The present invention relates to the technique to process effectively information as authentication data needed when a particular service is provided to a user of an information processing terminal, or the like.
Normally, when a particular service is provided to a user through an information processing terminal, secret information that the user registered in advance (for example, an account, a password, or the like) is demanded to check user's authenticity. However, in a situation that a plurality of services that the user can utilize are present, when the user forgets the secret information for a part of services, such user cannot receive the provision of a part of services. Therefore, such a secret information reproducing device is disclosed that, even though the user forgets a part of secret information out of plural pieces of secret information, a part of secret information can be reproduced by using the error correcting technology (see Patent Literature 1).
According to the secret information reproducing device disclosed in Patent Literature 1, when the secret information except a part of secret information that the user forgot (referred to as “target secret information” hereinafter) out of plural pieces of secret information is input correctly, the target secret information can be reproduced adequately by using the error correcting technology. Also, this secret information reproducing device stores not the secret information itself but only a check symbol used when plural pieces of secret information should be converted into the code word, and therefore has a high confidentiality.
However, in the secret information reproducing device disclosed in Patent Literature 1, such a situation may happen that, when the secret information except a part of secret information that the user forgot is not correctly input, the target secret information cannot be reproduced correctly. In other words, the user must store precisely all of secret information except the target secret information in response to the error correcting capability to be set. This respect imposes a burden on the user.
In view of the above problem, it is an object of the present invention to provide an information processing device, a program, and a recording medium, capable of holding safely string information and also lessening user's burden of storing information about the string information and correcting an inputting error.
A first aspect of the present invention provides an information processing device, which is equipped with an information inputting section, an information acquiring section, a coding section, a storing section, and an error correcting section.
The information inputting section inputs string information in response to a user's operation. The information acquiring section acquires individual characteristic information of a user based on the user's operation. The coding section produces a first code word, which is a cord word in which a correct first string information being input by the information inputting section and the individual characteristic information are synthesized under a predetermined rule, in registering the string information. The storing section stores a check symbol for error correction being produced based on the first code word after the string information is registered. At this time, the first string information itself is erased, and thus the correct first string information is protected substantially safety from the other persons.
The error correcting section applies the error correction using the check symbol stored in the storing section to a second cord word, which is produced by the coding section based on second string information being input by the information inputting section and the individual characteristic information, when the string information is reproduced. Accordingly, the correct first string information can be reproduced. Here, the string information in the invention of this application contains not only the normal string information (containing alphanumeric characters, kana and kanji characters, symbols, etc.) but also information of signal trains.
A second aspect of the present invention provides a program of causing a computer to execute procedures in registering string information and procedures in reproducing the string information.
The procedures in registering string information includes a procedure of inputting correct first string information in response to a user's operation, a procedure of acquiring first individual characteristic information of a user based on an input of the first string information, a procedure of synthesizing the first string information and the first individual characteristic information under a predetermined rule, and producing a first code word, and a procedure of erasing the first string information, and storing a check symbol obtained in a course of production of the first code word.
The procedures in reproducing the string information includes a procedure of inputting second string information in response to a user's operation, a procedure of acquiring second individual characteristic information of the user based on an input of the second string information, a procedure of synthesizing the second string information and the second individual characteristic information under the predetermined rule, and producing a second code word, and a procedure of applying an error correction using the stored check symbol to the second code word as an object.
A third aspect of the present invention provides a computer-readable recording medium for storing the program.
According to the present invention, the string information can be held safely, and also the user's burden of storing the information about the string information and correcting the inputting error can be lessened.
A first embodiment of a secret information processing device of the present invention will be explained hereinafter.
The secret information processing device of the present embodiment is the system used to process the secret information. As the typical application in use, such secret information processing device is incorporated into an information processing terminal of a computer, a mobile terminal, or the like. The “secret information” is the data that is also called so-called account, password, or secure code, and is authentication data needed when a particular service is provided to a user. As an example, the account, the password, or the like, which is input by the user to log in the web site, is the secret information in the information processing terminal. Also, personal information such as residence, contact address, and the like are the secret information in the information processing terminal.
In this case, in such a situation that a particular service is not provided to the user from the external equipment via communication, there is no necessity that the secret information processing device or the information processing terminal into which the secret information processing device is incorporated should be equipped with a communicating function.
Here, in the present embodiment, explanation will be made by taking the processing system used to process the secret information as an example, but the present invention is not limited to this example. The present invention is adaptable to the information terminal that employs string information containing alphanumeric characters, kana and kanji characters, symbols, etc. and signal trains as an input object.
The secret information processing device of the present embodiment intends to hold the secret information safely and reduce user's burden of storing the information relating to the secret information. In particular, the secret information processing device of the present embodiment protects the secret information safely from the “fake” when the regular user forgot the correct secret information that is needed to accept the provision of the particular service. Also, the secret information processing device enables the user to reproduce the correct secret information in such a way that the regular user is not compelled to store the information relating to the correct secret information.
More concretely, the secret information processing device of the present embodiment is also applicable to the secret information such as account, password, and the like, and the proper information such as residence, URL, and the like. Also, the secret information processing device of the present embodiment can lessen the user's burden by correcting the string information, which contains partially an error caused due to vague memory, inputting error, or the like, to the right string.
A configuration of a secret information processing device of a first embodiment of the present invention will be explained with reference to
As shown in
The user interface 10 (information inputting section) accepts secret information SD as the string, which is input directly from the external equipment or is acquired via another inputting means, in connection with a corresponding service code. The service code is data that is obtained by coding the service that is provided to the user.
The displaying section 12 contains a display panel that is composed of a liquid crystal element or an organic EL element, and causes the display panel to display the string that is input through the user interface 10. In particular, the displaying section 12 of the present embodiment displays the secret information SD as the string, which is input through the user interface 10, or secret information SD_OUT as the string, which is reproduced by the error correcting section 22, on a screen, and thus functions as a man-machine interface when the particular service is provided to the user.
The data processing section 14 (information acquiring section) acquires the individual characteristic information of the user who is going to input the secret information SD, based on string data S10 (=secret information SD) as the output of the secret information SD. This individual characteristic information is the peculiar data produced due to the attributes of individual users. In the present embodiment, in view of such a respect that the string inputting patterns being input through the inputting means such as a keyboard or the like, for example, are different every user, the data processing section 14 acquires an input interval between respective strings of the secret information SD as the individual characteristic information.
A concrete method of acquiring the individual characteristic information by the data processing section 14 will be explained with reference to
First, when the secret information is input (step ST10), the data processing section 14 acquires sequentially respective strings contained in the secret information (step ST11). When the data processing section 14 receives one string, a timer (not shown) in the secret information processing device 1 is operated and starts to measure an input interval between the strings (step ST12). Then, if the next string is input (YES in step ST13), the data processing section 14 acquires that string (step ST11), and also terminates the measurement of the input interval between the string being input precedingly and the string being input this time (step ST12).
The data processing section 14 applies the processes in step ST11 to step ST13 repeatedly to respective strings of the input secret information. If the data processing section 14 determines that an input mode is released, based on the input of particular data (e.g., a return key, or the like) indicating that the input of the secret information is ended (YES in step ST14), such data processing section 14 produces timing data (step ST15). Then, the process is ended.
As shown in
The data processing section 14 produces an information word by synthesizing the secret information SD and the individual characteristic information. As the method of synthesizing the secret information SD and the individual characteristic information to produces the information word, any method may be employed if the information can be separated again after the synthesis (i.e., the secret information SD and the individual characteristic information can be reproduced separately). As the synthesizing method, for example, the method of synthesizing simply the secret information SD and the individual characteristic information in order, the method of combining alternately respective strings of the secret information SD and the individual characteristic information, the method of digitizing the secret information SD and the individual characteristic information under a predetermined rule and calculating them respectively, and the like may be considered.
The coding section 16 produces the code word by coding the information word S14 produced by the data processing section 14 by using a predetermined producing polynomial. As the coding method, any coding method may be employed if such coding method can correct an error. In the present embodiment, the Reed-Solomon (RS) code, e.g., RS (255, 247;4), is employed as the publicly coding method that can correct the error. In this case, the coding section 16 produces the 247-byte information word by supplementing the data into the information word S14 such that the coding can be applied to the information word by this RS (255, 247;4). As a simply mode, this data supplement is executed by padding the 232-byte ‘0’ to the tail of the 15-byte information word S14, for example, such that the information word prior to the coding has 247 byte. Here, of course the data used in the padding (referred to as “padding data” hereinafter) is not limited ‘0’.
The coding section 16 applies the RS coding to the 247-byte information word. In the course of this coding, the check symbol H is produced in a previously set error correcting capability.
