WO2024195019A1 - 端末、システム、端末の制御方法及び記憶媒体 - Google Patents
端末、システム、端末の制御方法及び記憶媒体 Download PDFInfo
- Publication number
- WO2024195019A1 WO2024195019A1 PCT/JP2023/011071 JP2023011071W WO2024195019A1 WO 2024195019 A1 WO2024195019 A1 WO 2024195019A1 JP 2023011071 W JP2023011071 W JP 2023011071W WO 2024195019 A1 WO2024195019 A1 WO 2024195019A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- certificate
- digital wallet
- terminal
- biometric information
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Definitions
- the present invention relates to a terminal, a system, a terminal control method, and a storage medium.
- Patent Document 1 discloses a device and method for using biometric technology to ensure secure transactions using blockchain technology. Furthermore, Patent Document 1 mitigates at least some security-related issues in conventional blockchain digital wallets, specifically blockchain digital wallets that cannot reliably authenticate user identity information. Furthermore, Patent Document 1 presents a method and apparatus for using authentication and data protection to implement a blockchain offline wallet using biometrics.
- the digital content stored in the digital wallet (for example, a certificate such as a student ID card) is presented to a certificate verifier.
- the verifier checks the authenticity of the presented digital content. In other words, the verifier checks that the name of the user in front of them matches the name of the digital wallet holder.
- biometric authentication is used to verify the identity of the user and the account holder.
- biometric authentication is used to confirm that the service user and the account holder of the digital wallet are the same person.
- the verifier may provide services to a user other than the digital wallet holder. In other words, if someone else registers a false name for the holder when opening a digital wallet, the verifier will not be able to verify the authenticity of the digital content provided (for example, a certificate such as a student ID card).
- the main objective of the present invention is to provide a terminal, a system, a terminal control method, and a storage medium that contribute to ensuring the authenticity of content provided by a digital wallet.
- a terminal in accordance with a first aspect of the present invention, includes: identity verification means for verifying the identity of an operator who opens a digital wallet using biometric information obtained from an identification card and the biometric information of the operator who opens the digital wallet; and storage means for storing the biometric information obtained from the identification card or the biometric information of the operator who opens the digital wallet as the biometric information of the digital wallet holder if the identity verification is successful.
- a system in accordance with a second aspect of the present invention, includes a terminal and a business operator terminal used when a service provider provides a service to a user, the terminal comprising: identity verification means for verifying the identity of the creator of the digital wallet using biometric information obtained from an identification card and the biometric information of the creator who opens the digital wallet; storage means for storing the biometric information obtained from the identification card or the biometric information of the creator who opens the digital wallet as the biometric information of the digital wallet holder if the identity verification is successful; and usage control means for providing the content stored in the digital wallet and the biometric information of the digital wallet holder to the business operator terminal.
- a method for controlling a terminal in which the terminal performs identity verification of the creator of a digital wallet using biometric information obtained from an identification card and the biometric information of the creator of the digital wallet, and if the identity verification is successful, stores the biometric information obtained from the identification card or the biometric information of the creator of the digital wallet as the biometric information of the digital wallet holder.
- a computer-readable storage medium stores a program for causing a computer installed in a terminal to execute the following processes: a process for verifying the identity of an operator who opens a digital wallet using biometric information obtained from an identification card and the biometric information of the operator who opens the digital wallet; and, if the identity verification is successful, a process for storing the biometric information obtained from the identification card or the biometric information of the operator who opens the digital wallet as the biometric information of the digital wallet holder.
- a terminal, a system, a method for controlling a terminal, and a storage medium are provided that contribute to ensuring the authenticity of content provided from a digital wallet.
- the effects of the present invention are not limited to the above.
- the present invention may achieve other effects instead of or in addition to the above effects.
- FIG. 1 is a diagram for explaining an overview of an embodiment.
- FIG. 2 is a flow chart illustrating the operation of one embodiment.
- FIG. 3 is a diagram illustrating an example of a schematic configuration of an information processing system according to the first embodiment.
- FIG. 4 is a diagram illustrating an example of a display of the terminal according to the first embodiment.
- FIG. 5 is a diagram for explaining the operation of the information processing system according to the first embodiment.
- FIG. 6 is a diagram for explaining the operation of the information processing system according to the first embodiment.
- FIG. 7 is a diagram illustrating an example of a processing configuration of a terminal according to the first embodiment.
- FIG. 8 is a diagram illustrating an example of a processing configuration of the digital wallet control unit according to the first embodiment.
- FIG. 1 is a diagram for explaining an overview of an embodiment.
- FIG. 2 is a flow chart illustrating the operation of one embodiment.
- FIG. 3 is a diagram illustrating an example of a schematic configuration of an information processing system according to
- FIG. 9 is a flowchart illustrating an example of the operation of the identity verification unit according to the first embodiment.
- FIG. 10 is a diagram illustrating an example of a display on the terminal according to the first embodiment.
- FIG. 11 is a flowchart illustrating an example of the operation of the certificate acquisition control unit according to the first embodiment.
- FIG. 12 is a diagram illustrating an example of a processing configuration of a server device according to the first embodiment.
- FIG. 13 is a diagram illustrating an example of a processing configuration of a carrier terminal according to the first embodiment.
- FIG. 14 is a sequence diagram illustrating an example of the operation of the information processing system according to the first embodiment.
- FIG. 15 is a diagram for explaining the operation of the information processing system according to the modified example of the first embodiment.
- FIG. 16 is a diagram illustrating an example of a hardware configuration of a terminal according to the present disclosure.
- FIG. 17 is a diagram showing an example of a display of a terminal according to a modification of the present disclosure
- the terminal 100 includes an identity verification means 101 and a storage means 102 (see FIG. 1).
- the identity verification means 101 verifies the identity of the creator of the digital wallet using biometric information obtained from an identification card and the biometric information of the creator of the digital wallet (step S1 in FIG. 2). If the identity verification is successful, the storage means 102 stores the biometric information obtained from the identification card or the biometric information of the creator of the digital wallet as the biometric information of the digital wallet holder (step S2).
- the terminal 100 performs identity verification of the digital wallet holder using an identification card issued by a public institution when the digital wallet is opened. If identity verification is successful, the terminal 100 stores the biometric information acquired when the digital wallet was opened as the biometric information of the digital wallet holder.
- the terminal 30 can provide the biometric information of the digital wallet holder to the service provider along with digital content.
- the service provider can verify whether the digital wallet holder providing the certificate and the user in front of the service provider are the same person by performing an authentication process using the biometric information acquired from the terminal 30 and the biometric information of the user who wishes to receive the service.
- the service provider can detect the fraudulent activity. In other words, the authenticity of the content provided from the digital wallet is guaranteed.
- the information processing system includes at least one certificate issuer and at least one service provider.
- a certificate issuer is an entity that issues certificates to users.
- educational institutions such as universities and vocational schools that issue student ID cards correspond to certificate issuers.
- institutions or associations that issue certificates of language proficiency, etc. correspond to certificate issuers.
- certificate issuers are not limited to private companies, and public institutions that issue driver's licenses, etc. are also included in the certificate issuers disclosed in this application.
- Each certificate issuer is equipped with a server device 10.
- the server device 10 is a server that performs the processes and operations necessary to carry out the business of the certificate issuer.
- the server device 10 may be managed and operated by the certificate issuer, or may be outsourced to another business entity.
- the server device 10 may be installed in the building of the certificate issuer, or may be installed on a network (cloud).
- a service provider is a business that provides services to users.
- examples of service providers include businesses that operate transportation such as trains, buses, and airplanes.
- business operators such as retail stores and restaurants fall into the category of service providers.
- Service providers are not limited to private companies, and organizations such as public institutions such as city halls, NGOs (Non-Governmental Organizations), and NPOs (Non-Profit Organizations) are also included in the service providers disclosed in this application.
- a service provider will require users to present a certificate appropriate to the business of the company (organization). For example, a railway company that sells discounted commuter passes to students will require the student to present a student ID card. Or, a retail store that sells tobacco, alcohol, etc. to customers will require the user to present a certificate that can verify their age.
- Each service provider has a business operator terminal 20 that is used when providing the service to the user.
- the business operator terminal 20 may be a terminal such as a personal computer, a tablet terminal, or a POS (Point of Sale) terminal.
- the service provider may also have a server for providing the service to the user (not shown in FIG. 3, etc.).
- employees of the service provider operate the business operator terminal 20 to provide the service to the user. At that time, the business operator terminal 20 performs verification of the certificate presented by the user. The business operator terminal 20 notifies the employees of the verification results.
- the user possesses terminal 30.
- the user operates terminal 30 to request (demand) the issuance of a certificate from the certificate issuer.
- the user also uses terminal 30 to present the certificate (e.g., a student ID card) requested by the service provider.
- Each device shown in FIG. 3 is connected to a network.
- the server device 10 the operator terminal 20, and the terminal 30 are connected to the network by wired or wireless communication means.
- each certificate issuer may include multiple server devices 10.
- each service provider may include multiple business operator terminals 20.
- the user's terminal 30 has a digital wallet function.
- the digital wallet is an electronic information storage service that guarantees information security such as data integrity, reliability, and availability. Although it is desirable for the digital wallet to be managed in a self-sovereign manner, an entity other than the user may be the managing entity.
- the user installs an application to realize a digital wallet on the terminal 30 that the user owns.
- an application to realize a digital wallet on the terminal 30 that the user owns.
- the user can store various digital content on the terminal 30, such as electronic money, identification documents such as a student ID, a passport or a driver's license, various ticket information such as an airline ticket or a boarding pass, and a vaccination certificate.
- the user's terminal 30 stores digital content as shown in FIG. 4.
- the digital content stored in the terminal 30 includes official identification documents such as a passport and a driver's license, and a student ID card issued by a university.
- the terminal 30 When the digital wallet application is launched for the first time, the terminal 30 performs identity verification using an identification card issued by a public institution such as a national government agency. In other words, the terminal 30 performs identity verification of the user when opening a digital wallet.
