Service Providing System, Outsourcer Apparatus, Service Providing Method, and Program
First Claim
1. A service providing system including a user apparatus, an entrustor apparatus for registering the user apparatus as a member for receiving a predetermined service when a registration request for enrolling the user apparatus as the member is received from the user apparatus, and an outsourcer apparatus for providing said predetermined service to the member which has requested said predetermined service on behalf of said entrustor apparatus, the arrangement being such that when said outsourcer apparatus is requested to provide said predetermined service by the user apparatus, said outsourcer apparatus authenticates whether the user apparatus is said member or not according to a group signature scheme, whereinsaid entrustor apparatus comprises:
- a group key generator that generates public information, a member registration key, and an open key for use in said group signature scheme;
a public information provider that provides the public information generated by said group key generator to said outsourcer apparatus;
a signature key generator that generates a signature key corresponding to said user apparatus using said public information and said member registration key, in response to said registration request from said user apparatus; and
a signature information provider that provides the signature key generated by said signature key generator and said public information to said user apparatus;
said user apparatus comprises;
a group signature generator that generates group signature data using the signature key and the public information provided by said signature information provider, and a request for said predetermined service; and
a group signature data provider that provides the group signature data generated by said group signature generator and the request for said predetermined service to said outsourcer apparatus; and
said outsourcer apparatus comprises;
an authenticator that authenticates the group signature data provided by said group signature data provider as being legitimate or not using the public information provided by said public information provider; and
a service provider that provides said predetermined service to said user apparatus in response to the request for said predetermined service if said authenticator judges that said group signature data are legitimate.
1 Assignment
0 Petitions
Accused Products
Abstract
When an entrustor entrusts an outsourcer with the supply of a service for members, member information managed by the entrustor is kept secret from the outsourcer, and users can receive the service without communicating with the entrustor. For using the service, user apparatus 3 sends group signature data to outsourcer apparatus 2. Outsourcer apparatus 2 authenticates the group signature data using public information of entrustor apparatus 1. When the group signature data passes the authentication, confirming that user apparatus 3 is a member of entrustor apparatus 1, outsourcer apparatus 2 provides the service to user apparatus 3.
-
Citations
21 Claims
-
1. A service providing system including a user apparatus, an entrustor apparatus for registering the user apparatus as a member for receiving a predetermined service when a registration request for enrolling the user apparatus as the member is received from the user apparatus, and an outsourcer apparatus for providing said predetermined service to the member which has requested said predetermined service on behalf of said entrustor apparatus, the arrangement being such that when said outsourcer apparatus is requested to provide said predetermined service by the user apparatus, said outsourcer apparatus authenticates whether the user apparatus is said member or not according to a group signature scheme, wherein
said entrustor apparatus comprises: -
a group key generator that generates public information, a member registration key, and an open key for use in said group signature scheme; a public information provider that provides the public information generated by said group key generator to said outsourcer apparatus; a signature key generator that generates a signature key corresponding to said user apparatus using said public information and said member registration key, in response to said registration request from said user apparatus; and a signature information provider that provides the signature key generated by said signature key generator and said public information to said user apparatus; said user apparatus comprises; a group signature generator that generates group signature data using the signature key and the public information provided by said signature information provider, and a request for said predetermined service; and a group signature data provider that provides the group signature data generated by said group signature generator and the request for said predetermined service to said outsourcer apparatus; and said outsourcer apparatus comprises; an authenticator that authenticates the group signature data provided by said group signature data provider as being legitimate or not using the public information provided by said public information provider; and a service provider that provides said predetermined service to said user apparatus in response to the request for said predetermined service if said authenticator judges that said group signature data are legitimate. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A service providing method to be carried out by a service providing system including a user apparatus, an entrustor apparatus for registering the user apparatus as a member for receiving a predetermined service when a registration request for enrolling the user apparatus as the member is received from the user apparatus, and an outsourcer apparatus for providing said predetermined service to the member which has requested said predetermined service on behalf of said entrustor apparatus, the arrangement being such that when said outsourcer apparatus is requested to provide said predetermined service by the user apparatus, said outsourcer apparatus authenticates whether the user apparatus is said member or not according to a group signature scheme, said service providing method comprising:
-
group key generating, which is executed by said entrustor apparatus, public information, a member registration key, and an open key for use in said group signature scheme; public information providing, which is executed by said entrustor apparatus, the public information to said outsourcer apparatus; signature key generating, which is executed by said entrustor apparatus, a signature key corresponding to said user apparatus using said public information and said member registration key, in response to said registration request from said user apparatus; signature information providing, which is executed by said entrustor apparatus, the signature key and said public information to said user apparatus; group signature generating, which is executed by said user apparatus, group signature data using the signature key and the public information provided by said signature information provider, and a request for said predetermined service; group signature data providing, which is executed by said user apparatus, the group signature data and the request for said predetermined service to said outsourcer apparatus; authenticating, which is executed by said outsourcer apparatus, the group signature data provided by said user apparatus as being legitimate or not, using the public information provided by said entrustor apparatus; and service providing, which is executed by said outsourcer apparatus, said predetermined service to said user apparatus in response to the request for said predetermined service if said group signature data are legitimate. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An outsourcer apparatus connected to a user apparatus and an entrustor apparatus for registering the user apparatus as a member for receiving a predetermined service when a registration request for enrolling the user apparatus as the member is received from the user apparatus, for providing said predetermined service to the member which has requested said predetermined service on behalf of said entrustor apparatus, the arrangement being such that when said outsourcer apparatus is requested to provide said predetermined service by the user apparatus, said outsourcer apparatus authenticates the user apparatus as said member or not according to a group signature scheme, said outsourcer apparatus comprising:
-
a receiver that receives public information for use in the group signature scheme from said entrustor apparatus; an authenticator that authenticates group signature data as legitimate or not using said public information when the group signature data and a request for said predetermined service are received from said user apparatus; and a service provider that provides said predetermined service to said user apparatus in response to the request for said predetermined service if said authenticator judges that said group signature data are legitimate. - View Dependent Claims (14, 15)
-
-
16. A service providing method to be carried out by an outsourcer apparatus connected to a user apparatus and an entrustor apparatus for registering the user apparatus as a member for receiving a predetermined service when a registration request for enrolling the user apparatus as the member is received from the user apparatus, for providing said predetermined service to the member which has requested said predetermined service on behalf of said entrustor apparatus, the arrangement being such that when said outsourcer apparatus is requested to provide said predetermined service by the user apparatus, said outsourcer apparatus authenticates the user apparatus as said member or not according to a group signature scheme, said service providing method comprising:
-
receiving public information for use in the group signature scheme from said entrustor apparatus; authenticating group signature data as legitimate or not using said public information when the group signature data and a request for said predetermined service are received from said user apparatus; and providing said predetermined service to said user apparatus in response to the request for said predetermined service if said group signature data are legitimate. - View Dependent Claims (17, 18)
-
-
19. A program for controlling a computer connected to a user apparatus and an entrustor apparatus for registering the user apparatus as a member for receiving a predetermined service when a registration request for enrolling the user apparatus as the member is received from the user apparatus, for providing said predetermined service to the member which has requested said predetermined service on behalf of said entrustor apparatus, the arrangement being such that when said computer is requested to provide said predetermined service by the user apparatus, said computer authenticates the user apparatus as said member or not according to a group signature scheme, said program enabling said computer to perform a service process comprising:
-
receiving public information for use in the group signature scheme from said entrustor apparatus; authenticating group signature data as legitimate or not using said public information when the group signature data and a request for said predetermined service are received from said user apparatus; and providing said predetermined service to said user apparatus in response to the request for said predetermined service if said group signature data are legitimate.
-
-
20. A computer readable recording medium on which a program is embedded, the program for controlling a computer connected to a user apparatus and an entrustor apparatus for registering the user apparatus as a member for receiving a predetermined service when a registration request for enrolling the user apparatus as the member is received from the user apparatus, for providing said predetermined service to the member which has requested said predetermined service on behalf of said entrustor apparatus, the arrangement being such that when said computer is requested to provide said predetermined service by the user apparatus, said computer authenticates the user apparatus as said member or not according to a group signature scheme, said program enabling said computer to perform a service process comprising:
-
receiving public information for use in the group signature scheme from said entrustor apparatus; authenticating group signature data as legitimate or not using said public information when the group signature data and a request for said predetermined service are received from said user apparatus; and providing said predetermined service to said user apparatus in response to the request for said predetermined service if said group signature data are legitimate.
-
-
21. An outsourcer apparatus connected to a user apparatus and an entrustor apparatus for registering the user apparatus as a member for receiving a predetermined service when a registration request for enrolling the user apparatus as the member is received from the user apparatus, for providing said predetermined service to the member which has requested said predetermined service on behalf of said entrustor apparatus, the arrangement being such that when said outsourcer apparatus is requested to provide said predetermined service by the user apparatus, said outsourcer apparatus authenticates the user apparatus as said member or not according to a group signature scheme, said outsourcer apparatus comprising:
-
receiving means for receiving public information for use in the group signature scheme from said entrustor apparatus; authenticating means for authenticating group signature data as legitimate or not using said public information when the group signature data and a request for said predetermined service are received from said user apparatus; and service providing means for providing said predetermined service to said user apparatus in response to the request for said predetermined service if said authenticating means judges that said group signature data are legitimate.
-
Specification