The storing section 20 stores the check symbol produced by the coding section 16 (in
The error correcting section 22 employs the code word constructed by the cord word S16 fed from the coding section 16 and the check symbol stored in the storing section 20 (the code word consisting of the secret information, the individual characteristic information, the padding data, and the check symbol) as the object. The error correcting section 22 executes the publicly known RS decoding algorithm, i.e., the algorithm containing a process of calculating an error syndrome, a process of calculating an error position, and a process of performing an error correction. The error correcting section 22 operates only when the secret information is reproduced.
The error correcting section 22 calculating the information word that was subjected to the error correction, by executing the RS decoding algorithm. Also, the error correcting section 22 extracts the secret information SD_OUT from the concerned information word. The secret information SD_OUT is sent to the displaying section 12 and is displayed thereon.
[Operation of Secret Information Processing Device 1]
Next, an operation of the secret information processing device 1 of the present embodiment will be explained hereunder, while classifying the operation into (1) an operation in registering the secret information, and (2) an operation in reproducing the secret information.
(1) Operation in Registering Secret Information
First, the operation in registering the secret information will be explained with reference to
First, the user interface 10 accepts the service code indicating the particular service, and the correct secret information SD (first string information) in response to the inputting operation of the user, while correlating them with each other (step ST1). The string data S10 is fed successively to the data processing section 14 as the correct secret information. As explained by reference to
In
Then, the coding section 16 produces the 247-byte information word by supplementing the data in the information word S14 such that the coding can be applied by the RS (255, 247;4). Then, the coding section 16 produces the check symbol H based on a previously set error correction capability t0 in the course of coding the 247-byte information word (step ST4).
In an example shown in
When the check symbol is produced by the above operation, the storing section 20 stores the check symbol while correlating it with the service code that is accepted in step ST1, but erases the string data S10 (correct secret information SD) (step ST5).
Therefore, in the secret information processing device 1, the correct secret information itself does not remain in the inside once the registration of the secret information is completed, so that the secret information can be held substantially safely.
(2) Operation in Reproducing Secret Information
Next, an operation in reproducing the secret information will be explained with reference to the
First, the user interface 10 accepts the service code indicating the particular service and the wrong secret information SD (second string information) in answer to the inputting operation of the user, while correlating them with each other (step ST20). The string data S10 is supplied successively as the wrong secret information SD to the data processing section 14. Then, like the registering operation, the data processing section 14 acquires the timing data between the strings of the string data S10 as the individual characteristic information (step ST21). Then, the data processing section 14 also produces the information word S14 by synthesizing the string data S10 (=secret information SD) and the acquired timing data (=individual characteristic information)(step ST22).
In
The coding section 16 produces the 247-byte information word by supplementing the data in the information word S14 such that the coding can be applied by the RS (255, 247;4). Then, the coding section 16 produces the coding word S16 (second coding word) by coding the 247-byte information word (step ST22). Then, the error correcting section 22 applies the error correcting process to the coding section that is composed of the coding word S16 supplied from the coding section 16 and the check symbol stored in the storing section 20 (the information word consisting of the secret information, the individual characteristic information, the padding data, and the check symbol) as the object (step ST23). The error correcting section 22 calculates the information word in which the error is corrected by executing this error correcting process, and extracts the secret information SD_OUT from the concerned information word.
As the result of the error correcting process by the error correcting section 22, when the error of the secret information SD accepted in step ST20 is less than the error correcting capability, the error correction is adequately applied to the secret information SD. The error correcting section 22 removes the padding data and the check symbol and separates the secret information from the individual characteristic information, and thus extracts the correct secret information SD_OUT from the information word derived as the result of the error correction (step ST24). The secret information SD_OUT is sent to the displaying section 12 to display thereon (step ST25).
In an example shown in
As explained above, in the secret information processing device 1 of the present embodiment, the secret information itself is not stored in registering the secret information, but only the check symbol is stored. Therefore, the secret information can be held substantially safely.
Also, in the secret information processing device 1, in registering the secret information, the check symbol is produced based on the information that is obtained by synthesizing not only the secret information but also the individual characteristic information. As a result, when the person except the regular user inputs the correct secret information in reproducing the secret information, the input individual characteristic information is different from that of the regular user, and thus the secret information is not correctly produced. That is, the secret information processing device 1 has a great effect of preventing the so-called “fake”.