- the terminal 30 performs identity verification using an identification document that contains the biometric information of the person in question, such as a My Number card or a passport.
- the terminal 30 uses the My Number card or passport as the root of trust.
- biometric information examples include data (features) calculated from physical characteristics unique to an individual, such as the face, fingerprint, voiceprint, veins, retina, and iris pattern.
- biometric information may be image data such as a face image or fingerprint image. Any biometric information may be used as long as it contains information on the physical characteristics of a user. In this disclosure, a case will be described in which biometric information related to a person's "face” (a face image or features generated from a face image) is used.
- the terminal 30 obtains information about the holder (the person to whom) of the identification card from the user's identification card. For example, the terminal 30 obtains information about the holder of the My Number card from the card's IC (Integrated Circuit).
- the terminal 30 acquires basic information of the cardholder (the so-called four basic pieces of information: name, sex, date of birth, and address) and biometric information (facial image) of the cardholder.
- the terminal 30 stores the basic information and biometric information read from the card internally.
- the terminal 30 acquires biometric information of the user (the person who opens the digital wallet). For example, the terminal 30 acquires and stores a facial image by photographing the user.
- the terminal 30 performs a matching process (authentication process) using the biometric information acquired from the identification card and the biometric information of the user. If the authentication process (one-to-one authentication) is successful, the terminal 30 opens a digital wallet. The terminal 30 confirms through a matching process (authentication process) using the biometric information that the person who was issued the identification card and the user who uses the digital wallet of the terminal 30 are the same person.
- a user obtains digital content to be stored in a digital wallet.
- the user operates the terminal 30 to request a certificate issuer to issue a certificate.
- a student requests (requests) the issuance of a student ID card from the university to which the student belongs.
- the digital wallet application makes a request for issuance of a student ID card to the university to which the student belongs.
- the terminal 30 sends a "certificate issuance request" including information identifying the user (e.g., name, a combination of name and date of birth, student ID number, etc.) to the certificate issuer's server device 10 (see Figure 5).
- a "certificate issuance request" including information identifying the user (e.g., name, a combination of name and date of birth, student ID number, etc.) to the certificate issuer's server device 10 (see Figure 5).
- the certificate issuer determines whether the user requesting the issuance of a certificate has the authority (qualification) to receive the issuance of a certificate. For example, the server device 10 determines whether the student requesting the issuance of a student ID card is enrolled in the server device 10's own university.
- the server device 10 issues a student ID card (digital student ID card).
- the server device 10 issues a signed certificate of the organization (certificate issuer; for example, the university).
- the server device 10 transmits the issued signed certificate to the terminal 30.
- Terminal 30 verifies the signature of the received certificate.
- the terminal 30 obtains basic information (name, gender, date of birth, address) from the received certificate. In other words, the terminal 30 obtains basic information about the recipient of the obtained certificate. The terminal 30 compares the basic information obtained from the identity certificate (root of trust) when the digital wallet application is initially launched with the basic information obtained from the certificate generated by the certificate issuer.
- the terminal 30 compares the basic information acquired from the My Number card with the basic information acquired from the student ID card. If the basic information acquired from the two different media matches, the terminal 30 determines that the comparison is successful.
- the terminal 30 If the terminal 30 successfully verifies the signature attached to the certificate and successfully compares the two pieces of basic information (the two pieces of basic information match), it accepts the certificate received from the certificate issuer.
- the terminal 30 internally stores the certificate obtained from the certificate issuer (e.g., a student ID card) and manages it so that it can be used in the digital wallet.
- a user presents a certificate required by a service provider to the service provider. For example, a student who wishes to purchase a commuter pass presents his/her student ID card to a railway company.
- the user operates the terminal 30 to launch a digital wallet application.
- the user selects a certificate (e.g., a student ID card) specified by the service provider on the digital wallet application.
- a certificate e.g., a student ID card
- the terminal 30 generates a two-dimensional barcode using the certificate selected by the user and biometric information stored internally (for example, a facial image obtained from a My Number card or a facial image taken when opening a digital wallet).
- the terminal 30 generates a two-dimensional barcode in which the certificate specified by the service provider and the user's biometric information have been converted.
- the terminal 30 displays the generated two-dimensional barcode.
- the user presents the terminal 30 displaying the two-dimensional barcode to the service provider (e.g., a railway company employee, etc.) (see Figure 6).
- the service provider e.g., a railway company employee, etc.
- the service provider (such as an employee of the service provider) operates the business operator terminal 20 to read the presented two-dimensional barcode.
- the service provider also operates the business operator terminal 20 to obtain biometric information of the user in front of them (the user who presents the certificate). For example, the service provider operates the business operator terminal 20 to photograph the user in front of them and obtain a facial image.
- the business operator terminal 20 acquires the two-dimensional barcode (the two-dimensional barcode including the signed certificate and biometric information) and the biometric information of the user who wishes to receive the service.
- the business operator terminal 20 performs a matching process (authentication process) using the biometric information obtained from the two-dimensional barcode and the biometric information of the user in front of the operator terminal 20. If the authentication process (one-to-one authentication) is successful, the business operator terminal 20 treats the presented certificate as a legitimate certificate issued to the user in front of the operator terminal 20.
- authentication process one-to-one authentication
- the business operator terminal 20 notifies the service provider (such as an employee of the service provider) that the presented certificate is legitimate. Alternatively, the business operator terminal 20 determines the legitimacy, validity, etc. of the presented certificate as necessary. For example, the business operator terminal 20 verifies the signature affixed to the student ID card and the expiration date of the student ID card. The business operator terminal 20 notifies the service provider of the verification results.
- the service provider such as an employee of the service provider
- the service provider When the service provider presents the necessary certificate to provide the service to the user, the service provider provides the service to the user.
- the service provider provides the service to the user.
- a railway company employee sells a student commuter pass at a student discount.
- the terminal 30 when opening a digital wallet, the terminal 30 performs identity verification using biometric information obtained from the owner's identification card and the owner's biometric information. If identity verification is successful, the terminal 30 makes the digital wallet available for use.
- the terminal 30 also stores in the digital wallet a certificate whose authenticity has been guaranteed by the certificate issuer using an electronic signature or the like.
- the terminal 30 (digital wallet application) compares the basic information extracted from the identification card with the basic information obtained from the certificate issuer. The terminal 30 verifies the authenticity of the certificate obtained by the comparison.
- the terminal 30 provides the certificate and the biometric information of the digital wallet holder to the service provider (verifier).
- the service provider verifies that the user in front is the digital wallet holder by performing authentication using the biometric information of the digital wallet holder and the biometric information obtained from the user in front. If the digital wallet used by the user is a highly reliable digital wallet, the service provider can trust the certificate obtained from the digital wallet.
- [Device] 7 is a diagram showing an example of a processing configuration (processing module) of the terminal 30 according to the first embodiment.
- the terminal 30 includes a communication control unit 201, a digital wallet control unit 202, and a storage unit 203.
- the communication control unit 201 is a means for controlling communication with other devices. For example, the communication control unit 201 receives data (packets) from the server device 10. The communication control unit 201 also transmits data to the server device 10. The communication control unit 201 passes data received from other devices to other processing modules. The communication control unit 201 transmits data acquired from other processing modules to other devices. In this way, the other processing modules transmit and receive data to and from other devices via the communication control unit 201.
- the communication control unit 201 has a function as a receiving unit that receives data from other devices and a function as a transmitting unit that transmits data to other devices.
- the digital wallet control unit 202 is a means for managing and controlling the digital wallet. As shown in FIG. 8, the digital wallet control unit 202 has submodules consisting of an identity verification unit 211, a certificate acquisition control unit 212, and a usage control unit 213.
- the identity verification unit 211 is a means for verifying the identity of the creator of a digital wallet.
- the identity verification unit 211 verifies the identity of the creator of the digital wallet by using biometric information obtained from an identification card and the biometric information of the creator who opens the digital wallet. More specifically, the identity verification unit 211 verifies that the creator of the digital wallet and the holder (the person to whom the identification card issued by a public institution) are the same person.
- FIG. 9 is a flowchart showing an example of the operation of the identity verification unit 211 according to the first embodiment. The operation of the identity verification unit 211 according to the first embodiment will be described with reference to FIG. 9.
- the identity verification unit 211 obtains information about the identity card holder from the identity card held by the user. For example, the identity verification unit 211 obtains basic information and biometric information about the identity card holder from an IC (Integrated Circuit) chip mounted on a My Number card or passport (step S101).
- IC Integrated Circuit
- the identity verification unit 211 obtains the PIN for the user authentication electronic certificate using a GUI (Graphical User Interface) or the like (see Figure 10).
- GUI Graphic User Interface
- the identity verification unit 211 obtains the information written in the MRZ (Machine Readable Zone) printed on the face of the passport using OCR (Optical Character Recognition) technology.
- the identity verification unit 211 reads information from the IC chip using the acquired PIN (four-digit number) and information written in the MRZ as a password.
- the identity verification unit 211 stores basic information (name, sex, date of birth, address) and biometric information (face information, face image) of the holder of the identity card (My Number card, passport, etc.) read from the identity card in the memory unit 203 (step S102).
- the identity verification unit 211 acquires biometric information of the user (user of the terminal 30; person who opened the digital wallet) (step S103). For example, the identity verification unit 211 prompts the user to take a picture of their own face using a GUI or the like (so-called, a face image is acquired by taking a selfie).
- the identity verification unit 211 acquires biometric information from the identification card, and when it acquires the biometric information of the user who operates the device, it executes a matching process using the biometric information acquired from the identification card and the biometric information of the user (step S104). The identity verification unit 211 determines whether the two pieces of biometric information substantially match.
- the identity verification unit 211 generates features from each of the two pieces of biometric information (e.g., face images).
- the identity verification unit 211 extracts the eyes, nose, mouth, etc. from the face image as feature points. The identity verification unit 211 then calculates the position of each feature point and the distance between each feature point as feature amounts (generating a feature vector consisting of multiple feature amounts).
