WO2008059898A1 - Authentication time adding apparatus, authentication time adding method, and program - Google Patents
Authentication time adding apparatus, authentication time adding method, and program Download PDFInfo
- Publication number
- WO2008059898A1 WO2008059898A1 PCT/JP2007/072128 JP2007072128W WO2008059898A1 WO 2008059898 A1 WO2008059898 A1 WO 2008059898A1 JP 2007072128 W JP2007072128 W JP 2007072128W WO 2008059898 A1 WO2008059898 A1 WO 2008059898A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- authentication time
- time information
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Definitions
- the present invention relates to an authentication time adding device, an authentication time adding method, and a program.
- the transmission date and time given to the header of an electronic mail depends on the date and time set in the machine (personal computer or the like) that is the transmission source of the electronic mail. For this reason, if the date and time set for a personal computer or the like is incorrect, an incorrect date and time is also given to the e-mail transmission date and time. For this reason, even if the originality of the e-mail text can be secured by technology such as S / MIME, the reliability of the transmission date / time will be impaired.
- Patent Document 1 discloses a technique for adding a reliable time stamp to the body of an electronic mail. According to this technology, even if a file is attached to the received e-mail! /, It is added to the body of the e-mail! / Can be obtained with reliability.
- Patent Document 1 Japanese Translation of Special Publication 2005-531995
- Patent Document 1 the technique disclosed in Patent Document 1 is that the attached file is sent when the attached file is stored in a different storage location from the electronic mail text separated from the electronic mail text.
- the date and time received can not be specified directly based on the attached file.
- the recipient needs to search for the email with the file attached and specify the date and time of transmission based on the reliable timestamp given to the email body. It was.
- the present invention has been made in view of the above circumstances, and an object thereof is to easily obtain highly reliable time information regarding a file attached to an e-mail.
- an authentication time adding device includes an e-mail acquisition unit that acquires an e-mail to which a file is attached, and an e-mail acquired by the e-mail acquisition unit.
- a file authentication time information adding means for adding authentication time information indicating an authenticated time to a file attached! / Song, and a file to which the authentication time information is added by the file authentication time information adding means are attached.
- e-mail output means for outputting e-mail.
- the file authentication time information adding means includes an authentication time information request data transmitting means for transmitting authentication time information request data for requesting authentication time information to a time authentication server for performing time authentication, and the authentication Authentication time information receiving means for receiving authentication time information according to the authentication time information request data transmitted by the time information request data transmitting means from the time authentication server, and authentication time information received by the authentication time information receiving means May be configured to include reception authentication time information adding means for adding to a file attached to the e-mail acquired by the e-mail acquisition means.
- the authentication time information request data transmission means includes a file electronic signature data acquisition means for acquiring electronic signature data of a file attached to the electronic mail acquired by the electronic mail acquisition means!
- Hash value generation means for generating a hash value of the electronic signature data acquired by the file electronic signature data acquisition means
- authentication time information request data for generating authentication time information request data including the hash value generated by the hash value generation means Generating means
- hash value transmitting means for transmitting the authentication time information request data including the hash value generated by the authentication time information request data generating means to the time authentication server
- the authentication time information receiving means includes a time stamp token including time information and a hash value included in authentication time information request data transmitted by the hash value transmission means from the time authentication server, and the time stamp.
- the electronic signature data of the token, and the reception authentication time information adding means receives the time stamp token received by the authentication time information receiving means and the electronic signature data of the time stamp token by the electronic mail acquisition means.
- the authentication time information may be added to a file attached to the acquired e-mail.
- the e-mail acquisition means includes a transmission e-mail acquisition means for acquiring an e-mail attached with a file from a transmission e-mail server that performs e-mail transmission processing, and the transmission e-mail acquisition A file extracting means for taking out a file attached to the e-mail from the e-mail acquired by the means;
- the file authentication time information adding means adds authentication time information to the file extracted by the file extracting means
- the e-mail output means includes a file attachment means for attaching the file to which the file authentication time information addition means has added the authentication time information to the electronic mail from which the file has been extracted by the file extraction means, and the file attachment
- the unit may be configured to include a transmission e-mail output unit that outputs an e-mail attached with a file to the transmission e-mail server.
- the e-mail output means further includes e-mail authentication time information adding means for adding authentication time information to the e-mail to which the file attachment means has attached a file,
- the transmission e-mail output means may be configured to output an e-mail to which the e-mail authentication time information addition means has added authentication time information to the transmission e-mail server.
- the format discriminating unit and the format discriminating unit discriminate that the file format is not the additional information storage format.
- the file authentication time information adding means may be configured to record the authentication time information in an additional information storage area of the file whose format has been converted by the format conversion means.
- conversion condition specifying means for specifying a conversion condition for converting the format of a file attached to an e-mail acquired by the e-mail acquiring means, and conversion specified by the conversion condition specifying means
- Format conversion means for converting the format of the file into a format according to conditions
- the file authentication time information adding means may be configured to record the authentication time information in an additional information storage area of the file whose format has been converted by the format conversion means.
- the file authentication time information adding means is an authentication time information recording file for generating an authentication time information recording file in which authentication time information of a file attached to an e-mail acquired by the e-mail acquiring means is recorded.
- an authentication time information recording file attachment means for attaching the authentication time information recording file generated by the authentication time information recording file generation means to the electronic mail acquired by the electronic mail acquisition means,
- the e-mail output means may be configured such that the authentication time information record file attachment means outputs an e-mail attached with an authentication time information record file.
- it further includes an attachment condition designating unit for designating an attachment condition for designating whether to generate the authentication time information recording file and attach it to an e-mail,
- the e-mail output means may be configured such that the authentication time information record file attachment means outputs an e-mail attached with an authentication time information record file according to a condition designated by the attachment condition designation means. .
- correspondence information adding means for adding correspondence information for associating the authentication time information recording file and the electronic mail to a header of the electronic mail
- the electronic mail output means includes the correspondence information E-mail added to the header It may be configured to force.
- time information related to a file attached to an electronic mail can be obtained with high reliability and reliability.
- FIG. 1 is a diagram showing an overall configuration of a time stamp addition system according to a first embodiment of the present invention.
- FIG. 2 is a diagram showing a circuit configuration of a time stamp adding device.
- FIG. 3A is a diagram showing an example of a data structure of conversion format information.
- FIG. 3B is a diagram showing an example of a data structure of a file according to a time stamp addition format.
- FIG. 4A is a diagram schematically showing a process of generating a signature value for an attached file.
- FIG. 4B is a diagram schematically showing a process of generating a time stamp request hash value.
- FIG. 4C is a diagram schematically showing data exchange between the time stamp adding device and the TSA server.
- FIG. 5 is a flowchart showing time stamp addition processing by the time stamp addition apparatus of the first embodiment.
- FIG. 6 is a flowchart showing file electronic signature processing.
- FIG. 7 is a flowchart showing a file time authentication process.
- FIG. 8 is a flowchart showing a file time stamp verification process when the time stamp of a file attached to an e-mail is verified on the receiving side.
- FIG. 9A is a diagram showing a first example of an e-mail data structure reconstructed by an e-mail reconstructing unit included in the time stamp addition apparatus of the second embodiment.
- FIG. 9B is a diagram showing a second example of the data structure of the email reconstructed by the email reconstruction unit included in the time stamp addition apparatus of Embodiment 2.
- FIG. 10 is a block diagram showing an internal configuration of a time stamp adding apparatus according to the third embodiment.
- FIG. 11 An example of a data structure of time stamp additional information according to the third embodiment. Explanation of symbols
- the time stamp addition system of Embodiment 1 includes a user terminal 1, a mail server 2, a time stamp addition device 3, a TSA (Time Stamping Authority) server 4, and a network 5.
- User terminal 1, mail server 2, time stamp adding device 3, and TSA server 4 They are connected to each other via work 5.
- the network 5 may be any network that can send and receive data, such as the Internet, an intranet, and a public network.
- the user terminal 1, the mail server 2, and the time stamp adding device 3 may be connected to the same intranet.
- the user terminal 1 is composed of a personal computer (PC) or the like, and executes a process according to a user operation. For example, the user terminal 1 executes creation of an electronic mail, attachment of a file to the created electronic mail, transmission of an electronic mail with a file attached, and the like according to a user operation.
- a file attached to an e-mail is referred to as an “attached file”
- an e-mail having an attached file is referred to as an “attached file e-mail”.
- the mail server 2 is composed of a server device or the like, and performs transmission / reception processing of electronic mail. For example, the mail server 2 transmits an electronic mail created by the user terminal 1 to a mail sano (not shown) of another user at the transmission destination. In addition, the mail server 2 receives an electronic mail transmitted from the other user terminal (not shown) to the user terminal 1 via the network 5 and holds it until a reception request is received from the user terminal 1.
- the mail server 2 once transmits the e-mail to the time stamp adding device 3 before sending the e-mail supplied from the user terminal 1 to the transmission destination.
- This operation is to request the time stamp adding device 3 to attach a time stamp authenticated by the TSA server 4 to the attached file when an attached file is attached to the e-mail! Is called.
- the time stamp adding device 3 is constituted by a server device, for example, and assigns a time stamp to the electronic mail transmitted from the mail server 2 and the attached file of the electronic mail.
- the “time stamp” is information indicating the time (date and time) authenticated by the TSA server 4.
- the time stamp adding device 3 determines whether or not an attached file is attached to the email received from the mail server 2 and attaches the time stamp to each attached file. Then, the attached e-mail with the attached file is supplied to the mail server 2.
- the time stamp adding device 3 is a time stamp for requesting the time stamp issuance.
- a tamping request message is transmitted to the TSA server 4, and the time stamp issued by the TSA server 4 is attached to the attached file in response to the request.
- the TSA server 4 is configured by a server device or the like, and functions as a time stamping authority (TSA).
- TSA server 4 issues a time stamp in response to a request from the time stamp adding device 3 and supplies the time stamp to the time stamp adding device 3.
- the time certification authority for example, authenticates the time of electronic data created by the user in response to a request from the user and issues a time stamp.
- time authentication operator it is referred to as a “time authentication operator”.
- the TSA server 4 is connected to a TA sano (not shown) provided in a time authority (TA) via a predetermined network.
- the TSA server 4 maintains the reliability of the issued time stamp by receiving a highly accurate time distribution based on the standard time from the TA server.
- the TSA server 4 issues a time stamp in accordance with the time stamp protocol format using PKI (Public Key Infrastructure).
- the time stamp adding device 3 includes a control unit 30, a communication unit 31, and a storage unit 32.
- the control unit 30 includes a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), and the like, and controls the time stamp adding device 3 as a whole. For example, the control unit 30 executes a time stamp addition process for adding a time stamp to the attached file of the e-mail. When performing various arithmetic processes and control processes, the control unit 30 causes the CPU to execute the control program stored in the ROM while temporarily storing various data in the RAM.
- a CPU Central Processing Unit
- ROM Read Only Memory
- RAM Random Access Memory
- control unit 30 includes an attached file existence determination unit 301, a format determination unit 302, a format conversion unit 303, an electronic signature unit 304, a time authentication unit 305, and an e-mail reconstruction unit 306. . Details of each unit 30;! To 306 will be described later.
- the communication unit 31 includes a communication interface and the like, and communicates with an external device via the network 5. For example, the communication unit 31 communicates with the mail server 2 via the intranet. Data communication with the TSA server 4 via the network 5. When the communication unit 31 receives an e-mail scheduled to be transmitted to the transmission destination (destination) by the mail server 2 from the mail server 2, the communication unit 31 supplies the e-mail to the attached file existence determination unit 301.
- the storage unit 32 includes an auxiliary storage device such as a ROM (Read Only Memory), a RAM (Random Access Memory), and a hard disk, and stores various types of information, programs, and the like.
- the storage unit 32 stores conversion format information 321, secret key management information 322, and the like.
- conversion format information 321 associates “time stamp non-addition format Fn” with “time stamp addition format Fa”.
- “Time stamp non-addition format Fn” is a format that has been subjected to format conversion by the format conversion unit 303, and is a format that the control unit 30 does not add a time stamp to! /. is there.
- the “time stamp addition format Fa” is a format that has been subjected to format conversion by the format conversion unit 303 and is a format to which the control unit 30 can assign a time stamp.
- the file converted into the time stamp addition format Fa has a “main data area DA” and an “additional information area IA”.
- the “main data area” is an area for storing the main data of the file
- the “additional information area” is an area for storing additional information about the file such as an electronic signature and a time stamp. It is.
- data indicating the contents of the document is stored if the attached file of the conversion source is a document file, and image data is stored if the attached file is an image file.
- time stamp non-addition format Fn does not have an additional information area! /, A file format, or even if it has an additional information area, information such as a time stamp is included in that area. This is a file format that runs out of capacity when stored.
- the private key management information 322 stores the private key of the person who created the electronic mail to which the time stamp is added by the time stamp adding device 3.
- the secret key management information 322 stores the secret key of the user who creates an email by the user terminal 1.
- the attached file existence determining unit 301 determines whether or not an attached file is attached to the e-mail supplied from the communication unit 31. If it is attached, the attached file existence determination unit 301 separates and extracts the attached file from the electronic mail. When a plurality of attached files are attached to the e-mail, the attached file existence determining unit 301 extracts each attached file separately from the e-mail. If the attached file is not attached to the electronic mail, the attached file existence determining unit 301 supplies the electronic mail to the electronic signature unit 304.
- the format discriminating unit 302 indicates that the file format of each attached file extracted by the attached file existence discriminating unit 301 is a difference between the time stamp non-addition format Fn and the time stamp addition format Fa! /. Is determined. For example, the format discriminating unit 302 discriminates the file format based on an extension for identifying the type of the attached file, file type information attached to the attached file, or the like.
- the format conversion unit 303 refers to the conversion format information 321 shown in FIG. 3A, and converts the format of the attached file that has been determined by the format determination unit 302 to be the non-timestamping format Fn. Convert to additional format Fa.
- the attached file after the format conversion is subject to digital signature and time authentication.
- the format conversion unit 303 converts the file format C to the file format A.
- the format conversion unit 303 does not perform the format conversion process of the attached file.
- the electronic signature unit 304 attaches the electronic signature to them.
- the electronic signature unit 304 uses the private key stored in the private key management information 322 to generate the signature value of the file of the e-mail or the time stamp addition format Fa.
- the signature value refers to digital signature data based on a digital signature procedure specified by PRCS (Public Key Cryptography Standards) 7 or the like, for example.
- PRCS Public Key Cryptography Standards
- the time authentication unit 305 attaches the time stamp issued by the TSA server 4 to the electronic mail to which the electronic signature is given by the electronic signature unit 304 and the attached file of the electronic mail. Then, the time authentication unit 305 supplies the electronic mail to which the time stamp is given to the electronic mail reconstruction unit 306.
- the e-mail reconstructing unit 306 re-attaches the e-mail by reattaching each attached file to which the time stamp is given by the time authenticating unit 305 to the e-mail separated by the attached file existence determining unit 301. Constitute. Then, the email reconstructing unit 306 supplies the reconstructed email to the electronic signature unit 304.
- the electronic signature unit 304 of the control unit 30 is first stored in the main data area of the attached file using a predetermined hash function (for example, MD5, SHA-1, SHA-256, etc.).
- a message digest (hash value) corresponding to the stored data is generated.
- the electronic signature unit 304 encrypts the message digest with the secret key of the creator of the email with the attached file, and generates a signature value for the attached file.
- the electronic signature unit 304 stores the signature value in the additional information area of the attached file.
- time authentication unit 305 generates a “time stamp request hash value” based on the signature value of the attached file generated by the electronic signature unit 304.
- the “time stamp request hash value” is information used when the time authentication unit 305 requests the TSA server 4 to issue a time stamp.
- the time authentication unit 305 reads the signature value of the attached file generated by the electronic signature unit 304 from the additional information area of the attached file to which the time stamp is to be attached. Subsequently, as shown in FIG. 4B, the time authentication unit 305 generates a hash value corresponding to the signature value based on a predetermined hash function, and determines the hash value as a hash value for time stamp request.
- the time authentication unit 305 requests the TSA server 4 to issue a time stamp using the hash value for requesting time stamp.
- the time authentication unit 305 includes a time stamp request message in a predetermined format including a hash value for time stamp request. The message is generated and the message is transmitted to the TS A server 4 via the communication unit 31.
- the TSA server 4 on the receiving side When receiving the time stamp request message from the time stamp adding apparatus 3, the TSA server 4 on the receiving side generates a time stamp token.
- This time stamp token includes time information indicating the exact time when the TSA server 4 authenticated the attached file, and a hash value for the time stamp request in the received time stamp request message.
- the TSA server 4 After the time stamp token is generated, the TSA server 4 generates a signature value corresponding to the time stamp token by substantially the same processing as the processing of the electronic signature unit 304 shown in FIG. 4A. That is, the TSA server 4 generates a signature value corresponding to the token by encrypting the hash value of the time stamp token obtained by a predetermined hash function with the secret key of the TSA server 4. Further, the TSA server 4 generates a “response message” including a time stamp token and the signature value of the token in accordance with a predetermined format, and transmits it to the request time stamp adding device 3.
- the time stamp adding device 3 can acquire a response message including the exact time when the attached file is authenticated by the TSA server 4.
- the signature value in the response message is decrypted with the public key of TSA server 4 to obtain the hash value of the token obtained by TSA server 4, and a predetermined hash function is used.
- the hash value of the time stamp token in the response message is obtained.
- the token is a token generated by the legitimate TSA server 4. What is necessary is just to discriminate
- the time authentication unit 305 refers to the response message received by the communication unit 31 and verifies the time stamp issued by the TSA server 4. Specifically, (1) the presence or absence of an error message in the response message, (2) the presence or absence of a time stamp token in the response message, and (3) whether the time stamp token was generated by a legitimate TSA server 4 (4) Hash value power S included in the time stamp token, the time set by the time authentication unit 305 It is verified whether or not the hash value for the time stamp request matches.
- the time authentication unit 305 writes the time stamp token in the response message and the signature value of the token in the additional information area of the attached file.
- the electronic signature unit 304 and the time authentication unit 305 determine the time stamp addition position in the additional information area, the hash target data range in the main data area, and the like according to the file format of each attached file. A signature process and a time authentication process suitable for each are executed.
