Method and System for Transmitting and Receiving User's Personal Information Using Agent
First Claim
1. A method of transmitting user'"'"'s personal information, the method comprising:
- detecting user'"'"'s personal information in response to a user'"'"'s personal information request message from a client using an information management server;
generating an encryption key used to encrypt the detected user'"'"'s personal information and a decryption key used to decrypt the encrypted user'"'"'s personal information;
encrypting the detected user'"'"'s personal information using the encryption key and signing the encrypted user'"'"'s personal information;
generating an agent comprising the encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, and verification information used to provide the user'"'"'s personal information only to an authorized client; and
transmitting the agent and the decryption key to the client.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for transmitting and receiving user'"'"'s personal information using an agent are provided. An information management server managing user'"'"'s personal information provides an agent including user'"'"'s personal information in response to a user'"'"'s personal information request message from a client. A client receives the agent and requests user'"'"'s personal information from the agent. Then, the agent determines whether the client is authorized and provides the user'"'"'s personal information to the client when it is determined that the client is authorized. Accordingly, the user'"'"'s personal information is safely managed and transmitted.
-
Citations
18 Claims
-
1. A method of transmitting user'"'"'s personal information, the method comprising:
-
detecting user'"'"'s personal information in response to a user'"'"'s personal information request message from a client using an information management server; generating an encryption key used to encrypt the detected user'"'"'s personal information and a decryption key used to decrypt the encrypted user'"'"'s personal information; encrypting the detected user'"'"'s personal information using the encryption key and signing the encrypted user'"'"'s personal information; generating an agent comprising the encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, and verification information used to provide the user'"'"'s personal information only to an authorized client; and transmitting the agent and the decryption key to the client. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of receiving user'"'"'s personal information, the method comprising:
-
a client receiving from an information management server an agent comprising encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, verification information used to provide user'"'"'s personal information only to an authorized client, and a decryption key used to decrypt the encrypted user'"'"'s personal information; the client transmitting a user'"'"'s personal information request message to the agent; the agent determining whether the client is fairly authorized based on the verification information; when it is determined that the client is authorized, the agent providing the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value to the client; and the client verifying the user'"'"'s personal information signature value using a public key of the information management server and, when the user'"'"'s personal information signature value is verified, decrypting the encrypted user'"'"'s personal information using the decryption key to extract the user'"'"'s personal information. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A system for transmitting user'"'"'s personal information, the system comprising:
-
an information detector detecting user'"'"'s personal information, that has been stored in advance, in response to a user'"'"'s personal information request message from a client; a key generator generating an encryption key to encrypt the detected user'"'"'s personal information and a decryption key to decrypt the encrypted user'"'"'s personal information; an encryption unit encrypting the detected user'"'"'s personal information using the encryption key and signing the encrypted user'"'"'s personal information; an agent generator generating an agent comprising the encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, and verification information used to provide the user'"'"'s personal information only to an authorized client; and a transceiver receiving the user'"'"'s personal information request message from the client, outputting the user'"'"'s personal information request message to the information detector, and transmitting the agent and the decryption key to the client. - View Dependent Claims (13, 14, 15)
-
-
16. A system for receiving user'"'"'s personal information, the system comprising:
-
a transceiver transmitting a users'"'"' personal information request message to an information management server and receiving from the information management server an agent comprising encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, and verification information used to provide user'"'"'s personal information only to an authorized system and a decryption key used to decrypt the encrypted user'"'"'s personal information; an agent interface unit transmitting a user'"'"'s personal information request message to the agent and receiving the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value from the agent when the agent determines that the system is authorized to access the user'"'"'s personal information based on the verification information; and a decryption unit verifying the user'"'"'s personal information signature value received through the agent interface using a public key of the information management server and decrypting the encrypted user'"'"'s personal information using the decryption key to extract the user'"'"'s personal information - View Dependent Claims (17, 18)
-
Specification