- the identity verification unit 211 executes a matching process (authentication process) using the two generated feature amounts. Specifically, the identity verification unit 211 calculates the similarity between corresponding face images using the two feature amounts. Based on the result of threshold processing on the calculated similarity, the identity verification unit 211 determines whether the two images are face images of the same person. Note that the similarity can be calculated using a chi-square distance, Euclidean distance, or the like. The greater the distance, the lower the similarity, and the closer the distance, the higher the similarity.
- the identity verification unit 211 determines that the matching process was successful. If the similarity is equal to or less than the predetermined value, the identity verification unit 211 determines that the matching process was unsuccessful.
- step S105 If the matching process is successful (step S105, Yes branch), the identity verification unit 211 permits the user to use the digital wallet (permission to use; step S106). In other words, if the authentication process (one-to-one authentication) is successful, the identity verification unit 211 opens the digital wallet.
- the identity verification unit 211 If the identity verification unit 211 is successful in the matching process (authentication process) using biometric information, it treats the person who was issued the identification card and the user of the terminal 30 as the same person.
- the digital wallet is started for the first time, it is determined whether the person on the identification card and the user of the terminal 30 are the same person. If the person on the identification card and the person who opened the digital wallet are the same person, the terminal 30 makes the digital wallet application available.
- step S105 If the matching process fails (step S105, No branch), the identity verification unit 211 does not permit the user to use the digital wallet (use denial; step S107). In other words, if the authentication process (one-to-one authentication) fails, the user cannot use the digital wallet (cannot open a digital wallet).
- the identity verification unit 211 determines that identity verification has been successful when the first authentication process using the biometric information obtained from the identification card and the biometric information of the creator who opens the digital wallet is successful. If identity verification is successful, the digital wallet is opened.
- the basic information extracted from the identification document will not be changed.
- the certificate acquisition control unit 212 is a means for controlling the acquisition of certificates.
- the certificate acquisition control unit 212 receives a certificate from the certificate issuer by requesting the certificate issuer to issue a certificate.
- the certificate acquisition control unit 212 performs a matching process using basic information about the identity card holder obtained from the identity card and basic information about the certificate holder obtained from the received certificate. If the two pieces of basic information match, the certificate acquisition control unit 212 stores the certificate received from the certificate issuer in the digital wallet.
- FIG. 11 is a flowchart showing an example of the operation of the certificate acquisition control unit 212 according to the first embodiment. The operation of the certificate acquisition control unit 212 according to the first embodiment will be described with reference to FIG. 11.
- the certificate acquisition control unit 212 controls the acquisition of the certificate desired by the user.
- the certificate acquisition control unit 212 uses a GUI or the like to acquire information necessary to request the issuance of a certificate (acquisition of necessary information; step S201). Specifically, the certificate acquisition control unit 212 acquires information on the certificate issuer corresponding to the certificate the user wishes to have issued, the type of certificate desired, etc. Alternatively, the certificate acquisition control unit 212 acquires information that allows the certificate issuer to identify the user (for example, the student ID number when requesting the issuance of a student ID card) as necessary.
- the certificate acquisition control unit 212 notifies the certificate issuer of the necessary information that it has acquired. For example, the certificate acquisition control unit 212 notifies the certificate issuer of the type of certificate that the user wishes to be issued and information for identifying the user (for example, name and student ID number). Specifically, the certificate acquisition control unit 212 sends a "certificate issuance request" including the type of certificate and information for identifying the user to the server device 10 of the specified certificate issuer (step S202).
- the certificate acquisition control unit 212 receives a response (positive or negative response) to the certificate issuance request from the server device 10 (step S203).
- step S204 If a negative response (certificate not issued) is received (step S204, No branch), the certificate acquisition control unit 212 notifies the user that the certificate was not issued (notification of non-issue; step S205).
- step S207 If the signature verification is successful (step S207, Yes branch), the certificate acquisition control unit 212 acquires basic information (name, gender, date of birth, address) of the certificate holder (issuee) from the received certificate (acquire basic information; step S209).
- the certificate acquisition control unit 212 compares basic information about the certificate holder that has been acquired with basic information acquired from the identification card at the time of initial startup of the digital wallet (step S210). That is, the certificate acquisition control unit 212 compares basic information about the certificate holder with basic information about the digital wallet holder (digital wallet creator).
- the certificate acquisition control unit 212 determines that the matching of the basic information was successful. If the two pieces of basic information do not match, the certificate acquisition control unit 212 determines that the matching of the basic information failed.
- step S211 the certificate acquisition control unit 212 discards the certificate received from the certificate issuer.
- the certificate acquisition control unit 212 also notifies the user that the certificate acquired from the certificate issuer is invalid (step S208).
- the certificate acquisition control unit 212 stores the certificate received from the certificate issuer in the digital wallet (step S212).
- the certificate acquisition control unit 212 determines that the certificate received from the certificate issuer is a legitimate certificate.
- the certificate acquisition control unit 212 stores the legitimate certificate (e.g., a student ID card) acquired from the certificate issuer in the memory unit 203.
- the usage control unit 213 is a means for controlling the usage of digital content (e.g., digital certificates) stored in the digital wallet.
- digital content e.g., digital certificates
- the usage control unit 213 uses a GUI or the like to obtain the certificate that the user wishes to use. For example, the usage control unit 213 displays a list of digital content as shown in FIG. 4, and allows the user to select the certificate that he or she wishes to use.
- the usage control unit 213 When the user selects a certificate (e.g., a student ID card), the usage control unit 213 generates a two-dimensional barcode using the certificate selected by the user and the biometric information stored in the memory unit 203 (biometric information acquired from the identification card or biometric information acquired from the user). The usage control unit 213 displays the generated two-dimensional barcode.
- a certificate e.g., a student ID card
- the usage control unit 213 provides the service provider with the certificate stored in the digital wallet and the biometric information of the digital wallet holder.
- the memory unit 203 is a means for storing information necessary for the operation of the terminal 30.
- the memory unit 203 stores the biometric information obtained from the identification card or the biometric information of the digital wallet creator as the biometric information of the digital wallet holder.
- the biometric information stored as the biometric information of the digital wallet holder may be biometric information obtained from the identification card, or may be biometric information obtained by photographing the user.
- [Server device] 12 is a diagram illustrating an example of a processing configuration (processing module) of the server device 10 according to the first embodiment.
- the server device 10 includes a communication control unit 301, a certificate issuing unit 302, and a storage unit 303.
- the certificate issuance unit 302 searches a database (not shown in FIG. 12, etc.) that stores user information using information for identifying the user included in the certificate issuance request (e.g., name or student ID number) as a key.
- a database not shown in FIG. 12, etc.
- the certificate issuing unit 302 sends a negative response to the terminal 30 indicating that the certificate issuance has failed.
- the certificate issuing unit 302 determines whether or not a certificate can be issued to the user based on the information stored in the database and the type of certificate that the user wishes to be issued, which is included in the certificate issuance request. In other words, the certificate issuing unit 302 determines whether or not the user who wishes to be issued a certificate has the authority (qualification) to be issued a certificate.
- the certificate issuance unit 302 determines that the student has the authority to receive a certificate.
- the certificate issuance unit 302 determines that the student does not have the authority to receive a certificate.
- the certificate issuing unit 302 sends a negative response to the terminal 30 indicating that the certificate has not been issued (the certificate cannot be issued).
- the certificate issuing unit 302 If the user has the authority to receive a certificate, the certificate issuing unit 302 generates a certificate (digital certificate; for example, a digital student ID card) to be issued to the user.
- the certificate issuing unit 302 generates a certificate with the electronic signature of its own organization (for example, a university) and the corresponding electronic certificate attached.
- the certificate issuing unit 302 generates a certificate that includes basic information about the user (recipient) to whom the certificate is issued. For example, the certificate issuing unit 302 generates a student ID card that includes the student's name, sex, date of birth, and address.
- the certificate issuing unit 302 sends the generated certificate (a certificate including an electronic document, an electronic signature, and an electronic certificate) to the terminal 30.
- the certificate issuing unit 302 sends a positive response (including a signed certificate) to the terminal 30 indicating that the requested certificate has been successfully issued.
- the memory unit 303 is a means for storing information necessary for the operation of the server device 10.
- FIG. 13 is a diagram showing an example of a processing configuration (processing module) of the operator terminal 20 according to the first embodiment.
- the operator terminal 20 includes a communication control unit 401, a service provision control unit 402, and a storage unit 403.
- the communication control unit 401 is a means for controlling communication with other devices. For example, the communication control unit 401 receives data (packets) from a service provider's server (not shown in FIG. 3, etc.). The communication control unit 401 also transmits data to the server. The communication control unit 401 passes data received from other devices to other processing modules. The communication control unit 401 transmits data acquired from other processing modules to other devices. In this way, the other processing modules transmit and receive data to and from other devices via the communication control unit 401.
- the communication control unit 401 has a function as a receiving unit that receives data from other devices, and a function as a transmitting unit that transmits data to other devices.
- the service provision control unit 402 is a means for executing control regarding the services provided to users.
- the service provision control unit 402 also acquires biometric information (e.g., a facial image) of the user in front of the user (the user receiving the service) in response to an operation by an employee of the service provider, etc.
- biometric information e.g., a facial image
- the service provision control unit 402 uses the two pieces of acquired biometric information to determine whether the certificate presented to the service provider is a legitimate certificate.
- the service provision control unit 402 performs a matching process (authentication process) between the biometric information (e.g., a facial image) acquired from the two-dimensional barcode and the biometric information of the user in front of the user (e.g., a facial image obtained by photographing the user in front of the user).
- a matching process authentication process
- the biometric information e.g., a facial image
- the biometric information of the user in front of the user e.g., a facial image obtained by photographing the user in front of the user.
- the service provision control unit 402 determines that the certificate presented to the service provider is not a legitimate certificate issued to the user in front of the service provider.