- the e-mail reconstructing unit 306 converts each attached file into an e-mail that has been separated by the attached file existence determining unit 301. Attach it again and reconstruct a new email with attachments. Further, the e-mail reconstructing unit 306 supplies the reconfigured e-mail to the electronic signature unit 304.
- the electronic signature unit 304 assigns an electronic signature to the new attached file-attached email by substantially the same processing as the processing shown in FIG. 4A, and sends the electronic signature to the time authentication unit 305. Supply.
- the electronic signature unit 304 creates a message digest (hash) for the entire new email with an attached file (including the attached file) excluding the header part. Value). After the generation, the electronic signature unit 304 encrypts the hash value with the private key of the electronic mail creator in the private key management information 322, and generates a signature value corresponding to the entire new attached-attached electronic mail.
- the electronic signature unit 304 encodes the signature value into character string data in accordance with a method such as BASE64, and writes the character string data in the header part of the email, thereby providing the electronic signature to the email.
- the signature value is not limited to be written in the header part, but may be linked to electronic mail as electronic signature data. If the attached file existence discriminating unit 301 determines that an attached file is attached to the email! /, Te! /, Na! /, The electronic signature unit 304 creates an electronic signature for the body of the email. Apply.
- the time authentication unit 305 adds a time stamp to the new electronic mail with attached file, and sends the e-mail with the time stamp to the e-mail reconstruction unit 306. Supply.
- the time authentication unit 305 determines a hash value for requesting a time stamp by substantially the same processing as in FIG. 4B. Then, a time stamp request message including the hash value is generated and transmitted to the TS A server 4.
- the time authentication unit 305 determines whether or not the response message is normal. If the response message is normal, the time stamp in the response message is determined. The token and its signature value are added to the header part of the e-mail. Note that the storage location of the time stamp token etc. is not limited to the header part, but may be the non-signature attribute area of the electronic signature data! /.
- the email reconstruction unit 306 Upon receipt of the reconstructed attached email with the time stamp added from the time authentication unit 305, the email reconstruction unit 306 sends the email to the mail server 2 via the communication unit 31. Output. Note that an electronic signature may be attached only to the body of an email even if it is an email with an attached file. In this case, the electronic signature unit 304 determines whether or not an electronic signature is received in the electronic mail received from the mail server 2, and if there is no electronic signature, the electronic signature may be added to the electronic mail.
- time stamp addition process in which the time stamp adding apparatus 3 having the above-described configuration adds a time stamp to the email received from the mail server 2 and the email with the attached file will be described.
- This time stamp addition processing is started when the communication unit 31 of the time stamp addition device 3 receives an e-mail before being transmitted from the mail server 2 to the transmission destination.
- the mail received by the time stamp adding device 3 is an electronic mail created by the user terminal 1.
- the attachment file existence determination unit 301 determines whether or not a file is attached to the electronic mail received by the communication unit 31 (step S 101).
- step S101 If no file is attached to the e-mail (step S101; No), the control unit 30 moves the process to step S109 in order to apply an electronic signature and time authentication to the e-mail body. If it is attached (step S 101; Yes), the attached file existence determination unit 301 separates the attached file and the body of the email attached to the email! /, And removes the attached file from the email. Extract (step S102).
- the format determination unit 302 adds a time stamp to the extracted file. It is determined whether or not the format is for use Fa (step S103).
- step S103 If it is the time stamp addition format Fa (step S103; Yes), the process skips step S104 and proceeds to step S105.
- step S1 03 if the attached file is not the time stamp addition format Fa (step S1 03; No), the format conversion unit 303 sets the format of the attached file for time stamp addition based on the conversion format information 321. Convert to format Fa (step S104). Then, the control unit 30 moves the process to step S105.
- the electronic signature unit 304 executes a file electronic signature process (step S105). As shown in FIG. 6, in the file electronic signature process, first, the electronic signature unit 304 determines whether or not an electronic signature has already been added to the attached file (step S201). If it has already been assigned (step S201; Yes), the control unit 30 ends the file digital signature process as it is, and the process returns to FIG.
- step S201 if the electronic signature is not added (step S201; No), the electronic signature unit 304 uses the user's private key stored in the private key management information 322 to store the attached file. A signature value is generated, and the signature value is added to the file as an electronic signature (step S202). After the addition, the process returns to FIG.
- the time authentication unit 305 executes the file time authentication process shown in FIG. 7 in order to add a time stamp to the file (step S106).
- the time authentication unit 305 generates a time stamp request hash value for the signature value added to the attached file (step S301). .
- the time authentication unit 305 generates a time stamp request message including the hash value for time stamp request shown in FIG. 4B (step S302), and sends the time stamp request message to the communication unit 31.
- the TSA server 4 step S303.
- Time authentication unit 305 determines whether or not a response message to the transmitted time stamp request message has been received from TSA server 4 via communication unit 31 (step S304). If the response message has not been received (step S304; No), the time authentication unit 305 waits until the response message is received. [0071] If the response message has been received (step S304; Yes), the time authentication unit 305 determines whether the time stamp (time stamp token and its signature value) included in the response message is normal or not. (Step S305).
- step S 305 If the time stamp is not normal (step S 305; No), the process returns to step S 303, and the time authentication unit 305 transmits the time stamp request message to the TSA server 4 again.
- the time stamp adding device 3 When the number of times that the time stamp is determined to be not normal in step S305 reaches a predetermined value, the time stamp adding device 3 notifies the user terminal 1 and the mail server 2 of an error, and the time stamp adding process is performed. You may make it complete
- step S305 If the time stamp is normal (step S305; Yes), the time authentication unit 305 adds the time stamp acquired from the TSA server 4 via the communication unit 31 to the attached file (step S306). Then, the control unit 30 ends the file time authentication process, and the process returns to FIG.
- the control unit 30 determines whether or not a time stamp has been added to all the attached files whose e-mail power is also extracted in step S102 (step S107). . If time stamps are not added to all the files (step S107; No), the control unit 30 returns the process to step S103, and performs steps S103 to S106 for each file to which no time stamp is added. Execute the process.
- step S107 When time stamps are added to all files (step S107; Yes), the e-mail reconstruction unit 306 adds all files with time stamps to step S102! /, Then, it is attached again to the email once separated from the attached file, and a new email with the attached file is reconstructed (step S108).
- the electronic signature unit 304 is substantially the same as the file electronic signature process shown in FIG.
- the electronic mail electronic signature process (step S109) of 5 is executed.
- step S201 Yes
- the added electronic signature is not for an e-mail including the time stamp of the attached file. Therefore, the process is as shown in Figure 6.
- step S202 the electronic signature unit 304 generates a new signature value for the entire electronic mail including the time stamp of the attached file and adds it to the electronic mail.
- the time authentication unit 305 performs substantially the same processing as that of the file time authentication processing shown in FIG. 7 in order to add a time stamp to the email.
- Time authentication processing (step S110) is performed.
- the time authentication unit 305 attaches the time stamp issued by the TSA server 4 to the attached email with attached signature value based on the signature value.
- the authentication time information is added to each attached file and the entire electronic mail including each attached file.
- the control unit 30 transmits the electronic mail to which the electronic signature and the authentication time are given to the mail server 2 via the communication unit 31 (Step S111). The time stamp addition process is thus completed.
- This file time stamp verification process is performed, for example, when a user who receives an e-mail with an attached file separates the attached file from the e-mail and saves it on the file saving PC. To start verifying the time stamp of the file.
- the file storage PC first reads the time stamp recorded in the additional information area in the attached file (step S401). As a result, the file saving PC obtains the “time stamp token” and “signature value of the time stamp token” stored in the time stamp.
- the file storage PC determines whether the time stamp token has been tampered with (step S402).
- the method for determining the presence or absence of tampering is arbitrary. For example, a value obtained by decrypting the obtained signature value with the public key of the TSA server 4, the obtained time stamp token force, and a predetermined hash function are used. This can be determined by comparing the obtained hash value. If these values do not match, it is determined that the time stamp token has been tampered with (step S402; No), and processing is performed to notify the user that the time stamp is invalid.
- Reason (Ma step S409i proceed.
- the file storage PC determines that the time stamp token is a legitimate token that has not been tampered with (step S402; Yes). In this case, the hash value contained in the time stamp token is read to extract the hash value from the time stamp (step S403).
- the file storage PC reads the signature value of the attached file attached to the attached file! /, And uses the same hash function as the hash function used by the time stamp adding device 3, A hash value of the signature value of the file is generated (step S404). After the generation, the file storage PC determines whether or not the generated hash value matches the hash value extracted from the time stamp in step S403 (step S405). If the hash values do not match each other (step S405; No), the process proceeds to step S409 to notify the user that the time stamp is invalid.
- step S405 If the hash values match each other (step S405; Yes), it is considered that the time stamp has been detected normally, and then the file storage PC verifies the electronic signature of the file (step S406). ). For example, the file storage PC confirms the validity of the electronic certificate and determines whether the attached file has been tampered with (step S407). If there is no tampering (step S407; Yes), the file storage PC notifies the user that the time stamp is valid (step S408), and the processing ends, assuming that the file transmission date / time has been proved.
- step S407 if the attached file has been tampered with (step S407; No), the file storage date / time PC notifies the user that the time stamp is invalid (step S407; No). S409), the file time stamp verification process is completed. Note that this file time stamp verification processing may verify the electronic signature attached to the attached file before determining whether the time stamp attached to the attached file has been tampered with.
- the file storage PC when the file storage PC receives the e-mail, it reads a time stamp described in a state encoded in character string data at a predetermined location (for example, a header portion) of the e-mail. (Step S401).
- a time stamp described in a state encoded in character string data at a predetermined location (for example, a header portion) of the e-mail.
- the file storage PC decodes the read time stamp (encoded character string data) by a predetermined method (for example, BASE64), and acquires the time stamp token and its signature value. Further, the file storage PC verifies whether or not the time stamp token has been tampered with, and determines whether or not the time stamp token is genuine (step S402).
- a predetermined method for example, BASE64
- the file saving PC confirms the validity of the time stamp attached to the entire e-mail including the attached file by substantially the same processing as that in steps S404 to S409 of the file time stamp verification processing. Determine.
- the file storage PC determines, for example, whether or not the entire electronic mail has been tampered with based on the verification result of the validity of the electronic certificate.
- the file storage PC determines whether or not the entire electronic mail has been falsified based on the verification result of the electronic signature.
- the recipient of the email with the attached file can separate the attached file from the email and store or distribute it while maintaining the originality of the attached file.
- the time stamp adding device 3 is a time certification business operator (T that functions as a time certification authority under that business operator).
- T time certification business operator
- the time stamp issued by the SA server 4 is added to each attached file of the e-mail.
- the time authentication unit 305 obtains the hash value of the time stamp token obtained by decrypting the signature value in the time stamp acquired from the TSA server 4 and a predetermined hash function. By comparing the hash value of the time stamp token obtained by itself with the hash value, it is determined whether the time stamp has been tampered with. If there is no alteration, a time stamp is attached to the attached file. As a result, it is possible to secure the non-falsification of this attached file.
- the time authentication unit 305 stores the time stamp in the additional information area of the file. As a result, the various processes executed based on the data stored in the main data area of the attached file are not affected, and it is possible to maintain consistency with the existing application program.
- time stamp adding apparatus can be variously modified without departing from the gist of the present invention, which is not limited to the above embodiment.
- a “time stamp” that functions as a time certificate indicating the information of the authenticated time is not limited to being recorded in the additional information area of the attached file, but the time certificate is linked to the attached file. May be.
- the time stamp adding device 3 attaches the time stamp generated by the TSA server 4 to the attached file.
- the time stamp adding device 3 may newly generate a time proof file in which the time certificate is recorded, and attach this time proof file together with the attached file to the email text to be transmitted.
- the time stamp adding apparatus 3 according to the second embodiment for performing such an operation will be described.
- the time / time IJ authentication unit 305 includes a time value (time information), a hash value of the attached file (hash value for time stamp request), and a time signature (time stamp).
- a “time certificate (time stamp)” including the token signature value) is acquired from the TSA server 4 via the communication unit 31. After the acquisition, the time authentication unit 305 generates a time certification file including the authentication time information indicated by the time certificate.
- the time authentication unit 305 uses the file name excluding the extension of the time certification file as the time Set the file name to be the same as the file name excluding the extension of the attached file that is subject to certification, and set the extension of the attached file to an extension that indicates that it is a time certification file
- the e-mail reconstructing unit 306 When the e-mail reconstruction unit 306 reattaches the attached file to the e-mail and reconfigures it, the e-mail reconstructing unit 306 also attaches the time certification file corresponding to the attached file to the e-mail.
- the e-mail reconstruction unit 306 in the second embodiment attaches the attached file and the time certification file to the e-mail.
- the extension tst in Fig. 9A is an extension to indicate that the file with the extension tst is a time certification file.
- the time proof file corresponding to the attached file fflea.xxx in Fig. 9A is the file fflea.tst
- the time proof file corresponding to the attached file ffleb.yyy is the file ffleb.tst. It can be identified from the file name of the attached file.
- the file storage PC that received the e-mail with the attached file and the time certificate file, when the attached file is saved separately from the e-mail, the time corresponding to the attached file based on the file name excluding the extension Identify the certification file and save the time certification file along with the attached file.
- the file storage PC verifies the time stamp of the attached file, it is recorded in the time certification file corresponding to the attached file.
- the format discriminating unit 302 As a result, it is not necessary to provide the format discriminating unit 302, the format converting unit 303, and the conversion format information 321 shown in FIG. 3, and the configuration of the time stamp adding device 3 can be simplified.
- the electronic signature unit 304 adds a new electronic signature to the attached file, the electronic signature data may be recorded together with the time certification file.
- an associated file for associating the attached file with a time proof file that proves the time of the attached file is created. You may make it attach to an email.
- the file name assigned to the time certification file may be arbitrary.
- the correspondence information for associating the attached file with the time certification file may be described in the header of the e-mail.
- the operation of the time stamp adding device described in the first and second embodiments may be used properly.
- a rule indicating how to add a time stamp is specified in advance for each format of the attached file. For example, the ability to convert the format and attach a time stamp in the attached file as in Embodiment 1, or the ability to associate the time certification file in which the time stamp was recorded without converting the format as in Embodiment 2; Rules such as, etc. are established for each format. Based on this rule, a time stamp is added to the attached file.
- the time stamp adding apparatus 3 is basically the same as the example of FIG. 3 described in the first and second embodiments.
- the control unit 30 includes a time stamp addition rule specifying unit 307.
- the storage unit 32 of the third embodiment stores time stamp additional information 323 instead of the conversion format information 321.
- Time stamp addition information 323 associates a file format with a time stamp addition rule indicating a method of adding a time stamp.
- the time stamp addition rule specifying unit 307 reads the time stamp addition rule associated with the determined format from the time stamp addition information 323 and applies it to the attached file. To do.
- this time stamp addition information 323 stores, for each file format, a time stamp addition rule applied to an attached file in that format.
- the attached file is a text file
- the text data of the file Force A time stamp is added to the converted PDF file that can be automatically converted to an SPDF file (Adobe Acrobat (registered trademark) file) and a time stamp can be added.
- SPDF file Auto-Program (registered trademark) file
- the attached file is originally a PDF file to which a time stamp can be added, the time stamp is added to the PDF file without any format conversion.
- the attached file when the attached file is an e-mail message file, it is converted to the SPDF file with the body of the message file, and a time stamp is added to the converted PDF file.
- the message when another e-mail is attached as an e-mail attachment, the message is converted to a PDF file by converting only the body of the attached message file in consideration of the distribution of the attached file. Authenticate.
- the attached file is a CAD (Computer Aided Design) data file
- a time certification file indicating a time stamp is created and attached to the e-mail. If a CAD data file is converted to a PDF file, the image accuracy may be reduced, and the correction work may be complicated.
- SCAD data file with an attached file leave it as an attached file, create a time certificate file, and attach it to an e-mail separately.
- the time stamp addition rule specifying unit 307 follows the time stamp addition rule determined for each format! /, Format conversion operation according to the format of each attached file, time certificate attachment operation, etc. Is specified. In other words, the time-stamped calor rule specifying unit 307 specified the conversion condition for converting the format, or specified the attachment condition for specifying whether to generate a time certificate file and attach it to the email. You The conditions specified here are applied to the attached file.
- the time stamp addition rule specifying unit 307 if it is determined to add a time stamp by converting the time stamp addition rule format, format conversion unit 303, electronic signature unit 304 Then, the time authentication unit 305, the e-mail reconstruction unit 306, etc. are controlled to convert the attached file into a format to which a time stamp can be added in the same manner as in the first embodiment, and the time stamp is added to the converted file. Append. Time stamp addition rule force S If the time stamp is specified to be added without format conversion, the time stamp addition rule designating unit 307 directly adds the time stamp to the attached file.
- the format conversion unit 303, the electronic signature unit 304, the time authentication unit 305, The e-mail reconstruction unit 306 and the like are controlled to create a time certification file as in the second embodiment described above.
- the email reconstructing unit 306 when there is a time certificate file, displays the correspondence between the attached file and the time certificate file in the header of the email. Describe. It is also possible to create a file that shows such correspondences separately! / ⁇ .
- the e-mail reconstructing unit 306 reconstructs the e-mail by attaching the attached file and the time certification file to the e-mail. Then, the electronic signature unit 304 or the time authentication unit 305 performs an electronic signature or time authentication on the entire electronic mail, respectively.
- the time stamp adding device 3 transmits an e-mail in which the time stamp is added to the attached file by such processing to the mail server 2.
- the time stamp additional information 323 stores a conversion operation determined by default.
- the time stamp adding device 3 is provided with an input unit so that the rules in the time stamp additional information 323 can be changed, and conversion operations for individual file formats can be separately registered in the time stamp additional information 323. Good.
- the time stamp adding device 3 has the secret key management information 322 for storing the secret key of the creator of the e-mail.
- the storage location of the user's private key is not limited to the time stamp adding device 3 and may be the user terminal 1.
- the electronic signature unit 304 determines that an electronic signature has not been added to the attached file, the attached file is temporarily transferred from the time stamp adding device 3 to the user terminal 1 that stores the private key. It is only necessary to transmit and receive the file with the electronic signature added by the user terminal 1.
- the electronic signature unit 304 sends the reconstructed email to the user terminal 1 where the private key is stored, and the user terminal 1 sends the electronic signature.
- An electronic mail with a signature may be acquired via the communication unit 31.
- the mail server 2 and the time stamp adding device 3 are not limited to being configured as separate cases, but the mail server 2 and the time stamp adding device 3 may be configured as a single case.
- the time stamp request message is not limited to storing the hash value of the signature value extracted from the attached file with the electronic signature, but may also store the hash value of the data in the main data area of the attached file. Good. In this case as well, it is possible to avoid affecting the processing executed based on the contents of the main data storage area of the attached file while ensuring the originality of the attached file. It is easy to maintain consistency.
- the time certification authority is not limited to the time certification business that receives the time distribution from the TA, but the time certification business that receives the time distribution from other time sources by NTP (Network Time Protocol), etc. It may be a time certification company that captures the time of the atomic clock.
- control unit 30 of the time stamp adding device 3 is not limited to software, and can also be realized by dedicated hardware. Further, the time stamp adding device 3 may be configured by a normal computer system.
- the time stamp adding apparatus 3 has been described on the assumption that the operation program is stored in advance in a memory or the like.
- the processing operation described above The program to be executed is stored and distributed on a computer-readable recording medium such as a flexible disk, CD—ROM (Compact Disk Read-Only Memory), DVD (Digital Versatile Disk), MO (Magneto-Optical disk), etc. Then, by installing the program in the computer, a device that executes the above processing operation may be configured.
- the program may be stored in a disk device or the like of a predetermined server device on a communication network such as the Internet, and may be superposed on a carrier wave and downloaded to a computer.
- the above-described processing can also be achieved by starting and executing a program while transferring it via a communication network.
- OS Operating System
- only the parts other than the OS are stored in the medium for distribution. It may also be downloaded to a computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
明 細 書 Specification
認証時刻付加装置、認証時刻付加方法、及びプログラム Authentication time addition device, authentication time addition method, and program
技術分野 Technical field
[0001] 本発明は、認証時刻付加装置、認証時刻付加方法及びプログラムに関する。 The present invention relates to an authentication time adding device, an authentication time adding method, and a program.
背景技術 Background art
[0002] 情報伝達用の手段である電子メールは電子データである故に、第三者によってそ の内容が不正に閲覧される「盗聴」、第三者によって内容が不正に書き換えられる「 改ざん」、第三者が本人に見せかけてメールを送る「なりすまし」、などが容易である。 このような不正行為を防止し電子メールを送受する際の安全性を高めるための技術 として、例えば、暗号化を用いる PGP (Pretty Good Privacy)や暗号化や電子署名を 用いる S/MIME (Secure/Multipurpose Internet Mail Extensions)等が知られている [0002] Since e-mail, which is a means for information transmission, is electronic data, its contents are illegally browsed by a third party, and "tampering", where the contents are illegally rewritten by a third party, It's easy to “spoof” a third party to send an e-mail to the person. For example, PGP (Pretty Good Privacy) that uses encryption and S / MIME (Secure /) that uses encryption and digital signatures as technologies to prevent such fraud and increase the security when sending and receiving e-mails. Multipurpose Internet Mail Extensions) is known
[0003] 一般的に、電子メールのヘッダ部に付与される送信日時は、その電子メールの送 信元であるマシン (パーソナルコンピュータ等)に設定されている日時に依存する。そ のため、パーソナルコンピュータ等に設定されている日時が不正確な場合、電子メー ルの送信日時にも不正確な日時が付与されてしまう。そのため、 S/MIME等の技 術により電子メール本文の原本性が担保できたとしても、送信日時の信頼性が損な われてしまう。 [0003] Generally, the transmission date and time given to the header of an electronic mail depends on the date and time set in the machine (personal computer or the like) that is the transmission source of the electronic mail. For this reason, if the date and time set for a personal computer or the like is incorrect, an incorrect date and time is also given to the e-mail transmission date and time. For this reason, even if the originality of the e-mail text can be secured by technology such as S / MIME, the reliability of the transmission date / time will be impaired.
[0004] このような問題を回避するために、特許文献 1は、電子メールの本文に、信頼性の あるタイムスタンプを追加する技術を開示する。この技術によれば、受信した電子メー ルにファイルが添付されて!/、ても、電子メールの本文に追加されて!/、るタイムスタンプ に基づいて、電子メールが送信された日時を高い信頼性で取得できる。 [0004] In order to avoid such a problem, Patent Document 1 discloses a technique for adding a reliable time stamp to the body of an electronic mail. According to this technology, even if a file is attached to the received e-mail! /, It is added to the body of the e-mail! / Can be obtained with reliability.
特許文献 1 :特表 2005— 531995号公報 Patent Document 1: Japanese Translation of Special Publication 2005-531995
発明の開示 Disclosure of the invention
発明が解決しょうとする課題 Problems to be solved by the invention
[0005] しかし、特許文献 1に開示されて!/、る技術は、電子メール本文と分離されて電子メ ール本文と異なる格納先に添付ファイルが格納された場合、その添付ファイルが送 信された日時を、添付ファイルに基づいて直接特定することができない。そのため、 受信者は、そのファイルが添付されていた電子メールを検索し、その電子メール本文 に付与された信頼性の高いタイムスタンプに基づいて送信日時を特定する必要があ り、手間がかかっていた。 [0005] However, the technique disclosed in Patent Document 1 is that the attached file is sent when the attached file is stored in a different storage location from the electronic mail text separated from the electronic mail text. The date and time received can not be specified directly based on the attached file. For this reason, the recipient needs to search for the email with the file attached and specify the date and time of transmission based on the reliable timestamp given to the email body. It was.
[0006] 本発明は、上記実情に鑑みてなされたものであり、電子メールに添付されているフ アイルに関する信頼性の高い時刻情報を容易に得ることを目的とする。 The present invention has been made in view of the above circumstances, and an object thereof is to easily obtain highly reliable time information regarding a file attached to an e-mail.
課題を解決するための手段 Means for solving the problem
[0007] 上記課題を解決するために、本発明に係る認証時刻付加装置は、ファイルが添付 された電子メールを取得する電子メール取得手段と、前記電子メール取得手段で取 得された電子メールに添付されて!/ヽるファイルに、認証された時刻を示す認証時刻 情報を付加するファイル認証時刻情報付加手段と、前記ファイル認証時刻情報付加 手段により認証時刻情報が付加されたファイルが添付された電子メールを出力する 電子メール出力手段と、を備えることを特徴とする。 In order to solve the above problems, an authentication time adding device according to the present invention includes an e-mail acquisition unit that acquires an e-mail to which a file is attached, and an e-mail acquired by the e-mail acquisition unit. A file authentication time information adding means for adding authentication time information indicating an authenticated time to a file attached! / Song, and a file to which the authentication time information is added by the file authentication time information adding means are attached. And e-mail output means for outputting e-mail.
[0008] 例えば、前記ファイル認証時刻情報付加手段は、時刻認証を行う時刻認証サーバ に、認証時刻情報を要求するための認証時刻情報要求データを送信する認証時刻 情報要求データ送信手段と、前記認証時刻情報要求データ送信手段が送信した認 証時刻情報要求データに応じた認証時刻情報を、前記時刻認証サーバから受信す る認証時刻情報受信手段と、前記認証時刻情報受信手段が受信した認証時刻情報 を、前記電子メール取得手段が取得した電子メールに添付されているファイルに、付 加する受信認証時刻情報付加手段と、を有する、ように構成されてもよい。 [0008] For example, the file authentication time information adding means includes an authentication time information request data transmitting means for transmitting authentication time information request data for requesting authentication time information to a time authentication server for performing time authentication, and the authentication Authentication time information receiving means for receiving authentication time information according to the authentication time information request data transmitted by the time information request data transmitting means from the time authentication server, and authentication time information received by the authentication time information receiving means May be configured to include reception authentication time information adding means for adding to a file attached to the e-mail acquired by the e-mail acquisition means.
[0009] 例えば、前記認証時刻情報要求データ送信手段は、前記電子メール取得手段が 取得した電子メールに添付されて!/、るファイルの電子署名データを取得するファイル 電子署名データ取得手段と、前記ファイル電子署名データ取得手段が取得した電子 署名データのハッシュ値を生成するハッシュ値生成手段と、前記ハッシュ値生成手段 が生成したハッシュ値を含む認証時刻情報要求データを生成する認証時刻情報要 求データ生成手段と、前記認証時刻情報要求データ生成手段が生成した、ハッシュ 値を含む認証時刻情報要求データを、前記時刻認証サーバに送信するハッシュ値 送信手段と、を有し、 前記認証時刻情報受信手段は、前記時刻認証サーバから、時刻情報と前記ハツシ ュ値送信手段が送信した認証時刻情報要求データに含まれているハッシュ値とを含 むタイムスタンプトークンと、該タイムスタンプトークンの電子署名データと、を受信し、 前記受信認証時刻情報付加手段は、前記認証時刻情報受信手段が受信したタイ ムスタンプトークンと該タイムスタンプトークンの電子署名データとを、前記電子メール 取得手段が取得した電子メールに添付されてレ、るファイルに、前記認証時刻情報と して付加する、ように構成されてもよい。 [0009] For example, the authentication time information request data transmission means includes a file electronic signature data acquisition means for acquiring electronic signature data of a file attached to the electronic mail acquired by the electronic mail acquisition means! Hash value generation means for generating a hash value of the electronic signature data acquired by the file electronic signature data acquisition means, and authentication time information request data for generating authentication time information request data including the hash value generated by the hash value generation means Generating means, and hash value transmitting means for transmitting the authentication time information request data including the hash value generated by the authentication time information request data generating means to the time authentication server, The authentication time information receiving means includes a time stamp token including time information and a hash value included in authentication time information request data transmitted by the hash value transmission means from the time authentication server, and the time stamp. The electronic signature data of the token, and the reception authentication time information adding means receives the time stamp token received by the authentication time information receiving means and the electronic signature data of the time stamp token by the electronic mail acquisition means. The authentication time information may be added to a file attached to the acquired e-mail.
[0010] 例えば、前記電子メール取得手段は、ファイルが添付された電子メールを、電子メ ールの送信処理を行う送信電子メールサーバから取得する送信電子メール取得手 段と、前記送信電子メール取得手段が取得した電子メールから、該電子メールに添 付されているファイルを取り出すファイル取出手段と、を有し、 [0010] For example, the e-mail acquisition means includes a transmission e-mail acquisition means for acquiring an e-mail attached with a file from a transmission e-mail server that performs e-mail transmission processing, and the transmission e-mail acquisition A file extracting means for taking out a file attached to the e-mail from the e-mail acquired by the means;
前記ファイル認証時刻情報付加手段は、前記ファイル取出手段が取り出したフアイ ルに認証時刻情報を付加し、 The file authentication time information adding means adds authentication time information to the file extracted by the file extracting means,
前記電子メール出力手段は、前記ファイル認証時刻情報付加手段が認証時刻情 報を付加したファイルを、前記ファイル取出手段によりファイルが取り出された電子メ ールに添付するファイル添付手段と、前記ファイル添付手段がファイルを添付した電 子メールを、前記送信電子メールサーバに出力する送信電子メール出力手段と、を 有する、ように構成されてもよい。 The e-mail output means includes a file attachment means for attaching the file to which the file authentication time information addition means has added the authentication time information to the electronic mail from which the file has been extracted by the file extraction means, and the file attachment The unit may be configured to include a transmission e-mail output unit that outputs an e-mail attached with a file to the transmission e-mail server.
[0011] 例えば、前記電子メール出力手段は、前記ファイル添付手段がファイルを添付した 電子メールに、認証時刻情報を付加する電子メール認証時刻情報付加手段をさらに 有し、 [0011] For example, the e-mail output means further includes e-mail authentication time information adding means for adding authentication time information to the e-mail to which the file attachment means has attached a file,
前記送信電子メール出力手段は、前記電子メール認証時刻情報付加手段が認証 時刻情報を付加した電子メールを、前記送信電子メールサーバに出力する、ように 構成されてもよい。 The transmission e-mail output means may be configured to output an e-mail to which the e-mail authentication time information addition means has added authentication time information to the transmission e-mail server.
[0012] 例えば、前記電子メール取得手段が取得した電子メールに添付されているファイル のフォーマットが、認証時刻情報を格納する付加情報格納領域を備える付加情報格 納フォーマットであるか否かを判別するフォーマット判別手段と、前記フォーマット判 別手段によりファイルのフォーマットが付加情報格納フォーマットでないと判別された 場合に、該ファイルのフォーマットを付加情報格納フォーマットに変換するフォーマツ ト変換手段と、をさらに備え、 [0012] For example, it is determined whether or not the format of the file attached to the e-mail acquired by the e-mail acquisition unit is an additional information storage format including an additional information storage area for storing authentication time information. The format discriminating unit and the format discriminating unit discriminate that the file format is not the additional information storage format. A format conversion means for converting the format of the file into an additional information storage format.
前記ファイル認証時刻情報付加手段は、前記フォーマット変換手段がフォーマット を変換したファイルの付加情報格納領域に、認証時刻情報を記録する、ように構成さ れてもよい。 The file authentication time information adding means may be configured to record the authentication time information in an additional information storage area of the file whose format has been converted by the format conversion means.
[0013] 例えば、前記電子メール取得手段が取得した電子メールに添付されているファイル のフォーマットを変換するための変換条件を指定する変換条件指定手段と、前記変 換条件指定手段により指定される変換条件に応じたフォーマットに該ファイルのフォ 一マットを変換するフォーマット変換手段と、をさらに備え、 [0013] For example, conversion condition specifying means for specifying a conversion condition for converting the format of a file attached to an e-mail acquired by the e-mail acquiring means, and conversion specified by the conversion condition specifying means Format conversion means for converting the format of the file into a format according to conditions,
前記ファイル認証時刻情報付加手段は、前記フォーマット変換手段がフォーマット を変換したファイルの付加情報格納領域に、認証時刻情報を記録する、ように構成さ れてもよい。 The file authentication time information adding means may be configured to record the authentication time information in an additional information storage area of the file whose format has been converted by the format conversion means.
[0014] 例えば、前記ファイル認証時刻情報付加手段は、前記電子メール取得手段が取得 した電子メールに添付されているファイルの認証時刻情報を記録した認証時刻情報 記録ファイルを生成する認証時刻情報記録ファイル生成手段と、前記認証時刻情報 記録ファイル生成手段が生成した認証時刻情報記録ファイルを、前記電子メール取 得手段が取得した電子メールに、添付する認証時刻情報記録ファイル添付手段と、 を有し、 [0014] For example, the file authentication time information adding means is an authentication time information recording file for generating an authentication time information recording file in which authentication time information of a file attached to an e-mail acquired by the e-mail acquiring means is recorded. And an authentication time information recording file attachment means for attaching the authentication time information recording file generated by the authentication time information recording file generation means to the electronic mail acquired by the electronic mail acquisition means,
前記電子メール出力手段は、前記認証時刻情報記録ファイル添付手段が認証時 刻情報記録ファイルを添付した電子メールを出力する、ように構成されてもよい。 The e-mail output means may be configured such that the authentication time information record file attachment means outputs an e-mail attached with an authentication time information record file.
[0015] 例えば、前記認証時刻情報記録ファイルを生成して電子メールに添付するか否か を指定する添付条件を指定する添付条件指定手段を、さらに備え、 [0015] For example, it further includes an attachment condition designating unit for designating an attachment condition for designating whether to generate the authentication time information recording file and attach it to an e-mail,
前記電子メール出力手段は、前記添付条件指定手段の指定する条件に応じて、 前記認証時刻情報記録ファイル添付手段が認証時刻情報記録ファイルを添付した 電子メールを出力する、ように構成されてもよい。 The e-mail output means may be configured such that the authentication time information record file attachment means outputs an e-mail attached with an authentication time information record file according to a condition designated by the attachment condition designation means. .
[0016] 例えば、前記認証時刻情報記録ファイルと前記電子メールとを対応付ける対応情 報を前記電子メールのヘッダに付加する対応情報付加手段を、さらに備え、 前記電子メール出力手段は、前記対応情報がヘッダに付加された電子メールを出 力する、ように構成されてもよい。 [0016] For example, it further includes correspondence information adding means for adding correspondence information for associating the authentication time information recording file and the electronic mail to a header of the electronic mail, and the electronic mail output means includes the correspondence information E-mail added to the header It may be configured to force.
[0017] また、本発明の主要機能を実現するための認証時刻付加方法を提供する。さらに、 コンピュータに対して本発明の主要機能を実行させるためのプログラムを提供する。 発明の効果 [0017] Also provided is an authentication time addition method for realizing the main functions of the present invention. Furthermore, a program for causing a computer to execute the main functions of the present invention is provided. The invention's effect
[0018] 本発明によれば、電子メールに添付されて!/、るファイルに関する時刻情報を高!/、信 頼性でかつ容易に得ることができる。 [0018] According to the present invention, time information related to a file attached to an electronic mail can be obtained with high reliability and reliability.
図面の簡単な説明 Brief Description of Drawings
[0019] [図 1]本発明の実施形態 1のタイムスタンプ付加システムの全体構成を示す図である FIG. 1 is a diagram showing an overall configuration of a time stamp addition system according to a first embodiment of the present invention.
〇 Yes
[図 2]タイムスタンプ付加装置の回路構成を示す図である。 FIG. 2 is a diagram showing a circuit configuration of a time stamp adding device.
[図 3A]変換フォーマット情報のデータ構造の一例を示す図である。 FIG. 3A is a diagram showing an example of a data structure of conversion format information.
[図 3B]タイムスタンプ付加用フォーマットに則ったファイルのデータ構造の一例を示 す図である。 FIG. 3B is a diagram showing an example of a data structure of a file according to a time stamp addition format.
[図 4A]添付ファイルの署名値が生成される過程を模式的に示す図である。 FIG. 4A is a diagram schematically showing a process of generating a signature value for an attached file.
[図 4B]タイムスタンプ要求用ハッシュ値が生成される過程を模式的に示す図である。 FIG. 4B is a diagram schematically showing a process of generating a time stamp request hash value.
[図 4C]タイムスタンプ付加装置と TSAサーバとの間のデータのやりとりを模式的に示 す図である。 FIG. 4C is a diagram schematically showing data exchange between the time stamp adding device and the TSA server.
