Method and system for transmitting and receiving user's personal information using agent
First Claim
1. A method of transmitting user'"'"'s personal information, the method comprising:
- detecting user'"'"'s personal information in response to a user'"'"'s personal information request message from a client using an information management server;
generating an encryption key used to encrypt the detected user'"'"'s personal information and a decryption key used to decrypt the encrypted user'"'"'s personal information;
encrypting the detected user'"'"'s personal information using the encryption key and signing the encrypted user'"'"'s personal information;
generating an agent comprising the encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, and verification information used to provide the user'"'"'s personal information only to an authorized client, wherein the verification information comprises the user'"'"'s purpose information comprised in the user'"'"'s personal information request message; and
transmitting the agent and the decryption key to the client,wherein the verification information is included in the agent before the user'"'"'s personal information is encrypted and the user'"'"'s personal information signature value is transmitted to the client, wherein the verification information;
is included without being encrypted so that the verification information can be utilized by the client without decryption, andcomprises a public key of the client; and
wherein the agent receives the user'"'"'s personal information request message from the client and detects the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value when it is determined that the client is authorized to access the user'"'"'s personal information based on the verification information,wherein the agent is a software mobile agent which can move to and work in a different host.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for transmitting and receiving user'"'"'s personal information using an agent are provided. An information management server managing user'"'"'s personal information provides an agent including user'"'"'s personal information in response to a user'"'"'s personal information request message from a client. A client receives the agent and requests user'"'"'s personal information from the agent. Then, the agent determines whether the client is authorized and provides the user'"'"'s personal information to the client when it is determined that the client is authorized. Accordingly, the user'"'"'s personal information is safely managed and transmitted.
19 Citations
17 Claims
-
1. A method of transmitting user'"'"'s personal information, the method comprising:
-
detecting user'"'"'s personal information in response to a user'"'"'s personal information request message from a client using an information management server; generating an encryption key used to encrypt the detected user'"'"'s personal information and a decryption key used to decrypt the encrypted user'"'"'s personal information; encrypting the detected user'"'"'s personal information using the encryption key and signing the encrypted user'"'"'s personal information; generating an agent comprising the encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, and verification information used to provide the user'"'"'s personal information only to an authorized client, wherein the verification information comprises the user'"'"'s purpose information comprised in the user'"'"'s personal information request message; and transmitting the agent and the decryption key to the client, wherein the verification information is included in the agent before the user'"'"'s personal information is encrypted and the user'"'"'s personal information signature value is transmitted to the client, wherein the verification information; is included without being encrypted so that the verification information can be utilized by the client without decryption, and comprises a public key of the client; and wherein the agent receives the user'"'"'s personal information request message from the client and detects the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value when it is determined that the client is authorized to access the user'"'"'s personal information based on the verification information, wherein the agent is a software mobile agent which can move to and work in a different host. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of receiving user'"'"'s personal information, the method comprising:
-
a client receiving from an information management server an agent comprising encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, verification information used to provide user'"'"'s personal information only to an authorized client, wherein the verification information comprises the user'"'"'s purpose information comprised in the user'"'"'s personal information request message, and a decryption key used to decrypt the encrypted user'"'"'s personal information; the client transmitting a user'"'"'s personal information request message to the agent; the agent determining whether the client is fairly authorized based on the verification information; when it is determined that the client is authorized, the agent providing the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value to the client; and the client verifying the user'"'"'s personal information signature value using a public key of the information management server and, when the user'"'"'s personal information signature value is verified, decrypting the encrypted user'"'"'s personal information using the decryption key to extract the user'"'"'s personal information, wherein the verification information is included in the agent before the user'"'"'s personal information is encrypted and the user'"'"'s personal information signature value is transmitted to the client, wherein the verification information; is included without being encrypted so that the verification information can be utilized by the client without decryption, and comprises a public key of the client; and wherein the agent receives the user'"'"'s personal information request message from the client and detects the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value when it is determined that the client is authorized to access the user'"'"'s personal information based on the verification information, wherein the agent is a software mobile agent which can move to and work in a different host. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system for transmitting user'"'"'s personal information, the system comprising:
-
an information detector detecting user'"'"'s personal information, that has been stored in advance, in response to a user'"'"'s personal information request message from a client; a key generator generating an encryption key to encrypt the detected user'"'"'s personal information and a decryption key to decrypt the encrypted user'"'"'s personal information; an encryptor encrypting the detected user'"'"'s personal information using the encryption key and signing the encrypted user'"'"'s personal information; an agent generator generating an agent comprising the encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, and verification information used to provide the user'"'"'s personal information only to an authorized client, wherein the verification information comprises the user'"'"'s purpose information comprised in the user'"'"'s personal information request message; and a transceiver receiving the user'"'"'s personal information request message from the client, outputting the user'"'"'s personal information request message to the information detector, and transmitting the agent and the decryption key to the client, wherein the verification information is included in the agent before the user'"'"'s personal information is encrypted and the user'"'"'s personal information signature value is transmitted to the client, wherein the verification information; is included without being encrypted so that the verification information can be utilized by the client without decryption, and comprises a public key of the client; wherein the agent receives the user'"'"'s personal information request message from the client and detects the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value when it is determined that the client is authorized to access the user'"'"'s personal information based on the verification information, wherein authorization is based on; a requested item from the user'"'"'s personal information that is present in storage, the user'"'"'s purpose information in the user'"'"'s personal information request message agreeing with the purpose information in the storage, an arrival time of the request message within an effective period, and a total number of requests that are less than or equal to a user'"'"'s count limit stored in the storage, wherein the agent is a software mobile agent which can move to and work in a different host. - View Dependent Claims (12, 13, 14)
-
-
15. A system for receiving user'"'"'s personal information, the system comprising:
-
a transceiver transmitting a users'"'"' personal information request message to an information management server and receiving from the information management server an agent comprising encrypted user'"'"'s personal information, a user'"'"'s personal information signature value, and verification information used to provide user'"'"'s personal information only to an authorized system and a decryption key used to decrypt the encrypted user'"'"'s personal information, wherein the verification information comprises the user'"'"'s purpose information comprised in the user'"'"'s personal information request message; an agent interface transmitting a user'"'"'s personal information request message to the agent and receiving the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value from the agent when the agent determines that the system is authorized to access the user'"'"'s personal information based on the verification information; and a decryptor verifying the user'"'"'s personal information signature value received through the agent interface using a public key of the information management server and decrypting the encrypted user'"'"'s personal information using the decryption key to extract the user'"'"'s personal information, wherein the verification information is included in the agent before the user'"'"'s personal information is encrypted and the user'"'"'s personal information signature value is transmitted to the client, wherein the verification information; is included without being encrypted so that the verification information can be utilized by the client without decryption, and comprises a public key of the account wherein the agent receives the user'"'"'s personal information request message from the client and detects the encrypted user'"'"'s personal information and the user'"'"'s personal information signature value when it is determined that the client is authorized to access the user'"'"'s personal information based on the verification information, wherein authorization is based on; a requested item from the user'"'"'s personal information that is present in storage, the user'"'"'s purpose information in the user'"'"'s personal information request message agreeing with the purpose information in the storage, an arrival time of the request message within an effective period, and a total number of requests that are less than or equal to a user'"'"'s count limit stored in the storage, wherein the agent is a software mobile agent which can move to and work in a different host. - View Dependent Claims (16, 17)
-
Specification