- the service provision control unit 402 If the certificate is not valid, the service provision control unit 402 notifies an employee of the service provider of that fact. For example, the service provision control unit 402 displays a message to that effect on an LCD monitor or outputs it from a speaker.
- the service provision control unit 402 If the certificate is valid, the service provision control unit 402 notifies the service provider (such as an employee of the service provider) that the presented certificate is valid. Alternatively, the service provision control unit 402 determines the validity, validity, etc. of the presented certificate as necessary. For example, the service provision control unit 402 verifies the signature affixed to the student ID card and verifies the expiration date of the student ID card.
- the memory unit 403 is a means for storing information necessary for the operation of the operator terminal 20.
- FIG. 14 is a sequence diagram showing an example of the operation of the information processing system according to the first embodiment. The operation of the information processing system according to the first embodiment will be described with reference to FIG. 14. Note that a description of the operation of the information processing system for identity verification when opening a digital wallet and for issuing a certificate will be omitted.
- the terminal 30 displays the certificate selected by the user and the two-dimensional barcode into which the biometric information has been converted according to the user's operation (step S01).
- the business operator terminal 20 reads the two-dimensional barcode in response to an operation by an employee of the service provider, etc. (step S02).
- the business operator terminal 20 also acquires biometric information from the user in front of the user in response to an operation by an employee of the service provider or the like (step S03). For example, the business operator terminal 20 photographs the user in front of the user and acquires a facial image.
- the business operator terminal 20 performs a matching process using the biometric information obtained from the two-dimensional barcode and the biometric information of the user in front of the business operator (step S04).
- the business operator terminal 20 notifies the service provider's employees, etc. that the certificate presented by the user is valid (step S05).
- the service provider's employees, etc. who receive the notification provide the service to the user.
- a two-dimensional barcode is generated using a certificate and biometric information stored in a digital wallet, and the two-dimensional barcode is provided to a service provider for identity authentication.
- a certificate may also be issued by a certificate issuer for biometric information.
- a user requests a certificate issuer to issue a certificate for biometric information, and stores the issued certificate in a digital wallet.
- the user provides a certificate for biometric information to a service provider.
- the service provider may use the provided certificate to authenticate the user.
- a certificate for a face that is, a face VC
- VC Verifiable Credential
- a user provides face information to an issuer and requests the issue of a face VC.
- the issuer compares the presented face with face information held by the issuer, and issues a face VC if they match.
- the user provides the issued face VC to a service provider, and the service provider uses the face VC to authenticate the user.
- a user obtains digital content to be stored in a digital wallet.
- the user operates the terminal 30 to request a certificate issuer to issue a certificate.
- a student requests (requests) the issuance of a student ID card and a face VC from the university to which the student belongs.
- the digital wallet application requests the university to which the student belongs to issue a student ID card and a face VC. Note that an external business operator commissioned by the university may issue the face VC.
- the terminal 30 sends a "certificate issuance request" including information identifying the user (e.g., name, a combination of name and date of birth, student ID number, etc.) and biometric information to the server device 10 of the certificate issuer.
- information identifying the user e.g., name, a combination of name and date of birth, student ID number, etc.
- the certificate issuer determines whether the user requesting the issuance of a certificate has the authority (qualification) to receive the issuance of a certificate. For example, the server device 10 determines whether the student requesting the issuance of a student ID card and face VC is enrolled at the university, and whether the biometric information presented by the student matches the biometric information held by the university.
- the server device 10 issues a student ID card (digital student ID card) and a face VC.
- the server device 10 issues a signed certificate of its own organization (certificate issuer; for example, a university).
- the server device 10 transmits the issued signed certificate to the terminal 30.
- Terminal 30 verifies the signature of the received certificate.
- the terminal 30 obtains basic information (name, gender, date of birth, address) and biometric information from the received certificate. That is, the terminal 30 obtains basic information and biometric information about the recipient of the obtained certificate. The terminal 30 compares the basic information and biometric information obtained from the identity certificate (root of trust) when the digital wallet application is initially launched with the basic information and biometric information obtained from the certificate generated by the certificate issuer.
- the terminal 30 compares the basic information acquired from the My Number card with the basic information acquired from the student ID card. Similarly, the terminal 30 compares the biometric information acquired from the My Number card with the biometric information acquired from the face VC. If the basic information and biometric information acquired from the two different media match, the terminal 30 determines that the comparison is successful.
- the terminal 30 If the terminal 30 successfully verifies the signature attached to the certificate and also successfully compares the two pieces of basic information and the biometric information (the two pieces of basic information match the biometric information), it accepts the certificate received from the certificate issuer.
- the terminal 30 internally stores the certificate obtained from the certificate issuer (e.g., a student ID card and a face VC) and manages it so that it can be used in the digital wallet.
- the certificate issuer e.g., a student ID card and a face VC
- a face VC may also be issued at a different time from other certificates.
- the user provides the certificate issuer with a previously obtained face certificate in the digital wallet and requests the issuance of a face VC.
- the certificate issuer compares the face information in the certificate presented by the user with the face information it holds, and issues the face VC if they match.
- a user presents to a service provider a certificate required by the service provider.
- a service provider For example, a student who wishes to purchase a commuter pass presents his/her student ID card and face VC to a railway company.
- the user operates the terminal 30 to launch a digital wallet application.
- the user selects a certificate (e.g., a student ID card and face VC) specified by the service provider on the digital wallet application.
- a certificate e.g., a student ID card and face VC
- the terminal 30 displays the certificate selected by the user (e.g., a student ID card and face VC).
- the user presents the terminal 30 displaying the student ID and face VC to the service provider (e.g., a railway company employee, etc.).
- the service provider e.g., a railway company employee, etc.
- the service provider (such as an employee of the service provider) operates the business terminal 20 to read the presented student ID card and face VC.
- the service provider also operates the business terminal 20 to obtain biometric information of the user in front of them (the user who presents the certificate). For example, the service provider operates the business terminal 20 to photograph the user in front of them and obtain a face image.
- the business operator terminal 20 acquires the face VC and biometric information of the user who wishes to receive the service.
- the operator terminal 20 performs a matching process (authentication process) using the biometric information obtained from the face VC and the biometric information of the user in front of the operator terminal 20. If the authentication process (one-to-one authentication) is successful, the operator terminal 20 treats the presented certificate as a legitimate certificate issued to the user in front of the operator terminal 20.
- authentication process one-to-one authentication
- the business operator terminal 20 notifies the service provider (such as an employee of the service provider) that the presented certificate is legitimate. Alternatively, the business operator terminal 20 determines the legitimacy, validity, etc. of the presented certificate as necessary. For example, the business operator terminal 20 verifies the signature affixed to the student ID card and the expiration date of the student ID card. The business operator terminal 20 notifies the service provider of the verification results.
- the service provider such as an employee of the service provider
- the service provider When the service provider presents the necessary certificate to provide the service to the user, the service provider provides the service to the user.
- the service provider provides the service to the user.
- a railway company employee sells a student commuter pass at a student discount.
- the biometric information matching process required when the service provider provides a service to a user may be performed by the user's terminal 30.
- the usage control unit 213 of the terminal 30 executes a second authentication process using the biometric information of the digital wallet holder and the biometric information of the user, and uses the certificate stored in the digital wallet if the second authentication process is successful.
- attendance at university classes may be confirmed by terminal 30.
- the usage control unit 213 of terminal 30 executes an authentication process using the biometric information of the digital wallet holder and the biometric information of the student. If the authentication process is successful, the usage control unit 213 uses the student ID stored in the digital wallet to determine whether or not the student has the authority to attend the class.
- a device that transmits beacons is installed in university classrooms.
- the beacon transmitting device transmits a beacon that includes a management number that corresponds to the class being held in the classroom.
- the terminal 30 When the terminal 30 receives a beacon emitted by the beacon transmitting device, it activates the usage control unit 213.
- the usage control unit 213 captures an image of the user (the owner of the device).
- the usage control unit 213 executes a matching process using the biometric information stored in the digital wallet (biometric information of the digital wallet holder) and the biometric information obtained by capturing an image of the owner.
- the usage control unit 213 determines that the user operating the device is the digital wallet owner. If the user is the digital wallet owner (if the user's authenticity is confirmed), the usage control unit 213 determines whether the user is eligible to take classes in the classroom based on the student ID stored in the digital wallet.
- the usage control unit 213 identifies the class (class name) being held in the classroom from the management number transmitted by the beacon transmission device, and determines whether or not the student is eligible to attend the class based on information such as the student's department listed on the student ID card. If the student is eligible to attend the class, the usage control unit 213 notifies a server (e.g., server device 10) managed by the university of the student's attendance at the class. In other words, if the student is eligible to attend the class, the usage control unit 213 notifies the university of the student's status as "attending class.”
- a server e.g., server device 10
- the usage control unit 213 determines that the student attempting to attend the class is not the owner of the terminal 30 (digital wallet holder), and instructs the user to leave the room. In addition, if the usage control unit 213 determines that the user is not qualified to participate in the class, it instructs the user to leave the room.
- the usage control unit 213 may perform the above authentication process and verify the authority to participate in classes when it detects a specified action by the user (e.g., pressing the attendance button) without receiving a beacon.
- the terminal 30 may estimate the user's current location using a Global Positioning System (GPS).
- GPS Global Positioning System
- the terminal 30 may start the usage control unit 213 when it is determined that the user has entered a classroom.
- the usage control unit 213 may then determine whether or not the user is eligible to attend classes held in the classroom based on the student ID card stored in the digital wallet.
- attendance confirmation may be performed by a business terminal 20 prepared by the university.
- a tablet-type business terminal 20 or a kiosk-type business terminal 20 may be installed at the entrance to the classroom, and the business terminal 20 may acquire the certificate and perform the process of matching the biometric information. That is, the terminal 30 transmits a facial image and information related to the student ID card to the business terminal 20 installed at the entrance to the classroom.
