1. Field of the Invention
The present invention relates to data processing. Particularly, it relates to data processing with authentication indicating the authenticity of data.
2. Description of the Prior Art
Conventionally, a “signature” has been used as a method of checking the authenticity of data transmitted by a communicating party. A signature is acquired by calculating a digest that characterizes data using a digest function such as MD 5 (refer to RFC1321) for the data, and is acquired by encrypting the digest. A person who receives the data and its signature can determine whether or not such data is authentic by determining whether or not such data has been acquired by the digest function and encryption.
A “certificate” of SSL (Secure Socket Layer) used in order to preserve secure communications between browsers and servers can serve as an example of a signature. This certificate proves the validity of the public key for a communicating party, and is comprised of a subject as a target of a public key, the name of the issuer of the certificate, a public key, validity, and other relevant information. Additionally, a signature showing that such information is valid, made by a CA (Certificate Authority) is included. Such certificate is used so as to determine whether or not a public key transmitted by a communicating party is authentic.
However, in a communication method using a conventional signature, if the authenticity of data can not be verified by a signature, all the data is abandoned and retransmission is made, without reusing the available part of such data. This causes an increase in the number of communications. Additionally, if the data is not authenticated by a signature, a designation to perform a dynamic process according to data can not be made.
In order to resolve the above deficiencies in the present invention, first, a processing unit, processing inputted data and a signature for the processed data (hereinafter referred to as “authentication data”), according to the generation of the processed data in the processing unit, are generated. Moreover, an information processing apparatus to correlate the processed data with authentication data and to output such data is provided. Additionally, the processed data may be data that shows the completion of a process. Based on this, a result of the process by the information processing apparatus can be recognized by checking the authentication data output by the information processing apparatus.
In such case, the data inputted into the information processing apparatus may be data correlated with the authentication data. Additionally, the authenticity of the inputted data may be ascertained by using the correlated authentication data with the data inputted into the information processing apparatus. Based on this, if processes are made in multiple stages, the result of the processes up to the previous stage can be recognized.
Secondly, regarding the processed data, the processing section may be activated so as to include the inputted data. Based on this, a history for the performance of processes can be included in the processed data. If the result of processes is determined as being unauthentic, the processes will not be resumed from the beginning. However, the processor can be undertaken from the authentic part of the result of the processes. Thus, this does not require redundant processes, and the number of communications can also be reduced.
Thirdly, the status return information, which is required for processes of the case where the processed data is determined to be unauthentic by the authentication data, may be included in the processed data. Therefore it becomes possible for the process to be dynamically specified in cases where the processed data is determined to be unauthentic.
Fourthly, in cases where the processed data is determined to be unauthentic by the authentication data, based on the authentication data correlated with the inputted data at the previous processing stage, it is determined whether or not the inputted data is authentic. Thereby it becomes possible to trace the history of processes, and to resume the subsequent process which has been properly terminated.
Fifthly, in cases where the processed data is determined to be unauthentic by the authentication data, it is determined whether or not the inputted data is authentic based on the authentication data correlated with the inputted data at the previous processing stage. In cases where the data is determined to be authentic, the process is performed based on the status return information included in the inputted data. Thereby it becomes possible to trace the history of processes, and to dynamically specify the process necessary to execute a correct process.
Hereinafter, the embodiments of the present invention will be described with the use of drawings. The present invention shall not be restricted to the embodiments to be described, and may be embodied in various forms without departing from the essential characteristics thereof.
The input section 101 inputs the data 105. In the present invention, the term “data” corresponds to that expressed by digital information. Examples of data include slip data, ticket data etc. The input section 101 communicates the inputted data to the processing section 102.
The processing section 102 processes the data inputted in the input section 101 and generates the processed data. Examples of the processed data include slip data including the total amount stored in slip data, and the data indicating a result of a determination regarding the validity of the ticket data. The processing section 102 passes the processed data onto the authentication data generation section 103 and the output section 104.
