US20070050300A1 - Electronic cash system - Google Patents

Electronic cash system Download PDF

Info

Publication number
US20070050300A1
US20070050300A1 US11/590,716 US59071606A US2007050300A1 US 20070050300 A1 US20070050300 A1 US 20070050300A1 US 59071606 A US59071606 A US 59071606A US 2007050300 A1 US2007050300 A1 US 2007050300A1
Authority
US
United States
Prior art keywords
user
unit
signature
shop
amount
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/590,716
Inventor
Shinako Matsuyama
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Priority to US11/590,716 priority Critical patent/US20070050300A1/en
Publication of US20070050300A1 publication Critical patent/US20070050300A1/en
Assigned to SONY CORPORATION reassignment SONY CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MATSUYAMA, SHINAKO
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3676Balancing accounts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Definitions

  • the present invention relates to an electronic cash system, and more particularly to an electronic cash system for processing a payment for an amount due with previously deposited funds.
  • Mondex (trade name) is an electronic money system in accordance with the balance management scheme which satisfies the requirements mentioned above and has been widely used.
  • serviced user devices and shops offering articles each hold a Mondex card, and the shops are further required to be equipped with a special apparatus for reading from and writing into a Mondex card, so that electronic cash is inputted or outputted therethrough.
  • the security on the user of Mondex on the Internet relies on the security ensured by the Mondex card which enhances the security by always providing two cryptographic modules such that the card is utilized by switching one of the modules which ensures the security. Also, since the Mondex system does not manage trade information at all, the anonymity is held for personal information and purchase logs.
  • the present invention has been made in view of the circumstance as mentioned above, and its object is to enable secure utilization of electronic cash, protection of personal information and individual's purchase information from being unnecessarily captured by respective apparatus, detection of unauthorized activities, and management of circulation of money without the need for managing special apparatus.
  • an electronic cash system processes a payment for an amount due, the payment being carried out using previously deposited funds.
  • An account management device includes storage means for storing information identifying a user and information of an amount of money available to be utilized by the user based on the previously deposited funds.
  • a settlement processing device includes settlement instructing means for instructing a payment institution to settle.
  • a control device includes management means for managing the information identifying the user and for managing an account number in the payment institution of the user, the account number being encrypted with a public key of the settlement processing device, balance change instructing means for instructing the account management device to change a balance of the stored previously deposited funds of the user based on the information identifying the user, and settlement execution instructing means for instructing the settlement instructing means of the settlement processing device to execute a settlement transaction based on the account number in the payment institution.
  • an electronic cash system processes a payment for an amount due, the payment being carried out using previously deposited funds.
  • a virtual bank includes an account management unit operable to store information identifying a user and information of an amount of money available to be utilized by the user based on the previously deposited funds.
  • a clearing house includes a clearing unit operable to instruct a payment institution to settle.
  • a control center includes a user management unit operable to manage the information identifying the user and to manage an account number in the payment institution of the user, the account number being encrypted with a public key of the clearinghouse, and a communication unit operable to instruct the virtual bank to change a balance of the stored previously deposited funds of the user based on the information identifying the user and to instruct the clearing unit of the clearinghouse to execute a settlement transaction based on the account number in the payment institution.
  • FIG. 1 is a diagram illustrating the configuration of an electronic cash system to which the present invention is applied;
  • FIG. 2 is a flow chart for explaining the processing for initially depositing funds and registering a user ID in a virtual bank 4 ;
  • FIG. 3 is a diagram showing an example of data for certifying a user device
  • FIG. 4 is a diagram for explaining the processing for mutual authentication
  • FIG. 5 is a flow chart for explaining the processing for a user device 1 to deposit funds in the virtual bank 4 second and subsequent times;
  • FIG. 6 is a flow chart for explaining the processing for registering a shop 2 in a center 3 and in the virtual bank 4 ;
  • FIG. 7 is a diagram showing an example of data for certifying a shop
  • FIG. 8 is a flow chart for explaining the processing for transferring electronic cash from a user device 1 - 2 to a user device 1 - 1 ;
  • FIG. 9 is a flow chart for explaining the processing for transferring electronic cash from the user device 1 - 2 to the user device 1 - 1 ;
  • FIG. 10 is a flow chart for explaining the processing for a payment from the user device 1 to the shop 2 ;
  • FIG. 11 is a flow chart for explaining the processing for depositing proceeds into an account of the shop 2 .
  • an electronic cash system includes an account management apparatus (for example, a virtual bank 4 in FIG. 1 ) includes storage means (for example, an account management unit 45 in FIG. 1 ) for storing information for identifying a user, and the amount of money utilized by the user based on the previously deposited funds, a settlement processing apparatus (for example an clearing house 5 in FIG. 1 ) includes settlement instructing means (for example, a clearing unit 55 in FIG. 1 ) for instructing a payment institution to settle, a control apparatus (for example, a center 3 in FIG. 1 ) includes management means (for example, a user management unit 35 in FIG.
  • an account management apparatus for example, a virtual bank 4 in FIG. 1
  • storage means for example, an account management unit 45 in FIG. 1
  • a settlement processing apparatus for example an clearing house 5 in FIG. 1
  • settlement instructing means for example, a clearing unit 55 in FIG. 1
  • a control apparatus for example, a center 3 in FIG. 1
  • management means for example, a user management unit 35 in FIG
  • balance change instructing means for example, a communication unit 37 in FIG. 1
  • settlement execution instructing means for example, the communication unit 37 in FIG. 1
  • FIG. 1 is a diagram representing the configuration of an electronic cash system to which the present invention is applied.
  • a user device 1 - 1 purchases an article or receives a service from a shop 2 , and pays the price therefor to the shop 2 through a center 3 , the virtual bank 4 and a clearing house 5 .
  • a user device 1 - 2 purchases an article or receives a service from a shop 2 , and pays the price therefor to the shop 2 through the center 3 , the virtual bank 4 and the clearing house 5 .
  • the shop 2 provides articles or services to the user device 1 - 1 or 1 - 2 , and receives payments from the user device 1 - 1 or the user device 1 - 2 through the center 3 , the virtual bank 4 and the clearing house 5 .
  • the center 3 stores predetermined data on the user device 1 - 1 , the user device 1 - 2 and the shop 2 , and instructs the clearing house 5 to execute settlement transactions for the user device 1 - 1 , the user device 1 - 2 and the shop 2 .
  • the virtual bank 4 which is an institution for issuing electronic money, issues IDs to units to which electronic money is issued (the user device 1 - 1 or 1 - 2 and the shop 2 ), and manages the balance or the amount of sales corresponding to the IDs.
  • the clearing house 5 executes payment and deposit procedures for each account or each card number of the user device 1 - 1 or 1 - 2 and the shop 2 for a bank 8 or a card company 7 .
  • a certificate authority 6 responds to requests of the user device 1 - 1 to the clearing house 5 to issue a certificate including predetermined data.
  • a mutual authentication unit 11 - 1 of the user device 1 - 1 mutually authenticates with the user device 1 - 2 , the shop 2 , the center 3 or the certificate authority 6 through the processing later described.
  • a storage unit 12 - 1 is composed of elements having tamper immunity for storing user ID, balance, and uncleared amount of money for electronic money.
  • An encryption unit 13 - 1 encrypts predetermined data to be transmitted to the user device 1 - 2 , the shop 2 or the center 3 , such as the amount of purchase, information on purchased articles, user ID of electronic money, and so on.
  • a decryption unit 14 - 1 decrypts encrypted information such as a user ID, amount, balance and so on which may be received from the user device 1 - 2 , the shop 2 , the center 3 or the certificate authority 6 .
  • a signature unit 15 - 1 applies a hash function to predetermined data such as the amount of purchase, information on purchased articles, user ID of electronic money, and so on, transmitted to the user device 1 - 2 , the shop 2 , the center 3 or the certificate authority 6 , to calculate a hash value, and encrypts the hash value with a predetermined key to create a signature.
  • the signature unit 15 - 1 also examines data or a signature added to data, which may be received from the user device 1 - 2 , the shop 2 , the center 3 or the certificate authority 6 , to determine whether or not the data has not been tampered.
  • a communication unit 16 - 1 transmits predetermined data to the user device 1 - 2 , the shop 2 , the center 3 or the certificate authority 6 , and receives data transmitted from the user device 1 - 2 , the shop 2 , the center 3 or the certificate authority 6 .
  • a mutual authentication unit 11 - 2 , a storage unit 12 - 2 , an encryption unit 13 - 2 , a decryption unit 14 - 2 , a signature unit 15 - 1 , and a communication unit 16 - 2 of the user device 1 - 2 are similar to the mutual authentication unit 11 - 1 , the storage unit 12 - 1 , the encryption unit 13 - 1 , the decryption unit 14 - 1 , the signature unit 15 - 1 , and the communication unit 16 - 1 , respectively, of the user device 1 - 1 , so that explanation thereon is omitted.
  • the user device 1 - 1 and the user device 1 - 2 are simply referred to as the “user device 1 ” unless they should be particularly distinguished from each other.
  • a mutual authentication unit 21 of the shop 2 , a mutual authentication unit 31 of the center 3 , a mutual authentication unit 41 of the virtual bank 4 , and a mutual authentication unit 51 of the clearing house 5 perform processing similar to the mutual authentication unit 11 - 1 of the user device 1 - 1 , so that explanation thereon is omitted.
  • An encryption unit 23 of the shop 2 , an encryption unit 32 of the center 3 , an encryption unit 42 of the virtual bank 4 , and an encryption unit 52 of the clearing house 5 perform processing similar to the encryption unit 13 - 1 of the user device 1 - 1 , so that explanation thereon is omitted.
  • a decryption unit 24 of the shop 2 , a decryption unit 33 of the center 3 , a decryption unit 43 of the virtual bank 4 , and a decryption unit 53 of the clearing house 5 perform processing similar to the decryption unit 14 - 1 of the user device 1 - 1 , so that explanation thereon is omitted.
  • a signature unit 25 of the shop 2 , a signature unit 34 of the center 3 , a signature unit 44 of the virtual bank 4 , and a signature unit 54 of the clearinghouse 5 perform processing similar to the signature unit 15 - 1 of the user device 1 - 1 , so that explanation thereon is omitted.
  • a communication unit 26 of the shop 2 , a communication unit 37 of the center 3 , a communication unit 46 of the virtual bank 4 , and a communication unit 56 of the clearing house 5 perform processing similar to the communication unit 16 - 1 of the user device 1 - 1 , so that explanation thereon is omitted.
  • a storage unit 22 of the shop 2 is composed of elements having tamper immunity for storing shop IDs, the amount of sales, and so on.
  • a user management unit 35 of the center 3 stores and manages a credit card number of a user which is encrypted with the user's public keys Kpu corresponding to the user ID and with a public key Kppg of the clearing house 5 .
  • a shop management unit 36 of the center 3 stores and manages an account number of the shop 2 which is encrypted with a public key Kpm of the shop 2 corresponding to a shop ID and with the public key Kppg of the clearing house 5 .
  • An account management unit 45 of the virtual bank 4 stores the balance of electronic cash for a user corresponding to a user ID, and the amount of sales for the shop 2 corresponding to the shop ID.
  • a clearing unit 55 of the clearing house 5 instructs the bank 8 or the card company 7 to execute payment and deposit procedures for each of accounts of the user device 1 - 1 or 1 - 2 and the shop 2 .
  • FIG. 1 illustrates as if the user device 1 , the shop 2 , the center 3 , the virtual bank 4 and the clearing house 5 , the certificate authority 6 , and the credit company 7 and the bank 8 exist independently of one another, some functions of them may be collected into one. For example, the functions provided by the center 3 , the virtual bank 4 and the clearing house 5 may be combined into the center 3 .
  • the communication unit 16 of the user device 1 transmits personal information, account information and the public key Kpu of the user device 1 to the certificate authority 6 .
  • the personal information refers to that with which the user device 1 can be identified, for example, ID or the like.
  • the certificate authority 6 receives the data transmitted by the communication unit 16 of the user device 1 .
  • the certificate authority 6 applies a predetermined hash function to the received personal information, account information and public key Kpu of the user device 1 to generate a hash value which is encrypted with a secret key Ksca of the certificate authority 6 to create a signature which is then appended to the personal information, the account information, and the public key Kpu of the user device 1 to create a certificate which is transmitted to the user device 1 .
  • FIG. 3 shows an example of the certificate for the user device.
  • the certificate may include the name (ID) of the certificate authority, a certificate number (ID), an expiration date of the certificate, and so on in addition to those enumerated above.
  • the communication unit 16 of the user device 1 receives the data transmitted by the certificate authority 6 .
  • the signature is data attached to data or a certificate for checking it for tampering and authenticating its creator.
  • the signature is created by applying a hash function to data to be transmitted to generate a hash value which is encrypted with a secret key of a public key cryptosystem.
  • the hash function is a function which accepts predetermined data to be transmitted as an input, and compresses the predetermined data to data of a predetermined bit length which is outputted as a hash value.
  • the hash function is characterized in that an input is predicted from a hash value (output) with difficulties, a large number of bits in the hash value changes when one bit in data inputted to the hash function has changed, and input data having the same hash value is difficult to find out.
  • a recipient who has received a signature and data, decrypts the signature with the public key of the public key cryptosystem to obtain the result (hash value). Further, a hash value is calculated for the received data, and it is determined whether or not the calculated hash value is equal to the hash value obtained by decrypting the signature. If it is determined that the hash value of the transmitted data is equal to the decrypted hash value, it is found that the received data is not tampered, and is data transmitted from a source which holds a secret key corresponding to the public key.
  • the hash function for the signature MD4, MD5, SHA-1 or the like may be employed.
  • the public key cryptosystem In contrast with a common key cryptosystem which employs the same key (common key) for encryption and decryption, the public key cryptosystem employs a key used for encryption different from a key for decryption. With the use of the public key cryptosystem, even if one key is published, the other can be held in secret. A key which may be published is referred to as a “public key,” while the other key which is held in secret is referred to as a “secret key.”
  • the RSA (Rivest-Shamir-Adleman) encryption which is representative of public key cryptosystem, will be explained in brief.
  • two sufficiently large prime numbers p and q are chosen, and the product n of p and q is calculated.
  • the least common multiple L of (p ⁇ 1) and (q ⁇ 1) is calculated.
  • a number e which is equal to or more than three and less than L and is relatively prime with L, is found (i.e., a number which can divide commonly both e and L is only one).
  • a multiplicative inverse element d of e related to a multiplication to modulus L is found.
  • n and e are chosen to be public keys, while p, q and d are chosen to be secret keys.
  • the secret key d can be calculated from the public key e.
  • the public key n has a number of digits so large that the prime factorization for the public key n is difficult in terms of the amount of computations, the secret key d cannot be computed from the public key e and therefore cannot be decrypted even if only the public key n is known.
  • the RSA encryption can provide a key used for encryption and a key for decryption which are different from each other.
  • elliptic curve cryptosystem which is another example of public key cryptosystem, will be explained in brief.
  • An addition of a point on the elliptic curve is defined, where nB represents the result of n-time additions of B.
  • a subtraction is also defined. It has been proven difficult to calculate n from B and nB.
  • B and nB are chosen to be public keys, while n is chosen to be a secret key.
  • the elliptic curve cryptosystem can also provide a key used for encryption and a key for decryption which are different from each other, as is the case of the RSA encryption.
  • the mutual authentication unit 11 of the user device 1 mutually authenticates with the mutual authentication unit 31 of the center 3 , and they share a coherence of random numbers R 2 ⁇ R 3 , later described, as a temporary key Ktsu between the center 3 and the user device 1 .
  • a procedure for the mutual authentication will be described later with reference to a flow chart of FIG. 4 .
  • the encryption unit 13 of the user device 1 encrypts the user's credit card number, which has been previously stored, with the public key Kppg of the clearing house 5 , and the signature unit 15 appends the user's signature to the amount of issued electronic cash which has been set by the user device.
  • the user's signature involves applying a hash function to the amount of issued electronic cash, and encrypting a resulting hash value with the secret key Ksu of the user 1 .
  • the encryption unit 13 of the user device 1 encrypts the encrypted credit card number and the amount of issued electronic cash appended with the signature with the temporary key Ktsu.
  • the communication unit 16 transmits them to the center 3 .
  • the communication unit 37 of the center 3 receives the credit card number and the amount of issued electronic cash, transmitted thereto from the user device 1 .
  • the decryption unit 33 of the center 3 decrypts the credit card number and the amount of issued electronic cash encrypted with the temporary key Ktsu.
  • the signature unit 34 compares a value derived by decrypting the signature appended to the amount of issued electronic cash by the decryption unit 33 with the public key Kpu of the user device included in the certificate of the user device 1 obtained through the mutual authentication, later described, with a hash value derived by applying a hash function to the amount of issued electronic cash decrypted with the temporary key Ktsu, and determines that the amount of issued electronic cash is not tampered if they are identical. If it is determined that the amount of issued electronic cash is tampered, the processing is aborted.
  • step S 16 the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 51 of the clearing house 5 , and the center 3 and the clearing house 5 share a temporary key Ktsp.
  • the procedure for the mutual authentication will be described later with reference to FIG. 4 .
  • the signature unit 34 of the center 3 further appends a signature of the center 3 to the amount of issued electronic cash appended with the signature of the user device.
  • the encryption unit 32 encrypts the certificate of the user device 1 , the credit card number encrypted with the public key Kppg of the clearing house 5 , and the amount of issued electronic cash appended with the signature of the center 3 and the signature of the user device 1 , with the temporary key Ktsp.
  • the communication unit 37 transmits the encrypted data to the clearing house 5 .
  • the communication unit 56 of the clearing house 5 receives the data transmitted thereto from the center 3 .
  • the decryption unit 53 of the clearing house 5 decrypts the data received from the center 3 with the temporary key Ktsp, and the signature unit 54 of the clearing house 5 verifies the signature of the center 3 and the signature of the user device 1 , appended to the amount of issued electronic cash, to confirm that the amount of issued electronic cash is not tampered. Since the processing for verifying the signatures is similar to that at step S 15 , explanation thereon is omitted. If the signature unit 54 finds that the amount of issued electronic cash is tampered, the processing is aborted.
  • step S 19 the decryption unit 53 decrypts the credit card number encrypted with the public key Kppg of the clearing unit 5 with a secret key Kspg of the clearing house 5 previously stored therein to derive the credit card number.