- the business terminal 20 may perform a matching process using a facial image captured by the user in front of the user and a facial image acquired from the terminal 30.
- the usage control unit 213 when the usage control unit 213 receives a beacon from a beacon transmitting device installed in a classroom of the educational institution, it executes the second authentication process. If the second authentication process is successful, the usage control unit 213 determines whether or not the user is qualified to take classes held in the classroom based on the student ID stored in the digital wallet.
- a plurality of digital contents may be transmitted and received between the terminal 30 and the business operator terminal 20.
- a student ID card indicating that the user is a student and a coupon for receiving a specified discount
- the terminal 30 may display a two-dimensional barcode obtained by converting the digital content (student ID card, coupon) designated by the user and biometric information.
- the user may designate digital content to be presented to the service provider based on information provided by the service provider or the like.
- the terminal 30 may automatically designate digital content when the user receives a specified service.
- the business terminal 20 If the business terminal 20 is successful in matching the face image obtained by photographing the user in front of the user with the face image acquired from the terminal 30, it determines that the acquired student ID card is valid. In this case, the user can receive a student discount. Furthermore, if the coupon acquired from the terminal 30 is valid, the business terminal 20 will provide a discount according to the coupon (and notify employees of the service provider that the coupon is valid).
- a tablet or kiosk terminal installed at the entrance of a facility or the like may verify the validity of a student ID card or the like by biometric authentication.
- the business terminal 20 prevents users other than students from using the student discount.
- the certificate and biometric information are transmitted and received between the terminal 30 and the operator terminal 20 using a two-dimensional barcode.
- the certificate and biometric information may be transmitted and received between the terminal 30 and the operator terminal 20 using a short-range wireless communication means such as Bluetooth (registered trademark) or NFC (Near Field Communication).
- the certificate and biometric information may be transmitted and received between the terminal 30 and the operator terminal 20 using a mobile communication means such as 4G (4th Generation) or 5G (5th Generation) or a wireless LAN (Local Area Network) such as Wi-Fi (Wireless Fidelity).
- the usage control unit 213 of the terminal 30 transmits the certificate selected by the user (signed certificate) and the biometric information of the digital wallet holder to the operator terminal 20 using short-range wireless communication means.
- the service provision control unit 402 of the business operator terminal 20 receives the certificate and the biometric information, it acquires the biometric information of the user in front of the operator.
- the service provision control unit 402 then performs biometric authentication using the two pieces of biometric information, as described in the first embodiment.
- ⁇ Modification 5> a case has been described in which a certificate (digital content) issued by a certificate issuer is stored in a digital wallet of the terminal 30.
- a certificate (digital content) for the certificate (digital content), a non-fungible token (NFT) or a verifiable credential (VC) may be issued and verified using a blockchain.
- NFT non-fungible token
- VC verifiable credential
- the certificate issuer registers transaction information obtained by issuing the NFT or VC in the blockchain, and the service provider verifies the reliability of the certificate using the transaction information recorded in the blockchain.
- the user's terminal 30 requests the certificate issuer (server device 10) to issue a certificate (certificate issuance request; step S11 in Figure 15).
- the server device 10 (certificate issuing unit 302) receives a certificate issuance request from the terminal 30, it generates a signed certificate.
- the server device 10 of the certificate issuer registers the transaction information obtained by issuing the NFT or VC in the blockchain (step S13).
- the transaction information includes the issuer ID, public key, etc.
- the terminal 30 stores the received certificate in a digital wallet. For example, when a terminal 30 held by a student requests the university to issue a student ID card, the terminal 30 stores the VC and NFT of the student ID card in the digital wallet. Transaction information related to the student ID card (issuing university ID, public key, etc.) is stored in the blockchain.
- the terminal 30 (usage control unit 213) provides the selected certificate and the biometric information of the digital wallet holder to the service provider.
- the terminal 30 provides the certificate and the biometric information to the service provider's operator terminal 20 using a two-dimensional barcode, short-range wireless communication means, etc. (presentation of certificate; step S14).
- the service provider's business terminal 20 (service provision control unit 402) verifies the reliability of the received certificate using the transaction information recorded in the blockchain (certificate verification; step S15).
- the business terminal 20 uses the transaction information obtained from the blockchain to verify that the certificate has not been tampered with and that it has been issued by a trustworthy issuer.
- the business terminal 20 also acquires biometric information by photographing the user in front of the user.
- the business operator terminal 20 performs authentication processing using the biometric information acquired from the terminal 30 and the biometric information acquired from the user in front of the terminal 30. If the verification of the reliability of the certificate and the authentication of the user are successful, the business operator terminal 20 provides the service to the user (service provision; step S16).
- the terminal 30 uses a reliable identification card issued by a public institution, such as a My Number card, as the root of trust when opening a digital wallet.
- the terminal 30 performs identity verification using biometric information obtained from the identification card (Root of Trust) and the biometric information of the digital wallet creator.
- the terminal 30 ensures that the digital wallet creator and the digital wallet holder are the same person through this identity verification (authentication process using two pieces of biometric information).
- identity verification authentication process using two pieces of biometric information.
- another person cannot open a digital wallet by falsely identifying the holder (a digital wallet cannot be opened using another person's identification).
- the service provider verifies that the user who uses the digital wallet and the digital wallet holder match using biometric authentication.
- the service provider does not trust the certificate provided by the digital wallet. In other words, it is guaranteed that the service user and the digital wallet holder match (the authenticity of the match between the service user and the digital wallet holder is guaranteed). In this way, by having the service provider also perform the authentication process, it is possible to prevent the user from handing over the terminal 30 to another person after the digital wallet is started, and the other person from using the certificate in the digital wallet. In addition, after biometric authentication by the service provider, the certificate stored in the digital wallet is used for student discount applications, attendance management, etc.
- the terminal 30 when the terminal 30 obtains a certificate from a certificate issuer, it compares basic information obtained from the identification document with basic information obtained from the certificate. Through this comparison, the terminal 30 verifies (confirms) that the issued certificate was not issued to anyone other than the digital wallet holder. A certificate that has been successfully verified is stored in the digital wallet, thereby guaranteeing the authenticity of the digital wallet and also guaranteeing the authenticity of the digital content (certificate) provided from the digital wallet.
- Figure 16 is a diagram showing an example of the hardware configuration of terminal 30.
- the terminal 30 can be configured by an information processing device (so-called a computer) and has the configuration shown in FIG. 16.
- the terminal 30 has a processor 311, a memory 312, an input/output interface 313, and a communication interface 314.
- the components such as the processor 311 are connected by an internal bus or the like and are configured to be able to communicate with each other.
- the terminal 30 may include hardware not shown, and may not include the input/output interface 313 as necessary.
- the number of processors 311 and the like included in the terminal 30 is not intended to be limited to the example shown in FIG. 16, and for example, the terminal 30 may include multiple processors 311.
- the processor 311 is, for example, a programmable device such as a CPU (Central Processing Unit), an MPU (Micro Processing Unit), or a DSP (Digital Signal Processor). Alternatively, the processor 311 may be a device such as an FPGA (Field Programmable Gate Array) or an ASIC (Application Specific Integrated Circuit). The processor 311 executes various programs including an operating system (OS).
- OS operating system
- Memory 312 may be a RAM (Random Access Memory), a ROM (Read Only Memory), a HDD (Hard Disk Drive), a SSD (Solid State Drive), etc. Memory 312 stores the OS program, application programs, and various data.
- RAM Random Access Memory
- ROM Read Only Memory
- HDD Hard Disk Drive
- SSD Solid State Drive
- the input/output interface 313 is an interface for a display device and an input device (not shown).
- the display device is, for example, a liquid crystal display.
- the input device is, for example, a device that accepts user operations such as a keyboard or a mouse.
- the communication interface 314 is a circuit, module, etc. that communicates with other devices.
- the communication interface 314 includes a NIC (Network Interface Card), etc.
- the functions of the terminal 30 are realized by various processing modules.
- the processing modules are realized, for example, by the processor 311 executing a program stored in the memory 312.
- the program can be recorded on a computer-readable storage medium.
- the storage medium can be a non-transitory medium such as a semiconductor memory, a hard disk, a magnetic recording medium, or an optical recording medium.
- the present invention can also be embodied as a computer program product.
- the program can be downloaded via a network, or updated using a storage medium that stores the program.
- the processing modules may also be realized by a semiconductor chip.
- server device 10 business operator terminal 20, etc. can also be configured using information processing devices, just like the terminal 30, and their basic hardware configurations are no different from those of the terminal 30, so a description of them will be omitted.
- the terminal 30, which is an information processing device, is equipped with a computer, and the functions of the terminal 30 can be realized by having the computer execute a program.
- the terminal 30 also executes a control method for the terminal 30 by means of the program.
- the server device 10 is equipped with a computer, and the functions of the server device 10 can be realized by having the computer execute a program.
- the server device 10 also executes a control method for the server device 10 by means of the program.
- the terminal 30 may take into consideration variations in spelling of each item constituting the basic information. For example, the terminal 30 may calculate the degree of match between two pieces of basic information as a matching score, taking into consideration variations in spelling of the name and address. For example, the terminal 30 may obtain the degree of match between two pieces of basic information using a learning model obtained by machine learning. The terminal 30 may perform threshold processing on the obtained degree of match (matching score), and discard the obtained certificate if the matching score is equal to or less than a predetermined value.
- identity verification verifying that the identity card holder and the digital wallet creator match
- identity verification may also be performed using an electronic certificate stored in the identification card.
- the terminal 30 obtains an electronic certificate (signature electronic certificate, user authentication electronic certificate) from the My Number card held by the user.
- the terminal 30 sends the obtained electronic signature to a certification body (J-LIS; Japan Agency for Local Authority Information Systems) and requests the certification body to verify the validity of the electronic certificate. If the electronic certificate is valid, the terminal 30 determines that identity verification has been successful.
- J-LIS Japan Agency for Local Authority Information Systems
- the terminal 30 may set an expiration date (validity period) for the opened digital wallet.
- the terminal 30 may set the expiration date of the digital wallet according to the identification used for identity verification and the expiration date of the identification. For example, if a passport valid for five years is used for identity verification, the terminal 30 sets the validity period of the digital wallet to five years. Alternatively, if a passport valid for ten years or a My Number card valid for ten years is used for identity verification, the terminal 30 sets the validity period of the digital wallet to ten years. Alternatively, the terminal 30 may set the validity period of the digital wallet to be different between when a passport is used for identity verification and when a My Number card is used for identity verification.
- the terminal 30 may determine the validity period of the digital wallet according to the remaining validity period of the identification, rather than the validity period at the time the identification was issued. For example, if an identification with a remaining period of three years is used for identity verification, the terminal 30 sets the validity period of the digital wallet to three years. If an identification card with a remaining validity of 5 years is used for identity verification, the terminal 30 sets the validity period of the digital wallet to 5 years.
- the terminal 30 may set a limit on the number of times the digital wallet can be used. For example, if the terminal 30 detects that the digital wallet has been launched a predetermined number of times or more within a predetermined period of time, it determines that the digital wallet has been used fraudulently by the user. In this case, the terminal 30 will not launch the digital wallet and will prohibit the user from using the digital wallet.
- the terminal 30 may present some of the information to the service provider by means other than a two-dimensional barcode.
- the terminal 30 may display a facial image (biometric information) and a two-dimensional barcode into which the certificate, etc. has been converted, on the same screen, as shown in FIG. 17.
- the terminal 30 may display a facial image and a two-dimensional barcode into which the facial image and certificate have been converted, on the same screen.
- An employee of the service provider may verify the identity of the user presenting the certificate using the face of the user and the facial image displayed on the terminal 30.
- the matching process may be performed on the user's terminal 30 for purposes other than confirming attendance at a class held at a university. That is, when the matching process between a facial image obtained by photographing and a pre-registered face is successful on the terminal 30 held by the user, the terminal 30 issues (displays) a two-dimensional barcode including "successful face authentication" and "corresponding certificate information".
- the business operator terminal 20 may read the issued two-dimensional barcode and obtain information such as a certificate required for performing identity verification and providing a service.
- the business operator terminal 20 does not need to perform a matching process using a facial image or to photograph the user (obtain a facial image). Therefore, the business operator terminal 20 only needs to be equipped with a barcode reader, and does not need a camera.
- the terminal 30 may display the information as shown in FIG. 17 (displaying a two-dimensional barcode and a facial image on the same screen). In other words, an employee of the service provider or the like visually verifies the identity of the user, thereby preventing fraud such as the digital wallet holder handing the terminal 30 to another person and presenting the terminal 30 to the service provider after identity verification is complete.
- the terminal 30 may limit the display of the two-dimensional barcode to a specified time. For example, the terminal 30 may be allowed to display the two-dimensional barcode only for a specified time after the biometric authentication is successful.
- the terminal 30 may be implemented in another apparatus, device, etc. More specifically, the above-described “identification unit (identification means)” and “certificate acquisition control unit (certificate acquisition control means)” may be implemented in any of the apparatuses included in the system.
- the form of data transmission between each device is not particularly limited, but data transmitted between these devices may be encrypted. Users' personal information, etc. is transmitted between these devices, and in order to appropriately protect this information, it is desirable to transmit and receive encrypted data.
- each embodiment may be used alone or in combination. For example, it is possible to replace part of the configuration of an embodiment with the configuration of another embodiment, or to add the configuration of another embodiment to the configuration of an embodiment. Furthermore, it is possible to add, delete, or replace part of the configuration of an embodiment with other configurations.
- Appendix 1 an identity verification means for verifying the identity of a creator of a digital wallet by using biometric information obtained from an identification card and biometric information of the creator of the digital wallet; a storage means for storing biometric information obtained from the identification card or biometric information of the creator of the digital wallet as biometric information of the digital wallet owner if the identity verification is successful;
- a terminal comprising: [Appendix 2] The terminal described in Appendix 1, wherein the identity verification means determines that the identity verification is successful when a first authentication process using biometric information obtained from the identification card and biometric information of the creator who opens the digital wallet is successful.
- Appendix 3 The terminal described in Appendix 2, further comprising a certificate acquisition control means for receiving the certificate from a certificate issuer by requesting the certificate issuer to issue the certificate, and storing the received certificate in the digital wallet if basic information about the certificate holder obtained from the identification card matches basic information about the certificate holder obtained from the received certificate.
- Appendix 4 The terminal described in Appendix 3, further comprising a usage control means for providing the certificate stored in the digital wallet and the biometric information of the digital wallet holder to the service provider when a user receives a service from the service provider.
- Appendix 5 The terminal described in Appendix 3, further comprising a usage control means that, when a user receives a service from a service provider, performs a second authentication process using the biometric information of the digital wallet holder and the biometric information of the user, and if the second authentication process is successful, uses the certificate stored in the digital wallet.
- the usage control means A terminal as described in Appendix 5, which, when it receives a beacon from a beacon transmitting device installed in a classroom of an educational institution, executes the second authentication process, and if the second authentication process is successful, determines whether the user is qualified to take classes in the classroom based on the student ID card stored in the digital wallet.
- Appendix 7 The terminal according to any one of appendices 1 to 6, wherein the identification card is a My Number card or a passport.
- the biometric information is a facial image or a feature generated from the facial image.
- a terminal A carrier terminal used when a service provider provides a service to a user; Including, The terminal includes: an identity verification means for verifying the identity of a creator of a digital wallet by using biometric information obtained from an identification card and biometric information of the creator of the digital wallet; a storage means for storing biometric information obtained from the identification card or biometric information of the creator of the digital wallet as biometric information of the digital wallet owner if the identity verification is successful; a usage control means for providing the content stored in the digital wallet and the biometric information of the digital wallet holder to the business operator terminal; A system comprising: [Appendix 10] On the terminal, Verifying the identity of the creator of the digital wallet using biometric information obtained from the identification card and biometric information of the creator of the digital wallet; A terminal control method, in which if the identity verification is successful, biometric information obtained from the identification card or the biometric information of the person who opens the digital wallet is stored as the biometric information of the digital wallet holder.
- the computer installed in the terminal A process of verifying the identity of a creator of a digital wallet using biometric information obtained from an identification card and biometric information of the creator of the digital wallet; If the identity verification is successful, a process of storing biometric information obtained from the identification card or biometric information of the creator of the digital wallet as biometric information of the digital wallet owner; A computer-readable storage medium that stores a program for executing the above.
- Server device 20
- Business operator terminal 30
- Terminal 100
- Personal identification means 102
- Storage means 201
- Communication control unit 202
- Digital wallet control unit 203
- Storage unit 211
- Personal identification unit 212
- Certificate acquisition control unit 213
- Usage control unit 301
- Communication control unit 302
- Certificate issuing unit 303
- Storage unit 311 Processor 312 Memory 313 Input/output interface 314
- Communication interface 401
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
第1の実施形態について、図面を用いてより詳細に説明する。
図3に示すように、第1の実施形態に係る情報処理システムには、少なくとも1以上の証明書発行者と、少なくとも1以上のサービス提供者と、が含まれる。
続いて、第1の実施形態に係る情報処理システムの概略動作について説明する。
利用者の端末30は、デジタルウォレット機能を備える。デジタルウォレットは、データの完全性、信頼性、可用性などの情報セキュリティ性が担保された、電子情報保存サービスである。デジタルウォレットは、自己主権型の管理が望ましいが、利用者本人以外の主体が管理主体であってもよい。
利用者は、デジタルウォレットに格納するデジタルコンテンツを取得する。例えば、利用者は、端末30を操作して証明書の発行を証明書発行者に依頼する。例えば、学生は、所属する大学に対して学生証の発行を依頼(要求)する。具体的には、デジタルウォレットアプリケーションは、学生が所属する大学に対して学生証の発行要求を行う。
利用者は、サービス提供者に対し、当該サービス提供者が求める証明書を提示する。例えば、定期券を購入しようとする学生は、鉄道会社に学生証を提示する。
図7は、第1の実施形態に係る端末30の処理構成(処理モジュール)の一例を示す図である。図7を参照すると、端末30は、通信制御部201と、デジタルウォレット制御部202と、記憶部203と、を備える。
図12は、第1の実施形態に係るサーバ装置10の処理構成(処理モジュール)の一例を示す図である。図12を参照すると、サーバ装置10は、通信制御部301と、証明書発行部302と、記憶部303と、を備える。
図13は、第1の実施形態に係る事業者端末20の処理構成(処理モジュール)の一例を示す図である。図13を参照すると、事業者端末20は、通信制御部401と、サービス提供制御部402と、記憶部403と、を備える。
続いて、第1の実施形態に係る情報処理システムの動作について説明する。
上記実施形態では、証明書とデジタルウォレット内部に保存されている生体情報を用いて2次元バーコードが生成され、当該2次元バーコードがサービス提供者に提供され本人認証が行われる場合について説明を行った。ここで、生体情報に関しても証明書が証明書発行者から発行されてもよい。具体的には、利用者は、証明書発行者に生体情報の証明書の発行を依頼し、発行された証明書をデジタルウォレットに格納する。利用者は、サービスの提供を受ける際に、サービス提供者に生体情報の証明書を提供する。サービス提供者は、提供された証明書を用いて本人認証してもよい。例えば、Verifiable Credential(VC)として顔に対する証明書、つまり顔VC、を証明書発行者から発行する。具体的に、利用者は、顔情報を発行者に提供し顔VCの発行を依頼する。発行者は提示された顔と保有している顔情報を照合し、一致すれば顔VCを発行する。利用者は発行された顔VCをサービス提供者に提供し、サービス提供者は、当該顔VCを使用して本人認証を行う。
利用者は、デジタルウォレットに格納するデジタルコンテンツを取得する。例えば、利用者は、端末30を操作して証明書の発行を証明書発行者に依頼する。例えば、学生は、所属する大学に対して学生証と顔VCの発行を依頼(要求)する。具体的には、デジタルウォレットアプリケーションは、学生が所属する大学に対して学生証と顔VCの発行要求を行う。なお、大学の委託を受けた外部事業者が顔VCを発行してもよい。
利用者は、サービス提供者に対し、当該サービス提供者が求める証明書を提示する。例えば、定期券を購入しようとする学生は、鉄道会社に学生証及び顔VCを提示する。
サービス提供者が利用者にサービスを提供する際に必要な生体情報の照合処理は利用者の端末30で行われてもよい。この場合、端末30の利用制御部213は、デジタルウォレット名義人の生体情報と利用者の生体情報を用いた第2の認証処理を実行し、当該第2の認証処理に成功した場合に、デジタルウォレットに格納された証明書を利用する。
端末30と事業者端末20の間では、複数のデジタルコンテンツが送受信されてもよい。例えば、利用者が博物館のような施設に入場する際、学生であることを示す学生証と所定の割引が受けられるクーポンが事業者端末20に提供されてもよい。この場合、端末30は、利用者が指定するデジタルコンテンツ(学生証、クーポン)と生体情報を変換して得られる2次元バーコードを表示すればよい。なお、利用者は、サービス提供者等により提供される情報に基づいて当該サービス提供者に提示するデジタルコンテンツを指定してもよい。あるいは、利用者が所定のサービスを受ける際、端末30が、自動的にデジタルコンテンツを指定してもよい。
上記実施形態では、2次元バーコードを用いて、端末30と事業者端末20の間で証明書及び生体情報が送受信されることを説明した。証明書及び生体情報は、Bluetooth(登録商標)やNFC(Near Field Communication)等の近距離無線通信手段を用いて端末30と事業者端末20の間で送受信されてもよい。あるいは、4G(4th Generation)や5G(5th Generation)等のモバイル通信手段やWi-Fi(Wireless Fidelity)等の無線LAN(Local Area Network)を用いて、証明書及び生体情報が端末30と事業者端末20の間で送受信されてもよい。
上記実施形態では、証明書発行者が発行した証明書(デジタルコンテンツ)は端末30のデジタルウォレットに格納される場合について説明した。当該証明書(デジタルコンテンツ)は、ブロックチェーンを利用して、NFT(Non Fungible Token)やVC(Verifiable Credential)が発行、検証されてもよい。具体的に、証明書発行者はNFTやVCの発行により得られるトランザクション情報をブロックチェーンに登録し、サービス提供者はブロックチェーンに記録されているトランザクション情報を用いて証明書の信頼性を検証する。
なお、上記実施形態にて説明した情報処理システムの構成、動作等は例示であって、システムの構成等を限定する趣旨ではない。
[付記1]
身分証明書から得られる生体情報と、デジタルウォレットを開設する開設者の生体情報と、を用いて前記デジタルウォレットを開設する開設者の本人確認を行う、本人確認手段と、
前記本人確認に成功した場合、前記身分証明書から得られる生体情報又は前記デジタルウォレットを開設する開設者の生体情報を、デジタルウォレット名義人の生体情報として記憶する、記憶手段と、
を備える、端末。
[付記2]
前記本人確認手段は、前記身分証明書から得られる生体情報と前記デジタルウォレットを開設する開設者の生体情報を用いた第1の認証処理に成功した場合に、前記本人確認に成功したと判定する、付記1に記載の端末。
[付記3]
証明書発行者に証明書の発行を要求することで前記証明書発行者から前記証明書を受信し、前記身分証明書から得られる前記身分証明書の名義人に関する基本情報と前記受信した証明書から得られる前記証明書の名義人に関する基本情報が一致する場合に、前記受信した証明書を前記デジタルウォレットに格納する、証明書取得制御手段をさらに備える、付記2に記載の端末。
[付記4]
利用者がサービス提供者からサービスの提供を受ける際、前記デジタルウォレットに格納された証明書と前記デジタルウォレット名義人の生体情報を、前記サービス提供者に提供する、利用制御手段をさらに備える、付記3に記載の端末。
[付記5]
利用者がサービス提供者からサービスの提供を受ける際、前記デジタルウォレット名義人の生体情報と前記利用者の生体情報を用いた第2の認証処理を実行し、前記第2の認証処理に成功した場合に、前記デジタルウォレットに格納された証明書を利用する、利用制御手段をさらに備える、付記3に記載の端末。
[付記6]
前記利用制御手段は、
教育機関の教室に設置されたビーコン発信装置からビーコンを受信すると、前記第2の認証処理を実行し、前記第2の認証処理に成功すると、前記デジタルウォレットに格納された学生証に基づいて前記利用者が前記教室で行われる授業を受ける資格を備えるか否か判定する、付記5に記載の端末。
[付記7]
前記身分証明書は、マイナンバーカード又はパスポートである、付記1乃至6のいずれか一項に記載の端末。
[付記8]
前記生体情報は、顔画像又は前記顔画像から生成された特徴量である、付記7に記載の端末。
[付記9]
端末と、
サービス提供者が利用者にサービスを提供する際に用いられる、事業者端末と、
を含み、
前記端末は、
身分証明書から得られる生体情報と、デジタルウォレットを開設する開設者の生体情報と、を用いて前記デジタルウォレットを開設する開設者の本人確認を行う、本人確認手段と、
前記本人確認に成功した場合、前記身分証明書から得られる生体情報又は前記デジタルウォレットを開設する開設者の生体情報を、デジタルウォレット名義人の生体情報として記憶する、記憶手段と、
前記デジタルウォレットに格納されたコンテンツと前記デジタルウォレット名義人の生体情報を前記事業者端末に提供する、利用制御手段と、
を備える、システム。
[付記10]
端末において、
身分証明書から得られる生体情報と、デジタルウォレットを開設する開設者の生体情報と、を用いて前記デジタルウォレットを開設する開設者の本人確認を行い、
前記本人確認に成功した場合、前記身分証明書から得られる生体情報又は前記デジタルウォレットを開設する開設者の生体情報を、デジタルウォレット名義人の生体情報として記憶する、端末の制御方法。
[付記11]
端末に搭載されたコンピュータに、
身分証明書から得られる生体情報と、デジタルウォレットを開設する開設者の生体情報と、を用いて前記デジタルウォレットを開設する開設者の本人確認を行う処理と、
前記本人確認に成功した場合、前記身分証明書から得られる生体情報又は前記デジタルウォレットを開設する開設者の生体情報を、デジタルウォレット名義人の生体情報として記憶する処理と、
を実行させるためのプログラムを記憶する、コンピュータ読取可能な記憶媒体。
20 事業者端末
30 端末
100 端末
101 本人確認手段
102 記憶手段
201 通信制御部
202 デジタルウォレット制御部
203 記憶部
211 本人確認部
212 証明書取得制御部
213 利用制御部
301 通信制御部
302 証明書発行部
303 記憶部
311 プロセッサ
312 メモリ
313 入出力インターフェイス
314 通信インターフェイス
401 通信制御部
402 サービス提供制御部
403 記憶部
Claims (11)
- 身分証明書から得られる生体情報と、デジタルウォレットを開設する開設者の生体情報と、を用いて前記デジタルウォレットを開設する開設者の本人確認を行う、本人確認手段と、
前記本人確認に成功した場合、前記身分証明書から得られる生体情報又は前記デジタルウォレットを開設する開設者の生体情報を、デジタルウォレット名義人の生体情報として記憶する、記憶手段と、