The authentication data generation section 103 generates the authentication data so as to verify the authenticity of the processed data according to the generation of the processed data in the processing section 102. “According to the generation of the processed data,” corresponds to “based on the processed data at the point of generation of the processed data by the processing section 102”, so that the authentication data may be generated in parallel with the generation of the processed data, or may be generated after the generation of the processed data is completed. The “authentication data” corresponds to the data for verifying the authenticity of the processed data. “Authenticity of the processed data” corresponds to that the processed data has been generated in the processing section 102 of the information processing apparatus 100. As illustrated in
The output section 104 outputs the data with authentication correlating the processed data with the authentication data. That is, the data generated in the processing section 102 and the authentication data generated in the authentication data generation section 103 are correlated, and the data with authentication 106 including the processed data 107 and the authentication data 108 illustrated in
In addition,
In step S402, the processed data is generated. Therefore, this step causes the processing section 102 to process the data inputted into the input section 101, and to generate the processed data.
In step S403, according to the generation of the processed data, the authentication data is generated. Therefore, this step causes the authentication data generation section 103 to generate the authentication data so as to guarantee the authenticity of the processed data according to the generation of the processed data in the processing section 102.
In step S404, the authentication data is outputted. Therefore, this step causes the output section 104 to output the data with authentication, which is the data correlating the processed data with the authentication data.
In addition,
Additionally,
Additionally,
Additionally,
In step S602, whether or not the processed data, that is a result of determination, is authentic is determined by using the authentication data. This is to say, if the authenticity is determined and the authenticity is affirmed, the process moves to step S603. If it is not (if denied), the process moves to step S605.
In step 603, it is determined whether or not a result of determination is “available.” If “available,” the process moves to step S604, and a command for opening a gate is outputted as the command for opening and shutting the gate 502. In step S603, if determined as “not available,” the process proceeds to step S605.
If authenticity of the processed data as a result of determination is not affirmed, or if a result of determination is determined as “not available,” the control of process is moved to the step 605. Thus, a command for keeping a gate shut is outputted as a command for opening and shutting the gate 502.
As such, by using the information processing apparatus 100 and gate control section 501, the gate control section 501 may perform the process based on the data with authentication 504, and it will not become necessary to determine the availability of the ticket data. Additionally, the structure of gate control section 501 is simplified, and the modularity of the section composed of the automatic ticket gate is also enhanced.
In addition, in
Additionally, the processed data generated by the processing section 102 in
The description of preferred embodiments where the processed data becomes the data showing the completion of the processing section 102 will be described hereinafter. The information processing apparatus in
Additionally, the output section in the information processing apparatus 100 may output the processed data separately from the data with authentication 106.
As such, in the information processing apparatus, the section which acquires the outputted data with authentication by outputting the data with authentication correlating the processed data with the authentication data, may confirm the authenticity of the processed data through the authentication data of the data with authentication, thereby simplifying the structure and enhancing the modularity of the unit. These effects may be acquired in the same manner, even if the processed data shows the completion of the process.
In embodiment I, preferably, the input section 101 in the information processing apparatus 100 may input the data with authentication as the data.
As such, the input section inputs the data with authentication as data, thereby enabling a multistage process via the terminal. Moreover, by operating the terminal, in becomes possible to transmit to the information processing apparatus, selected according to the data with authentication which has been received.
As such, the input section inputs the data with authentication, thereby enabling a process to be performed in a multistage manner. Additionally, when a multistage process is performed within the same unit, the procedure of authorization at each processing stage, to confirm the authenticity of the data, can be omitted. Moreover, when a multistage process is performed among a plurality of units, the procedure of authorization of data performed among the units at every transmission and reception of data can be omitted.
