification information (write information) of the holder of the IC card. The counter terminal digitally signs the qualification information to be registered in the personal information server by using its own secret key, and transmits the digitally signed qualification information to the personal information server. The personal information server writes the qualification information based on the signed qualification information received from the counter terminal as the information on the holder of the IC card by using the public key of the counter terminal. Thus, in the information management system according to the embodiment, the counter terminal to which the IC card whose holder has been identified by the biometric authentication is connected can safely supply the personal information server with information such as new qualification information to be stored as the information on the holder of the IC card, and can safely store the information in the personal information server.
Also, according to the embodiment described above, the personal information server that has received the request to write information from the counter terminal issues a one-time token and transmits the issued one-time token to the IC card through secure messaging. The IC card decrypts the one-time token received from the personal information server through secure messaging, and transmits the decrypted one-time token to the counter terminal. The counter terminal transmits the one-time token from the IC card and the qualification information to be registered (write information) to the personal information server. The personal information server writes the qualification information requested to be written by the counter terminal as the information on the holder of the IC card if the one-time token received from the counter terminal is correct. Thus, the personal information server can write and store, in the personal information server, the write information that is requested to be written by the counter terminal after confirming that the one-time token from the counter terminal is a valid one-time token obtained via the IC card whose holder has been identified by the biometric authentication.
While several embodiments have been described, these embodiments have been presented by way of example and are not intended to limit the scope of the invention. The novel embodiments described herein can be implemented in a variety of other forms; furthermore, various omissions, substitutions, and changes can be made without departing from the spirit of the invention. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the inventions.
Number | Date | Country | Kind |
---|---|---|---|
2021-151866 | Sep 2021 | JP | national |
This application is a Continuation Application of PCT Application No. PCT/JP2022/034254, filed Sep. 13, 2022 and based upon and claiming the benefit of priority from Japanese Patent Application No. 2021-151866, filed Sep. 17, 2021, the entire contents of all of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2022/034254 | Sep 2022 | WO |
Child | 18598070 | US |