Shop apparatus, purchaser apparatus, purchaser identity proving apparatus, and purchaser identity verifying apparatus

a technology for proving apparatuses and purchasers, applied in the direction of instruments, buying/selling/leasing transactions, data processing applications, etc., can solve the problems of unreliable service providers, user requests may not be directly handled only between users, and the number of times the user uses the service provider is unknown, so as to eliminate the inconvenience of unlinkability for the past.

Active Publication Date: 2008-07-24
TOSHIBA DIGITAL SOLUTIONS CORP +1
View PDF18 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011]It is an object of the invention to provide a shop apparatus, a purchaser apparatus, a purchaser identity proving apparatus, and a purchaser identity verifying apparatus, which are configured to eliminate unlinkability for past use when necessary, and to eliminate inconvenience caused by unlinkability.
[0017]In first and second aspects of the invention, a purchaser apparatus stores “anonymous order information including an order ID and purchaser identity verifying information” and “purchaser identity proving secret information”. A shop apparatus stores “anonymous order information including an order ID and purchaser identity verifying information”. If necessary, a purchaser sends a request including an order ID and zero knowledge proving information that a purchaser knows the purchaser identity verifying secret information, from a purchaser apparatus to a shop apparatus. A shop apparatus verifies the zero knowledge proving information, based on the purchaser identity verifying information retrieved from an order ID included in this request. Therefore, the unlinkability for past use can be eliminated when necessary, and the inconvenience caused by the unlinkability can be eliminated.
[0018]In third to fifth aspects of the invention, a purchaser apparatus stores “anonymous order information including an order ID and purchaser identity verifying information” and “a secret calculation value calculated from purchaser identity proving secret information”. A purchaser identity proving apparatus stores “purchaser identity proving secret information”. A shop apparatus stores “anonymous order information including an order ID and purchaser identity verifying information”. If necessary, a purchaser sends a request including one or more pieces of order ID and zero knowledge proving information that purchaser identity proving secret information is common and that a purchaser knows it, from a purchaser identity proving apparatus to a purchaser identity verifying apparatus. A purchaser identity verifying apparatus requests one or more pieces of anonymous order information corresponding to one or more pieces of order ID included in this request, from a shop apparatus, and verifies the zero knowledge proving information proving information based on one or more pieces of purchaser identity verifying information included in the obtained one or more pieces of anonymous order information. Therefore, the unlinkability for past use can be eliminated when necessary, and the inconvenience caused by the unlinkability can be eliminated. Further, as an apparatus for separating an anonymous order from an apparatus for receiving merchandise, the application range of an anonymous order can be enlarged, for example by a function of receiving merchandise anonymously ordered from home at a convenience store. Further, security for reception of merchandise by an illegal anonymous order can be improved.

Problems solved by technology

However, although unlinkability is an important property from the viewpoint of protection of personal information and privacy, it may cause inconvenience to a service provider.
For example, when a user wants to inquire about or return purchased goods and services, as unlinkability is given to the purchased goods and services, such user's requests may not be directly handled only between the user and service provider.
Further, when the same user repeatedly uses the same service provider, as unlinkability is given to the purchased goods and services, the number of times the user uses the service provider is unknown.
This means that benefits such as offering point services or the gathering of market information regarding usage cannot be carried out.
In the service providing systems used prior to the above-mentioned proposed techniques, as a person is always identified, although actions to inquire / request return of merchandise and provision of point service are easy to provide, protection of personal information and privacy is difficult to realize.
On the other hand, having unlinkability may make it difficult to inquire based on past use or request to return merchandise, or provide point service based on past use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

embodiment 1

MODIFICATION OF EMBODIMENT 1

[0215] This embodiment can be applied to the access control system described in Jpn. Pat. Appln. KOKAI Publication No. 2004-054905 and the anonymous authentication system described in Jpn. Pat. Appln. KOKAI Publication No. 2004-320562. When the embodiment is applied to the systems of these two publications, an ID capable of uniquely identifying a service request may be used, instead of the above-mentioned order ID. For example, if the length of challenge is sufficiently long in the anonymous authentication system described in Jpn. Pat. Appln. KOKAI Publication No. 2004-320562, a challenge may be used.