を備える、端末。 - 前記本人確認手段は、前記身分証明書から得られる生体情報と前記デジタルウォレットを開設する開設者の生体情報を用いた第1の認証処理に成功した場合に、前記本人確認に成功したと判定する、請求項1に記載の端末。
- 証明書発行者に証明書の発行を要求することで前記証明書発行者から前記証明書を受信し、前記身分証明書から得られる前記身分証明書の名義人に関する基本情報と前記受信した証明書から得られる前記証明書の名義人に関する基本情報が一致する場合に、前記受信した証明書を前記デジタルウォレットに格納する、証明書取得制御手段をさらに備える、請求項2に記載の端末。
- 利用者がサービス提供者からサービスの提供を受ける際、前記デジタルウォレットに格納された証明書と前記デジタルウォレット名義人の生体情報を、前記サービス提供者に提供する、利用制御手段をさらに備える、請求項3に記載の端末。
- 利用者がサービス提供者からサービスの提供を受ける際、前記デジタルウォレット名義人の生体情報と前記利用者の生体情報を用いた第2の認証処理を実行し、前記第2の認証処理に成功した場合に、前記デジタルウォレットに格納された証明書を利用する、利用制御手段をさらに備える、請求項3に記載の端末。
- 前記利用制御手段は、
教育機関の教室に設置されたビーコン発信装置からビーコンを受信すると、前記第2の認証処理を実行し、前記第2の認証処理に成功すると、前記デジタルウォレットに格納された学生証に基づいて前記利用者が前記教室で行われる授業を受ける資格を備えるか否か判定する、請求項5に記載の端末。 - 前記身分証明書は、マイナンバーカード又はパスポートである、請求項1乃至6のいずれか一項に記載の端末。
- 前記生体情報は、顔画像又は前記顔画像から生成された特徴量である、請求項7に記載の端末。
- 端末と、
サービス提供者が利用者にサービスを提供する際に用いられる、事業者端末と、
を含み、
前記端末は、
身分証明書から得られる生体情報と、デジタルウォレットを開設する開設者の生体情報と、を用いて前記デジタルウォレットを開設する開設者の本人確認を行う、本人確認手段と、
前記本人確認に成功した場合、前記身分証明書から得られる生体情報又は前記デジタルウォレットを開設する開設者の生体情報を、デジタルウォレット名義人の生体情報として記憶する、記憶手段と、
前記デジタルウォレットに格納されたコンテンツと前記デジタルウォレット名義人の生体情報を前記事業者端末に提供する、利用制御手段と、
を備える、システム。 - 端末において、
身分証明書から得られる生体情報と、デジタルウォレットを開設する開設者の生体情報と、を用いて前記デジタルウォレットを開設する開設者の本人確認を行い、
前記本人確認に成功した場合、前記身分証明書から得られる生体情報又は前記デジタルウォレットを開設する開設者の生体情報を、デジタルウォレット名義人の生体情報として記憶する、端末の制御方法。 - 端末に搭載されたコンピュータに、
身分証明書から得られる生体情報と、デジタルウォレットを開設する開設者の生体情報と、を用いて前記デジタルウォレットを開設する開設者の本人確認を行う処理と、
前記本人確認に成功した場合、前記身分証明書から得られる生体情報又は前記デジタルウォレットを開設する開設者の生体情報を、デジタルウォレット名義人の生体情報として記憶する処理と、
を実行させるためのプログラムを記憶する、コンピュータ読取可能な記憶媒体。
Priority Applications (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2023543381A JP7371818B1 (ja) | 2023-03-22 | 2023-03-22 | 端末、システム、端末の制御方法及びプログラム |
| PCT/JP2023/011071 WO2024195019A1 (ja) | 2023-03-22 | 2023-03-22 | 端末、システム、端末の制御方法及び記憶媒体 |
| JP2023176852A JP7758365B2 (ja) | 2023-03-22 | 2023-10-12 | 端末、端末の制御方法及びプログラム |
| JP2024160553A JP7687505B2 (ja) | 2023-03-22 | 2024-09-18 | 端末、情報処理装置、端末の制御方法及びプログラム |
| JP2025083872A JP2025113362A (ja) | 2023-03-22 | 2025-05-20 | 端末、端末の制御方法及びプログラム |
| JP2025130627A JP2025156527A (ja) | 2023-03-22 | 2025-08-05 | システム |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2023/011071 WO2024195019A1 (ja) | 2023-03-22 | 2023-03-22 | 端末、システム、端末の制御方法及び記憶媒体 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024195019A1 true WO2024195019A1 (ja) | 2024-09-26 |
Family
ID=88509962
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2023/011071 Pending WO2024195019A1 (ja) | 2023-03-22 | 2023-03-22 | 端末、システム、端末の制御方法及び記憶媒体 |
Country Status (2)
| Country | Link |
|---|---|
| JP (5) | JP7371818B1 (ja) |
| WO (1) | WO2024195019A1 (ja) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP7371818B1 (ja) * | 2023-03-22 | 2023-10-31 | 日本電気株式会社 | 端末、システム、端末の制御方法及びプログラム |
| WO2025115463A1 (ja) * | 2023-11-30 | 2025-06-05 | 日本電気株式会社 | 端末、システム、端末の制御方法及び記憶媒体 |
| WO2025115464A1 (ja) * | 2023-11-30 | 2025-06-05 | 日本電気株式会社 | 端末、システム、端末の制御方法及び記憶媒体 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112258177A (zh) * | 2020-10-16 | 2021-01-22 | 中国工商银行股份有限公司 | 银联卡注册电子钱包和支付的方法、终端、设备及介质 |
| JP7151944B1 (ja) * | 2021-09-30 | 2022-10-12 | 日本電気株式会社 | 認証端末、システム、認証端末の制御方法及びプログラム |
| US20220391482A1 (en) * | 2021-06-06 | 2022-12-08 | Apple Inc. | Digital identification credential user interfaces |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4581200B2 (ja) | 2000-08-31 | 2010-11-17 | ソニー株式会社 | 個人認証システム、個人認証方法、および情報処理装置、並びにプログラム提供媒体 |
| JP2003030560A (ja) | 2001-07-12 | 2003-01-31 | Toshiba Corp | Web上のサービス提供システム用サーバコンピュータ及び前記システム用プログラム |
| JP2003345930A (ja) | 2002-05-27 | 2003-12-05 | Hitachi Ltd | 属性証明書管理方法および装置 |
| JP2004295197A (ja) | 2003-03-25 | 2004-10-21 | Nec Corp | 電子チケット販売システムおよび販売方法 |
| JP2005252621A (ja) | 2004-03-03 | 2005-09-15 | Ntt Communications Kk | 電子証明書作成装置、電子証明書検証装置、電子証明書作成方法、電子証明書作成プログラム、および電子証明書検証プログラム |
| JP2011023854A (ja) | 2009-07-14 | 2011-02-03 | Sony Corp | 情報処理装置、情報処理方法およびプログラム |
| JP6733790B2 (ja) * | 2018-12-10 | 2020-08-05 | 大日本印刷株式会社 | 携帯端末、本人確認システム及びプログラム |
| JP2021117868A (ja) * | 2020-01-29 | 2021-08-10 | 京セラドキュメントソリューションズ株式会社 | 決済システムおよび画像処理装置 |
| JP7693309B2 (ja) * | 2020-12-18 | 2025-06-17 | 株式会社東芝 | Id登録システム、id登録方法およびプログラム |
| JP7371818B1 (ja) * | 2023-03-22 | 2023-10-31 | 日本電気株式会社 | 端末、システム、端末の制御方法及びプログラム |
-
2023
- 2023-03-22 JP JP2023543381A patent/JP7371818B1/ja active Active
- 2023-03-22 WO PCT/JP2023/011071 patent/WO2024195019A1/ja active Pending
- 2023-10-12 JP JP2023176852A patent/JP7758365B2/ja active Active
-
2024
- 2024-09-18 JP JP2024160553A patent/JP7687505B2/ja active Active
-
2025
- 2025-05-20 JP JP2025083872A patent/JP2025113362A/ja active Pending
- 2025-08-05 JP JP2025130627A patent/JP2025156527A/ja active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112258177A (zh) * | 2020-10-16 | 2021-01-22 | 中国工商银行股份有限公司 | 银联卡注册电子钱包和支付的方法、终端、设备及介质 |
| US20220391482A1 (en) * | 2021-06-06 | 2022-12-08 | Apple Inc. | Digital identification credential user interfaces |
| JP7151944B1 (ja) * | 2021-09-30 | 2022-10-12 | 日本電気株式会社 | 認証端末、システム、認証端末の制御方法及びプログラム |
Also Published As
| Publication number | Publication date |
|---|---|
| JP7687505B2 (ja) | 2025-06-03 |
| JP2024137630A (ja) | 2024-10-07 |
| JP2025156527A (ja) | 2025-10-14 |
| JP2025113362A (ja) | 2025-08-01 |
| JP2024170330A (ja) | 2024-12-06 |
| JP7371818B1 (ja) | 2023-10-31 |
| JPWO2024195019A1 (ja) | 2024-09-26 |
| JP7758365B2 (ja) | 2025-10-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7687505B2 (ja) | 端末、情報処理装置、端末の制御方法及びプログラム | |
| JP6897953B2 (ja) | 入場受付端末、入場受付方法、入場受付プログラム、および入場受付システム | |
| JP2025088095A (ja) | 端末、システム、端末の制御方法及びプログラム | |
| JP7639825B2 (ja) | 認証サーバ、認証システム、認証要求処理方法及びプログラム | |
| JP7006865B1 (ja) | 管理サーバ、システム、トークン発行方法及びコンピュータプログラム | |
| JP7533723B1 (ja) | サーバ装置、サーバ装置の制御方法及びプログラム | |
| WO2025057526A1 (ja) | 端末、システム、端末の制御方法及び記憶媒体 | |
| WO2024024043A1 (ja) | システム及び方法 | |
| US20250148466A1 (en) | Terminal, system, control method of terminal and storage medium | |
| JP2025110643A (ja) | サーバ装置、サーバ装置の制御方法及びプログラム | |
| JP7501822B1 (ja) | サーバ装置、システム、サーバ装置の制御方法及びプログラム | |
| JP7501723B2 (ja) | 管理サーバ、システム、方法及びコンピュータプログラム | |
| JP2025088101A (ja) | 端末、システム、端末の制御方法及びプログラム | |
| JP2022059864A (ja) | 情報処理装置、情報処理システム、情報処理方法、及びプログラム | |
| JP7589829B2 (ja) | システム、認証端末、認証端末の制御方法及びプログラム | |
| JP7276523B2 (ja) | 管理サーバ、システム、トークン発行方法及びコンピュータプログラム | |
| JP7764984B1 (ja) | 認証端末、システム、認証端末の制御方法及びプログラム | |
| WO2025115463A1 (ja) | 端末、システム、端末の制御方法及び記憶媒体 | |
| JP2025080421A (ja) | サーバ装置、システム、サーバ装置の制御方法及びプログラム | |
| WO2025115464A1 (ja) | 端末、システム、端末の制御方法及び記憶媒体 | |
| WO2025079242A1 (ja) | 端末、事業者端末、端末の制御方法及び記憶媒体 | |
| WO2025257933A1 (ja) | 端末、端末の制御方法及び記憶媒体 | |
| WO2025262768A1 (ja) | サーバ装置、システム、サーバ装置の制御方法及び記憶媒体 | |
| WO2025009106A1 (ja) | サーバ装置、サーバ装置の制御方法及び記憶媒体 | |
| WO2025027828A1 (ja) | サーバ装置、サーバ装置の制御方法、記憶媒体及びシステム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 2023543381 Country of ref document: JP |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23928602 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2023928602 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2023928602 Country of ref document: EP Effective date: 20251022 |
|
| ENP | Entry into the national phase |
Ref document number: 2023928602 Country of ref document: EP Effective date: 20251022 |
|
| ENP | Entry into the national phase |
Ref document number: 2023928602 Country of ref document: EP Effective date: 20251022 |
|
| ENP | Entry into the national phase |
Ref document number: 2023928602 Country of ref document: EP Effective date: 20251022 |
|
| ENP | Entry into the national phase |
Ref document number: 2023928602 Country of ref document: EP Effective date: 20251022 |