Private data protection distribution method and program
First Claim
1. A private data protection distribution method, comprising:
- receiving encrypted private data;
receiving an encrypted private data use license which describes a decryption key for decrypting the private data, and a use condition of the private data;
decrypting the decryption key and the private data use license;
determining whether or not a use purpose of the private data matches the use condition described in the private data use license; and
decrypting the private data by using the decrypted decryption key only if the use purpose of the private data matches the use condition.
1 Assignment
0 Petitions
Accused Products
Abstract
An information entity transmits encrypted private data to a computer of a service provider, which makes a request to use private data, by using a client tool. Additionally, the information entity creates by using the client tool a decryption key for decrypting the private data, and a private data use license which includes information stipulating a use condition of the private data, such as a use purpose, the number of use times, an expiry date, the number of times that a move can be made, and the like, and transmits the decryption key and the license to the computer of the service provider by using a DRM authentication technology. The service provider can use the private data only if its use purpose matches the use condition described in the private data use license created by the information entity.
-
Citations
11 Claims
-
1. A private data protection distribution method, comprising:
-
receiving encrypted private data;
receiving an encrypted private data use license which describes a decryption key for decrypting the private data, and a use condition of the private data;
decrypting the decryption key and the private data use license;
determining whether or not a use purpose of the private data matches the use condition described in the private data use license; and
decrypting the private data by using the decrypted decryption key only if the use purpose of the private data matches the use condition. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A private data protection distribution program for causing a computer to execute a process, the process comprising:
-
receiving encrypted private data;
receiving an encrypted private data use license which describes a decryption key for decrypting the private data, and a use condition of the private data;
decrypting the decryption key and the private data use license;
determining whether or not a use purpose of the private data matches the use condition described in the private data use license; and
decrypting the private data by using the decrypted decryption key only if the use purpose of the private data matches the use condition.
-
-
11. A private data protection distribution apparatus, comprising:
-
a unit receiving encrypted private data;
a unit receiving an encrypted private data use license which describes a decryption key for decrypting the private data, and a use condition of the private data;
a unit decrypting the decryption key and the private data use license;
a unit determining whether or not a use purpose of the private data matches the use condition described in the private data use license; and
a unit decrypting the private data by using the decrypted decryption key only if the use purpose of the private data matches the use condition.
-
Specification