  • step S 20 the clearing unit 55 delivers credit and transfer instructions to the credit card company 7 through the communication unit 56 .
  • the signature unit 54 appends a signature of the clearing house 5 to the verified result at step S 18 and step S 19 , and the processed result at step S 20 .
  • the encryption unit 52 encrypts the verified result and processed result appended with the signature with the temporary key Ktsp.
  • the communication unit 56 transmits the encrypted verified result and processed result to the center 3 .
  • the communication unit 37 of the center 3 receives the verified result and the processed result transmitted thereto from the clearing house 5 , and the decryption unit 33 decrypts the verified result and the processed result received from the clearing house 5 . If the verified result thus received indicates a fraud, and the processed result indicates that the processing was not normally completed, the processing is aborted.
  • step S 21 If the verified result received at step S 21 indicates that there is no fraud, and the processed result indicates that the processing was normally completed, the processing proceeds to step S 22 , where the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 41 of the virtual bank 4 , and the center 3 and the virtual bank 4 share a temporary key Ktsb.
  • the encryption unit 32 encrypts the certificate of the user device 1 , and the amount of issued electronic money appended with the signature of the center 3 and the signature of the user device 1 with the temporary key Ktsb.
  • the communication unit 37 transmits the encrypted certificate of the user device 1 and electronically issued amount to the virtual bank 4 .
  • the communication unit 46 of the virtual bank 4 receives the certificate of the user device 1 and the electronically issued amount transmitted thereto from the center 3 .
  • the decryption unit 43 of the virtual bank 4 decrypts the certificate of the user device 1 and the electronically issued amount received from the center 3 with the temporary key Ktsb, and the signature unit 44 verifies the signature of the center 3 and the signature of the user device 1 appended to the amount of issued electronic cash to confirm that the amount of issued electronic cash is not tampered. Since the processing for verifying the signatures is similar to that at step S 15 , explanation thereon is omitted. If the signature unit 44 finds tampering in the amount of issued electronic cash, the processing is aborted.
  • the account management unit 45 of the virtual bank 4 When the amount of issued electronic cash is not tampered, the account management unit 45 of the virtual bank 4 generates a user ID, and stores the amount of issued electronic money corresponding to the user ID at step S 25 .
  • the signature unit 44 appends a signature of the virtual bank 4 to the user ID.
  • the encryption unit 42 encrypts the user ID with the temporary key Ktsb.
  • the communication unit 46 transmits the encrypted user ID to the center 3 .
  • the communication unit 37 of the center 3 receives the user ID transmitted by the virtual bank 4 .
  • the decryption unit 33 of the center 3 decrypts the user ID transmitted by the virtual bank 4 with the temporary key Ktsb, and the user device management unit 35 stores and manages a set of the decrypted user ID, the public key Kpu of the user device received at step S 13 , and the credit card number encrypted with the public key Kppg of the clearing house 5 received at step S 14 .
  • the signature unit 34 of the center 3 appends a signature of the center 3 to the user ID.
  • the encryption unit 32 encrypts the user ID with the temporary key Ktsu.
  • the communication unit 37 transmits the encrypted user ID to the user device.
  • the communication unit 16 of the user device 1 receives the user ID transmitted by the center 3 .
  • step S 29 the decryption unit 14 of the user device 1 decrypts the received user ID with the temporary key Ktsu, and the storage unit 12 stores the received user ID and the amount of issued electronic cash transmitted at step S 14 as the electronic cash balance.
  • the user device 1 registers the user ID in the virtual bank 4 , and stores the amount of issued electronic cash identical to the amount which has been previously paid in correspondence to the user ID.
  • step S 41 the mutual authentication unit 11 of the user device 1 generates a 64-bit random number R 1 .
  • step S 42 the mutual authentication unit 11 of the user device 1 transmits the certificate including the public key Kpu of itself (acquired from the certificate authority 5 at step S 12 ) and the random number R 1 to the mutual authentication unit 31 of the center 3 .
  • the mutual authentication unit 31 of the center 3 decrypts the signature (encrypted with the secret key Ksca of the certificate authority 6 ) in the received certificate with the public key Kpca of the certificate authority 6 , which has been previously acquired, to extract the public key Kpu of the user device 1 and the hash value of the name of the user device 1 , as well as to extract the public key Kpu of the user device 1 and the name of the user device 1 which are stored in the certificate in the form of clear text.
  • the signature in the certificate can be decrypted, and the public key Kpu and the hash value of the name of the user device 1 produced by the decryption match the public key Kpu of the user device 1 stored in the certificate in the form of clear text and the hash value derived by applying the hash function to the name of the user device 1 .
  • the mutual authentication unit 31 of the center 3 When proper authentication result is derived, the mutual authentication unit 31 of the center 3 generates a 64-bit random number R 2 at step S 44 .
  • the mutual authentication unit 31 of the center 3 At step S 45 , the mutual authentication unit 31 of the center 3 generates a coherence of the random number R 1 and the random number R 2 , R 1 ⁇ R 2 .
  • the mutual authentication unit 31 of the center 3 encrypts the coherence R 1 ⁇ R 2 with a secret key Ksesc of itself.
  • the mutual authentication unit 31 of the center 3 encrypts the coherence R 1 ⁇ R 2 with the public key Kpu of the user device 1 acquired at step S 43 .
  • the mutual authentication unit 31 of the center 3 transmits a certificate (which has been previously acquired from the certificate authority) including the coherence R 1 ⁇ R 2 encrypted with the secret key Ksesc, the coherence R 1 ⁇ R 2 encrypted with the public key Kpu, and the public key Kpesc of itself to the mutual authentication unit 11 of the user device 1 .
  • the mutual authentication unit 11 of the user device 1 decrypts the signature in the received certificate with the public key Kpac of the certificate authority, which has been previously acquired, and extracts the public key Kpesc from the certificate if it is correct. Since the processing in this event is similar to that at step S 43 , explanation thereon is omitted.
  • the mutual authentication unit 11 of the user device 1 decrypts the coherence R 1 ⁇ R 2 encrypted with the secret key Ksesc of the center 3 with the public key Kpesc acquired at step s 49 .
  • the mutual authentication unit 11 of the user device 1 decrypts the coherence R 1 ⁇ R 2 encrypted with the public key Kpu of itself with the secret key Ksu of itself.
  • the mutual authentication unit 11 of the user device 1 compares the coherence R 1 ⁇ R 2 decrypted at step S 50 with the coherence R 1 ⁇ R 2 decrypted at step S 51 , and authenticates the center 3 as true if they match, and aborts the processing, regarding the center 3 as false, if they do not match.
  • the mutual authentication unit 11 of the user device 1 When a true authentication result is derived, the mutual authentication unit 11 of the user device 1 generates a 64-bit random number R 3 at step S 53 .
  • the mutual authentication unit 11 of the user device 1 At step S 54 , the mutual authentication unit 11 of the user device 1 generates a coherence R 2 ⁇ R 3 of the random number R 2 acquired at step S 50 and the random number R 3 generated thereby.
  • the mutual authentication unit 11 of the user device 1 encrypts the coherence R 21 R 3 with the public key Kpesc acquired at step S 49 .
  • the mutual authentication unit 11 of the user device 1 transmits the encrypted coherence R 2 ⁇ R 3 to the mutual authentication unit 31 of the center 3 .
  • the mutual authentication unit 31 of the center 3 decrypts the encrypted coherence R 21 R 3 with the secret key Ksesc of itself.
  • the mutual authentication unit 31 of the center 3 authenticates the user device 1 as a true user device if the decrypted random number R 2 matches the random number R 2 generated at step S 44 (the random number R 2 before being encrypted), and aborts the processing, regarding the user device 1 as a false user device, if they do not match.
  • the mutual authentication unit 31 of the center 3 and the mutual authentication unit 11 of the user device 1 mutually authenticate.
  • the random numbers utilized for the mutual authentication are utilized as temporary keys which are effective only in the processing subsequent to the mutual authentication.
  • the mutual authentication unit 11 of the user device 1 mutually authenticates with the mutual authentication unit 31 of the center 3 , and shares a temporary key Ktsu which is used between the center 3 and the user device 1 . Since the procedure for the mutual authentication is similar to that previously explained with reference to FIG. 4 , explanation thereon is omitted.
  • the signature unit 15 of the user device 1 appends a signature of a user 1 to the user ID and the amount of issued electronic cash. In this event, the signature may be collectively appended to the user ID and the amount of issued electronic cash.
  • the encryption unit 13 of the user device 1 encrypts the user ID and the amount of issued electronic cash, appended with the signature, with the temporary key Ktsu, and the communication unit 16 transmits the user ID and the amount of issued electronic cash encrypted with the temporary key Ktsu to the center 3 .
  • the communication unit 37 of the center 3 receives the user ID and the amount of issued electronic cash encrypted with the temporary key Ktsu, which has been transmitted thereto from the user device 1 .
  • the decryption unit 33 of the center 3 decrypts the user ID and the amount of issued electronic cash encrypted with the temporary key Ktsu, with the temporary key Ktsu, and the signature unit 34 verifies the signature appended to the amount of issued electronic cash resulting from the decryption to confirm that the amount of issued electronic cash is not tampered. Since the verification of the signature is similar to the processing previously explained at step S 15 in FIG. 2 , explanation thereon is omitted. If the signature unit 34 finds tampering in the amount of issued electronic cash, the processing is aborted.
  • step S 74 the user management unit 35 of the center 3 derives a credit card number, which has been encrypted with the public key Kppg of the clearinghouse stored at step S 27 in FIG. 2 , corresponding to the user ID.
  • step S 75 through step S 81 are similar to step S 16 through step S 22 , respectively, in FIG. 2 , explanation thereon is omitted.
  • the signature unit 34 of the center 3 appends a signature of the center 3 to the user ID and the amount of issued electronic cash, respectively appended with the signature of the user device, received at step S 72 .
  • the encryption unit 32 encrypts the certificate of the user device 1 , the user ID and the amount of issued electronic cash with the temporary key Ktsb.
  • the communication unit 37 transmits these to the virtual bank 4 .
  • the communication unit 46 of the virtual bank 4 receives the certificate of the user device 1 , the user ID and the amount of issued electronic cash transmitted by the center 3 .
  • the decryption unit 43 of the virtual bank 4 decrypts the certificate of the user device 1 , the user ID and the amount of issued electronic cash, received at step S 82 , with the temporary key Ktsb, and the signature unit 44 verifies the signature of the center 3 and the signature of the user device 1 appended to the amount of issued electronic cash to confirm that the amount of issued electronic cash is not tampered. Since the verification of the signatures is similar to the processing previously explained at step S 15 in FIG. 2 , explanation thereon is omitted. If the signature unit 44 finds tampering in the amount of issued electronic cash, the processing is aborted. When the amount of issued electronic cash is not tampered, the account management unit 45 adds the amount of electronic cash issued this time to the amount of electronic cash corresponding to the user ID at step S 84 .
  • step S 85 through step S 87 are similar to the processing at step S 26 through step S 28 , respectively, in FIG. 2 , explanation thereon is omitted.
  • the storage unit 12 of the user device 1 adds the amount of issued electronic cash transmitted at step S 72 to the electronic cash balance stored in the storage unit 12 , and stores the resulting amount.
  • the user device 1 can deposit electronic cash to the virtual bank 4 second and subsequent times in a similar manner.
  • the communication unit 26 of the shop 2 transmits shop information, account information, and a public key Kpm of the shop 2 to the certificate authority 6 .
  • the shop information refers to that with which the shop 2 can be identified, for example, ID or the like.
  • the certificate authority 6 receives the data transmitted by the communication unit 26 of the shop 2 .
  • the certificate authority 6 applies a predetermined hash function to the received shop information, account information, and public key Kpm of the shop 2 to derive a hash value which is encrypted with a secret key Ksca of the certificate authority 6 to create a signature which is added to the shop information, the account information, and the public key Kpm of the shop 2 to create a certificate which is transmitted to the shop 2 .
  • FIG. 7 shows an example of the certificate for a shop.
  • the certificate may include the name of the certificate authority (ID), certificate number (ID), expiration date of the certificate, and so on, in addition to those enumerated above.
  • the communication unit 26 of the shop 2 receives the data transmitted by the certificate authority 6 .
  • the mutual authentication unit 21 of the shop 2 mutually authenticates with the mutual authentication unit 31 of the center 3 , and the shop 2 and the center 3 share the coherence R 2 ⁇ R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as a temporary key Ktsm. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the encryption unit 23 of the shop 2 encrypts the account number of shop 2 , previously stored therein, with the public key Kppg of the clearing house 5 .
  • the encryption unit 23 of the shop 2 further encrypts the account number encrypted with the public key Kppg of the clearing house 5 with the temporary key Ktsm, and also encrypts the certificate of the shop 2 with the temporary key Ktsm.
  • the communication unit 26 transmits the account number and the certificate of the shop 2 , encrypted with the temporary key Ktsm, to the center 3 .
  • the communication unit 37 of the center 3 receives the account number and the certificate encrypted with the temporary key Ktsm, transmitted thereto from the shop 2 , and the decryption unit 33 decrypts the account number and the certificate encrypted with the temporary key Ktsm.
  • step S 95 the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 51 of the clearing house 5 , and the mutual authentication unit 31 of the center 3 and the mutual authentication unit 51 of the clearing house 5 share the coherence R 21 R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as a temporary key Ktsp. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the signature unit 34 of the center 3 appends a signature to the account number of the shop 2 .
  • the encryption unit 32 further encrypts the certificate of the shop 2 , the account number appended with the signature of the center 3 and encrypted with the public key Kppg of the clearing house 5 with the temporary key Ktsp.
  • the communication unit 37 transmits the data encrypted with the temporary key Ktsp to the clearing house 5 .
  • the communication unit 56 of the clearing house 5 receives the data transmitted thereto from the center 3 .
  • step S 97 the decryption unit 53 of the clearing house 5 decrypt the data received from the center 3 with the temporary key Ktsp.
  • the signature unit 54 of the clearing house 5 verifies the signature of the certificate authority 6 appended to the certificate to confirm that the certificate is not tampered. If the signature unit 34 finds tampering in the certificate, the processing is aborted.
  • step S 98 the signature unit 54 applies a hash function to the received account number to calculate a hash value, and verifies whether the calculated hash value matches a hash value in the certificate to confirm that the account number is not tampered. If the signature unit 34 finds tampering in the account number, the processing is aborted.
  • the signature unit 54 appends a signature to the verified result at step S 98 and at step 98 .
  • the encryption unit 52 encrypts the verified result appended with the signature with the temporary key Ktsp.
  • the communication unit 56 transmits the verified result encrypted with the temporary key Ktsp to the center 3 .
  • the communication unit 37 of the center 3 receives the verified result transmitted by the clearing house 5 , and the decryption unit 33 decrypts the verified result received from the clearing house 5 with the temporary key Ktsp.
  • the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 41 of the virtual bank 4 , and the center 3 and the virtual bank 4 share the coherence R 2 ⁇ R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as the temporary key Ktsb. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the signature unit 34 of the center 3 appends a signature of the center 3 to the certificate of the shop 2 .
  • the encryption unit 32 encrypts the certificate of the shop 2 appended with the signature of the center 3 with the temporary key Ktsp.
  • the communication unit 37 transmits the encrypted certificate to the virtual bank 4 .
  • the communication unit 46 of the virtual bank 4 receives the certificate of the shop 2 transmitted thereto from the center 3 .
  • the decryption unit 43 of the virtual bank 4 decrypts the certificate of the shop 2 received from the center 3 with the temporary key Ktsb.
  • the signature unit 44 verifies the signature of the center 3 appended to the certificate of the shop 2 and the signature of the certificate authority 6 included in the certificate of the shop 2 to confirm that the certificate of the shop 2 is not tampered. If tampering is found in the certificate of the shop 2 , the processing is aborted.
  • the account management unit 45 of the virtual bank 4 When the certificate of the shop 2 is not tampered, the account management unit 45 of the virtual bank 4 generates a shop ID and stores the amount of sales corresponding to the shop ID at step S 103 .
  • step S 104 through step S 106 is similar to the processing at step S 26 through step S 28 , respectively, in FIG. 2 , explanation thereon is omitted.
  • step S 107 the decryption unit 24 of the shop 2 decrypts the received shop ID, and the storage unit 22 stores the shop ID received at step S 106 .
  • the shop 2 registers itself in the center 3 and the virtual bank 4 , and stores the shop ID.
  • step S 121 the mutual authentication unit 11 - 2 of the user device 1 - 2 mutually authenticates with the mutual authentication unit 11 - 1 of the user device 1 - 1 , and the user device 1 - 2 and the user device 1 - 1 share the coherence R 2 ⁇ R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as a temporary key Ktuu. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon will be omitted.
  • the signature unit 15 - 2 of the user device 1 - 2 appends a signature of the user device 1 - 2 to data indicative of an amount to be transferred, set by the user, and the encryption unit 13 - 2 encrypts the data indicative of the amount to be transferred with the temporary key Ktuu.
  • the communication unit 16 - 2 of the user device 1 - 2 transmits the data indicative of the amount encrypted with the temporary key Ktuu to the communication unit 16 - 1 of the user device 1 - 1 .
  • the communication unit 16 - 1 of the user device 1 - 1 receives the data indicative of the amount encrypted with the temporary key Ktuu.
  • the decryption unit 14 - 1 of the user device 1 - 1 decrypts the encrypted data indicative of the amount with the temporary key Ktuu, and the storage unit 12 - 1 adds the amount to be transferred to an uncleared amount stored therein, and stores the resulting value.
  • the uncleared amount refers to the total amount transferred and received from other user devices 1 .
  • the signature unit 15 - 1 of the user device 1 - 1 appends a signature of the user device 1 - 1 to the data indicative of the amount to be transferred, and the encryption unit 13 - 1 encrypts the data indicative of the amount to be transferred with the temporary key Ktuu.
  • the communication unit 16 - 1 of the user device 1 - 1 transmits the encrypted data indicative of the amount to the communication unit 16 - 2 of the user device 1 - 2 .
  • the communication unit 16 - 2 of the user device 1 - 2 receives the encrypted data indicative of the amount.
  • the decryption unit 14 - 2 of the user device 1 - 2 decrypts the encrypted data indicative of the amount with the temporary key Ktuu, and the storage unit 12 - 2 subtracts the amount to be transferred, derived by the decryption, from an uncleared amount stored therein, and stores the resulting difference.
  • the signature unit 15 - 2 appends a signature of the user device 1 - 2 to data indicative of the completed transfer of electronic cash.
  • the encryption unit 13 - 2 encrypts the data indicative of the completed transfer of electronic cash appended with the signature, with the temporary key Ktuu.
  • the communication unit 16 - 2 transmits the encrypted data indicative of the completed transfer of electronic cash to the communication unit 16 - 1 of the user device 1 - 1 .
  • the communication unit 16 - 1 of the user device 1 - 1 receives the data indicative of the completed transfer of electronic cash encrypted with the temporary key Ktuu, followed by the termination of the processing.