[0216] As a method of selecting a requested order ID by the purchaser identity proving unit 37, a purchaser may explicitly select such, or the purchaser apparatus 30 may automatically select such.

[0217]For example, when a purchaser wants to make an inquiry about certain merchandise or a merchandise return request, the purchaser must select the method. On the ...

embodiment 2

MODIFICATION OF EMBODIMENT 2

[0270], The first and second modifications and of the first embodiment can also be realized as modifications of this embodiment.

[0271] This embodiment can be modified to use zero knowledge proof of other systems, in addition to the zero knowledge proof of Definition 4 described in G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, “A Practical and Provably Secure Coalition-Resistant Group Signature Scheme”, CRYPTO 2000, LNCS 1880, Springer-Verlag, pp. 255-270, 2000.

[0272] This embodiment can be modified to use a traceable signature instead of a group signature, and to use claiming in a traceable signature instead of zero knowledge proof (e.g., refer to A. Kiayias, Y. Tsioumis, M. Young, “Traceable Signatures”, EUROCRPT 2004, lncs 3027, Springer-Verlag, pp. 571-589, 2004).

[0273] this embodiment dos not use a different value for each order as purchaser identity proving secret information, but can use a value common to all orders. In this case, values need...

embodiment 3

MODIFICATION OF EMBODIMENT 3

[0309], The first and second modifications and of the first embodiment can also be realized as modifications of this embodiment.

[0310] This embodiment can be modified to use zero knowledge proof of other systems, in addition to the zero knowledge proof of Definition 5 described in G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, “A Practical and Provably Secure Coalition-Resistant Group Signature Scheme”, CRYPTO 2000, LNCS 1880, Springer-Verlag, pp. 255-270, 2000.

[0311] This embodiment can use purchaser identity proving secret information common to all orders. In this case, it is unnecessary to manage a value for each order, and the value may be managed just like a member secret key.

EMBODIMENT 4

[0312]FIG. 19 is a schematic diagram showing the configuration of an anonymous order system according to a fourth embodiment of the invention. FIG. 20 and FIG. 21 are schematic diagrams showing a storage unit for a purchaser, and a purchaser identity proving se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A purchaser apparatus stores “anonymous order information including an order ID and purchaser identity verifying information” and “purchaser identity proving secret information”. A shop apparatus stores “anonymous order information including an order ID and purchaser identity verifying information”. If necessary, a purchaser sends a request including an order ID and zero knowledge proving information that a purchaser knows the purchaser identity proving secret information, from a purchaser apparatus to a shop apparatus. A shop apparatus verifies the zero knowledge proving information, based on purchaser identity verifying information retrieved from an order ID included in the request. Therefore, the unlinkability for past use is eliminated if necessary, and inconvenience caused by the unlinkability is eliminated.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is based upon and claims the benefit of priority from prior Japanese Patent Application No. 2007-012749, filed Jan. 23, 2007, the entire contents of which are incorporated herein by reference.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to a shop apparatus for an anonymous order, a purchaser apparatus, a purchaser identity proving apparatus, and a purchaser identity verifying apparatus using a group signature scheme.[0004]2. Description of the Related Art[0005]In the field of providing online sales service, techniques using a group signature scheme (for example, D. Chaum, E. Van Heyst, “Group Signatures”, EUROCRYPT '91, LNCS 547, Springer-Verlag, pp. 257-265, 1991, G Ateniese, J. Camenisch, M. Joye and G. Tsudik, “A Practical and Provably Secure Coalition-Resistant Group Signature Scheme”, CRYPT 2000, LNCS 1880, Springer-Verlag, pp. 255-270, 2000. Atsuko Miyaji, Hiroaki Kik...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q30/00
CPCG06Q10/107G06Q30/0615G06Q30/0609G06F21/6254G06Q30/06
Inventor YOSHIDA, TAKUYATADA, MINAKOHOSAKA, NORIKAZUOKADA, KOJIKATO, TAKEHISA
Owner TOSHIBA DIGITAL SOLUTIONS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products