Data Communication Method and System
1 Assignment
0 Petitions
Accused Products
Abstract
Public-key cryptography is realized by means of PKI in which biometrics data, in which biological information of users is converted to numerical values, are used to authenticate users that transmit and receive data, and based on the biometrics data, identical secret keys (common secret keys) are generated in each of the user terminal devices that are used by the users without releasing the secret keys onto the network.
-
Citations
74 Claims
-
1-38. -38. (canceled)
-
42. A data communication method, said data communication method being of the public-key cryptography type for both authenticating users that transmit and receive data by way of a network and for encrypting said data for transmission and reception;
- said data communication method comprising the steps of;
storing in advance biometrics data in which biological information of said users has been converted to numerical values as registration data in memory devices that are provided in user terminal devices used by said users;
using biometrics acquisition devices to acquire biometrics data of said users;
transmitting said registration data and inquiry data, which are biometrics data that have been acquired for authenticating said users from user terminal devices, that are used by the users, to a server device by way of a network;
determining by means of said server device whether data in which bit sequence absolutely identical to inquiry data that have been received from said user terminal devices is present in a lapsed list which contains registered biometrics data that cannot be used;
when data in which bit sequence absolutely identical to the inquiry data is not present in said lapsed list, determining whether data in which bit sequence absolutely identical to registered data that have been received is present in a database in which biometrics data for each user have been registered in advance; and
when data in which bit sequence absolutely identical to the registration data is present in said database, authenticating the user of the user terminal device that has transmitted said registration data and said inquiry data as actually said user. - View Dependent Claims (43, 44, 45, 46)
- said data communication method comprising the steps of;
-
47. A data communication system, said data communication system being of the public-key cryptography type for both authenticating users that transmit and receive data by way of a network and for encrypting said data for transmission and reception, said data communication system comprising:
-
user terminal devices;
that are used by said users, that are each provided with a biometrics acquisition device for acquiring biometrics data in which biological information of said users has been converted to numerical values, that each use said biometrics acquisition device acquire biometrics data of users, and that each transmit the biometrics data that have been acquired as inquiry data for authenticating said users; and
a PKI server device that;
is provided with a database in which are registered in advance registration data, which are biometrics data of said users;
upon receiving said inquiry data from said user terminal devices, based on said registration data and said inquiry data, uses a prescribed function to calculate for each of said users similarity information indicating the degree of similarity of said inquiry data and said registration data; and
transmits to each user terminal device the registration data of the user that uses that user terminal device and the similarity information of the user that is the communication partner of the user of that user terminal device;
wherein each said user terminal device;
based on registration data that have been received from said PKI server device and on inquiry data that have been acquired using said biometrics acquisition device, uses the same function as said PKI server device to calculate its own user'"'"'s similarity information that indicates the degree of similarity between the registration data and the inquiry data; and
, based on its own user'"'"'s similarity information that has been calculated and the similarity information of a user that is the communication partner that has been received from said PKI server device, uses a function that is common to each of said user terminal devices to generate a common secret key for decoding data that have been encrypted and transmitted from the user terminal device of said communication partner. - View Dependent Claims (48, 49, 50)
-
-
51. A data communication system, said data communication system being of the public-key cryptography type for both authenticating users that transmit and receive data by way of a network and for encrypting said data for transmission and reception, said data communication system comprising:
-
user terminal devices;
that are each used by said users;
that are each provided with a biometrics acquisition device for acquiring biometrics data in which biological information of said users have been converted to numerical values, and a memory device for storing the biometrics data of users in advance as registration data; and
that each use said biometrics acquisition device to acquire the biometrics data of users and to transmit biometrics data that have been acquired as inquiry data for authenticating said users; and
a PKI server device;
that is provided with;
a database in which the biometrics data of each of said users are registered in advance, and a lapsed list in which biometrics data that cannot be used are registered;
that, upon receiving said inquiry data and registration data from said user terminal devices, determines whether data in which bit sequence absolutely identical to inquiry data that have been received from said user terminal device is present in said lapsed list;
that, when data in which bit sequence absolutely identical to said inquiry data is not present in said lapsed list, determines whether data in which bit sequence absolutely identical to registration data that have been received from said user terminal device is present in said database; and
that, when data in which bit sequence absolutely identical to registration data is present in said database, authenticates the user of the user terminal device that transmitted said registration data and said inquiry data as actually said user. - View Dependent Claims (52, 53, 54, 55)
-
-
56. A server device for realizing data communication of the public key type for both authenticating users that transmit and receive data by way of a network and for encrypting said data for transmission and reception, said server device comprising:
-
a data storage device provided with a database in which registration data are registered in advance, these registration data being biometrics data in which biological information of said users has been converted to numerical values; and
a processor for;
upon receiving inquiry data, which are biometrics data for authenticating a user, from a user terminal device used by a said user, based on said inquiry data and said registration data, uses a prescribed function to calculate for each of said users similarity information that indicates the degree of similarity between said inquiry data and said registration data; and
transmits to each user terminal device the registration data of the user that uses that user terminal device and similarity information of the user that is the communication partner of the user of that user terminal device. - View Dependent Claims (57, 58, 59)
-
-
60. A server device for realizing data communication of the public-key cryptography type for both authenticating users that transmit and receive data by way of a network and for encrypting said data for transmission and reception, said server device comprising:
-
a data storage device provided with a database in which are registered in advance registration data, which are biometrics data in which biological information of said users has been converted to numerical values, and a lapsed list in which are registered biometrics data that cannot be used; and
a processor for;
upon receiving, from a user terminal device used by a said user, inquiry data that are biometrics data for authenticating the user and registration data that are biometrics data that have been registered in advance in said user terminal device, determining whether or not data in which bit sequence absolutely identical to the inquiry data that have been received from said user terminal device is present in said lapsed list;
when data in which bit sequence absolutely identical to the inquiry data is not present in said lapsed list, determining whether or not data in which bit sequence absolutely identical to registration data that have been received from said user terminal device is present in said database; and
when data in which bit sequence absolutely identical to the registration data is present in said database, authenticating the user of the user terminal device that transmitted said registration data and said inquiry data as actually said user. - View Dependent Claims (61, 62)
-
-
63. A computer readable recording medium storing a program for realizing, by means of a computer, data communication of the public-key cryptography type for both authenticating users that transmit and receive data by way of a network and encrypting said data for transmission and reception, wherein said program causes said computer to execute processes of:
-
when said computer receives, from user terminal devices used by said users, inquiry data, which are biometrics data for authenticating the users in which biological information of the users has been converted to numerical values, based on registration data which are biometrics data of said users that have been registered in advance in a database and said inquiry data, using a prescribed function to calculate for each of said users similarity information indicating the degree of similarity between said inquiry data and said registration data; and
transmitting to each user terminal device the registration data of the user that uses that user terminal device and the similarity information of a user that is the communication partner of the user of that user terminal device. - View Dependent Claims (64, 65, 66)
-
-
67. A computer readable recording medium storing a program for realizing, by means of a computer, data communication of the public-key cryptography type for both authenticating users that transmit and receive data by way of a network and for encrypting said data for transmission and reception, said program causing said computer to execute processes of:
-
when said computer receives, from a user terminal device that is used by a said user, inquiry data that are biometrics data of the users and registration data that are biometrics data that have been registered in advance in said user terminal devices, determining whether or not data of absolutely identical bit sequence as the registration data that have been received from said user terminal device are present in a lapsed list which contains stored biometrics data that cannot be used;
when data in which bit sequence absolutely identical to the inquiry data is not present in said lapsed list, determining whether or not data of a bit sequence absolutely identical to the registration data that have been received from said user terminal device is present in said database; and
when data in which bit sequence absolutely identical to the registration data is present in said database, authenticating the user of the user terminal device that transmitted said registration data and said inquiry data as actually said user. - View Dependent Claims (68, 69)
-
-
70. A terminal device used by a user for transmitting and receiving data that have been encrypted by means of public-key cryptography by way of a network, said terminal device comprising:
-
a biometrics acquisition device for acquiring biometrics data in which biological information of said user has been converted to numerical values; and
a processor for using said biometrics acquisition device to acquire biometrics data of the user and transmitting the biometrics data, that have been acquired as inquiry data for authenticating said user, to a server device. - View Dependent Claims (71, 72, 73, 74)
-
Specification