  • the user device 1 - 2 transfers electronic cash to the user device 1 - 1 .
  • FIG. 9 is a flow chart for explaining other processing for transferring electronic cash from the user device 1 - 2 to the user device 1 - 1 .
  • the mutual authentication unit 11 - 2 of the user device 1 - 2 mutually authenticates with the mutual authentication unit 11 - 1 of the user device 1 - 1 , and the user device 1 - 2 and the use device 1 - 1 share the coherence R 2 ⁇ R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as a temporary key Ktuu. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the signature unit 15 - 2 of the user device 1 - 2 appends a signature of the user device 1 - 2 to data indicative of an amount to be transferred, set by the user.
  • the encryption unit 13 - 2 encrypts the user ID of the user device 1 - 2 with the public key Kpesc of the center 3 , and also encrypts the data indicative of the amount to be transferred and the user ID of the user device 1 - 2 encrypted with the public key Kpesc of the center 3 with the temporary key Ktuu.
  • the communication unit 16 - 2 of the user device 1 - 2 transmits the data indicative of the amount and the user ID of the user device 1 - 2 encrypted with the temporary key Ktuu to the communication unit 16 - 1 of the user device 1 - 1 .
  • the communication unit 16 - 1 of the user device 1 - 1 receives the encrypted data indicative of the amount and user ID of the user device 1 - 2 .
  • the decryption unit 14 - 1 of the user device 1 - 1 decrypts the encrypted data indicative of the amount and user ID of the user device 1 - 2 with the temporary key Ktuu.
  • the storage unit 12 - 1 adds the amount to be transferred to an uncleared amount stored therein, and stores the resulting amount and the user ID of the user device 1 - 2 encrypted with the public key Kpesc of the center 3 .
  • step S 134 through step S 136 is similar to the processing at step S 124 through step S 126 , respectively, in FIG. 8 , explanation thereon is omitted.
  • the user device 1 - 2 transfers electronic cash to the user device 1 - 1 , while the user device 1 - 1 stores the user ID of the user device 1 - 2 together with the transferred cash.
  • step S 151 the user confirms the electronic cash balance stored in the storage unit 12 of the user device 1 , and, if the balance is insufficient for the amount of purchase, forces the user device 1 to execute the processing illustrated in FIG. 5 to store a required amount of electronic cash.
  • step S 152 the mutual authentication unit 11 of the user device 1 mutually authenticates with the mutual authentication unit 21 of the shop 2 , and the user device 1 and the shop 2 share the coherence R 2 ⁇ R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as a temporary key Ktum. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the encryption unit 13 of the user device 1 encrypts information on an article purchased from the shop 2 (information on a purchased article specified by the user through manipulations on the user device 1 , for example, an article ID representative of the article) with the public key Kpm of the shop 2 previously stored in the storage unit 12 , encrypts the user ID with the public key Kpesc of the center 3 previously stored in the storage unit 12 , and encrypts an uncleared amount stored in the storage unit 12 with the public key Kpvb of the virtual bank 4 .
  • the signature unit 15 of the user device 1 appends a signature of the user device 1 to the information on the purchased article encrypted with the public key Kpm of the shop 2 ; the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 ; and the user ID encrypted with the public key Kpesc of the center 3 ; and the amount of purchase.
  • the signature of the user device 1 is appended to the respective information.
  • the signature of the user device 1 may be collectively appended to some or all of them.
  • the encryption unit 13 of the user device 1 further encrypts the information on the purchased article encrypted with the public key Kpm of the shop 2 and appended with the signature; the user ID encrypted with the public key Kpesc of the center 3 ; the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 ; and the amount of purchase with the temporary key Ktum.
  • the communication unit 16 of the user device 1 transmits these data encrypted with the temporary key Ktum to the communication unit 26 of the shop 2 .
  • the communication unit 26 of the shop 2 receives these data.
  • the signature unit 24 of the shop 2 verifies the signature in a variety of the received data to confirm whether or not they are tampered. If it is determined that they are tampered, the processing is aborted. When no tampering is determined, the decryption unit 24 decrypts these data encrypted with the temporary key Ktum. Also, the decryption key 24 decrypts the information on the purchased article encrypted with the public key Kpm of the shop 2 with a secret key Ksm of the shop 2 .
  • the mutual authentication unit 21 of the shop 2 mutually authenticates with the mutual authentication unit 31 of the center 3 , and the shop 2 and the center 3 share the coherence R 2 ⁇ R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as a temporary key Ktsm. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the encryption unit 23 of the shop 2 encrypts the shop ID of the shop 2 stored in the storage unit 22 with the public key Kpesc of the center 3 acquired at step S 155 .
  • the signature unit 25 appends a signature of the shop 2 to the shop ID which has been encrypted with the public key Kpesc of the center 3 , and appends the signature of the shop 2 to the amount of purchase which has been appended with the signature of the user device 1 decrypted at step S 154 .
  • the encryption unit 23 encrypts the certificate of the user acquired at step S 152 ; and the user ID encrypted with the public key Kpesc of the center 3 and appended with the signature of the shop and the signature of the user device 1 ; the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 and appended with the signature of the user device 1 ; the shop ID appended with the signature of the shop 2 and encrypted with the public key Kpesc of the center 3 ; and the amount of purchase with the temporary key Ktsm.
  • the communication unit 26 transmits these data to the communication unit 37 of the center 3 .
  • the communication unit 37 of the center 3 receives these data encrypted with the temporary key Ktsm.
  • the decryption unit 33 of the center 3 decrypts the certificate of the user; the user ID encrypted with the public key Kpesc of the center 3 and appended with the signature of the shop and the signature of the user device; the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 and appended with the signature of the user device 1 ; the shop ID appended with the signature of the shop 2 and encrypted with the public key Kpesc of the center 3 ; and the amount of purchase appended with the signatures of the user device 1 and the shop 2 , received at step S 156 , with the temporary key Ktsm.
  • the signature unit 34 verifies the signature of the user device 1 and the signature of the shop 2 to the amount of purchase; the signature of the shop and the signature of the user device 1 appended to the user ID; and the signature of the shop 2 to the shop ID to confirm that the amount of purchase, the user ID and the shop ID are not tampered. If the signature unit 34 finds tampering in any of the amount of purchase, the user ID and the shop ID, the processing is aborted.
  • the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 41 of the virtual bank 4 at step S 158 , and the center 3 and the virtual bank 4 share the coherence R 2 ⁇ R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as a temporary key Ktsb. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the signature unit 34 of the center 3 appends a signature to the user ID, the shop ID, the amount of purchase, and the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 .
  • the encryption unit 32 of the center 3 encrypts the user ID, the shop ID, the amount of purchase, the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 , and the signature with the temporary key Ktsb.
  • the communication unit 37 transmits these data to the communication unit 46 of the virtual bank 4 .
  • the communication unit 46 of the virtual bank 4 receives these data.
  • the decryption unit 43 of the virtual bank 4 decrypts the encrypted user ID, shop ID, amount of purchase, uncleared amount encrypted with the public key Kpvb of the virtual bank 4 , and signature of the center 3 with the temporary key Ktsb.
  • the signature unit 44 verifies the signature of the center 3 to confirm that the user ID, the shop ID, the amount of purchase, and the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 are not tampered. If the signature unit 44 finds tampering, the processing is aborted.
  • the account management unit 45 When tampering is not found in any of the user ID, the shop ID, the amount of purchase, and the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 , the account management unit 45 adds the amount of purchase to the amount of sales corresponding to the shop ID. At step S 161 , the account management unit 45 subtracts the amount of purchase from the balance corresponding to the user ID, adds the uncleared amount to the balance corresponding to the user ID, and stores the resulting amount.
  • the encryption unit 42 of the virtual bank 4 encrypts the balance corresponding to the user ID stored at step S 161 with the public key Kpu of the user.
  • the signature unit 44 signs the amount of purchase, and the balance corresponding to the user ID encrypted with the public key Kpu of the user.
  • the communication unit 46 transmits the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, and the signature to the communication unit 37 of the center 3 .
  • the communication unit 37 of the center 3 receives these data.
  • the decryption unit 33 of the center 3 decrypts the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, and the signature of the virtual bank 4 .
  • the signature unit 34 of the center 3 appends a signature of the center 3 to the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, and the signature of the virtual bank 4 .
  • the encryption unit 32 encrypts the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, and the signature of the virtual bank 4 , which have been appended with the signature of the center 3 , with the temporary key Ktsm.
  • the communication unit 37 transmits the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, the signature of the virtual bank 4 , and the signature of the center 3 , which have been encrypted with the temporary key Ktsm, to the communication unit 26 of the shop 2 .
  • the communication unit 26 of the shop 2 receives these data.
  • the decryption unit 24 of the shop 2 decrypts the received amount of purchase, balance corresponding to the user ID encrypted with the public key Kpu of the user, signature of the virtual bank 4 , and signature of the center 3 , with the temporary key Ktsm.
  • the signature unit 25 verifies the signature of the virtual bank 4 and the signature of the center 3 to confirm that there is no tampering in the received amount of purchase and balance corresponding to the user ID encrypted with the public key Kpu of the user. If the signature unit 25 finds tampering, the processing is aborted.
  • step S 165 the signature unit 25 appends the signature of the shop 2 to the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, the signature of the virtual bank 4 , and the signature of the center 3 .
  • the encryption unit 23 encrypts the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, the signature of the virtual bank 4 , the signature of the center 3 , and the signature of the shop 2 with the temporary key Ktum.
  • the communication unit 26 transmits these data to the communication unit 16 of the user device 1 .
  • the communication unit 16 of the user device 1 receives these data.
  • the decryption unit 14 of the user device 1 decrypts the received amount of purchase, balance corresponding to the user ID encrypted with the public key Kpu of the user, signature of the virtual bank 4 , signature of the center 3 , and signature of the shop 2 with the temporary key Ktum.
  • the signature unit 15 verifies the signature of the virtual bank 4 , the signature of the center 3 , and the signature of the shop 2 to confirm that there is no tampering in the received amount of purchase, and balance corresponding to the user ID encrypted with the public key Kpu of the user. If the signature unit 15 finds tampering, the processing is aborted.
  • the storage unit 12 confirms whether or not the received balance is equal to the amount derived by subtracting the amount of purchase from the balance stored in the storage unit 12 prior to the start of the processing and adding the uncleared amount transmitted at step S 153 to the resulting amount.
  • the received balance is equal to the amount derived by subtracting the amount of purchase from the balance stored in the storage unit 12 prior to the start of the processing and adding the uncleared amount transmitted at step S 153 to the resulting amount
  • the balance is updated and stored, and the uncleared amount is set to zero, followed by the termination of the processing. If the received balance is not equal to the amount derived by subtracting the amount of purchase from the balance stored in the storage unit 12 prior to the start of the processing and adding the uncleared amount transmitted at step S 153 to the resulting amount, the processing is terminated.
  • the user device 1 make a payment to the shop 2 through the virtual bank 4 .
  • step A 181 the mutual authentication unit 21 of the shop 2 mutually authenticates with the mutual authentication unit 31 of the center 3 , and the shop 2 and the center 3 share the coherence R 21 R 3 of the random numbers at step S 54 and at step S 57 in FIG. 4 as a temporary key Ktsm. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • step S 182 the encryption unit 23 of the shop 2 encrypts the shop ID of the shop 2 , stored in the storage unit 22 at step S 107 in FIG. 6 , with the temporary key Ktsm.
  • the signature unit 25 of the shop 2 appends a signature to the encrypted shop ID, and the encryption unit 23 encrypts the shop ID and the signature with the temporary key Ktsm.
  • the communication unit 26 transmits the shop ID and the signature encrypted with the temporary key Ktsm to the communication unit 37 of the center 3 .
  • the communication unit 37 of the center 3 receives the shop ID and the signature.
  • the decryption unit 33 of the center 3 decrypts the shop ID and the signature encrypted with the temporary key Ktsm.
  • the signature unit 34 verifies the signature appended to the shop ID, derived by the decryption, to confirm that the shop ID is not tampered. If tampering is found in the shop ID, the processing is aborted. If no tampering is found in the shop ID, the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 41 of the virtual bank 4 at step S 184 , and the center 3 and the virtual bank 4 share the temporary key Ktsb. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the signature unit 34 of the center 3 appends a signature to the shop ID confirmed at step S 183 , and the encryption unit 32 encrypts the shop ID and the signature with the temporary key Ktsb.
  • the communication unit 37 transmits the shop ID and the signature encrypted with the temporary key Ktsb to the communication unit 46 of the virtual bank 4 .
  • the communication unit 46 of the virtual bank 4 receives the shop ID and the signature.
  • the decryption unit 43 of the virtual bank 4 decrypts the shop ID and the signature encrypted with the temporary key Ktsb.
  • the signature unit 44 verifies the signature appended to the shop ID, derived by the decryption, to confirm that the shop ID is not tampered. If tampering is found in the shop ID, the processing is aborted. If no tampering is found in the shop ID, the account management unit 45 clears the amount of proceeds corresponding to the shop ID stored in the account management unit 45 .
  • the signature unit 44 appends a signature to the amount of proceeds corresponding to the shop ID stored in the account management unit 45 (the amount of proceeds before it is cleared), and the encryption unit 42 encrypts the amount of proceeds and the signature with the temporary key Ktsb.
  • the communication unit 46 transmits the amount of proceeds and the signature encrypted with the temporary key Ktsb to the communication unit 37 of the center 3 .
  • the communication unit 37 of the center 3 receives the amount of proceeds and the signature.
  • the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 51 of the clearing house 5 , and the center 3 and the clearing house 5 share the temporary key Ktsp. Since the procedure for the mutual authentication is similar to the processing in FIG. 4 , explanation thereon is omitted.
  • the signature unit 34 of the center 3 appends a signature to the amount of proceeds received from the virtual bank 4 at step S 187 .
  • the encryption unit 32 encrypts the certificate of the shop received from the shop 2 during the processing of the mutual authentication at step S 181 ; the account number corresponding to the shop ID stored in the shop management unit 36 at step 105 in FIG.
  • the communication unit 37 transmits the certificate of the shop, the account number corresponding to the shop ID, and the amount of proceeds, encrypted with the temporary key Ktsp, to the communication unit 56 of the clearing house 5 .
  • the communication unit 56 of the clearing house 5 receives the certificate of the shop, the account number corresponding to the shop ID, and the amount of proceeds encrypted with the temporary key Ktsp.
  • the decryption unit 53 of the clearing house 5 decrypts the certificate of the shop, the account number corresponding to the shop ID, and the amount of proceeds.
  • the signature unit 54 confirms that the decrypted amount of proceeds is not tampered. If tampering is found, the processing is aborted. If no tampering is found, the clearing unit 55 forces the bank to execute the processing for transferring the amount corresponding to the amount of proceeds to the account number corresponding to the shop ID.
  • the signature unit 54 appends a signature to data indicative of the result of the processing at step S 190 .
  • the communication unit 56 transmits the data indicative of the result of the deposit processing, and the signature to the communication unit 37 of the center 3 .
  • the communication unit 37 of the center 3 receives the data indicative of the result of the deposit processing, and the signature.
  • the decryption unit 33 of the center 3 decrypts the data indicative of the result of the deposit processing, and the signature.
  • the signature unit 34 confirms that there is no tampering in the data indicative of the result of the deposit processing. If tampering is found, the processing is aborted. If no tampering is found, the signature unit 34 appends a signature to the data indicative of the result of the deposit processing.
  • the communication unit 37 transmits the data indicative of the result of the deposit processing, and the signature to the communication unit 26 of the shop 2 .
  • the communication unit 26 of the shop 2 receives the data indicative of the result of the deposit processing, and the signature, and the decryption unit 24 of the shop 2 decrypts the data indicative of the result of the deposit processing, and the signature.
  • the signature unit 25 confirms that there is no tampering in the data indicative of the result of the deposit processing.
  • the storage unit 22 stores the data indicative of the result of the deposit processing, followed by the termination of the processing.
  • the user is identified at each device using the user ID.
  • Each device is not aware of personal information, so that upon detection of a fraud, the center 3 finds account information encrypted with the public key Kppg of the clearing house 5 based on the user ID, and requests the clearing house 5 to disclose the account information. Based on that, the personal information is identified for the certificate authority 6 , the credit card company 7 , or the bank 8 . In this event, since it is possible to control in which case each device discloses information, and to manage logs of references to them, personal information will not be unnecessarily disclosed.
  • a system refers to a general apparatus which is composed of a plurality of devices.
  • communication media such as networks, satellites, cables and so on may be utilized in addition to recording media such as magnetic disks, CD-ROM, solid-state memories and so on.
  • FIG. 1 of the present invention illustrates in such a manner that the user device 1 , the shop 2 , the center 3 , the virtual bank 4 and the clearing house 5 , the certificate authority 6 , and the credit card company 7 and the bank 8 exist independently of one another, some of these functions may be grouped into one. For example, the functions of the center 3 , the virtual bank 4 and the clearing house 5 may be combined into the center 3 .
  • the shop 2 need not hold any special apparatus, and is only required to register itself in the center 3 .
  • This is implemented by the center 3 which manages an ID issued to a card and provides it to the shop.
  • an account management apparatus stores information for identifying the user and the amount of money utilized by the user based on previously deposited funds, a settlement processing apparatus instructs the payment institution to settle, and a control apparatus manages the information for identifying a user, and an account number in the payment institution of the user, encrypted with a public key of the settlement processing apparatus, instructs the account management apparatus to change the balance of the deposited funds of the user, stored therein, based on the information for identifying the user, and instructs the settlement processing apparatus to execute a settlement based on the account number in the payment institution, so that the user can securely utilize electronic cash without the need for managing a special apparatus, each apparatus cannot unnecessarily know personal information and information on individual's purchase information, frauds can be detected, and the circulation of money can be managed.
  • the present invention can be utilized in an electronic cash system for electronically managing the circulation of cash and information, and for depositing and withdrawing funds.

