INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING METHOD
First Claim
1. An information processing system comprising:
- a first information processing apparatus that includesan authentication unit configured to perform an authentication process with respect to information transmitted from a client apparatus;
a first generating unit configured to generate a hash value of predetermined information in a case where the authentication process by the authentication unit is successful;
an encryption unit configured to generate encrypted data by encrypting the hash value generated by the first generating unit using a first encryption key; and
a response unit configured to transmit the encrypted data and the predetermined information to the client apparatus; and
a second information processing apparatus that includesa request receiving unit configured to receive a request transmitted from the client apparatus, the request including the encrypted data generated by the encryption unit and the predetermined information;
a decryption unit configured to decrypt the encrypted data included in the request received by the request receiving unit using a second encryption key, the second encryption key being the same as the first encryption key or forming a pair with the first encryption key;
a second generating unit configured to generate a hash value of the predetermined information included in the request received by the request receiving unit; and
a comparison unit configured to compare a decryption result obtained by the decryption unit with the hash value generated by the second generating unit;
wherein the second information processing apparatus executes a process in response to the request according to a comparison result of the comparison unit.
1 Assignment
0 Petitions
Accused Products
Abstract
An information processing system is provided in which a first information processing apparatus generates a hash value of predetermined information when authentication is successfully performed with respect to information transmitted from a client apparatus, generates encrypted data by encrypting the hash value using a first encryption key, and transmits the encrypted data and the predetermined information to a client apparatus. A second information processing apparatus receives a request including the encrypted data and the predetermined information that is transmitted from the client apparatus, decrypts the encrypted data using a second encryption key that is the same as the first encryption key or forms a pair with the first encryption key, generates a hash value of the predetermined information included in the received request, compares the decryption result with the generated hash value, and executes a process in response to the request according to the comparison result.
-
Citations
18 Claims
-
1. An information processing system comprising:
-
a first information processing apparatus that includes an authentication unit configured to perform an authentication process with respect to information transmitted from a client apparatus; a first generating unit configured to generate a hash value of predetermined information in a case where the authentication process by the authentication unit is successful; an encryption unit configured to generate encrypted data by encrypting the hash value generated by the first generating unit using a first encryption key; and a response unit configured to transmit the encrypted data and the predetermined information to the client apparatus; and a second information processing apparatus that includes a request receiving unit configured to receive a request transmitted from the client apparatus, the request including the encrypted data generated by the encryption unit and the predetermined information; a decryption unit configured to decrypt the encrypted data included in the request received by the request receiving unit using a second encryption key, the second encryption key being the same as the first encryption key or forming a pair with the first encryption key; a second generating unit configured to generate a hash value of the predetermined information included in the request received by the request receiving unit; and a comparison unit configured to compare a decryption result obtained by the decryption unit with the hash value generated by the second generating unit; wherein the second information processing apparatus executes a process in response to the request according to a comparison result of the comparison unit. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An information processing method implemented by a first information processing apparatus and a second information processing apparatus, the information processing method comprising:
-
an authentication step that is executed by the first information processing apparatus and includes performing an authentication process with respect to information transmitted from a client apparatus; a first generating step that is executed by the first information processing apparatus and includes generating a hash value of predetermined information in a case where the authentication process performed in the authentication step is successful; an encryption step that is executed by the first information processing apparatus and includes generating encrypted data by encrypting the hash value generated in the first generating step using a first encryption key; a response step that is executed by the first information processing apparatus and includes transmitting the encrypted data and the predetermined information to the client apparatus; a request receiving step that is executed by the second information processing apparatus and includes receiving a request transmitted from the client apparatus, the request including the encrypted data and the predetermined information; a decryption step that is executed by the second information processing apparatus and includes decrypting the encrypted data included in the request received in the request receiving step using a second encryption key, the second encryption key being the same as the first encryption key or forming a pair with the first encryption key; a second generating step that is executed by the second information processing apparatus and includes generating a hash value of the predetermined information included in the request received in the request receiving step; and a comparison step that is executed by the second information processing apparatus and includes comparing a decryption result obtained in the decryption step with the hash value generated in the second generating step; wherein the second information processing apparatus executes a process in response to the request according to a comparison result of the comparison step. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An information processing apparatus comprising:
-
an authentication unit configured to perform an authentication process with respect to information transmitted from a client apparatus; a first generating unit configured to generate a first hash value of first predetermined information in a case where the authentication process by the authentication unit is successful; an encryption unit configured to generate first encrypted data by encrypting the first hash value generated by the first generating unit using a first encryption key; a response unit configured to transmit the first encrypted data and the first predetermined information to the client apparatus; a request receiving unit configured to receive a request transmitted from the client apparatus, the request including second predetermined information and second encrypted data generated by encrypting a second hash value of the second predetermined information; a decryption unit configured to decrypt the second encrypted data included in the request received by the request receiving unit using a second encryption key; a second generating unit configured to generate the second hash value of the second predetermined information included in the request received by the request receiving unit; a comparison unit configured to compare a decryption result obtained by the decryption unit with the second hash value generated by the second generating unit; and a process executing unit configured to execute a process in response to the request according to a comparison result of the comparison unit. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification