[go: up one dir, main page]

WO2014097502A1 - Personal information management system, personal information management method and program - Google Patents

Personal information management system, personal information management method and program Download PDF

Info

Publication number
WO2014097502A1
WO2014097502A1 PCT/JP2013/004099 JP2013004099W WO2014097502A1 WO 2014097502 A1 WO2014097502 A1 WO 2014097502A1 JP 2013004099 W JP2013004099 W JP 2013004099W WO 2014097502 A1 WO2014097502 A1 WO 2014097502A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
personal information
public key
data
bundled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2013/004099
Other languages
French (fr)
Japanese (ja)
Inventor
敬之 重橋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Casio Mobile Communications Ltd
Original Assignee
NEC Casio Mobile Communications Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Casio Mobile Communications Ltd filed Critical NEC Casio Mobile Communications Ltd
Publication of WO2014097502A1 publication Critical patent/WO2014097502A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • H04L9/007Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models involving hierarchical structures

Definitions

  • the present invention relates to a personal information management system, a personal information management method, and a program applicable to social network services.
  • SNS social network service
  • One of the SNSs is to collect and manage personal information (phone numbers, etc.) in the address book stored in network terminals (generally mobile phones) on a server, and automatically add the personal information together with that server.
  • a friendship is constructed (see Patent Documents 1 and 2 below).
  • An example is LINE (registered trademark) provided by NHN Japan Corporation.
  • this SNS will be referred to as “personal information utilization type SNS” for convenience.
  • the address book for each member is centrally managed on the server, and information (generally a telephone number) that can be uniquely identified among the personal information registered in the address book of each member is stored.
  • information generally a telephone number
  • the personal information utilization type SNS can expand the circle of friends using personal information (phone number etc.) as a clue, and can enjoy communication such as conversation and chat between friends.
  • Such inconvenience is the same when appropriate personal information is registered by a malicious person (referred to as person Z), or when personal information that has been obtained illegally by some means is registered.
  • person Z a malicious person
  • the server checks whether there is a person who has the telephone number among other service users. If there is a number user (Mr. C), Mr. C and the person Z are constructed as friendships. In this case, Mr. C may receive a harassment call or a junk mail from the malicious person Z, and may suffer damage.
  • an object of the present invention is to provide a personal information management system, a personal information management method, and a program that prevent registration of wrong personal information or malicious personal information.
  • the personal information management system of the present invention includes bundled data generation means for generating bundled data in which personal information of one user and personal information of two users are bundled, and Encrypted data generating means for generating encrypted data encrypted with the user's private key, and using the personal information of the two users as a clue, the public key of the second user is sent to a predetermined public key distributing means.
  • the personal information management method of the present invention includes a bundled data generation step of creating bundled data in which the personal information of one user and the personal information of the two users are bundled, and the bundled data is An encrypted data generation step for generating encrypted data encrypted with the user's private key; and the second user's public key is sent to a predetermined public key distribution means based on the personal information of the second user.
  • a public key requesting step for requesting, a decrypting step for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distributing means, and a decryption by the decrypting step A determination step of comparing the data thus obtained and the personal information of the two users to determine whether or not they match, and when the determination result of the determination step is affirmative, A construction process to build friendships between the two users and Characterized in that it contains.
  • the program according to the present invention includes a bundled data generating means for generating bundled data in which personal information of one user and personal information of two users are bundled in a computer, and using the bundled data in the second Encrypted data generating means for generating encrypted data encrypted with the private key of the user, and requesting the public key of the second user from the predetermined public key distributing means with the personal information of the second user as a clue Public key requesting means, decryption means for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distribution means, data decrypted by the decryption means, and A determination means for comparing the personal information of the two users to determine whether or not they match, and when the determination result of the determination means is affirmative, the first user and the second user With building means to build friendships and Characterized in that it gives a function of Te.
  • the present invention it is possible to provide a personal information management system, a personal information management method, and a program that prevent registration of wrong personal information or malicious personal information.
  • FIG. 1 It is a system configuration figure of an embodiment. It is a block diagram of the terminal 3, 4, 5, ... and the SNS server 2.
  • FIG. It is a figure which shows the member list 26 and the address book group 30 which were memorize
  • FIG. It is a figure which shows the information exchange between terminals. It is a figure which shows the registration process to the SNS server.
  • FIG. 1 is a system configuration diagram of the embodiment.
  • a network 1 such as the Internet includes an SNS server 2 that provides a social network service using personal information, and a large number of terminals 3, 4, 5,... Then, three are shown as an example) and a public key distribution server 6 that distributes a public key of PKI (Public Key Infrastructure) is connected.
  • SNS server 2 that provides a social network service using personal information
  • terminals 3, 4, 5,... three are shown as an example
  • PKI Public Key Infrastructure
  • the telephone number of the terminal 3 is “090-AAA-AAA”
  • the telephone number of the terminal 4 is “090-BBB-CCCC”
  • the telephone number of the terminal 5 is “090-CCC-CCCC”
  • the person 7 Is a user A of the terminal 3
  • a person 8 is a user B of the terminal 4
  • a person 9 is a user C of the terminal 5.
  • FIG. 2 is a configuration diagram of the terminals 3, 4, 5... And the SNS server 2.
  • the configuration of the terminals 3, 4, 5, As shown in (a), all the terminals 3, 4, 5,... Have the same configuration, and the configuration of the terminal 3 will be described as a representative.
  • a communication unit 11 that communicates with a base station (not shown) connected to the network 1, an operation unit 12 such as a push button or a touch panel that provides an input interface for the user of the terminal 3,
  • a control unit 13 mainly composed of a computer that realizes a use environment of at least a predetermined service (personal information use type social network service) provided by the SNS server 2 through overall control of the operation, and an output interface for the user
  • a display unit 14 such as a liquid crystal display to be provided, a storage unit 15, and a power supply unit 16 that supplies power to each unit of the terminal 3 are provided.
  • the own telephone number storage area 17 for storing the own telephone number
  • the address book storage area 18 for storing the address book
  • the private key storage area 19 for storing the PKI private key
  • the public key for storing the PKI public key.
  • a storage area 20 is provided.
  • the own phone number is the phone number of each of the terminals 3, 4, 5,... "090-AAA-AAAA” for the terminal 3, and "090-BBB” for the terminal 4.
  • “BBBB” means “090-CCC-CCCC” for the terminal 5.
  • the secret key and the public key are public key cryptosystem key pairs that exist for each user (Mr. A, Mr. B, Mr. C,...) Of each terminal 3, 4, 5,.
  • the private key and public key stored in the terminal 3 will be referred to as Mr. A's private key and Mr. A's public key
  • the private key and public key stored in the terminal 4 Mr. B's secret key and Mr. B's public key will be referred to
  • the secret key and public key stored in the terminal 5 will be referred to as Mr. C's secret key and Mr. C's public key.
  • the SNS server 2 inputs the communication unit 21 that communicates with the terminals 3, 4, 5,... Via the network 1 and the administrator of the SNS server 2.
  • a control unit 23 mainly composed of a computer that provides a service), a display unit 24 such as a liquid crystal display that provides an output interface to the administrator of the SNS server 2, and a storage unit 25.
  • the public key distribution server 6 distributes the public key of the PKI.
  • the “public key” means a public key of a public key cryptosystem key pair. Since data encrypted with a public key can only be decrypted with a non-public key (secret key), the security level does not decrease even if the public key is known to others. Conversely, data encrypted with the private key can be decrypted with the public key.
  • the public key can be distributed on any server, such as a server operated by an individual, but it can be spoofed (a public key illegally generated or tampered with by a third party) Distribution by an arbitrary server is not preferable, and is generally distributed by a specific server that has received public authentication.
  • Public certification means that a trusted third party (TTP: Trusted Third Party) guarantees the owner of the public key.
  • TTP Trusted Third Party
  • the TTP confirms the identity of the owner of the public key by some method, and issues a certificate (Certificate) that guarantees the public key and the owner.
  • the certificate describes the public key and information that proves its owner, and is given a TTP signature to prevent tampering.
  • the TTP that issues a certificate is called a certificate authority (CA), and the public key distribution server 6 of the embodiment distributes the public key that has been certified by the certificate authority.
  • CA certificate authority
  • FIG. 3 is a diagram showing the member list 26 and the address book group 30 stored in the storage unit 25 of the SNS server 2.
  • the member list 26 holds information of all users (members) of a predetermined service (personal information use type social network service) provided by the SNS server 2.
  • the member information is at least member identification information (in the figure, “A”, “B”, “C”... For convenience, but this is for convenience of explanation. Unique information that does not overlap.
  • each member's personal information is unique information that can distinguish each member individually (generally, it is a telephone number or an e-mail address, but here a telephone number is taken as an example). In addition, about personal information, you may add an address, age, sex, etc. other than said unique thing, for example.
  • the address book group 30 holds the personal information transmitted from each member's terminals 3, 4, 5,... Divided into address books 27, 28, 29,. Each address book 27, 28, 29... Contains personal information of one or more call partners. For example, in the example shown in FIG. The “telephone number” and “encrypted telephone number pair” of the other party to whom the identification information A1 associated with the identification information A is assigned are written, and the identification information A in the member list 26 is also associated with the identification information A1. The “telephone number” and “encrypted phone number pair” of the second call partner to which the attached identification information A2 is given are written.
  • telephone number is “plaintext” information, that is, readable information composed of text characters, etc.
  • one “encrypted telephone number pair” is non-readable by being encrypted with a predetermined secret key. It is secret information that cannot be known unless it is decrypted using a public key corresponding to the secret key.
  • Encrypted phone number pair is a pair of phone numbers enclosed and encrypted with a predetermined secret key.