Abstract

An electronic cash system processes a payment for an amount due, the payment being carried out using previously deposited funds. An account management device stores information identifying a user and information of an amount of money available to be utilized by the user based on the previously deposited funds. A settlement processing device instructs a payment institution to settle. A control device manages the information identifying the user and an account number in the payment institution of the user, the account number being encrypted with a public key of the settlement processing device, instructs the account management device to change a balance of the stored previously deposited funds of the user based on the information identifying the user, and instructs the settlement processing device to execute a settlement transaction based on the account number in the payment institution.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a division of U.S. application Ser. No. 10/689,803, filed Oct. 21, 2003, which is a division of U.S. application Ser. No. 09/555,850, filed Jun. 5, 2000, and now U.S. Pat. No. 6,766,306, issued Jul. 20, 2004, which is a national stage of International Application No. PCT/JP99/055789, filed Oct. 8, 1999, which claims priority from Japanese Patent Application No. P10-286341, filed Oct. 8, 1998, the disclosures of which are incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Technical Field
  • The present invention relates to an electronic cash system, and more particularly to an electronic cash system for processing a payment for an amount due with previously deposited funds.
  • 2. Background Art
  • Current cash management schemes for electronic cash systems may be generally classified into a “balance management scheme” which manages the balance, utilizing devices immune to tampering, on the assumption that the balance cannot be tampered, and an “electronic bank note scheme” which assigns a face value and an identification number to electronic cash in order to manage the ID of cash issued by a center to check whether or not any bank note is double spent.
  • To put an electronic cash system to a practical use, it is necessary to realize the anonymity for user's personal information and purchase information, and an open loop type distribution which enables money to be transferred among arbitrary user devices, shops, and so on.
  • Mondex (trade name) is an electronic money system in accordance with the balance management scheme which satisfies the requirements mentioned above and has been widely used. In Mondex, serviced user devices and shops offering articles each hold a Mondex card, and the shops are further required to be equipped with a special apparatus for reading from and writing into a Mondex card, so that electronic cash is inputted or outputted therethrough.
  • The security on the user of Mondex on the Internet relies on the security ensured by the Mondex card which enhances the security by always providing two cryptographic modules such that the card is utilized by switching one of the modules which ensures the security. Also, since the Mondex system does not manage trade information at all, the anonymity is held for personal information and purchase logs.
  • With the Mondex system, however, the shops are required to manage special apparatus and burdened with labor and time therefor. In addition, since the Mondex system does not manage any trade information, an unauthorized use, if any, cannot be detected. Furthermore, the circulation of money cannot be managed.
  • SUMMARY OF THE INVENTION
  • The present invention has been made in view of the circumstance as mentioned above, and its object is to enable secure utilization of electronic cash, protection of personal information and individual's purchase information from being unnecessarily captured by respective apparatus, detection of unauthorized activities, and management of circulation of money without the need for managing special apparatus.
  • According to an aspect of the invention, an electronic cash system processes a payment for an amount due, the payment being carried out using previously deposited funds. An account management device includes storage means for storing information identifying a user and information of an amount of money available to be utilized by the user based on the previously deposited funds. A settlement processing device includes settlement instructing means for instructing a payment institution to settle. A control device includes management means for managing the information identifying the user and for managing an account number in the payment institution of the user, the account number being encrypted with a public key of the settlement processing device, balance change instructing means for instructing the account management device to change a balance of the stored previously deposited funds of the user based on the information identifying the user, and settlement execution instructing means for instructing the settlement instructing means of the settlement processing device to execute a settlement transaction based on the account number in the payment institution.
  • According to another aspect of the invention, an electronic cash system processes a payment for an amount due, the payment being carried out using previously deposited funds. A virtual bank includes an account management unit operable to store information identifying a user and information of an amount of money available to be utilized by the user based on the previously deposited funds. A clearing house includes a clearing unit operable to instruct a payment institution to settle. A control center includes a user management unit operable to manage the information identifying the user and to manage an account number in the payment institution of the user, the account number being encrypted with a public key of the clearinghouse, and a communication unit operable to instruct the virtual bank to change a balance of the stored previously deposited funds of the user based on the information identifying the user and to instruct the clearing unit of the clearinghouse to execute a settlement transaction based on the account number in the payment institution.
  • The foregoing aspects, features and advantages of the present invention will be further appreciated when considered with reference to the following detailed description and accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagram illustrating the configuration of an electronic cash system to which the present invention is applied;
  • FIG. 2 is a flow chart for explaining the processing for initially depositing funds and registering a user ID in a virtual bank 4;
  • FIG. 3 is a diagram showing an example of data for certifying a user device;
  • FIG. 4 is a diagram for explaining the processing for mutual authentication;
  • FIG. 5 is a flow chart for explaining the processing for a user device 1 to deposit funds in the virtual bank 4 second and subsequent times;
  • FIG. 6 is a flow chart for explaining the processing for registering a shop 2 in a center 3 and in the virtual bank 4;
  • FIG. 7 is a diagram showing an example of data for certifying a shop;
  • FIG. 8 is a flow chart for explaining the processing for transferring electronic cash from a user device 1-2 to a user device 1-1;
  • FIG. 9 is a flow chart for explaining the processing for transferring electronic cash from the user device 1-2 to the user device 1-1;
  • FIG. 10 is a flow chart for explaining the processing for a payment from the user device 1 to the shop 2; and
  • FIG. 11 is a flow chart for explaining the processing for depositing proceeds into an account of the shop 2.
  • DETAILED DESCRIPTION Best Mode for Carrying Out the Invention
  • Prior to explaining embodiments of the present invention, features of the present invention will be set forth below with a corresponding implementation (one example) added in parenthesis after each means in order to clarify a corresponding relationship between each means of the inventions described in claims and the following embodiments. The description, however, is not intended to limit each means to that described below.
  • Specifically, an electronic cash system includes an account management apparatus (for example, a virtual bank 4 in FIG. 1) includes storage means (for example, an account management unit 45 in FIG. 1) for storing information for identifying a user, and the amount of money utilized by the user based on the previously deposited funds, a settlement processing apparatus (for example an clearing house 5 in FIG. 1) includes settlement instructing means (for example, a clearing unit 55 in FIG. 1) for instructing a payment institution to settle, a control apparatus (for example, a center 3 in FIG. 1) includes management means (for example, a user management unit 35 in FIG. 1) for managing the information for identifying a user, and an account number in the payment institution of the user, encrypted with a public key of the settlement apparatus, balance change instructing means (for example, a communication unit 37 in FIG. 1) for instructing the account management device to change the balance of the deposited funds of the user, stored in the storage means of the account management apparatus, based on the information for identifying a user managed by the management means, and settlement execution instructing means (for example, the communication unit 37 in FIG. 1) for instructing the settlement instructing means of the settlement processing apparatus to execute a settlement based on the account number in the payment institution managed by the management means.
  • FIG. 1 is a diagram representing the configuration of an electronic cash system to which the present invention is applied. A user device 1-1 purchases an article or receives a service from a shop 2, and pays the price therefor to the shop 2 through a center 3, the virtual bank 4 and a clearing house 5. A user device 1-2 purchases an article or receives a service from a shop 2, and pays the price therefor to the shop 2 through the center 3, the virtual bank 4 and the clearing house 5. The shop 2 provides articles or services to the user device 1-1 or 1-2, and receives payments from the user device 1-1 or the user device 1-2 through the center 3, the virtual bank 4 and the clearing house 5. The center 3 stores predetermined data on the user device 1-1, the user device 1-2 and the shop 2, and instructs the clearing house 5 to execute settlement transactions for the user device 1-1, the user device 1-2 and the shop 2. The virtual bank 4, which is an institution for issuing electronic money, issues IDs to units to which electronic money is issued (the user device 1-1 or 1-2 and the shop 2), and manages the balance or the amount of sales corresponding to the IDs. The clearing house 5 executes payment and deposit procedures for each account or each card number of the user device 1-1 or 1-2 and the shop 2 for a bank 8 or a card company 7. A certificate authority 6 responds to requests of the user device 1-1 to the clearing house 5 to issue a certificate including predetermined data.
  • A mutual authentication unit 11-1 of the user device 1-1 mutually authenticates with the user device 1-2, the shop 2, the center 3 or the certificate authority 6 through the processing later described. A storage unit 12-1 is composed of elements having tamper immunity for storing user ID, balance, and uncleared amount of money for electronic money. An encryption unit 13-1 encrypts predetermined data to be transmitted to the user device 1-2, the shop 2 or the center 3, such as the amount of purchase, information on purchased articles, user ID of electronic money, and so on. A decryption unit 14-1 decrypts encrypted information such as a user ID, amount, balance and so on which may be received from the user device 1-2, the shop 2, the center 3 or the certificate authority 6. A signature unit 15-1 applies a hash function to predetermined data such as the amount of purchase, information on purchased articles, user ID of electronic money, and so on, transmitted to the user device 1-2, the shop 2, the center 3 or the certificate authority 6, to calculate a hash value, and encrypts the hash value with a predetermined key to create a signature. The signature unit 15-1 also examines data or a signature added to data, which may be received from the user device 1-2, the shop 2, the center 3 or the certificate authority 6, to determine whether or not the data has not been tampered. A communication unit 16-1 transmits predetermined data to the user device 1-2, the shop 2, the center 3 or the certificate authority 6, and receives data transmitted from the user device 1-2, the shop 2, the center 3 or the certificate authority 6.
  • A mutual authentication unit 11-2, a storage unit 12-2, an encryption unit 13-2, a decryption unit 14-2, a signature unit 15-1, and a communication unit 16-2 of the user device 1-2 are similar to the mutual authentication unit 11-1, the storage unit 12-1, the encryption unit 13-1, the decryption unit 14-1, the signature unit 15-1, and the communication unit 16-1, respectively, of the user device 1-1, so that explanation thereon is omitted. In the following, the user device 1-1 and the user device 1-2 are simply referred to as the “user device 1” unless they should be particularly distinguished from each other.
  • A mutual authentication unit 21 of the shop 2, a mutual authentication unit 31 of the center 3, a mutual authentication unit 41 of the virtual bank 4, and a mutual authentication unit 51 of the clearing house 5 perform processing similar to the mutual authentication unit 11-1 of the user device 1-1, so that explanation thereon is omitted.
  • An encryption unit 23 of the shop 2, an encryption unit 32 of the center 3, an encryption unit 42 of the virtual bank 4, and an encryption unit 52 of the clearing house 5 perform processing similar to the encryption unit 13-1 of the user device 1-1, so that explanation thereon is omitted.
  • A decryption unit 24 of the shop 2, a decryption unit 33 of the center 3, a decryption unit 43 of the virtual bank 4, and a decryption unit 53 of the clearing house 5 perform processing similar to the decryption unit 14-1 of the user device 1-1, so that explanation thereon is omitted.
  • A signature unit 25 of the shop 2, a signature unit 34 of the center 3, a signature unit 44 of the virtual bank 4, and a signature unit 54 of the clearinghouse 5 perform processing similar to the signature unit 15-1 of the user device 1-1, so that explanation thereon is omitted.
  • A communication unit 26 of the shop 2, a communication unit 37 of the center 3, a communication unit 46 of the virtual bank 4, and a communication unit 56 of the clearing house 5 perform processing similar to the communication unit 16-1 of the user device 1-1, so that explanation thereon is omitted.
  • A storage unit 22 of the shop 2 is composed of elements having tamper immunity for storing shop IDs, the amount of sales, and so on.
  • A user management unit 35 of the center 3 stores and manages a credit card number of a user which is encrypted with the user's public keys Kpu corresponding to the user ID and with a public key Kppg of the clearing house 5. A shop management unit 36 of the center 3 stores and manages an account number of the shop 2 which is encrypted with a public key Kpm of the shop 2 corresponding to a shop ID and with the public key Kppg of the clearing house 5.
  • An account management unit 45 of the virtual bank 4 stores the balance of electronic cash for a user corresponding to a user ID, and the amount of sales for the shop 2 corresponding to the shop ID.
  • A clearing unit 55 of the clearing house 5 instructs the bank 8 or the card company 7 to execute payment and deposit procedures for each of accounts of the user device 1-1 or 1-2 and the shop 2.
  • While FIG. 1 illustrates as if the user device 1, the shop 2, the center 3, the virtual bank 4 and the clearing house 5, the certificate authority 6, and the credit company 7 and the bank 8 exist independently of one another, some functions of them may be collected into one. For example, the functions provided by the center 3, the virtual bank 4 and the clearing house 5 may be combined into the center 3.
  • The processing performed by the user device 1 when it initially deposits funds and registers its user ID in the virtual bank 4 will be explained with reference to a flow chart of FIG. 2. At step S11, the communication unit 16 of the user device 1 transmits personal information, account information and the public key Kpu of the user device 1 to the certificate authority 6. Here, the personal information refers to that with which the user device 1 can be identified, for example, ID or the like. The certificate authority 6 receives the data transmitted by the communication unit 16 of the user device 1. At step S12, the certificate authority 6 applies a predetermined hash function to the received personal information, account information and public key Kpu of the user device 1 to generate a hash value which is encrypted with a secret key Ksca of the certificate authority 6 to create a signature which is then appended to the personal information, the account information, and the public key Kpu of the user device 1 to create a certificate which is transmitted to the user device 1. FIG. 3 shows an example of the certificate for the user device. The certificate may include the name (ID) of the certificate authority, a certificate number (ID), an expiration date of the certificate, and so on in addition to those enumerated above. The communication unit 16 of the user device 1 receives the data transmitted by the certificate authority 6.
  • The signature is data attached to data or a certificate for checking it for tampering and authenticating its creator. The signature is created by applying a hash function to data to be transmitted to generate a hash value which is encrypted with a secret key of a public key cryptosystem.
  • The hash function and matching of signature will be explained. The hash function is a function which accepts predetermined data to be transmitted as an input, and compresses the predetermined data to data of a predetermined bit length which is outputted as a hash value. The hash function is characterized in that an input is predicted from a hash value (output) with difficulties, a large number of bits in the hash value changes when one bit in data inputted to the hash function has changed, and input data having the same hash value is difficult to find out.