[図 5]実施形態 1のタイムスタンプ付加装置によるタイムスタンプ付加処理を示すフロ 一チャートである。 FIG. 5 is a flowchart showing time stamp addition processing by the time stamp addition apparatus of the first embodiment.
[図 6]ファイル電子署名処理を示すフローチャートである。 FIG. 6 is a flowchart showing file electronic signature processing.
[図 7]ファイル時刻認証処理を示すフローチャートである。 FIG. 7 is a flowchart showing a file time authentication process.
[図 8]電子メールに添付されたファイルのタイムスタンプを受信側で検証するときのフ アイルタイムスタンプ検証処理を示すフローチャートである。 FIG. 8 is a flowchart showing a file time stamp verification process when the time stamp of a file attached to an e-mail is verified on the receiving side.
[図 9A]実施形態 2のタイムスタンプ付加装置が有する電子メール再構成部によって 再構成された電子メールのデータ構造の第 1の例を示す図である。 FIG. 9A is a diagram showing a first example of an e-mail data structure reconstructed by an e-mail reconstructing unit included in the time stamp addition apparatus of the second embodiment.
[図 9B]実施形態 2のタイムスタンプ付加装置が有する電子メール再構成部によって 再構成された電子メールのデータ構造の第 2の例を示す図である。 FIG. 9B is a diagram showing a second example of the data structure of the email reconstructed by the email reconstruction unit included in the time stamp addition apparatus of Embodiment 2.
[図 10]実施形態 3のタイムスタンプ付加装置の内部構成を示すブロック図である。 園 11]実施形態 3のタイムスタンプ付加情報のデータ構造の一例を示す図である。 符号の説明 FIG. 10 is a block diagram showing an internal configuration of a time stamp adding apparatus according to the third embodiment. FIG. 11] An example of a data structure of time stamp additional information according to the third embodiment. Explanation of symbols
1 ユーザ端末 1 User terminal
2 メールサーバ 2 Mail server
3 タイムスタンプ付加装置 3 Time stamp adding device
4 TSAサーバ 4 TSA server
5 ネットワーク 5 network
30 制御部 30 Control unit
31 通信部 31 Communication Department
32 1記憶部 32 1 Memory
301 添付ファイル存在判別部 301 Attachment existence judgment part
302 フォーマット判別部 302 Format discriminator
303 フォーマット変換部 303 Format converter
304 電子署名部 304 Electronic signature
305 時刻認証部 305 Time authentication part
306 電子メール再構成部 306 Email reconstruction unit
307 タイムスタンプ付加ルール指定部 307 Time stamp addition rule specification part
321 変換フォーマット情報 321 Conversion format information
322 秘密鍵管理情報 322 Private key management information
323 タイムスタンプ付加情報 323 Time stamp additional information
発明を実施するための最良の形態 BEST MODE FOR CARRYING OUT THE INVENTION
(実施形態 1) (Embodiment 1)
以下、本発明の実施形態 1に係るタイムスタンプ付加システム(認証時刻付加装置 、認証時刻付加方法、プログラム、を含む)を説明する。図 1に示すように、実施形態 1のタイムスタンプ付加システムは、ユーザ端末 1と、メールサーバ 2と、タイムスタンプ 付加装置 3と、 TSA(Time Stamping Authority)サーバ 4と、ネットワーク 5と、を備える ユーザ端末 1、メールサーバ 2、タイムスタンプ付加装置 3、 TSAサーバ 4は、ネット ワーク 5を介して互いに接続される。ネットワーク 5は、インターネット、イントラネット、 公衆網、など、データを送受できるネットワークであれば任意でよい。例えば、ユーザ 端末 1とメールサーバ 2とタイムスタンプ付加装置 3とが、同一のイントラネットに接続さ れていてもよい。 Hereinafter, a time stamp addition system (including an authentication time addition device, an authentication time addition method, and a program) according to Embodiment 1 of the present invention will be described. As shown in FIG. 1, the time stamp addition system of Embodiment 1 includes a user terminal 1, a mail server 2, a time stamp addition device 3, a TSA (Time Stamping Authority) server 4, and a network 5. User terminal 1, mail server 2, time stamp adding device 3, and TSA server 4 They are connected to each other via work 5. The network 5 may be any network that can send and receive data, such as the Internet, an intranet, and a public network. For example, the user terminal 1, the mail server 2, and the time stamp adding device 3 may be connected to the same intranet.
[0023] ユーザ端末 1は、パーソナルコンピュータ(PC)などで構成され、ユーザの操作に応 じた処理を実行する。例えば、ユーザ端末 1は、ユーザの操作に従って、電子メーノレ の作成、作成された電子メールへのファイルの添付、ファイルが添付された電子メー ルの送信、などを実行する。なお、以下では電子メールに添付されたファイルを「添 付ファイル」といい、添付ファイルを有する電子メールを「添付ファイル付電子メール」 という。 [0023] The user terminal 1 is composed of a personal computer (PC) or the like, and executes a process according to a user operation. For example, the user terminal 1 executes creation of an electronic mail, attachment of a file to the created electronic mail, transmission of an electronic mail with a file attached, and the like according to a user operation. Hereinafter, a file attached to an e-mail is referred to as an “attached file”, and an e-mail having an attached file is referred to as an “attached file e-mail”.
[0024] メールサーバ 2は、サーバ装置などで構成されており、電子メールの送受信処理を 行う。例えば、メールサーバ 2は、ユーザ端末 1で作成された電子メールを、送信先の 他のユーザのメールサーノ (図示せず)に送信する。また、メールサーバ 2は、ネット ワーク 5を介して他のユーザ端末(図示せず)からユーザ端末 1宛に送信された電子 メールを受信し、ユーザ端末 1から受信要求があるまで保持する。 [0024] The mail server 2 is composed of a server device or the like, and performs transmission / reception processing of electronic mail. For example, the mail server 2 transmits an electronic mail created by the user terminal 1 to a mail sano (not shown) of another user at the transmission destination. In addition, the mail server 2 receives an electronic mail transmitted from the other user terminal (not shown) to the user terminal 1 via the network 5 and holds it until a reception request is received from the user terminal 1.
[0025] なお、メールサーバ 2は、ユーザ端末 1から供給された電子メールを送信先へ送る 前に、その電子メールを一旦タイムスタンプ付加装置 3に送信する。この動作は、電 子メールに添付ファイルが添付されて!/、る場合に、その添付ファイルに TSAサーバ 4 で認証されたタイムスタンプを付与することをタイムスタンプ付加装置 3に要求するた めに われる。 Note that the mail server 2 once transmits the e-mail to the time stamp adding device 3 before sending the e-mail supplied from the user terminal 1 to the transmission destination. This operation is to request the time stamp adding device 3 to attach a time stamp authenticated by the TSA server 4 to the attached file when an attached file is attached to the e-mail! Is called.
[0026] タイムスタンプ付加装置 3は、例えば、サーバ装置などで構成されており、メールサ ーバ 2から送信される電子メール及びその電子メールの添付ファイルに、タイムスタン プを付与する。ここに、「タイムスタンプ」とは TSAサーバ 4によって認証された時刻( 日時)を示す情報である。 [0026] The time stamp adding device 3 is constituted by a server device, for example, and assigns a time stamp to the electronic mail transmitted from the mail server 2 and the attached file of the electronic mail. Here, the “time stamp” is information indicating the time (date and time) authenticated by the TSA server 4.
タイムスタンプ付加装置 3は、メールサーバ 2から受信した電子メールに添付フアイ ルが添付されて!/、るか否かを判別し、添付されて!/、れば各添付ファイルにタイムスタ ンプを付加し、付加後の添付ファイル付電子メールをメールサーバ 2に供給する。 なお、タイムスタンプ付加装置 3は、タイムスタンプの発行を要求するためのタイムス タンプ要求メッセージを TSAサーバ 4に送信し、その要求に応じて TSAサーバ 4によ り発行されたタイムスタンプを添付ファイルに付与する。 The time stamp adding device 3 determines whether or not an attached file is attached to the email received from the mail server 2 and attaches the time stamp to each attached file. Then, the attached e-mail with the attached file is supplied to the mail server 2. The time stamp adding device 3 is a time stamp for requesting the time stamp issuance. A tamping request message is transmitted to the TSA server 4, and the time stamp issued by the TSA server 4 is attached to the attached file in response to the request.
[0027] TSAサーバ 4は、サーバ装置などで構成され、時刻認証局(TSA: Time Stamping Authority)として機能する。 TSAサーバ 4は、タイムスタンプ付加装置 3からの要求に 応じてタイムスタンプを発行し、そのタイムスタンプをタイムスタンプ付加装置 3に供給 する。なお時刻認証局(タイムスタンプ局)は、例えば、利用者からの要求に応じて、 利用者が作成した電子データの時刻を認証し、タイムスタンプを発行する第三者機 関的な事業者 (以下、「時刻認証事業者」という)である。 [0027] The TSA server 4 is configured by a server device or the like, and functions as a time stamping authority (TSA). The TSA server 4 issues a time stamp in response to a request from the time stamp adding device 3 and supplies the time stamp to the time stamp adding device 3. The time certification authority (time stamp authority), for example, authenticates the time of electronic data created by the user in response to a request from the user and issues a time stamp. Hereinafter, it is referred to as a “time authentication operator”.
[0028] TSAサーバ 4は、時刻配信局(TA: Time Authority)が備える TAサーノ (図示せ ず)に、所定のネットワークを介して接続されている。 TSAサーバ 4は、 TAサーバか ら標準時に基づく極めて正確な時刻の配信を受けることで、発行するタイムスタンプ の信頼性を維持している。なお、実施形態 1では、 TSAサーバ 4は、 PKI (Public Key Infrastructure)を利用したタイムスタンプのプロトコルフォーマットに従ってタイムスタ ンプを発行する。 [0028] The TSA server 4 is connected to a TA sano (not shown) provided in a time authority (TA) via a predetermined network. The TSA server 4 maintains the reliability of the issued time stamp by receiving a highly accurate time distribution based on the standard time from the TA server. In the first embodiment, the TSA server 4 issues a time stamp in accordance with the time stamp protocol format using PKI (Public Key Infrastructure).
[0029] 次に、このようなタイムスタンプ付加システムに含まれる実施形態 1のタイムスタンプ 付加装置 3の回路構成を説明する。図 2に示すように、タイムスタンプ付加装置 3は、 制御部 30と、通信部 31と、記憶部 32と、を備える。 Next, a circuit configuration of the time stamp adding apparatus 3 according to the first embodiment included in such a time stamp adding system will be described. As shown in FIG. 2, the time stamp adding device 3 includes a control unit 30, a communication unit 31, and a storage unit 32.
[0030] 制御部 30は、 CPU (Central Processing Unit)、 ROM (Read Only Memory)、 RA M (Random Access Memory)等から構成され、タイムスタンプ付加装置 3全体を制御 する。例えば、制御部 30は、電子メールの添付ファイルにタイムスタンプを付加する タイムスタンプ付加処理を実行する。なお、各種の演算処理や制御処理を行う際、制 御部 30は、 RAMに各種データを一時的に記憶させながら、 ROMに記憶されている 制御プログラムを CPUに実行させる。 The control unit 30 includes a CPU (Central Processing Unit), a ROM (Read Only Memory), a RAM (Random Access Memory), and the like, and controls the time stamp adding device 3 as a whole. For example, the control unit 30 executes a time stamp addition process for adding a time stamp to the attached file of the e-mail. When performing various arithmetic processes and control processes, the control unit 30 causes the CPU to execute the control program stored in the ROM while temporarily storing various data in the RAM.
[0031] また、制御部 30は、添付ファイル存在判別部 301と、フォーマット判別部 302と、フ ォーマット変換部 303と、電子署名部 304と、時刻認証部 305と、電子メール再構成 部 306と、を備える。各部 30;!〜 306の詳細については後述する。 [0031] Further, the control unit 30 includes an attached file existence determination unit 301, a format determination unit 302, a format conversion unit 303, an electronic signature unit 304, a time authentication unit 305, and an e-mail reconstruction unit 306. . Details of each unit 30;! To 306 will be described later.
[0032] 通信部 31は、通信インターフェース等から構成され、ネットワーク 5を介して外部の 装置と通信する。例えば、通信部 31は、イントラネットを介してメールサーバ 2とデー タ通信を行い、ネットワーク 5を介して TSAサーバ 4とデータ通信を行う。通信部 31は 、メールサーバ 2によって送信先(宛先)へ送信される予定の電子メールをメールサー ノ 2から受け取ると、その電子メールを添付ファイル存在判別部 301に供給する。 The communication unit 31 includes a communication interface and the like, and communicates with an external device via the network 5. For example, the communication unit 31 communicates with the mail server 2 via the intranet. Data communication with the TSA server 4 via the network 5. When the communication unit 31 receives an e-mail scheduled to be transmitted to the transmission destination (destination) by the mail server 2 from the mail server 2, the communication unit 31 supplies the e-mail to the attached file existence determination unit 301.
[0033] 記憶部 32は、 ROM (Read Only Memory)、 RAM (Random Access Memory)、ハー ドディスク、等の補助記憶装置から構成されており、各種の情報やプログラム等を記 憶する。例えば、記憶部 32は、変換フォーマット情報 321、秘密鍵管理情報 322、な どを記憶する。 The storage unit 32 includes an auxiliary storage device such as a ROM (Read Only Memory), a RAM (Random Access Memory), and a hard disk, and stores various types of information, programs, and the like. For example, the storage unit 32 stores conversion format information 321, secret key management information 322, and the like.
[0034] 図 3Aに示すように、変換フォーマット情報 321は、「タイムスタンプ非付加用フォー マット Fn」と、「タイムスタンプ付加用フォーマット Fa」と、を対応付ける。「タイムスタン プ非付加用フォーマット Fn」は、フォーマット変換部 303によってフォーマット変換が 施されてレ、な!/、フォーマットであり、制御部 30がタイムスタンプを付与しな!/、フォーマ ットである。また、「タイムスタンプ付加用フォーマット Fa」は、フォーマット変換部 303 によってフォーマット変換が施されたフォーマットで、制御部 30がタイムスタンプを付 与可能なフォーマットである。 As shown in FIG. 3A, conversion format information 321 associates “time stamp non-addition format Fn” with “time stamp addition format Fa”. “Time stamp non-addition format Fn” is a format that has been subjected to format conversion by the format conversion unit 303, and is a format that the control unit 30 does not add a time stamp to! /. is there. The “time stamp addition format Fa” is a format that has been subjected to format conversion by the format conversion unit 303 and is a format to which the control unit 30 can assign a time stamp.
[0035] なお、タイムスタンプ付加用フォーマット Faの構造について説明しておく。図 3Bに 示すように、タイムスタンプ付加用フォーマット Faに変換されたファイルは、「メインデ ータ領域 DA」と「付加情報領域 IA」とを有する。ここに、 「メインデータ領域」とはフアイ ルの主となるデータを格納するための領域であり、「付加情報領域」とは電子署名や タイムスタンプ等のファイルに関する付加情報を格納するための領域である。メインデ ータ領域には、変換元の添付ファイルが文書ファイルであれば文書内容を示すデー タが格納され、画像ファイルであれば画像データが格納される。 The structure of the time stamp addition format Fa will be described. As shown in FIG. 3B, the file converted into the time stamp addition format Fa has a “main data area DA” and an “additional information area IA”. Here, the “main data area” is an area for storing the main data of the file, and the “additional information area” is an area for storing additional information about the file such as an electronic signature and a time stamp. It is. In the main data area, data indicating the contents of the document is stored if the attached file of the conversion source is a document file, and image data is stored if the attached file is an image file.
[0036] なお、タイムスタンプ非付加用フォーマット Fnとは、付加情報領域を有しな!/、フアイ ルフォーマット、又は、付加情報領域を有していてもその領域にタイムスタンプ等の情 報を格納したときの容量が不足してレ、るファイルフォーマット、である。 [0036] Note that the time stamp non-addition format Fn does not have an additional information area! /, A file format, or even if it has an additional information area, information such as a time stamp is included in that area. This is a file format that runs out of capacity when stored.
[0037] 秘密鍵管理情報 322は、タイムスタンプ付加装置 3でタイムスタンプが付加される電 子メールを作成した者の秘密鍵を格納する。例えば、秘密鍵管理情報 322には、ュ 一ザ端末 1により電子メールを作成するユーザの秘密鍵が格納されてレ、る。 The private key management information 322 stores the private key of the person who created the electronic mail to which the time stamp is added by the time stamp adding device 3. For example, the secret key management information 322 stores the secret key of the user who creates an email by the user terminal 1.
[0038] 次に、図 2で示した制御部 30が有する各部 30;!〜 306を説明する。 添付ファイル存在判別部 301は、通信部 31から供給された電子メールに添付ファ ィルが添付されているか否かを判別する。添付されている場合、添付ファイル存在判 別部 301は、その添付ファイルを電子メールから分離及び抽出する。電子メールに 複数の添付ファイルが添付されている場合、添付ファイル存在判別部 301は電子メ ールから各添付ファイルを別々に抽出する。また、電子メールに添付ファイルが添付 されていなければ、添付ファイル存在判別部 301は、その電子メールを電子署名部 3 04に供給する。 Next, each unit 30;! To 306 included in the control unit 30 shown in FIG. 2 will be described. The attached file existence determining unit 301 determines whether or not an attached file is attached to the e-mail supplied from the communication unit 31. If it is attached, the attached file existence determination unit 301 separates and extracts the attached file from the electronic mail. When a plurality of attached files are attached to the e-mail, the attached file existence determining unit 301 extracts each attached file separately from the e-mail. If the attached file is not attached to the electronic mail, the attached file existence determining unit 301 supplies the electronic mail to the electronic signature unit 304.
[0039] フォーマット判別部 302は、添付ファイル存在判別部 301によって抽出された各添 付ファイルのファイルフォーマットが、タイムスタンプ非付加用フォーマット Fnとタイム スタンプ付加用フォーマット Faとの!/、ずれであるかを判別する。フォーマット判別部 3 02は、例えば、添付ファイルの種類を特定するための拡張子や添付ファイルに付与 されているファイルタイプ情報等に基づいて、ファイルフォーマットを判別する。 [0039] The format discriminating unit 302 indicates that the file format of each attached file extracted by the attached file existence discriminating unit 301 is a difference between the time stamp non-addition format Fn and the time stamp addition format Fa! /. Is determined. For example, the format discriminating unit 302 discriminates the file format based on an extension for identifying the type of the attached file, file type information attached to the attached file, or the like.
[0040] フォーマット変換部 303は、図 3Aで示した変換フォーマット情報 321を参照し、フォ 一マット判別部 302によりタイムスタンプ非付加用フォーマット Fnであると判別された 添付ファイルのフォーマットを、タイムスタンプ付加用フォーマット Faに変換する。この フォーマット変換後の添付ファイルが、電子署名及び時刻認証が施される対象となる 。図 3Aの例では、変換元の添付ファイルのフォーマットがファイルフォーマット Cであ れば、フォーマット変換部 303は、ファイルフォーマット Cからファイルフォーマット Aに 変換する。 [0040] The format conversion unit 303 refers to the conversion format information 321 shown in FIG. 3A, and converts the format of the attached file that has been determined by the format determination unit 302 to be the non-timestamping format Fn. Convert to additional format Fa. The attached file after the format conversion is subject to digital signature and time authentication. In the example of FIG. 3A, if the format of the attached file of the conversion source is the file format C, the format conversion unit 303 converts the file format C to the file format A.
[0041] なお、フォーマット判別部 302により添付ファイルがタイムスタンプ付加用フォーマツ ト Faであると判別された場合、フォーマット変換部 303は添付ファイルのフォーマット 変換処理を行わない。 Note that when the format determination unit 302 determines that the attached file is the time stamp addition format Fa, the format conversion unit 303 does not perform the format conversion process of the attached file.
[0042] 電子署名部 304は、電子メール及び添付ファイルに電子署名が付与されていない 場合、それらに電子署名を付与する。例えば、電子署名部 304は、秘密鍵管理情報 322に格納されている秘密鍵を用いて、電子メール又はタイムスタンプ付加用フォー マット Faのファイルの署名値を生成する。ここに署名値とは、例えば、 PRCS (Public Key Cryptography Standards) 7等で規定された電子署名手順に基づく電子署名デ ータを指す。 [0043] 時刻認証部 305は、 TSAサーバ 4により発行されたタイムスタンプを、電子署名部 3 04により電子署名がそれぞれ付与された電子メール及びその電子メールの添付ファ ィルに付与する。そして、時刻認証部 305は、タイムスタンプが付与された電子メー ルを電子メール再構成部 306に供給する。 [0042] If the electronic signature is not attached to the electronic mail and the attached file, the electronic signature unit 304 attaches the electronic signature to them. For example, the electronic signature unit 304 uses the private key stored in the private key management information 322 to generate the signature value of the file of the e-mail or the time stamp addition format Fa. Here, the signature value refers to digital signature data based on a digital signature procedure specified by PRCS (Public Key Cryptography Standards) 7 or the like, for example. [0043] The time authentication unit 305 attaches the time stamp issued by the TSA server 4 to the electronic mail to which the electronic signature is given by the electronic signature unit 304 and the attached file of the electronic mail. Then, the time authentication unit 305 supplies the electronic mail to which the time stamp is given to the electronic mail reconstruction unit 306.
[0044] 電子メール再構成部 306は、時刻認証部 305によってタイムスタンプが付与された 各添付ファイルを添付ファイル存在判別部 301によって分離された電子メールに再 度添付することで、電子メールを再構成する。そして、電子メール再構成部 306は、 再構成された電子メールを電子署名部 304に供給する。 [0044] The e-mail reconstructing unit 306 re-attaches the e-mail by reattaching each attached file to which the time stamp is given by the time authenticating unit 305 to the e-mail separated by the attached file existence determining unit 301. Constitute. Then, the email reconstructing unit 306 supplies the reconstructed email to the electronic signature unit 304.
[0045] 以下、上記構成を有する制御部 30が、添付ファイルのデータに対応する署名値を 生成する動作を説明する。図 4Aに示すように、制御部 30の電子署名部 304は、ま ず、所定のハッシュ関数(例えば、 MD5、 SHA— 1、 SHA— 256等)を用いて、添付 ファイルのメインデータ領域に格納されているデータに対応するメッセージダイジエス ト(ハッシュ値)を生成する。続いて、電子署名部 304は、そのメッセージダイジェスト を添付ファイル付電子メールの作成者の秘密鍵で暗号化し、添付ファイルの署名値 を生成する。生成後、電子署名部 304は、その署名値を添付ファイルの付加情報領 域に格納する。 Hereinafter, an operation in which the control unit 30 having the above configuration generates a signature value corresponding to the data of the attached file will be described. As shown in FIG. 4A, the electronic signature unit 304 of the control unit 30 is first stored in the main data area of the attached file using a predetermined hash function (for example, MD5, SHA-1, SHA-256, etc.). A message digest (hash value) corresponding to the stored data is generated. Subsequently, the electronic signature unit 304 encrypts the message digest with the secret key of the creator of the email with the attached file, and generates a signature value for the attached file. After generation, the electronic signature unit 304 stores the signature value in the additional information area of the attached file.
[0046] 次に、電子署名部 304により生成された添付ファイルの署名値に基づいて、時刻認 証部 305が「タイムスタンプ要求用ハッシュ値」を生成する動作を説明する。ここに「タ ィムスタンプ要求用ハッシュ値」とは、時刻認証部 305が TSAサーバ 4にタイムスタン プの発行を要求する際に用いられる情報である。 Next, an operation in which the time authentication unit 305 generates a “time stamp request hash value” based on the signature value of the attached file generated by the electronic signature unit 304 will be described. Here, the “time stamp request hash value” is information used when the time authentication unit 305 requests the TSA server 4 to issue a time stamp.
[0047] 先ず、時刻認証部 305は、タイムスタンプを付与する対象の添付ファイルの付加情 報領域から、電子署名部 304によって生成されたその添付ファイルの署名値を読み 出す。続いて、図 4Bに示すように、時刻認証部 305は、所定のハッシュ関数に基づ いてその署名値に対応するハッシュ値を生成し、そのハッシュ値をタイムスタンプ要 求用ハッシュ値に定める。 First, the time authentication unit 305 reads the signature value of the attached file generated by the electronic signature unit 304 from the additional information area of the attached file to which the time stamp is to be attached. Subsequently, as shown in FIG. 4B, the time authentication unit 305 generates a hash value corresponding to the signature value based on a predetermined hash function, and determines the hash value as a hash value for time stamp request.
[0048] 次に、時刻認証部 305は、このタイムスタンプ要求用ハッシュ値を用いて、 TSAサ ーバ 4にタイムスタンプの発行を要求する。図 4Cに示すように、時刻認証部 305は、 タイムスタンプ要求用ハッシュ値を含む所定フォーマットのタイムスタンプ要求メッセ ージを生成し、そのメッセージを通信部 31を介して TS Aサーバ 4に送信する。 Next, the time authentication unit 305 requests the TSA server 4 to issue a time stamp using the hash value for requesting time stamp. As shown in FIG. 4C, the time authentication unit 305 includes a time stamp request message in a predetermined format including a hash value for time stamp request. The message is generated and the message is transmitted to the TS A server 4 via the communication unit 31.
[0049] 受信側の TSAサーバ 4は、タイムスタンプ付加装置 3からタイムスタンプ要求メッセ ージを受信すると、タイムスタンプトークンを生成する。このタイムスタンプトークンは、 TSAサーバ 4が添付ファイルを認証した時の正確な時刻を示す時刻情報と、受信し たタイムスタンプ要求メッセージ内のタイムスタンプ要求用ハッシュ値と、を含んでい [0049] When receiving the time stamp request message from the time stamp adding apparatus 3, the TSA server 4 on the receiving side generates a time stamp token. This time stamp token includes time information indicating the exact time when the TSA server 4 authenticated the attached file, and a hash value for the time stamp request in the received time stamp request message.
[0050] タイムスタンプトークンの生成後、 TSAサーバ 4は、図 4Aで示した電子署名部 304 の処理と実質的に同一の処理により、そのタイムスタンプトークンに対応する署名値 を生成する。すなわち、 TSAサーバ 4は、所定のハッシュ関数によって求めたタイム スタンプトークンのハッシュ値を TSAサーバ 4の秘密鍵で暗号化することで、そのトー クンに対応する署名値を生成する。さらに、 TSAサーバ 4は、タイムスタンプトークンと そのトークンの署名値とを含む「応答メッセージ」を所定フォーマットに則って生成し、 要求元のタイムスタンプ付加装置 3に送信する。 [0050] After the time stamp token is generated, the TSA server 4 generates a signature value corresponding to the time stamp token by substantially the same processing as the processing of the electronic signature unit 304 shown in FIG. 4A. That is, the TSA server 4 generates a signature value corresponding to the token by encrypting the hash value of the time stamp token obtained by a predetermined hash function with the secret key of the TSA server 4. Further, the TSA server 4 generates a “response message” including a time stamp token and the signature value of the token in accordance with a predetermined format, and transmits it to the request time stamp adding device 3.
このような処理により、タイムスタンプ付加装置 3は、 TSAサーバ 4によって添付ファ ィルが認証された時の正確な時刻を含む応答メッセージを取得できる。 By such processing, the time stamp adding device 3 can acquire a response message including the exact time when the attached file is authenticated by the TSA server 4.
[0051] この応答メッセージに含まれているタイムスタンプトークンの署名値により、後に、タ ィムスタンプトークンが正規の TSAサーバ 4によって生成されたか否かを検証するこ とが可能となる。このような検証を行う場合、応答メッセージ内の署名値を TSAサー ノ 4の公開鍵で復号して TSAサーバ 4が求めたトークンのハッシュ値を取得すると共 に、所定のハッシュ関数を使用して応答メッセージ内のタイムスタンプトークンのハツ シュ値を求める。そして、署名値の復号により得られたハッシュ値と、ハッシュ関数に より求めたタイムスタンプトークンのハッシュ値と、が互いに一致したときに、そのトーク ンが正規の TSAサーバ 4で生成されたトークンであると判別すればよい。 [0051] Based on the signature value of the time stamp token included in this response message, it is possible to verify later whether or not the time stamp token has been generated by the legitimate TSA server 4. When performing such verification, the signature value in the response message is decrypted with the public key of TSA server 4 to obtain the hash value of the token obtained by TSA server 4, and a predetermined hash function is used. The hash value of the time stamp token in the response message is obtained. When the hash value obtained by decrypting the signature value and the hash value of the time stamp token obtained by the hash function match each other, the token is a token generated by the legitimate TSA server 4. What is necessary is just to discriminate | determine.
[0052] 時刻認証部 305は、通信部 31によって受信された応答メッセージを参照し、 TSA サーバ 4が発行したタイムスタンプを検証する。具体的には、(1)応答メッセージ内の エラーメッセージの有無、(2)応答メッセージ内のタイムスタンプトークンの有無、(3) タイムスタンプトークンが正規の TSAサーバ 4で生成されたものであるか否力、、(4)タ ィムスタンプトークンに含まれているハッシュ値力 S、時刻認証部 305が自ら定めたタイ ムスタンプ要求用ハッシュ値に一致するか否か、等を検証する。 The time authentication unit 305 refers to the response message received by the communication unit 31 and verifies the time stamp issued by the TSA server 4. Specifically, (1) the presence or absence of an error message in the response message, (2) the presence or absence of a time stamp token in the response message, and (3) whether the time stamp token was generated by a legitimate TSA server 4 (4) Hash value power S included in the time stamp token, the time set by the time authentication unit 305 It is verified whether or not the hash value for the time stamp request matches.
[0053] タイムスタンプトークンが上述した検証事項等を満たす正常なものであれば、時刻 認証部 305は、応答メッセージ中のタイムスタンプトークン及びそのトークンの署名値 を添付ファイルの付加情報領域に書き込む。なお、電子署名部 304及び時刻認証 部 305は、各添付ファイルのファイルフォーマットに応じて、付加情報領域内のタイム スタンプ付加位置、メインデータ領域内のハッシュ対象データ範囲、などを判別し、 各フォーマットにそれぞれ適した署名処理及び時刻認証処理を実行する。 If the time stamp token is a normal one that satisfies the verification items described above, the time authentication unit 305 writes the time stamp token in the response message and the signature value of the token in the additional information area of the attached file. The electronic signature unit 304 and the time authentication unit 305 determine the time stamp addition position in the additional information area, the hash target data range in the main data area, and the like according to the file format of each attached file. A signature process and a time authentication process suitable for each are executed.
[0054] 時刻認証部 305によりすベての添付ファイルにタイムスタンプが付与されると、電子 メール再構成部 306は、各添付ファイルを添付ファイル存在判別部 301によって一 且分離された電子メールに再度添付し、新たな添付ファイル付電子メールを再構成 する。さらに、電子メール再構成部 306は、再構成された電子メールを電子署名部 3 04に供給する。 [0054] When time stamps are given to all attached files by the time authentication unit 305, the e-mail reconstructing unit 306 converts each attached file into an e-mail that has been separated by the attached file existence determining unit 301. Attach it again and reconstruct a new email with attachments. Further, the e-mail reconstructing unit 306 supplies the reconfigured e-mail to the electronic signature unit 304.
[0055] 電子署名部 304は、図 4Aで示した処理と実質的に同一の処理により新たな添付フ アイル付電子メールに電子署名を付与し、電子署名された電子メールを時刻認証部 305に供給する。 [0055] The electronic signature unit 304 assigns an electronic signature to the new attached file-attached email by substantially the same processing as the processing shown in FIG. 4A, and sends the electronic signature to the time authentication unit 305. Supply.
[0056] ただし、この電子署名を付与する際には、電子署名部 304は、ヘッダ部を除いた新 たな添付ファイル付電子メール全体(添付ファイルを含む)を対象としたメッセージダ イジエスト (ハッシュ値)を生成する。生成後、電子署名部 304は、秘密鍵管理情報 3 22内の電子メール作成者の秘密鍵によりそのハッシュ値を暗号化し、新たな添付フ アイル付電子メール全体に対応する署名値を生成する。 [0056] However, when this electronic signature is given, the electronic signature unit 304 creates a message digest (hash) for the entire new email with an attached file (including the attached file) excluding the header part. Value). After the generation, the electronic signature unit 304 encrypts the hash value with the private key of the electronic mail creator in the private key management information 322, and generates a signature value corresponding to the entire new attached-attached electronic mail.
[0057] さらに電子署名部 304は、その署名値を BASE64等の方式に則って文字列データ にエンコードし、その文字列データを電子メールのヘッダ部に書き込むことにより、電 子メールに電子署名を付与する。なお、署名値は、ヘッダ部に書き込むに限らず、電 子署名データとして電子メールに連結してもよい。なお、添付ファイル存在判別部 30 1によって電子メールに添付ファイルが付!/、て!/、な!/、と判別された場合、電子署名部 304は、電子メールの本文を対象とした電子署名を施す。 [0057] Further, the electronic signature unit 304 encodes the signature value into character string data in accordance with a method such as BASE64, and writes the character string data in the header part of the email, thereby providing the electronic signature to the email. Give. Note that the signature value is not limited to be written in the header part, but may be linked to electronic mail as electronic signature data. If the attached file existence discriminating unit 301 determines that an attached file is attached to the email! /, Te! /, Na! /, The electronic signature unit 304 creates an electronic signature for the body of the email. Apply.
[0058] 時刻認証部 305は、電子署名された新たな添付ファイル付電子メールにタイムスタ ンプを付加し、タイムスタンプが付加された電子メールを電子メール再構成部 306に 供給する。なお、タイムスタンプを付加する際に、時刻認証部 305は、図 4Bと実質的 に同一の処理によりタイムスタンプ要求用ハッシュ値を定める。そして、そのハッシュ 値を含んだタイムスタンプ要求メッセージを生成し、 TS Aサーバ 4に送信する。 [0058] The time authentication unit 305 adds a time stamp to the new electronic mail with attached file, and sends the e-mail with the time stamp to the e-mail reconstruction unit 306. Supply. When adding a time stamp, the time authentication unit 305 determines a hash value for requesting a time stamp by substantially the same processing as in FIG. 4B. Then, a time stamp request message including the hash value is generated and transmitted to the TS A server 4.
[0059] 時刻認証部 305は、その要求メッセージに応じた応答メッセージを TSAサーノ 4か ら受信すると、応答メッセージが正常か否かを判別し、正常であれば、応答メッセ一 ジ内のタイムスタンプトークン及びその署名値を電子メールのヘッダ部に付加する。 なお、タイムスタンプトークン等の格納先は、ヘッダ部に限らず電子署名データの非 署名属性領域であってもよ!/、。 [0059] When the time authentication unit 305 receives a response message corresponding to the request message from the TSA Sano 4, the time authentication unit 305 determines whether or not the response message is normal. If the response message is normal, the time stamp in the response message is determined. The token and its signature value are added to the header part of the e-mail. Note that the storage location of the time stamp token etc. is not limited to the header part, but may be the non-signature attribute area of the electronic signature data! /.
[0060] 電子メール再構成部 306は、時刻認証部 305からタイムスタンプが付加された再構 成後の添付ファイル付電子メールを受け取ると、その電子メールを通信部 31を通し てメールサーバ 2に出力する。なお、添付ファイル付電子メールであっても、電子メー ルの本文にのみ電子署名を付与してもよい。この場合、電子署名部 304は、メール サーバ 2から受信した電子メールにおける電子署名の有無を判別し、無い場合に、 電子メールに電子署名を付与してもよレ、。 [0060] Upon receipt of the reconstructed attached email with the time stamp added from the time authentication unit 305, the email reconstruction unit 306 sends the email to the mail server 2 via the communication unit 31. Output. Note that an electronic signature may be attached only to the body of an email even if it is an email with an attached file. In this case, the electronic signature unit 304 determines whether or not an electronic signature is received in the electronic mail received from the mail server 2, and if there is no electronic signature, the electronic signature may be added to the electronic mail.
[0061] 次に、上記構成を有するタイムスタンプ付加装置 3が、メールサーバ 2から受信した 電子メール及び添付ファイル付電子メールにタイムスタンプを付加する「タイムスタン プ付加処理」を説明する。このタイムスタンプ付加処理は、タイムスタンプ付加装置 3 の通信部 31が、メールサーバ 2から送信先へ送信される前の電子メールを受信する と開始される。なお、以下の例では、タイムスタンプ付加装置 3が受信したメールは、 ユーザ端末 1によって作成された電子メールであるものとする。 Next, a “time stamp addition process” in which the time stamp adding apparatus 3 having the above-described configuration adds a time stamp to the email received from the mail server 2 and the email with the attached file will be described. This time stamp addition processing is started when the communication unit 31 of the time stamp addition device 3 receives an e-mail before being transmitted from the mail server 2 to the transmission destination. In the following example, it is assumed that the mail received by the time stamp adding device 3 is an electronic mail created by the user terminal 1.
[0062] 図 5に示すように、先ず、添付ファイル存在判別部 301が、通信部 31で受信した電 子メールにファイルが添付されているか否かを判別する(ステップ S 101)。 As shown in FIG. 5, first, the attachment file existence determination unit 301 determines whether or not a file is attached to the electronic mail received by the communication unit 31 (step S 101).
[0063] 電子メールにファイルが添付されていなければ(ステップ S 101; No)、電子メール 本文に電子署名及び時刻認証を施すために、制御部 30は処理をステップ S109に 移す。添付されていれば (ステップ S 101 ;Yes)、添付ファイル存在判別部 301は、 電子メールに添付されて!/、る添付ファイルと電子メール本文とを分離し、添付フアイ ルをその電子メールから抽出する(ステップ S102)。 [0063] If no file is attached to the e-mail (step S101; No), the control unit 30 moves the process to step S109 in order to apply an electronic signature and time authentication to the e-mail body. If it is attached (step S 101; Yes), the attached file existence determination unit 301 separates the attached file and the body of the email attached to the email! /, And removes the attached file from the email. Extract (step S102).
[0064] 続いて、フォーマット判別部 302が、その抽出されたファイルがタイムスタンプ付加 用フォーマット Faであるか否かを判別する(ステップ S103)。 [0064] Subsequently, the format determination unit 302 adds a time stamp to the extracted file. It is determined whether or not the format is for use Fa (step S103).
タイムスタンプ付加用フォーマット Faであれば(ステップ S103 ; Yes)、処理はステツ プ S104をスキップし、ステップ S 105に進む。 If it is the time stamp addition format Fa (step S103; Yes), the process skips step S104 and proceeds to step S105.
[0065] 一方、添付ファイルがタイムスタンプ付加用フォーマット Faでなければ (ステップ S1 03 ; No)、フォーマット変換部 303は、変換フォーマット情報 321に基づいて、その添 付ファイルのフォーマットをタイムスタンプ付加用フォーマット Faに変換する(ステップ S 104)。そして、制御部 30は処理をステップ S105に移す。 [0065] On the other hand, if the attached file is not the time stamp addition format Fa (step S1 03; No), the format conversion unit 303 sets the format of the attached file for time stamp addition based on the conversion format information 321. Convert to format Fa (step S104). Then, the control unit 30 moves the process to step S105.
[0066] 続!/、て、添付ファイルに電子署名を付加するために、電子署名部 304がファイル電 子署名処理を実行する(ステップ S105)。図 6に示すように、ファイル電子署名処理 では、先ず、電子署名部 304が、添付ファイルに電子署名が既に付加されているか 否かを判別する(ステップ S201)。既に付与されていれば (ステップ S201; Yes)、制 御部 30はそのままファイル電子署名処理を終了し、処理は図 5にリターンする。 [0066] To add an electronic signature to the attached file, the electronic signature unit 304 executes a file electronic signature process (step S105). As shown in FIG. 6, in the file electronic signature process, first, the electronic signature unit 304 determines whether or not an electronic signature has already been added to the attached file (step S201). If it has already been assigned (step S201; Yes), the control unit 30 ends the file digital signature process as it is, and the process returns to FIG.
[0067] 一方、電子署名が付加されていなければ (ステップ S201 ; No)、電子署名部 304 は、秘密鍵管理情報 322に記憶されているユーザ端末 1のユーザの秘密鍵を用いて 添付ファイルの署名値を生成し、その署名値を電子署名としてファイルに付加する( ステップ S202)。付加後、処理は図 5にリターンする。 On the other hand, if the electronic signature is not added (step S201; No), the electronic signature unit 304 uses the user's private key stored in the private key management information 322 to store the attached file. A signature value is generated, and the signature value is added to the file as an electronic signature (step S202). After the addition, the process returns to FIG.
[0068] ファイル電子署名処理の終了後、ファイルにタイムスタンプを付加するために、時刻 認証部 305は図 7に示すファイル時刻認証処理を実行する(ステップ S 106)。このフ アイル時刻認証処理では、図 7に示すように、先ず、時刻認証部 305が、添付フアイ ルに付加された署名値を対象とするタイムスタンプ要求用ハッシュ値を生成する(ス テツプ S301)。 [0068] After the file digital signature process is completed, the time authentication unit 305 executes the file time authentication process shown in FIG. 7 in order to add a time stamp to the file (step S106). In this file time authentication process, as shown in FIG. 7, first, the time authentication unit 305 generates a time stamp request hash value for the signature value added to the attached file (step S301). .
[0069] 次に、時刻認証部 305は、図 4Bで示したタイムスタンプ要求用ハッシュ値を含めた タイムスタンプ要求メッセージを生成し(ステップ S302)、そのタイムスタンプ要求メッ セージを、通信部 31を介して TSAサーバ 4に送信する(ステップ S303)。 [0069] Next, the time authentication unit 305 generates a time stamp request message including the hash value for time stamp request shown in FIG. 4B (step S302), and sends the time stamp request message to the communication unit 31. To the TSA server 4 (step S303).
[0070] 時刻認証部 305は、送信したタイムスタンプ要求メッセージに対する応答メッセージ を、通信部 31を介して TSAサーバ 4から受信したか否かを判別する(ステップ S304) 。応答メッセージを受信していなければ (ステップ S304 ; No)、応答メッセージを受信 するまで時刻認証部 305は待機する。 [0071] 応答メッセージを受信していれば(ステップ S304 ; Yes)、時刻認証部 305は、その 応答メッセージに含まれているタイムスタンプ(タイムスタンプトークン及びその署名値 )が正常か否かを判別する(ステップ S305)。 [0070] Time authentication unit 305 determines whether or not a response message to the transmitted time stamp request message has been received from TSA server 4 via communication unit 31 (step S304). If the response message has not been received (step S304; No), the time authentication unit 305 waits until the response message is received. [0071] If the response message has been received (step S304; Yes), the time authentication unit 305 determines whether the time stamp (time stamp token and its signature value) included in the response message is normal or not. (Step S305).
[0072] タイムスタンプが正常でなければ(ステップ S305 ; No)、処理はステップ S303にリ ターンし、時刻認証部 305は、再度、タイムスタンプ要求メッセージを TSAサーバ 4に 送信する。なお、ステップ S305においてタイムスタンプが正常でないと判別された回 数が所定値に達したときに、タイムスタンプ付加装置 3からユーザ端末 1やメールサ ーバ 2にエラーを通知し、タイムスタンプ付加処理を終了するようにしてもよい。 If the time stamp is not normal (step S 305; No), the process returns to step S 303, and the time authentication unit 305 transmits the time stamp request message to the TSA server 4 again. When the number of times that the time stamp is determined to be not normal in step S305 reaches a predetermined value, the time stamp adding device 3 notifies the user terminal 1 and the mail server 2 of an error, and the time stamp adding process is performed. You may make it complete | finish.
[0073] タイムスタンプが正常であれば(ステップ S305 ; Yes)、時刻認証部 305は、 TSAサ ーバ 4から通信部 31を介して取得したタイムスタンプを添付ファイルに付加する(ステ ップ S306)。そして、制御部 30はファイル時刻認証処理を終了し、処理は図 5にリタ ーンする。 [0073] If the time stamp is normal (step S305; Yes), the time authentication unit 305 adds the time stamp acquired from the TSA server 4 via the communication unit 31 to the attached file (step S306). ). Then, the control unit 30 ends the file time authentication process, and the process returns to FIG.
[0074] 続いて、制御部 30は、図 5に示すように、ステップ S102で電子メール力も抽出され たすベての添付ファイルにタイムスタンプが付加されたか否かを判別する(ステップ S 107)。すべてのファイルにタイムスタンプが付加されていなければ(ステップ S 107 ; No)、制御部 30は、処理をステップ S103に戻し、タイムスタンプが付加されていない 各ファイルを対象としてステップ S103〜S 106の処理を実行する。 Subsequently, as shown in FIG. 5, the control unit 30 determines whether or not a time stamp has been added to all the attached files whose e-mail power is also extracted in step S102 (step S107). . If time stamps are not added to all the files (step S107; No), the control unit 30 returns the process to step S103, and performs steps S103 to S106 for each file to which no time stamp is added. Execute the process.
[0075] すべてのファイルにタイムスタンプが付加されると(ステップ S107 ; Yes)、電子メー ル再構成部 306は、タイムスタンプが付加されたすベてのファイルを、ステップ S102 にお!/、て添付ファイルと一旦分離された電子メールに再度添付し、新たな添付フアイ ル付電子メールを再構成する(ステップ S 108)。 [0075] When time stamps are added to all files (step S107; Yes), the e-mail reconstruction unit 306 adds all files with time stamps to step S102! /, Then, it is attached again to the email once separated from the attached file, and a new email with the attached file is reconstructed (step S108).
[0076] 続いて、再構成された新たな添付ファイル付電子メール全体に電子署名を付与す るために、電子署名部 304は、図 6で示したファイル電子署名処理と実質的に同一の 図 5の電子メール電子署名処理 (ステップ S 109)を実行する。 Subsequently, in order to give an electronic signature to the entire newly reconstructed electronic mail with attached file, the electronic signature unit 304 is substantially the same as the file electronic signature process shown in FIG. The electronic mail electronic signature process (step S109) of 5 is executed.
[0077] なお、添付ファイルに付与されたタイムスタンプを含めた電子メールの全体を対象と して電子署名を施す場合には、電子メールに電子署名が付加済みであったとしても( 図 6のステップ S201において Yes)、付加済みの電子署名は、添付ファイルのタイム スタンプを含めた電子メールに対するものではない。そのため、処理は図 6のステツ プ S202に進み、電子署名部 304は、添付ファイルのタイムスタンプを含めた電子メ ールの全体に対する新たな署名値を生成し、電子メールに付加する。 [0077] When an electronic signature is applied to the entire email including the time stamp attached to the attached file, even if the electronic signature has already been added to the email (see Fig. 6). In step S201, Yes), the added electronic signature is not for an e-mail including the time stamp of the attached file. Therefore, the process is as shown in Figure 6. In step S202, the electronic signature unit 304 generates a new signature value for the entire electronic mail including the time stamp of the attached file and adds it to the electronic mail.
[0078] 電子メール電子署名処理が終了すると、電子メールにタイムスタンプを付加するた めに、時刻認証部 305が、図 7で示したファイル時刻認証処理と実質的に同一の図 5 の電子メール時刻認証処理 (ステップ S110)を行う。すなわち、時刻認証部 305は、 署名値が付与された添付ファイル付電子メールに、その署名値に基づいて TSAサ ーバ 4で発行されたタイムスタンプを付与する。これにより、各添付ファイルと、各添付 ファイルを含む電子メール全体とに、認証時刻情報が付加される。 [0078] When the electronic signature processing is completed, the time authentication unit 305 performs substantially the same processing as that of the file time authentication processing shown in FIG. 7 in order to add a time stamp to the email. Time authentication processing (step S110) is performed. In other words, the time authentication unit 305 attaches the time stamp issued by the TSA server 4 to the attached email with attached signature value based on the signature value. As a result, the authentication time information is added to each attached file and the entire electronic mail including each attached file.
[0079] 制御部 30は、この電子署名及び認証時刻が付与された電子メールを、通信部 31 を介して、メールサーバ 2に送信する(ステップ S111)。以上により、このタイムスタン プ付加処理が終了する。 The control unit 30 transmits the electronic mail to which the electronic signature and the authentication time are given to the mail server 2 via the communication unit 31 (Step S111). The time stamp addition process is thus completed.
[0080] 次に、前述したタイムスタンプ付加処理によりタイムスタンプが付与された電子メー ルの送信先(電子メールの受信側の PC等)で行われるファイルタイムスタンプ検証処 理を説明する。 Next, a description will be given of the file time stamp verification process performed at the e-mail transmission destination (PC or the like on the e-mail receiving side) to which the time stamp is given by the time stamp addition process described above.
[0081] このファイルタイムスタンプ検証処理は、例えば、添付ファイル付電子メールを受信 したユーザが、添付ファイルを電子メールから分離してファイル保存 PCに保存してい る場合に、そのファイル保存 PCの操作によりファイルのタイムスタンプを検証の実行 を指示することにより開始される。 [0081] This file time stamp verification process is performed, for example, when a user who receives an e-mail with an attached file separates the attached file from the e-mail and saves it on the file saving PC. To start verifying the time stamp of the file.
[0082] 図 8に示すように、ファイル保存 PCは、先ず、添付ファイル内の付加情報領域に記 録されているタイムスタンプを読み出す(ステップ S401)。これにより、ファイル保存 P Cは、そのタイムスタンプに格納されて!/、る「タイムスタンプトークン」と「タイムスタンプ トークンの署名値」とを取得する。 As shown in FIG. 8, the file storage PC first reads the time stamp recorded in the additional information area in the attached file (step S401). As a result, the file saving PC obtains the “time stamp token” and “signature value of the time stamp token” stored in the time stamp.
[0083] 取得後、ファイル保存 PCはタイムスタンプトークンの改ざんの有無を判別する(ステ ップ S402)。改ざんの有無を判別するための手法は任意である力 例えば、取得し た署名値を TSAサーバ 4の公開鍵で復号した値と、取得したタイムスタンプトークン 力、ら所定のハッシュ関数を使用して求めたハッシュ値と、の比較により判別可能であ る。これらの値が一致しなければ、タイムスタンプトークンが改ざんされていると判別し (ステップ S402 ; No)、タイムスタンプが無効である旨をユーザに報知するために処 理 (まステップ S409iこ進む。 [0083] After the acquisition, the file storage PC determines whether the time stamp token has been tampered with (step S402). The method for determining the presence or absence of tampering is arbitrary. For example, a value obtained by decrypting the obtained signature value with the public key of the TSA server 4, the obtained time stamp token force, and a predetermined hash function are used. This can be determined by comparing the obtained hash value. If these values do not match, it is determined that the time stamp token has been tampered with (step S402; No), and processing is performed to notify the user that the time stamp is invalid. Reason (Ma step S409i proceed.
[0084] これらの値が一致すれば、ファイル保存 PCは、そのタイムスタンプトークンが改ざん されていない正規のトークンであると判別する(ステップ S402 ; Yes)。この場合、タイ ムスタンプトークンに含まれているハッシュ値を読み出すことで、タイムスタンプからハ ッシュ値を抽出する(ステップ S403)。 [0084] If these values match, the file storage PC determines that the time stamp token is a legitimate token that has not been tampered with (step S402; Yes). In this case, the hash value contained in the time stamp token is read to extract the hash value from the time stamp (step S403).
[0085] 次に、ファイル保存 PCは、添付ファイルに付加されて!/、るその添付ファイルの署名 値を読み出し、タイムスタンプ付加装置 3が使用したハッシュ関数と同一のハッシュ関 数を用いて、ファイルの署名値のハッシュ値を生成する(ステップ S404)。生成後、フ アイル保存 PCは、この生成したハッシュ値と、ステップ S403でタイムスタンプから抽 出されたハッシュ値と、が互いに一致するか否かを判別する(ステップ S405)。ハツシ ュ値が互いに一致しなければ (ステップ S405 ; No)、タイムスタンプが無効である旨 をユーザに報知するために処理はステップ S409に進む。 [0085] Next, the file storage PC reads the signature value of the attached file attached to the attached file! /, And uses the same hash function as the hash function used by the time stamp adding device 3, A hash value of the signature value of the file is generated (step S404). After the generation, the file storage PC determines whether or not the generated hash value matches the hash value extracted from the time stamp in step S403 (step S405). If the hash values do not match each other (step S405; No), the process proceeds to step S409 to notify the user that the time stamp is invalid.
[0086] 各ハッシュ値が互いに一致すれば(ステップ S405 ; Yes)、タイムスタンプが正常に 検出されたものとみなされ、ファイル保存 PCは、次に、ファイルの電子署名の検証を 行う(ステップ S406)。ファイル保存 PCは、例えば、電子証明書の有効性を確認して 添付ファイルの改ざんの有無を判別する(ステップ S407)。改ざんがなければ (ステツ プ S407 ;Yes)、ファイルの送信日時証明がなされたものとして、ファイル保存 PCは、 タイムスタンプが有効である旨をユーザに報知し(ステップ S408)、処理を終える。 [0086] If the hash values match each other (step S405; Yes), it is considered that the time stamp has been detected normally, and then the file storage PC verifies the electronic signature of the file (step S406). ). For example, the file storage PC confirms the validity of the electronic certificate and determines whether the attached file has been tampered with (step S407). If there is no tampering (step S407; Yes), the file storage PC notifies the user that the time stamp is valid (step S408), and the processing ends, assuming that the file transmission date / time has been proved.
[0087] 一方、添付ファイルの改ざんがあれば(ステップ S407 ; No)、ファイルの送信日時 証明がなされなかったものとして、ファイル保存 PCは、タイムスタンプが無効である旨 をユーザに報知し(ステップ S409)、ファイルタイムスタンプ検証処理を終える。なお 、このファイルタイムスタンプ検証処理は、添付ファイルに付与されたタイムスタンプの 改ざんの有無を判別する前に、添付ファイルに付与された電子署名を検証するもの であってもよい。 [0087] On the other hand, if the attached file has been tampered with (step S407; No), the file storage date / time PC notifies the user that the time stamp is invalid (step S407; No). S409), the file time stamp verification process is completed. Note that this file time stamp verification processing may verify the electronic signature attached to the attached file before determining whether the time stamp attached to the attached file has been tampered with.
[0088] なお、前述したタイムスタンプ付加処理によりタイムスタンプが付与された添付フアイ ル付電子メールの受信側(ファイル保存 PC)では、添付ファイルと電子メール本文と を分離する前に、添付ファイルを含めた電子メール全体に付加されて!、るタイムスタ ンプを検証する。この検証は、図 8で示したファイルタイムスタンプ検証処理と実質的 に同一の処理を電子メールに適用することで実行可能である。以下、このような動作 を行うための電子メールタイムスタンプ検証処理を説明する。 [0088] Note that the receiving side (file saving PC) of the attached file-attached e-mail to which the time stamp is added by the time stamp adding process described above, attaches the attached file before separating the attached file from the e-mail body. It is added to the entire email including it! This verification is substantially equivalent to the file time stamp verification process shown in Figure 8. This can be executed by applying the same process to e-mail. In the following, an e-mail time stamp verification process for performing such an operation will be described.
[0089] 図 8に示すように、ファイル保存 PCは、電子メールを受信すると、電子メールの所定 箇所 (例えば、ヘッダ部)に文字列データにエンコードされた状態で記述されているタ ィムスタンプを読み出す (ステップ S401)。なお、電子署名データが電子メールに連 結されてレ、る場合には、電子署名データの非署名属性領域に格納されてレ、るタイム スタンプを読み出せばよい。 [0089] As shown in FIG. 8, when the file storage PC receives the e-mail, it reads a time stamp described in a state encoded in character string data at a predetermined location (for example, a header portion) of the e-mail. (Step S401). When the electronic signature data is linked to the electronic mail, the time stamp stored in the non-signature attribute area of the electronic signature data may be read.
[0090] 続いて、ファイル保存 PCは、読み出されたタイムスタンプ(エンコードされた文字列 データ)を所定の方式(例えば、 BASE64等)でデコードし、タイムスタンプトークン及 びその署名値を取得する。さらに、ファイル保存 PCは、このタイムスタンプトークンの 改ざんの有無を検証し、タイムスタンプトークンが正規のものであるか否かを判別する (ステップ S402)。 [0090] Subsequently, the file storage PC decodes the read time stamp (encoded character string data) by a predetermined method (for example, BASE64), and acquires the time stamp token and its signature value. Further, the file storage PC verifies whether or not the time stamp token has been tampered with, and determines whether or not the time stamp token is genuine (step S402).
[0091] 以後、ファイルタイムスタンプ検証処理のステップ S404〜S409の処理と実質的に 同一の処理により、ファイル保存 PCは、添付ファイルを含む電子メールの全体に付 カロされたタイムスタンプの有効性を判別する。なお、ステップ S407において、フアイ ノレ保存 PCは、例えば、電子証明書の有効性の検証結果に基づいて、電子メール全 体の改ざん有無等を判別する。また、ステップ S408では、ファイル保存 PCは、電子 署名の検証結果に基づき、電子メール全体に改ざんが無いか否かを判別する。 [0091] Thereafter, the file saving PC confirms the validity of the time stamp attached to the entire e-mail including the attached file by substantially the same processing as that in steps S404 to S409 of the file time stamp verification processing. Determine. In step S407, the file storage PC determines, for example, whether or not the entire electronic mail has been tampered with based on the verification result of the validity of the electronic certificate. In step S408, the file storage PC determines whether or not the entire electronic mail has been falsified based on the verification result of the electronic signature.
[0092] これにより、添付ファイル付電子メール全体の送信日時や原本性の保証のみならず 、その電子メールに添付された個々の添付ファイルの原本性もそれぞれ保証できる。 そして、添付ファイル付電子メールの受信者は、添付ファイルの原本性が維持された 状態でその添付ファイルを電子メールと分離し、保存又は流通させることができる。 Thus, not only the transmission date and time and the originality of the entire electronic mail with attached file but also the originality of each attached file attached to the electronic mail can be guaranteed. The recipient of the email with the attached file can separate the attached file from the email and store or distribute it while maintaining the originality of the attached file.
[0093] 以上説明したように、本発明の実施形態 1によれば、タイムスタンプ付加装置 3は、 第三者機関である時刻認証事業者 (その事業者の下で時刻認証局として機能する T SAサーバ 4)により発行されたタイムスタンプを電子メールの各添付ファイルにそれ ぞれ付加する。これにより、その添付ファイルが添付された電子メールの受信側にお V、て電子メールと添付ファイルとがそれぞれ異なる格納先に格納された場合でも、添 付ファイルに付与されたタイムスタンプから信頼性の高い送信時刻を容易に取得可 能となる。 [0093] As described above, according to the first embodiment of the present invention, the time stamp adding device 3 is a time certification business operator (T that functions as a time certification authority under that business operator). The time stamp issued by the SA server 4) is added to each attached file of the e-mail. As a result, even if the e-mail and attached file are stored in different storage locations on the receiving side of the e-mail to which the attached file is attached, the reliability is determined from the time stamp given to the attached file. Easily obtain a high transmission time It becomes ability.
[0094] また、実施形態 1によれば、時刻認証部 305は、 TSAサーバ 4から取得したタイムス タンプ内の署名値を復号して得られたタイムスタンプトークンのハッシュ値と、所定の ハッシュ関数を用いて自ら求めたタイムスタンプトークンのハッシュ値と、を照合するこ とで、タイムスタンプの改ざんの有無を判別する。そして、改ざんがない場合に、添付 ファイルにタイムスタンプを付与する。これにより、この添付ファイルの非改ざん性を確 保すること力 S可倉 となる。 Further, according to the first embodiment, the time authentication unit 305 obtains the hash value of the time stamp token obtained by decrypting the signature value in the time stamp acquired from the TSA server 4 and a predetermined hash function. By comparing the hash value of the time stamp token obtained by itself with the hash value, it is determined whether the time stamp has been tampered with. If there is no alteration, a time stamp is attached to the attached file. As a result, it is possible to secure the non-falsification of this attached file.
さらに、実施形態 1によれば、時刻認証部 305は、タイムスタンプをファイルの付加 情報領域に格納する。これにより、添付ファイルのメインデータ領域に格納されたデ ータに基づいて実行される各種処理に影響を及ぼすことがなくなり、既存のアプリケ ーシヨンプログラムとの整合を保つことも可能である。 Furthermore, according to the first embodiment, the time authentication unit 305 stores the time stamp in the additional information area of the file. As a result, the various processes executed based on the data stored in the main data area of the attached file are not affected, and it is possible to maintain consistency with the existing application program.
[0095] なお、本発明に係るタイムスタンプ付加装置は、上記実施の形態に限定されるもの ではなぐ本発明の要旨を逸脱しない範囲で種々の変更が可能である。例えば、認 証された時刻の情報を示す時刻証明書として機能する「タイムスタンプ」は、添付ファ ィルの付加情報領域に記録されるに限らず、時刻証明書を添付ファイルに連結する ようにしてもよい。 It should be noted that the time stamp adding apparatus according to the present invention can be variously modified without departing from the gist of the present invention, which is not limited to the above embodiment. For example, a “time stamp” that functions as a time certificate indicating the information of the authenticated time is not limited to being recorded in the additional information area of the attached file, but the time certificate is linked to the attached file. May be.
[0096] (実施形態 2) [0096] (Embodiment 2)
前述した実施形態 1では、 TSAサーバ 4により生成されたタイムスタンプをタイムス タンプ付加装置 3が添付ファイルに付与した。しかし、タイムスタンプ付加装置 3が、 時刻証明書を記録した時刻証明ファイルを新たに生成し、この時刻証明ファイルを添 付ファイルと共に送信予定の電子メール本文に添付してもよい。以下、このような動 作を行う実施形態 2のタイムスタンプ付加装置 3を説明する。 In the first embodiment described above, the time stamp adding device 3 attaches the time stamp generated by the TSA server 4 to the attached file. However, the time stamp adding device 3 may newly generate a time proof file in which the time certificate is recorded, and attach this time proof file together with the attached file to the email text to be transmitted. Hereinafter, the time stamp adding apparatus 3 according to the second embodiment for performing such an operation will be described.
[0097] 実施形態 2にお!/、ては、時亥 IJ認証部 305は、時刻値(時刻情報)と、添付ファイルの ハッシュ値(タイムスタンプ要求用ハッシュ値)と、時刻署名(タイムスタンプトークンの 署名値)と、を含む「時刻証明書 (タイムスタンプ)」を、通信部 31を介して TSAサー バ 4から取得する。取得後、時刻認証部 305は、その時刻証明書が示す認証時刻情 報を含んだ時刻証明ファイルを生成する。 [0097] In Embodiment 2, the time / time IJ authentication unit 305 includes a time value (time information), a hash value of the attached file (hash value for time stamp request), and a time signature (time stamp). A “time certificate (time stamp)” including the token signature value) is acquired from the TSA server 4 via the communication unit 31. After the acquisition, the time authentication unit 305 generates a time certification file including the authentication time information indicated by the time certificate.
[0098] さらに、時刻認証部 305は、その時刻証明ファイルの拡張子を除くファイル名を、時 刻証明の対象である添付ファイルの拡張子を除くファイル名と同一に設定すると共に 、その添付ファイルの拡張子を時刻証明ファイルであることを示す拡張子に設定する[0098] Further, the time authentication unit 305 uses the file name excluding the extension of the time certification file as the time Set the file name to be the same as the file name excluding the extension of the attached file that is subject to certification, and set the extension of the attached file to an extension that indicates that it is a time certification file
。電子メール再構成部 306は、添付ファイルを電子メールに添付し直して再構成する 際に、添付ファイルに対応する時刻証明ファイルも併せて電子メールに添付する。 . When the e-mail reconstruction unit 306 reattaches the attached file to the e-mail and reconfigures it, the e-mail reconstructing unit 306 also attaches the time certification file corresponding to the attached file to the e-mail.
[0099] 実施形態 2のタイムスタンプ付加装置 3の電子メール再構成部 306で再構成された 電子メールのデータ構造を説明する。実施形態 2における電子メール再構成部 306 は、図 9Aに示すように、電子メールに、添付ファイルと時刻証明ファイルとを添付す る。図 9A中の拡張子 tstは、その拡張子 tstが付与されたファイルが時刻証明ファイル であることを示すための拡張子である。また、図 9Aの添付ファイル fflea.xxxに対応す る時刻証明ファイルがファイル fflea.tstであり、添付ファイル ffleb.yyyに対応する時刻 証明ファイルがファイル ffleb.tstであること力 拡張子を除く各添付ファイルのファイル 名から特定可能である。 The data structure of the email reconstructed by the email reconstruction unit 306 of the time stamp adding device 3 of Embodiment 2 will be described. As shown in FIG. 9A, the e-mail reconstruction unit 306 in the second embodiment attaches the attached file and the time certification file to the e-mail. The extension tst in Fig. 9A is an extension to indicate that the file with the extension tst is a time certification file. Also, the time proof file corresponding to the attached file fflea.xxx in Fig. 9A is the file fflea.tst, and the time proof file corresponding to the attached file ffleb.yyy is the file ffleb.tst. It can be identified from the file name of the attached file.
[0100] 添付ファイル及び時刻証明ファイル付きの電子メールを受信したファイル保存 PC は、添付ファイルが電子メールから分離されて保存される際に、拡張子を除くファイル 名に基づき添付ファイルに対応する時刻証明ファイルを特定し、時刻証明ファイルも 添付ファイルと併せて保存する。そして、ファイル保存 PCは添付ファイルのタイムスタ ンプを検証する場合、その添付ファイルに対応する時刻証明ファイルに記録されて [0100] The file storage PC that received the e-mail with the attached file and the time certificate file, when the attached file is saved separately from the e-mail, the time corresponding to the attached file based on the file name excluding the extension Identify the certification file and save the time certification file along with the attached file. When the file storage PC verifies the time stamp of the attached file, it is recorded in the time certification file corresponding to the attached file.
V、る情報に基づ!/、てタイムスタンプ検証処理を行う。 V, based on the information! / And time stamp verification processing.
[0101] 実施形態 2によれば、添付ファイルに既に電子署名が付加されている場合、その添 付ファイルにレ、かなるデータも付加することなぐ添付ファイルの時刻認証が可能で ある。このため、添付ファイルのファイルフォーマットに関わらず、添付ファイルにタイ ムスタンプを付加することができる。 [0101] According to the second embodiment, when an electronic signature has already been added to the attached file, it is possible to perform time authentication of the attached file without adding any data to the attached file. For this reason, a time stamp can be added to an attached file regardless of the file format of the attached file.
これにより、図 3で示したフォーマット判別部 302、フォーマット変換部 303、変換フ ォーマット情報 321を設ける必要がなくなり、タイムスタンプ付加装置 3の構成をより簡 単な構成にできる。なお、電子署名部 304で添付ファイルに電子署名を新たに付加 する場合、電子署名データを時刻証明ファイルに併せて記録するようにしてもよい。 As a result, it is not necessary to provide the format discriminating unit 302, the format converting unit 303, and the conversion format information 321 shown in FIG. 3, and the configuration of the time stamp adding device 3 can be simplified. When the electronic signature unit 304 adds a new electronic signature to the attached file, the electronic signature data may be recorded together with the time certification file.
[0102] また、実施形態 2においては、図 9Bに示すように、添付ファイルとその添付フアイノレ の時刻を証明する時刻証明ファイルとを関連付けるための関連付ファイルを作成し、 電子メールに添付するようにしてもよい。この場合、時刻証明ファイルに付与するファ ィル名は任意でよい。 [0102] Also, in the second embodiment, as shown in Fig. 9B, an associated file for associating the attached file with a time proof file that proves the time of the attached file is created. You may make it attach to an email. In this case, the file name assigned to the time certification file may be arbitrary.
[0103] また、関連付ファイルを作成せずに、添付ファイルと時刻証明ファイルとを対応付け る対応情報を、電子メールのヘッダに記述するようにしてもょレ、。 [0103] Further, instead of creating an associated file, the correspondence information for associating the attached file with the time certification file may be described in the header of the e-mail.
[0104] (実施形態 3) [Embodiment 3]
添付ファイルのフォーマットに応じて、前述した各実施形態 1、 2で説明したタイムス タンプ付加装置の動作を使い分けるようにしてもよい。例えば、添付ファイルのフォー マット毎に、タイムスタンプを付加する方法を示したルールをあらかじめ指定しておく 。例えば、実施形態 1のようにフォーマット変換して添付ファイル内にタイムスタンプを 付与するか、実施形態 2のようにフォーマット変換せずにタイムスタンプが記録された 時刻証明ファイルを添付ファイルに関連付ける力、、等のルールを、各フォーマット毎 に定めておく。そして、このルールに基づいて、添付ファイルにタイムスタンプを付加 する。 Depending on the format of the attached file, the operation of the time stamp adding device described in the first and second embodiments may be used properly. For example, a rule indicating how to add a time stamp is specified in advance for each format of the attached file. For example, the ability to convert the format and attach a time stamp in the attached file as in Embodiment 1, or the ability to associate the time certification file in which the time stamp was recorded without converting the format as in Embodiment 2; Rules such as, etc. are established for each format. Based on this rule, a time stamp is added to the attached file.
[0105] 以下、あらかじめ指定されたルールに基づいてタイムスタンプ付加動作を選択する 本発明の実施形態 3に係るタイムスタンプ付加装置について説明する。 Hereinafter, a time stamp adding apparatus according to Embodiment 3 of the present invention that selects a time stamp adding operation based on a rule designated in advance will be described.
[0106] 先ず、実施形態 3のタイムスタンプ付加装置 3の内部構成を説明する。このタイムス タンプ付加装置 3は、図 10に示すように、実施形態 1及び 2で説明した図 3の例と基 本的に同一である。ただし、実施形態 3では、制御部 30は、タイムスタンプ付加ルー ル指定部 307を備えている。また、実施形態 3の記憶部 32は、変換フォーマット情報 321に代えてタイムスタンプ付加情報 323を格納して!/、る。 First, the internal configuration of the time stamp adding apparatus 3 according to the third embodiment will be described. As shown in FIG. 10, the time stamp adding apparatus 3 is basically the same as the example of FIG. 3 described in the first and second embodiments. However, in the third embodiment, the control unit 30 includes a time stamp addition rule specifying unit 307. Further, the storage unit 32 of the third embodiment stores time stamp additional information 323 instead of the conversion format information 321.
[0107] タイムスタンプ付加情報 323は、ファイルフォーマットとタイムスタンプを付加する方 法を示すタイムスタンプ付加ルールとを関連付ける。タイムスタンプ付加ルール指定 部 307は、フォーマット判別部 302によって添付ファイルのフォーマットが判別される と、判別されたフォーマットに関連付けられているタイムスタンプ付加ルールをタイム スタンプ付加情報 323から読み出し、添付ファイルに適用する。 [0107] Time stamp addition information 323 associates a file format with a time stamp addition rule indicating a method of adding a time stamp. When the format determination unit 302 determines the format of the attached file, the time stamp addition rule specifying unit 307 reads the time stamp addition rule associated with the determined format from the time stamp addition information 323 and applies it to the attached file. To do.
[0108] 図 11に示すように、このタイムスタンプ付加情報 323は、ファイルフォーマット毎に、 そのフォーマットの添付ファイルに適用されるタイムスタンプ付加ルールを記憶する。 As shown in FIG. 11, this time stamp addition information 323 stores, for each file format, a time stamp addition rule applied to an attached file in that format.
[0109] 図 11の例では、添付ファイルがテキストファイルの場合、ファイルのテキストデータ 力 SPDFファイル (Adobe Acrobat (登録商標)のファイル)に自動的に変換され、タイム スタンプを付加可能な変換後の PDFファイル内にタイムスタンプが付加される。なお 、添付ファイルが元々タイムスタンプ付加可能な PDFファイルであれば、フォーマット 変換が施されることなくそのまま PDFファイル内にタイムスタンプが付加される。 [0109] In the example of Fig. 11, if the attached file is a text file, the text data of the file Force A time stamp is added to the converted PDF file that can be automatically converted to an SPDF file (Adobe Acrobat (registered trademark) file) and a time stamp can be added. If the attached file is originally a PDF file to which a time stamp can be added, the time stamp is added to the PDF file without any format conversion.
[0110] また、図 11の例では、添付ファイルが WORDファイル (Microsoft Word (登録商標) のファイル)の場合、タイムスタンプを示す時刻証明ファイルが生成され、電子メール に添付される。企業内で電子保管されるファイルのフォーマットが WORDファイルに 統一されているような場合、社内向けの電子メールに添付されている WORDファイル 力 SPDFファイルに自動変換されてしまうと、電子保管の際に再変換する必要が生じ、 面倒である。そこで、社内ルールを優先するために、添付ファイルが WORDフアイノレ の場合には、フォーマット変換することなく時刻証明ファイルを作成し、その時刻証明 ファイルを WORDファイルと共に電子メールに添付する。 In the example of FIG. 11, when the attached file is a WORD file (Microsoft Word (registered trademark) file), a time proof file indicating a time stamp is generated and attached to the e-mail. If the format of files stored electronically in a company is standardized as WORD files, if they are automatically converted to WORD file power SPDF files attached to in-house e-mails, There is a need to reconvert, which is cumbersome. Therefore, in order to prioritize internal rules, if the attached file is a WORD file, create a time certificate file without converting the format, and attach the time certificate file to the e-mail along with the WORD file.
[0111] さらに、図 11の例では、添付ファイルが電子メールメッセージファイルである場合、 そのメッセージファイルの本文力 SPDFファイルに変換され、変換後の PDFファイル内 にタイムスタンプが付加される。つまり、電子メールの添付ファイルとして別の電子メ ールが添付されている場合、添付ファイルの流通性を考慮して、添付されたメッセ一 ジファイルの本文のみを PDFファイルに変換した上で時刻認証を行う。 Further, in the example of FIG. 11, when the attached file is an e-mail message file, it is converted to the SPDF file with the body of the message file, and a time stamp is added to the converted PDF file. In other words, when another e-mail is attached as an e-mail attachment, the message is converted to a PDF file by converting only the body of the attached message file in consideration of the distribution of the attached file. Authenticate.
[0112] 図 11の例では、添付ファイルが CAD (Computer Aided Design)データファイルであ る場合、タイムスタンプを示す時刻証明ファイルが作成され、電子メールに添付され る。 CADデータファイルが PDFファイルに変換されると、画像精度の低下を招くおそ れゃ、修正作業が複雑になるおそれがある。この問題を回避するため、添付ファイル 力 SCADデータファイルの場合、そのまま添付ファイルとして残し、時刻証明ファイル を作成して別途電子メールに添付する。 [0112] In the example of FIG. 11, when the attached file is a CAD (Computer Aided Design) data file, a time certification file indicating a time stamp is created and attached to the e-mail. If a CAD data file is converted to a PDF file, the image accuracy may be reduced, and the correction work may be complicated. To avoid this problem, in the case of an SCAD data file with an attached file, leave it as an attached file, create a time certificate file, and attach it to an e-mail separately.
[0113] タイムスタンプ付加ルール指定部 307は、このようなフォーマット毎に定められたタ ィムスタンプ付加ルールに従!/、、各添付ファイルのフォーマットに応じたフォーマット 変換動作や時刻証明ファイルの添付動作等を指定する。つまり、タイムスタンプ付カロ ルール指定部 307は、フォーマットを変換するための変換条件を指定したり、時刻証 明ファイルを生成して電子メールに添付するか否かを指定する添付条件を指定した りする。そして、ここで指定された条件が添付ファイルに適用される。 [0113] The time stamp addition rule specifying unit 307 follows the time stamp addition rule determined for each format! /, Format conversion operation according to the format of each attached file, time certificate attachment operation, etc. Is specified. In other words, the time-stamped calor rule specifying unit 307 specified the conversion condition for converting the format, or specified the attachment condition for specifying whether to generate a time certificate file and attach it to the email. You The conditions specified here are applied to the attached file.
[0114] 具体的には、タイムスタンプ付加ルール指定部 307は、タイムスタンプ付加ルール 力 フォーマット変換してタイムスタンプを付加するように定められていれば、フォーマ ット変換部 303、電子署名部 304、時刻認証部 305、電子メール再構成部 306等を 制御して、前述した実施形態 1と同様に添付ファイルをタイムスタンプ付加可能なフォ 一マットに変換し、変換後のファイル内にタイムスタンプを付加する。タイムスタンプ付 加ルール力 S、フォーマット変換せずにタイムスタンプを付加するよう定められていれば 、タイムスタンプ付加ルール指定部 307は、その添付ファイルにタイムスタンプを直接 付加する。 [0114] Specifically, the time stamp addition rule specifying unit 307, if it is determined to add a time stamp by converting the time stamp addition rule format, format conversion unit 303, electronic signature unit 304 Then, the time authentication unit 305, the e-mail reconstruction unit 306, etc. are controlled to convert the attached file into a format to which a time stamp can be added in the same manner as in the first embodiment, and the time stamp is added to the converted file. Append. Time stamp addition rule force S If the time stamp is specified to be added without format conversion, the time stamp addition rule designating unit 307 directly adds the time stamp to the attached file.
[0115] また、タイムスタンプ付加ルール力 S、時刻証明ファイルを添付ファイルに関連付けて タイムスタンプを付加するように定められていれば、フォーマット変換部 303、電子署 名部 304、時刻認証部 305、電子メール再構成部 306等を制御して、前述した実施 形態 2と同様に時刻証明ファイルを作成する。 [0115] Further, if it is determined that the time stamp addition rule power S and the time certification file are associated with the attached file and the time stamp is added, the format conversion unit 303, the electronic signature unit 304, the time authentication unit 305, The e-mail reconstruction unit 306 and the like are controlled to create a time certification file as in the second embodiment described above.
[0116] すべての添付ファイルにタイムスタンプが付加されると、電子メール再構成部 306 は、時刻証明ファイルがある場合には、添付ファイルと時刻証明ファイルとの対応関 係を電子メールのヘッダに記述する。なお、このような対応関係を示すファイルを別 途生成する構成としてもよ!/ヽ。 [0116] When time stamps are added to all the attached files, the email reconstructing unit 306, when there is a time certificate file, displays the correspondence between the attached file and the time certificate file in the header of the email. Describe. It is also possible to create a file that shows such correspondences separately! / ヽ.
[0117] さらに、電子メール再構成部 306は、添付ファイル及び時刻証明ファイルを電子メ ールに添付することにより電子メールを再構成する。そして、電子署名部 304又は時 刻認証部 305が、電子メール全体にそれぞれ電子署名又は時刻認証を施す。タイム スタンプ付加装置 3は、このような処理により添付ファイルにタイムスタンプが付加され た電子メールを、メールサーバ 2に送信する。 [0117] Further, the e-mail reconstructing unit 306 reconstructs the e-mail by attaching the attached file and the time certification file to the e-mail. Then, the electronic signature unit 304 or the time authentication unit 305 performs an electronic signature or time authentication on the entire electronic mail, respectively. The time stamp adding device 3 transmits an e-mail in which the time stamp is added to the attached file by such processing to the mail server 2.
[0118] 実施形態 3によれば、添付ファイルの種類に応じて、ファイルの保管方法等に即し たより細かなタイムスタンプ付加方法を選択することができる。 [0118] According to the third embodiment, it is possible to select a more detailed time stamp addition method in accordance with the file storage method or the like according to the type of the attached file.
なお、本記実施の形態では、タイムスタンプ付加情報 323にデフォルトで決まって いる変換動作等を記憶させている。しかしながら、タイムスタンプ付加装置 3に入力部 を設け、タイムスタンプ付加情報 323内のルールを変更したり、個々のファイルフォー マットに対する変換動作等をタイムスタンプ付加情報 323に別途登録するようにして あよい。 In this embodiment, the time stamp additional information 323 stores a conversion operation determined by default. However, the time stamp adding device 3 is provided with an input unit so that the rules in the time stamp additional information 323 can be changed, and conversion operations for individual file formats can be separately registered in the time stamp additional information 323. Good.
[0119] 実施形態;!〜 3においては、タイムスタンプ付加装置 3が、電子メールの作成者の 秘密鍵を格納する秘密鍵管理情報 322を有している。し力もながら、ユーザの秘密 鍵の格納先はタイムスタンプ付加装置 3に限らず、ユーザ端末 1であってもよい。この ような構成の下では、電子署名部 304によって添付ファイルに電子署名が付加済み でないと判別されたときに、その添付ファイルを、タイムスタンプ付加装置 3から秘密 鍵を記憶するユーザ端末 1に一旦送信し、ユーザ端末 1によって電子署名が付加さ れたファイルを受信すればよい。また、添付ファイル付電子メール全体を対象として 電子署名を付加する場合にも、電子署名部 304は再構成した電子メールを秘密鍵 の格納先であるユーザ端末 1に送信し、ユーザ端末 1により電子署名が付加された 電子メールを通信部 31を介して取得すればよい。 In the embodiments;! To 3, the time stamp adding device 3 has the secret key management information 322 for storing the secret key of the creator of the e-mail. However, the storage location of the user's private key is not limited to the time stamp adding device 3 and may be the user terminal 1. Under such a configuration, when the electronic signature unit 304 determines that an electronic signature has not been added to the attached file, the attached file is temporarily transferred from the time stamp adding device 3 to the user terminal 1 that stores the private key. It is only necessary to transmit and receive the file with the electronic signature added by the user terminal 1. Also, when an electronic signature is added to the entire email with an attached file, the electronic signature unit 304 sends the reconstructed email to the user terminal 1 where the private key is stored, and the user terminal 1 sends the electronic signature. An electronic mail with a signature may be acquired via the communication unit 31.
[0120] メールサーバ 2とタイムスタンプ付加装置 3とはそれぞれ別筐体として構成するに限 らず、メールサーバ 2とタイムスタンプ付加装置 3とを 1つの筐体にまとめた構成として あよい。 [0120] The mail server 2 and the time stamp adding device 3 are not limited to being configured as separate cases, but the mail server 2 and the time stamp adding device 3 may be configured as a single case.
[0121] タイムスタンプ要求メッセージには、電子署名付の添付ファイルから抽出した署名 値のハッシュ値を格納するに限らず、添付ファイルのメインデータ領域のデータのハ ッシュ値を格納するようにしてもよい。この場合も、添付ファイルの原本性を担保しつ つ、添付ファイルのメインデータ格納領域の内容に基づ!/、て実行される処理に影響 を及ぼすことを回避できるため、既存のアプリケーションプログラムとの整合を保つこ とが容易となる。 [0121] The time stamp request message is not limited to storing the hash value of the signature value extracted from the attached file with the electronic signature, but may also store the hash value of the data in the main data area of the attached file. Good. In this case as well, it is possible to avoid affecting the processing executed based on the contents of the main data storage area of the attached file while ensuring the originality of the attached file. It is easy to maintain consistency.
[0122] 時刻認証局は、 TAから時刻の配信を受ける時刻認証事業者であるに限らず、他 の時刻源から NTP (Network Time Protocol)等により時刻の配信を受ける時刻認証 事業者、直に原子時計の時刻を取り込む時刻認証事業者、などでもよい。 [0122] The time certification authority is not limited to the time certification business that receives the time distribution from the TA, but the time certification business that receives the time distribution from other time sources by NTP (Network Time Protocol), etc. It may be a time certification company that captures the time of the atomic clock.
[0123] タイムスタンプ付加装置 3の制御部 30の機能は、ソフトウェアに限らず、専用のハー ドウエアによって実現することも可能である。また、タイムスタンプ付加装置 3を通常の コンピュータシステムによって構成してもよい。 [0123] The function of the control unit 30 of the time stamp adding device 3 is not limited to software, and can also be realized by dedicated hardware. Further, the time stamp adding device 3 may be configured by a normal computer system.
[0124] 例えば、実施形態;!〜 3の例では、タイムスタンプ付加装置 3において、動作プログ ラムがメモリ等に予め記憶されているものとして説明した。しかし、上述の処理動作を 実行させるためのプログラムを、フレキシブルディスク、 CD— ROM (Compact Disk R ead-Only Memory)、 DVD (Digital Versatile Disk)、 MO (Magneto-Optical disk)等 のコンピュータ読み取り可能な記録媒体に格納して配布し、そのプログラムをコンビュ ータにインストールすることにより、上述の処理動作を実行する装置を構成してもよいFor example, in the examples of the embodiments;! To 3, the time stamp adding apparatus 3 has been described on the assumption that the operation program is stored in advance in a memory or the like. However, the processing operation described above The program to be executed is stored and distributed on a computer-readable recording medium such as a flexible disk, CD—ROM (Compact Disk Read-Only Memory), DVD (Digital Versatile Disk), MO (Magneto-Optical disk), etc. Then, by installing the program in the computer, a device that executes the above processing operation may be configured.
〇 Yes
[0125] また、プログラムをインターネット等の通信ネットワーク上の所定のサーバ装置が有 するディスク装置等に格納しておき、例えば、搬送波に重畳させて、コンピュータにダ ゥンロード等するようにしてもよい。さらに、通信ネットワークを介してプログラムを転送 しながら起動実行することによつても、上述の処理を達成することができる。また、上 述の機能を、 OS (Operating System)が分担して実現する場合又は OSとアプリケー シヨンとの協働により実現する場合等には、 OS以外の部分のみを媒体に格納して配 布してもよく、また、コンピュータにダウンロード等してもよい。 [0125] Further, the program may be stored in a disk device or the like of a predetermined server device on a communication network such as the Internet, and may be superposed on a carrier wave and downloaded to a computer. Furthermore, the above-described processing can also be achieved by starting and executing a program while transferring it via a communication network. In addition, when the functions described above are realized by the OS (Operating System) being shared, or when the functions are realized through cooperation between the OS and the application, only the parts other than the OS are stored in the medium for distribution. It may also be downloaded to a computer.
[0126] この出願は、平成 18年 11月 14日に日本国特許庁に出願された特願 2006— 307 821号を基礎としており、該出願の内容を、本願に取り込むものとする。 This application is based on Japanese Patent Application No. 2006-307 821 filed with the Japan Patent Office on November 14, 2006, and the contents of this application are incorporated herein.
産業上の利用可能性 Industrial applicability
[0127] 電子メールに添付されているファイルに関する信頼性の高い時刻情報を容易に取 得できる。 [0127] Reliable time information regarding a file attached to an e-mail can be easily obtained.
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2006-307821 | 2006-11-14 | ||
| JP2006307821 | 2006-11-14 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2008059898A1 true WO2008059898A1 (en) | 2008-05-22 |
Family
ID=39401702
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2007/072128 Ceased WO2008059898A1 (en) | 2006-11-14 | 2007-11-14 | Authentication time adding apparatus, authentication time adding method, and program |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2008059898A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2011095803A (en) * | 2009-10-27 | 2011-05-12 | Canon It Solutions Inc | Apparatus and system for processing information, control method, program, and recording medium recording the program |
| JP7228735B1 (en) | 2022-07-21 | 2023-02-24 | 株式会社Akuodigital | Information processing device, time stamping method, time stamping program, and communication system |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2004104596A (en) * | 2002-09-11 | 2004-04-02 | Seiko Instruments Inc | Time stamp mail server system |
| JP2006072774A (en) * | 2004-09-03 | 2006-03-16 | Katsumasa Kenmochi | Electronic mail storage system, and electronic mail system |
| JP2006245773A (en) * | 2005-03-01 | 2006-09-14 | Murata Mach Ltd | Internet facsimile machine and program thereof |
-
2007
- 2007-11-14 WO PCT/JP2007/072128 patent/WO2008059898A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2004104596A (en) * | 2002-09-11 | 2004-04-02 | Seiko Instruments Inc | Time stamp mail server system |
| JP2006072774A (en) * | 2004-09-03 | 2006-03-16 | Katsumasa Kenmochi | Electronic mail storage system, and electronic mail system |
| JP2006245773A (en) * | 2005-03-01 | 2006-09-14 | Murata Mach Ltd | Internet facsimile machine and program thereof |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2011095803A (en) * | 2009-10-27 | 2011-05-12 | Canon It Solutions Inc | Apparatus and system for processing information, control method, program, and recording medium recording the program |
| JP7228735B1 (en) | 2022-07-21 | 2023-02-24 | 株式会社Akuodigital | Information processing device, time stamping method, time stamping program, and communication system |
| WO2024019083A1 (en) * | 2022-07-21 | 2024-01-25 | 株式会社Akuodigital | Information processing device, time stamp adding method, time stamp adding program, and communication system |
| JP2024014104A (en) * | 2022-07-21 | 2024-02-01 | 株式会社Akuodigital | Information processing device, time stamping method, time stamping program, and communication system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20190372782A1 (en) | Data Certification Device, Non-transitory Computer-readable Medium, and Method Therefor | |
| JP4132530B2 (en) | Electronic storage device | |
| JP3782259B2 (en) | Signature creation device | |
| JP4788212B2 (en) | Digital signature program and digital signature system | |
| KR20200088995A (en) | Document security and integrity verification based on blockchain in image forming device | |
| JP2010081372A (en) | System, device and method for registering electronic filing document and computer program | |
| JP5179319B2 (en) | Electronic document management apparatus and electronic document management method | |
| JP2007288747A (en) | Image processing system, image processing system control method, image forming apparatus, and image reproducing apparatus | |
| JP5043527B2 (en) | Document verification method, document verification apparatus, document verification program, and storage medium storing document verification program | |
| JP5700423B2 (en) | Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program | |
| JP4788213B2 (en) | Time stamp verification program and time stamp verification system | |
| EP2887247B1 (en) | Information processing apparatus, information processing method and program | |
| JP2009026076A (en) | Document management system | |
| JP2005063268A (en) | Electronic file authentication system, electronic file authentication server, and electronic file authentication method | |
| WO2008059898A1 (en) | Authentication time adding apparatus, authentication time adding method, and program | |
| JP4742189B2 (en) | Time stamp adding apparatus, time stamp adding method, e-mail relay server, and computer program | |
| JP4901272B2 (en) | Information generation processing program, information generation apparatus, and information generation method | |
| JP2006050504A (en) | Image processing apparatus and method | |
| JP5102881B2 (en) | Time stamp adding apparatus, time stamp adding method, e-mail relay server, and computer program | |
| JP3638910B2 (en) | Electronic signature apparatus, electronic signature method, electronic signature program, and recording medium on which electronic signature program is recorded | |
| JP2016163198A (en) | File management device, file management system, file management method, and file management program | |
| JP5661589B2 (en) | Authentication management apparatus and authentication management method | |
| JP2007181093A (en) | Time stamp server apparatus, time stamp issuing method, and time stamp issuing program | |
| KR101355080B1 (en) | System for syndicating the original of digital contents for contents provider and method thereof | |
| JP2003298575A (en) | Originality assurance system, electronic signature generation interface method, originality verification interface method, program, and recording medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07831858 Country of ref document: EP Kind code of ref document: A1 |
|
| DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 07831858 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: JP |
|
| DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) |