首页>
外国专利>
KEY MANAGEMENT SYSTEM USING SECRECY DISPERSION METHOD, VERIFICATION CENTER, COMMUNICATION TERMINAL, PROGRAM FOR VERIFICATION CENTER, PROGRAM FOR COMMUNICATION TERMINAL, AND KEY MANAGEMENT METHOD USING SECRECY DISPERSION METHOD
KEY MANAGEMENT SYSTEM USING SECRECY DISPERSION METHOD, VERIFICATION CENTER, COMMUNICATION TERMINAL, PROGRAM FOR VERIFICATION CENTER, PROGRAM FOR COMMUNICATION TERMINAL, AND KEY MANAGEMENT METHOD USING SECRECY DISPERSION METHOD
PROBLEM TO BE SOLVED: To provide a key management system using a secrecy dispersion method, which is suitable to improve security in managing a key used by a communication terminal for communication.;SOLUTION: A portable terminal 200 and a verification center 100 are connected in a communicable way. The portable terminal 200 transmits a message m and user's biological information to the verification center 100. When the verification center 100 receives the message m and the biological information, the verification center 100 verifies the use eligibility of a signature key SK on the basis of the received biological information and biological information for verification. When authentication is obtained with the verification, the verification center 100 operates the received message m on the basis of a dispersal signature key SKA corresponding to the biological information used for verification and transmits the operated message to the portable terminal 200. When the operated message is received, the portable terminal 200 operates the received operated message on the basis of the dispersal signature key SKB.;COPYRIGHT: (C)2003,JPO
展开▼