  • A recipient, who has received a signature and data, decrypts the signature with the public key of the public key cryptosystem to obtain the result (hash value). Further, a hash value is calculated for the received data, and it is determined whether or not the calculated hash value is equal to the hash value obtained by decrypting the signature. If it is determined that the hash value of the transmitted data is equal to the decrypted hash value, it is found that the received data is not tampered, and is data transmitted from a source which holds a secret key corresponding to the public key. As the hash function for the signature, MD4, MD5, SHA-1 or the like may be employed.
  • Next, the public key cryptosystem will be explained. In contrast with a common key cryptosystem which employs the same key (common key) for encryption and decryption, the public key cryptosystem employs a key used for encryption different from a key for decryption. With the use of the public key cryptosystem, even if one key is published, the other can be held in secret. A key which may be published is referred to as a “public key,” while the other key which is held in secret is referred to as a “secret key.”
  • The RSA (Rivest-Shamir-Adleman) encryption, which is representative of public key cryptosystem, will be explained in brief. First, two sufficiently large prime numbers p and q are chosen, and the product n of p and q is calculated. Then, the least common multiple L of (p−1) and (q−1) is calculated. Further, a number e, which is equal to or more than three and less than L and is relatively prime with L, is found (i.e., a number which can divide commonly both e and L is only one).
  • Next, a multiplicative inverse element d of e related to a multiplication to modulus L is found. In other words, ed=1 mod L is established among d, e and L, so that d can be calculated by the Euclidean mutual division. In this event, n and e are chosen to be public keys, while p, q and d are chosen to be secret keys.
  • A cryptogram C is calculated from a clear text M through the processing represented by Equation (1):
    C=Mˆe mod n  (1)
  • The cryptogram C is decrypted to the clear text M through the processing represented by Equation (2):
    M=Cˆd mod n  (2)
  • While the demonstration is omitted, a clear text can be converted to a cryptogram by the RSA encryption and can be decrypted because this relies on Fermat's minor theorem, and Equation (3) is established:
    M=Cˆd=(Mˆed=Mˆ(ed)mod n  (3)
  • If the secret keys p and q are known, the secret key d can be calculated from the public key e. However, if the public key n has a number of digits so large that the prime factorization for the public key n is difficult in terms of the amount of computations, the secret key d cannot be computed from the public key e and therefore cannot be decrypted even if only the public key n is known. As described above, the RSA encryption can provide a key used for encryption and a key for decryption which are different from each other.
  • Also, an elliptic curve cryptosystem, which is another example of public key cryptosystem, will be explained in brief. A certain point on a elliptic curve yˆ2=xˆ3+ax+b is assumed to be B. An addition of a point on the elliptic curve is defined, where nB represents the result of n-time additions of B. Similarly, a subtraction is also defined. It has been proven difficult to calculate n from B and nB. B and nB are chosen to be public keys, while n is chosen to be a secret key. Cryptograms C1 and C2 are calculated using a random number r from a clear text M through Equation (4) and Equation (5), respectively, with the public keys:
    C1=M+rnB  (4)
    C2=rB  (5)
  • The cryptograms C1 and C2 are decrypted to the clear text M through the processing represented by Equation (6):
    M=C1−nC2  (6)
  • Only those who have the secret key n can decrypt the cryptograms. As described above, the elliptic curve cryptosystem can also provide a key used for encryption and a key for decryption which are different from each other, as is the case of the RSA encryption.
  • At step S13, the mutual authentication unit 11 of the user device 1 mutually authenticates with the mutual authentication unit 31 of the center 3, and they share a coherence of random numbers R2∥R3, later described, as a temporary key Ktsu between the center 3 and the user device 1. A procedure for the mutual authentication will be described later with reference to a flow chart of FIG. 4. At step S14, the encryption unit 13 of the user device 1 encrypts the user's credit card number, which has been previously stored, with the public key Kppg of the clearing house 5, and the signature unit 15 appends the user's signature to the amount of issued electronic cash which has been set by the user device. In this event, the user's signature involves applying a hash function to the amount of issued electronic cash, and encrypting a resulting hash value with the secret key Ksu of the user 1. The encryption unit 13 of the user device 1 encrypts the encrypted credit card number and the amount of issued electronic cash appended with the signature with the temporary key Ktsu. The communication unit 16 transmits them to the center 3. The communication unit 37 of the center 3 receives the credit card number and the amount of issued electronic cash, transmitted thereto from the user device 1.
  • At step S15, the decryption unit 33 of the center 3 decrypts the credit card number and the amount of issued electronic cash encrypted with the temporary key Ktsu. The signature unit 34 compares a value derived by decrypting the signature appended to the amount of issued electronic cash by the decryption unit 33 with the public key Kpu of the user device included in the certificate of the user device 1 obtained through the mutual authentication, later described, with a hash value derived by applying a hash function to the amount of issued electronic cash decrypted with the temporary key Ktsu, and determines that the amount of issued electronic cash is not tampered if they are identical. If it is determined that the amount of issued electronic cash is tampered, the processing is aborted. When the amount of issued electronic cash is not tampered, the processing proceeds to step S16, where the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 51 of the clearing house 5, and the center 3 and the clearing house 5 share a temporary key Ktsp. The procedure for the mutual authentication will be described later with reference to FIG. 4. At step S17, the signature unit 34 of the center 3 further appends a signature of the center 3 to the amount of issued electronic cash appended with the signature of the user device. The encryption unit 32 encrypts the certificate of the user device 1, the credit card number encrypted with the public key Kppg of the clearing house 5, and the amount of issued electronic cash appended with the signature of the center 3 and the signature of the user device 1, with the temporary key Ktsp. The communication unit 37 transmits the encrypted data to the clearing house 5. The communication unit 56 of the clearing house 5 receives the data transmitted thereto from the center 3.
  • At step S18, the decryption unit 53 of the clearing house 5 decrypts the data received from the center 3 with the temporary key Ktsp, and the signature unit 54 of the clearing house 5 verifies the signature of the center 3 and the signature of the user device 1, appended to the amount of issued electronic cash, to confirm that the amount of issued electronic cash is not tampered. Since the processing for verifying the signatures is similar to that at step S15, explanation thereon is omitted. If the signature unit 54 finds that the amount of issued electronic cash is tampered, the processing is aborted. When the amount of issued electronic cash is not tampered, the processing proceeds to step S19, where the decryption unit 53 decrypts the credit card number encrypted with the public key Kppg of the clearing unit 5 with a secret key Kspg of the clearing house 5 previously stored therein to derive the credit card number. Continuing with step S20, the clearing unit 55 delivers credit and transfer instructions to the credit card company 7 through the communication unit 56.
  • At step S21, the signature unit 54 appends a signature of the clearing house 5 to the verified result at step S18 and step S19, and the processed result at step S20. The encryption unit 52 encrypts the verified result and processed result appended with the signature with the temporary key Ktsp. The communication unit 56 transmits the encrypted verified result and processed result to the center 3. The communication unit 37 of the center 3 receives the verified result and the processed result transmitted thereto from the clearing house 5, and the decryption unit 33 decrypts the verified result and the processed result received from the clearing house 5. If the verified result thus received indicates a fraud, and the processed result indicates that the processing was not normally completed, the processing is aborted.
  • If the verified result received at step S21 indicates that there is no fraud, and the processed result indicates that the processing was normally completed, the processing proceeds to step S22, where the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 41 of the virtual bank 4, and the center 3 and the virtual bank 4 share a temporary key Ktsb. The procedure for the mutual authentication will be described later with reference to the flow chart of FIG. 4. At step S23, the encryption unit 32 encrypts the certificate of the user device 1, and the amount of issued electronic money appended with the signature of the center 3 and the signature of the user device 1 with the temporary key Ktsb. The communication unit 37 transmits the encrypted certificate of the user device 1 and electronically issued amount to the virtual bank 4. The communication unit 46 of the virtual bank 4 receives the certificate of the user device 1 and the electronically issued amount transmitted thereto from the center 3.
  • At step S24, the decryption unit 43 of the virtual bank 4 decrypts the certificate of the user device 1 and the electronically issued amount received from the center 3 with the temporary key Ktsb, and the signature unit 44 verifies the signature of the center 3 and the signature of the user device 1 appended to the amount of issued electronic cash to confirm that the amount of issued electronic cash is not tampered. Since the processing for verifying the signatures is similar to that at step S15, explanation thereon is omitted. If the signature unit 44 finds tampering in the amount of issued electronic cash, the processing is aborted. When the amount of issued electronic cash is not tampered, the account management unit 45 of the virtual bank 4 generates a user ID, and stores the amount of issued electronic money corresponding to the user ID at step S25. At step S26, the signature unit 44 appends a signature of the virtual bank 4 to the user ID. The encryption unit 42 encrypts the user ID with the temporary key Ktsb. The communication unit 46 transmits the encrypted user ID to the center 3. The communication unit 37 of the center 3 receives the user ID transmitted by the virtual bank 4.
  • At step S27, the decryption unit 33 of the center 3 decrypts the user ID transmitted by the virtual bank 4 with the temporary key Ktsb, and the user device management unit 35 stores and manages a set of the decrypted user ID, the public key Kpu of the user device received at step S13, and the credit card number encrypted with the public key Kppg of the clearing house 5 received at step S14. At step S28, the signature unit 34 of the center 3 appends a signature of the center 3 to the user ID. The encryption unit 32 encrypts the user ID with the temporary key Ktsu. The communication unit 37 transmits the encrypted user ID to the user device. The communication unit 16 of the user device 1 receives the user ID transmitted by the center 3.
  • At step S29, the decryption unit 14 of the user device 1 decrypts the received user ID with the temporary key Ktsu, and the storage unit 12 stores the received user ID and the amount of issued electronic cash transmitted at step S14 as the electronic cash balance.
  • In this way, during the initial deposit of funds, the user device 1 registers the user ID in the virtual bank 4, and stores the amount of issued electronic cash identical to the amount which has been previously paid in correspondence to the user ID.
  • The processing for the mutual authentication performed at step S13 in FIG. 2 between the mutual authentication unit 11 of the user device 1 and the mutual authentication unit 31 of the center 1, using an elliptic curve cryptosystem of 160 bits in length which is a public key cryptosystem, will be explained with reference to a flow chart of FIG. 4. At step S41, the mutual authentication unit 11 of the user device 1 generates a 64-bit random number R1. At step S42, the mutual authentication unit 11 of the user device 1 transmits the certificate including the public key Kpu of itself (acquired from the certificate authority 5 at step S12) and the random number R1 to the mutual authentication unit 31 of the center 3.
  • At step S43, the mutual authentication unit 31 of the center 3 decrypts the signature (encrypted with the secret key Ksca of the certificate authority 6) in the received certificate with the public key Kpca of the certificate authority 6, which has been previously acquired, to extract the public key Kpu of the user device 1 and the hash value of the name of the user device 1, as well as to extract the public key Kpu of the user device 1 and the name of the user device 1 which are stored in the certificate in the form of clear text. If the certificate is true one issued by the certificate authority, the signature in the certificate can be decrypted, and the public key Kpu and the hash value of the name of the user device 1 produced by the decryption match the public key Kpu of the user device 1 stored in the certificate in the form of clear text and the hash value derived by applying the hash function to the name of the user device 1. This authenticates that the public key Kpu is not tampered but is true one. If the signature cannot be decrypted, or if the hash values do not match even if it can be decrypted, this means that the public key is not true or the user device is not true. In this event, the processing is aborted.
  • When proper authentication result is derived, the mutual authentication unit 31 of the center 3 generates a 64-bit random number R2 at step S44. At step S45, the mutual authentication unit 31 of the center 3 generates a coherence of the random number R1 and the random number R2, R1∥R2. At step S46, the mutual authentication unit 31 of the center 3 encrypts the coherence R1∥R2 with a secret key Ksesc of itself. At step S47, the mutual authentication unit 31 of the center 3 encrypts the coherence R1∥R2 with the public key Kpu of the user device 1 acquired at step S43. At step S48, the mutual authentication unit 31 of the center 3 transmits a certificate (which has been previously acquired from the certificate authority) including the coherence R1∥R2 encrypted with the secret key Ksesc, the coherence R1∥R2 encrypted with the public key Kpu, and the public key Kpesc of itself to the mutual authentication unit 11 of the user device 1.
  • At step S49, the mutual authentication unit 11 of the user device 1 decrypts the signature in the received certificate with the public key Kpac of the certificate authority, which has been previously acquired, and extracts the public key Kpesc from the certificate if it is correct. Since the processing in this event is similar to that at step S43, explanation thereon is omitted. At step S50, the mutual authentication unit 11 of the user device 1 decrypts the coherence R1∥R2 encrypted with the secret key Ksesc of the center 3 with the public key Kpesc acquired at step s49. At step S51, the mutual authentication unit 11 of the user device 1 decrypts the coherence R1∥R2 encrypted with the public key Kpu of itself with the secret key Ksu of itself. At step S52, the mutual authentication unit 11 of the user device 1 compares the coherence R1∥R2 decrypted at step S50 with the coherence R1∥R2 decrypted at step S51, and authenticates the center 3 as true if they match, and aborts the processing, regarding the center 3 as false, if they do not match.
  • When a true authentication result is derived, the mutual authentication unit 11 of the user device 1 generates a 64-bit random number R3 at step S53. At step S54, the mutual authentication unit 11 of the user device 1 generates a coherence R2∥R3 of the random number R2 acquired at step S50 and the random number R3 generated thereby. At step S55, the mutual authentication unit 11 of the user device 1 encrypts the coherence R21 R3 with the public key Kpesc acquired at step S49. At step S56, the mutual authentication unit 11 of the user device 1 transmits the encrypted coherence R2∥R3 to the mutual authentication unit 31 of the center 3.
  • At step S57, the mutual authentication unit 31 of the center 3 decrypts the encrypted coherence R21 R3 with the secret key Ksesc of itself. At step S58, the mutual authentication unit 31 of the center 3 authenticates the user device 1 as a true user device if the decrypted random number R2 matches the random number R2 generated at step S44 (the random number R2 before being encrypted), and aborts the processing, regarding the user device 1 as a false user device, if they do not match.
  • As described above, the mutual authentication unit 31 of the center 3 and the mutual authentication unit 11 of the user device 1 mutually authenticate. The random numbers utilized for the mutual authentication are utilized as temporary keys which are effective only in the processing subsequent to the mutual authentication.
  • The processing performed by the user device 1 for depositing funds to the virtual bank 4 second and subsequent times will be explained with reference to FIG. 5. At step S71, the mutual authentication unit 11 of the user device 1 mutually authenticates with the mutual authentication unit 31 of the center 3, and shares a temporary key Ktsu which is used between the center 3 and the user device 1. Since the procedure for the mutual authentication is similar to that previously explained with reference to FIG. 4, explanation thereon is omitted. At step S72, the signature unit 15 of the user device 1 appends a signature of a user 1 to the user ID and the amount of issued electronic cash. In this event, the signature may be collectively appended to the user ID and the amount of issued electronic cash. The encryption unit 13 of the user device 1 encrypts the user ID and the amount of issued electronic cash, appended with the signature, with the temporary key Ktsu, and the communication unit 16 transmits the user ID and the amount of issued electronic cash encrypted with the temporary key Ktsu to the center 3. The communication unit 37 of the center 3 receives the user ID and the amount of issued electronic cash encrypted with the temporary key Ktsu, which has been transmitted thereto from the user device 1.