The authentication section 1202 verifies the authenticity of the inputted data with authentication based on the authentication data of the data with authentication, which is inputted into the input section 101. The data and authentication data are extracted from the data with authentication 1201, which is inputted into the input section 101. The method of authentication is based on embodiment 1. Additionally, determination is made based on whether the result of digest for the data and the result acquired by the decrypting of the authentication data, which has been encrypted, matches, or whether the result of digest for the data is the same as the data where the authentication data is decrypted by a common key. Alternatively, when using common key cryptography, the result of digest for the data may be determined based on whether or not that which has been encrypted by common key cryptography is the same as the authentication data.
In step S1302, it is determined whether or not the data is authentic. If such data is determined to be unauthentic, the process proceeds to step S1303, error-handling is performed, and the process is finished.
In step S1302, if data is determined to be authentic, the process proceeds to step S1304, and the generation of the processed data is performed. And in step S1305, the generation of the authentication data is performed according to the generation of the processed data. In step S1306, the data with authentication, correlating the processed data generated in step S1304 with the authentication data generated in step S1305, is outputted.
The information processing apparatus is equipped with a authentication unit. Thereby, data, the authenticity of which cannot be verified, will not be processed. For example, as in
Moreover, as in
In addition, the sequence of processing in the slip issuing terminal 1401, the product management server 1402, the accounting server 1403, and bill-writing server 1404 is as follows. The slip-writing terminal 1401 issues the slip data to which the authentication data is granted, and transmits such data to the product management server 1402. The product management server 1402 confirms whether the authenticity of the slip data is affirmed or not due to the authentication data of the slip data transmitted from the slip-writing terminal 1401, and performs the process of shipment if affirmed. After completion of the process of shipment, the authentication data is granted, and such data is transmitted to the accounting server 1403. The accounting server 1403 confirms the authenticity of the slip through the authentication data of the slip data transmitted from the product management server 1402, and performs the accounting process if affirmed. After completion of the accounting process, the authentication data is granted, and such data is transmitted to the bill-writing server 1404. The bill-writing server 1404 determines whether the authenticity of the slip data is affirmed through the authentication data of the slip data transmitted from the accounting server 1403, and issues the bill for each customer if affirmed. In addition, the slip-writing terminal 1401, the product management server 1402, the accounting server 1403, and bill-writing server 1404 generate the authentication data by using common key cryptography held by each, and the confirmation of the authenticity through the authentication data may be performed by using a public key corresponding to the transmitters.
In embodiment 4, preferably, the processing section of the information processing apparatus in the preferred embodiments of the present invention 3 generates the processed data including the data with authentication inputted into the input unit. Therefore, the processed data generated by the processing section includes the data with authentication communicated from the input unit, and the data generated by processing the data with authentication. This situation is illustrated in
As such, the processed data including the authentication data, which the processing section inputs in the input unit, is generated. This enables the identification of the history of processes. If the authenticity of the data with authentication is not affirmed (Therefore, if the authenticity of the data with authentication is denied), the processes to where the authenticity is affirmed can be returned, and the process may be resumed therefrom. For example, the bill-issuing server 1404, which has received the data 1503 from the accounting server 1403, detects that the authenticity of the data 1503 by the authentication data has been denied. Then, the data 1502 is extracted from the part to which the code 1508 is added, and the authenticity of the data 1502 is determined by the authentication data 1507. If the authenticity is affirmed, the data 1502 may be inputted into the accounting server 1403. Thus, the issuance of the data 1501 is not started over again, and redundant procedures can be omitted. Moreover, it is useful that the number of communications in the communications network 1400 is kept low.
