INFORMATION SECURITY METHOD USING KEY SYNCHRONIZATION AND INFORMATION SECURITY SYSTEM

PROBLEM TO BE SOLVED: To provide an information security method using key synchronization to be executed by a user terminal.SOLUTION: An information security method in which key synchronization executed by a user terminal is used, includes a step of receiving a processing request of secret informati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: KIM EUI-SEOK, I JONWON, SIM SANG GYOO, LEE SEOK WOO, KIM DEOK SOO
Format: Patent
Sprache:eng ; jpn
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator KIM EUI-SEOK
I JONWON
SIM SANG GYOO
LEE SEOK WOO
KIM DEOK SOO
description PROBLEM TO BE SOLVED: To provide an information security method using key synchronization to be executed by a user terminal.SOLUTION: An information security method in which key synchronization executed by a user terminal is used, includes a step of receiving a processing request of secret information; a step of extracting a key for forming token corresponding to the secret information from a key pool of the user terminal; and a step of forming the token corresponding to the secret information by using the extraction key.EFFECT: Since the formation and decryption of the token is executed at a transmission and reception terminal without interpolating a token server, a risk in security can be diversified. Even when key information is exposed, the secret information is not exposed since the token is only transmitted/received at the transmission and reception terminal. Maintenance and inspection of equipment can be comparatively easily performed by replacing the key pool.SELECTED DRAWING: Figure 4 【課題】使用者端末によって実行されるキー同期化を利用した情報セキュリティー方法を提供する。【解決手段】本発明の使用者端末によって実行されるキー同期化を利用した情報セキュリティー方法は、機密情報の処理要請を受信する段階、使用者端末のキープール(key pool)から機密情報に対応するトークン生成のためのキーを抽出する段階および抽出されたキーを利用して機密情報に対応するトークンを生成する段階を含む。【効果】トークンサーバーを介さずに送受信端でトークンの生成および解読がなされるため、セキュリティーの危険を分散させることができる。また、キー情報が露出されたとしても、トークンは送受信端でのみやりとりされるため機密情報の露出がなく、キープールを取替えて比較的簡単に装備の補修、点検が可能である。【選択図】図4
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2017188902A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2017188902A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2017188902A3</originalsourceid><addsrcrecordid>eNrjZAj19HPzD_J1DPH091MIdnUODfIMiVTwdQ3x8HdRCA329HNX8HaNVAiO9HP2CPL384yCqHT0c1HAqjM4MjjE1ZeHgTUtMac4lRdKczMoubmGOHvophbkx6cWFyQmp-allsR7BRgZGJobWlhYGhg5GhOlCAA3szHS</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>INFORMATION SECURITY METHOD USING KEY SYNCHRONIZATION AND INFORMATION SECURITY SYSTEM</title><source>esp@cenet</source><creator>KIM EUI-SEOK ; I JONWON ; SIM SANG GYOO ; LEE SEOK WOO ; KIM DEOK SOO</creator><creatorcontrib>KIM EUI-SEOK ; I JONWON ; SIM SANG GYOO ; LEE SEOK WOO ; KIM DEOK SOO</creatorcontrib><description>PROBLEM TO BE SOLVED: To provide an information security method using key synchronization to be executed by a user terminal.SOLUTION: An information security method in which key synchronization executed by a user terminal is used, includes a step of receiving a processing request of secret information; a step of extracting a key for forming token corresponding to the secret information from a key pool of the user terminal; and a step of forming the token corresponding to the secret information by using the extraction key.EFFECT: Since the formation and decryption of the token is executed at a transmission and reception terminal without interpolating a token server, a risk in security can be diversified. Even when key information is exposed, the secret information is not exposed since the token is only transmitted/received at the transmission and reception terminal. Maintenance and inspection of equipment can be comparatively easily performed by replacing the key pool.SELECTED DRAWING: Figure 4 【課題】使用者端末によって実行されるキー同期化を利用した情報セキュリティー方法を提供する。【解決手段】本発明の使用者端末によって実行されるキー同期化を利用した情報セキュリティー方法は、機密情報の処理要請を受信する段階、使用者端末のキープール(key pool)から機密情報に対応するトークン生成のためのキーを抽出する段階および抽出されたキーを利用して機密情報に対応するトークンを生成する段階を含む。【効果】トークンサーバーを介さずに送受信端でトークンの生成および解読がなされるため、セキュリティーの危険を分散させることができる。また、キー情報が露出されたとしても、トークンは送受信端でのみやりとりされるため機密情報の露出がなく、キープールを取替えて比較的簡単に装備の補修、点検が可能である。【選択図】図4</description><language>eng ; jpn</language><subject>ADVERTISING ; CODING OR CIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHERPURPOSES INVOLVING THE NEED FOR SECRECY ; CRYPTOGRAPHY ; DISPLAY ; EDUCATION ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; SEALS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20171012&amp;DB=EPODOC&amp;CC=JP&amp;NR=2017188902A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25562,76317</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20171012&amp;DB=EPODOC&amp;CC=JP&amp;NR=2017188902A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>KIM EUI-SEOK</creatorcontrib><creatorcontrib>I JONWON</creatorcontrib><creatorcontrib>SIM SANG GYOO</creatorcontrib><creatorcontrib>LEE SEOK WOO</creatorcontrib><creatorcontrib>KIM DEOK SOO</creatorcontrib><title>INFORMATION SECURITY METHOD USING KEY SYNCHRONIZATION AND INFORMATION SECURITY SYSTEM</title><description>PROBLEM TO BE SOLVED: To provide an information security method using key synchronization to be executed by a user terminal.SOLUTION: An information security method in which key synchronization executed by a user terminal is used, includes a step of receiving a processing request of secret information; a step of extracting a key for forming token corresponding to the secret information from a key pool of the user terminal; and a step of forming the token corresponding to the secret information by using the extraction key.EFFECT: Since the formation and decryption of the token is executed at a transmission and reception terminal without interpolating a token server, a risk in security can be diversified. Even when key information is exposed, the secret information is not exposed since the token is only transmitted/received at the transmission and reception terminal. Maintenance and inspection of equipment can be comparatively easily performed by replacing the key pool.SELECTED DRAWING: Figure 4 【課題】使用者端末によって実行されるキー同期化を利用した情報セキュリティー方法を提供する。【解決手段】本発明の使用者端末によって実行されるキー同期化を利用した情報セキュリティー方法は、機密情報の処理要請を受信する段階、使用者端末のキープール(key pool)から機密情報に対応するトークン生成のためのキーを抽出する段階および抽出されたキーを利用して機密情報に対応するトークンを生成する段階を含む。【効果】トークンサーバーを介さずに送受信端でトークンの生成および解読がなされるため、セキュリティーの危険を分散させることができる。また、キー情報が露出されたとしても、トークンは送受信端でのみやりとりされるため機密情報の露出がなく、キープールを取替えて比較的簡単に装備の補修、点検が可能である。【選択図】図4</description><subject>ADVERTISING</subject><subject>CODING OR CIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHERPURPOSES INVOLVING THE NEED FOR SECRECY</subject><subject>CRYPTOGRAPHY</subject><subject>DISPLAY</subject><subject>EDUCATION</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>SEALS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZAj19HPzD_J1DPH091MIdnUODfIMiVTwdQ3x8HdRCA329HNX8HaNVAiO9HP2CPL384yCqHT0c1HAqjM4MjjE1ZeHgTUtMac4lRdKczMoubmGOHvophbkx6cWFyQmp-allsR7BRgZGJobWlhYGhg5GhOlCAA3szHS</recordid><startdate>20171012</startdate><enddate>20171012</enddate><creator>KIM EUI-SEOK</creator><creator>I JONWON</creator><creator>SIM SANG GYOO</creator><creator>LEE SEOK WOO</creator><creator>KIM DEOK SOO</creator><scope>EVB</scope></search><sort><creationdate>20171012</creationdate><title>INFORMATION SECURITY METHOD USING KEY SYNCHRONIZATION AND INFORMATION SECURITY SYSTEM</title><author>KIM EUI-SEOK ; I JONWON ; SIM SANG GYOO ; LEE SEOK WOO ; KIM DEOK SOO</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2017188902A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; jpn</language><creationdate>2017</creationdate><topic>ADVERTISING</topic><topic>CODING OR CIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHERPURPOSES INVOLVING THE NEED FOR SECRECY</topic><topic>CRYPTOGRAPHY</topic><topic>DISPLAY</topic><topic>EDUCATION</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>SEALS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>KIM EUI-SEOK</creatorcontrib><creatorcontrib>I JONWON</creatorcontrib><creatorcontrib>SIM SANG GYOO</creatorcontrib><creatorcontrib>LEE SEOK WOO</creatorcontrib><creatorcontrib>KIM DEOK SOO</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>KIM EUI-SEOK</au><au>I JONWON</au><au>SIM SANG GYOO</au><au>LEE SEOK WOO</au><au>KIM DEOK SOO</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>INFORMATION SECURITY METHOD USING KEY SYNCHRONIZATION AND INFORMATION SECURITY SYSTEM</title><date>2017-10-12</date><risdate>2017</risdate><abstract>PROBLEM TO BE SOLVED: To provide an information security method using key synchronization to be executed by a user terminal.SOLUTION: An information security method in which key synchronization executed by a user terminal is used, includes a step of receiving a processing request of secret information; a step of extracting a key for forming token corresponding to the secret information from a key pool of the user terminal; and a step of forming the token corresponding to the secret information by using the extraction key.EFFECT: Since the formation and decryption of the token is executed at a transmission and reception terminal without interpolating a token server, a risk in security can be diversified. Even when key information is exposed, the secret information is not exposed since the token is only transmitted/received at the transmission and reception terminal. Maintenance and inspection of equipment can be comparatively easily performed by replacing the key pool.SELECTED DRAWING: Figure 4 【課題】使用者端末によって実行されるキー同期化を利用した情報セキュリティー方法を提供する。【解決手段】本発明の使用者端末によって実行されるキー同期化を利用した情報セキュリティー方法は、機密情報の処理要請を受信する段階、使用者端末のキープール(key pool)から機密情報に対応するトークン生成のためのキーを抽出する段階および抽出されたキーを利用して機密情報に対応するトークンを生成する段階を含む。【効果】トークンサーバーを介さずに送受信端でトークンの生成および解読がなされるため、セキュリティーの危険を分散させることができる。また、キー情報が露出されたとしても、トークンは送受信端でのみやりとりされるため機密情報の露出がなく、キープールを取替えて比較的簡単に装備の補修、点検が可能である。【選択図】図4</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; jpn
recordid cdi_epo_espacenet_JP2017188902A
source esp@cenet
subjects ADVERTISING
CODING OR CIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHERPURPOSES INVOLVING THE NEED FOR SECRECY
CRYPTOGRAPHY
DISPLAY
EDUCATION
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
PHYSICS
SEALS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title INFORMATION SECURITY METHOD USING KEY SYNCHRONIZATION AND INFORMATION SECURITY SYSTEM
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T14%3A02%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=KIM%20EUI-SEOK&rft.date=2017-10-12&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2017188902A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true