  • At step S73, the decryption unit 33 of the center 3 decrypts the user ID and the amount of issued electronic cash encrypted with the temporary key Ktsu, with the temporary key Ktsu, and the signature unit 34 verifies the signature appended to the amount of issued electronic cash resulting from the decryption to confirm that the amount of issued electronic cash is not tampered. Since the verification of the signature is similar to the processing previously explained at step S15 in FIG. 2, explanation thereon is omitted. If the signature unit 34 finds tampering in the amount of issued electronic cash, the processing is aborted. When the amount of issued electronic cash is not tampered, the processing proceeds to step S74, where the user management unit 35 of the center 3 derives a credit card number, which has been encrypted with the public key Kppg of the clearinghouse stored at step S27 in FIG. 2, corresponding to the user ID.
  • Since step S75 through step S81 are similar to step S16 through step S22, respectively, in FIG. 2, explanation thereon is omitted.
  • At step S82, the signature unit 34 of the center 3 appends a signature of the center 3 to the user ID and the amount of issued electronic cash, respectively appended with the signature of the user device, received at step S72. The encryption unit 32 encrypts the certificate of the user device 1, the user ID and the amount of issued electronic cash with the temporary key Ktsb. The communication unit 37 transmits these to the virtual bank 4. The communication unit 46 of the virtual bank 4 receives the certificate of the user device 1, the user ID and the amount of issued electronic cash transmitted by the center 3.
  • At step S83, the decryption unit 43 of the virtual bank 4 decrypts the certificate of the user device 1, the user ID and the amount of issued electronic cash, received at step S82, with the temporary key Ktsb, and the signature unit 44 verifies the signature of the center 3 and the signature of the user device 1 appended to the amount of issued electronic cash to confirm that the amount of issued electronic cash is not tampered. Since the verification of the signatures is similar to the processing previously explained at step S15 in FIG. 2, explanation thereon is omitted. If the signature unit 44 finds tampering in the amount of issued electronic cash, the processing is aborted. When the amount of issued electronic cash is not tampered, the account management unit 45 adds the amount of electronic cash issued this time to the amount of electronic cash corresponding to the user ID at step S84.
  • Since step S85 through step S87 are similar to the processing at step S26 through step S28, respectively, in FIG. 2, explanation thereon is omitted.
  • At step S88, the storage unit 12 of the user device 1 adds the amount of issued electronic cash transmitted at step S72 to the electronic cash balance stored in the storage unit 12, and stores the resulting amount.
  • In this way, the user device 1 can deposit electronic cash to the virtual bank 4 second and subsequent times in a similar manner.
  • Next, the processing performed by the shop 2 for registering itself in the center 3 and the virtual bank 4 will be explained with reference to FIG. 6. At step S91, the communication unit 26 of the shop 2 transmits shop information, account information, and a public key Kpm of the shop 2 to the certificate authority 6. Here, the shop information refers to that with which the shop 2 can be identified, for example, ID or the like. The certificate authority 6 receives the data transmitted by the communication unit 26 of the shop 2. At step S92, the certificate authority 6 applies a predetermined hash function to the received shop information, account information, and public key Kpm of the shop 2 to derive a hash value which is encrypted with a secret key Ksca of the certificate authority 6 to create a signature which is added to the shop information, the account information, and the public key Kpm of the shop 2 to create a certificate which is transmitted to the shop 2. FIG. 7 shows an example of the certificate for a shop. The certificate may include the name of the certificate authority (ID), certificate number (ID), expiration date of the certificate, and so on, in addition to those enumerated above. The communication unit 26 of the shop 2 receives the data transmitted by the certificate authority 6.
  • At step S93, the mutual authentication unit 21 of the shop 2 mutually authenticates with the mutual authentication unit 31 of the center 3, and the shop 2 and the center 3 share the coherence R2∥R3 of the random numbers at step S54 and at step S57 in FIG. 4 as a temporary key Ktsm. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted. At step S94, the encryption unit 23 of the shop 2 encrypts the account number of shop 2, previously stored therein, with the public key Kppg of the clearing house 5. The encryption unit 23 of the shop 2 further encrypts the account number encrypted with the public key Kppg of the clearing house 5 with the temporary key Ktsm, and also encrypts the certificate of the shop 2 with the temporary key Ktsm. The communication unit 26 transmits the account number and the certificate of the shop 2, encrypted with the temporary key Ktsm, to the center 3. The communication unit 37 of the center 3 receives the account number and the certificate encrypted with the temporary key Ktsm, transmitted thereto from the shop 2, and the decryption unit 33 decrypts the account number and the certificate encrypted with the temporary key Ktsm.
  • Continuing with step S95, the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 51 of the clearing house 5, and the mutual authentication unit 31 of the center 3 and the mutual authentication unit 51 of the clearing house 5 share the coherence R21 R3 of the random numbers at step S54 and at step S57 in FIG. 4 as a temporary key Ktsp. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted. At step S96, the signature unit 34 of the center 3 appends a signature to the account number of the shop 2. The encryption unit 32 further encrypts the certificate of the shop 2, the account number appended with the signature of the center 3 and encrypted with the public key Kppg of the clearing house 5 with the temporary key Ktsp. The communication unit 37 transmits the data encrypted with the temporary key Ktsp to the clearing house 5. The communication unit 56 of the clearing house 5 receives the data transmitted thereto from the center 3.
  • At step S97, the decryption unit 53 of the clearing house 5 decrypt the data received from the center 3 with the temporary key Ktsp. The signature unit 54 of the clearing house 5 verifies the signature of the certificate authority 6 appended to the certificate to confirm that the certificate is not tampered. If the signature unit 34 finds tampering in the certificate, the processing is aborted. When the certificate is not tampered, the processing proceeds to step S98, where the signature unit 54 applies a hash function to the received account number to calculate a hash value, and verifies whether the calculated hash value matches a hash value in the certificate to confirm that the account number is not tampered. If the signature unit 34 finds tampering in the account number, the processing is aborted. When the account number is not tampered, at step S99, the signature unit 54 appends a signature to the verified result at step S98 and at step 98. The encryption unit 52 encrypts the verified result appended with the signature with the temporary key Ktsp. The communication unit 56 transmits the verified result encrypted with the temporary key Ktsp to the center 3. The communication unit 37 of the center 3 receives the verified result transmitted by the clearing house 5, and the decryption unit 33 decrypts the verified result received from the clearing house 5 with the temporary key Ktsp.
  • At step 100, the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 41 of the virtual bank 4, and the center 3 and the virtual bank 4 share the coherence R2∥R3 of the random numbers at step S54 and at step S57 in FIG. 4 as the temporary key Ktsb. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted. At step S101, the signature unit 34 of the center 3 appends a signature of the center 3 to the certificate of the shop 2. The encryption unit 32 encrypts the certificate of the shop 2 appended with the signature of the center 3 with the temporary key Ktsp. The communication unit 37 transmits the encrypted certificate to the virtual bank 4. The communication unit 46 of the virtual bank 4 receives the certificate of the shop 2 transmitted thereto from the center 3.
  • At step S102, the decryption unit 43 of the virtual bank 4 decrypts the certificate of the shop 2 received from the center 3 with the temporary key Ktsb. The signature unit 44 verifies the signature of the center 3 appended to the certificate of the shop 2 and the signature of the certificate authority 6 included in the certificate of the shop 2 to confirm that the certificate of the shop 2 is not tampered. If tampering is found in the certificate of the shop 2, the processing is aborted. When the certificate of the shop 2 is not tampered, the account management unit 45 of the virtual bank 4 generates a shop ID and stores the amount of sales corresponding to the shop ID at step S103.
  • Since the processing at step S104 through step S106 is similar to the processing at step S26 through step S28, respectively, in FIG. 2, explanation thereon is omitted.
  • At step S107, the decryption unit 24 of the shop 2 decrypts the received shop ID, and the storage unit 22 stores the shop ID received at step S106.
  • In this way, the shop 2 registers itself in the center 3 and the virtual bank 4, and stores the shop ID.
  • Next, a transfer of electronic cash from the user device 1-2 to the user device 1-1 will be explained with reference to a flow chart of FIG. 8. At step S121, the mutual authentication unit 11-2 of the user device 1-2 mutually authenticates with the mutual authentication unit 11-1 of the user device 1-1, and the user device 1-2 and the user device 1-1 share the coherence R2∥R3 of the random numbers at step S54 and at step S57 in FIG. 4 as a temporary key Ktuu. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon will be omitted. At step S122, the signature unit 15-2 of the user device 1-2 appends a signature of the user device 1-2 to data indicative of an amount to be transferred, set by the user, and the encryption unit 13-2 encrypts the data indicative of the amount to be transferred with the temporary key Ktuu. The communication unit 16-2 of the user device 1-2 transmits the data indicative of the amount encrypted with the temporary key Ktuu to the communication unit 16-1 of the user device 1-1. The communication unit 16-1 of the user device 1-1 receives the data indicative of the amount encrypted with the temporary key Ktuu.
  • At step S123, the decryption unit 14-1 of the user device 1-1 decrypts the encrypted data indicative of the amount with the temporary key Ktuu, and the storage unit 12-1 adds the amount to be transferred to an uncleared amount stored therein, and stores the resulting value. The uncleared amount refers to the total amount transferred and received from other user devices 1. At step S124, the signature unit 15-1 of the user device 1-1 appends a signature of the user device 1-1 to the data indicative of the amount to be transferred, and the encryption unit 13-1 encrypts the data indicative of the amount to be transferred with the temporary key Ktuu. The communication unit 16-1 of the user device 1-1 transmits the encrypted data indicative of the amount to the communication unit 16-2 of the user device 1-2. The communication unit 16-2 of the user device 1-2 receives the encrypted data indicative of the amount.
  • At step S125, the decryption unit 14-2 of the user device 1-2 decrypts the encrypted data indicative of the amount with the temporary key Ktuu, and the storage unit 12-2 subtracts the amount to be transferred, derived by the decryption, from an uncleared amount stored therein, and stores the resulting difference. At step S126, the signature unit 15-2 appends a signature of the user device 1-2 to data indicative of the completed transfer of electronic cash. The encryption unit 13-2 encrypts the data indicative of the completed transfer of electronic cash appended with the signature, with the temporary key Ktuu. The communication unit 16-2 transmits the encrypted data indicative of the completed transfer of electronic cash to the communication unit 16-1 of the user device 1-1. The communication unit 16-1 of the user device 1-1 receives the data indicative of the completed transfer of electronic cash encrypted with the temporary key Ktuu, followed by the termination of the processing.
  • As described above, the user device 1-2 transfers electronic cash to the user device 1-1.
  • FIG. 9 is a flow chart for explaining other processing for transferring electronic cash from the user device 1-2 to the user device 1-1. At step S131, the mutual authentication unit 11-2 of the user device 1-2 mutually authenticates with the mutual authentication unit 11-1 of the user device 1-1, and the user device 1-2 and the use device 1-1 share the coherence R2∥R3 of the random numbers at step S54 and at step S57 in FIG. 4 as a temporary key Ktuu. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted. At step S132, the signature unit 15-2 of the user device 1-2 appends a signature of the user device 1-2 to data indicative of an amount to be transferred, set by the user. The encryption unit 13-2 encrypts the user ID of the user device 1-2 with the public key Kpesc of the center 3, and also encrypts the data indicative of the amount to be transferred and the user ID of the user device 1-2 encrypted with the public key Kpesc of the center 3 with the temporary key Ktuu. The communication unit 16-2 of the user device 1-2 transmits the data indicative of the amount and the user ID of the user device 1-2 encrypted with the temporary key Ktuu to the communication unit 16-1 of the user device 1-1. The communication unit 16-1 of the user device 1-1 receives the encrypted data indicative of the amount and user ID of the user device 1-2.
  • At step S133, the decryption unit 14-1 of the user device 1-1 decrypts the encrypted data indicative of the amount and user ID of the user device 1-2 with the temporary key Ktuu. The storage unit 12-1 adds the amount to be transferred to an uncleared amount stored therein, and stores the resulting amount and the user ID of the user device 1-2 encrypted with the public key Kpesc of the center 3.
  • Since the processing at step S134 through step S136 is similar to the processing at step S124 through step S126, respectively, in FIG. 8, explanation thereon is omitted.
  • With the processing in FIG. 9, the user device 1-2 transfers electronic cash to the user device 1-1, while the user device 1-1 stores the user ID of the user device 1-2 together with the transferred cash.
  • Next, the processing for a payment from the user device 1 to the shop 2 with electronic cash will be explained with reference to a flow chart of FIG. 10. At step S151, the user confirms the electronic cash balance stored in the storage unit 12 of the user device 1, and, if the balance is insufficient for the amount of purchase, forces the user device 1 to execute the processing illustrated in FIG. 5 to store a required amount of electronic cash. At step S152, the mutual authentication unit 11 of the user device 1 mutually authenticates with the mutual authentication unit 21 of the shop 2, and the user device 1 and the shop 2 share the coherence R2∥R3 of the random numbers at step S54 and at step S57 in FIG. 4 as a temporary key Ktum. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted.
  • At step S153, the encryption unit 13 of the user device 1 encrypts information on an article purchased from the shop 2 (information on a purchased article specified by the user through manipulations on the user device 1, for example, an article ID representative of the article) with the public key Kpm of the shop 2 previously stored in the storage unit 12, encrypts the user ID with the public key Kpesc of the center 3 previously stored in the storage unit 12, and encrypts an uncleared amount stored in the storage unit 12 with the public key Kpvb of the virtual bank 4.
  • Next, the signature unit 15 of the user device 1 appends a signature of the user device 1 to the information on the purchased article encrypted with the public key Kpm of the shop 2; the uncleared amount encrypted with the public key Kpvb of the virtual bank 4; and the user ID encrypted with the public key Kpesc of the center 3; and the amount of purchase. Here, the signature of the user device 1 is appended to the respective information. Alternatively, the signature of the user device 1 may be collectively appended to some or all of them. The encryption unit 13 of the user device 1 further encrypts the information on the purchased article encrypted with the public key Kpm of the shop 2 and appended with the signature; the user ID encrypted with the public key Kpesc of the center 3; the uncleared amount encrypted with the public key Kpvb of the virtual bank 4; and the amount of purchase with the temporary key Ktum. The communication unit 16 of the user device 1 transmits these data encrypted with the temporary key Ktum to the communication unit 26 of the shop 2. The communication unit 26 of the shop 2 receives these data.
  • At step S154, the signature unit 24 of the shop 2 verifies the signature in a variety of the received data to confirm whether or not they are tampered. If it is determined that they are tampered, the processing is aborted. When no tampering is determined, the decryption unit 24 decrypts these data encrypted with the temporary key Ktum. Also, the decryption key 24 decrypts the information on the purchased article encrypted with the public key Kpm of the shop 2 with a secret key Ksm of the shop 2.
  • At step S155, the mutual authentication unit 21 of the shop 2 mutually authenticates with the mutual authentication unit 31 of the center 3, and the shop 2 and the center 3 share the coherence R2∥R3 of the random numbers at step S54 and at step S57 in FIG. 4 as a temporary key Ktsm. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted.
  • At step S156, the encryption unit 23 of the shop 2 encrypts the shop ID of the shop 2 stored in the storage unit 22 with the public key Kpesc of the center 3 acquired at step S155. The signature unit 25 appends a signature of the shop 2 to the shop ID which has been encrypted with the public key Kpesc of the center 3, and appends the signature of the shop 2 to the amount of purchase which has been appended with the signature of the user device 1 decrypted at step S154. The encryption unit 23 encrypts the certificate of the user acquired at step S152; and the user ID encrypted with the public key Kpesc of the center 3 and appended with the signature of the shop and the signature of the user device 1; the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 and appended with the signature of the user device 1; the shop ID appended with the signature of the shop 2 and encrypted with the public key Kpesc of the center 3; and the amount of purchase with the temporary key Ktsm. The communication unit 26 transmits these data to the communication unit 37 of the center 3. The communication unit 37 of the center 3 receives these data encrypted with the temporary key Ktsm.
  • At step S157, the decryption unit 33 of the center 3 decrypts the certificate of the user; the user ID encrypted with the public key Kpesc of the center 3 and appended with the signature of the shop and the signature of the user device; the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 and appended with the signature of the user device 1; the shop ID appended with the signature of the shop 2 and encrypted with the public key Kpesc of the center 3; and the amount of purchase appended with the signatures of the user device 1 and the shop 2, received at step S156, with the temporary key Ktsm. The signature unit 34 verifies the signature of the user device 1 and the signature of the shop 2 to the amount of purchase; the signature of the shop and the signature of the user device 1 appended to the user ID; and the signature of the shop 2 to the shop ID to confirm that the amount of purchase, the user ID and the shop ID are not tampered. If the signature unit 34 finds tampering in any of the amount of purchase, the user ID and the shop ID, the processing is aborted. If any of the amount of purchase, the user ID and the shop ID is not tampered, the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 41 of the virtual bank 4 at step S158, and the center 3 and the virtual bank 4 share the coherence R2∥R3 of the random numbers at step S54 and at step S57 in FIG. 4 as a temporary key Ktsb. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted.
  • At step S159, the signature unit 34 of the center 3 appends a signature to the user ID, the shop ID, the amount of purchase, and the uncleared amount encrypted with the public key Kpvb of the virtual bank 4. The encryption unit 32 of the center 3 encrypts the user ID, the shop ID, the amount of purchase, the uncleared amount encrypted with the public key Kpvb of the virtual bank 4, and the signature with the temporary key Ktsb. The communication unit 37 transmits these data to the communication unit 46 of the virtual bank 4. The communication unit 46 of the virtual bank 4 receives these data.
  • At step S160, the decryption unit 43 of the virtual bank 4 decrypts the encrypted user ID, shop ID, amount of purchase, uncleared amount encrypted with the public key Kpvb of the virtual bank 4, and signature of the center 3 with the temporary key Ktsb. The signature unit 44 verifies the signature of the center 3 to confirm that the user ID, the shop ID, the amount of purchase, and the uncleared amount encrypted with the public key Kpvb of the virtual bank 4 are not tampered. If the signature unit 44 finds tampering, the processing is aborted. When tampering is not found in any of the user ID, the shop ID, the amount of purchase, and the uncleared amount encrypted with the public key Kpvb of the virtual bank 4, the account management unit 45 adds the amount of purchase to the amount of sales corresponding to the shop ID. At step S161, the account management unit 45 subtracts the amount of purchase from the balance corresponding to the user ID, adds the uncleared amount to the balance corresponding to the user ID, and stores the resulting amount.
  • At step S162, the encryption unit 42 of the virtual bank 4 encrypts the balance corresponding to the user ID stored at step S161 with the public key Kpu of the user. The signature unit 44 signs the amount of purchase, and the balance corresponding to the user ID encrypted with the public key Kpu of the user. The communication unit 46 transmits the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, and the signature to the communication unit 37 of the center 3. The communication unit 37 of the center 3 receives these data.
  • At step S163, the decryption unit 33 of the center 3 decrypts the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, and the signature of the virtual bank 4. The signature unit 34 of the center 3 appends a signature of the center 3 to the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, and the signature of the virtual bank 4. The encryption unit 32 encrypts the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, and the signature of the virtual bank 4, which have been appended with the signature of the center 3, with the temporary key Ktsm. The communication unit 37 transmits the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, the signature of the virtual bank 4, and the signature of the center 3, which have been encrypted with the temporary key Ktsm, to the communication unit 26 of the shop 2. The communication unit 26 of the shop 2 receives these data.
  • At step S164, the decryption unit 24 of the shop 2 decrypts the received amount of purchase, balance corresponding to the user ID encrypted with the public key Kpu of the user, signature of the virtual bank 4, and signature of the center 3, with the temporary key Ktsm. The signature unit 25 verifies the signature of the virtual bank 4 and the signature of the center 3 to confirm that there is no tampering in the received amount of purchase and balance corresponding to the user ID encrypted with the public key Kpu of the user. If the signature unit 25 finds tampering, the processing is aborted. If there is no tampering in any of the received amount of purchase and balance corresponding to the user ID encrypted with the public key Kpu of the user, the processing proceeds to step S165, where the signature unit 25 appends the signature of the shop 2 to the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, the signature of the virtual bank 4, and the signature of the center 3. The encryption unit 23 encrypts the amount of purchase, the balance corresponding to the user ID encrypted with the public key Kpu of the user, the signature of the virtual bank 4, the signature of the center 3, and the signature of the shop 2 with the temporary key Ktum. The communication unit 26 transmits these data to the communication unit 16 of the user device 1. The communication unit 16 of the user device 1 receives these data.
  • At step S166, the decryption unit 14 of the user device 1 decrypts the received amount of purchase, balance corresponding to the user ID encrypted with the public key Kpu of the user, signature of the virtual bank 4, signature of the center 3, and signature of the shop 2 with the temporary key Ktum. The signature unit 15 verifies the signature of the virtual bank 4, the signature of the center 3, and the signature of the shop 2 to confirm that there is no tampering in the received amount of purchase, and balance corresponding to the user ID encrypted with the public key Kpu of the user. If the signature unit 15 finds tampering, the processing is aborted. If there is no tampering in any of the received amount of purchase, and balance corresponding to the user ID encrypted with the public key Kpu of the user, the storage unit 12 confirms whether or not the received balance is equal to the amount derived by subtracting the amount of purchase from the balance stored in the storage unit 12 prior to the start of the processing and adding the uncleared amount transmitted at step S153 to the resulting amount. When the received balance is equal to the amount derived by subtracting the amount of purchase from the balance stored in the storage unit 12 prior to the start of the processing and adding the uncleared amount transmitted at step S153 to the resulting amount, the balance is updated and stored, and the uncleared amount is set to zero, followed by the termination of the processing. If the received balance is not equal to the amount derived by subtracting the amount of purchase from the balance stored in the storage unit 12 prior to the start of the processing and adding the uncleared amount transmitted at step S153 to the resulting amount, the processing is terminated.
  • As described above, the user device 1 make a payment to the shop 2 through the virtual bank 4.
  • The processing for transferring proceeds to the account of the shop 2 will be explained with reference to a flow chart of FIG. 11. At step A181, the mutual authentication unit 21 of the shop 2 mutually authenticates with the mutual authentication unit 31 of the center 3, and the shop 2 and the center 3 share the coherence R21 R3 of the random numbers at step S54 and at step S57 in FIG. 4 as a temporary key Ktsm. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted. At step S182, the encryption unit 23 of the shop 2 encrypts the shop ID of the shop 2, stored in the storage unit 22 at step S107 in FIG. 6, with the temporary key Ktsm. The signature unit 25 of the shop 2 appends a signature to the encrypted shop ID, and the encryption unit 23 encrypts the shop ID and the signature with the temporary key Ktsm. The communication unit 26 transmits the shop ID and the signature encrypted with the temporary key Ktsm to the communication unit 37 of the center 3. The communication unit 37 of the center 3 receives the shop ID and the signature.
  • At step S183, the decryption unit 33 of the center 3 decrypts the shop ID and the signature encrypted with the temporary key Ktsm. The signature unit 34 verifies the signature appended to the shop ID, derived by the decryption, to confirm that the shop ID is not tampered. If tampering is found in the shop ID, the processing is aborted. If no tampering is found in the shop ID, the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 41 of the virtual bank 4 at step S184, and the center 3 and the virtual bank 4 share the temporary key Ktsb. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted. At step S185, the signature unit 34 of the center 3 appends a signature to the shop ID confirmed at step S183, and the encryption unit 32 encrypts the shop ID and the signature with the temporary key Ktsb. The communication unit 37 transmits the shop ID and the signature encrypted with the temporary key Ktsb to the communication unit 46 of the virtual bank 4. The communication unit 46 of the virtual bank 4 receives the shop ID and the signature.
  • At step S186, the decryption unit 43 of the virtual bank 4 decrypts the shop ID and the signature encrypted with the temporary key Ktsb. The signature unit 44 verifies the signature appended to the shop ID, derived by the decryption, to confirm that the shop ID is not tampered. If tampering is found in the shop ID, the processing is aborted. If no tampering is found in the shop ID, the account management unit 45 clears the amount of proceeds corresponding to the shop ID stored in the account management unit 45. At step S187, the signature unit 44 appends a signature to the amount of proceeds corresponding to the shop ID stored in the account management unit 45 (the amount of proceeds before it is cleared), and the encryption unit 42 encrypts the amount of proceeds and the signature with the temporary key Ktsb. The communication unit 46 transmits the amount of proceeds and the signature encrypted with the temporary key Ktsb to the communication unit 37 of the center 3. The communication unit 37 of the center 3 receives the amount of proceeds and the signature.
  • At step S188, the mutual authentication unit 31 of the center 3 mutually authenticates with the mutual authentication unit 51 of the clearing house 5, and the center 3 and the clearing house 5 share the temporary key Ktsp. Since the procedure for the mutual authentication is similar to the processing in FIG. 4, explanation thereon is omitted. At step S189, the signature unit 34 of the center 3 appends a signature to the amount of proceeds received from the virtual bank 4 at step S187. The encryption unit 32 encrypts the certificate of the shop received from the shop 2 during the processing of the mutual authentication at step S181; the account number corresponding to the shop ID stored in the shop management unit 36 at step 105 in FIG. 6 and encrypted with the public key Kppg of the clearing house 5; and the amount of proceeds appended with the signature of the center 3, with the temporary key Ktsp. The communication unit 37 transmits the certificate of the shop, the account number corresponding to the shop ID, and the amount of proceeds, encrypted with the temporary key Ktsp, to the communication unit 56 of the clearing house 5. The communication unit 56 of the clearing house 5 receives the certificate of the shop, the account number corresponding to the shop ID, and the amount of proceeds encrypted with the temporary key Ktsp.
  • At step S190, the decryption unit 53 of the clearing house 5 decrypts the certificate of the shop, the account number corresponding to the shop ID, and the amount of proceeds. The signature unit 54 confirms that the decrypted amount of proceeds is not tampered. If tampering is found, the processing is aborted. If no tampering is found, the clearing unit 55 forces the bank to execute the processing for transferring the amount corresponding to the amount of proceeds to the account number corresponding to the shop ID. At step S191, the signature unit 54 appends a signature to data indicative of the result of the processing at step S190. The communication unit 56 transmits the data indicative of the result of the deposit processing, and the signature to the communication unit 37 of the center 3. The communication unit 37 of the center 3 receives the data indicative of the result of the deposit processing, and the signature.
  • At step S192, the decryption unit 33 of the center 3 decrypts the data indicative of the result of the deposit processing, and the signature. The signature unit 34 confirms that there is no tampering in the data indicative of the result of the deposit processing. If tampering is found, the processing is aborted. If no tampering is found, the signature unit 34 appends a signature to the data indicative of the result of the deposit processing. The communication unit 37 transmits the data indicative of the result of the deposit processing, and the signature to the communication unit 26 of the shop 2. The communication unit 26 of the shop 2 receives the data indicative of the result of the deposit processing, and the signature, and the decryption unit 24 of the shop 2 decrypts the data indicative of the result of the deposit processing, and the signature. The signature unit 25 confirms that there is no tampering in the data indicative of the result of the deposit processing. The storage unit 22 stores the data indicative of the result of the deposit processing, followed by the termination of the processing.
  • As described above, the deposit of proceeds to the account of the shop 2 is processed.
  • In this way, the user is identified at each device using the user ID. Each device is not aware of personal information, so that upon detection of a fraud, the center 3 finds account information encrypted with the public key Kppg of the clearing house 5 based on the user ID, and requests the clearing house 5 to disclose the account information. Based on that, the personal information is identified for the certificate authority 6, the credit card company 7, or the bank 8. In this event, since it is possible to control in which case each device discloses information, and to manage logs of references to them, personal information will not be unnecessarily disclosed.
  • It is assumed in this specification that a system refers to a general apparatus which is composed of a plurality of devices.
  • As a providing medium for providing a user device with a computer program for executing the processing as described above, communication media such as networks, satellites, cables and so on may be utilized in addition to recording media such as magnetic disks, CD-ROM, solid-state memories and so on.
  • Also, while FIG. 1 of the present invention illustrates in such a manner that the user device 1, the shop 2, the center 3, the virtual bank 4 and the clearing house 5, the certificate authority 6, and the credit card company 7 and the bank 8 exist independently of one another, some of these functions may be grouped into one. For example, the functions of the center 3, the virtual bank 4 and the clearing house 5 may be combined into the center 3.
  • In the present invention, the shop 2 need not hold any special apparatus, and is only required to register itself in the center 3. This is implemented by the center 3 which manages an ID issued to a card and provides it to the shop.
  • According to an electronic cash system of the invention, an account management apparatus stores information for identifying the user and the amount of money utilized by the user based on previously deposited funds, a settlement processing apparatus instructs the payment institution to settle, and a control apparatus manages the information for identifying a user, and an account number in the payment institution of the user, encrypted with a public key of the settlement processing apparatus, instructs the account management apparatus to change the balance of the deposited funds of the user, stored therein, based on the information for identifying the user, and instructs the settlement processing apparatus to execute a settlement based on the account number in the payment institution, so that the user can securely utilize electronic cash without the need for managing a special apparatus, each apparatus cannot unnecessarily know personal information and information on individual's purchase information, frauds can be detected, and the circulation of money can be managed.
  • Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims.
  • INDUSTRIAL APPLICABILITY
  • The present invention can be utilized in an electronic cash system for electronically managing the circulation of cash and information, and for depositing and withdrawing funds.