In the preferred embodiments of the present invention 3, or 4, the status-return information may be included in the processed data. The status-return information means the information necessary for a process for the data with authentication if the result of authentication by the authentication section does not affirm the authenticity of the data with authentication. “A process for the data with authentication if the result of authentication by the authentication section does not affirm the authenticity of the data with authentication” has the following meaning; for example, if data with authentication is not authentic, the data whose authenticity is guaranteed is extracted, and such data is transmitted into the information processing apparatus which performs the process. The process to request the analysis of the reasons why the authenticity has not been affirmed is applied. “The information necessary for a process for the data with authentication if authenticity is not affirmed” means the information necessary for a process with authentication if the authenticity is not affirmed. For example, the IP address, port number, or URL, for the purpose of transmitting the information processing apparatus, which extracts data, the authenticity of which is guaranteed and which is processed, apply. Alternatively, the program so as to transmit the data into such an information processing apparatus, or the URL, telephone number, electronic mail address, or program to perform a request for the party requesting the analysis of the reasons why the authenticity has not been affirmed, apply as the information necessary for the process of step S1303.
If the slip authentication section 1418 of the bill-issuing server 1404 does not affirm the authenticity of the data within the scope of the code 2103, the bill issuing server 1404 extracts the data within the scope of the code 2102, and determines its authenticity. If the authenticity is affirmed here, the electronic mail address 2105 is used as the status return information, which performs a process. For example, the data is transmitted to the electronic mail address shown in the electronic mail address 2105. If the authenticity of the data within the scope of the code 2102 is not affirmed by the slip-authentication section 1418 of the bill-issuing server 1404, the data within the scope of the code 2101 is extracted and the authenticity is verified. When the status return information exists within the scope of the code 2101, the process is performed according thereto. When not, error-handling processes or other processes that have been determined in advance are performed.
In addition, when a situation where the authentication data to guarantee the authenticity of the status return information 1706 is included in the processed data 1705 is established, even if the authenticity of the processed data 1705 by the authentication data 1704 is not affirmed, if the authenticity of the status return information 1706 in the authentication data of the status return information 1706 is affirmed, it is possible to perform the process by using the status return information 1706.
In step S1902, whether or not the authenticity of the data with authentication 1806 can be affirmed is determined. If affirmed, such step is moved to step S1903, and the process for the data with authentication 1806 is undertaken. For example, the process is undertaken based on the status return information 1804 included in the data with authentication 1806.
If the authenticity of the data with authentication 1806 cannot be affirmed in step S1902, such step is moved to step S1904. The secondary original information processing apparatus is considered to be the primary original information processing apparatus, and the process is performed based thereupon. Therefore, the data 1803 is extracted, and the authenticity thereof is determined. If the data 1803 is not the data with authentication, the error is reported, or other processes that have been determined in advance are performed.
In step S2001, it is determined whether the authentication data is included in the current data. In the flow chart of
In step S2001, in case that the existence of the authentication data is affirmed, such step is moved to step S2003, and whether authenticity is affirmed or not is determined. If affirmed, such step is moved to step S2004, where whether or not the status return information exists is determined. When the status return information exists, such step is moved to step S2005, and the process is made based on such status return information. In case that there is no status return information, such step is moved to step S2006, and the error-handling is performed. Moreover, instead of the error-handling, other processes that have been determined in advance may be performed.
In step 2003, in case that authenticity is not affirmed, such step is moved to step S2007, and the data with authentication outputted by the secondary original information processing apparatus from the current data is extracted, and the process goes back to step S2001 with such data as the current data.
Therefore, as explained with respect to the embodiments above, when there is a secondary original information processing apparatus which outputs the data with authentication for the primary original information processing apparatus outputting the data with authentication whose authenticity verified by the authentication section cannot be affirmed, the authentication of the data with authentication outputted by the secondary original information processing apparatus may be performed. Additionally, the expression “unit” in the “primary original information processing apparatus” and “secondary original information processing apparatus” means the section in such processes.
Moreover, in case that the result of the authentication for the data with authentication outputted by the secondary original information processing apparatus affirms the authenticity of the data with authentication, status return information may be the information used to perform the process of the data with authentication outputted by the secondary original information processing apparatus, based on the status return information included in the processed data of the secondary original information processing apparatus.
As such, causing the status return information to be included in the processed data, and causing the information necessary for the process if the authenticity of data with authentication cannot be affirmed to be included enables dynamic designation of the contents of the process if the authenticity is not affirmed. This generates advantageous effects, especially in a case where the stages of processes are changed due to the data.
Additionally, the preferred embodiments of the present invention described above have shown the processes regarding slips and tickets as specific examples. However, they are not restricted thereto. As for other preferable uses where the authentication of the processes and data restoration (status restoration) disclosed herein should be performed, the following matters and matters other than such matters, etc. can be applied.
“Content Delivery Service” means a service delivering content via a network to users. In order to realize this service, a selling server to present a list of content that is sold to the users, an accounting server that performs accounting, a delivery server in charge of preserving the actual data of the content and the downloading thereof, are used on the systems that are dispersed and allocated on the network (contents delivery system).
In such a content delivery system, a list of contents with authentication data is transmitted to the terminals of the users by the selling server. When the users select the content, the result of such selection is transmitted to the accounting server as data with the authentication data that is added to the list of contents. Data showing that the accounting has been completed is transmitted to the delivery server from the accounting server as data with authentication. The delivery server can download the content after confirmation of completion of the accounting through performance of authentication is completed.
Additionally, using the status return information enables the performance of an appropriate process when an error occurs during any of the processes of the presentation of the list of contents, selection of contents, accounting, or downloading.
“Search Engine Clipping Service” means that the “Agent Program” circulates in a database that is dispersed and allocated on the network, performs a search by using an engine keyword, acquires the appropriate information, and merges, digests, and presents such information to the users.
Therefore, the Agent Program may add data acquired through searching one database for the data, which has been acquired up to that point, as the processed data, and may add the data with authentication thereto. Moreover, by adding the status-return information, when deterioration of the acquired data is found in the midst of circulation, the databases that should be recirculated can be detected. “Content Editing Service (Data Processing Service)” means causing every plurality of servers, which are assigned to a network, to share the functions, to implement special handling of the content and cause the content to be exchanged among such servers, which offers the desired handling of the content.
In order to implement such service, for example, the content is stored by the agent program, and the users present the specific kind of handling of the content to be implemented to the agent program. According to such presentation, the Agent Program moves among servers. At this time, in case that one server adds status return information to the result of the treatment of the content, even if deterioration of data is found during the movement of the Agent Program among servers, the Agent Program and servers can perform the process according to the deterioration, etc.
According to the present invention as mentioned above, first, in the information processing apparatus, the data with authentication correlating the processed data with the authentication data is outputted. The section acquiring the outputted data with authentication may confirm the authenticity of the processed data by the authentication data of the data with authentication. Thus, the structure is simplified, and also, the modularity of the section is enhanced. Such effect can be acquired even with processed data that shows the completion of the process in the same manner.
Secondly, the process can be performed in a multistage manner based on which the input section inputs the data with authentication.
Thirdly, the information processing apparatus is equipped with a authentication unit. This does not allow data to process the authenticity of which cannot be verified. For example, unauthentic data can be excluded due to falsification or deterioration, etc.
Fourthly, the processing section generates the processed data including the data with authentication inputted into the input unit. Through this, the history of the process is understood, and if the authenticity of the data with authentication is denied, the process up to the stage where the authenticity is affirmed can be returned to, and the process may be resumed therefrom. Thus, there is no redundant process of starting from the beginning. Moreover, redundant communications will be decreased.
Fifthly, the status return information is included in the processed data, and the information necessary for the process if the authenticity of the data with authentication is not affirmed is included therein. This enables the dynamic designation of the content of the process if the authenticity is not affirmed. This generates advantageous effects especially when the stages of the process are changed by data.
Number | Date | Country | Kind |
---|---|---|---|
2001-324335 | Oct 2001 | JP | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP02/10875 | 10/21/2002 | WO |