Also, the secret information processing device 1 focuses on such a respect that the inputting pattern of the string through the inputting means are different every user, and thus the input interval between respective strings of the secret information is acquired as the individual characteristic information. That is, the individual characteristic information is acquired in registering the secret information while the regular user is unconscious of such information, so that there is no necessity to input the individual characteristic information separately from the secret information. Therefore, the regular user is not required to store and input the separate information from the secret information, in reproducing correctly the secret information. As a result, such a burden of the regular user can be lessened that the user has to store the information except the essential secret information.
Here, in the secret information processing device of the first embodiment, the individual characteristic information is the timing data between the strings of the input secret information. But the individual characteristic information is not limited to this data.
For example, in case the inputting means for inputting the secret information is a ten-key of the mobile terminal, for example, a plurality of strings are allocated to each key (the strings of ‘2 ’, ‘a’, ‘b’, ‘c’, for example, are allocated to the same key). In such case, the individual characteristic information may be acquired based on the number of times of the operation applied to each key. In the ten-key of the mobile terminal, it may be considered that the number of times of the operation applied to the key when a desired string is chosen by the key operation indicates the private attribute.
Also, when the inputting means for inputting the secret information (the keyboard, or the like) contains the key such as a return key, a space key, a control key, or the like, to which the code used to invalidate the input of the secret information is allocated, the individual characteristic information may be produced based on the code that is input together with the secret information. Also, it may be considered that such code input information indicates the private attribute.
Also, when the inputting means for inputting the secret information chooses the string, which is allocated to the key on the software keyboard (keyboard being implemented by the software) displayed on the displaying section 12, by the choosing operation using the wand-type device or the pointing-type device, for example, the individual characteristic information may be acquired based on a locus of the device that is operated to choose the key.
Accordingly, in the situation that the inputting means such as the wand-type device or the pointing-type device, which is hard to maintain or reproduce a predetermined operation, is employed, the correct secret information can be produced by calibrating a discrepancy of pointing from an input locus of the user based on the error correcting process unless the input locus should be precisely stored and reproduced. Also, unless the secret information should be precisely stored, the correct secret information can be reproduced by storing the input locus.
Also, for example, in inputting the string by using the software keyboard, the auxiliary usage for correcting the wrong string into the right string can be applied by correcting an inputting error.
In this case, in the carrying-out modes of the specification of this application containing the present embodiment, the displaying section 12 is contained in the secret information processing device 1 or a secret information processing device 2. In this case, the displaying section 12 should not always be built in the secret information processing device 1 or the secret information processing device 2. As a result, even when the displaying section 12 is provided outside the secret information processing device 1 or the secret information processing device 2, the similar advantages to those of the invention set forth in the carrying-out modes of the specification of this application containing the present embodiment.
A second embodiment of the secret information processing device 2 of the present invention will be explained hereunder.
The secret information processing device of the present embodiment intends to enhance the exactness of production of the correct secret information, i.e., enhance a resistance to the “fake”, in reproducing the secret information, in addition to the object of the first embodiment. In the present embodiment, like the first embodiment, an explanation will be made by taking a processing system used to process the secret information as an example hereunder. But the present invention is not limited to this embodiment. It is needless to say that the present invention can be applied to the information terminal that employs the string information containing alphanumeric characters, kana and kanji characters, symbols, etc. and signal trains as an input object.
A configuration of a secret information processing device of a second embodiment of the present invention will be explained with reference to
As shown in
In the secret information processing device 2 of the present embodiment, the process of registering the secret information is similar to that in
The flowchart shown in
That is as shown in
In
<Variation 1>
In step ST242 in the flowchart shown in
According to the verifying process in step ST242, the correct secret information can be produced and displayed in response to the set error correcting capability as far as a part of the input secret information coincides with a part of the correct secret information. In other words, such a situation can be prevented that the secret information is produced and displayed in response to the input that is largely different from the correct secret information. Therefore, the resistance to the “fake” can be enhanced by this verifying process.
<Variation 2>
As shown in
<Variation 3>
The verifying section 24 can determine whether or not a change of the string of the secret information conforms to a predetermined rule before and after the error correcting process, based on the physical mode of the inputting means such as the keyboard, or the like. For example, such a case is assumed that the secret information processing device 2 of the present embodiment is installed into the mobile terminal and, in the key arrangement of the mobile terminal, the strings ‘2’, ‘5’, ‘8’ are allocated to the same keys, to which the strings ‘A’, ‘J’, ‘T’ are allocated, respectively in response to the setting in the input mode. In this case, when such a situation is caused that the strings ‘A’, ‘J’, ‘T’ of a part of the secret information that underwent the error correction by the error correcting section 22 respectively are given to the strings ‘2’, ‘5’, ‘8’ of a part of the secret information being input through the user interface 10 (e.g., before the error correction: ‘ACDE123’, after the error correction: ‘2CDE123’), this situation can be considered as the inputting error of the secret information caused by the regular user due to the setting error in the input mode. At this time, the verifying section 24 determines that a change of the string of the secret information conforms to a predetermined rule, and causes the displaying section 12 to display the secret information after the error correction.
In the above example of the mobile terminal, in step ST243, the decision about whether or not a change of the string of the secret information conforms to a predetermined rule is made based on such a premise that the strings before and after the error correction are allocated to the same keys. For example, in step ST243, when the keyboard in JIS arrangement, or the like is prepared as the inputting means, such decision can be made based on such a premise that the strings before and after the error correction are located in adjacent positions on the key arrangement. For example, in the keyboard in JIS arrangement, the strings ‘T’, ‘J’, ‘I’ are located adjacently to ‘R’, ‘H’, ‘U’ respectively. When such a situation is caused that the strings ‘R’, ‘H’, ‘U’ of a part of the secret information that underwent the error correction by the error correcting section 22 respectively are given to the strings ‘T’, ‘J’, ‘I’ of a part of the secret information being input through the user interface 10 (e.g., before the error correction: ‘ACDT123’, after the error correction: ‘ACDR123’), this situation can be considered as the inputting error of the secret information caused by the regular user due to the displacement of the input position. At this time, the verifying section 24 determines that a change of the string of the secret information has a correlation based on a predetermined rule, and causes the displaying section 12 display the secret information after the error correction.
In step ST243, the decision about whether or not a change of the string of the secret information conforms to a predetermined rule can be made based on such a premise that the strings before and after the error correction have a relation between the uppercase letter and the lowercase letter.
In this manner, the verifying process to determine whether or not a change of the string of the secret information conforms to a predetermined rule is provided before and after the error correcting process. Therefore, the resistance to the “fake” can be enhanced by this verifying process.
Here, the flowchart shown in
As explained above, according to the secret information processing device 2 of the present embodiment, the verifying process is applied to the secret information obtained by the error correcting process in reproducing the secret information. Therefore, the resistance to the “fake” can be enhanced in contrast to the first embodiment.
With the above, the embodiments of the present invention are described in detail, but the concrete configuration and system are not limited to the present embodiment. A change of design in a scope without departing from a gist of the present invention, an adaptation to other systems, and the like may be included.
For example,
Also,
Also, an object of the present invention can be implemented by a program that causes a computer to execute a series of procedures that are equivalent functionally to the operation of the secret information processing devices in respective embodiments. Also, it is needless to say that an object of the present invention can be implemented when a recording medium (or a recording medium) on which the program code is recorded is supplied to the system or the equipment, and the computer (or CPU or MPU) of the system or the equipment reads and executes the program code stored in the recording medium. In this case, the program code itself being read from the recording medium implements the function of the foregoing embodiments, and the recording medium on which the program code is stored constitutes the present invention. Also, it is needless to say that such a case should be contained in a scope of the present invention that not only the functions of the above embodiments are implemented by executing the program code that the computer reads, but also the functions of the above embodiments are implemented by a part or all of the actual processes that the operating system (OS), which is working on the computer, or the like, executes based on the instruction of the program code.
The present invention is explained in detail with reference to the particular embodiments. But it is obvious for those skilled in the art that various variations and modifications can be applied without departing from a spirit and a scope of the present invention.
This application is based upon Japanese Patent Application (Patent Application No. 2007-060043) filed on Mar. 9, 2007; the contents of which are incorporated herein by reference.
The secret information processing device according to the present invention can hold safely the string information and also lessen the user's burden of storing the information relating to the string information and correcting the inputting error, and therefore is useful as the information processing terminal for the computer, the mobile terminal, the authentication terminal, their inputting device, and the like.
Number | Date | Country | Kind |
---|---|---|---|
2007-060043 | Mar 2007 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2008/000494 | 3/7/2008 | WO | 00 | 9/4/2009 |