Claims (6)

1. An electronic cash system for processing a payment for an amount due, the payment being carried out using previously deposited funds, said system comprising:
an account management device, including:
storage means for storing information identifying a user and information of an amount of money available to be utilized by the user based on the previously deposited funds;
a settlement processing device, including:
settlement instructing means for instructing a payment institution to settle; and
a control device, including:
management means for managing the information identifying the user and for managing an account number in the payment institution of the user, the account number being encrypted with a public key of said settlement processing device,
balance change instructing means for instructing said account management device to change a balance of the stored previously deposited funds of the user based on the information identifying the user, and
settlement execution instructing means for instructing said settlement instructing means of said settlement processing device to execute a settlement transaction based on the account number in the payment institution.
2. An electronic cash system according to claim 1, wherein each one of said account management device, said settlement processing device, and said control device includes an associated mutual authentication means for performing predetermined mutual authentication processing with said associated mutual authentication means of another one of said account management device, said settlement processing device, and said control device before communication with the another one of said account management device, said settlement processing device, and said control device is initiated.
3. An electronic cash system according to claim 1, wherein each one of said account management device, said settlement processing device, and said control device includes an associated encryption means for encrypting data transmitted to another one of said account management device, said settlement processing device, and said control device, and includes an associated decryption means for encrypting data received from the another one of said account management device, said settlement processing device, and said control device.
4. An electronic cash system for processing a payment for an amount due, the payment being carried out using previously deposited funds, said system comprising:
a virtual bank, including:
an account management unit operable to store information identifying a user and information of an amount of money available to be utilized by the user based on the previously deposited funds;
a clearinghouse, including:
a clearing unit operable to instruct a payment institution to settle; and
a control center, including:
a user management unit operable to manage the information identifying the user and to manage an account number in the payment institution of the user, the account number being encrypted with a public key of said clearinghouse, and
a communication unit operable to instruct said virtual bank to change a balance of the stored previously deposited funds of the user based on the information identifying the user, and to instruct said clearing unit of said clearing house to execute a settlement transaction based on the account number in the payment institution.
5. An electronic cash system according to claim 4, wherein each one of said virtual bank, said clearinghouse, and said control center includes an associated mutual authentication unit operable to perform predetermined mutual authentication processing with said associated mutual authentication unit of another one of said virtual bank, said clearinghouse, and said control center before communication with the another one of said virtual bank, said clearinghouse, and said control center is initiated.
6. An electronic cash system according to claim 4, wherein each one of said virtual bank, said clearinghouse, and said control center includes an associated encryption unit operable to encrypt data transmitted to another one of said virtual bank, said clearinghouse, and said control center, and includes an associated decryption unit operable to encrypt data received from the another one of said virtual bank, said clearing house, and said control center.
US11/590,716 1998-10-08 2006-10-31 Electronic cash system Abandoned US20070050300A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/590,716 US20070050300A1 (en) 1998-10-08 2006-10-31 Electronic cash system

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JPP10-286341 1998-10-08
JP28634198A JP2000113085A (en) 1998-10-08 1998-10-08 Electronic cash system
JPPCT/JP99/05579 1999-10-08
US09/555,850 US6766306B1 (en) 1998-10-08 1999-10-08 Electronic cash system
US10/689,803 US7155418B2 (en) 1998-10-08 2003-10-21 Electronic cash system
US11/590,716 US20070050300A1 (en) 1998-10-08 2006-10-31 Electronic cash system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/689,803 Division US7155418B2 (en) 1998-10-08 2003-10-21 Electronic cash system

Publications (1)

Publication Number Publication Date
US20070050300A1 true US20070050300A1 (en) 2007-03-01

Family

ID=17703140

Family Applications (3)

Application Number Title Priority Date Filing Date
US09/555,850 Expired - Lifetime US6766306B1 (en) 1998-10-08 1999-10-08 Electronic cash system
US10/689,803 Expired - Fee Related US7155418B2 (en) 1998-10-08 2003-10-21 Electronic cash system
US11/590,716 Abandoned US20070050300A1 (en) 1998-10-08 2006-10-31 Electronic cash system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US09/555,850 Expired - Lifetime US6766306B1 (en) 1998-10-08 1999-10-08 Electronic cash system
US10/689,803 Expired - Fee Related US7155418B2 (en) 1998-10-08 2003-10-21 Electronic cash system

Country Status (2)

Country Link
US (3) US6766306B1 (en)
JP (1) JP2000113085A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080067240A1 (en) * 2004-07-22 2008-03-20 Toshihisa Nakano Electronic Value, Electronic Purse Device, And System For Using The Same
US20080197186A1 (en) * 2007-02-16 2008-08-21 Bitwallet, Inc. Settlement server, settlement request server and settlement execution terminal
US20150348034A1 (en) * 2012-12-26 2015-12-03 Felica Networks, Inc. Settlement management apparatus, information processing apparatus, settlement management method, and settlement management system

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7319986B2 (en) * 1999-09-28 2008-01-15 Bank Of America Corporation Dynamic payment cards and related management systems and associated methods
JP2001290874A (en) 2000-04-07 2001-10-19 Nec Corp Method and system for money reception management
AU2001264274A1 (en) * 2000-06-14 2001-12-24 Sadayuki Atae Settling method using mobile phone and mobile phone
US7447661B2 (en) * 2000-07-24 2008-11-04 Raja Ahsan I Electronic bearer bond online transaction system
JP2002041784A (en) * 2000-07-26 2002-02-08 Sony Corp Information processor and method for information processing, and recording medium
JP4942240B2 (en) * 2000-08-09 2012-05-30 大日本印刷株式会社 Payment processing method using a credit card
TW535389B (en) * 2001-07-03 2003-06-01 Wistron Corp Transaction system and method with automatic identification verification
JP3668175B2 (en) * 2001-10-24 2005-07-06 株式会社東芝 Personal authentication method, personal authentication device, and personal authentication system
US7305556B2 (en) * 2001-12-05 2007-12-04 Canon Kabushiki Kaisha Secure printing with authenticated printer key
US7352867B2 (en) * 2002-07-10 2008-04-01 General Instrument Corporation Method of preventing unauthorized distribution and use of electronic keys using a key seed
SG145524A1 (en) * 2002-08-07 2008-09-29 Mobilastic Technologies Pte Lt Secure transfer of digital tokens
US20040230526A1 (en) * 2003-05-13 2004-11-18 Praisner C. Todd Payment control system and associated method for facilitating credit payments in the accounts payable environment
US7895119B2 (en) * 2003-05-13 2011-02-22 Bank Of America Corporation Method and system for pushing credit payments as buyer initiated transactions
EP1624779A4 (en) * 2003-05-22 2008-01-23 Dci Marketing Inc Merchandising system
US7080047B2 (en) * 2003-05-28 2006-07-18 Kan Steven S Website-specific electronic signature containing personalized logo
EP1706088A4 (en) 2004-01-08 2011-04-06 Verifone Israel Ltd Reverse vault cash system and methods
US7853782B1 (en) 2004-04-14 2010-12-14 Sprint Spectrum L.P. Secure intermediation system and method
US9172679B1 (en) * 2004-04-14 2015-10-27 Sprint Spectrum L.P. Secure intermediation system and method
US8740069B2 (en) * 2005-01-26 2014-06-03 Heng Kah Choy Fraud-free payment for internet purchases
US20070250437A1 (en) * 2006-04-06 2007-10-25 Omx Technology Ab Securities settlement system
BR122017028173A2 (en) 2010-08-25 2021-02-23 Ace Series A Holdco Llc method for transferring funds
CN102760260A (en) * 2012-06-19 2012-10-31 四川启明星蜀达电气有限公司 Safety management system for multiple management cards in prepayment system
CN103793843B (en) * 2012-10-26 2017-10-13 阿里巴巴集团控股有限公司 A kind for the treatment of method and apparatus of account data
US20140379584A1 (en) * 2013-06-25 2014-12-25 FraudFree Finance, LLC Anti-fraud financial transaction method
US9652759B2 (en) 2014-07-11 2017-05-16 Google Inc. Hands-free transactions
US20160012426A1 (en) 2014-07-11 2016-01-14 Google Inc. Hands-free transactions with a challenge and response
US11107047B2 (en) 2015-02-27 2021-08-31 Samsung Electronics Co., Ltd. Electronic device providing electronic payment function and operating method thereof
US10193700B2 (en) 2015-02-27 2019-01-29 Samsung Electronics Co., Ltd. Trust-zone-based end-to-end security
EP3104320B1 (en) * 2015-06-12 2018-08-15 EM Microelectronic-Marin SA Method for programming bank data in an integrated circuit of a watch
US10846696B2 (en) 2015-08-24 2020-11-24 Samsung Electronics Co., Ltd. Apparatus and method for trusted execution environment based secure payment transactions
US10699274B2 (en) 2015-08-24 2020-06-30 Samsung Electronics Co., Ltd. Apparatus and method for secure electronic payment
US9608993B1 (en) * 2016-02-01 2017-03-28 International Business Machines Corporation Credential abuse prevention and efficient revocation with oblivious third party
US20170255923A1 (en) * 2016-03-01 2017-09-07 Google Inc. Direct settlement of hands-free transactions
CN108780477B (en) 2016-03-01 2022-10-21 谷歌有限责任公司 Facial profile modification for hands-free transactions
US10474879B2 (en) 2016-07-31 2019-11-12 Google Llc Automatic hands free service requests
JP7072820B2 (en) 2017-06-01 2022-05-23 株式会社 エヌティーアイ Data structure, transmitter, receiver, payment device, method, computer program
US11818259B2 (en) 2020-05-13 2023-11-14 Ridgeline, Inc. Query and projection processing for events
US11949784B2 (en) 2020-05-13 2024-04-02 Ridgeline, Inc. Auditing for events
US11233640B2 (en) 2020-05-13 2022-01-25 Ridgeline, Inc. Mutation processing for events
US11636467B2 (en) * 2020-09-14 2023-04-25 Visa International Service Association System, method, and computer program product for secured, encrypted transaction processing

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5315656A (en) * 1989-07-17 1994-05-24 Axyval (Societe Anonyme) System for protecting documents or objects enclosed in a tamper-proof container
US5535276A (en) * 1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US5677955A (en) * 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5784464A (en) * 1995-05-02 1998-07-21 Fujitsu Limited System for and method of authenticating a client
US5915023A (en) * 1997-01-06 1999-06-22 Bernstein; Robert Automatic portable account controller for remotely arranging for transfer of value to a recipient
US6126391A (en) * 1999-04-01 2000-10-03 Atraghji; Edward Fluid flow machine
US6128391A (en) * 1997-09-22 2000-10-03 Visa International Service Association Method and apparatus for asymetric key management in a cryptographic system
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6282522B1 (en) * 1997-04-30 2001-08-28 Visa International Service Association Internet payment system using smart card
US6311171B1 (en) * 1997-07-11 2001-10-30 Ericsson Inc. Symmetrically-secured electronic communication system
US6317729B1 (en) * 1997-04-08 2001-11-13 Linda J. Camp Method for certifying delivery of secure electronic transactions

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04143881A (en) * 1990-10-05 1992-05-18 Toshiba Corp Mutual authenticating system
IL125831A0 (en) * 1996-02-21 1999-04-11 Card Call Service Co Ltd Electronic commerce system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5315656A (en) * 1989-07-17 1994-05-24 Axyval (Societe Anonyme) System for protecting documents or objects enclosed in a tamper-proof container
US5535276A (en) * 1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US5677955A (en) * 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5784464A (en) * 1995-05-02 1998-07-21 Fujitsu Limited System for and method of authenticating a client
US5915023A (en) * 1997-01-06 1999-06-22 Bernstein; Robert Automatic portable account controller for remotely arranging for transfer of value to a recipient
US6317729B1 (en) * 1997-04-08 2001-11-13 Linda J. Camp Method for certifying delivery of secure electronic transactions
US6282522B1 (en) * 1997-04-30 2001-08-28 Visa International Service Association Internet payment system using smart card
US6311171B1 (en) * 1997-07-11 2001-10-30 Ericsson Inc. Symmetrically-secured electronic communication system
US6128391A (en) * 1997-09-22 2000-10-03 Visa International Service Association Method and apparatus for asymetric key management in a cryptographic system
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6126391A (en) * 1999-04-01 2000-10-03 Atraghji; Edward Fluid flow machine

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080067240A1 (en) * 2004-07-22 2008-03-20 Toshihisa Nakano Electronic Value, Electronic Purse Device, And System For Using The Same
US7912789B2 (en) 2004-07-22 2011-03-22 Panasonic Corporation Electronic value, electronic purse device, and system for using the same
US20080197186A1 (en) * 2007-02-16 2008-08-21 Bitwallet, Inc. Settlement server, settlement request server and settlement execution terminal
US7926713B2 (en) * 2007-02-16 2011-04-19 Sony Corporation Settlement server, settlement request server and settlement execution terminal
US20150348034A1 (en) * 2012-12-26 2015-12-03 Felica Networks, Inc. Settlement management apparatus, information processing apparatus, settlement management method, and settlement management system

Also Published As

Publication number Publication date
JP2000113085A (en) 2000-04-21
US6766306B1 (en) 2004-07-20
US7155418B2 (en) 2006-12-26
US20040098352A1 (en) 2004-05-20

Similar Documents

Publication Publication Date Title
US6766306B1 (en) Electronic cash system
US5590197A (en) Electronic payment system and method
JP3329432B2 (en) Hierarchical electronic cash execution method and apparatus used therefor
JP2853331B2 (en) Value transfer system
US8160966B2 (en) Token based new digital cash protocols
US5420926A (en) Anonymous credit card transactions
US6061791A (en) Initial secret key establishment including facilities for verification of identity
Hwang et al. A simple micro-payment scheme
US9406054B2 (en) Virtual account based new digital cash protocols
JP2000503786A (en) Untraceable electronic currency
JPH10240848A (en) Method for transferring fund for electronic coin between user terminals
JPH0973337A (en) Charging device, information reception device, and communication system
US20090210349A1 (en) Virtual account based new digital cash protocols
EP0886248B1 (en) Method and apparatus for registration of information with plural institutions and recording medium with registration program stored thereon
JPH09114904A (en) Method and system for vending information
Foo et al. A payment scheme using vouchers
CN116802661A (en) Token-based out-of-chain interaction authorization
Camp An atomicity-generating protocol for anonymous currencies
JP3171228B2 (en) Electronic bill execution method using multiple trust institutions
Klur What an organization should know about using electronic cash
Zhao et al. Yet Another Simple Internet Electronic Payment System
JPH08328470A (en) Key forming system for digital signature and ic card for making signature by using the key
JP3466478B2 (en) Registration method for a plurality of institutions, its device and its program recording medium
Rihaczek TeleTrusT-OSIS and communication security
Ames Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system

Legal Events

Date Code Title Description
AS Assignment

Owner name: SONY CORPORATION, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MATSUYAMA, SHINAKO;REEL/FRAME:020312/0184

Effective date: 20000512

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION