Signature verification system, verification key management apparatus, verification key management method and program

Pending Publication Date: 2022-08-04
NIPPON TELEGRAPH & TELEPHONE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text is saying that a verification key can be used to confirm the authenticity of a bid request signature. This means that a unique code can be used to verify the integrity of a request for a certain action.

Problems solved by technology

In real-time bidding, there are multiple intermediary players for transactions (e.g., a DSP (Demand-Side Platform), an SSP (Supply-Side Platform), Ad Exchange, an Ad Network, or the like), and therefore there has been a problem in that malicious persons (unauthorized intermediaries) could intrude and commit advertising fraud (ad fraud) such as illegally inflating the advertising effectiveness.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature verification system, verification key management apparatus, verification key management method and program
  • Signature verification system, verification key management apparatus, verification key management method and program
  • Signature verification system, verification key management apparatus, verification key management method and program

Examples

Experimental program
Comparison scheme
Effect test

first example

[0041]Hereinafter, Example 1 will be described.

[0042]

[0043]The functional configurations of the signature generation server 20, the signature verification server 40, and the verification key management server 50 in Example 1 will be described.

[0044]20>>

[0045]FIG. 2 is a diagram showing an example of the functional configuration of the signature generation server 20 in the Example 1. As shown in FIG. 2, the signature generation server 20 in Example 1 has a key pair storage unit 201, a key version notification unit 202, and a signature generation unit 203.

[0046]The key pair storage unit 201 stores a pair (key pair) of a signing key and a verification key for a corresponding publisher. Here, there are cases in which the signature generation server 20 might perform, as proxy, signature generation for a plurality of bid requests generated by a plurality of bid request generation servers 10. For this reason, the key pair storage unit 201 stores each key pair in association with an identif...

example 2

[0109]Hereinafter, Example 2 will be described. Note that the configuration of the signature verification system 1 in Example 2 may be the same as that in Example 1. In Example 2, the bid request generation server 10 and the signature generation server 20 are not required to be included in the signature verification system 1, for example.

[0110]

[0111]The functional configuration of the signature generation server 20, the signature verification server 40, and the verification key management server 50 in Example 2 will be described. Note that the functional configuration of the signature generation server 20 is similar to that in Example 1 and the description thereof will not be provided.

[0112]Note that in Example 2, key information registration (FIG. 5) may be performed as in Example 1, or key information registration may be omitted. Also, for example, key information registration is performed only once or several times at the beginning, and thereafter key information may not be regis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A signature verification system includes a signature generation server, a signature verification server, and a verification key management server that are connected to one another via a communication network. The signature generation server includes: reporting means for, when a signing key and a verification key are generated by a publisher, reporting the verification key and publisher identification information that identifies the publisher to the verification key management server; and signature generation means for signing a bid request issued by the publisher with use of the signing key. The verification key management server includes: registration means for registering the publisher identification information and the verification key that were reported by the reporting means in a storage unit in association with information that enables specifying a version of the verification key; verification means for, upon receiving publisher identification information and a name indicating a verification key from the signature verification server, verifying whether or not a verification key that corresponds to the received publisher identification information and name and that is a latest version is registered in the storage unit; and first transmission means for, if the verification means verified that the verification key that is the latest version is registered in the storage unit, transmitting the latest-version verification key to the signature verification server. The signature verification server includes: second transmission means for, upon receiving the bid request, transmitting publisher identification information and a name indicating a verification key that are included in the bid request to the verification key management server; and signature verification means for, if the publisher identification information and the name were transmitted by the second transmission means and the latest-version verification key was received from the verification key management server in response, performing verification of the bid request with use of the latest-version verification key.

Description

TECHNICAL FIELD[0001]The present invention relates to a signature verification system, a verification key management apparatus, a verification key management method, and a program.BACKGROUND ART[0002]In Internet advertising, a mechanism called real-time bidding (RTB) is known as a mechanism for maximizing both advertising revenue for a seller (publisher) who sells an ad space and advertising effectiveness for a buyer (e.g., an advertiser, an advertising agency, or the like) who submits advertisements.[0003]In real-time bidding, there are multiple intermediary players for transactions (e.g., a DSP (Demand-Side Platform), an SSP (Supply-Side Platform), Ad Exchange, an Ad Network, or the like), and therefore there has been a problem in that malicious persons (unauthorized intermediaries) could intrude and commit advertising fraud (ad fraud) such as illegally inflating the advertising effectiveness. In order to address the problem described above, the IAB (Interactive Advertising Bureau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L2209/56H04L63/123H04L63/0823
Inventor OKANO, YUKIOKUDA, TETSUYAKINJO, KOHA
Owner NIPPON TELEGRAPH & TELEPHONE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products