System, server, information terminal operating system, middleware, information communication device, certification method, and system and application software
First Claim
1. A method of operating a server for providing a network service, said method comprising:
- receiving a first hash value F(Pa′
, Pb) from an information terminal of a user B having a first database containing personal information Pa′
of a user A and personal information Pb of said user B, said first hash value being generated by a hash function applied to a connection of said personal information Pa′ and
said personal information Pb;
correlating an identification tag of said user B with said first hash value F(Pa′
, Pb), said identification tag of said user B uniquely identifying said user B in said network service, and memorize said identification tag of said user B and said first hash value F(Pa′
, Pb);
receiving a second hash value F(Pa, Pb′
) from an information terminal of said user A having a second database containing personal information Pa of said user A and personal information Pb′
of said user B, said second hash value being generated by a hash function applied to a connection of said personal information Pa and said personal information Pb′
, andsearching for a hash value which is equal to said second hash value F(Pa, Pb′
) and detect said identification tag of said user B by detecting said first hash value F(Pa′
, Pb), which is equal to and said second hash value F(Pa′
, Pb), andsending said identification tag of said user B to said information terminal of said user A on a detection of said first hash value F(Pa′
, Pb), which is equal to said second hash value F(Pa, Pb′
).
3 Assignments
0 Petitions
Accused Products
Abstract
A system having a server and an information terminal of A which records A'"'"'s personal information Pa and B'"'"'s personal information Pb′, an information terminal of B which records A'"'"'s personal information Pa and B'"'"'s personal information Pb′. B'"'"'s information terminal generates a calculation result F(Pa′,Pb) via the calculation of Pa′ and Pb, sends F(Pa′,Pb) to a server. The server correlates B'"'"'s identification tag with F(Pa′,Pb) and records it. A'"'"'s information terminal forms F(Pa,Pb′) calculated via the calculation of Pb′ and Pa and sends F(Pa,Pb′) to the server. The server searches for a calculation result which matches F(Pa,Pb′) and by detecting a match between F(Pa′,Pb) and F(Pa,Pb′) detects B'"'"'s identification tag which has been correlated with F(Pa′,Pb) and detected B'"'"'s identification tag is sent to A'"'"'s information terminal.
-
Citations
20 Claims
-
1. A method of operating a server for providing a network service, said method comprising:
-
receiving a first hash value F(Pa′
, Pb) from an information terminal of a user B having a first database containing personal information Pa′
of a user A and personal information Pb of said user B, said first hash value being generated by a hash function applied to a connection of said personal information Pa′ and
said personal information Pb;correlating an identification tag of said user B with said first hash value F(Pa′
, Pb), said identification tag of said user B uniquely identifying said user B in said network service, and memorize said identification tag of said user B and said first hash value F(Pa′
, Pb);receiving a second hash value F(Pa, Pb′
) from an information terminal of said user A having a second database containing personal information Pa of said user A and personal information Pb′
of said user B, said second hash value being generated by a hash function applied to a connection of said personal information Pa and said personal information Pb′
, andsearching for a hash value which is equal to said second hash value F(Pa, Pb′
) and detect said identification tag of said user B by detecting said first hash value F(Pa′
, Pb), which is equal to and said second hash value F(Pa′
, Pb), andsending said identification tag of said user B to said information terminal of said user A on a detection of said first hash value F(Pa′
, Pb), which is equal to said second hash value F(Pa, Pb′
). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A server providing a network service, said server comprising a data processor, said data processor receiving a first hash value F(Pa′
- , Pb) which is calculated by a hash function applied to a connection of personal information Pa′
of a user A and personal information Pb of a user B, said first hash value F(Pa′
, Pb) being generated in the information terminal of said user B having a first database containing said personal information Pa′ and
said personal information Pb, and correlating an identification tag of said user B with said first hash value F(Pa′
, Pb), said identification tag of said user B uniquely identifying said user B in said network service, and memorizing said identification tag of said user B and said first value F(Pa′
, Pb), wherein said server receives a second hash value F(Pa, Pb′
) which is calculated by said hash function applied to a connection of said personal information Pa of said user A and said personal information Pb′
of said user B, said second hash value F(Pa, Pb′
) being generated in said information terminal of said user A having a second database containing said personal information Pa and said personal information Pb′
, and searches for a hash value which is equal to said second hash value F(Pa, Pb′
) and detects said identification tag of said user B by detecting said first hash value F(Pa'"'"', Pb), which is equal to said second hash value F(Pa, Pb′
), and sends said identification tag of said user B to said information terminal of said user A.
- , Pb) which is calculated by a hash function applied to a connection of personal information Pa′
-
10. An information terminal comprising:
-
a first database containing personal information Pa of a user A and personal information Pb′
of a user B;calculation means which generates a first hash value F(Pa, Pb′
) calculated by a hash function applied to a connection of said personal information Pa of said user A and said personal information Pb′
of said user B;sending means which sends said first hash value F(Pa, Pb′
) to a server providing a network service, and;receiving means, wherein said server correlates a second hash value F(Pa′
, Pb) calculated by said hash function applied to a connection of said information Pa′
of said user A and said information Pb of said user B with said identification tag of said user B, said second hash value F(Pa ′
Pb) being calculated in an information terminal of said user B having a second database containing said personal information Pa′ and
said personal information Pb, said identification tag of said user B uniquely identifying said user B in said network service, memorizes said second hash value F(Pa′
, Pb) and said identification tag of said user B, and searches for a hash value which is equal to said first hash value F(Pa, Pb′
) which is sent from said information terminal of said user A, said receiving means receiving said identification tag of said user B by detecting said first hash value F(Pa, Pb′
), which is equal to said second hash value F(Pa′
, Pb). - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method comprising:
-
generating a first hash value F(Pa, Pb′
) calculated by a hash function applied to a connection of personal information Pa of a user A and personal information Pb′
of a user B in an information terminal of said user A having a first database containing said personal information Pa and said personal information Pb′
;sending said first hash value F(Pa, Pb′
) to a server providing a network service, and;at said server, (a) correlating a second hash value F(Pa′
, Pb) calculated by said hash function applied to a connection of said personal information Pa′
of said user A and said personal information Pb of said user B with an identification tag of said user B, said second hash value F(Pa′
Pb) being calculated in an information terminal of said user B having a second database containing said personal information Pa′ and
said personal information Pb, said identification tag of said user B identifying said user B uniquely in said network service, (b) memorizing said second hash value F(Pa′
, Pb) and said identification tag of said user B, and (c) searching for an hash value which is equal to said first hash value F(Pa, Pb′
) which is sent from said information terminal of said user A; andreceiving said identification tag of said user B by detecting a match between said first hash value F(Pa, Pb′
) and said second hash value F(Pa′
, Pb). - View Dependent Claims (20)
-
Specification