  • One of the pair of telephone numbers is the telephone number of the owner of the address book, and the other is the telephone number of the other party. This will be specifically described. Assuming that Mr. B is the other party in the address book 27 of Mr. A, one of the phone numbers enclosed in the “encrypted phone number pair” is the phone number of Mr. A (090-AAA-AAAAA). The other telephone number is Mr. B's telephone number (090-BBB-BBBB). The two phone numbers (090-AAA-AAAA and 090-BBB-BBBB) are bundled and encrypted with Mr. B's private key is an “encrypted phone number pair”.
  • FIG. 4 is a diagram showing information exchange between terminals. As shown in this figure, first, when Mr. A operates the operation unit 12 of his / her terminal 3 and inputs the telephone number (090-BBB-BBBB) of Mr.
  • the input information that is, the telephone number (090-BBB-BBBB) of the call partner B is registered in the address book 18 in the own terminal (step S1), and the own telephone number (from the own telephone number storage area 17) (090-AAA-AAAAA) is read, and the telephone number 31 is transmitted to Mr. B's terminal 4 in plain text (step S2).
  • the control unit 13 of Mr. B's terminal 4 reads out the own telephone number (090-BBB-BBBB) from the own telephone number storage area 17 of the own terminal.
  • the private key and the public key of the user are read out from the private key storage area 19 and the public key storage area 20 of the terminal (step S3).
  • the control unit 13 of Mr. B's terminal 4 transmits his own telephone number 32 (090-BBB-BBBB) and his own (Mr. B) public key 33 to Mr. A's terminal 3 (steps S4 and S5).
  • A's phone number and my (B's) phone number are bundled, and the enclosed data is encrypted with my (B's) private key to generate an encrypted phone number pair 34 ( After step S6), the encrypted telephone number pair 34 is transmitted to Mr. A's terminal 3 (step S7).
  • step S8 Upon receiving the above three data (telephone number 32, public key 33 and encrypted telephone number pair 34) from Mr. B's terminal 4, the control unit 13 of Mr. A's terminal 3 uses the public key 33 next.
  • the encrypted telephone number pair 34 is decrypted (step S8), and the decrypted B's telephone number and the telephone number 32 received from B's terminal 4 are collated (step S9). It is determined whether or not (step S10). If they match, the process ends after executing registration processing (step S11) to the SNS server to be described next. On the other hand, if they do not match, they are received from Mr. B's terminal 4. It is determined that the telephone number 32 is wrong (or wrong), and Mr. B's telephone number registered in the address book 18 of the terminal is deleted in the previous step S1, and the process is terminated.
  • FIG. 5 is a diagram showing a registration process to the SNS server 2.
  • the control unit 13 of Mr. A's terminal 3 sends the telephone number 35 (090-BBB-BBBB) of Mr. B's terminal 4 and the encrypted telephone number pair 36 (the encrypted telephone number pair of FIG. 4). (Same as 34) is transmitted to the SNS server 2 (step S13, step S14).
  • the control unit 23 of the SNS server 2 stores the telephone number 35 (090-BBB-BBBB) of the terminal 4 of Mr. B and the encrypted telephone number pair 36 transmitted from the terminal 3 of Mr. A in the storage unit 25. Are additionally registered in the address book 27 (step S15). Next, the member list 26 in the storage unit 25 is searched, and whether or not the telephone number 35 (090-BBB-BBBB) of Mr. B's terminal 4 has been registered, that is, whether Mr. B is registered as a member. It is determined whether or not (step S16).
  • step S17 the information of Mr. B (phone number 35 and encrypted phone number pair 36) additionally registered in the address book 27 of Mr. A in the previous step S15 is deleted (step S17). To finish the process.
  • Mr. B's public key is requested to the public key server 6 (step S18), and when Mr. B's public key is received from the public key server 6 (step S19), the public key is received. Is used to decrypt the encrypted telephone number pair 36 (step S20). Next, the decrypted phone number of B and the phone number 35 received from Mr. A's terminal 3 are collated (step S21) to determine whether or not they match (step S22). If this is the case, a friendship between Mr. A and Mr. B is established, and a message to that effect is sent to Mr. A's terminal 3 (step S23), and the process is terminated.
  • the SNS server 2 obtains Mr. B's public key from the public key distribution server 6 using the plaintext telephone number (090-BBB-BBBB) as a key.
  • the SNS server 2 encrypts data encrypted with Mr. B's secret key (data encrypted with Mr. B's secret key by enclosing the phone number of Mr. A and Mr. B). ) With Mr. B's public key, and the validity of Mr. A's phone number and Mr. B's phone number is confirmed.
  • the SNS server 2 notifies the terminal 3 of Mr. A that the user (Mr. B) of the terminal 4 is an acquaintance candidate.
  • the PKI public key encryption infrastructure
  • the personal information phone number in the embodiment
  • the SNS server 2 can construct a correct friend relationship using the personal information whose validity is guaranteed, and can provide a healthy social network environment.
  • B's public key 33 and encrypted telephone number pair 34 are transmitted.
  • the encrypted telephone number pair 34 is obtained by bundling A's telephone number and B's telephone number and encrypting the bundled data with B's private key.
  • data transmission between terminals is performed via a wireless or wired communication medium. Even if the communication medium is digital, the possibility of eavesdropping by a third party cannot be ruled out. It cannot be said that there is absolutely no tampering. This is especially true for plaintext data (telephone number 32 described above).
  • the embodiment has an advantage that if the telephone number 32 is falsified, the falsification can be found. This is because the public key 33 and the encrypted telephone number pair 34 of Mr. B are transmitted from the terminal 4 to the terminal 3 together with the plaintext telephone number 32, and the encrypted telephone is transmitted using the public key 33. This is because it is only necessary to decrypt the number pair 34 and match the decrypted phone number of Mr. B with the plaintext phone number 32. If the collation matches, “no tampering” can be determined, and if they do not match, “tampering” can be determined.
  • the personal information registered in the SNS server 2 is a telephone number.
  • the present invention is not limited to this. Any unique information that can identify the user (member) of the SNS service may be used. For example, an e-mail address may be used. Further, the address book of the embodiment may be read as a telephone book, or may be read as a personal information list.
  • “data exchange date” may be added to the data handled in the address book. Then, a data exchange date / time check is added to the phase (see step S21 in FIG. 5) in which the SNS server 2 checks the validity of personal information (telephone number etc.), and data older than a certain standard is excluded. Also good. In this way, the telephone number reuse problem, that is, the inconvenience caused by allocating the canceled telephone number to a new contractor (the case where there is no malicious but the result of impersonating another person) is addressed. be able to.
  • FIG. 6 is a configuration diagram of Supplementary Note 1.
  • Appendix 1 includes bundled data generation means 100 (corresponding to the control unit 13 of the embodiment) that generates bundled data that bundles personal information of one user and personal information of a second user; Encrypted data generation means 101 (corresponding to the control unit 13 of the embodiment) for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user; Using the personal information of the second user as a clue, public key requesting means 103 (of the embodiment) for requesting the public key of the second user to the public key distribution means 102 (corresponding to the public key distribution server 6 of the embodiment).
  • Decryption means 104 (corresponding to the control unit 23 of the embodiment) for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distribution means 102;
  • a determination unit 105 (corresponding to the control unit 23 in the embodiment) that compares the data decrypted by the decryption unit 104 with the personal information of the two users and determines whether or not they match;
  • a construction means 106 (corresponding to the control unit 23 in the embodiment) for constructing a friendship relationship between the one user and the second user when the judgment result of the judgment means 105 is affirmative.
  • Personal information management system 107 Personal information management system 107.
  • Appendix 2 includes bundled data generation means for generating bundled data including the personal information of one user and the personal information of the second user;
  • a personal information management system comprising: a terminal having encrypted data generation means for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user.
  • Appendix 3 is a public key requesting means for requesting the public key of any user from a predetermined public key distribution means using the personal information of the arbitrary user as a clue;
  • the public key of the arbitrary user is distributed from the public key distribution means, the public key is used, and the personal information of the arbitrary user and the personal information of another user are bundled with the arbitrary key
  • Decryption means for decrypting the encrypted data encrypted with the user's private key
  • a determination means for comparing the data decrypted by the decryption means and the personal information of the arbitrary user to determine whether or not they match,
  • a personal information management system comprising: a server having a construction means for constructing a friendship relationship between the arbitrary user and the other user when the judgment result of the judgment means is affirmative.
  • Appendix 4 includes a bundled data generation process for generating bundled data including the personal information of one user and the personal information of the second user; An encrypted data generation step for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user; A public key requesting step of requesting the public key of the second user from a predetermined public key distribution means using the personal information of the second user as a clue; A decrypting step of decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distributing means; A determination step of comparing the data decoded by the decoding step with the personal information of the two users to determine whether or not both match; A personal information management method comprising: a construction step of constructing a friendship between the first user and the second user when the determination result of the determination step is affirmative.
  • Appendix 5 A bundled data generation means for generating bundled data including the personal information of one user and the personal information of a second user; Encrypted data generation means for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user; Public key requesting means for requesting the public key of the second user to a predetermined public key distribution means using the personal information of the second user as a clue; Decryption means for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distribution means; A determination means for comparing the data decrypted by the decryption means with the personal information of the two users to determine whether or not they match; When the determination result of the determination means is affirmative, the program provides a function as a construction means for constructing a friendship between the first user and the second user.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

[Problem] To prevent incorrect personal information and malicious personal information from being registered. [Solution] A personal information management system (107) is equipped with: a bundled data generation means (100) that generates bundled data in which personal information on a first user and personal information on a second user are bundled; an encrypted data generation means (101) that generates encrypted data by encrypting the bundled data with a private key of the second user; a public key request means (103) that requests from a public key distribution means (102) a public key of the second user with the personal information on the second user as a clue; a decryption means (104) that decrypts the encrypted data by using the public key of the second user; a determination means (105) that performs a check to determine whether or not the decrypted data matches the personal information on the second user; and a construction means (106) that constructs a friend relationship between the first user and the second user if the determination result is affirmative.

Description

個人情報管理システム、個人情報管理方法及びプログラムPersonal information management system, personal information management method and program

 本発明は、ソーシャルネットワークサービスに適用できる個人情報管理システム、個人情報管理方法及びプログラムに関する。 The present invention relates to a personal information management system, a personal information management method, and a program applicable to social network services.

 近年、インターネット等のネットワーク上で、友人・知人間のコミュニケーションを円滑にする手段や場を提供したり、趣味や嗜好、居住地域、出身校、あるいは「友人の友人」といったつながりを通じて新たな人間関係を構築する場を提供する、いわゆるソーシャルネットワークサービス(以下、SNS)と呼ばれるサービスが広く普及している。 In recent years, new human relations have been provided through connections such as hobbies and preferences, residential areas, schools of origin, or "friends of friends" by providing means and places to facilitate communication between friends and acquaintances over networks such as the Internet. A so-called social network service (hereinafter referred to as SNS) that provides a place for building a network is widely used.

 SNSの一つに、ネットワーク端末(一般的には携帯電話機)に保存されているアドレス帳の個人情報(電話番号等)をサーバに吸い上げて管理し、そのサーバで、個人情報をつきあわせて自動的に友達関係の構築を行うようにしたものがある(下記の特許文献1、2参照)。実例はNHNジャパン株式会社が提供するLINE(同社の登録商標)である。以下、このSNSのことを便宜的に「個人情報利用型SNS」ということにする。 One of the SNSs is to collect and manage personal information (phone numbers, etc.) in the address book stored in network terminals (generally mobile phones) on a server, and automatically add the personal information together with that server. In some cases, a friendship is constructed (see Patent Documents 1 and 2 below). An example is LINE (registered trademark) provided by NHN Japan Corporation. Hereinafter, this SNS will be referred to as “personal information utilization type SNS” for convenience.

 個人情報利用型SNSでは、サーバ上で会員ごとのアドレス帳を集中管理すると共に、各会員のアドレス帳に登録されている個人情報のうちの一意に識別できる情報(一般的には電話番号)を手掛かりにして友達関係の構築を行っている。たとえば、Aさんのアドレス帳に「090-BBB-BBBB」という電話番号が登録されていた場合に、その電話番号が、サービス利用者のBさんのものであれば、サーバはAさんとBさんの友達関係を構築し、その旨をAさんに通知する。 In the personal information use type SNS, the address book for each member is centrally managed on the server, and information (generally a telephone number) that can be uniquely identified among the personal information registered in the address book of each member is stored. We are building friendships as clues. For example, if a phone number “090-BBB-BBBB” is registered in Mr. A's address book, and the phone number belongs to the service user B, the servers are A and B To establish a friendship and notify A to that effect.

 このように、個人情報利用型SNSは、個人情報(電話番号等)を手掛かりにして友達の輪を広げることができ、友達同士の会話やチャットといったコミュニケーションを楽しむことができる。 In this way, the personal information utilization type SNS can expand the circle of friends using personal information (phone number etc.) as a clue, and can enjoy communication such as conversation and chat between friends.

特開2011-081670号公報JP 2011-081670 A 特開2010-246054号公報JP 2010-246054 A

 しかしながら、個人情報利用型SNSにあっては、アドレス帳に間違った個人情報が登録された場合や、悪意を持った個人情報が登録された場合に意図しない相手と友達関係が構築されてしまうという問題点がある。 However, in personal information utilization type SNS, when wrong personal information is registered in the address book or when malicious personal information is registered, a friendship with an unintended partner is established. There is a problem.

 具体的に説明する。今、Aさんのアドレス帳に間違った電話番号「090-XXX-XXXX」が登録された場合を考える。この場合、サーバは、他のサービス利用者の中に当該電話番号を持っている者が居るかどうかを調べ、もし、同じ電話番号の利用者(Xさん)がいた場合には、AさんとXさんを友達関係として構築する。 Specific explanation. Consider a case where an incorrect telephone number “090-XXX-XXXX” is registered in Mr. A's address book. In this case, the server checks whether there is a person who has the telephone number among other service users. If there is a user (Mr. X) with the same telephone number, Build Mr. X as a friendship.

 ここで、「090-XXX-XXXX」は間違った電話番号であるので、本来、AさんとXさんは無関係(見知らぬ者同士)のはずである。にも関わらず、従来の個人情報利用型SNSにあっては、無関係のAさんとXさんの間に友達関係を構築してしまうという不都合がある。もちろん、見知らぬ相手との友達関係を望む者もいないではないが、危険性を否めず、とりわけ未成年者に対しては是非とも避けなければならない不都合である。 Here, “090-XXX-XXXX” is the wrong phone number, so Mr. A and Mr. X should be irrelevant (unknown people). Nevertheless, the conventional personal information utilization type SNS has a disadvantage that a friendship is established between unrelated Mr. A and Mr. X. Of course, there is no one who wants a friendship with an unknown partner, but it is a disadvantage that must be avoided by all means, especially for minors, without denying the danger.

 かかる不都合は、悪意を持った者(人物Zとする)によって適当な個人情報が登録された場合や、何らかの手段で不正に知り得た個人情報が登録された場合も同様である。たとえば、登録された個人情報を電話番号「090-CCC-CCCC」とすると、サーバは、他のサービス利用者の中に当該電話番号を持っている者が居るかどうかを調べ、もし、同じ電話番号の利用者(Cさん)がいた場合には、Cさんと人物Zを友達関係として構築する。この場合、Cさんは、悪意を持った人物Zからの嫌がらせ電話や迷惑メールを受ける恐れがあり、被害を被る可能性がある。 Such inconvenience is the same when appropriate personal information is registered by a malicious person (referred to as person Z), or when personal information that has been obtained illegally by some means is registered. For example, if the registered personal information is a telephone number “090-CCC-CCCC”, the server checks whether there is a person who has the telephone number among other service users. If there is a number user (Mr. C), Mr. C and the person Z are constructed as friendships. In this case, Mr. C may receive a harassment call or a junk mail from the malicious person Z, and may suffer damage.

 そこで、本発明は、間違った個人情報や悪意を持った個人情報を登録できないようにした個人情報管理システム、個人情報管理方法及びプログラムを提供することを目的とする。 Therefore, an object of the present invention is to provide a personal information management system, a personal information management method, and a program that prevent registration of wrong personal information or malicious personal information.

 本発明の個人情報管理システムは、一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成手段と、前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成手段と、前記二の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記二の利用者の公開鍵を要求する公開鍵要求手段と、前記公開鍵配布手段から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号手段と、前記復号手段によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定手段と、前記判定手段の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築手段とを備えたことを特徴とする。
 本発明の個人情報管理方法は、一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成工程と、前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成工程と、前記二の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記二の利用者の公開鍵を要求する公開鍵要求工程と、前記公開鍵配布手段から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号工程と、前記復号工程によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定工程と、前記判定工程の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築工程とを含むことを特徴とする。
 本発明のプログラムは、コンピュータに、一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成手段、前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成手段、前記二の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記二の利用者の公開鍵を要求する公開鍵要求手段、前記公開鍵配布手段から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号手段、前記復号手段によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定手段、前記判定手段の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築手段としての機能を与えることを特徴とする。
The personal information management system of the present invention includes bundled data generation means for generating bundled data in which personal information of one user and personal information of two users are bundled, and Encrypted data generating means for generating encrypted data encrypted with the user's private key, and using the personal information of the two users as a clue, the public key of the second user is sent to a predetermined public key distributing means. Public key requesting means for requesting, decrypting means for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distributing means, and decrypting by the decrypting means A determination means for checking whether or not the two data are matched by comparing the obtained data and the personal information of the two users, and when the determination result of the determination means is affirmative, A builder that builds friendships between secondary users Characterized by comprising and.
The personal information management method of the present invention includes a bundled data generation step of creating bundled data in which the personal information of one user and the personal information of the two users are bundled, and the bundled data is An encrypted data generation step for generating encrypted data encrypted with the user's private key; and the second user's public key is sent to a predetermined public key distribution means based on the personal information of the second user. A public key requesting step for requesting, a decrypting step for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distributing means, and a decryption by the decrypting step A determination step of comparing the data thus obtained and the personal information of the two users to determine whether or not they match, and when the determination result of the determination step is affirmative, A construction process to build friendships between the two users and Characterized in that it contains.
The program according to the present invention includes a bundled data generating means for generating bundled data in which personal information of one user and personal information of two users are bundled in a computer, and using the bundled data in the second Encrypted data generating means for generating encrypted data encrypted with the private key of the user, and requesting the public key of the second user from the predetermined public key distributing means with the personal information of the second user as a clue Public key requesting means, decryption means for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distribution means, data decrypted by the decryption means, and A determination means for comparing the personal information of the two users to determine whether or not they match, and when the determination result of the determination means is affirmative, the first user and the second user With building means to build friendships and Characterized in that it gives a function of Te.

 本発明によれば、間違った個人情報や悪意を持った個人情報を登録できないようにした個人情報管理システム、個人情報管理方法及びプログラムを提供することができる。 According to the present invention, it is possible to provide a personal information management system, a personal information management method, and a program that prevent registration of wrong personal information or malicious personal information.

実施形態のシステム構成図である。It is a system configuration figure of an embodiment. 端末3、4、5・・・・とSNSサーバ2の構成図である。It is a block diagram of the terminal 3, 4, 5, ... and the SNS server 2. FIG. SNSサーバ2の記憶部25に記憶された会員リスト26とアドレス帳群30を示す図である。It is a figure which shows the member list 26 and the address book group 30 which were memorize | stored in the memory | storage part 25 of the SNS server 2. FIG. 端末間の情報交換を示す図である。It is a figure which shows the information exchange between terminals. SNSサーバ2への登録処理を示す図である。It is a figure which shows the registration process to the SNS server. 付記1の構成図である。FIG.

 以下、本発明の実施形態を、図面を参照しながら説明する。
 図1は、実施形態のシステム構成図である。この図において、インターネット等のネットワーク1には、個人情報利用型のソーシャルネットワークサービスを提供するSNSサーバ2と、そのサービスを利用することができる多数の端末3、4、5・・・・(ここでは一例として3台を図示する)と、PKI(Public Key Infrastructure:公開鍵暗号基盤)の公開鍵を配布する公開鍵配布サーバ6とが接続されている。
Embodiments of the present invention will be described below with reference to the drawings.
FIG. 1 is a system configuration diagram of the embodiment. In this figure, a network 1 such as the Internet includes an SNS server 2 that provides a social network service using personal information, and a large number of terminals 3, 4, 5,... Then, three are shown as an example) and a public key distribution server 6 that distributes a public key of PKI (Public Key Infrastructure) is connected.

 なお、この図では、多数の端末3、4、5・・・・とネットワーク1との間を無線で接続する態様を示しているが、これは一例である。ネットワーク1と有線で接続する端末、たとえば、パーソナルコンピュータ等の端末であってもよく、あるいは、無線で接続する端末と有線で接続する端末との混在態様であってもよい。以下、すべての端末3、4、5・・・・をスマートフォンなどの無線端末とするが、これは一例であることに留意されたい。 In addition, in this figure, although the aspect which connects many terminals 3, 4, 5, ... and the network 1 by radio | wireless is shown, this is an example. It may be a terminal connected to the network 1 by wire, for example, a terminal such as a personal computer, or may be a mixed mode of a terminal connected wirelessly and a terminal connected by wire. In the following, all terminals 3, 4, 5,... Are wireless terminals such as smartphones, but it should be noted that this is an example.

 説明の都合上、端末3の電話番号を「090-AAA-AAAA」、端末4の電話番号を「090-BBB-CCCC」、端末5の電話番号を「090-CCC-CCCC」とし、人物7を端末3のユーザであるAさん、人物8を端末4のユーザであるBさん、人物9を端末5のユーザであるCさんとする。 For convenience of explanation, the telephone number of the terminal 3 is “090-AAA-AAA”, the telephone number of the terminal 4 is “090-BBB-CCCC”, the telephone number of the terminal 5 is “090-CCC-CCCC”, and the person 7 Is a user A of the terminal 3, a person 8 is a user B of the terminal 4, and a person 9 is a user C of the terminal 5.

 図2は、端末3、4、5・・・・とSNSサーバ2の構成図である。
 まず、端末3、4、5・・・・の構成を説明する。(a)に示すように、すべての端末3、4、5・・・・は同一の構成を有しており、代表して端末3の構成を説明すると、端末3は、アンテナ11aを介してネットワーク1に接続された不図示の基地局との間で通信を行う通信部11と、この端末3のユーザに対して入力インターフェースを提供する押しボタンやタッチパネル等の操作部12と、端末3の動作を統括制御して、少なくともSNSサーバ2が提供する所定のサービス(個人情報利用型のソーシャルネットワークサービス)の利用環境を実現するコンピュータを主体にした制御部13と、ユーザに対して出力インターフェースを提供する液晶ディスプレイ等の表示部14と、記憶部15と、端末3の各部に電源を供給する電源部16とを備え、記憶部15に、自端末の電話番号(以下、自電話番号という)を記憶する自電話番号記憶領域17、アドレス帳を記憶するアドレス帳記憶領域18、PKIの秘密鍵を記憶する秘密鍵記憶領域19及びPKIの公開鍵を記憶する公開鍵記憶領域20を設けている。
FIG. 2 is a configuration diagram of the terminals 3, 4, 5... And the SNS server 2.
First, the configuration of the terminals 3, 4, 5,. As shown in (a), all the terminals 3, 4, 5,... Have the same configuration, and the configuration of the terminal 3 will be described as a representative. A communication unit 11 that communicates with a base station (not shown) connected to the network 1, an operation unit 12 such as a push button or a touch panel that provides an input interface for the user of the terminal 3, A control unit 13 mainly composed of a computer that realizes a use environment of at least a predetermined service (personal information use type social network service) provided by the SNS server 2 through overall control of the operation, and an output interface for the user A display unit 14 such as a liquid crystal display to be provided, a storage unit 15, and a power supply unit 16 that supplies power to each unit of the terminal 3 are provided. The own telephone number storage area 17 for storing the own telephone number, the address book storage area 18 for storing the address book, the private key storage area 19 for storing the PKI private key, and the public key for storing the PKI public key. A storage area 20 is provided.

 自電話番号とは、端末3、4、5・・・・のそれぞれの電話番号のことをいい、端末3にあっては「090-AAA-AAAA」、端末4にあっては「090-BBB-BBBB」、端末5にあっては「090-CCC-CCCC」のことをいう。 The own phone number is the phone number of each of the terminals 3, 4, 5,... "090-AAA-AAAA" for the terminal 3, and "090-BBB" for the terminal 4. “BBBB” means “090-CCC-CCCC” for the terminal 5.

 また、秘密鍵及び公開鍵は、各端末3、4、5・・・・のユーザ(Aさん、Bさん、Cさん・・・・)ごとに存在する公開鍵暗号方式の鍵ペアであり、以下、端末3に記憶されている秘密鍵及び公開鍵のことをAさんの秘密鍵及びAさんの公開鍵ということにし、同様に、端末4に記憶されている秘密鍵及び公開鍵のことをBさんの秘密鍵及びBさんの公開鍵ということにし、さらに、端末5に記憶されている秘密鍵及び公開鍵のことをCさんの秘密鍵及びCさんの公開鍵ということにする。 The secret key and the public key are public key cryptosystem key pairs that exist for each user (Mr. A, Mr. B, Mr. C,...) Of each terminal 3, 4, 5,. Hereinafter, the private key and public key stored in the terminal 3 will be referred to as Mr. A's private key and Mr. A's public key, and similarly, the private key and public key stored in the terminal 4 Mr. B's secret key and Mr. B's public key will be referred to, and the secret key and public key stored in the terminal 5 will be referred to as Mr. C's secret key and Mr. C's public key.

 次に、SNSサーバ2の構成を説明する。(b)に示すように、SNSサーバ2は、ネットワーク1を介して端末3、4、5・・・・との間で通信を行う通信部21と、SNSサーバ2の管理者に対して入力インターフェースを提供するキーボードやタッチパネル等の操作部22と、SNSサーバ2の動作を統括制御し、端末3、4、5・・・・のユーザに対して所定のサービス(個人情報利用型のソーシャルネットワークサービス)を提供するコンピュータを主体にした制御部23と、SNSサーバ2の管理者に対して出力インターフェースを提供する液晶ディスプレイ等の表示部24と、記憶部25とを備え、記憶部25に、このSNSサーバ2が提供するサービスのすべての利用者(会員ともいう)の情報を記録した会員リスト26の記憶領域25aと、各会員ごとのアドレス帳27、28、29・・・・を記憶するアドレス帳群30の記憶領域25bとを設けている。 Next, the configuration of the SNS server 2 will be described. As shown in (b), the SNS server 2 inputs the communication unit 21 that communicates with the terminals 3, 4, 5,... Via the network 1 and the administrator of the SNS server 2. Controls the operation of the SNS server 2 and the operation unit 22 such as a keyboard and a touch panel that provide an interface, and provides a predetermined service to a user of the terminal 3, 4, 5,. A control unit 23 mainly composed of a computer that provides a service), a display unit 24 such as a liquid crystal display that provides an output interface to the administrator of the SNS server 2, and a storage unit 25. A storage area 25a of a member list 26 in which information of all users (also referred to as members) of the service provided by the SNS server 2 is recorded, and an address for each member It is provided a storage area 25b of the address book group 30 for storing 27, 28, 29 ....

 公開鍵配布サーバ6は、前記のとおり、PKIの公開鍵を配布するが、「公開鍵」とは、公開鍵暗号方式の鍵ペアのうち、一般に公開される方の鍵のことをいう。公開鍵で暗号化されたデータは、公開されない方の鍵(秘密鍵)でしか復号できないため、公開鍵は他人に知られてもセキュリティレベルが低下しない。逆に、秘密鍵で暗号化されたデータは公開鍵で復号することができる。 As described above, the public key distribution server 6 distributes the public key of the PKI. The “public key” means a public key of a public key cryptosystem key pair. Since data encrypted with a public key can only be decrypted with a non-public key (secret key), the security level does not decrease even if the public key is known to others. Conversely, data encrypted with the private key can be decrypted with the public key.

 公開鍵は、たとえば、個人が運営するサーバなどの任意のサーバで配布することも可能であるが、なりすまし(第三者によって不正に生成または改竄された公開鍵)の可能性があることから、任意のサーバによる配布は好ましくなく、一般的には公的認証を受けた特定のサーバによって配布されている。 The public key can be distributed on any server, such as a server operated by an individual, but it can be spoofed (a public key illegally generated or tampered with by a third party) Distribution by an arbitrary server is not preferable, and is generally distributed by a specific server that has received public authentication.

 公的認証とは、信頼できる第三者機関(TTP:Trusted Third Party)に公開鍵の所有者を保証してもらうことをいう。TTPは、公開鍵の所有者の本人性をなんらかの方法で確認し、公開鍵とその所有者を保証する証明書(Certificate)を発行する。証明書には、公開鍵とその所有者を証明する情報が記載され、改ざんを防ぐためにTTPの署名が付与される。証明書を発行するTTPのことを、認証局(CA:Certification Authority)といい、実施形態の公開鍵配布サーバ6は、この認証局の証明を受けた公開鍵を配布する。 Public certification means that a trusted third party (TTP: Trusted Third Party) guarantees the owner of the public key. The TTP confirms the identity of the owner of the public key by some method, and issues a certificate (Certificate) that guarantees the public key and the owner. The certificate describes the public key and information that proves its owner, and is given a TTP signature to prevent tampering. The TTP that issues a certificate is called a certificate authority (CA), and the public key distribution server 6 of the embodiment distributes the public key that has been certified by the certificate authority.

 図3は、SNSサーバ2の記憶部25に記憶された会員リスト26とアドレス帳群30を示す図である。この図において、会員リスト26は、このSNSサーバ2が提供する所定のサービス(個人情報利用型のソーシャルネットワークサービス)のすべての利用者(会員)の情報を保持する。会員の情報は、少なくとも、会員の識別情報(図では便宜的に“A”、“B”、“C”・・・・とするが、これは説明の便宜である。重複しないユニークな情報であればよい。)と、各会員の個人情報とを含む。個人情報は、各々の会員を個別に区別することができるユニークなもの(一般的には電話番号やメールアドレスなどであるが、ここでは電話番号を例にする。)である。なお、個人情報については、上記のユニークなもの以外に、たとえば、住所や年齢、性別などを加えてもよい。 FIG. 3 is a diagram showing the member list 26 and the address book group 30 stored in the storage unit 25 of the SNS server 2. In this figure, the member list 26 holds information of all users (members) of a predetermined service (personal information use type social network service) provided by the SNS server 2. The member information is at least member identification information (in the figure, “A”, “B”, “C”... For convenience, but this is for convenience of explanation. Unique information that does not overlap. And each member's personal information. The personal information is unique information that can distinguish each member individually (generally, it is a telephone number or an e-mail address, but here a telephone number is taken as an example). In addition, about personal information, you may add an address, age, sex, etc. other than said unique thing, for example.

 アドレス帳群30は各会員の端末3、4、5・・・・から送信された個人情報を会員ごとのアドレス帳27、28、29・・・・に区分けして保持する。各々のアドレス帳27、28、29・・・・には1乃至複数の通話相手の個人情報が書き込まれており、たとえば、図示の例では、Aさんのアドレス帳27には、会員リスト26の識別情報Aに紐付けされた識別情報A1が付与された一の通話相手の「電話番号」と「暗号化電話番号対」が書き込まれており、さらに、同じく会員リスト26の識別情報Aに紐付けされた識別情報A2が付与された二の通話相手の「電話番号」と「暗号化電話番号対」が書き込まれている。 The address book group 30 holds the personal information transmitted from each member's terminals 3, 4, 5,... Divided into address books 27, 28, 29,. Each address book 27, 28, 29... Contains personal information of one or more call partners. For example, in the example shown in FIG. The “telephone number” and “encrypted telephone number pair” of the other party to whom the identification information A1 associated with the identification information A is assigned are written, and the identification information A in the member list 26 is also associated with the identification information A1. The “telephone number” and “encrypted phone number pair” of the second call partner to which the attached identification information A2 is given are written.

 ここで、「電話番号」は“平文”の情報、つまり、テキスト文字等で構成された可読情報であるが、一方の「暗号化電話番号対」は所定の秘密鍵で暗号化された非可読性の情報であり、その秘密鍵に対応する公開鍵を使用して復号しない限り、中身を知ることができない秘匿情報である。 Here, “telephone number” is “plaintext” information, that is, readable information composed of text characters, etc., whereas one “encrypted telephone number pair” is non-readable by being encrypted with a predetermined secret key. It is secret information that cannot be known unless it is decrypted using a public key corresponding to the secret key.

 「暗号化電話番号対」は一対の電話番号を同梱して所定の秘密鍵で暗号化したものである。一対の電話番号の一方はアドレス帳の持ち主の電話番号であり、他方は通話相手の電話番号である。具体的に説明する。Aさんのアドレス帳27に書き込まれている一の通話相手をBさんとすると、「暗号化電話番号対」に同梱されている一方の電話番号はAさんの電話番号(090-AAA-AAAA)であり、他方の電話番号はBさんの電話番号(090-BBB-BBBB)である。そして、これら二つの電話番号(090-AAA-AAAAと090-BBB-BBBB)を同梱してBさんの秘密鍵で暗号化したものが「暗号化電話番号対」である。 “Encrypted phone number pair” is a pair of phone numbers enclosed and encrypted with a predetermined secret key. One of the pair of telephone numbers is the telephone number of the owner of the address book, and the other is the telephone number of the other party. This will be specifically described. Assuming that Mr. B is the other party in the address book 27 of Mr. A, one of the phone numbers enclosed in the “encrypted phone number pair” is the phone number of Mr. A (090-AAA-AAAAA). The other telephone number is Mr. B's telephone number (090-BBB-BBBB). The two phone numbers (090-AAA-AAAA and 090-BBB-BBBB) are bundled and encrypted with Mr. B's private key is an “encrypted phone number pair”.

 次に、実施形態の動作を説明する。なお、以下では、Aさんが自分の端末3に、新たな通話相手としてBさんの電話番号を追加登録する場合を例にして説明する。
〔端末間の情報交換〕
 図4は、端末間の情報交換を示す図である。この図に示すように、まず、Aさんが自分の端末3の操作部12を操作して通話相手のBさんの電話番号(090-BBB-BBBB)を入力すると、端末3の制御部13は、その入力情報、つまり、通話相手のBさんの電話番号(090-BBB-BBBB)を自端末内のアドレス帳18に登録する(ステップS1)とともに、自電話番号記憶領域17から自電話番号(090-AAA-AAAA)を読み出し、その電話番号31を平文でBさんの端末4に送信する(ステップS2)。
Next, the operation of the embodiment will be described. In the following, a case where Mr. A additionally registers a phone number of Mr. B as a new call partner in his / her terminal 3 will be described as an example.
[Information exchange between terminals]
FIG. 4 is a diagram showing information exchange between terminals. As shown in this figure, first, when Mr. A operates the operation unit 12 of his / her terminal 3 and inputs the telephone number (090-BBB-BBBB) of Mr. B, the control unit 13 of the terminal 3 The input information, that is, the telephone number (090-BBB-BBBB) of the call partner B is registered in the address book 18 in the own terminal (step S1), and the own telephone number (from the own telephone number storage area 17) (090-AAA-AAAAA) is read, and the telephone number 31 is transmitted to Mr. B's terminal 4 in plain text (step S2).

 Bさんの端末4の制御部13は、Aさんの端末3からの電話番号31の受信に応答して、自端末の自電話番号記憶領域17から自電話番号(090-BBB-BBBB)を読み出すとともに、同じく自端末の秘密鍵記憶領域19と公開鍵記憶領域20からそれぞれ自分(Bさん)の秘密鍵と公開鍵を読み出す(ステップS3)。 In response to receiving the telephone number 31 from Mr. A's terminal 3, the control unit 13 of Mr. B's terminal 4 reads out the own telephone number (090-BBB-BBBB) from the own telephone number storage area 17 of the own terminal. At the same time, the private key and the public key of the user (Mr. B) are read out from the private key storage area 19 and the public key storage area 20 of the terminal (step S3).

 次いで、Bさんの端末4の制御部13は、自電話番号32(090-BBB-BBBB)と自分(Bさん)の公開鍵33をAさんの端末3に送信し(ステップS4、ステップS5)、さらに、Aさんの電話番号と自分(Bさん)の電話番号とを同梱して、自分(Bさん)の秘密鍵でその同梱データを暗号化して暗号化電話番号対34を生成(ステップS6)した後、その暗号化電話番号対34をAさんの端末3に送信し(ステップS7)する。 Next, the control unit 13 of Mr. B's terminal 4 transmits his own telephone number 32 (090-BBB-BBBB) and his own (Mr. B) public key 33 to Mr. A's terminal 3 (steps S4 and S5). In addition, A's phone number and my (B's) phone number are bundled, and the enclosed data is encrypted with my (B's) private key to generate an encrypted phone number pair 34 ( After step S6), the encrypted telephone number pair 34 is transmitted to Mr. A's terminal 3 (step S7).

 Aさんの端末3の制御部13は、Bさんの端末4からの上記三つのデータ(電話番号32、公開鍵33及び暗号化電話番号対34)を受信すると、次に、公開鍵33を用いて暗号化電話番号対34を復号し(ステップS8)、復号されたBさんの電話番号と、Bさんの端末4から受信した電話番号32とを照合(ステップS9)して両者が一致しているか否かを判定する(ステップS10)。そして、一致している場合は、次に説明するSNSサーバへの登録処理(ステップS11)を実行してから処理を終了する一方、一致していなかった場合は、Bさんの端末4から受信した電話番号32が間違っている(または不正である)と判断し、先のステップS1で自端末のアドレス帳18に登録したBさんの電話番号を削除して処理を終了する。 Upon receiving the above three data (telephone number 32, public key 33 and encrypted telephone number pair 34) from Mr. B's terminal 4, the control unit 13 of Mr. A's terminal 3 uses the public key 33 next. The encrypted telephone number pair 34 is decrypted (step S8), and the decrypted B's telephone number and the telephone number 32 received from B's terminal 4 are collated (step S9). It is determined whether or not (step S10). If they match, the process ends after executing registration processing (step S11) to the SNS server to be described next. On the other hand, if they do not match, they are received from Mr. B's terminal 4. It is determined that the telephone number 32 is wrong (or wrong), and Mr. B's telephone number registered in the address book 18 of the terminal is deleted in the previous step S1, and the process is terminated.

