Privacy protection method, device for transmitting identifier for privacy protection, privacy protection system and program, and monitoring system
First Claim
1. A privacy protection method for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier, including:
- an identifier guard step of bringing an proper identifier of a radio identifier transmitter affixed to an article purchased and thereby possessed by a personal user into an identifier guard state not readable by a stranger according to the intention of said personal user;
an identifier generation step of generating an identifier for disturbing a privacy invader with a privacy protection identifier transmitter possessed by said personal user;
a transmission step of transmitting said identifier generated through said identifier generation step from said privacy protection identifier transmitter when receiving an identifier transmission request; and
a reading step of rendering the identifier of said radio identifier transmitter in the identifier guard state readable according to the intension of the personal user, wherein said identifier generation step includes a variable type identifier generation step capable of generating an identifier different from a precedently transmitted identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
[PROBLEMS] To prevent privacy invasion performed according to a proper identifier which has been read.
[MEANS FOR SOLVING PROBLEMS] A pseudo-RFID transmission device for transmitting a pseudo identifier (RFID) for disturbing an invader is provided to an individual user. When an RFID transmission instruction is received from a tag reader (SAI), a variable type pseudo RFID different from the one which has been transmitted previously is transmitted (SA3 to SA5) and different RFID is transmitted each time for the same person. The respective pseudo RFID transmission devices are grouped into a plurality of types, so that the pseudo RFID transmission devices belonging to the same group transmit their variable type pseudo RFID while increasing the possibility to transmit common pseudo RFID accorded with one another. An area is specified for each group and the respective pseudo RFID transmission devices are provided to individual users, so that the same RFID may be transmitted for the same person.
65 Citations
46 Claims
-
1. A privacy protection method for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier, including:
-
an identifier guard step of bringing an proper identifier of a radio identifier transmitter affixed to an article purchased and thereby possessed by a personal user into an identifier guard state not readable by a stranger according to the intention of said personal user;
an identifier generation step of generating an identifier for disturbing a privacy invader with a privacy protection identifier transmitter possessed by said personal user;
a transmission step of transmitting said identifier generated through said identifier generation step from said privacy protection identifier transmitter when receiving an identifier transmission request; and
a reading step of rendering the identifier of said radio identifier transmitter in the identifier guard state readable according to the intension of the personal user, wherein said identifier generation step includes a variable type identifier generation step capable of generating an identifier different from a precedently transmitted identifier.
-
-
2. A privacy protection method for preventing an invasion of privacy performed by reading an proper identifier of a radio identifier transmitter affixed to an article purchased and thereby possessed by a personal user and on the basis of said proper identifier, including:
-
an identifier generation step of generating an identifier for disturbing a privacy invader with a privacy protection identifier transmitter possessed by said personal user; and
a transmission step of transmitting said identifier generated through said identifier generation step from said privacy protection identifier transmitter when receiving an identifier transmission request, wherein said identifier generation step includes an adjusted identifier generation step for generating an adjusted identifier so adjusted that an identifier transmitted from said personal user possessing said privacy protection identifier transmitter is identical to an identifier transmitted from a stranger in response to the identifier transmission request, for causing such a different person identical identifier transmission phenomenon that identical identifiers are transmitted even in case of transmission from different persons.
-
-
3. A privacy protection method for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier, including:
-
a provision step of providing privacy protection identifier transmitters to a plurality of personal users, wherein said privacy protection identifier transmitters include;
identifier generation means generating an identifier for disturbing a privacy invader; and
transmission means transmitting said identifier generated by said identifier generation means when receiving an identifier transmission request, said identifier generation means includes variable type identifier generation means capable of generating an identifier different from a precedently transmitted identifier, said variable type identifier generation means is capable of generating a common identifier according with an identifier transmitted from said privacy protection identifier transmitter possessed by a person different from persons possessing said privacy protection identifier transmitters generating and transmitting identifiers with said variable type identifier generation means, said plurality of privacy protection identifier transmitters are classified into a plurality of groups formed by privacy protection identifier transmitters transmitting said common identifier in a higher frequency as compared with an identifier of a stranger and having said common identifier varying with groups, and said provision step specifies an area every said group and provides said privacy protection identifier transmitters belonging to said group to the personal users.
-
-
4. A privacy protection method for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier, including:
-
a provision step of providing a privacy protection identifier transmitter to a plurality of personal users, wherein said privacy protection identifier transmitter includes;
identifier generation means generating an identifier for disturbing a privacy invader, and transmission means transmitting said identifier generated by said identifier generation means when receiving an identifier transmission request, said identifier generation means includes variable type identifier generation means capable of generating an identifier different from a precedently transmitted identifier, and said variable type identifier generation means is capable of generating a common identifier according with an identifier transmitted from a privacy protection identifier transmitter possessed by a person different from a person possessing the privacy protection identifier transmitter generating the identifier with said variable type identifier generation means, for simultaneously transmitting a previously set prescribed number of identifiers from a privacy protection transmitter provided to a certain personal user through said provision step, and simultaneously transmitting a plurality of identifiers of a number larger than said prescribed number from a privacy protection identifier transmitter provided to another personal user different from said certain personal user through said provision step and generating another identifier, excluding said prescribed number of identifiers, included in said plurality of identifiers as said common identifier.
-
-
5. A device for transmitting an identifier for privacy protection for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier, including:
-
variable type identifier generation means, which is means disturbing a privacy invader and generating an identifier for privacy protection, capable of generating an identifier different from a precedently transmitted identifier; and
transmission means transmitting an identifier generated by said variable type identifier generation means when receiving an identifier transmission request. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A privacy protection method for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier, including:
-
a registration processing step of performing processing of registering information allowing specification of correspondence between a pseudonym created for acting as an anonymous user by giving the pseudonym in order to protect the privacy of a personal user and said personal user in a prescribed institution having the duty of confidentiality;
an electronic certificate issuing step of issuing an electronic certificate for said anonymous user;
an address setting step for setting the address of said anonymous user to an address different from that of the personal user corresponding to said pseudonym;
a user registration step of registering as said anonymous user by registering information of said pseudonym when performing user registration to a prescribed trader;
a transmission step of transmitting an identifier from a privacy protection identifier transmitter possessed by said personal user when receiving an identifier transmission request; and
pseudonym identifier storage means storing a pseudonym identifier corresponding to said trader registering said pseudonym through said user registration step, for reading said pseudonym identifier corresponding to said trader from said pseudonym identifier storage means and transmitting the same in said transmission step when transmitting said identifier to said trader registering said pseudonym. - View Dependent Claims (18)
-
-
19. A privacy protection system for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier, including:
-
registration processing means performing processing of registering information allowing specification of correspondence between a pseudonym created for acting as an anonymous user by giving the pseudonym in order to protect the privacy of a personal user and said personal user in a prescribed institution having the duty of confidentiality;
user registration means for registering as said anonymous user by registering information of said pseudonym when performing user registration to a prescribed trader;
transmission means transmitting an identifier from a privacy protection identifier transmitter possessed by said personal user when receiving an identifier transmission request; and
pseudonym identifier storage means storing a pseudonym identifier corresponding to said trader registering said pseudonym through said user registration means, wherein said transmission means reads said pseudonym identifier corresponding to said trader from said pseudonym identifier storage means and transmits the same when transmitting said identifier to said trader registering said pseudonym.
-
-
20. A device for transmitting an identifier for privacy protection for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier, including:
-
pseudonym identifier storage means storing, when a personal user acts as an anonymous user by giving a pseudonym to a prescribed trader, a pseudonym identifier corresponding to said trader; and
transmission means, which is means transmitting an identifier when receiving an identifier transmission request, reading said pseudonym identifier corresponding to said trader from said pseudonym identifier storage means and transmitting the same when transmitting said identifier to said trader. - View Dependent Claims (21, 22, 23)
-
-
24. A program for preventing an invasion of privacy performed by reading an proper identifier and on the basis of said proper identifier,
for making a computer provided on a privacy protection identifier transmitter function as: -
variable type identifier generation means, which is means generating a privacy protection identifier for disturbing a privacy invader, capable of generating an identifier different from a precedently transmitted identifier; and
transmission means transmitting the identifier generated by said variable type identifier generation means when receiving an identifier transmission request. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A monitoring system monitoring leakage of private information, including:
-
partner specifying mail address generation processing means, which is means generating an proper mail address to be used for a specific mail partner for exchanging electronic mails, performing processing for generating a partner specifying mail address allowing inference of information specifying said mail partner; and
monitor means inferring, when the mail address of a sendee of an electronic mail transmitted from a sender is said partner specifying mail address generated by said partner specifying mail address generation processing means, information specifying said mail partner corresponding to said partner specifying mail address and monitoring whether or not said inferred information specifying the mail partner and information of the sender of said electronic mail accord with each other. - View Dependent Claims (36, 37)
-
-
38. A monitoring system for monitoring and preventing a spam, including:
-
partner specifying mail address generation processing means, which is means generating an proper mail address to be used for a specific mail partner for exchanging electronic mails, performing processing for generating a partner specifying mail address allowing inference of information specifying said mail partner; and
monitor means inferring, when the mail address of a sendee of an electronic mail transmitted from a sender is said partner specifying mail address generated by said partner specifying mail address generation processing means, information specifying said mail partner corresponding to said partner specifying mail address and monitoring whether or not said inferred information specifying the mail partner and information of the sender of said electronic mail accord with each other. - View Dependent Claims (39, 40, 41)
-
-
42. A privacy protection method for monitoring an invasion of privacy performed by reading an proper identifier related to a personal user and on the basis of said proper identifier, including:
-
an identifier guard step of bringing an proper identifier of a radio identifier transmitter affixed to an article purchased and thereby possessed by the personal user into an identifier guard state not readable by a stranger according to the intension of said personal user;
a mail address notification processing step of performing, when said personal user notifies his/her mail address to a prescribed trader as a customer or a user, processing of generating a notification mail address, which is a new notification mail address for said trader, allowing inference of information specifying said trader and notifying the same to said trader;
a notified trader identifier generation step of generating a notified trader identifier corresponding to the notified trader to which said notification mail address is notified through said mail address notification processing step;
a transmission step of transmitting said notified trader identifier, identical every time, generated through said notified trader identifier generation step when transmitting an identifier to said notified trader in response to an identifier transmission request while transmitting said notified trader identifier when receiving an operation of the personal user for transmitting said notified trader identifier also in a case of transmitting an identifier to a person other than said notified trader;
an electronic mail transmission step for transmitting an electronic mail transmitted from a sender to a sendee according to a specified mail address; and
a monitoring step of inferring information specifying said notified trader corresponding to said notification mail address when the mail address of the sendee of the electronic mail transmitted through said electronic mail transmission step is said notification mail address notified through said mail address notification processing step for monitoring whether or not said inferred information specifying the notified trader and the information of the sender of said electronic mail accord with each other.
-
-
43. A privacy protection system for monitoring an invasion of privacy performed by reading an proper identifier related to a personal user and on the basis of said proper identifier, including:
-
mail address notification processing means performing, when said personal user notifies his/her mail address to a prescribed trader as a customer or a user, processing of generating a notification mail address, which is a new notification mail address for said trader, allowing inference of information specifying said trader and notifying the same to said trader;
notified trader identifier generation means generating a notified trader identifier corresponding to the notified trader to which said notification mail address is notified through said mail address notification processing means;
transmission means transmitting said notified trader identifier, identical every time, generated by said notified trader identifier generation means when transmitting an identifier to said notified trader in response to an identifier transmission request while transmitting said notified trader identifier when receiving an operation of the personal user for transmitting said notified trader identifier also in a case of transmitting an identifier to a person other than said notified trader; and
monitor means inferring information specifying said notified trader corresponding to said notification mail address when the mail address of a sendee of an electronic mail transmitted from a sender is said notification mail address notified through said mail address notification processing means for monitoring whether or not said inferred information specifying the notified trader and the information of the sender of said electronic mail accord with each other. - View Dependent Claims (44, 45)
-
-
46. A device for transmitting an identifier for privacy protection for preventing an invasion of privacy performed by reading an proper identifier related to a personal user and on the basis of said proper identifier, including:
-
notified trader identifier generation means generating a notified trader identifier corresponding to a notified trader, for which prescribed trader said personal user generates a new notification mail address as a customer or a user for notifying the same to said trader; and
transmission means transmitting said notified trader identifier, identical every time, generated by said notified trader identifier generation means when transmitting an identifier to said notified trader in response to an identifier transmission request while transmitting said notified trader identifier when receiving an operation of the personal user for transmitting said notified trader identifier also in a case of transmitting an identifier to a person other than said notified trader.
-
Specification