〔SNSサーバ2への登録処理〕
 図5は、SNSサーバ2への登録処理を示す図である。この図に示すように、Aさんの端末3の制御部13は、Bさんの端末4の電話番号35(090-BBB-BBBB)と暗号化電話番号対36(図4の暗号化電話番号対34と同じもの)をSNSサーバ2に送信する(ステップS13、ステップS14)。
[Registration process to SNS server 2]
FIG. 5 is a diagram showing a registration process to the SNS server 2. As shown in this figure, the control unit 13 of Mr. A's terminal 3 sends the telephone number 35 (090-BBB-BBBB) of Mr. B's terminal 4 and the encrypted telephone number pair 36 (the encrypted telephone number pair of FIG. 4). (Same as 34) is transmitted to the SNS server 2 (step S13, step S14).

 SNSサーバ2の制御部23は、Aさんの端末3から送信されてきた、Bさんの端末4の電話番号35(090-BBB-BBBB)と暗号化電話番号対36を記憶部25のAさんのアドレス帳27に追加登録し(ステップS15)。次いで、記憶部25の会員リスト26を検索して、Bさんの端末4の電話番号35(090-BBB-BBBB)が登録済みであるか否か、つまり、Bさんが会員として登録されているか否かを判定する(ステップS16)。 The control unit 23 of the SNS server 2 stores the telephone number 35 (090-BBB-BBBB) of the terminal 4 of Mr. B and the encrypted telephone number pair 36 transmitted from the terminal 3 of Mr. A in the storage unit 25. Are additionally registered in the address book 27 (step S15). Next, the member list 26 in the storage unit 25 is searched, and whether or not the telephone number 35 (090-BBB-BBBB) of Mr. B's terminal 4 has been registered, that is, whether Mr. B is registered as a member. It is determined whether or not (step S16).

 そして、会員として登録されていなかった場合は、先のステップS15でAさんのアドレス帳27に追加登録されたBさんの情報(電話番号35と暗号化電話番号対36)を削除(ステップS17)して処理を終了する。 If it is not registered as a member, the information of Mr. B (phone number 35 and encrypted phone number pair 36) additionally registered in the address book 27 of Mr. A in the previous step S15 is deleted (step S17). To finish the process.

 一方、登録されていた場合は、まず、Bさんの公開鍵を公開鍵サーバ6に要求(ステップS18)し、公開鍵サーバ6からBさんの公開鍵を受領(ステップS19)すると、その公開鍵を用いて暗号化電話番号対36を復号する(ステップS20)。次いで、復号されたBさんの電話番号と、Aさんの端末3から受信した電話番号35とを照合(ステップS21)して両者が一致しているか否かを判定し(ステップS22)、一致している場合は、AさんとBさんの友達関係を構築するとともに、その旨をAさんの端末3に通知(ステップS23)してから処理を終了する。 On the other hand, if it is registered, first, Mr. B's public key is requested to the public key server 6 (step S18), and when Mr. B's public key is received from the public key server 6 (step S19), the public key is received. Is used to decrypt the encrypted telephone number pair 36 (step S20). Next, the decrypted phone number of B and the phone number 35 received from Mr. A's terminal 3 are collated (step S21) to determine whether or not they match (step S22). If this is the case, a friendship between Mr. A and Mr. B is established, and a message to that effect is sent to Mr. A's terminal 3 (step S23), and the process is terminated.

〔友達関係の構築〕
 ステップS23における友達関係の構築について具体的に説明する。SNSサーバ2では、各々の端末3、4、5・・・・から収集したアドレス帳27、28、29・・・・のデータに対してユーザマッチング処理を行い、知人候補を抽出し、これをもとにソーシャルネットワークを構築する。たとえば、端末3のアドレス帳18に、Bさんの電話番号(090-BBB-BBBB)が登録された場合の手順を次に示す。
(1)まず、SNSサーバ2は、端末3から収集したアドレス帳27を順番にスキャンしていく。
(2)次いで、SNSサーバ2は、Bさんの電話番号(090-BBB-BBBB)のエントリを処理する際、まず、平文の電話番号(090-BBB-BBBB)をキーにして会員リスト26を検索し、この電話番号(090-BBB-BBBB)が会員リスト26に登録されていることを確認する。
(3)次に、SNSサーバ2は、平文の電話番号(090-BBB-BBBB)をキーにして公開鍵配布サーバ6からBさんの公開鍵を入手する。
(4)次に、SNSサーバ2は、Bさんの秘密鍵で暗号化されているデータ(Aさんの電話番号とBさんの電話番号を同梱してBさんの秘密鍵で暗号化したデータ)をBさんの公開鍵で復号し、Aさんの電話番号とBさんの電話番号の正当性を確認する。
(5)そして、正当性が確認された場合に、SNSサーバ2は、Aさんの端末3に対して、端末4の利用者(Bさん)が知人候補であることを通知する。
[Building friendships]
The construction of the friend relationship in step S23 will be specifically described. In the SNS server 2, user matching processing is performed on the data of the address books 27, 28, 29,... Collected from the respective terminals 3, 4, 5,. Build a social network. For example, the procedure in the case where Mr. B's telephone number (090-BBB-BBBB) is registered in the address book 18 of the terminal 3 will be described below.
(1) First, the SNS server 2 sequentially scans the address book 27 collected from the terminal 3.
(2) Next, when processing the entry of Mr. B's telephone number (090-BBB-BBBB), the SNS server 2 first uses the plaintext telephone number (090-BBB-BBBB) as a key to retrieve the member list 26. A search is made to confirm that this telephone number (090-BBB-BBBB) is registered in the member list 26.
(3) Next, the SNS server 2 obtains Mr. B's public key from the public key distribution server 6 using the plaintext telephone number (090-BBB-BBBB) as a key.
(4) Next, the SNS server 2 encrypts data encrypted with Mr. B's secret key (data encrypted with Mr. B's secret key by enclosing the phone number of Mr. A and Mr. B). ) With Mr. B's public key, and the validity of Mr. A's phone number and Mr. B's phone number is confirmed.
(5) When the validity is confirmed, the SNS server 2 notifies the terminal 3 of Mr. A that the user (Mr. B) of the terminal 4 is an acquaintance candidate.

 以上のとおり、実施形態によれば、友達関係を構築するための基礎となる個人情報(実施形態では電話番号)にPKI(公開鍵暗号基盤)を適用したので、当該個人情報の正当性を保証し、間違った個人情報や悪意を持った個人情報を登録できないようにすることができる。このため、SNSサーバ2は、正当性が保証された個人情報を使用して正しい友達関係を構築することができ、健全なソーシャルネットワーク環境を提供することができる。 As described above, according to the embodiment, since the PKI (public key encryption infrastructure) is applied to the personal information (phone number in the embodiment) that is the basis for establishing the friendship, the validity of the personal information is guaranteed. It is possible to prevent registration of wrong personal information or malicious personal information. For this reason, the SNS server 2 can construct a correct friend relationship using the personal information whose validity is guaranteed, and can provide a healthy social network environment.

 具体的に説明すると、図4の「端末間の情報交換」において、Bさんの電話番号(090-BBB-BBBB)を平文(電話番号32)で端末4から端末3に送信する際に、同時に、Bさんの公開鍵33と暗号化電話番号対34を送信している。ここで、暗号化電話番号対34は、Aさんの電話番号とBさんの電話番号とを同梱してBさんの秘密鍵でその同梱データを暗号化したものである。一般的に端末間のデータ伝送は無線や有線等の通信媒体を介して行われるため、たとえ、その通信媒体がデジタルであったとしても、第三者による盗聴の可能性を否定しきれず、データの改竄が絶対にないとは言い切れない。とりわけ平文のデータ(上述の電話番号32)にあってはその心配がつきまとう。 Specifically, in the “information exchange between terminals” in FIG. 4, when transmitting Mr. B's telephone number (090-BBB-BBBB) from the terminal 4 to the terminal 3 in plain text (phone number 32), , B's public key 33 and encrypted telephone number pair 34 are transmitted. Here, the encrypted telephone number pair 34 is obtained by bundling A's telephone number and B's telephone number and encrypting the bundled data with B's private key. In general, data transmission between terminals is performed via a wireless or wired communication medium. Even if the communication medium is digital, the possibility of eavesdropping by a third party cannot be ruled out. It cannot be said that there is absolutely no tampering. This is especially true for plaintext data (telephone number 32 described above).

 実施形態では、万が一、電話番号32が改竄された場合に、その改竄を発見できるというメリットがある。これは、平文の電話番号32と一緒に、Bさんの公開鍵33と暗号化電話番号対34を端末4から端末3に送信しているからであり、その公開鍵33を用いて暗号化電話番号対34を復号し、復号後のBさんの電話番号と平文の電話番号32とを照合すればよいからである。照合が一致していれば「改竄なし」、一致していなければ「改竄あり」を判定することができる。 The embodiment has an advantage that if the telephone number 32 is falsified, the falsification can be found. This is because the public key 33 and the encrypted telephone number pair 34 of Mr. B are transmitted from the terminal 4 to the terminal 3 together with the plaintext telephone number 32, and the encrypted telephone is transmitted using the public key 33. This is because it is only necessary to decrypt the number pair 34 and match the decrypted phone number of Mr. B with the plaintext phone number 32. If the collation matches, “no tampering” can be determined, and if they do not match, “tampering” can be determined.

 このメリット(改竄の発見)は実施形態の主眼ではない。実施形態のような構成を採用することによって得られる付随的なメリットである。主たるメリットは、SNSサーバ2への間違った個人情報や悪意を持った個人情報を登録できないようにしたことにある。 This advantage (discovery of tampering) is not the main point of the embodiment. This is an attendant advantage obtained by adopting the configuration as in the embodiment. The main merit is that incorrect personal information or malicious personal information cannot be registered in the SNS server 2.

 たとえば、Aさんのアドレス帳に間違った電話番号「090-XXX-XXXX」が登録された場合を考える。この場合、従来であれば、サーバは、他のサービス利用者の中に当該電話番号を持っている者が居るかどうかを調べ、もし、同じ電話番号の利用者(Xさん)がいた場合には、AさんとXさんを友達関係として構築するが、「090-XXX-XXXX」は間違った電話番号であるから、本来、AさんとXさんは無関係(見知らぬ者同士)とすべきであり、構築された友達関係は正しくない。 For example, consider the case where an incorrect telephone number “090-XXX-XXXX” is registered in Mr. A's address book. In this case, conventionally, the server checks whether there is a person having the telephone number among other service users, and if there is a user (Mr. X) having the same telephone number. Builds friendship between Mr. A and Mr. X, but “090-XXX-XXXX” is the wrong phone number, so Mr. A and Mr. X should be unrelated (unknown strangers) The friendship built is not correct.

 実施形態では、このような正しくない友達関係の構築を回避することができる。これは、端末3からSNSサーバ2へ、Bさんの個人情報(電話番号32)と一緒に暗号化電話番号対34を送信しているからであり、SNSサーバ2は、そのBさんの個人情報(電話番号32)を手掛かりにして公開鍵配布サーバ6に対してBさんの公開鍵を要求するからである。間違った個人情報をSNSサーバ2に登録しようとすると、当然ながら、そのような間違った個人情報に対応する公開鍵が公開鍵配布サーバ6に存在しないため、公開鍵の配布を受けることができない。したがって、SNSサーバ2への間違った個人情報の登録を回避することができるというメリットが得られる。 In the embodiment, it is possible to avoid the construction of such an incorrect friendship. This is because the encrypted telephone number pair 34 is transmitted from the terminal 3 to the SNS server 2 together with Mr. B's personal information (telephone number 32). This is because Mr. B's public key is requested to the public key distribution server 6 using (phone number 32) as a clue. If an attempt is made to register wrong personal information in the SNS server 2, naturally, since the public key corresponding to such wrong personal information does not exist in the public key distribution server 6, the public key cannot be distributed. Therefore, there is an advantage that registration of wrong personal information in the SNS server 2 can be avoided.

 かかるメリットは、悪意を持った者によって適当な個人情報が登録された場合や、何らかの手段で不正に知り得た個人情報が登録された場合も同じである。同様に、そのような個人情報に対応する公開鍵が公開鍵配布サーバ6に存在しないため、公開鍵の配布を受けることができないからである。したがって、SNSサーバ2への不正な個人情報の登録も回避することができるというメリットが得られる。 This merit is the same when appropriate personal information is registered by a malicious person or when personal information that is illegally known by some means is registered. Similarly, since the public key corresponding to such personal information does not exist in the public key distribution server 6, the public key cannot be distributed. Therefore, the merit that registration of unauthorized personal information to the SNS server 2 can also be avoided.

 なお、実施形態では、SNSサーバ2に登録する個人情報を電話番号としているが、これに限定されない。SNSサービスの利用者(会員)を識別できる固有の情報であればよく、たとえば、メールアドレスなどであってもよい。また、実施形態のアドレス帳を電話帳と読み替えてもよく、あるいは個人情報リストなどと読み替えてもよい。 In the embodiment, the personal information registered in the SNS server 2 is a telephone number. However, the present invention is not limited to this. Any unique information that can identify the user (member) of the SNS service may be used. For example, an e-mail address may be used. Further, the address book of the embodiment may be read as a telephone book, or may be read as a personal information list.

 または、アドレス帳で取り扱うデータに「データ交換日時」を追加してもよい。そして、SNSサーバ2で個人情報(電話番号等)の正当性チェックをするフェーズ(図5のステップS21参照)にデータ交換日時のチェックを追加し、ある基準よりも古いデータを排除するようにしてもよい。このようにすると、電話番号の再利用問題、すなわち、契約解除された電話番号を新たな契約者に割り振ることによって生じる不都合(悪意はないが結果として他人のなりすましとなってしまうケース)に対応することができる。 Or, “data exchange date” may be added to the data handled in the address book. Then, a data exchange date / time check is added to the phase (see step S21 in FIG. 5) in which the SNS server 2 checks the validity of personal information (telephone number etc.), and data older than a certain standard is excluded. Also good. In this way, the telephone number reuse problem, that is, the inconvenience caused by allocating the canceled telephone number to a new contractor (the case where there is no malicious but the result of impersonating another person) is addressed. be able to.

 この出願は、2012年12月17日に出願された日本出願特願2012-274221号を基礎とする優先権を主張し、その開示を全てここに取り込む。 This application claims priority based on Japanese Patent Application No. 2012-274221 filed on December 17, 2012, the entire disclosure of which is incorporated herein.

 以下、本発明の特徴を付記する。
 上記の実施形態の一部又は全部は、以下の付記のようにも記載されうるが、以下には限られない。
(付記1)
 図6は、付記1の構成図である。
 付記1は、一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成手段100(実施形態の制御部13に相当)と、
 前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成手段101(実施形態の制御部13に相当)と、
 前記二の利用者の個人情報を手掛かりにして公開鍵配布手段102(実施形態の公開鍵配布サーバ6に相当)に前記二の利用者の公開鍵を要求する公開鍵要求手段103(実施形態の制御部23に相当)と、
 前記公開鍵配布手段102から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号手段104(実施形態の制御部23に相当)と、
 前記復号手段104によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定手段105(実施形態の制御部23に相当)と、
 前記判定手段105の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築手段106(実施形態の制御部23に相当)と
 を備えたことを特徴とする個人情報管理システム107である。
(付記2)
 付記2は、一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成手段と、
 前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成手段と
 を有する端末を含むことを特徴とする個人情報管理システムである。
(付記3)
 付記3は、任意の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記任意の利用者の公開鍵を要求する公開鍵要求手段と、
 前記公開鍵配布手段から前記任意の利用者の公開鍵が配布された場合に当該公開鍵を用い、前記任意の利用者の個人情報と他の利用者の個人情報とを同梱して前記任意の利用者の秘密鍵で暗号化した暗号化データを復号する復号手段と、
 前記復号手段によって復号されたデータと前記任意の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定手段と、
 前記判定手段の判定結果が肯定の場合に前記任意の利用者と前記他の利用者の友達関係を構築する構築手段と
 を有するサーバを含むことを特徴とする個人情報管理システムである。
(付記4)
 付記4は、一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成工程と、
 前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成工程と、
 前記二の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記二の利用者の公開鍵を要求する公開鍵要求工程と、
 前記公開鍵配布手段から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号工程と、
 前記復号工程によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定工程と、
 前記判定工程の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築工程と
 を含むことを特徴とする個人情報管理方法である。
(付記5)
 付記5は、コンピュータに、
 一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成手段、
 前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成手段、
 前記二の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記二の利用者の公開鍵を要求する公開鍵要求手段、
 前記公開鍵配布手段から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号手段、
 前記復号手段によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定手段、
 前記判定手段の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築手段
 としての機能を与えることを特徴とするプログラムである。
The features of the present invention will be described below.
A part or all of the above-described embodiment can be described as in the following supplementary notes, but is not limited thereto.
(Appendix 1)
FIG. 6 is a configuration diagram of Supplementary Note 1.
Appendix 1 includes bundled data generation means 100 (corresponding to the control unit 13 of the embodiment) that generates bundled data that bundles personal information of one user and personal information of a second user;
Encrypted data generation means 101 (corresponding to the control unit 13 of the embodiment) for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user;
Using the personal information of the second user as a clue, public key requesting means 103 (of the embodiment) for requesting the public key of the second user to the public key distribution means 102 (corresponding to the public key distribution server 6 of the embodiment). Equivalent to the control unit 23),
Decryption means 104 (corresponding to the control unit 23 of the embodiment) for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distribution means 102;
A determination unit 105 (corresponding to the control unit 23 in the embodiment) that compares the data decrypted by the decryption unit 104 with the personal information of the two users and determines whether or not they match;
And a construction means 106 (corresponding to the control unit 23 in the embodiment) for constructing a friendship relationship between the one user and the second user when the judgment result of the judgment means 105 is affirmative. Personal information management system 107.
(Appendix 2)
Appendix 2 includes bundled data generation means for generating bundled data including the personal information of one user and the personal information of the second user;
A personal information management system comprising: a terminal having encrypted data generation means for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user.
(Appendix 3)
Appendix 3 is a public key requesting means for requesting the public key of any user from a predetermined public key distribution means using the personal information of the arbitrary user as a clue;
When the public key of the arbitrary user is distributed from the public key distribution means, the public key is used, and the personal information of the arbitrary user and the personal information of another user are bundled with the arbitrary key Decryption means for decrypting the encrypted data encrypted with the user's private key;
A determination means for comparing the data decrypted by the decryption means and the personal information of the arbitrary user to determine whether or not they match,
A personal information management system comprising: a server having a construction means for constructing a friendship relationship between the arbitrary user and the other user when the judgment result of the judgment means is affirmative.
(Appendix 4)
Appendix 4 includes a bundled data generation process for generating bundled data including the personal information of one user and the personal information of the second user;
An encrypted data generation step for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user;
A public key requesting step of requesting the public key of the second user from a predetermined public key distribution means using the personal information of the second user as a clue;
A decrypting step of decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distributing means;
A determination step of comparing the data decoded by the decoding step with the personal information of the two users to determine whether or not both match;
A personal information management method comprising: a construction step of constructing a friendship between the first user and the second user when the determination result of the determination step is affirmative.
(Appendix 5)
Appendix 5
A bundled data generation means for generating bundled data including the personal information of one user and the personal information of a second user;
Encrypted data generation means for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user;
Public key requesting means for requesting the public key of the second user to a predetermined public key distribution means using the personal information of the second user as a clue;
Decryption means for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distribution means;
A determination means for comparing the data decrypted by the decryption means with the personal information of the two users to determine whether or not they match;
When the determination result of the determination means is affirmative, the program provides a function as a construction means for constructing a friendship between the first user and the second user.

 100 同梱データ生成手段
 101 暗号化データ生成手段
 102 公開鍵配布手段
 103 公開鍵要求手段
 104 復号手段
 105 判定手段
 106 構築手段
 107 個人情報管理システム
100 enclosed data generation means 101 encrypted data generation means 102 public key distribution means 103 public key request means 104 decryption means 105 determination means 106 construction means 107 personal information management system

Claims (5)

 一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成手段と、
 前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成手段と、
 前記二の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記二の利用者の公開鍵を要求する公開鍵要求手段と、
 前記公開鍵配布手段から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号手段と、
 前記復号手段によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定手段と、
 前記判定手段の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築手段と
 を備えたことを特徴とする個人情報管理システム。
A bundled data generating means for generating bundled data including the personal information of one user and the personal information of the second user;
Encrypted data generating means for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user;
Public key requesting means for requesting the public key of the second user to a predetermined public key distribution means using the personal information of the second user as a clue;
Decryption means for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distribution means;
A determination means for comparing the data decrypted by the decryption means and the personal information of the two users to determine whether or not they match;
A personal information management system comprising: a construction means for constructing a friendship between the first user and the second user when the judgment result of the judgment means is affirmative.
 一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成手段と、
 前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成手段と
 を有する端末を含むことを特徴とする個人情報管理システム。
A bundled data generating means for generating bundled data including the personal information of one user and the personal information of the second user;
A personal information management system comprising: a terminal having: encrypted data generation means for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user.
 任意の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記任意の利用者の公開鍵を要求する公開鍵要求手段と、
 前記公開鍵配布手段から前記任意の利用者の公開鍵が配布された場合に当該公開鍵を用い、前記任意の利用者の個人情報と他の利用者の個人情報とを同梱して前記任意の利用者の秘密鍵で暗号化した暗号化データを復号する復号手段と、
 前記復号手段によって復号されたデータと前記任意の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定手段と、
 前記判定手段の判定結果が肯定の場合に前記任意の利用者と前記他の利用者の友達関係を構築する構築手段と
 を有するサーバを含むことを特徴とする個人情報管理システム。
Public key requesting means for requesting the public key of the arbitrary user from a predetermined public key distribution means using the personal information of the arbitrary user as a clue;
When the public key of the arbitrary user is distributed from the public key distribution means, the public key is used, and the personal information of the arbitrary user and the personal information of another user are bundled with the arbitrary key Decryption means for decrypting the encrypted data encrypted with the user's private key;
A determination means for comparing the data decrypted by the decryption means and the personal information of the arbitrary user to determine whether or not they match,
The personal information management system characterized by including the server which has the construction | assembly means which builds the friend relationship of the said arbitrary user and said other user when the determination result of the said determination means is affirmation.
 一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成工程と、
 前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成工程と、
 前記二の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記二の利用者の公開鍵を要求する公開鍵要求工程と、
 前記公開鍵配布手段から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号工程と、
 前記復号工程によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定工程と、
 前記判定工程の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築工程と
 を含むことを特徴とする個人情報管理方法。
A bundled data generation process for generating bundled data including the personal information of one user and the personal information of a second user;
An encrypted data generation step for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user;
A public key requesting step of requesting the public key of the second user from a predetermined public key distribution means using the personal information of the second user as a clue;
A decrypting step of decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distributing means;
A determination step of comparing the data decoded by the decoding step with the personal information of the two users to determine whether or not both match;
A personal information management method comprising: a construction step of constructing a friendship between the first user and the second user when the determination result of the determination step is affirmative.
 コンピュータに、
 一の利用者の個人情報と二の利用者の個人情報とを同梱した同梱データを生成する同梱データ生成手段、
 前記同梱データを前記二の利用者の秘密鍵で暗号化した暗号化データを生成する暗号化データ生成手段、
 前記二の利用者の個人情報を手掛かりにして所定の公開鍵配布手段に前記二の利用者の公開鍵を要求する公開鍵要求手段、
 前記公開鍵配布手段から前記二の利用者の公開鍵が配布された場合に当該公開鍵を用いて前記暗号化データを復号する復号手段、
 前記復号手段によって復号されたデータと前記二の利用者の個人情報とを照合して両者が一致しているか否かを判定する判定手段、
 前記判定手段の判定結果が肯定の場合に前記一の利用者と前記二の利用者の友達関係を構築する構築手段
 としての機能を与えることを特徴とするプログラム。
On the computer,
A bundled data generation means for generating bundled data including the personal information of one user and the personal information of a second user;
Encrypted data generating means for generating encrypted data obtained by encrypting the bundled data with the secret key of the second user;
Public key requesting means for requesting the public key of the second user to a predetermined public key distribution means using the personal information of the second user as a clue;
Decryption means for decrypting the encrypted data using the public key when the public key of the second user is distributed from the public key distribution means;
A determination unit that compares the data decrypted by the decryption unit with the personal information of the second user to determine whether or not they match;
A program which provides a function as a construction means for constructing a friendship between the first user and the second user when the judgment result of the judgment means is affirmative.
PCT/JP2013/004099 2012-12-17 2013-07-02 Personal information management system, personal information management method and program Ceased WO2014097502A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2012274221 2012-12-17
JP2012-274221 2012-12-17

Publications (1)

Publication Number Publication Date
WO2014097502A1 true WO2014097502A1 (en) 2014-06-26

Family

ID=50977872

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2013/004099 Ceased WO2014097502A1 (en) 2012-12-17 2013-07-02 Personal information management system, personal information management method and program

Country Status (1)

Country Link
WO (1) WO2014097502A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003258786A (en) * 2002-02-27 2003-09-12 Nippon Telegr & Teleph Corp <Ntt> Public key certificate search device, public key certificate search method, computer program, and recording medium recording computer program
JP2006101469A (en) * 2004-09-29 2006-04-13 Microsoft Corp Terminal for exchanging electronic business card
JP2011081670A (en) * 2009-10-08 2011-04-21 Sugao:Kk Personal information management system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003258786A (en) * 2002-02-27 2003-09-12 Nippon Telegr & Teleph Corp <Ntt> Public key certificate search device, public key certificate search method, computer program, and recording medium recording computer program
JP2006101469A (en) * 2004-09-29 2006-04-13 Microsoft Corp Terminal for exchanging electronic business card
JP2011081670A (en) * 2009-10-08 2011-04-21 Sugao:Kk Personal information management system

Similar Documents

Publication Publication Date Title
EP3526721B1 (en) Method, device and system for validating sensitive user data transactions within trusted circle
KR101974452B1 (en) Methods and system for managing personal information based on programmable blockchain and one-id
KR102016730B1 (en) Authentification methods and system based on programmable blockchain and one-id
JP4866863B2 (en) Security code generation method and user device
US11388174B2 (en) System and method for securing a communication channel
US9338163B2 (en) Method using a single authentication device to authenticate a user to a service provider among a plurality of service providers and device for performing such a method
EP2687036B1 (en) Permitting access to a network
US9946896B2 (en) Attribute information provision method and attribute information provision system
US20190036914A1 (en) System and method for temporary password management
US8347407B2 (en) Authority management method, system therefor, and server and information equipment terminal used in the system
KR100918838B1 (en) Apparatus and method for sharing identity in ubiquitous environment
JP2008312048A (en) Authentication method for information terminals
JP4803145B2 (en) Key sharing method and key distribution system
US8397281B2 (en) Service assisted secret provisioning
CN101083843A (en) Method and system for confirming terminal identity in mobile terminal communication
JP2009510644A (en) Method and configuration for secure authentication
WO2003101042A1 (en) Information processing system and method, information processing device and method, recording medium, and program
EP2805298B1 (en) Methods and apparatus for reliable and privacy protecting identification of parties&#39; mutual friends and common interests
JP6813030B2 (en) Communications system
CN115987597A (en) Key updating method and system based on software, terminal equipment and virtual server
JP2020092287A (en) Communication device, communication method, and communication program
JP5388088B2 (en) Communication terminal device, management device, communication method, management method, and computer program.
US20110150222A1 (en) Portable electronic device and associated method for making information available
KR20210049421A (en) Method for processing request based on user authentication using blockchain key and system applying same
JP2005318269A (en) Electronic certificate management system, electronic certificate management method, and server

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13865538

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13865538

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP