[go: up one dir, main page]

CN100568253C - Tag privacy protection method, update device, update request device, tag device - Google Patents

Tag privacy protection method, update device, update request device, tag device Download PDF

Info

Publication number
CN100568253C
CN100568253C CNB200710126268XA CN200710126268A CN100568253C CN 100568253 C CN100568253 C CN 100568253C CN B200710126268X A CNB200710126268X A CN B200710126268XA CN 200710126268 A CN200710126268 A CN 200710126268A CN 100568253 C CN100568253 C CN 100568253C
Authority
CN
China
Prior art keywords
information
key
tag
unit
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNB200710126268XA
Other languages
Chinese (zh)
Other versions
CN101079091A (en
Inventor
大久保美也子
铃木幸太郎
木下真吾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Publication of CN101079091A publication Critical patent/CN101079091A/en
Application granted granted Critical
Publication of CN100568253C publication Critical patent/CN100568253C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,上述各标签装置的秘密值存储器中存储将各个标签ID信息idh隐匿了的隐匿ID信息sidh,上述标签装置在读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中,对设在上述各标签装置的外部的更新装置输出上述隐匿ID信息sidh,上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在更新部中生成难以掌握与上述隐匿ID信息sidh的关联性的新的隐匿ID信息sidh’,在第二输出部中对上述标签装置输出上述新的隐匿ID信息sidh’,上述标签装置在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。

Figure 200710126268

A tag privacy protection method, which prevents the user's private information from being obtained based on the information output by the tag device. The hidden ID information sid h that hides the ID information id h of each tag is stored in the secret value memory of each tag device. The tag device is in The above-mentioned hidden ID information sid h stored in the above-mentioned secret value memory is read out in the read/write unit, and the above-mentioned hidden ID information sid h is output to an update device provided outside each of the above-mentioned tag devices in the first output unit, and the above-mentioned update The device accepts input of the above-mentioned hidden ID information sid h in the first input unit, generates new hidden ID information sid h' whose correlation with the above-mentioned hidden ID information sid h is difficult to grasp in the update unit, and generates new hidden ID information sid h ' in the second output unit. The above-mentioned new hidden ID information sid h ' is output to the above-mentioned tag device, and the above-mentioned tag device accepts the input of the above-mentioned new hidden ID information sid h ' in the second input part, and the above-mentioned new hidden ID information is transferred to the above-mentioned read-write part. sid h ' is stored in the above-mentioned secret value memory.

Figure 200710126268

Description

标签隐私保护方法、更新装置、更新委托装置、标签装置 Tag privacy protection method, update device, update request device, tag device

本申请为以下专利申请的分案申请:申请日为2004年9月27日,申请号为200480001507.3,发明名称为《标签隐私保护方法、标签装置、后端装置、更新装置、更新委托装置、其程序以及存储其程序的记录媒体、编辑系统》。This application is a divisional application of the following patent application: the application date is September 27, 2004, the application number is 200480001507.3, and the title of the invention is "label privacy protection method, label device, back-end device, update device, update entrusting device, and other Programs and recording media and editing systems storing their programs.

技术领域 technical field

本发明涉及应用了信息安全技术的标签技术,特别涉及防止从由标签装置输出的信息取得用户的隐私信息的标签隐私保护方法、标签装置、后端装置、更新装置、更新委托装置、程序以及记录媒体。The present invention relates to tagging technology to which information security technology is applied, and in particular to a tagging privacy protection method, a tagging device, a backend device, an update device, an update entrusting device, a program, and a record for preventing the user's private information from being obtained from information output by a tag device. media.

背景技术 Background technique

近年来,RFID(Radio Frequency Identification:电波方式识别)等标签自动识别系统的引入不断推进。该系统包括称作“标签(tag)装置”的小型的信息记录媒体、称作“读取(reader)装置”的读取机、以及称作“后端(back-end)装置”的数据库服务器,用于物流管理等。以下,概要说明该技术。In recent years, the introduction of automatic tag identification systems such as RFID (Radio Frequency Identification: radio frequency identification) has been promoted. This system includes a small information recording medium called a "tag device", a reader called a "reader device", and a database server called a "back-end device". , for logistics management, etc. Hereinafter, this technique will be briefly described.

[标签装置的处理][Handling of Label Devices]

在基本的标签自动识别系统中,标签装置中存储各标签装置固有的标签ID信息(例如,MIT的Auto-ID中心决定的ID包括:制造者码、表示商品的种类的商品码、表示商品个体的号码的个体号码)。而且,标签装置附在物品上,通过无线通信将各标签装置固有的标签ID信息发送到设置在商店等中的读取装置。In a basic automatic tag identification system, the tag ID information unique to each tag device is stored in the tag device (for example, the ID determined by MIT's Auto-ID Center includes: manufacturer code, product code indicating the type of product, product individual number of individual numbers). Furthermore, the tag device is attached to the article, and the tag ID information unique to each tag device is transmitted to a reading device installed in a store or the like by wireless communication.

[读取装置的处理][Handling of reading device]

读取装置通过无线通信从标签装置读取标签ID信息,将该标签ID信息发送到后端装置,委托物流信息的取得等。The reading device reads the tag ID information from the tag device through wireless communication, transmits the tag ID information to the back-end device, and requests acquisition of distribution information and the like.

[后端装置的处理][Handling of back-end devices]

后端装置管理各标签装置的ID和物流信息等的数据库。然后,后端装置以从读取装置发送的标签ID信息为关键字(key)对该数据库的物流信息等进行检索,并将该检索结果发送到读取装置。The back-end device manages a database of IDs and distribution information of each tag device. Then, the back-end device uses the tag ID information sent from the reading device as a key to search the distribution information and the like in the database, and sends the search result to the reading device.

[基本的标签自动识别系统的问题点][Problems of basic automatic tag recognition system]

但是,在基本的标签自动识别系统中,由于只要是具有读取装置的人,谁都可以读取标签ID信息,所以有所持有物品的信息从被盗听的标签ID信息泄漏的危险性。However, in the basic automatic tag identification system, since anyone who has a reading device can read the tag ID information, there is a danger that the information of the item in possession will leak from the tapped tag ID information. .

对于此,在非专利文献2中,记载了标签装置将散列(hash)值输出到读取装置的方法。In contrast, Non-Patent Document 2 describes a method in which a tag device outputs a hash value to a reading device.

在该方法的情况下,首先,标签装置将ID信息id与随机数r的位结合的散列值H(id|r),和该随机数r发送到读取装置。读取装置将它们发送到后端装置。后端装置将接收的随机数r和存储在数据库中的各id’位结合,求其散列值H(id’|r)。然后,后端装置检验求出的散列值H(id’|r)与接收的H(id|r)是否一致,将一致的id’所对应的物流信息等发送到读取装置中。由此,可以防止标签ID信息泄漏到第三者。另外,H(*)表示对*使用散列函数H的处理。In the case of this method, first, the tag device transmits a hash value H(id|r) obtained by combining bits of ID information id and a random number r, and the random number r to the reading device. The reading device sends them to the backend device. The back-end device combines the received random number r with each id' bit stored in the database to obtain its hash value H(id'|r). Then, the back-end device checks whether the calculated hash value H(id'|r) is consistent with the received H(id|r), and sends the logistics information corresponding to the consistent id' to the reading device. Thereby, leakage of tag ID information to a third party can be prevented. In addition, H(*) represents the process of using the hash function H for *.

而且,在未公开的专利申请号2003-111342以及2003-113798所示的方法中,使用将标签信息加密的隐匿ID,防止标签ID信息泄漏到第三者。即,在这些方法中,在标签装置中预先存储隐匿ID,读取该隐匿ID的客户装置对网络上的安全服务器装置委托该隐匿ID的解码。接收了该委托的安全服务器装置在确认了委托源为正式的客户装置之后,响应该隐匿ID的解码结果的纯文本的标签ID信息。由此,可以防止标签ID信息泄漏到第三者。Furthermore, in the methods shown in Unpublished Patent Application Nos. 2003-111342 and 2003-113798, a secret ID in which tag information is encrypted is used to prevent tag ID information from being leaked to a third party. That is, in these methods, the privileged ID is stored in advance in the tag device, and the client device that reads the privileged ID requests decoding of the privileged ID to the security server device on the network. The security server device that received the request, after confirming that the source of the request is an official client device, responds with plain text tag ID information of the decoding result of the privileged ID. Thereby, leakage of tag ID information to a third party can be prevented.

非专利文献1:EPC global,Inc.,”EPCglobal”,[online],[2004年9月9日检索],因特网<http://www.epcglobalinc.org/>Non-Patent Document 1: EPC global, Inc., "EPCglobal", [online], [retrieved on September 9, 2004], Internet <http://www.epcglobalinc.org/>

非专利文献2:Stephen A.Weis,Sanjay E.Sarma,Ronald L.Rivest,DanielW.Engels,Security and Privacy Aspects of Low-Cost Radio FrequencyIdentification Systems,First International Conference on Security in PervasiveComputing.Non-Patent Document 2: Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, First International Conference on Security in Pervasive Computing.

但是,在现有的方法中,有时根据从标签装置输出的信息追踪(trace)标签装置的流通过程。However, in the conventional method, the distribution process of the labeling device may be traced based on the information output from the labeling device.

换言之,例如在非专利文献2所记载的方法的情况下,从标签装置发送到读取装置的散列值H(id|r)对于不知道id的第三者来说,是单纯的随机数。而且,由于随机数r在每一次进行标签装置和读取装置的通信时生成,所以散列值H(id|r)在每次通信不同。从而,通常,攻击者无法得知从标签装置盗听的散列值H(id|r)和过去的通信历史的散列值H(id’|ri)的关联性。但是,在攻击者通过标签装置的干预而得到了ID信息id的情况下,该攻击者可以根据通信历史的随机数ri计算散列值H(id’|ri)(如果知道散列函数H)。然后,通过检验该计算值与通信历史的散列值(对应于随机数ri)是否一致,该攻击者可以知道该通信历史是否对应于取得了的ID,通过收集对应于该ID的通信历史可以追踪标签装置的流通过程。In other words, for example, in the case of the method described in Non-Patent Document 2, the hash value H(id|r) sent from the tag device to the reader is a simple random number for a third party who does not know the id . Furthermore, since the random number r is generated every time the tag device communicates with the reader, the hash value H(id|r) is different for every communication. Therefore, in general, an attacker cannot know the correlation between the hash value H(id|r) intercepted from the tag device and the hash value H(id'| ri ) of the past communication history. However, in the case that the attacker obtains the ID information id through the intervention of the tag device, the attacker can calculate the hash value H(id'| ri ) according to the random number r i of the communication history (if the hash function is known h). Then, by checking whether the calculated value is consistent with the hash value (corresponding to the random number r i ) of the communication history, the attacker can know whether the communication history corresponds to the obtained ID, by collecting the communication history corresponding to the ID The circulation process of labeling devices can be tracked.

而且,例如在专利申请号2003-111342等所示的方法中,由于通常从无线标签装置返回相同的隐匿ID,所以即使攻击者无法解读纯文本的ID,通过追踪该隐匿ID,也可以追踪该标签装置的流通过程。Moreover, for example, in the method shown in Patent Application No. 2003-111342, etc., since the same hidden ID is usually returned from the wireless tag device, even if the attacker cannot decipher the ID in plain text, by tracking the hidden ID, it is possible to track the hidden ID. Circulation process of labeling devices.

发明内容 Contents of the invention

本发明鉴于上述问题而完成,其目的在于提供一种可防止第三者对标签装置的流通过程的追踪的技术。The present invention has been made in view of the above-mentioned problems, and an object of the present invention is to provide a technology capable of preventing a third party from tracking the distribution process of label devices.

为了解决以上的课题,在标签装置中预先存储ID信息的加密信息,并在规定的时机对其进行更新。由此,攻击者难以取得过去标签装置输出的信息和更新了的加密信息的关联,并难以追踪标签装置的流通过程。In order to solve the above-mentioned problems, encrypted information of ID information is previously stored in a tag device, and it is updated at a predetermined timing. Therefore, it is difficult for an attacker to obtain the correlation between the information output by the tag device in the past and the updated encrypted information, and it is difficult to trace the distribution process of the tag device.

例如,在第一本发明中,各标签装置的秘密值存储器中预先存储各个标签ID信息所对应的秘密值。然后,对来自读取装置的调用,标签装置在输出部中,输出秘密值存储器的秘密值所对应的标签输出信息。然后,在第一运算部中,从秘密值存储器读取秘密值的至少一部分的要素,对其使用难以求出逆像的第一函数F1,该运算结果,将秘密值存储器内的秘密值覆盖更新。这里,由于秘密值存储器内的秘密值被覆盖更新,所以即使攻击者通过干预而取得存储在秘密值存储中的秘密值,更新后的秘密值也不对应于更新前从标签装置发送的信息。而且,由于该更新通过使用难以求出逆像的第一函数F1来进行,所以难以根据某时刻的秘密值求出更新前的秘密值。从而,攻击者无法得知标签装置和通信历史的对应。For example, in the first present invention, the secret value memory corresponding to each tag ID information is stored in advance in the secret value memory of each tag device. Then, the tag device outputs tag output information corresponding to the secret value of the secret value storage in the output unit in response to the call from the reading device. Then, in the first calculation unit, at least a part of the elements of the secret value are read from the secret value memory, and the first function F1, which is difficult to obtain an inverse image, is used thereon, and the secret value in the secret value memory is overwritten with the result of the calculation. renew. Here, since the secret value in the secret value storage is overwritten and updated, even if an attacker obtains the secret value stored in the secret value storage through intervention, the updated secret value does not correspond to the information sent from the tag device before the update. Furthermore, since this update is performed using the first function F1 whose inverse image is difficult to obtain, it is difficult to obtain the secret value before updating from the secret value at a certain time. Therefore, an attacker cannot know the correspondence between the tag device and the communication history.

而且,例如,在第二本发明中,在设置在标签装置的外部的更新装置中,将存储在标签装置中的隐匿ID信息,在规定的时机更新为难以把握与其的关联性的新的隐匿ID信息。这样,由于隐匿ID信息被更新,所以攻击者无法得知该更新前从标签装置输出到后端装置的隐匿ID信息和更新后的新的隐匿ID信息的对应。从而,攻击者无法得知标签装置和通信历史的对应。Furthermore, for example, in the second invention, the update device installed outside the tag device updates the privileged ID information stored in the tag device at a predetermined timing to a new secret ID information whose correlation is difficult to grasp. ID information. In this way, since the privileged ID information is updated, an attacker cannot know the correspondence between the privileged ID information output from the tag device to the back-end device before the update and the new privileged ID information after the update. Therefore, an attacker cannot know the correspondence between the tag device and the communication history.

本发明还提供一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,各标签装置的秘密值存储器中存储将各个标签ID信息idh隐匿了的隐匿ID信息sidh,上述各标签装置在读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中,对设在上述各标签装置的外部的更新装置输出上述隐匿ID信息sidh,上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在更新部中生成难以掌握与上述隐匿ID信息sidh的关联性的新的隐匿ID信息sidh’,在第二输出部中对上述各标签装置输出上述新的隐匿ID信息sidh’,上述各标签装置在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。The present invention also provides a label privacy protection method, which prevents the user's private information from being obtained according to the information output by the label device. The secret value memory of each label device stores hidden ID information sid h that hides the ID information id h of each label. The above-mentioned Each tag device reads the privileged ID information sid h stored in the secret value memory in the read/write unit, and outputs the privileged ID information sid h in the first output unit to an updating device provided outside each tag device. h , the updating device accepts the input of the hidden ID information sid h in the first input unit, and generates new hidden ID information sid h ' whose correlation with the hidden ID information sid h is difficult to grasp in the updating unit, and in the In the second output unit, the above-mentioned new concealed ID information sid h ' is output to each of the above-mentioned tag devices, and each of the above-mentioned tag devices accepts the input of the above-mentioned new concealed ID information sid h ' in the second input part, and the above-mentioned read-write part will The above-mentioned new covert ID information sid h ' is stored in the above-mentioned secret value memory.

本发明还提供一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,各标签装置h的秘密值存储器中存储与各个标签ID信息idh对应的隐匿ID信息sidh,其中,h∈{1,...,m},m是标签装置的总数,该隐匿ID信息sidh是随机值rh,设在上述各标签装置h的外部的更新装置的隐匿ID存储器中对应存储上述各标签ID信息idh,和与该标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh是随机值rh,上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对上述更新装置输出上述隐匿ID信息sidh,上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在随机值生成部中,生成新的随机值rh’,在第二读写部中,从上述隐匿ID存储器中选择被输入的上述隐匿ID信息sidh所对应的标签ID信息idh,将上述新的随机值rh’作为新的隐匿ID信息sidh’与之对应存储在该隐匿ID存储器中,在第二输出部中对上述各标签装置h输出上述新的隐匿ID信息sidh’,上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。The present invention also provides a label privacy protection method to prevent the user's private information from being obtained according to the information output by the label device. The hidden ID information sid h corresponding to each label ID information id h is stored in the secret value memory of each label device h, wherein , h∈{1,...,m}, m is the total number of tag devices, the hidden ID information sid h is a random value r h , which is set in the hidden ID memory of the external update device of each tag device h to correspond to storing the above-mentioned tag ID information id h , and the concealed ID information sid h corresponding to the tag ID information id h , the concealed ID information sid h is a random value r h , and the above-mentioned tag devices h are read in the first read-write unit The above-mentioned privileged ID information sid h stored in the above-mentioned secret value memory is output, and the above-mentioned privileged ID information sid h is output to the above-mentioned updating device through the first output unit. The above-mentioned updating device receives the above-mentioned privileged ID information sid h through the first input unit. input, in the random value generation unit, generate a new random value r h ', in the second reading and writing unit, select the tag ID information id corresponding to the input hidden ID information sid h from the hidden ID memory h , store the above-mentioned new random value r h ' as new concealed ID information sid h ' in the concealed ID memory correspondingly, and output the above-mentioned new concealed ID information to each tag device h in the second output unit sid h ', the above-mentioned each tag device h accepts the input of the above-mentioned new concealed ID information sid h ' in the second input part, and stores the above-mentioned new concealed ID information sid h ' in the above-mentioned secret in the above-mentioned first read-write part in value memory.

本发明还提供一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,各标签装置h的秘密值存储器中存储与各个标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh具有共同密钥加密方式的第一加密文本和该加密所使用的共同密钥kj的密钥ID信息kidj,其中,h∈{1,...,m},m是标签装置的总数,j∈{1,...,n},n是密钥的总数,在上述各标签装置h的外部设置的更新装置的密钥存储器中对应存储各密钥ID信息kidj和各共同密钥kj,上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对上述更新装置输出上述隐匿ID信息sidh,上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在第二读写部中,从上述密钥存储器中提取上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述共同密钥kj,在ID提取部中,使用上述第二读写部提取的上述共同密钥kj将上述第一加密文本解码,并提取标签ID信息idh,在加密部中,使用上述ID提取部提取的上述标签ID信息idh和该提取所使用的上述共同密钥kj,生成难以掌握与上述第一加密文本的关联性的第二加密文本,在第二输出部中对上述各标签装置h输出具有上述第二加密文本和该共同密钥kj的上述密钥ID信息kidj的新的隐匿ID信息sidh’,上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。The present invention also provides a tag privacy protection method, which prevents the user's private information from being obtained according to the information output by the tag device. The hidden ID information sid h corresponding to each tag ID information id h is stored in the secret value memory of each tag device h . The hidden ID information sid h has the first encrypted text of the common key encryption method and the key ID information kid j of the common key k j used for the encryption, where h∈{1,...,m}, m is the total number of tag devices, j∈{1,...,n}, n is the total number of keys, and each key ID information kid is correspondingly stored in the key memory of the updating device installed outside each tag device h j and each common key k j , each tag device h reads out the hidden ID information sid h stored in the secret value memory in the first read-write unit, and outputs the above-mentioned ID information sid h to the update device in the first output unit For the concealed ID information sid h , the updating device accepts the input of the concealed ID information sid h in the first input unit, and in the second read/write unit, extracts the secret key included in the concealed ID information sid h from the key memory. The above-mentioned common key k j corresponding to the key ID information kid j , in the ID extracting part, use the above-mentioned common key k j extracted by the above-mentioned second reading and writing part to decode the above-mentioned first encrypted text, and extract the tag ID information id h , in the encryption unit, using the tag ID information id h extracted by the ID extraction unit and the common key k j used for the extraction, the second encrypted text whose relationship with the first encrypted text is difficult to grasp is generated , in the second output part, output the new concealed ID information sid h ' with the above-mentioned second encrypted text and the above-mentioned key ID information kid j of the common key k j to each of the above-mentioned tag devices h, and each of the above-mentioned tag devices h The second input unit accepts input of the new privileged ID information sid h ', and the first read/write unit stores the new privileged ID information sid h ' in the secret value memory.

本发明还提供一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,各标签装置h的秘密值存储器中存储与各个标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh具有公开密钥加密方式的第一加密文本和密钥对(skj,pkj)的密钥ID信息kidj,其中,h∈{1,...,m},m是标签装置的总数,skj是密钥,pkj是公开密钥,j∈{1,...,n},n是密钥的总数,在上述各各标签装置h的外部设置的更新装置的密钥存储器中对应存储各密钥ID信息kidj和各密钥对(skj,pkj),上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对上述更新装置输出上述隐匿ID信息sidh,上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在第二读写部中,从上述密钥存储器中提取被输入到上述第一输入部的上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的密钥对(skj,pkj),在ID提取部中,使用上述第二读写部提取的上述密钥skj将上述第一加密文本解码,并提取上述标签ID信息idh,在加密部中,使用上述ID提取部提取的上述标签ID信息idh和上述第二读写部提取的上述公开密钥pkj,生成难以掌握与上述第一加密文本的关联性的第二加密文本,在第二输出部中对上述各标签装置h输出具有上述第二加密文本和上述密钥对(skj,pkj)的上述密钥ID信息kidj的新的隐匿ID信息sidh’,上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。The present invention also provides a tag privacy protection method, which prevents the user's private information from being obtained according to the information output by the tag device. The hidden ID information sid h corresponding to each tag ID information id h is stored in the secret value memory of each tag device h . The hidden ID information sid h has the first encrypted text of the public key encryption method and the key ID information kid j of the key pair (sk j , pk j ), where h∈{1,...,m}, m is the total number of tag devices, sk j is the key, pk j is the public key, j∈{1,...,n}, n is the total number of keys, and the updates set outside each of the above tag devices h Each key ID information kid j and each key pair (sk j , pk j ) are correspondingly stored in the key memory of the device, and each tag device h reads out the key stored in the secret value memory in the first read-write part The above-mentioned privileged ID information sid h outputs the above-mentioned privileged ID information sid h to the above-mentioned updating device in the first output unit, and the above-mentioned updating device receives the input of the above-mentioned privileged ID information sid h in the first input unit, , the key pair (sk j , pk j ) corresponding to the key ID information kid j included in the hidden ID information sid h input to the first input unit is extracted from the key memory, and the ID extraction In the part, the above-mentioned first encrypted text is decoded using the above-mentioned key sk j extracted by the above-mentioned second reading and writing part, and the above-mentioned tag ID information id h is extracted, and in the encryption part, the above-mentioned tag ID information extracted by the above-mentioned ID extracting part is used id h and the above-mentioned public key pk j extracted by the above-mentioned second reading and writing unit generate a second encrypted text whose correlation with the above-mentioned first encrypted text is difficult to grasp, and output the second encrypted text to each of the above-mentioned tag devices h in the second output unit. The above-mentioned second encrypted text and the new hidden ID information sid h ' of the above-mentioned key ID information kid j of the above-mentioned key pair (sk j , pk j ), each of the above-mentioned tag devices h accepts the above-mentioned new When the privileged ID information sid h ' is input, the new privileged ID information sid h ' is stored in the secret value memory in the first read/write unit.

本发明还提供一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,各标签装置h的秘密值存储器中存储与各个标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh具有可再加密的公开密钥加密方式的第一加密文本和该公开密钥pkj的密钥ID信息kidj,其中,h∈{1,...,m},m是标签装置的总数,j∈{1,...,n},n是密钥的总数,在上述各标签装置h的外部设置的更新装置的密钥存储器中对应存储各密钥ID信息kidj和各公开密钥pkj,上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对上述更新装置输出上述隐匿ID信息sidh,上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在第二读写部中,从上述密钥存储器中提取被输入到上述第一输入部的上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述公开密钥pkj,在加密部中,使用上述第二读写部提取的上述公开密钥pkj,将上述隐匿ID信息sidh具备的上述第一加密文本再加密,生成难以掌握与上述第一加密文本的关联性的第二加密文本,在第二输出部中对上述各标签装置h输出具有上述第二加密文本和上述公开密钥pkj的上述密钥ID信息kidj的新的隐匿ID信息sidh’,上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。The present invention also provides a tag privacy protection method, which prevents the user's private information from being obtained according to the information output by the tag device. The hidden ID information sid h corresponding to each tag ID information id h is stored in the secret value memory of each tag device h . The hidden ID information sid h has the first encrypted text of the re-encryptable public key encryption method and the key ID information kid j of the public key pk j , where h∈{1,...,m}, m is the total number of tag devices, j∈{1,...,n}, n is the total number of keys, and each key ID information kid is correspondingly stored in the key memory of the updating device installed outside each tag device h j and each public key pk j , each tag device h reads the hidden ID information sid h stored in the secret value memory in the first read/write unit, and outputs the above-mentioned ID information sid h to the update device in the first output unit. Concealed ID information sid h , wherein the updating means accepts input of the privileged ID information sid h in the first input unit, and in the second read/write unit, extracts the key memory inputted to the first input unit. The above-mentioned public key pk j corresponding to the above-mentioned key ID information kid j included in the hidden ID information sid h is converted to The above-mentioned first encrypted text possessed by sid h is re-encrypted to generate a second encrypted text whose correlation with the above-mentioned first encrypted text is difficult to grasp, and the second output part outputs the above-mentioned second encrypted text and The new concealed ID information sid h ' of the above-mentioned key ID information kid j of the above-mentioned public key pk j , the above-mentioned each tag device h accepts the input of the above-mentioned new concealed ID information sid h ' in the second input part, and in the above-mentioned The first read-write unit stores the above-mentioned new concealed ID information sid h ' in the above-mentioned secret value memory.

本发明还提供一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,各标签装置h的秘密值存储器中存储将各个标签ID信息idh隐匿了的隐匿ID信息sidh,其中,h∈{1,...,m},m是标签装置的总数,上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对设在上述各标签装置h的外部的第一更新装置输出上述隐匿ID信息sidh,上述第一更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在ID提取部中,根据上述隐匿ID信息sidh求标签ID信息idh,在第二输出部中,对设在上述各标签装置h的外部的第二更新装置输出上述标签ID信息idh,上述第二更新装置在第三输入部中,接受上述标签ID信息idh的输入,在加密部中,生成将上述标签ID信息idh隐匿了的新的隐匿ID信息sidh’,在第三输出部中,对上述各标签装置h输出上述新的隐匿ID信息sidh’,上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。The present invention also provides a tag privacy protection method, which prevents the user's private information from being obtained according to the information output by the tag device. The secret value memory of each tag device h stores hidden ID information sid h that hides the ID information id h of each tag, Wherein, h∈{1,...,m}, m is the total number of tag devices, and each tag device h reads out the above-mentioned concealed ID information sid h stored in the above-mentioned secret value memory in the first read-write part, In the first output part, the above-mentioned privileged ID information sid h is output to a first update device provided outside the above-mentioned tag devices h, and the above-mentioned first update device receives an input of the above-mentioned privileged ID information sid h in the first input part, In the ID extraction part, the tag ID information id h is obtained based on the hidden ID information sid h , and in the second output part, the tag ID information id h is output to the second update device installed outside the tag devices h , The above-mentioned second updating device accepts the input of the above-mentioned tag ID information id h in the third input part, and in the encryption part, generates new concealed ID information sid h ' with the above-mentioned tag ID information id h concealed, and in the third In the output unit, the above-mentioned new hidden ID information sid h ' is output to each of the above-mentioned tag devices h, and each of the above-mentioned tag devices h receives the input of the above-mentioned new hidden ID information sid h ' in the second input part, In the writing unit, the above-mentioned new hidden ID information sid h ' is stored in the above-mentioned secret value memory.

本发明还提供一种更新装置,更新标签装置的隐匿ID信息,设置在上述标签装置的外部,具有:隐匿ID存储器,对应存储各标签ID信息idh和与该标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh是随机值rh;第一输入部,接受从上述标签装置输出的隐匿ID信息sidh的输入;随机值生成部,生成新的随机值rh’;第二读写部,连接到上述隐匿ID存储器,从该隐匿ID存储器中选择被输入到上述第一输入部的上述隐匿ID信息sidh所对应的标签ID信息idh,将上述新的随机值rh’作为新的隐匿ID信息sidh’与之对应存储在该隐匿ID存储器中;以及第二输出部,对上述标签装置输出上述新的隐匿ID信息sidh’。本发明还提供一种更新装置,更新标签装置的隐匿ID信息,设置在上述标签装置的外部,具有:密钥存储器,对应存储各密钥ID信息kidj(j∈{1,...,n},n是标签装置的总数)和共同密钥加密方式的各共同密钥kj;第一输入部,接受具有对应于标签ID信息idh的共同密钥加密方式的第一加密文本,和该加密所使用的共同密钥kj的密钥ID信息kidj的隐匿ID信息sidh的输入;第二读写部,连接到上述密钥存储器,从该密钥存储器中提取上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述共同密钥kj;ID提取部,使用上述第二读写部提取的上述共同密钥kj将上述第一加密文本解码,并提取标签ID信息idh;加密部,使用上述ID提取部提取的上述标签ID信息idh,和该提取所使用的上述共同密钥kj,生成难以掌握与上述第一加密文本的关联性的第二加密文本;以及第二输出部,对上述标签装置h输出具有上述第二加密文本和该共同密钥kj的上述密钥ID信息kidj的新的隐匿ID信息sidh’。The present invention also provides an updating device, which updates the hidden ID information of the tag device, which is arranged outside the above-mentioned tag device, and has: a hidden ID memory, correspondingly storing each tag ID information id h and the hidden ID information corresponding to the tag ID information id h ID information sid h , the hidden ID information sid h is a random value r h ; the first input unit accepts the input of the hidden ID information sid h output from the tag device; the random value generation unit generates a new random value r h '; The second read-write unit is connected to the above-mentioned hidden ID memory, selects the tag ID information id h corresponding to the above-mentioned hidden ID information sid h input to the above-mentioned first input unit from the hidden ID memory, and uses the above-mentioned new random The value r h ' is correspondingly stored in the hidden ID memory as new hidden ID information sid h '; and the second output unit outputs the new hidden ID information sid h ' to the tag device. The present invention also provides an update device for updating the concealed ID information of the tag device, which is arranged outside the above-mentioned tag device, and has: a key memory, correspondingly storing each key ID information kid j (j∈{1,..., n}, n is the total number of tag devices) and each common key k j of the common key encryption method; the first input unit accepts the first encrypted text with the common key encryption method corresponding to the tag ID information id h , and the input of hidden ID information sid h of key ID information kid j of common key k j used for this encryption; the second reading and writing unit is connected to the above-mentioned key memory, and extracts the above-mentioned hidden ID from the key memory the above-mentioned common key k j corresponding to the above-mentioned key ID information kid j possessed by the information sid h ; the ID extracting unit uses the above-mentioned common key k j extracted by the above-mentioned second reading and writing unit to decode the above-mentioned first encrypted text, and extracting tag ID information id h ; the encryption unit uses the tag ID information id h extracted by the ID extracting unit and the common key k j used for the extraction to generate a code that is difficult to grasp the relevance to the first encrypted text a second encrypted text; and a second output unit that outputs new privileged ID information sid h ' having the second encrypted text and the key ID information kid j of the common key k j to the tag device h.

本发明还提供一种更新装置,更新标签装置h的隐匿ID信息,其特征在于,设置在上述标签装置h的外部,具有:密钥存储器,对应存储各密钥ID信息kidj和共同密钥加密方式的各共同密钥kj,其中,j∈{1,...,n},n是密钥的总数;第一输入部,接受隐匿ID信息sidh的输入,该隐匿ID信息sidh具有第一加密文本和该加密所使用的共同密钥kj的密钥ID信息kidj,所述第一加密文本对应于标签ID信息idh的共同密钥加密方式;第二读写部,连接到上述密钥存储器,从该密钥存储器中提取上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述共同密钥kj;ID提取部,使用上述第二读写部提取的上述共同密钥kj将上述第一加密文本解码,并提取标签ID信息idh;加密部,使用上述ID提取部提取的上述标签ID信息idh,和该提取所使用的上述共同密钥kj,生成难以掌握与上述第一加密文本的关联性的第二加密文本;以及第二输出部,对上述标签装置h输出具有上述第二加密文本和该共同密钥kj的上述密钥ID信息kidj的新的隐匿ID信息sidh’。The present invention also provides an update device for updating the concealed ID information of the tag device h, which is characterized in that it is arranged outside the tag device h, and has: a key memory, correspondingly storing each key ID information kid j and a common key Each common key k j of the encryption method, wherein, j∈{1,...,n}, n is the total number of keys; the first input part accepts the input of hidden ID information sid h , and the hidden ID information sid h has the first encrypted text and the key ID information kid j of the common key k j used for this encryption, and the first encrypted text corresponds to the common key encryption method of the tag ID information id h ; the second read-write part , connected to the above-mentioned key memory, extract the above-mentioned common key k j corresponding to the above-mentioned key ID information kid j possessed by the above-mentioned concealed ID information sid h from the key memory; the ID extracting part uses the above-mentioned second read-write The above-mentioned common key k j extracted by the above-mentioned part decodes the above-mentioned first encrypted text, and extracts the tag ID information id h ; the encryption part uses the above-mentioned tag ID information id h extracted by the above-mentioned ID extraction part, and the above-mentioned common The key k j generates a second encrypted text whose correlation with the first encrypted text is difficult to grasp; and a second output unit outputs the above-mentioned encrypted text having the second encrypted text and the common key k j to the label device h. New concealed ID information sid h ' of the key ID information kid j .

本发明还提供一种更新装置,更新标签装置h的隐匿ID信息,其特征在于,设置在上述标签装置h的外部,具有:密钥存储器,对应存储各密钥ID信息kidj和密钥对(skj,pkj),其中,j∈{1,...,n},n是密钥的总数,skj是密钥,pkj是公开密钥;第一输入部,接受隐匿ID信息sidh的输入,该隐匿ID信息sidh具有第一加密文本和该加密所使用的公开密钥pkj的密钥ID信息kidj,所述第一加密文本对应于标签ID信息idh的公开密钥加密方式;第二读写部,连接到上述密钥存储器,从上述密钥存储器中提取被输入到上述第一输入部的上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述密钥对(skj,pkj);ID提取部,使用上述第二读写部提取的上述密钥skj将上述第一加密文本解码,并提取上述标签ID信息idh;加密部,使用上述ID提取部提取的上述标签ID信息idh,和上述第二读写部提取的上述公开密钥pkj,生成难以掌握与上述第一加密文本的关联性的第二加密文本;以及第二输出部,对上述标签装置h输出具有上述第二加密文本和与上述密钥对(skj,pkj)对应的上述密钥ID信息kidj的新的隐匿ID信息sidh’。The present invention also provides an update device for updating the concealed ID information of the tag device h, which is characterized in that it is arranged outside the tag device h, and has: a key memory, correspondingly storing each key ID information kid j and a key pair (sk j , pk j ), wherein, j∈{1,...,n}, n is the total number of keys, sk j is the key, and pk j is the public key; the first input part accepts the hidden ID input of information sid h , the hidden ID information sid h has the first encrypted text corresponding to the key ID information kid j of the public key pk j used for the encryption, the first encrypted text corresponds to the tag ID information id h public key encryption method; the second read/write unit is connected to the key memory, and extracts the key ID information kid j included in the hidden ID information sid h input to the first input unit from the key memory The corresponding above-mentioned key pair (sk j , pk j ); the ID extraction part uses the above-mentioned key sk j extracted by the above-mentioned second reading and writing part to decode the above-mentioned first encrypted text, and extract the above-mentioned tag ID information id h ; The encryption unit uses the tag ID information id h extracted by the ID extraction unit and the public key pk j extracted by the second reading/writing unit to generate a second encrypted text whose relationship with the first encrypted text is difficult to grasp. and a second output unit that outputs new hidden ID information sid h ' with the second encrypted text and the key ID information kid j corresponding to the key pair (sk j , pk j ) to the tag device h .

本发明还提供一种更新装置,更新标签装置h的隐匿ID信息,其特征在于,设置在上述标签装置h的外部,具有:密钥存储器,对应存储各密钥ID信息kidj和各公开密钥pkj,其中,j∈{1,...,n},n是密钥的总数;第一输入部,接受隐匿ID信息sidh的输入,该隐匿ID信息sidh具有第一加密文本和该公开密钥pkj的密钥ID信息kidj,所述第一加密文本对应于标签ID信息idh的可再加密的公开密钥加密方式;第二读写部,连接到上述密钥存储器,从上述密钥存储器中提取被输入到上述第一输入部的上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述公开密钥pkj;加密部,使用上述第二读写部提取的上述公开密钥pkj,将上述隐匿ID信息sidh具备的上述第一加密文本再加密,生成难以掌握与该第一加密文本的关联性的第二加密文本;以及第二输出部,对上述标签装置h输出具有上述第二加密文本和该公开密钥pkj的上述密钥ID信息kidj的新的隐匿ID信息sidh’。The present invention also provides an update device for updating the concealed ID information of the tag device h, which is characterized in that it is arranged outside the tag device h, and has: a key memory, correspondingly storing each key ID information kid j and each public key key pk j , wherein, j∈{1,...,n}, n is the total number of keys; the first input part accepts the input of concealed ID information sid h , and the concealed ID information sid h has the first encrypted text and the key ID information kid j of the public key pk j , the first encrypted text corresponds to the re-encryptable public key encryption method of the tag ID information id h ; the second read-write part is connected to the above-mentioned key memory for extracting the public key pk j corresponding to the key ID information kid j included in the hidden ID information sid h input to the first input unit from the key memory; the encryption unit uses the second The above-mentioned public key pk j extracted by the reading and writing unit re-encrypts the above-mentioned first encrypted text included in the above-mentioned hidden ID information sid h to generate a second encrypted text whose relationship with the first encrypted text is difficult to grasp; and the second The output unit outputs new privileged ID information sid h ' having the second encrypted text and the key ID information kid j of the public key pk j to the tag device h.

本发明还提供一种更新委托装置,对更新装置委托标签装置的隐匿ID信息的更新,设在标签装置的外部,具有:隐匿ID输入部,输入多个种类对应于同一标签ID信息idh的可再加密的加密文本的隐匿ID;隐匿ID存储器,存储输入的多个种类的上述隐匿ID;隐匿ID提取部,连接到上述隐匿ID存储器,在规定的时机从该隐匿ID存储器中提取一个隐匿ID;以及隐匿ID输出部,对上述标签装置输出提取的上述隐匿ID。The present invention also provides an update entrusting device, which entrusts the updating device with updating of the hidden ID information of the tag device, which is provided outside the tag device, and has: a hidden ID input unit for inputting a plurality of types corresponding to the same tag ID information id h A secret ID of encrypted text that can be re-encrypted; a secret ID memory that stores a plurality of input types of the above-mentioned secret ID; a secret ID extracting unit that is connected to the above-mentioned secret ID memory, and extracts a secret ID from the secret ID memory at a predetermined timing. ID; and a privileged ID output unit that outputs the extracted privileged ID to the tag device.

本发明还提供一种标签装置,用于标签自动识别系统,具有:隐匿ID输入部,输入多个种类对应于同一标签ID信息idh的可再加密的加密文本的隐匿ID;隐匿ID存储器,存储输入的多个种类的上述隐匿ID;隐匿ID提取部,连接到上述隐匿ID存储器,在规定的时机从该隐匿ID存储器中提取一个隐匿ID;以及隐匿ID输出部,输出提取的上述隐匿ID。The present invention also provides a tag device, which is used in an automatic tag identification system, comprising: a hidden ID input unit for inputting a plurality of hidden IDs corresponding to re-encryptable encrypted text of the same tag ID information id h ; a hidden ID memory, A plurality of types of the above-mentioned privileged IDs input are stored; a privileged ID extracting unit is connected to the above-mentioned privileged ID memory, and extracts one privileged ID from the privileged ID memory at a predetermined timing; and a privileged ID output portion outputs the extracted privileged ID. .

本发明还提供一种标签隐私保护方法,防止根据从标签装置输出的信息取得用户的隐私信息,密钥存储器中将密钥ID和密钥对应存储;上述标签装置具有隐匿ID存储器,所述隐匿ID存储器具有存储密钥ID的只读区域,和存储第一隐匿ID的可改写区域,上述标签装置在读写部中从上述隐匿ID存储器中提取上述密钥ID和上述第一隐匿ID,在第一输出部中对更新装置输出提取的上述密钥ID和上述第一隐匿ID,上述更新装置在第一输入部中接受上述密钥ID和上述第一隐匿ID的输入,在第一密钥提取部中,从上述密钥存储器中提取对应于被输入到第一输入部的上述密钥ID的密钥,在隐匿ID更新部中,使用上述第一密钥提取部提取的上述密钥,和被输入到上述第一输入部的上述第一隐匿ID,生成难以掌握与上述第一隐匿ID的关联性的第二隐匿ID,在第二输出部中,输出上述第二隐匿ID,上述标签装置在第二输入部中接受上述第二隐匿ID的输入,在上述读写部中将上述第二隐匿ID存储在上述隐匿ID存储器的上述可改写区域中。The present invention also provides a label privacy protection method, which prevents the user's private information from being obtained based on the information output from the label device, and stores the key ID and the key in the key storage; the above-mentioned label device has a hidden ID storage, and the hidden ID The ID memory has a read-only area for storing the key ID and a rewritable area for storing the first concealed ID, and the above-mentioned tag device extracts the above-mentioned key ID and the above-mentioned first concealed ID from the above-mentioned concealed ID memory in the read-write part, and The first output unit outputs the extracted key ID and the first secret ID to the update device, and the update device accepts the key ID and the first secret ID at the first input unit, In the extraction unit, a key corresponding to the key ID input to the first input unit is extracted from the key memory, and in the concealed ID update unit, the key extracted by the first key extraction unit is used, and the first hidden ID input to the first input unit to generate a second hidden ID whose relationship with the first hidden ID is difficult to grasp, and the second output unit outputs the second hidden ID, and the label The device accepts input of the second privileged ID in the second input unit, and stores the second privileged ID in the rewritable area of the privileged ID memory in the read/write portion.

本发明还提供一种标签装置,用于标签自动识别系统,具有:隐匿ID存储器,具有存储密钥ID的只读区域和存储第一隐匿ID的可改写区域;读写部,从上述隐匿ID存储器中提取上述密钥ID和上述第一隐匿ID;第一输出部,输出提取的上述密钥ID和上述第一隐匿ID;以及第二输入部,接受难以掌握与上述第一隐匿ID的关联性的第二隐匿ID的输入,上述读写部将输入的上述第二隐匿ID存储在上述隐匿ID存储器的上述可改写区域中。The present invention also provides a label device, which is used in an automatic label identification system, which has: a hidden ID memory, a read-only area for storing the key ID and a rewritable area for storing the first hidden ID; The key ID and the first secret ID are extracted from a memory; the first output unit outputs the extracted key ID and the first secret ID; and the second input unit accepts that it is difficult to grasp the relationship with the first secret ID. input of a second confidential ID, and the read/write unit stores the input second confidential ID in the rewritable area of the confidential ID memory.

如上所述,在本发明中,由于第三者无法得知标签装置和通信历史的对应,所以可以防止第三者对标签装置的流通过程的追踪。As described above, in the present invention, since the third party cannot know the correspondence between the tag device and the communication history, it is possible to prevent the third party from tracking the distribution process of the tag device.

附图说明 Description of drawings

图1A是例示第一实施方式的标签自动识别系统的整体的方框图,图1B是例示标签装置的概略结构的方框图,图1C是例示后端装置的概略结构的方框图。1A is a block diagram illustrating an overall automatic label recognition system according to the first embodiment, FIG. 1B is a block diagram illustrating a schematic configuration of a label device, and FIG. 1C is a block diagram illustrating a schematic configuration of a backend device.

图2是例示实施例1的标签自动识别系统的整体结构的图。FIG. 2 is a diagram illustrating an overall configuration of an automatic tag identification system according to Embodiment 1. FIG.

图3是用于说明实施例1的处理的流程图。FIG. 3 is a flowchart for explaining the processing of the first embodiment.

图4是例示实施例2的标签自动识别系统的整体结构的图。FIG. 4 is a diagram illustrating an overall configuration of an automatic tag identification system according to Embodiment 2. FIG.

图5是例示实施例3的标签自动识别系统的整体结构的图。FIG. 5 is a diagram illustrating an overall configuration of an automatic tag identification system according to Embodiment 3. FIG.

图6是用于说明实施例3的后端装置的处理的流程图。FIG. 6 is a flowchart for explaining the processing of the backend device according to the third embodiment.

图7是例示实施例4的标签自动识别系统的整体结构的图。FIG. 7 is a diagram illustrating an overall configuration of an automatic tag identification system according to Embodiment 4. FIG.

图8是用于说明实施例4的后端装置的处理的流程图。FIG. 8 is a flowchart for explaining the processing of the backend device according to the fourth embodiment.

图9是例示实施例5的标签自动识别系统的整体结构的图。FIG. 9 is a diagram illustrating an overall configuration of an automatic tag identification system according to Embodiment 5. FIG.

图10A是用于说明实施例5的标签装置的处理的流程图,图10B是用于说明本实施例的后端装置的处理的流程图。FIG. 10A is a flowchart for explaining the processing of the label device of the fifth embodiment, and FIG. 10B is a flowchart for explaining the processing of the back-end device of the present embodiment.

图11是例示实施例6的标记自动识别系统的整体结构的图。FIG. 11 is a diagram illustrating an overall configuration of an automatic mark recognition system according to Embodiment 6. FIG.

图12是用于说明实施例6的处理的流程图。FIG. 12 is a flowchart for explaining the processing of the sixth embodiment.

图13是例示实施例7的标签自动识别系统的整体结构的图。FIG. 13 is a diagram illustrating an overall configuration of an automatic tag identification system according to Embodiment 7. FIG.

图14是用于说明实施例7的处理的流程图。FIG. 14 is a flowchart for explaining the processing of the seventh embodiment.

图15是例示实施例8的标签自动识别系统的整体结构的图。FIG. 15 is a diagram illustrating an overall configuration of an automatic tag identification system according to Embodiment 8. FIG.

图16A是存储在标签装置的秘密值存储器中的数据的例示,图16B是存储在后端装置的数据库存储器中的数据的例示。FIG. 16A is an illustration of data stored in a secret value memory of a tag device, and FIG. 16B is an illustration of data stored in a database memory of a backend device.

图17是用于说明实施例8的处理的流程图。FIG. 17 is a flowchart for explaining the processing of the eighth embodiment.

图18是用于说明实施例8的处理的流程图。FIG. 18 is a flowchart for explaining the processing of the eighth embodiment.

图19是用于例示实施例9的标签自动识别系统的整体结构的图。FIG. 19 is a diagram illustrating an overall configuration of an automatic tag identification system according to Embodiment 9. FIG.

图20A是存储在标签装置的秘密值存储器中的数据的例示,图20B是存储在后端装置的数据库存储器中的数据的例示。FIG. 20A is an illustration of data stored in a secret value memory of a tag device, and FIG. 20B is an illustration of data stored in a database memory of a backend device.

图21是例示实施例10的标签自动识别系统的整体结构的图。FIG. 21 is a diagram illustrating an overall configuration of an automatic tag identification system of Embodiment 10. FIG.

图22是用于说明实施例10的标签装置的处理的流程图。Fig. 22 is a flowchart for explaining the processing of the label device of the tenth embodiment.

图23是用于说明实施例10的后端装置的处理的流程图。FIG. 23 is a flowchart for explaining the processing of the backend device in the tenth embodiment.

图24是例示实施例11的标签自动识别系统的整体结构的图FIG. 24 is a diagram illustrating the overall structure of the automatic label identification system of Embodiment 11

图25是用于说明实施例11的标签装置的处理的流程图。Fig. 25 is a flowchart for explaining the processing of the labeling device according to the eleventh embodiment.

图26是用于说明实施例11的后端装置的处理的一部分的流程图。FIG. 26 is a flowchart for explaining part of the processing of the backend device in the eleventh embodiment.

图27是用于说明实施例12的标签装置的处理的流程图。Fig. 27 is a flowchart for explaining the processing of the label device according to the twelfth embodiment.

图28是例示第二实施方式的概略结构的方框图。FIG. 28 is a block diagram illustrating a schematic configuration of the second embodiment.

图29是例示实施例14的更新系统的整体结构的概念图。FIG. 29 is a conceptual diagram illustrating an overall configuration of an update system of Embodiment 14. FIG.

图30是例示实施例14的更新系统的功能结构的方框图。FIG. 30 is a block diagram illustrating a functional configuration of an update system of Embodiment 14. FIG.

图31是用于说明实施例14的处理顺序的流程图。Fig. 31 is a flowchart for explaining the processing procedure of the fourteenth embodiment.

图32是例示本实施例15的更新系统的功能结构的方框图。FIG. 32 is a block diagram illustrating the functional configuration of the updating system of the fifteenth embodiment.

图33是用于说明本实施例15的处理顺序的流程图。Fig. 33 is a flowchart for explaining the processing procedure of the fifteenth embodiment.

图34是例示实施例16的更新系统的功能结构的方框图。FIG. 34 is a block diagram illustrating a functional structure of an update system of Embodiment 16. FIG.

图35是用于说明本实施例16的处理顺序的流程图。Fig. 35 is a flowchart for explaining the processing procedure of the sixteenth embodiment.

图36是例示实施例17的更新系统的功能结构的方框图。FIG. 36 is a block diagram illustrating a functional configuration of an update system of Embodiment 17. FIG.

图37是用于说明本实施例17的处理顺序的流程图。Fig. 37 is a flowchart for explaining the processing procedure of the seventeenth embodiment.

图38是例示实施例18的更新系统的整体结构的概念图。FIG. 38 is a conceptual diagram illustrating an overall configuration of an update system of Embodiment 18. FIG.

图39是例示实施例18的更新系统的功能结构的方框图。FIG. 39 is a block diagram illustrating a functional structure of an update system of Embodiment 18. FIG.

图40是用于说明本实施例18的处理顺序的流程图。Fig. 40 is a flowchart for explaining the processing procedure of the eighteenth embodiment.

图41是例示实施例19的更新系统的功能结构的方框图。FIG. 41 is a block diagram illustrating a functional configuration of an update system of Embodiment 19.

图42是用于说明本实施例19的处理顺序的流程图。Fig. 42 is a flowchart for explaining the processing procedure of the nineteenth embodiment.

图43是例示实施例20的更新系统的功能结构的方框图。FIG. 43 is a block diagram illustrating a functional configuration of an update system of Embodiment 20. FIG.

图44是用于说明本实施例20的处理顺序的流程图。FIG. 44 is a flowchart for explaining the processing procedure of the twentieth embodiment.

图45是例示实施例21的更新系统的功能结构的方框图。FIG. 45 is a block diagram illustrating a functional configuration of an update system of Embodiment 21.

图46是例示实施例22的更新系统的功能结构的方框图。FIG. 46 is a block diagram illustrating a functional configuration of an update system of Embodiment 22. FIG.

图47是例示实施例23的更新系统的整体结构的概念图。FIG. 47 is a conceptual diagram illustrating an overall configuration of an update system of Embodiment 23.

图48是例示实施例23的更新系统的功能结构的方框图。FIG. 48 is a block diagram illustrating a functional configuration of an update system of Embodiment 23.

图49是用于说明本实施例23的处理顺序的流程图。Fig. 49 is a flowchart for explaining the processing procedure of the twenty-third embodiment.

图50是用于说明本实施例23的处理顺序的流程图。FIG. 50 is a flowchart for explaining the processing procedure of the twenty-third embodiment.

图51是例示实施例24的安全服务器装置的功能结构的图。FIG. 51 is a diagram illustrating a functional configuration of a security server device according to the twenty-fourth embodiment.

图52是例示实施例24的格式的图。Fig. 52 is a diagram illustrating the format of Embodiment 24.

图53是用于说明实施例24的安全服务器装置的处理顺序所流程图。Fig. 53 is a flowchart for explaining the processing procedure of the security server device in the twenty-fourth embodiment.

图54是例示实施例25的更新系统的功能结构的方框图。FIG. 54 is a block diagram illustrating a functional configuration of an update system of Embodiment 25. FIG.

图55是例示实施例25的更新系统的功能结构的方框图。FIG. 55 is a block diagram illustrating a functional structure of an update system of Embodiment 25. FIG.

图56是用于说明本实施例25的处理顺序的流程图。Fig. 56 is a flowchart for explaining the processing procedure of the twenty-fifth embodiment.

图57是用于说明本实施例25的处理顺序的流程图。Fig. 57 is a flowchart for explaining the processing procedure of the twenty-fifth embodiment.

图58是例示实施例26中的标签装置的功能结构的图。FIG. 58 is a diagram illustrating a functional configuration of a tag device in Embodiment 26. FIG.

符号说明Symbol Description

1  标签自动识别系统1 Label automatic identification system

10  标签装置10 label device

11  秘密值存储器11 Secret value memory

12  第一运算部12 First Computing Department

13  第二运算部13 Second Computing Department

14  输出部14 output section

20  读取装置20 reading device

30  后端装置30 backend device

31  数据库存储器31 Database storage

32  输入部32 input part

33  运算部33 Computing Department

34  比较部34 Comparative Department

35  读出部35 Reading Department

40  网络40 network

1500  更新系统1500 Update system

1510  标签装置1510 Label device

1511  秘密值存储器1511 secret value memory

1512  读写部1512 Literacy Department

1513  输出部1513 output unit

1514  输入部1514 input unit

1560  安全服务器装置1560 Security Server Device

1561  输入部1561 input unit

1562  更新部1562 Update Department

15631563

具体实施方式 Detailed ways

以下,参照附图说明本发明的实施方式。Hereinafter, embodiments of the present invention will be described with reference to the drawings.

[第一实施方式][first embodiment]

<结构><structure>

图1A是例示第一实施方式中的标签自动识别系统1的整体的方框图。而且,图1B是例示标签装置10的概略结构的方框图,图1C是例示后端装置30的概略结构的方框图。FIG. 1A is a block diagram illustrating the whole of an automatic label identification system 1 in the first embodiment. 1B is a block diagram illustrating a schematic configuration of the tag device 10 , and FIG. 1C is a block diagram illustrating a schematic configuration of the backend device 30 .

如图1A所例示的,本方式的标签自动识别系统1包括:标签装置10、读取装置20、通过网络40连接到该读取装置20的后端装置30。As shown in FIG. 1A , the automatic label identification system 1 of this mode includes: a label device 10 , a reading device 20 , and a back-end device 30 connected to the reading device 20 through a network 40 .

而且,如图1B所示,本方式的标签装置10包括:秘密值存储器11,存储各个标签ID信息所对应的秘密值;第一运算部12,使用难以求逆像的第一函数F1;第二运算部13,使用搅乱定义域的元和其映射的关系的第二函数F2;以及输出部14,对后端装置30输出秘密值存储器11的秘密值所对应的标签输出信息。Moreover, as shown in FIG. 1B , the tag device 10 of this mode includes: a secret value memory 11, which stores secret values corresponding to each tag ID information; a first computing unit 12, which uses a first function F1 which is difficult to obtain an inverse image; The second calculation unit 13 uses the second function F2 that disturbs the relationship between the elements of the domain and its mapping; and the output unit 14 outputs the label output information corresponding to the secret value of the secret value memory 11 to the back-end device 30 .

而且,如图1C所例示的,本方式的后端装置30包括:数据库存储器31,将各标签ID信息和与其对应的秘密值建立对应;输入部32,接受标签输出信息的输入;运算部33,使用上述第一函数F1和第二函数;比较部34,比较运算部33的运算结果和标签输出信息;以及读取部35,从数据库存储器31中提取信息。And, as shown in Figure 1C, the back-end device 30 of this mode includes: a database memory 31, which establishes a correspondence between each tag ID information and its corresponding secret value; an input unit 32, which accepts the input of tag output information; a computing unit 33 , use the above-mentioned first function F1 and second function; the comparison unit 34 compares the calculation result of the calculation unit 33 with the label output information; and the reading unit 35 extracts information from the database memory 31 .

<标签装置10的处理><Processing of Label Device 10>

标签装置10接到来自读取装置20的读取请求时,首先,标签装置10的第二运算部13从秘密值存储器11读取秘密值,生成对其使用第二函数F2的标签输出信息。该标签输出信息被发送到输出部14,在输出部14中对后端装置30输出(无线或者有线)。之后,在第一运算部12中,从秘密值存储器11读取秘密值的至少一部分的要素,并对其使用第一函数F1,该运算结果,将秘密值存储器11内的秘密值覆盖更新。另外,这里,在生成了标签输出信息之后,将秘密值存储器11内的秘密值覆盖更新,但在将秘密值存储器11内的秘密值覆盖更新之后生成标签输出信息也可以。When the tag device 10 receives a reading request from the reading device 20, first, the second calculation unit 13 of the tag device 10 reads the secret value from the secret value memory 11, and generates tag output information using the second function F2 thereon. This tag output information is sent to the output unit 14, and is output (wirelessly or wired) to the back-end device 30 in the output unit 14. After that, in the first computing unit 12, at least some elements of the secret value are read from the secret value memory 11, and the first function F1 is applied thereto, and the secret value in the secret value memory 11 is overwritten and updated as a result of the computation. Here, the secret value in the secret value memory 11 is overwritten and updated after the tag output information is generated, but the tag output information may be generated after the secret value in the secret value memory 11 is overwritten.

<读取装置20的处理><Processing by Reader 20>

读取装置20接受从标签装置10对后端装置30输出的标签输出信息的输入,并将其通过网络40发送给后端装置30。The reading device 20 receives input of tag output information output from the tag device 10 to the back-end device 30 , and transmits it to the back-end device 30 through the network 40 .

<后端装置30的处理><Processing by Backend Device 30 >

后端装置30的输入部32接收从读取装置20发送的标签输出信息的输入。以此为触发,运算部33在对数据库存储器31的秘密值的至少一部分要素使用了规定次数标签装置10所使用的第一函数F1之后,进一步使用该标签装置10所使用的第二函数。然后,在比较部34中,依次比较运算部33中的运算结果和标签输出信息,在它们一致的情况下,在读取部35中,从数据库存储器31提取对应于一致的运算结果的、与秘密值建立了对应的标签ID信息。The input unit 32 of the backend device 30 receives input of the tag output information transmitted from the reading device 20 . Using this as a trigger, the computing unit 33 further uses the second function used by the tag device 10 after using the first function F1 used by the tag device 10 a predetermined number of times for at least some elements of the secret value in the database memory 31 . Then, in the comparison unit 34, the calculation result in the calculation unit 33 is sequentially compared with the label output information, and if they match, the reading unit 35 extracts from the database memory 31 the result corresponding to the matching calculation result and the label output information. The secret value establishes the corresponding tag ID information.

[实施例1][Example 1]

图2是例示实施例1的标签自动识别系统100的整体结构的图,图3是用于说明实施例1的处理的流程图。FIG. 2 is a diagram illustrating the overall configuration of the automatic label recognition system 100 of the first embodiment, and FIG. 3 is a flowchart for explaining the processing of the first embodiment.

以下,使用这些图说明实施例1的功能结构以及处理方法。Hereinafter, the functional configuration and processing method of Embodiment 1 will be described using these figures.

<结构><structure>

如图2所例示的,实施例1的标签自动识别系统100具有:标签装置110、读取装置120、以及可通过网络140连接到读取装置120的后端装置130。另外,在图2中,为了简化说明,仅图示了一个标签装置110,但实际上存在大于等于此的数的标签装置110。而且,在图2中,各表示了一个读取装置120以及后端装置130,但也可以由大于等于此的数的读取装置120以及后端装置130构成本系统。As shown in FIG. 2 , the automatic label identification system 100 of Embodiment 1 has: a label device 110 , a reading device 120 , and a backend device 130 that can be connected to the reading device 120 through a network 140 . In addition, in FIG. 2 , only one label device 110 is illustrated for the sake of simplification of description, but actually there are more than this number of label devices 110 . In addition, in FIG. 2 , one reader 120 and one back-end device 130 are shown, but this system may be constituted by more than this number of readers 120 and back-end device 130 .

<标签装置><label device>

本例的标签装置110具有:秘密值存储器111、散列运算部112(相当于“第二运算部”)、散列运算部113(相当于“第一运算部”)、接口114(相当于“输出部”)、以及包括存储器115a的控制部115。The tag device 110 of this example has: a secret value storage 111, a hash calculation unit 112 (corresponding to a “second calculation unit”), a hash calculation unit 113 (corresponding to a “first calculation unit”), an interface 114 (corresponding to a “first calculation unit”), and an interface 114 (corresponding to a “first calculation unit”). "output section"), and the control section 115 including the memory 115a.

这里,秘密值存储器111、存储器115a例如是EEPROM(ElectronicallyErasable and Programmable Read Only Memory)、FeRAM(Ferroelectric RandomAccess Memory)、闪存、NV(Nonvolatile)RAM等可读写的存储器。Here, the secret value memory 111 and the memory 115a are, for example, readable and writable memories such as EEPROM (Electronically Erasable and Programmable Read Only Memory), FeRAM (Ferroelectric Random Access Memory), flash memory, and NV (Nonvolatile) RAM.

散列运算部112以及散列运算部113例如是对输入值分别使用单方向性函数的散列(hash)函数G,H:{0,1}*→{0,1}L,并输出其结果地构成的集成电路。另外,{0,1}*表示所有的二进制序列的集合,{0,1}L表示L位长的二进制序列的集合。而且,作为这样的散列函数G,H,可以例示SHA-1、MD5等。另外,该散列函数H相当于“难以求逆像的第一函数F1”,散列函数G相当于“搅乱定义域的元和其映射的关系的第二函数F2”。而且,控制部115例如是控制标签装置110整体的处理那样构成的集成电路。The hash calculation unit 112 and the hash calculation unit 113 are, for example, hash functions G, H: {0, 1} * →{0, 1} L that use a unidirectional function for input values, respectively, and output the The resulting integrated circuit is constructed. In addition, {0, 1} * represents the set of all binary sequences, and {0, 1} L represents the set of L-bit long binary sequences. Furthermore, as such hash functions G, H, SHA-1, MD5, etc. can be illustrated. In addition, this hash function H corresponds to "the first function F1 which is difficult to find an inverse image", and the hash function G corresponds to "the second function F2 which disturbs the relationship between the elements of the domain and their mapping". Furthermore, the control unit 115 is, for example, an integrated circuit configured to control the overall processing of the tag device 110 .

接口114例如是通过无线或有线向读取装置120输出数据的硬件。具体来说,接口114例如具有:编码·解码电路,通过NRZ码或曼彻斯特编码或米勒码或单极RZ编码等进行编码·解码;调制·解调电路,通过ASK(Amplitude Shift Keying)或PSK(Phase Shift Keying)或FSK(Frequency ShiftKeying)等进行调制·解调;以及偶极天线或微带天线或环形天线或带芯线圈等天线,使用长波带或ISM带(Industry Science Medical band)的频率进行信号的发送接收。另外,通信方式例如利用电磁感应方式或电波方式。The interface 114 is, for example, hardware that outputs data to the reading device 120 via wireless or wired. Specifically, the interface 114 includes, for example: an encoding/decoding circuit for encoding/decoding by NRZ code, Manchester encoding, Miller code, or unipolar RZ encoding, etc.; a modulation/demodulation circuit for performing encoding/decoding by ASK (Amplitude Shift Keying) or PSK (Phase Shift Keying) or FSK (Frequency Shift Keying) for modulation and demodulation; and antennas such as dipole antennas, microstrip antennas, loop antennas, or cored coils, using frequencies in the long wave band or ISM band (Industry Science Medical band) Send and receive signals. In addition, the communication method utilizes, for example, an electromagnetic induction method or a radio wave method.

而且,散列运算部112以及散列运算部113与秘密值存储器111电连接,散列运算部112与接口114(相当于“输出部”)电连接。而且,虽在该图中省略了,但控制部115与标签装置110的各部电连接。Furthermore, the hash calculation unit 112 and the hash calculation unit 113 are electrically connected to the confidential value memory 111, and the hash calculation unit 112 is electrically connected to the interface 114 (corresponding to an "output unit"). Moreover, although omitted in this figure, the control unit 115 is electrically connected to each unit of the label device 110 .

<读取装置><reading device>

本例的读取装置120具有:物流信息存储器121、接口122、通信部123、存储器124a以及控制部124。The reader 120 of this example has a physical distribution information memory 121 , an interface 122 , a communication unit 123 , a memory 124 a , and a control unit 124 .

物流信息存储器121例如是硬盘装置、软盘等磁记录装置,DVD-RAM(Random Access Memory)、CD-R(Recordable)/RW(ReWritable)等光盘装置、MO(Magneto-Optical disc)等光磁记录装置、EEP-ROM(ElectronicallyErasable and Programmable-Read Only Memory)、闪存(flash memory)等半导体存储器等。接口122例如是与接口114同样的硬件。通信部123例如是LAN卡、调制解调器、终端适配器等,控制部124例如是具有存储器124a的CISC(Complex Instruction Set Computer)方式、RISC(Reduced InstructionSet Computer)方式等的CPU(Central Processing Unit)。The logistics information memory 121 is, for example, a magnetic recording device such as a hard disk device and a floppy disk, an optical disk device such as DVD-RAM (Random Access Memory), CD-R (Recordable)/RW (ReWritable), or an opto-magnetic recording device such as MO (Magneto-Optical disc). Devices, EEP-ROM (Electronically Erasable and Programmable-Read Only Memory), semiconductor memory such as flash memory, etc. The interface 122 is, for example, the same hardware as the interface 114 . The communication unit 123 is, for example, a LAN card, a modem, a terminal adapter, etc., and the control unit 124 is, for example, a CPU (Central Processing Unit) of a CISC (Complex Instruction Set Computer) system or a RISC (Reduced Instruction Set Computer) system having a memory 124a.

而且,接口122以及物流信息存储器121与通信部123电连接,虽在该图中省略,但控制部124与读取装置120的各部电连接。Furthermore, the interface 122 and the physical distribution information memory 121 are electrically connected to the communication unit 123 , and although omitted in the figure, the control unit 124 is electrically connected to each unit of the reading device 120 .

<后端装置><backend device>

本例的后端装置130具有:数据库存储器131、通信部132(相当于“输入部”)、散列运算部133(相当于“第三运算部”)、比较部134、读写部135(相当于“读出部”)、存储器136a以及控制部136。具体来说,后端装置130通过使公知的诺伊曼型计算机执行规定的程序而构成,所述计算机通过总线连接例如CPU、RAM、ROM(Read Only Memory))、磁记录装置或光盘装置等外部存储装置、LAN卡或调制解调器或终端适配器等。而且,该CPU读取存储在RAM中的程序,并执行依照程序的处理,从而实现以下所示的各处理功能。The backend device 130 of this example has: a database memory 131, a communication unit 132 (equivalent to an “input unit”), a hash calculation unit 133 (corresponding to a “third calculation unit”), a comparison unit 134, and a read/write unit 135 ( Corresponds to "reading unit"), memory 136 a, and control unit 136 . Specifically, the backend device 130 is configured by causing a well-known Neumann computer to execute a predetermined program, and the computer is connected to, for example, a CPU, a RAM, a ROM (Read Only Memory), a magnetic recording device, an optical disk device, etc. through a bus. External storage device, LAN card or modem or terminal adapter, etc. Also, the CPU reads a program stored in the RAM, and executes processing according to the program, thereby realizing each processing function shown below.

<预处理><preprocessing>

首先,在后端装置130中安装规定的程序,以便后端装置130的散列运算部133可以使用与标签装置110相同的散列函数G,H。First, a predetermined program is installed in the backend device 130 so that the hash calculation unit 133 of the backend device 130 can use the same hash functions G, H as those of the tag device 110 .

将各标签ID信息idk(k∈{1,...,m},k对应于各标签装置,m是标签装置的总数)所对应的秘密值sk,1(相当于“第一秘密值”)在各个标签装置110的秘密值存储器111中各存储一个。另外,该秘密值sk,1例如是标签装置110外部的随机数生成装置(未图示)通过基于使用SHA-1等单方向性散列函数的计算量理论的虚拟随机数生成算法生成的虚拟随机数sk,1∈{0,1}L。另外,不同的标签装置中存储的随机数sk,1互相不一致。而且,后端装置130的数据库存储器131中将各标签装置n所对应的秘密值sn,1(相当于“第二秘密值”,n∈{1,...,m},n对应于k)和标签ID信息idn和物流信息等数据datan对应存储。Each tag ID information id k (k ∈ {1, ..., m}, k corresponds to each tag device, m is the total number of tag devices) corresponding to the secret value sk , 1 (equivalent to "the first secret value") is stored one in each secret value memory 111 of each tag device 110. In addition, this secret value sk,1 is generated, for example, by a random number generator (not shown) outside the tag device 110 using a pseudorandom number generation algorithm based on a calculation amount theory using a unidirectional hash function such as SHA-1. Pseudorandom number s k,1 ∈{0,1} L . In addition, the random numbers sk,1 stored in different tag devices are inconsistent with each other. Moreover, in the database memory 131 of the back-end device 130, the secret value s n,1 corresponding to each tag device n (equivalent to the "second secret value", n∈{1,...,m},n corresponds to k) is correspondingly stored with data n such as tag ID information id n and logistics information.

<标签装置的处理><Handling of Label Device>

以下,说明第i次(i是自然数)使读取装置120读取标签装置110时的处理。另外,标签装置110的处理在控制部115的控制下进行,该控制所需的数据被逐一对存储器115a读写。Hereinafter, the processing when the reading device 120 is made to read the tag device 110 for the ith time (i is a natural number) will be described. In addition, the processing of the tag apparatus 110 is performed under the control of the control part 115, and the data necessary for this control is read and written to the memory 115a one by one.

首先,在散列运算部112中,从秘密值存储器111中读取秘密值sk,i(相当于“第一秘密值”)(步骤S1),并生成作为其散列值的标签输出信息G(sk,i)(步骤S2)。该标签输出信息G(sk,i)被发送到接口114,并从接口114通过有线或无线发送到读取装置120(步骤S3)。First, in the hash calculation unit 112, the secret value sk,i (corresponding to the "first secret value") is read from the secret value memory 111 (step S1), and the label output information as its hash value is generated. G(s k, i ) (step S2). The tag output information G( sk, i ) is sent to the interface 114, and then sent from the interface 114 to the reading device 120 by wire or wirelessly (step S3).

接着,在散列运算部113中,运算从秘密值存储器111读出的秘密值sk,i的散列值sk,i+1=H(sk,i)(步骤S4),将该散列值sk,i+1作为新的秘密值sk,i+1(相当于“新的第一秘密值”)覆盖保存在秘密值存储器111上(删除秘密值存储器111的秘密值sk,i,取而代之,存储秘密值sk,i+1:步骤S5)。另外,H(*)表示对*使用散列函数H的处理。Next, in the hash calculation unit 113, the hash value sk, i+1 =H(s k,i ) of the secret value sk, i read from the secret value memory 111 is calculated (step S4), and the Hash value sk, i+1 is covered and saved on secret value memory 111 as new secret value sk, i+1 (equivalent to "new first secret value") (deletes the secret value s of secret value memory 111 k,i , instead the secret value sk,i+1 is stored: step S5). In addition, H(*) represents the process of using the hash function H for *.

<读取装置的处理><Handling of reading device>

读取装置120的处理在控制部124的控制下进行,该控制所需的数据被逐一对存储器124a读写。The processing of the reading device 120 is performed under the control of the control unit 124, and data required for this control is read and written to the memory 124a one by one.

首先,读取装置120在接口122中,接收从标签装置110发送的标签输出信息G(sk,i)(步骤S6)并发送到通信部123。通信部123从物流信息存储器121中提取物流信息pd(例如,设置了读取装置120的商店码等)(步骤S7),并将该物流信息pd和标签输出信息G(sk,i)通过网络140发送到后端装置130(步骤S8)。First, the reading device 120 receives the tag output information G(s k, i ) transmitted from the tag device 110 through the interface 122 (step S6 ), and sends it to the communication unit 123 . The communication unit 123 extracts the logistics information pd (for example, the store code of the reading device 120, etc.) from the logistics information memory 121 (step S7), and passes the logistics information pd and the label output information G( sk, i ) through The network 140 sends to the backend device 130 (step S8).

<后端装置的处理><Handling of back-end devices>

后端装置130的处理在控制部136的控制下进行,该控制所需的数据被逐一对存储器136a读写。The processing of the back-end device 130 is performed under the control of the control unit 136, and data necessary for this control is read and written to the memory 136a one by one.

首先,后端装置130在通信部132中,接收从读取装置120发送的物流信息pd和标签输出信息G(sk,i)(接受输入:步骤S9)。另外,接收的物流信息pd和标签输出信息G(sk,i)被存储在存储器136a中。接着,控制部136将1代入n并将其存储在存储器136a中(步骤S10)。然后,控制部136参照存储器136a的n的值,使散列运算部133从数据库存储器131提取秘密值sk,i(步骤S11)。接着,控制部136将0代入j并将其存储在存储器136a中(步骤S12)。然后控制部136参照存储器136a的j的值,使散列运算部133计算散列值G(Hj(sn,1))(相当于“第三运算部中的运算结果”)(步骤S13)。另外,Hj(sn,1)表示对秘密值sn,1使用j次散列函数H。而且,H0(sn,1)表示sn,1First, the back-end device 130 receives the physical distribution information pd and the label output information G(s k,i ) transmitted from the reading device 120 in the communication unit 132 (accept input: step S9). In addition, the received distribution information pd and label output information G(s k,i ) are stored in the memory 136a. Next, the control unit 136 substitutes 1 for n and stores it in the memory 136a (step S10). Then, the control unit 136 refers to the value of n in the memory 136a, and causes the hash calculation unit 133 to extract the secret value sk,i from the database memory 131 (step S11). Next, the control unit 136 substitutes 0 for j and stores it in the memory 136a (step S12). Then, the control unit 136 refers to the value of j in the memory 136a, and causes the hash calculation unit 133 to calculate a hash value G(H j (s n, 1 )) (corresponding to "the calculation result in the third calculation unit") (step S13 ). Also, H j (s n,1 ) indicates that the hash function H is used j times for the secret value s n,1. Also, H 0 (s n,1 ) represents sn ,1 .

接着,在比较部134中,从散列运算部133取得G(Hj(sn,1)),从存储器136a取得标签输出信息G(sk,i),并比较它们(步骤S14)。Next, in the comparison unit 134, G(H j (s n, 1 )) is acquired from the hash calculation unit 133, and label output information G(s k, i ) is acquired from the memory 136a, and compared (step S14).

这里,在这些值不一致的情况下(步骤S15),控制部136将j+1代入存储器136a的j(步骤S16),并判断j是否超过了规定的最大值jmax(步骤S17)。这里,在j小于等于最大值jmax的情况下,控制部136再执行步骤S13以后的处理,在j超过最大值jmax的情况下,判断存储器136a的n是否为m(步骤S18)。这里,如果不是n=m,则控制部136在存储器136a的n中存储n+1(步骤S19),并再执行步骤S11以后的处理,如果n=m则结束处理。另外,该处理在控制部136的控制下,如果标签输出信息G(sk,i)-和散列值G(Hj(sn,1))不一致,则将n以及j的至少一个的值变化,相当于再进行散列运算部133以及比较部134中的处理。Here, when these values do not match (step S15), the control unit 136 substitutes j+1 into j in the memory 136a (step S16), and determines whether j exceeds a predetermined maximum value j max (step S17). Here, when j is less than or equal to the maximum value j max , the control unit 136 executes the processing after step S13, and if j exceeds the maximum value j max , it determines whether n in the memory 136a is m (step S18). Here, if not n=m, the control unit 136 stores n+1 in n of the memory 136a (step S19), executes the processing after step S11 again, and ends the processing if n=m. In addition, in this process, under the control of the control unit 136, if the tag output information G( sk, i )- and the hash value G(H j (s n, 1 )) do not match, at least one of n and j The change in the value corresponds to performing the processing in the hash operation unit 133 and the comparison unit 134 again.

另一方面,在标签输出信息G(sk,i)和散列值G(Hj(sn,1))一致的情况下(步骤S15),控制部136将一致的散列值G(Hj(sn,1))所对应的秘密值sn,1发送到读写部135,读写部135从数据库存储器131中提取对应于一致的散列值G(Hj(sn,1))的、与秘密值sn,1对应的标签ID信息idn和物流信息等数据datan,并将其发送到通信部132(步骤S20)。而且,读写部135从存储器136a接受物流信息pd,并将该物流信息pd与该秘密值sn,1对应,写入数据库存储器131(步骤S20)。On the other hand, when the tag output information G( sk, i ) matches the hash value G(H j (s n, 1 )) (step S15), the control unit 136 assigns the matched hash value G( The secret value sn, 1 corresponding to H j (s n, 1 )) is sent to the read-write unit 135, and the read-write unit 135 extracts the corresponding hash value G from the database memory 131 (H j (s n, 1 )) data n such as tag ID information id n corresponding to the secret value s n, 1 and logistics information, and send it to the communication unit 132 (step S20). Then, the read/write unit 135 receives the physical distribution information pd from the memory 136a, associates the physical distribution information pd with the secret value sn,1 , and writes it into the database memory 131 (step S20).

发送到通信部132的标签ID信息idn和数据datan通过网络140被发送到读取装置120(步骤S21),由读取装置120的通信部123接收并输出(步骤S22)。The tag ID information id n and data data n sent to the communication unit 132 are sent to the reader 120 via the network 140 (step S21), and are received and output by the communication unit 123 of the reader 120 (step S22).

<实施例1的特征><Features of Embodiment 1>

[不可追踪性][Untraceability]

本方式的实施例1中,在通信中使用散列值G(sk,i)作为标签输出信息。根据散列值的不可识别性,对于不知道秘密值的攻击者来说,该散列值G(sk,i)被看作单纯的随机数。因此,该攻击者无法得知G(sk,i)和G(sk,i+1)是否是从相同的标签装置110输出的值,也无法追踪标签装置110的流通过程。In Example 1 of this mode, the hash value G( sk, i ) is used as tag output information in communication. Due to the unrecognizability of the hash value, the hash value G(s k, i ) is regarded as a purely random number for an attacker who does not know the secret value. Therefore, the attacker cannot know whether G(s k, i ) and G(s k, i+1 ) are output values from the same tag device 110 , and cannot trace the distribution process of the tag device 110 .

[前向安全][Forward Safe]

在本方式的实施例1中,通过散列函数H更新通信使用的秘密值存储器111内的秘密值。而且,由于散列函数的单方向性,即使标签装置110被干预等秘密值sk,i泄漏,攻击者也不能根据该秘密值sk,i来求过去的秘密值sk,i-Δi。从而,即使秘密值sk,i泄漏,攻击者也无法得到取得的秘密值sk,i和通信历史的对应,并无法追踪标签装置110。In Embodiment 1 of this form, the secret value in the secret value memory 111 used for communication is updated by the hash function H. Moreover, due to the unidirectionality of the hash function, even if the secret value sk,i is leaked by the tag device 110 such as being interfered with, the attacker cannot obtain the past secret value sk, i-Δi based on the secret value sk,i . Therefore, even if the secret value sk,i is leaked, the attacker cannot obtain the correspondence between the obtained secret value sk,i and the communication history, and cannot trace the tag device 110 .

[追踪可能性][Tracking Possibility]

另一方面,根据散列函数G,H的冲突困难性(不同值的散列值难以取相同值的性质),知道秘密值sn,1的后端装置130可以追踪标签装置110的流通过程。On the other hand, according to the hash function G, the collision difficulty of H (the hash value of different values is difficult to take the same value), the back-end device 130 that knows the secret value sn, 1 can track the circulation process of the tag device 110 .

[效率性][efficiency]

由于仅通过散列函数的运算构成通信数据,所以与现有的发生随机数的方法相比,标签装置110中的电路规模减小,适于要求低价格的用途。Since the communication data is constituted only by the operation of the hash function, the scale of the circuit in the tag device 110 is reduced compared with the conventional method of generating random numbers, and is suitable for applications requiring low cost.

另外,后端装置130中的在步骤S13的过程中计算出的散列值Hj(sn,1)存储在存储器136a中,并在下一个循环的步骤S13中利用也可以。即,使用记录的Hj(sn,1)通过H(Hj(sn,1))求散列值Hj+1(sn,1),进而将该值存储在存储器136a中也可以。在该情况下,可以降低散列运算部133的散列运算次数,并可以提高后端装置130的运算效率。In addition, the hash value H j (s n, 1 ) calculated in the process of step S13 in the backend device 130 may be stored in the memory 136a and used in step S13 of the next cycle. That is, using the recorded H j (s n, 1 ) to calculate the hash value H j+1 (s n, 1 ) through H(H j (s n, 1 )), and then storing the value in the memory 136a Can. In this case, the number of hash calculations performed by the hash calculation unit 133 can be reduced, and the calculation efficiency of the backend device 130 can be improved.

[实施例2][Example 2]

实施例2是实施例1的变形例,标签装置进一步保持标签ID信息idk(相当于“第一固有值Wk”),通过sk,i+1=H(sk,i|idk)来更新秘密值sk,i,仅这一点与实施例1不同。以下,仅说明与实施例1的不同点。Embodiment 2 is a modified example of Embodiment 1. The tag device further maintains tag ID information id k (equivalent to "the first intrinsic value W k "), by s k,i+1 =H(s k,i |id k ) to update the secret value s k,i , which is different from Embodiment 1 only in this point. Hereinafter, only the points of difference from Embodiment 1 will be described.

图4是例示实施例2中的标签自动识别系统200的整体结构的图。另外,在该图中,与实施例1共同的部分赋予与实施例1共同的符号。以下,在该图中,说明实施例2的功能结构以及处理方法。FIG. 4 is a diagram illustrating an overall configuration of an automatic tag identification system 200 in Embodiment 2. As shown in FIG. In addition, in this figure, the part common to Example 1 is given the code|symbol common to Example 1. Hereinafter, in this figure, the functional configuration and processing method of the second embodiment will be described.

<预处理><preprocessing>

在标签装置210的秘密值存储器211中存储该标签ID信息idk和与其对应的秘密值sk,i,仅这一点与实施例1不同。而且,在后端装置130的数据库存储器131中,将各标签装置n所对应的秘密值sn,1和标签ID信息idn和物流信息等数据datan对应存储,但该标签ID信息idn相当于“第二固有值Wn”。The only difference from the first embodiment is that the tag ID information id k and the corresponding secret value sk,i are stored in the secret value memory 211 of the tag device 210 . Moreover, in the database memory 131 of the back-end device 130, the secret value s n, 1 corresponding to each tag device n is correspondingly stored with data n such as tag ID information id n and logistics information, but the tag ID information id n This corresponds to the "second eigenvalue W n ".

<标签装置的处理><Handling of Label Device>

仅步骤S4的处理与实施例1不同。即,代替实施例1的步骤S4的处理,在散列运算部213(相当于“第一运算部”)中,从秘密值存储器211中提取秘密值sk,i和标签ID信息idk,运算sk,i+1=H(sk,i|idk)。α|β表示α和β的位结合。而且,将该运算结果作为新的秘密值sk,i+1在秘密值存储器211中覆盖。Only the processing of step S4 is different from that of the first embodiment. That is, instead of the processing of step S4 in the first embodiment, in the hash calculation unit 213 (corresponding to the “first calculation unit”), the secret value sk ,i and the tag ID information id k are extracted from the secret value memory 211, Operation s k,i+1 =H(s k,i |id k ). α|β indicates the bit combination of α and β. Then, this calculation result is overwritten in the secret value memory 211 as a new secret value sk,i+1 .

<读取装置的处理><Handling of reading device>

与实施例1同样。Same as Example 1.

<后端装置的处理><Handling of back-end devices>

仅步骤S11、S13、S14的处理与实施例1不同。即,在实施例2中,代替步骤S11,在后端装置230的散列运算部233(相当于“第三运算部”)中,从数据库存储器131中提取秘密值sn,1以及与其对应的标签ID信息idnOnly the processing of steps S11, S13, and S14 is different from that of the first embodiment. That is, in Embodiment 2, instead of step S11, in the hash calculation unit 233 (equivalent to the “third calculation unit”) of the backend device 230, the secret value sn,1 is extracted from the database memory 131 and the corresponding The tag ID information id n .

接着,与实施例1同样,控制部136将0代入j,并将其存储在存储器136a中(步骤S12)。之后,代替步骤S13,散列运算部233计算散列值G(Ij(n))。其中,定义为Ij(n)=sn,1(j=0),Ij(n)=H(Ij-1(n)|idn)(j≥1)。即,散列运算部233根据秘密值sn,1以及与其对应的标签递归地求Ij(n),并计算其散列值G(Ij(n))。另外,该递归运算通过将运算过程中的各Ij’(n)(j’∈{1,...,j-1})临时存储在存储器136a中,并将其用于下一个Ij’+1(n)的计算来实现。而且,在计算散列值G(Ij(n))时求出的Ij(n)至少到下一个散列值G(Ij+1(n))计算出时保存在存储器136a中。由此,可以将临时求出的Ij(n)利用于求下一个散列值G(Ij+1(n))时的Ij+1(n)=H(Ij(n)|idn)的运算中,并可以实现运算的效率化。Next, similarly to the first embodiment, the control unit 136 substitutes 0 for j and stores it in the memory 136a (step S12). Thereafter, instead of step S13, the hash calculation unit 233 calculates a hash value G(I j (n)). Wherein, it is defined as I j (n)=s n,1 (j=0), I j (n)=H(I j-1 (n)|id n )(j≥1). That is, the hash operation unit 233 recursively obtains I j (n) from the secret value s n,1 and the corresponding label, and calculates the hash value G(I j (n)). In addition, this recursive operation temporarily stores each I j '(n) (j'∈{1,...,j-1}) in the memory 136a during the operation, and uses it for the next I j '+1 (n) calculation to achieve. Furthermore, I j (n) obtained when the hash value G(I j (n)) is calculated is stored in the memory 136a at least until the next hash value G(I j+1 (n)) is calculated. Thus, I j (n) obtained temporarily can be used for I j+1 ( n)=H(I j (n)| id n ), and can realize the efficiency of operation.

之后,代替步骤S14,在比较部134中,从散列运算部233取得散列值G(Ij(n)),从存储器136a取得标签输出信息G(sk,i),并比较它们。之后,与实施例1同样,执行步骤S15以后的处理。Thereafter, instead of step S14, the comparison unit 134 acquires the hash value G(I j (n)) from the hash calculation unit 233 and the tag output information G(s k,i ) from the memory 136a, and compares them. Thereafter, the processing from step S15 onward is executed in the same manner as in the first embodiment.

如以上所说明的,在实施例2中,通过sk,i+1=H(sk,i|idk)的运算来更新标签装置210的秘密值存储器211的秘密值sk,i。由此,可以防止不同的标签ID信息idk所对应的秘密值的更新内容半永久地一致的情况。即,在对不同的秘密值等分别使用了相同的散列函数的情况下,也有在某一时刻这些运算结果一致的情况(collision)。但是,即使在该情况下,由于各个秘密值sk,i所对应的标签ID信息idk不同,所以通过sk,i+1=H(sk,i|idk)运算的下一个秘密值不相同。这是在通过sk,i+1=H(sk,i)进行秘密值的更新的情况下得不到的效果。As described above, in the second embodiment, the secret value sk, i of the secret value memory 211 of the tag device 210 is updated by the calculation of s k,i+1 =H(sk ,i |id k ). Thereby, it is possible to prevent the semi-permanent coincidence of the update contents of secret values corresponding to different tag ID information id k . That is, when the same hash function is used for different secret values and the like, there may be a case (collision) in which these calculation results coincide at a certain point of time. However, even in this case, since the tag ID information id k corresponding to each secret value sk ,i is different, the next secret calculated by s k,i+1 =H(s k,i |id k ) The values are not the same. This is an effect that cannot be obtained when the secret value is updated by s k,i+1 =H(s k,i ).

另外,在实施例2中,将标签ID信息idk以及idn,分别设为第一固有值wk以及第二固有值wn,,但也可以将各标签ID信息所对应的其它的信息作为固定值使用。In addition, in Embodiment 2, the tag ID information id k and id n are respectively set as the first intrinsic value w k and the second intrinsic value w n , but other information corresponding to each tag ID information may also be Used as a fixed value.

[实施例3][Example 3]

本方式是实施例1的变形例,在后端装置中,记录预先计算出的运算值G(Hj(sn,1))(j=0,...,jmax),仅这一点与实施例1不同。以下,仅说明与实施例1的不同点。This method is a modified example of Embodiment 1. In the back-end device, the calculation value G(H j (s n, 1 )) (j=0, ..., j max ) calculated in advance is recorded. Different from Example 1. Hereinafter, only the points of difference from Embodiment 1 will be described.

图5是例示实施例3中的标签自动识别系统300的整体结构的图。另外,在该图中,与实施例1共同的部分赋予与实施例1共同的符号。图6是用于说明实施例3的后端装置330的处理的流程图。以下,在该图中,说明实施例3的功能结构以及处理方法。FIG. 5 is a diagram illustrating an overall configuration of an automatic tag identification system 300 in Embodiment 3. As shown in FIG. In addition, in this figure, the part common to Example 1 is given the code|symbol common to Example 1. FIG. 6 is a flowchart for explaining the processing of the backend device 330 of the third embodiment. Hereinafter, in this figure, the functional configuration and processing method of the third embodiment will be described.

<预处理><preprocessing>

在后端装置330的数据库存储器331中将在散列运算部133中预先计算出的运算结果G(Hj(sn,1))(j=0,...,jmax)与秘密值sn,1对应存储,仅这一点与第一实施方式不同。In the database memory 331 of the backend device 330, the calculation result G(H j ( s n, 1 )) (j=0, . s n,1 corresponds to storage, which is different from the first embodiment only in this point.

<标签装置的处理·读取装置的处理><Handling of Tag Devices and Handling of Reader Devices>

与实施例1相同。Same as Example 1.

<后端装置的处理><Handling of back-end devices>

首先,后端装置330在通信部132中接收从读取装置120发送的物流信息pd和标签输出信息G(sk,i)(步骤S31)。另外,接收的物流信息pd和标签输出信息G(sk,i)被存储在存储器136a中。接着,控制部136将1代入n,并将其存储在存储器136a中(步骤S32)。接着,控制部136将0代入j,并将其存储在存储器136a中(步骤S33)。然后,控制部136参照存储器136a的n,j的值,提取存储在数据库存储器331中的运算结果G(Hj(sn,1))(步骤S34)。First, the back-end device 330 receives the distribution information pd and the label output information G(s k,i ) transmitted from the reading device 120 in the communication unit 132 (step S31 ). In addition, the received distribution information pd and label output information G(s k,i ) are stored in the memory 136a. Next, the control unit 136 substitutes 1 for n, and stores it in the memory 136a (step S32). Next, the control unit 136 substitutes 0 for j, and stores it in the memory 136a (step S33). Then, the control unit 136 refers to the value of n,j in the memory 136a, and extracts the calculation result G(H j (s n,1 )) stored in the database memory 331 (step S34).

接着,在比较部134中,比较该运算结果G(Hj(sn,1))和从存储器136a中提取的标签输出信息G(sk,i)(步骤S35)。Next, in the comparing unit 134, the calculation result G(H j (s n, 1 )) is compared with the label output information G( sk, i ) extracted from the memory 136a (step S35).

这里,在这些值不一致的情况下(步骤S36),控制部136将j+1代入存储器136a的j(步骤S37),并判断j是否超过了规定的最大值jmax(步骤S38)。这里,在j小于等于最大值jmax的情况下,控制部136再执行步骤S13以后的处理,在j超过最大值jmax的情况下,判断存储器136a的n是否为m(步骤S39)。这里,如果不是n=m,则控制部136存储n←n+1(n+1设为新的n)(步骤S40),并再执行步骤S33以后的处理,如果n=m则结束处理。另外,该处理在控制部136的控制下,如果标签输出信息G(sk,i)-和散列值G(Hj(sn,1))不一致,则将n以及j的至少一个的值变化,相当于再进行散列运算部133以及比较部134中的处理。Here, when these values do not match (step S36), the control unit 136 substitutes j+1 into j in the memory 136a (step S37), and determines whether j exceeds a predetermined maximum value j max (step S38). Here, when j is less than or equal to the maximum value j max , the control unit 136 executes the processing after step S13, and if j exceeds the maximum value j max , it determines whether n in the memory 136a is m (step S39). Here, if not n=m, the control unit 136 stores n←n+1 (n+1 is set as a new n) (step S40), and executes the processing after step S33, and ends the processing if n=m. In addition, in this process, under the control of the control unit 136, if the tag output information G( sk, i )- and the hash value G(H j (s n, 1 )) do not match, at least one of n and j The change in the value corresponds to performing the processing in the hash operation unit 133 and the comparison unit 134 again.

另一方面,在标签输出信息G(sk,i)和散列值G(Hj(sn,1))一致的情况下(步骤S36),控制部136将一致的散列值G(Hj(sn,1))所对应的秘密值sn,1发送到读写部135,读写部135从数据库存储器131中提取对应于一致的散列值G(Hj(sn,1))的、与秘密值sn,1对应的ID信息idn和物流信息等数据datan,并将其发送到通信部132(步骤S40)。而且,读写部135从存储器136a接受物流信息pd,并将该物流信息pd与该秘密值sn,1对应,写入数据库存储器131(步骤S40)。发送到通信部132的标签ID信息idn和数据datan通过网络140被发送到读取装置120(步骤S41)。On the other hand, when the tag output information G( sk, i ) matches the hash value G(H j (s n, 1 )) (step S36), the control unit 136 assigns the matched hash value G( The secret value sn, 1 corresponding to H j (s n, 1 )) is sent to the read-write unit 135, and the read-write unit 135 extracts the corresponding hash value G from the database memory 131 (H j (s n, 1 )) data n such as ID information id n corresponding to the secret value s n, 1 and physical distribution information, etc., and send it to the communication unit 132 (step S40). Then, the read/write unit 135 receives the physical distribution information pd from the memory 136a, associates the physical distribution information pd with the secret value sn,1 , and writes it into the database memory 131 (step S40). The tag ID information id n and data data n sent to the communication unit 132 are sent to the reader 120 via the network 140 (step S41).

如以上所说明的,在实施例3中,将预先计算出的运算结果G(Hj(sn,1))存储在数据库存储器331中。因此,与对每个比较处理计算G(Hj(sn,1))的情况相比,可以降低后端装置330的处理量。As described above, in the third embodiment, the calculation result G(H j (s n, 1 )) calculated in advance is stored in the database memory 331 . Therefore, compared with the case of calculating G(H j (s n, 1 )) for each comparison process, the processing amount of the back-end device 330 can be reduced.

[实施例4][Example 4]

实施例4是实施例1的变形例,从标签装置发送特定秘密值的更新次数的信息,通过后端装置使用该秘密值的更新次数进行处理,仅这一点与实施例1不同。以下,仅说明与实施例1的不同点。Embodiment 4 is a modified example of Embodiment 1. The tag device sends information specifying the number of updates of the secret value, and the back-end device uses the number of updates of the secret value for processing. The only difference from Embodiment 1 is this. Hereinafter, only the points of difference from Embodiment 1 will be described.

图7是例示实施例4中的标签自动识别系统400的整体结构的图。另外,在该图中,与实施例1共同的部分赋予与实施例1共同的符号。图8是用于说明实施例4的后端装置430的处理的流程图。以下,在该图中,说明实施例4的功能结构以及处理方法。FIG. 7 is a diagram illustrating an overall configuration of an automatic tag identification system 400 in Embodiment 4. As shown in FIG. In addition, in this figure, the part common to Example 1 is given the code|symbol common to Example 1. FIG. 8 is a flowchart for explaining the processing of the backend device 430 according to the fourth embodiment. Hereinafter, in this figure, the functional configuration and processing method of the fourth embodiment will be described.

<标签装置的结构><Structure of label device>

标签装置410具有对秘密值的更新次数m进行计数的计数器416,仅这一点与实施例1不同。The tag device 410 is different from the first embodiment only in that it has a counter 416 that counts the number of updates m of secret values.

<标签装置的处理><Handling of Label Device>

仅标签装置410的秘密值存储器411中除了秘密值sk,i,还存储计数器416计数的秘密值sk,i的更新次数rn这一点,和将特定该更新次数rn的信息经由散列运算部112以及接口114(相当于“输出部”)发送到读取装置120这一点与实施例1不同。In addition to the secret value sk,i , the secret value memory 411 of the tag device 410 stores the number of updates rn of the secret value sk,i counted by the counter 416, and the information specifying the number of updates rn is hashed. The difference from the first embodiment is that the unit 112 and the interface 114 (corresponding to the “output unit”) transmit to the reading device 120 .

<读取装置的处理><Handling of reading device>

在接口122中还接收特定更新次数rn的信息,在通信部123中还通过网络140向后端装置430发送特定该更新次数rn的信息,这一点与实施例1不同。The interface 122 also receives information specifying the update count rn, and the communication unit 123 also transmits the information specifying the update count rn to the backend device 430 via the network 140, which is different from the first embodiment.

<后端装置的处理><Handling of back-end devices>

首先,后端装置430在通信部132中接收特定从读取装置120发送的rn的信息、物流信息pd以及标签输出信息G(sk,i)(步骤S50)。另外,特定接收的rn的信息、物流信息pd以及标签输出信息G(sk,i)存储在存储器136a中。接着,控制部136将1代入n并将其存储在存储器136a中(步骤S51)。然后,控制部参照存储器136a的n,j的值,使散列运算部433从数据库存储器131中提取秘密值sn,1(步骤S52),并对其使用rn次散列函数H之后,进一步使用散列函数G,并计算散列值G(Hj(sn,1))(j=rn)(步骤S53)。First, the back-end device 430 receives information specifying rn transmitted from the reading device 120, distribution information pd, and tag output information G(s k,i ) in the communication unit 132 (step S50). In addition, information specifying received rn, distribution information pd, and label output information G( sk,i ) are stored in the memory 136a. Next, the control unit 136 substitutes 1 for n and stores it in the memory 136a (step S51). Then, the control unit refers to the value of n,j in the memory 136a, causes the hash operation unit 433 to extract the secret value sn,1 from the database memory 131 (step S52), and uses the hash function H rn times for it, and further The hash function G is used, and a hash value G(H j (s n, 1 ))(j=rn) is calculated (step S53).

接着,在比较部134中,从散列运算部433中取得散列值G(Hj(sn,1)),从存储器136a中取得标签输出信息G(sk,i),并比较它们(步骤S54)。Next, in the comparison unit 134, the hash value G(H j (s n, 1 )) is obtained from the hash operation unit 433, and the label output information G(s k, i ) is obtained from the memory 136a, and they are compared. (step S54).

这里,在这些值不一致的情况下(步骤S55),控制部136判断存储器136a的n是否为m(步骤S56)。这里,如果不是n=m,则控制部136将n←n+1(n+1设为新的n)存储在存储器136a中(步骤S57),并再执行步骤S52以后的处理,如果n=m则结束处理。另外,该处理相当于在散列值G(Hj(sn,1))和标签输出信息G(sk,i)不一致的情况下,将n的值变化,再进行散列运算部433以及比较部134中的处理。Here, when these values do not match (step S55), the control part 136 judges whether n of the memory 136a is m (step S56). Here, if not n=m, then the control unit 136 stores n←n+1 (n+1 is a new n) in the memory 136a (step S57), and then executes the processing after step S52, if n= m ends the processing. In addition, this processing is equivalent to changing the value of n when the hash value G(H j (s n, 1 )) and the label output information G(s k, i ) do not match, and then performing the hash calculation unit 433 And the processing in the comparison unit 134 .

另一方面,在标签输出信息G(sk,i)和散列值G(Hj(sn,1))一致的情况下(步骤S36),控制部136将一致的散列值G(Hj(sn,1))所对应的秘密值sn,1发送到读写部135,读写部135从数据库存储器131中提取对应于一致的散列值G(Hj(sn,1))的、与秘密值sn,1对应的ID信息idn和物流信息等数据datan,并将其发送到通信部132(步骤S58)。而且,读写部135从存储器136a接受物流信息pd,并将该物流信息pd与该秘密值sn,1对应,写入数据库存储器131(步骤S59)。发送到通信部132的标签ID信息idn和数据datan通过网络140被发送到读取装置120(步骤S59)。On the other hand, when the tag output information G( sk, i ) matches the hash value G(H j (s n, 1 )) (step S36), the control unit 136 assigns the matched hash value G( The secret value sn, 1 corresponding to H j (s n, 1 )) is sent to the read-write unit 135, and the read-write unit 135 extracts the corresponding hash value G from the database memory 131 (H j (s n, 1 )) data n such as ID information id n corresponding to the secret value s n, 1 and physical distribution information, etc., and send it to the communication unit 132 (step S58). Then, the read/write unit 135 receives the physical distribution information pd from the memory 136a, associates the physical distribution information pd with the secret value sn,1 , and writes it into the database memory 131 (step S59). The tag ID information id n and data data n sent to the communication unit 132 are sent to the reader 120 via the network 140 (step S59).

如以上所说明的,在实施例4中,在标签装置410中发送rn,在后端装置430中,使用该rn计算散列值G(Hj(sn,1))并进行比较处理。由此,后端装置430的比较处理对各sn,1仅一次,可以降低该处理所需的处理量。As described above, in the fourth embodiment, the tag device 410 transmits rn, and the backend device 430 uses the rn to calculate the hash value G(H j (s n, 1 )) and perform comparison processing. As a result, the comparison processing by the backend device 430 is performed only once for each sn ,1 , and the amount of processing required for this processing can be reduced.

[实施例5][Example 5]

实施例5是实施例1的变形例,代替散列函数,使用密钥加密函数进行秘密值的更新·比较,仅这一点与实施例1不同。以下,仅说明与实施例1的不同点。Embodiment 5 is a modification of Embodiment 1, and differs from Embodiment 1 only in that a secret value is updated and compared using a key encryption function instead of a hash function. Hereinafter, only the points of difference from Embodiment 1 will be described.

图9是例示实施例5中的标签自动识别系统500的整体结构的图。另外,在该图中,与实施例1共同的部分赋予与实施例1共同的符号。图10A是用于说明实施例5的标签装置510的处理的流程图,图10B是用于说明实施例5的后端装置530的处理的流程图。以下,在该图中,说明本实施例的功能结构以及处理方法。FIG. 9 is a diagram illustrating an overall configuration of an automatic tag identification system 500 in Embodiment 5. As shown in FIG. In addition, in this figure, the part common to Example 1 is given the code|symbol common to Example 1. FIG. 10A is a flowchart for explaining the processing of the tag device 510 of the fifth embodiment, and FIG. 10B is a flowchart for explaining the processing of the backend device 530 of the fifth embodiment. Hereinafter, in this figure, the functional configuration and processing method of this embodiment will be described.

<预处理><preprocessing>

在实施例5中,在标签装置510上设置密钥存储器515,在后端装置530上设置密钥存储器536,分别存储共同密钥KG,KH。而且,标签装置510中代替实施例1的散列运算部112、113,设置加密函数运算部512、513,后端装置530上代替散列运算部133而设有加密函数运算部533。然后,加密函数运算部512、513、533可以进行通过AES,Camellia等共同密钥加密函数的运算来代替散列函数。另外,在实施例5中,使用共同密钥KG的共同密钥加密函数E相当于“难以求逆像的第一函数F1”,使用共同密钥KG的共同密钥加密函数E相当于“搅乱定义域的元和其映射的关系的第二函数F2”。即,本例的第一函数F1以及第二函数F2是应用了不同的共同密钥的相同的共同密钥加密函数。In Embodiment 5, a key storage 515 is provided on the tag device 510, and a key storage 536 is provided on the backend device 530, and the common keys KG and KH are respectively stored. Furthermore, the tag device 510 is provided with encryption function calculation units 512 and 513 instead of the hash calculation units 112 and 113 of the first embodiment, and the backend device 530 is provided with an encryption function calculation unit 533 instead of the hash calculation unit 133 . Then, the encryption function calculation units 512, 513, and 533 may perform calculations using common key encryption functions such as AES and Camellia instead of the hash function. In addition, in Embodiment 5, the common key encryption function E using the common key KG corresponds to "the first function F1 which is difficult to find an inverse image", and the common key encryption function E using the common key KG corresponds to "scrambling A second function F2' that defines the relationship between the elements of the domain and their mappings. That is, the first function F1 and the second function F2 of this example are the same common key encryption function to which different common keys are applied.

以上的点与实施例1不同。The above point is different from Example 1.

<标签装置的处理><Handling of Label Device>

首先,在加密函数运算部512(相当于“第二运算部”)中,从秘密值存储器111提取秘密值sk,i(步骤S61),从密钥存储器515中提取共同密钥KG,并对秘密值sk,i以共同密钥KG使用共同密钥加密函数E(EKG(sk,i):步骤S62)。计算出的加密文本EKG(sk,i)作为标签输出信息EKG(sk,i)从接口114通过无线或有线发送到读取装置120(步骤S63)。First, in the encryption function calculation unit 512 (corresponding to the “second calculation unit”), the secret value sk,i is extracted from the secret value memory 111 (step S61), the common key KG is extracted from the key memory 515, and The common key encryption function E is used with the common key KG for the secret value sk, i (E KG (s k,i ): step S62). The calculated encrypted text E KG (sk , i ) is sent as tag output information E KG ( sk, i ) from the interface 114 to the reading device 120 via wireless or wired (step S63 ).

接着,在加密函数运算部513中(相当于“第一运算部”),从密钥存储器515提取共同密钥KH,从秘密值存储器111提取秘密值sk,i,并对该秘密值sk,i以共同密钥使用共同密钥加密函数E(步骤S64),并将该运算结果作为新的秘密值si+1=EKH(sk,i)覆盖保存在秘密值存储器111上(步骤S65)。Next, in the encryption function calculation unit 513 (corresponding to the “first calculation unit”), the common key KH is extracted from the key storage 515, the secret value sk,i is extracted from the secret value storage 111, and the secret value s k, i use the common key encryption function E (step S64) with the common key, and the operation result is stored on the secret value storage 111 as a new secret value s i+1 =E KH (s k, i ) (step S65).

<读取装置的处理><Handling of reading device>

与实施例1同样。Same as Example 1.

<后端装置的处理><Handling of back-end devices>

首先,后端装置530在通信部132中,接收从读取装置120发送的物流信息pd和标签输出信息EKG(sk,i)(步骤S70)。另外,接收的物流信息pd和标签输出信息EKG(sk,i)被存储在存储器136a中。接着,控制部136将1代入n并将其存储在存储器136a中(步骤S71)。然后,控制部136参照存储器136a的n的值,使散列运算部533(相当于“第三运算部”)从数据库存储器131提取秘密值sn,1(步骤S72)。接着,控制部136将0代入j并将其存储在存储部136a中(步骤S73)。然后控制部136参照存储器136a的j的值,使散列运算部533计算加密文本Ej KG(EKH(sn,1))(相当于“第三运算部中的运算结果”)(步骤S74)。另外,Ej KH(sn,1)表示对秘密值sn,1以共同密钥使用j次共同密钥函数E。接着,在比较部134中,从散列运算部133取得加密文本Ej KG(EKH(sn,1)),存储器136a取得标签输出信息EKG(sk,i),并比较它们(步骤S75)。First, the back-end device 530 receives the distribution information pd and the label output information E KG ( sk, i ) transmitted from the reading device 120 in the communication unit 132 (step S70). In addition, the received distribution information pd and label output information E KG ( sk, i ) are stored in the memory 136a. Next, the control unit 136 substitutes 1 for n and stores it in the memory 136a (step S71). Then, the control unit 136 refers to the value of n in the memory 136a, and causes the hash calculation unit 533 (corresponding to the "third calculation unit") to extract the secret value sn,1 from the database memory 131 (step S72). Next, the control unit 136 substitutes 0 for j and stores it in the storage unit 136a (step S73). Then, the control unit 136 refers to the value of j in the memory 136a, and causes the hash calculation unit 533 to calculate the encrypted text E j KG (E KH (s n, 1 )) (equivalent to “the calculation result in the third calculation unit”) (step S74). Also, E j KH (s n,1 ) indicates that the common key function E is used j times with the common key for the secret value s n,1. Next, in the comparison unit 134, the encrypted text E j KG (E KH (s n, 1 )) is obtained from the hash operation unit 133, and the storage 136a obtains the label output information E KG (s k, i ), and compares them ( Step S75).

这里,在这些值不一致的情况下(步骤S76),控制部136将j+1代入存储器136a(步骤S77),并判断j是否超过了规定的最大值jmax(步骤S78)。这里,在j小于等于最大值jmax的情况下,控制部136再执行步骤S74以后的处理,在j超过最大值jmax的情况下,判断存储器136a的n是否为m(步骤S18)。这里,如果不是n=m,则控制部136在存储器136a中存储n←n+1(将n+1设为新的n)(步骤S80),并再执行步骤S72以后的处理,如果n=m则结束处理。另外,该处理在控制部136的控制下,如果标签输出信息EKG(sk,i)和加密文本Ej KG(EKH(sn,1))不一致,则将n以及j的至少一个的值变化,相当于再进行加密函数运算部533以及比较部134中的处理。Here, when these values do not match (step S76), the control unit 136 substitutes j+1 into the memory 136a (step S77), and determines whether j exceeds a predetermined maximum value j max (step S78). Here, when j is less than or equal to the maximum value j max , the control unit 136 executes the processing after step S74, and if j exceeds the maximum value j max , it determines whether n in the memory 136a is m (step S18). Here, if not n=m, then control unit 136 stores n←n+1 (making n+1 new n) (step S80) in memory 136a, and then executes the processing after step S72, if n= m ends the processing. In addition, under the control of the control unit 136, if the label output information E KG (s k, i ) is inconsistent with the encrypted text E j KG (E KH (s n, 1 )), at least one of n and j The change in the value of is equivalent to performing the processing in the encryption function calculation unit 533 and the comparison unit 134 again.

另一方面,在标签输出信息EKG(sk,i)和加密文本Ej KG(EKH(sn,1))一致的情况下(步骤S76),控制部136将一致的加密文本Ej KG(EKH(sn,1))所对应的秘密值sn,1发送到读写部135,读写部135从数据库存储器131中提取对应于一致的加密文本Ej KG(EKH(sn,1))的、与秘密值sn,1对应的ID信息idn和物流信息等数据datan,并将其发送到通信部132(步骤S81)。而且,读写部135从存储器136a接受物流信息pd,并将该物流信息pd与该秘密值sn,1对应,写入数据库存储器131(步骤S81)。发送到通信部132的标签ID信息idn和数据datan通过网络140发送到读取装置120(步骤S82)。On the other hand, when the tag output information E KG (s k, i ) matches the encrypted text E j KG (E KH (s n, 1 )) (step S76), the control unit 136 sends the matched encrypted text E The secret value s n corresponding to j KG (E KH (s n, 1 )) is sent to the read-write unit 135, and the read-write unit 135 extracts the corresponding encrypted text E j KG (E KH (s n, 1 )), data n such as ID information id n and physical distribution information corresponding to the secret value sn, 1 are sent to the communication unit 132 (step S81). Then, the read/write unit 135 receives the physical distribution information pd from the memory 136a, and writes the physical distribution information pd into the database memory 131 in association with the secret value sn,1 (step S81). The tag ID information id n and data data n sent to the communication unit 132 are sent to the reader 120 via the network 140 (step S82).

另外,后端装置530中的在步骤S74的过程中计算出的加密文本Ej KH(sn,1)存储在存储器136a中,并在下一个循环的步骤S74中利用也可以。即,使用记录的Ej KH(sn,1)通过EKH(Ej KH(sn,1))求加密文本Ej+1 KH(sn,1),进而将该值存储在存储器136a中也可以。在该情况下,可以降低散列运算部533的加密运算次数,并可以提高后端装置530的运算效率。进而,在后端装置530中,事先计算Ej KH(sn,1)(j∈{1,...,jmax})并存储在存储器136a中,在步骤S74中利用也可以。在该情况下,可以提高后端装置530的运算效率。In addition, the encrypted text E j KH (s n, 1 ) calculated in the process of step S74 in the backend device 530 may be stored in the memory 136a and used in step S74 of the next cycle. That is, use the recorded E j KH (s n, 1 ) to find the encrypted text E j+1 KH (s n, 1 ) through E KH (E j KH (s n, 1 )), and then store the value in the memory Also available in 136a. In this case, the number of encryption calculations performed by the hash calculation unit 533 can be reduced, and the calculation efficiency of the backend device 530 can be improved. Furthermore, in the back - end device 530, E j KH (s n, 1 ) (j∈{1, . In this case, the computing efficiency of the backend device 530 can be improved.

而且,在实施例5中,将使用共同密钥KH的共同密钥加密函数E作为“难以求逆像的第一函数F1”进行处理,将使用共同密钥KG的共同密钥加密函数E作为“搅乱定义域的元和其映射的关系的第二函数F2”进行处理。进而,在所述实施例1到4或后述的实施例6到11中,将第一函数F1以及第二函数F2的至少一个作为使用共同密钥KH或KG的共同密钥加密函数E进行处理也可以。Furthermore, in Embodiment 5, the common key encryption function E using the common key KH is treated as "the first function F1 of the hard-to-reverse image", and the common key encryption function E using the common key KG is treated as The "second function F2 that disturbs the relationship between the elements of the domain and their mappings" is processed. Furthermore, in Embodiments 1 to 4 described above or Embodiments 6 to 11 described later, at least one of the first function F1 and the second function F2 is performed as a common key encryption function E using a common key KH or KG. Processing is also possible.

这样,在实施例5中,使用共同密钥加密函数更新秘密值sk,i。因此,即使从标签装置510泄漏秘密值sk,i,攻击者也不能根据该秘密值sk,i和通信历史追踪标签装置510的流通过程。而且,由于不必在标签装置510中设置随机数生成电路,所以可以降低标签装置510的成本。进而,如果可以使用比散列函数简单的(运算量少的)共同密钥加密函数,则可以降低标签装置510以及后端装置530的处理量。Thus, in Embodiment 5, the secret value sk ,i is updated using the common key encryption function. Therefore, even if the secret value sk,i is leaked from the tag device 510, an attacker cannot trace the distribution process of the tag device 510 based on the secret value sk,i and the communication history. Furthermore, since it is not necessary to provide a random number generating circuit in the tag device 510, the cost of the tag device 510 can be reduced. Furthermore, if a common-key encryption function simpler than a hash function (less computational complexity) can be used, the processing load of the tag device 510 and the back-end device 530 can be reduced.

[实施例6][Example 6]

实施例6是实施例1的变形例,将秘密值sk,i和标签固有的第一固有值wk的位结合的散列值作为标签输出信息,这一点与实施例1不同。Embodiment 6 is a modified example of Embodiment 1. It is different from Embodiment 1 in that the hash value obtained by combining the secret value sk ,i and the bit of the first inherent value w k inherent in the tag is used as the tag output information.

图11是例示实施例6中的标签自动识别系统600的整体结构的图,图12是用于说明实施例6的处理的流程图。另外,在图11中,与实施例1共同的部分赋予与实施例1共同的符号。以下,使用这些图,说明实施例6的功能结构以及处理方法。FIG. 11 is a diagram illustrating an overall configuration of an automatic label recognition system 600 in Embodiment 6, and FIG. 12 is a flowchart for explaining the processing of Embodiment 6. As shown in FIG. In addition, in FIG. 11, the part common to Example 1 is given the code|symbol common to Example 1. As shown in FIG. Hereinafter, using these figures, the functional configuration and processing method of the sixth embodiment will be described.

<预处理><preprocessing>

与实施例1的不同点在于,各标签装置610的秘密值存储器611中存储各个标签ID信息idk所对应的秘密值sk,i(相当于“第一秘密值”)以及固有值wk(相当于“第一固有值”),后端装置630的数据库存储器631中,将各标签ID信息idn(n∈{1,...,m})和与其对应的秘密值sn,1(相当于“第二秘密值”)、固有值wn(相当于“第二固有值”)以及物流信息等数据datan对应存储。另外,作为固有值,例如可以使用标签ID信息。The difference from Embodiment 1 is that the secret value memory 611 of each tag device 610 stores the secret value sk ,i (corresponding to the "first secret value") and the intrinsic value w k corresponding to each tag ID information id k (equivalent to "the first inherent value"), in the database memory 631 of the back-end device 630, each tag ID information id n (n ∈ {1, ..., m}) and its corresponding secret value s n, 1 (equivalent to "second secret value"), intrinsic value w n (equivalent to "second intrinsic value"), and data n such as logistics information are stored correspondingly. In addition, as the intrinsic value, for example, tag ID information can be used.

<标签装置的处理><Handling of Label Device>

以下,说明使读取装置620第i(i是自然数)次读取标签装置610时的处理。Hereinafter, the processing when the reading device 620 is made to read the tag device 610 for the ith (i is a natural number) time will be described.

首先,在散列运算部612中,从秘密值存储器611中提取秘密值sk,i以及固有值wk(步骤S101),并计算对该秘密值sk,i以及固有值wk的位结合使用散列函数G的标签输出信息G(sk,i|wk)(步骤S102)。然后,在接口114中,通过无线或有线将该标签输出信息G(sk,i|wk)发送到读取装置120(步骤S103)。First, in the hash operation unit 612, the secret value s k, i and the intrinsic value w k are extracted from the secret value memory 611 (step S101), and the bits of the secret value s k, i and the intrinsic value w k are calculated. Output information G(s k, i |w k ) in combination with tags using the hash function G (step S102 ). Then, in the interface 114, the tag output information G(s k, i |w k ) is transmitted to the reading device 120 wirelessly or by wire (step S103).

接着,在散列运算部113中,计算对从秘密值存储器611中提取的秘密值sk,i使用散列函数H的散列值H(sk,i)(步骤S104),并将该散列值H(sk,i)作为新的秘密值sk,i+1覆盖在秘密值存储器611的秘密值sk,i上(删除秘密值存储器611的秘密值sk,i,取而代之存储秘密值sk,i+1:步骤S105)。Next, in the hash calculation unit 113, a hash value H(sk ,i ) using the hash function H for the secret value sk,i extracted from the secret value memory 611 is calculated (step S104), and the The hash value H(s k, i ) is overlaid on the secret value sk, i of the secret value memory 611 as a new secret value sk, i+1 (delete the secret value sk , i of the secret value memory 611 and replace it with Store the secret value sk,i+1 : step S105).

<读取装置的处理><Handling of reading device>

读取装置120在接口122中,接收从标签装置610发送的标签输出信息G(sk,i|wk)(步骤S106),并发送到通信部123。通信部123从物流信息存储器121提取物流信息pd(步骤S107),将该物流信息pd和散列值H(sk,i|wk)通过网络140发送到后端装置630(步骤S108)。The reader 120 receives the tag output information G(s k, i |w k ) transmitted from the tag device 610 through the interface 122 (step S106 ), and sends it to the communication unit 123 . The communication unit 123 extracts the logistics information pd from the logistics information memory 121 (step S107), and sends the logistics information pd and the hash value H(s k, i |w k ) to the backend device 630 through the network 140 (step S108).

<后端装置的处理><Handling of back-end devices>

后端装置630在通信部132中,接收从读取装置120发送的物流信息pd和标签输出信息G(sk,i|wk)(接受输入:步骤S109)。另外,接收的物流信息pd和标签输出信息G(sk,i|wk)被存储在存储器136a中。The back-end device 630 receives the distribution information pd and the label output information G(s k, i |w k ) transmitted from the reading device 120 in the communication unit 132 (accept input: step S109). In addition, the received distribution information pd and label output information G(s k, i |w k ) are stored in the memory 136a.

接着,在控制部136中,将0代入参数j,n并将其存储在存储器136a中(步骤S110)。然后,控制部136参照存储器136a的j,n的值,使用散列运算部633(相当于“第三运算部”)从数据库存储器631提取的一组第二秘密值sn,1以及第二固有值wn计算散列值H(Hj(sn,1)|wk)(步骤S111)。另外,事先计算该Hj(sn,1)并存储在数据库存储器631中也可以。在该情况下,可以减轻后端装置630中的运算负担。Next, in the control unit 136, 0 is substituted into the parameters j,n and stored in the memory 136a (step S110). Then, the control unit 136 refers to the value of j, n in the memory 136a, and uses a group of second secret values sn, 1 and the second A hash value H(H j (s n, 1 )|w k ) is calculated for the intrinsic value w n (step S111 ). In addition, this H j (s n,1 ) may be calculated in advance and stored in the database memory 631 . In this case, the calculation load on the backend device 630 can be reduced.

接着,在比较部134中,从散列运算部633取得G(Hj(sn,1)|wn),从存储器136a取得标签输出信息G(sk,i|wk),并比较它们(步骤S112)。Next, in the comparison unit 134, G(H j (s n, 1 ) | w n ) is acquired from the hash operation unit 633, and the label output information G (s k, i |w k ) is acquired from the memory 136a, and compared with them (step S112).

这里,在这些值不一致的情况下(步骤S113),控制部136将j+1代入存储器136a的j(步骤S114),并判断j是否超过了规定的最大值jmax(步骤S115)。这里,在j小于等于最大值jmax的情况下返回到步骤S111的处理,在j超过最大值jmax的情况下,在控制部136中将n+1代入存储器136a的n,将0代入j(步骤S116),判断n是否超过最大值nmax(步骤S117)。这里,在n小于等于最大值nmax的情况下返回到步骤S111的处理,在n超过最大值nmax的情况下,错误结束(步骤S118)。Here, when these values do not match (step S113), the control unit 136 substitutes j+1 into j in the memory 136a (step S114), and determines whether j exceeds a predetermined maximum value j max (step S115). Here, when j is less than or equal to the maximum value j max , the process returns to step S111, and when j exceeds the maximum value j max , n+1 is substituted into n in the memory 136a in the control unit 136, and 0 is substituted into j (step S116), judge whether n exceeds the maximum value n max (step S117). Here, when n is equal to or less than the maximum value n max , the process returns to step S111, and when n exceeds the maximum value n max , the process ends in error (step S118).

另一方面,在步骤S113的判断中,在标签输出信息G(sk,i|wk)和散列值G(Hj(sn,1)|wn)一致的情况下,控制部136将该n的值赋予读写部135,读写部135使用该n,从数据库存储器631中提取对应于该一致的散列值G(Hj(sn,1)|wn)的、与秘密值sn,1以及与固有值wn对应的idn和datan,并将其发送到通信部132。而且,读写部135从存储器136a接受物流信息pd,并将该物流信息pd与对应于该一致的散列值G(Hj(sn,1)|wn)的秘密值sn,1以及固有值wn对应,写入数据库存储器631(步骤S119)。On the other hand, in the judgment of step S113, when the tag output information G(s k, i |w k ) and the hash value G(H j (s n, 1 )|w n ) coincide, the control unit 136 gives the value of n to the read-write unit 135, and the read-write unit 135 uses this n to extract from the database memory 631 the corresponding hash value G(H j (s n, 1 )|w n ), id n and data n corresponding to the secret value s n, 1 and the unique value w n are sent to the communication unit 132 . Then, the read/write unit 135 receives the distribution information pd from the memory 136a, and compares the distribution information pd with the secret value sn,1 corresponding to the matched hash value G(H j (s n,1 )|w n ). Corresponding to the intrinsic value w n , it is written into the database memory 631 (step S119).

发送到通信部132的idn和datan通过网络140被发送到读取装置120(步骤S120),由读取装置120的通信部123接收并输出(步骤S121)。The id n and data n sent to the communication unit 132 are sent to the reading device 120 via the network 140 (step S120), and are received and output by the communication unit 123 of the reading device 120 (step S121).

<实施例6的特征><Features of Embodiment 6>

在实施例6中,从各标签装置610输出的标签输出信息G(sk,i|wk)是秘密值sk,i和各标签装置610固有的固有值wk的位结合的散列值。而且,各标签装置的秘密值sk,i由散列值H(sk,i)依次更新。从而,即使在不同的标签装置间标签输出信息G(sk,i|wk)相同(发生冲突),由于固有值wk对于每个标签装置不同,所以如果各标签装置的秘密值sk,i被更新,则由于散列函数的冲突困难性,以高概率消除该冲突。由此,可以防止标签装置610的标签输出信息G(sk,i|wk)的冲突继续,可以防止后端装置630不能从标签输出信息G(sk,i|wk)单一特定标签ID信息。In Embodiment 6, the tag output information G(s k, i |w k ) output from each tag device 610 is the hash of the bit combination of the secret value sk , i and the inherent value w k inherent to each tag device 610 value. And, the secret value sk, i of each tag device is sequentially updated with the hash value H( sk, i ). Therefore, even if the tag output information G(s k, i |w k ) is the same (conflict) between different tag devices, since the intrinsic value w k is different for each tag device, if the secret value sk of each tag device , i is updated, then due to the collision difficulty of the hash function, the collision is eliminated with a high probability. In this way, the conflict of the tag output information G(s k, i |w k ) of the tag device 610 can be prevented from continuing, and the back-end device 630 can be prevented from being unable to output the information G(s k, i |w k ) from the tag to a single specific tag. ID information.

<实施例7><Example 7>

实施例7是实施例6的变形例,各个标签装置共用秘密值,这一点与实施例6不同。以下,以与实施例1、实施例6的不同点为中心进行说明。Embodiment 7 is a modified example of Embodiment 6, and differs from Embodiment 6 in that each tag device shares a secret value. Hereinafter, the difference from Example 1 and Example 6 will be mainly described.

图13是例示实施例7中的标签自动识别系统700的整体结构的图。另外,在该图中,与实施例1共同的部分赋予与实施例1共同的符号。而且,图14是用于说明实施例7的处理的流程图。以下,使用这些图,说明实施例7的功能结构以及处理方法。FIG. 13 is a diagram illustrating an overall configuration of an automatic tag identification system 700 in Embodiment 7. As shown in FIG. In addition, in this figure, the part common to Example 1 is given the code|symbol common to Example 1. Furthermore, FIG. 14 is a flowchart for explaining the processing of the seventh embodiment. Hereinafter, using these figures, the functional configuration and processing method of the seventh embodiment will be described.

<预处理><preprocessing>

对各标签装置710所对应的各ID(idk(k=1,...,m))生成某一个随机数s1∈{0,1}t,并作为秘密值s1(s1的初始值,相当于“第一秘密值”)将其存储在各标签装置710的秘密值存储器711中。而且,对于各标签装置710所对应的各标签ID信息(idk(k=1,...,m))生成各自固有的固有值wk,将其存储在该各标签装置710的秘密值存储器711中。Generate a certain random number s 1 ∈ {0, 1} t for each ID (id k (k=1,...,m)) corresponding to each tag device 710, and use it as a secret value s 1 (of s 1 The initial value, corresponding to the “first secret value”) is stored in the secret value memory 711 of each tag device 710 . And , for each tag ID information (id k (k=1, . in memory 711.

而且,将与存储在各标签装置710中的秘密值s1相同的秘密值s1作为“第二秘密值”存储在后端装置730的数据库存储器731中。而且,该数据库存储器731中将各固有值wn与对应的标签装置710的标签ID信息idn以及物流数据等datan对应存储。Furthermore, the same secret value s1 as the secret value s1 stored in each tag device 710 is stored in the database memory 731 of the backend device 730 as a "second secret value". Furthermore, in the database memory 731 , each intrinsic value w n is stored in association with the tag ID information id n of the corresponding tag device 710 and data n such as logistics data.

进而,在后端装置730的散列运算部736中计算各标签装置710共同的秘密值s1的的散列值sj+2=Hj+1(s1)(j=0,...,jmax)。计算出的各散列值sj+2存储在数据库存储器731中。Furthermore, the hash value s j+2 = H j+1 (s 1 ) (j=0, .. ., j max ). Each calculated hash value s j+2 is stored in the database memory 731 .

<标签装置的处理><Handling of Label Device>

以下,说明使读取装置720第i(i是自然数)次读取标签装置710时的处理。Hereinafter, the processing when the reading device 720 is made to read the tag device 710 for the ith (i is a natural number) time will be described.

首先,在散列运算部712中,从秘密值存储器711中提取秘密值si以及固有值wk(步骤S131),并计算对该秘密值si以及固有值wk的位结合的散列值的标签输出信息G(si|wk)(步骤S132)。然后,在接口114中,通过无线或有线将该标签输出信息G(si|wk)发送到读取装置120(步骤S133)。First, in the hash calculation unit 712, the secret value s i and the unique value w k are extracted from the secret value memory 711 (step S131), and the hash of the bit combination of the secret value s i and the unique value w k is calculated. Value label output information G(s i |w k ) (step S132). Then, in the interface 114, the tag output information G(s i |w k ) is transmitted to the reading device 120 wirelessly or by wire (step S133).

接着,在散列运算部113中,计算对从秘密值存储器711中提取的秘密值si的散列值H(si)(步骤S134),并将该散列值H(si)作为新的秘密值si+1覆盖在秘密值存储器711的秘密值si上(步骤S135)。Next, in the hash calculation unit 113, the hash value H( si) for the secret value si extracted from the secret value memory 711 is calculated (step S134), and the hash value H(si ) is used as The new secret value s i+1 is overwritten on the secret value s i in the secret value memory 711 (step S135).

<读取装置的处理><Handling of reading device>

与实施例1同样(步骤S136~S138)。The same as in Embodiment 1 (steps S136 to S138).

<后端装置的处理><Handling of back-end devices>

后端装置730在通信部132中,接收从读取装置120发送的物流信息pd和标签输出信息G(si|wk)(步骤S139)。另外,接收的物流信息pd和标签输出信息G(si|wk)被存储在存储器136a中。The back-end device 730 receives the distribution information pd and the label output information G(s i |w k ) transmitted from the reading device 120 in the communication unit 132 (step S139). In addition, the received distribution information pd and label output information G(s i |w k ) are stored in the memory 136a.

接着,在控制部136中,将1代入参数j,n并将其存储在存储器136a中(步骤S140)。Next, in the control unit 136, 1 is substituted into the parameters j,n and stored in the memory 136a (step S140).

然后,在散列运算部733(相当于“第三运算部”)中,使用从数据库存储器731提取的固有值wn以及秘密值s1或者散列值sj+2(在散列运算部736中计算出(事先计算)的散列值sj+2)计算散列值G(sj+1|wk)(步骤S141)。Then, in the hash operation unit 733 (corresponding to the “third operation unit”), the unique value w n extracted from the database memory 731 and the secret value s 1 or the hash value s j+2 (in the hash operation unit The hash value s j+2 calculated in step 736 (calculated in advance) calculates the hash value G(s j+1 |w k ) (step S141).

接着,在比较部134中,从散列运算部733取得G(sj+2|wn)(相当于“第三运算部中的运算结果”),从存储器136a取得标签输出信息G(si|wk),并比较它们(步骤S142)。Next, in the comparison unit 134, G(s j+2 |w n ) (corresponding to “the calculation result in the third calculation unit”) is acquired from the hash calculation unit 733, and the label output information G(s i |w k ), and compare them (step S142).

这里,在这些值不一致的情况下(步骤S143),控制部136将j+1代入存储器136a的j(步骤S144),并判断j是否超过了规定的最大值jmax(步骤S145)。这里,在j小于等于最大值jmax的情况下返回到步骤S141的处理,在j超过最大值jmax的情况下,在控制部136中将n+1代入存储器136a的n,将0代入j(步骤S146),判断n是否超过最大值nmax(步骤S147)。这里,在n小于等于最大值nmax的情况下返回到步骤S141的处理,在n超过最大值nmax的情况下,错误结束(步骤S148)。Here, when these values do not match (step S143), the control unit 136 substitutes j+1 into j in the memory 136a (step S144), and determines whether j exceeds a predetermined maximum value j max (step S145). Here, when j is equal to or less than the maximum value j max , the process returns to step S141, and when j exceeds the maximum value j max , n+1 is substituted into n in the memory 136a in the control unit 136, and 0 is substituted into j (step S146), judge whether n exceeds the maximum value n max (step S147). Here, when n is equal to or less than the maximum value n max , the process returns to step S141, and when n exceeds the maximum value n max , the process ends in error (step S148).

另一方面,在步骤S143的判断中,在标签输出信息G(si|wk)和散列值G(sj+2|wn)一致的情况下,在控制部136的控制下,在读写部135中,从数据库存储器731中提取对应于该一致的散列值G(sj+2|wn)的、与固有值wn对应的idn和datan,并将其发送到通信部132。而且,读写部135从通信部132接受物流信息pd,并将该物流信息pd与对应于该一致的散列值G(sj+2|wn)的固有值wn对应,写入数据库存储器731(步骤S149)。On the other hand, in the judgment of step S143, if the label output information G(s i |w k ) matches the hash value G(s j+2 |w n ), under the control of the control unit 136, In the reading/writing unit 135, the id n and data n corresponding to the unique value w n corresponding to the matched hash value G(s j+2 |wn ) are extracted from the database memory 731 and transmitted to the communication section 132 . Furthermore, the read/write unit 135 receives the distribution information pd from the communication unit 132, associates the distribution information pd with the unique value w n corresponding to the matching hash value G(s j+2 |w n ), and writes it into the database memory 731 (step S149).

发送到通信部132的idn和datan通过网络140被发送到读取装置120(步骤S150),由读取装置120的通信部123接收并输出(步骤S151)。The id n and data n sent to the communication unit 132 are sent to the reading device 120 via the network 140 (step S150), and are received and output by the communication unit 123 of the reading device 120 (step S151).

<实施例7的特征><Features of Embodiment 7>

在实施例7中,使用各标签装置710共用的秘密值s1。因此,可以对各标签ID信息idn共用后端装置730的步骤S141的处理所使用的秘密值sj+1。由此,可以大幅降低后端装置730中的运算量,并可以进行有效的检索。In Embodiment 7, the secret value s 1 shared by each tag device 710 is used. Therefore, the secret value s j+1 used in the process of step S141 of the backend device 730 can be shared among the tag ID information id n . As a result, the amount of computation in the back-end device 730 can be greatly reduced, and efficient retrieval can be performed.

具体来说,在将散列装置730的散列次数(标签装置710的秘密值的更新次数)设为j的情况下,在实施例1中,需要2mj次的散列运算。与此相对,在实施例7中,可以抑制到mj+j次的散列运算。Specifically, when the number of times of hashing by the hashing device 730 (the number of times of updating the secret value of the tag device 710 ) is j, in Embodiment 1, 2mj times of hashing operations are required. In contrast, in the seventh embodiment, it is possible to suppress hash operations to mj+j times.

进而,标签装置710同时输出标签输出信息G(si|wk)和秘密值si的更新次数rn,如果将该更新次数rn赋予后端装置730(参照实施例4),则可以将后端装置730中的散列运算次数降低到m+j次。Furthermore, the tag device 710 outputs the tag output information G(s i |w k ) and the update times rn of the secret value si at the same time, and if the update times rn is given to the back-end device 730 (see Embodiment 4), the latter The number of hash operations in the end device 730 is reduced to m+j times.

[实施例8][Example 8]

实施例8是实施例1的变形例,作为各标签装置固有的值分配多个要素的组合,这一点与实施例1不同。由此,在多个标签装置间共有分配给各标签装置的要素的一部分。其结果,可以降低标签装置的识别处理所需的总运算量。Embodiment 8 is a modified example of Embodiment 1, and differs from Embodiment 1 in that a combination of elements is allocated as a value unique to each tag device. Thereby, a part of the elements allocated to each tag device is shared among a plurality of tag devices. As a result, the total amount of calculations required for identification processing of the tag device can be reduced.

图15是例示实施例8中的标签自动识别系统800的整体结构的图。在该图中,与实施例1共同的部分赋予与实施例1共同的符号。而且,图16A是标签装置810的秘密值存储器811中存储的数据的例示,图16B是后端装置830的数据库存储器831中存储的数据的例示。进而,图17以及18是用于说明实施例8中的处理的流程图。FIG. 15 is a diagram illustrating an overall configuration of an automatic tag recognition system 800 in Embodiment 8. As shown in FIG. In this figure, the parts common to Example 1 are given the same code|symbol as Example 1. 16A is an example of data stored in the secret value memory 811 of the tag device 810 , and FIG. 16B is an example of data stored in the database memory 831 of the backend device 830 . Furthermore, FIGS. 17 and 18 are flowcharts for explaining the processing in the eighth embodiment.

以下,使用这些图,说明实施例7的功能结构以及处理方法。另外,对于与实施例1共同的事项省略说明。Hereinafter, using these figures, the functional configuration and processing method of the seventh embodiment will be described. In addition, the description of the items common to the first embodiment will be omitted.

<预处理><preprocessing>

例如,使用随机数生成装置(未图示)生成分配给各标签装置的要素的初始值的集合For example, a random number generator (not shown) is used to generate a set of initial values assigned to elements of each tag device

(b1,1,0,...b1,j,0,...b1,ρ,0)…(bu,1,0,...bu,j,0,...bu,ρ,0)…(bd,1,0,bd,j,0,...bd,ρ,0)。(b 1,1,0 ,...b 1,j,0 ,...b 1,ρ,0 )...( bu,1,0 ,...b u,j,0 ,... b u, ρ, 0 )...(b d, 1, 0 , b d, j, 0 , ... b d, ρ, 0 ).

另外,将该各“()”内的要素的集合称为次组αu(u∈{1,...,d})。In addition, the set of elements in each "()" is called a subgroup α u (u∈{1, . . . , d}).

这里,j是1≤j≤ρ的自然数(j∈{1,...,ρ}),u是1≤u≤d的自然数(u∈{1,...,d})。而且,在实施例8中,通过多个要素的组合构成一个秘密值,但d(d≥2)是构成该一个秘密值的要素的数。而且,m是大于等于标签装置810的总数(需要的秘密值的总数)的数,另外,m=ρd是成为自然数的数。Here, j is a natural number of 1≤j≤ρ (j∈{1,...,ρ}), and u is a natural number of 1≤u≤d (u∈{1,...,d}). Furthermore, in Embodiment 8, one secret value is formed by combining a plurality of elements, but d (d≥2) is the number of elements constituting the one secret value. In addition, m is a number equal to or greater than the total number of tag devices 810 (the total number of required secret values), and m= ρd is a number that is a natural number.

接着,将这样生成的各要素的组合分配给各标签装置810。具体来说,从构成上述要素的初始值的集合的d种类的次组αu中分别各选择一个要素,并将选择了的d个初始要素fu,0的组合(f1,0,...,fu,0,...,fd,0)分配给各标签装置810(f1,0∈{b1,1,0,..,…,b1,j,0,...,…,b1,ρ,0},…,fu,0∈{bu,1,0,...,…,bu,j,0,...,…,bu,ρ,0},…,fd,0∈{bd,1,0,...,…,bd,j,0,...,…,bd,ρ,0})。另外,进行该分配,以便不同的标签装置810间不是相同的组合,分配合计m种类(标签装置810的总数)的(f1,0,...,fu,0,...,fd,0)的组合。而且,也可以将多个初始要素fu,0的组合对应于一个标签装置810,在该情况下,分配合计大于等于m种类(大于等于标签装置810的总数)的(f1,0,...,fu,0,...,fd,0)的组合。另外,构成(f1,0,...,fu,0,...,fd,0)的要素的至少一部分由多个标签装置810共用。Next, the combination of each element generated in this way is distributed to each tag device 810 . Specifically, one element is selected from each of the d types of subgroups α u constituting the set of initial values of the above elements, and the combination of the selected d initial elements f u,0 (f 1,0 ,. .., f u, 0 , ..., f d, 0 ) are allocated to each tag device 810 (f 1,0 ∈{b 1,1,0 ,..,...,b 1,j,0 ,. ..,..., b1,ρ,0 },...,fu ,0 ∈{bu ,1,0 ,...,...,bu ,j,0 ,...,..., bu, ρ,0 },...,fd ,0 ∈ {bd ,1,0 ,...,...,bd ,j,0 ,...,...,bd ,ρ,0 }). In addition, this allocation is performed so that different tag devices 810 are not in the same combination, and (f 1,0 , ..., f u, 0 , ..., f d, 0 ) combination. Moreover, a combination of multiple initial elements f u, 0 may also be associated with one tag device 810. In this case, (f 1,0 ,. .., f u, 0 , ..., f d, 0 ). In addition, at least some of the elements constituting (f 1,0 , . . . , fu , 0 , .

生成的所有的组合(f1,0,...,fu,0,...,fd,0)(d个(d≥2)初始要素fu,0(u∈{1,...,d})的组合)分别对应于被分配的各标签装置810的标签ID信息idn和对应于各标签装置810的数据datan,并存储在后端装置830的数据库存储器831中。另外,n是各标签装置所对应的值,对应于从各标签装置输出的标签输出信息ak,i(后述)的下表字k。即,存储在数据库存储器831中的d个初始要素fu,0的组合成为标签装置810的总数。而且,在一个标签装置810对应于多个初始要素fu,0的组合的情况下,存储在数据库存储器831中的d个初始要素fu,0的组合数大于等于标签装置810的总数。All generated combinations (f 1 , 0 , ..., f u, 0 , ..., f d, 0 ) (d (d≥2) initial elements f u, 0 (u∈{1,. . . , d})) respectively correspond to the assigned tag ID information id n of each tag device 810 and data data n corresponding to each tag device 810 , and are stored in the database memory 831 of the backend device 830 . In addition, n is a value corresponding to each tag device, and corresponds to a character k in the following table of tag output information a k,i (described later) output from each tag device. That is, the combination of d initial elements f u,0 stored in the database memory 831 becomes the total number of tag devices 810 . Furthermore, when one label device 810 corresponds to a plurality of combinations of initial elements f u,0 , the number of combinations of d initial elements f u,0 stored in the database memory 831 is greater than or equal to the total number of label devices 810.

而且,生成的各初始要素的组合(f1,0,...,fu,0,...fd,0)(“d个(d≥2)个要素eu,vu(u∈{1,...,d})所构成的组合,对应于各标签ID信息idk”。其中,vu是表示eu,vu的更新次数的大于等于0的整数。要素eu,vu的下表uv表示vu。)存储在被分配的各标签装置810的秘密值存储器811中。另外,以下,存储在各标签装置810的秘密值存储器811中的初始要素的组合表示为(e1,0,...,eu,0,...,ed,0)。Furthermore, the generated combination of initial elements (f 1,0 ,...,f u,0 ,...f d,0 ) ("d (d≥2) elements e u, vu (u∈ The combination of {1,...,d}) corresponds to each tag ID information id k ". Among them, vu is an integer greater than or equal to 0 that represents the update times of e u, vu . Elements e u, vu The following table uv represents v u .) is stored in the secret value memory 811 of each assigned tag device 810 . In addition, below, the combination of initial elements stored in the secret value memory 811 of each tag device 810 is expressed as (e 1,0 ,..., eu,0 ,..., ed,0 ).

图16的例子例示d=2,ρ=3,m=9的情况下的初始要素的分配。The example in FIG. 16 exemplifies allocation of initial elements in the case of d=2, ρ=3, and m=9.

如图16B所示,在该例的情况下,后端装置830的数据库存储器831中,将初始要素的组合831aa((f1,0f2,0)(f1,0∈{b1,1,0,b1,2,0,b1,3,0},f2,0∈{b2,1,0,b2,2,0,b2,3,0}))和标签ID信息831ab(idn(n ∈{1,...,9})和数据831ac(datan(n∈{1,...,9}))对应存储。As shown in FIG. 16B , in the case of this example, in the database memory 831 of the back-end device 830, the initial element combination 831aa((f 1,0 f 2,0 )(f 1,0 ∈{b 1, 1, 0 , b 1, 2, 0 , b 1, 3, 0 }, f 2, 0 ∈ {b 2, 1, 0 , b 2, 2, 0 , b 2, 3, 0 })) and labels ID information 831ab(id n (n ∈ {1, . . . , 9}) and data 831ac (data n (n ∈ {1, . . . , 9})) are stored in association.

而且,如图16A所示,标签装置810的秘密值存储器811中存储与该标签信息id对应的一组初始要素的组合811a((e1,0,e2,0)=(b1,2,0,b2,2,0))。另外,秘密值存储器811中存储的上述要素eu,vu的一部分作为与其他的标签装置对应的要素也存储在该其它的标签装置的秘密值存储器中。Moreover, as shown in FIG. 16A, the secret value memory 811 of the tag device 810 stores a combination 811a of a group of initial elements corresponding to the tag information id ((e 1,0 , e 2,0 )=(b 1,2 ,0 ,b 2,2,0 )). In addition, part of the above-mentioned elements eu, vu stored in the secret value memory 811 is also stored in the secret value memory of the other tag device as an element corresponding to another tag device.

<标签装置的处理><Handling of Label Device>

以下,说明使读取装置20第i(i是自然数)次读取标签装置810时的处理。Hereinafter, the processing when causing the reading device 20 to read the tag device 810 for the ith (i is a natural number) time will be described.

首先,在散列运算部812(相当于“第二运算部”)中,从秘密值存储器811中提取各d个要素eu,vu(步骤S161),并计算对这些位列的结合值(秘密值sk,i)使用了散列函数G的标签输出信息ak,i=G(sk,i)(步骤S162)。这里,k是对应于各标签装置的值,i是表示输出部中的输出次数的自然数。而且在本实施例中,设为秘密值sk,i=e1,v1|…|eu,vu|…|ed,vd,并设为标签输出信息ak,i=G(e1,v1|…|eu,vu|…|ed,vd),但各要素eu,vu的位配置顺序不限与此。First, in the hash operation unit 812 (corresponding to the “second operation unit”), d elements e u, vu are extracted from the secret value memory 811 (step S161), and a combination value ( The secret value s k,i ) uses the hash function G to output label information a k,i =G(s k,i ) (step S162). Here, k is a value corresponding to each label device, and i is a natural number indicating the number of outputs in the output unit. Moreover, in this embodiment, set the secret value sk,i =e 1,v1 |...|e u,vu |...|e d,vd , and set the label output information a k,i =G(e 1 , v1 |...|e u, vu |...|e d, vd ), but the bit arrangement sequence of each element e u, vu is not limited to this.

生成的标签输出信息ak,i被发送到接口114,接口114输出该标签输出信息ak,i(步骤S163)。The generated label output information a k,i is sent to the interface 114, and the interface 114 outputs the label output information a k,i (step S163).

之后,在散列运算部813(相当于“第一运算部”)中,从秘密值存储器811中至少提取一部分的要素eu’,vu’(u’∈{1,...,d})并计算提取的要素eu’,vu’的散列值H(eu’,vu’)(步骤S164),将该散列值H(eu’,vu’)作为新的要素eu’,vu’+1覆盖保存在秘密值存储器811上(步骤S165)。另外,u’∈{1,...,d}的选择方法怎么样都可以。例如,可以例示在每次标签装置810进行通信时选择不同的u’的方法,对于一个u’在要素eu’,vu’的更新全部完成的时刻选择其它的u’的方法,同时选择大于等于两个u’的方法等。Afterwards, in the hash operation unit 813 (corresponding to the "first operation unit"), at least a part of the elements e u', vu' (u'∈{1,...,d}) are extracted from the secret value memory 811 ) and calculate the hash value H( eu', vu') of the extracted elements e u', vu' (step S164), and use the hash value H(e u', vu' ) as the new element e u ', vu'+1 are overwritten and stored in the secret value memory 811 (step S165). In addition, any selection method of u'∈{1, . . . , d} may be used. For example, a method of selecting a different u' every time the tag device 810 communicates can be exemplified, and a method of selecting another u' for one u' at the time when all updates of elements eu ' and vu' are completed, and simultaneously selecting a method greater than equal to two u' methods etc.

<读取装置的处理><Handling of reading device>

读取装置120在接口122中,接收从标签装置发送的标签输出信息ak,i(步骤S166)并发送到通信部123。通信部123从物流信息存储器121中提取物流信息pd(步骤S167),将该物流信息pd和标签输出信息ak,i通过网络140发送到后端装置830(步骤S168)。The reader 120 receives the tag output information a k,i transmitted from the tag device through the interface 122 (step S166 ), and sends it to the communication unit 123 . The communication unit 123 extracts the logistics information pd from the logistics information storage 121 (step S167), and sends the logistics information pd and label output information a k,i to the back-end device 830 through the network 140 (step S168).

<后端装置的处理><Handling of back-end devices>

从读取装置120发送的标签输出信息ak,i以及物流信息pd在通信部132中被接收,并存储在存储器136a中(步骤S169)。The tag output information a k, i and distribution information pd transmitted from the reading device 120 are received by the communication unit 132 and stored in the memory 136a (step S169).

以此为触发,控制部136将1代入n而存储在存储器136a中(步骤S170),如下选择d个wu的组合,将该组合存储在存储器136a中(步骤S171)。Using this as a trigger, the control unit 136 substitutes 1 for n and stores it in the memory 136a (step S170), selects a combination of d w u as follows, and stores the combination in the memory 136a (step S171).

(w1,...,wd)∈Sw={w1,...,wd|wu∈[0,jmax]}(w 1 ,...,w d )∈S w ={w 1 ,...,w d |w u ∈[0,j max ]}

(其中,[α,β]表示大于等于α小于等于β的整数的集合。)(Wherein, [α, β] represents a set of integers greater than or equal to α and less than or equal to β.)

接着,控制部136参照存储器136a的n,d个wu的组合,进而参照散列值存储器838,检验对标签ID信息idn所对应的d个初始要素fu,0(u∈{1,...,d})分别使用了wu次散列函数H的散列值Hwu(fu,0)是否被存储在散列值存储器838中(是否生成完毕)(步骤S172)。另外,Hwu(fu,0)的上标字wu表示wuNext, the control unit 136 refers to the combination of n and d w u in the memory 136a, and further refers to the hash value memory 838, and checks the d initial elements f u , 0 (u∈{1, ..., d}) whether the hash value H wu (fu , 0 ) using the hash function H w u times is stored in the hash value memory 838 (whether the generation is complete) (step S172). In addition, the superscript wu of H wu (fu , 0 ) means w u .

这里,在判断为标签ID信息idn所对应的散列值Hwu(fu,0)中存在还没有被进行运算的值的情况下,散列运算部837从数据库存储器831中提取上述“标签ID信息idn所对应的散列值Hwu(fu,0)中还没有被进行运算的值”所对应的初始要素fu,0,并对该初始要素fu,0使用wu次散列函数H并计算散列值Hwu(fu,0)(步骤S173)。计算出的散列值Hwu(fu,0)被存储在散列值存储器838中(步骤S174),返回步骤S172的处理。Here, when it is determined that there is a value that has not yet been calculated in the hash value H wu (fu , 0 ) corresponding to the tag ID information id n , the hash calculation unit 837 extracts the above-mentioned " The hash value H wu (fu , 0 ) corresponding to the tag ID information id n corresponds to the initial element f u, 0 corresponding to the value that has not yet been operated, and uses w u for the initial element f u, 0 second hash function H and calculate the hash value H wu (fu , 0 ) (step S173). The calculated hash value H wu (fu , 0 ) is stored in the hash value memory 838 (step S174), and the process returns to step S172.

另一方面,在步骤S172的判断中,在判断为标签ID信息idn所对应的散列值Hwu(fu,0)都生成完毕的情况下,控制部136参照存储器136a的n,d个wu的组合,使散列运算部833(相当于“第三运算部”)从散列值存储器838中提取对标签ID信息idn所对应的d个初始要素fu,0(u∈{1,...,d})分别使用了wu次第一函数F1的散列值Hwu(fu,0)(步骤S175),并计算对这些散列值Hwu(fu,0)的位结合使用了散列值G的运算值c(步骤S176)。另外,作为运算值c,例如可以例示c=G(Hw1(f1,0)|… |Hwu(fu,0)|…|Hwd(fd,0)),但各散列值Hwu(fu,0)的位配置顺序不限于此。但是,其顺序有必要对应于标签装置810的散列运算部812中的各要素eu,vu的位配置顺序。On the other hand, in the judgment of step S172, when it is judged that the hash values H wu (fu , 0 ) corresponding to the tag ID information id n have all been generated, the control unit 136 refers to n, d in the memory 136a. The combination of w u makes the hash operation unit 833 (equivalent to the “third operation unit”) extract from the hash value memory 838 d initial elements f u,0 (u∈) corresponding to the tag ID information id n { 1 , . _ 0 ) bit combination using the calculated value c of the hash value G (step S176). In addition, as the calculation value c, for example, c=G(H w1 (f 1,0 )|... |H wu (f u,0 )|...|H wd (f d,0 )) can be exemplified, but each hash The bit arrangement order of the value H wu (fu , 0 ) is not limited to this. However, the order needs to correspond to the bit arrangement order of the elements e u and vu in the hash calculation unit 812 of the tag device 810 .

接着,在比较部134中,从存储器136a中读取标签输出信息ak,i,从散列运算部833接受上述运算值c,比较它们从而判断是否为c=ak,i(步骤S177)。在本例中,比较散列值c=G(Hw1(f1,0)|…|Hwu(fu,0)|…|Hwd(fd,0))和标签输出信息ak,iNext, in the comparison unit 134, the tag output information a k,i is read from the memory 136a, the above-mentioned calculation value c is received from the hash calculation unit 833, and they are compared to determine whether c= ak,i (step S177) . In this example, compare the hash value c=G(H w1 (f 1, 0 )|…|H wu ( fu, 0 )|…|H wd (f d, 0 )) and the label output information a k , i .

这里,在判断为它们不一致的情况下,控制部136参照存储器136a判断是否所有的d个组合方式(w1,...,wd)∈Sw选择完毕(步骤S178)。这里,在判断为存在还没有被选择的组合式样的情况下,选择新的组合(w1,...,wd)∈Sw,并将它们存储在存储器136a中(步骤S179),对于该新的组合以及n,执行步骤S172以后的处理。Here, when it is determined that they do not match, the control unit 136 refers to the memory 136a and determines whether or not all the d combinations (w 1 , . . . , w d )εS w have been selected (step S178). Here, in the case where it is judged that there is a combination pattern that has not been selected yet , a new combination (w 1 , . For this new combination and n, the processes after step S172 are executed.

另一方面,通过步骤S178的判断,在所有的组合方式被选择了的情况下,控制部136参照存储器136a的n判断是否为n=m(步骤S180)。这里,在判断为不是n=m时,控制部136用n+1更新存储器136a的n(步骤S181),执行步骤S172以后的处理。另一方面,在判断为n=m的情况下,错误结束处理(步骤S182)。On the other hand, when all combinations are selected by the determination in step S178, the control unit 136 refers to n in the memory 136a to determine whether n=m (step S180). Here, when it is judged not that n=m, the control unit 136 updates n in the memory 136a with n+1 (step S181), and executes the processing after step S172. On the other hand, when it is judged that n=m, the process ends in error (step S182).

另外,步骤S172~181的处理在控制部136的控制下,如果标签输出信息ak,i和运算值c不一致,则至少变化n以及wu的一部分的值,相当于再次进行散列运算部833以及比较部134中的处理。In addition, the processing of steps S172 to 181 is under the control of the control unit 136. If the label output information a k, i and the calculated value c do not match, at least part of the values of n and w u will be changed, which is equivalent to performing the hash calculation unit again. 833 and the processing in the comparing unit 134.

另一方面,在步骤S177中,在判断为散列值c和标签输出信息ak,i一致的情况下,读写部135在控制部136的控制下,从数据库存储器831中选择与对应于该散列值c的多个初始要素fu,0的组合所对应的标签ID信息idn,并提取该标签ID信息idn和与其对应的数据datan发送给通信部132。而且,读写部135从存储器136a接受物流信息pd,将该物流信息pd作为对应于标签ID信息idn的数据datan,追加写入数据库存储器831(步骤S183)。On the other hand, in step S177, when it is judged that the hash value c matches the tag output information a k,i , the read/write unit 135 selects from the database memory 831 the information corresponding to The tag ID information id n corresponding to the combination of multiple initial elements f u and 0 of the hash value c is extracted, and the tag ID information id n and corresponding data data n are extracted and sent to the communication unit 132 . Then, the read/write unit 135 receives the physical distribution information pd from the memory 136a, and additionally writes the physical distribution information pd into the database memory 831 as data data n corresponding to the tag ID information id n (step S183).

被发送到通信部132的标签ID信息idn和数据datan通过网络140被发送到读取装置120(步骤S184),并由读取装置120的通信部123接收、输出(步骤S185)。The tag ID information id n and data data n sent to the communication unit 132 are sent to the reader 120 via the network 140 (step S184), and are received and output by the communication unit 123 of the reader 120 (step S185).

<实施例8的特征><Features of Embodiment 8>

[效率性][efficiency]

后端装置830的散列运算部838的散列值c的计算需要散列值Hwu(fu,0)=fu,vu的运算。在实施例8中,由于多个标签装置810共用eu,vu,所以如果将为了任何的标签装置810所对应的散列值c的计算而计算的散列值Hwu(fu,0)=fu,vu存储在散列值存储器838中,则也可以将该要素fu,vu利用于其它的标签装置810所对应的散列值c的计算中。由此,不增加要计算的散列值Hwu(fu,0)的数而可以增加可对应的标签装置810的数。具体来说,可以使用d*ρ个要素分配对于ρd个标签装置的固有的初始要素。The calculation of the hash value c by the hash calculation unit 838 of the backend device 830 requires the calculation of the hash value H wu ( fu, 0 )= fu, vu . In Embodiment 8, since multiple tag devices 810 share e u, vu , if the hash value H wu (fu , 0 ) calculated for the calculation of the hash value c corresponding to any tag device 810 =f u, vu is stored in the hash value memory 838, and this element f u, vu can also be used in the calculation of the hash value c corresponding to another tag device 810. Accordingly, the number of tag devices 810 that can be supported can be increased without increasing the number of hash values H wu (fu , 0 ) to be calculated. Specifically, initial elements unique to ρd tag devices can be allocated using d*ρ elements.

进而,由于仅通过散列函数的运算构成通信数据,所以与现有的发生随机数的方法相比,标签装置810中的电路规模小,适于要求低价格的用途。Furthermore, since the communication data is constituted only by the operation of the hash function, the circuit scale in the tag device 810 is small compared with the conventional method of generating random numbers, and is suitable for applications requiring low cost.

[不可追踪性][Untraceability]

在实施例8中将标签输出信息ak,i=G(sk,i)用于通信中。由于散列值的不可识别性,对于不知道秘密值的攻击者来说,该标签输出信息ak,i=G(sk,i),看作单纯的随机数。因此,该攻击者无法得知标签输出信息ak,i=G(sk,i)和ak,i+1=G(sk,i+1)是否为从相同的标签装置810输出的值,也无法追踪标签装置810的流通过程。In Embodiment 8, the tag output information a k,i =G(s k,i ) is used for communication. Due to the unrecognizability of the hash value, for an attacker who does not know the secret value, the tag output information a k,i =G(s k,i ) is regarded as a purely random number. Therefore, the attacker cannot know whether the tag output information a k,i =G(s k,i ) and a k,i+1 =G(s k,i+1 ) are output from the same tag device 810 value, and the distribution process of the tag device 810 cannot be traced.

[前向安全][Forward Safe]

在实施例8中,由散列函数H更新通信所使用的秘密值存储器811内的秘密值。而且,由于散列函数的单方向性,即使标签装置810被干预等各要素eu,vu泄漏,攻击者也不能根据该要素eu,vu来求过去的要素eu,vu-Δvu。从而,即使各要素eu,vu泄漏,攻击者也无法得到取得的各要素eu,vu和通信历史的对应,并无法追踪标签装置810。In Embodiment 8, the secret value in the secret value memory 811 used for communication is updated by the hash function H. Furthermore, due to the unidirectionality of the hash function, even if the elements e u, vu are leaked such as when the tag device 810 is tampered with, the attacker cannot obtain the past elements e u, vu -Δvu from the elements e u, vu . Therefore, even if each element eu, vu is leaked, the attacker cannot obtain the correspondence between each acquired element eu, vu and the communication history, and cannot trace the tag device 810 .

[追踪可能性][Tracking Possibility]

另一方面,根据散列函数G,H的冲突困难性(不同值的散列值难以取相同值的性质),知道各要素fu,vu的后端装置830可以追踪标签装置110的流通过程。On the other hand, according to the hash function G, the collision difficulty of H (the hash value of different values is difficult to take the same value), the back-end device 830 that knows each element f u, vu can track the circulation process of the tag device 110 .

另外,在实施例8中,在后端装置830中生成的初始要素的集合为In addition, in Embodiment 8, the set of initial elements generated in the backend device 830 is

(b1,1,0,...b1,j,0,...b1,ρ,0)…(bu,1,0,...bu,j,0,...bu,ρ,0)…(bd,1,0,...bd,j,0,...bd,ρ,0)。(b 1,1,0 ,...b 1,j,0 ,...b 1,ρ,0 )...( bu,1,0 ,...b u,j,0 ,... b u, ρ, 0 )...(b d, 1, 0 , ... b d, j, 0 , ... b d, ρ, 0 ).

即,对于各u(u∈{1,...,d})的每一个生成ρ个初始要素b。但是,各u(u∈{1,...,d})的每一个生成的初始要素b的数不同也可以。That is, p initial elements b are generated for each u (u∈{1, . . . , d}). However, the number of initial elements b generated for each u (u∈{1, . . . , d}) may be different.

而且,在后端装置830的散列运算部837中,在事先处理的阶段求步骤S176的处理所需的散列值Hwu(fu,0)(u∈{1,...,d}),并存储在散列值存储器838中也可以。In addition, in the hash calculation unit 837 of the backend device 830, the hash value H wu ( fu, 0 ) (u∈{1, . . . , d }) and stored in the hash value memory 838.

[实施例9][Example 9]

实施例9是实施例8的变形例,标签装置的秘密值存储器以及后端装置的数据库存储器中还存储各标签装置固有的固有值,将包含各要素eu,vu以及固有值γk的位列的结合的散列值ak,i=G(sk,i)作为标签输出信息,这一点与实施例8不同。由此,可以防止基于干预其它的标签装置而集中的要素eu,vu,求特定的标签装置的秘密值,并追踪标签装置的情况。Embodiment 9 is a modified example of Embodiment 8. The secret value memory of the tag device and the database memory of the back-end device also store the intrinsic value inherent to each tag device, and the bits including each element e u, vu and the intrinsic value γ k It is different from the eighth embodiment in that the combined hash value a k,i =G(s k,i ) of the columns is output as the label. Thereby, it is possible to prevent a situation where the secret value of a specific tag device is obtained and the tag device is tracked based on the elements e u, vu gathered by interfering with other tag devices.

以下,仅说明与实施例8的不同点,对于与实施例8共同的事项省略说明。Hereinafter, only the points of difference from the eighth embodiment will be described, and descriptions of items common to the eighth embodiment will be omitted.

图19是例示实施例9中的标签自动识别系统900的整体结构的图。而且,图20A是标签装置910的秘密值存储器911中存储的数据的例示,图20B是后端装置930的数据库存储器931中存储的数据的例示。另外,在图19中对于与实施例1共同的功能结构赋予与图2相同的标号,对于与实施例8共同的功能结构赋予与图15相同的标号,省略它们的说明。而且,在图19中仅图示了一个标签装置910,但实际存在多个标签装置910。FIG. 19 is a diagram illustrating an overall configuration of an automatic tag recognition system 900 in Embodiment 9. As shown in FIG. 20A is an example of data stored in the secret value memory 911 of the tag device 910 , and FIG. 20B is an example of data stored in the database memory 931 of the backend device 930 . In addition, in FIG. 19 , the same reference numerals as in FIG. 2 are assigned to the common functional configurations as in the first embodiment, and the same reference numerals as in FIG. 15 are assigned to the common functional configurations in the eighth embodiment, and their descriptions are omitted. Furthermore, only one label device 910 is illustrated in FIG. 19 , but a plurality of label devices 910 actually exist.

以下,使用这些图说明实施例9的功能结构以及处理方法。Hereinafter, the functional configuration and processing method of Embodiment 9 will be described using these figures.

<预处理><preprocessing>

与实施例8的不同点在于,在标签装置910的秘密值存储器911中还存储固有值γk,以及在后端装置930的数据库存储器931中将d个(d≥2)初始要素fu,0(u∈{1,...,d})的组合、各标签装置固有的固有值γn、各标签装置的标签ID信息idn(n是对应于各标签装置的值)对应存储。另外,固有值γk、γn例如是随机值。The difference from Embodiment 8 is that the secret value memory 911 of the tag device 910 also stores the intrinsic value γ k , and d (d≥2) initial elements f u are stored in the database memory 931 of the backend device 930, The combination of 0 (u∈{1,...,d}), the inherent value γ n unique to each tag device, and the tag ID information id n of each tag device (n is a value corresponding to each tag device) are stored in correspondence. In addition, the intrinsic values γ k and γ n are, for example, random values.

图20的例子例示d=2,ρ=3,m=9的情况下的组合固有值的分配。The example in FIG. 20 exemplifies the assignment of the combined intrinsic values in the case of d=2, ρ=3, and m=9.

如图20B所示,在本例中,后端装置930的数据库存储器931中,将初始要素的组合931aa((f1,0f2,0)(f1,0∈{b1,1,0,b1,2,0,b1,3,0}、f2,0∈{b2,1,0,b2,2,0,b2,3,0}))、标签ID信息931ab(idn(n∈{1,...,9})、数据931ac(datan(n∈{1,...,9}))和各标签装置固有的固有值931ad(γk,k∈{1,...,12})对应存储。而且,如图20A所示,标签装置910的秘密值存储器911中存储初始要素的组合911a((e1.0,e2,0)=(b1,2,0,b2,2,0))和固有值911b(γk=γ5)。As shown in FIG. 20B , in this example, in the database memory 931 of the backend device 930, the combination of initial elements 931aa((f 1,0 f 2,0 )(f 1,0 ∈ {b 1,1, 0 , b 1, 2, 0 , b 1 , 3, 0 }, f 2, 0 ∈ {b 2, 1 , 0 , b 2, 2 , 0 , b 2, 3, 0 })), tag ID information 931ab(id n (n∈{1,...,9}), data 931ac(data n (n∈{1,...,9})) and intrinsic value 931ad(γ k , k ∈ {1, ..., 12}) corresponding storage. And, as shown in Figure 20A, the combination 911a ((e 1.0, e2, 0 )=(b 1, 2, 0, b2, 2, 0 )) and an intrinsic value 911b (γ k5 ).

<标签装置的处理><Handling of Label Device>

以下,说明使读取装置120第i(i是自然数)次读取标签装置910时的处理。Hereinafter, the processing when the reading device 120 is made to read the tag device 910 for the ith (i is a natural number) time will be described.

首先,在散列运算部912(相当于“第二运算部”)中,从秘密值存储器911中提取各要素eu,vu以及固有值γk,并计算包含提取的各要素eu,vu以及固有值γk的位列的结合值(秘密值sk,i)的散列值的标签输出信息ak,i=G(sk,i)。在实施例9中,设为秘密值sk,i=γk|e1,v1|…|eu,vu|…|ed,vd,并设为标签输出信息ak,i=G(γk|e1,v1|…|eu,vu|…|ed,vd)First, in the hash operation unit 912 (corresponding to the “second operation unit”), each element e u, vu and the eigenvalue γ k are extracted from the secret value memory 911, and each element e u, vu including the extraction is calculated. And the tag output information a k,i =G(s k,i ) of the hash value of the combined value of the bit sequence of the intrinsic value γ k (secret value sk ,i ). In Embodiment 9, set the secret value s k,ik |e 1,v1 |...|e u,vu |...|e d,vd , and set the label output information a k,i =G( γ k |e 1, v1 |...|e u, vu |...|e d, vd )

之后,与实施例8同样,输出标签输出信息ak,i,散列值存储器911的要素被更新。Thereafter, as in the eighth embodiment, the tag output information a k,i is output, and the elements of the hash value memory 911 are updated.

<读取装置的处理><Handling of reading device>

与实施例8同样。Same as in Example 8.

<后端装置的处理><Handling of back-end devices>

与实施例8的不同点在于,代替实施例8的步骤S176的处理(图18),散列运算部933(相当于“第三运算部”)从数据库存储器931中读出固有值γn,并计算包含散列值Hwu(fu,0)以及固有值γn的位列的结合值的散列值c。在本例中,计算c=G(Hw1(f1,0)|…|Hwu(fu,0)|…|Hwd(fd,0))。除此以外,与实施例8同样。The difference from the eighth embodiment is that instead of the processing of step S176 in the eighth embodiment (FIG. 18), the hash calculation unit 933 (corresponding to the "third calculation unit") reads the unique value γ n from the database memory 931, And calculate the hash value c of the combined value of the bit sequence including the hash value H wu (fu , 0 ) and the intrinsic value γ n . In this example, c=G(H w1 (f 1,0 )|...|H wu (fu ,0 )|...|H wd (f d,0 )) is calculated. Other than that, it is the same as in Example 8.

<实施例9的特征><Features of Embodiment 9>

[不可追踪性][Untraceability]

在实施例9中,将包含各要素eu,vu以及固有值γk的位列的结合的散列值的标签输出信息ak,i=G(sk,i)作为标签装置910的输出。这里,固有值γk是每个标签装置910固有的值。因此,即使某一标签装置被干预,也无法根据其中存储的数据的散列值来求共用要素eu,vu的其它的标签装置的过去的标签输出信息。因此,攻击者无法追踪其它的标签装置。In Embodiment 9, the label output information a k,i =G(s k,i ) including the hash value of the combination of each element e u, vu and the bit sequence of the intrinsic value γ k is used as the output of the label device 910 . Here, the unique value γ k is a value unique to each tag device 910 . Therefore, even if a certain tag device is tampered with, the past tag output information of other tag devices that share elements e u and vu cannot be obtained from the hash value of the data stored therein. Therefore, an attacker cannot track other tag devices.

[实施例10][Example 10]

实施例10是实施例8的方式的变形例,标签装置的多样值存储器中存储t种类(t≥2)的值的多样值z,从秘密值存储器中提取的各要素eu,vu和任何的多样值z的位结合值(秘密值sk,i)的散列值ak,i=G(sk,i)作为输出信息,每t次通信进行一次秘密值存储器的更新,这一点与实施例8不同。Embodiment 10 is a modified example of the mode of embodiment 8. The diverse value z of the value of t types (t≥2) is stored in the diverse value memory of the tag device, and each element e u, vu and any element extracted from the secret value memory The hash value a k , i =G(s k, i ) of the bit combination value (secret value s k, i ) of the diverse value z of z is used as the output information, and the secret value memory is updated every t times of communication. Different from Example 8.

以下,仅说明与实施例8的不同点,对于与实施例8共同的事项省略说明。Hereinafter, only the points of difference from the eighth embodiment will be described, and descriptions of items common to the eighth embodiment will be omitted.

图21是例示实施例10中的标签自动识别系统1000的整体结构的图。而且,图22是用于说明标签装置1010的处理的流程图,图23是用于说明后端装置1030的处理的流程图。另外,在图21中,对与实施例1、实施例8共同的功能结构赋予与实施例2、15相同的标号。而且,在图21中,仅例示了一个标签装置1010,但实际存在多个标签装置1010。FIG. 21 is a diagram illustrating an overall configuration of an automatic tag identification system 1000 in Embodiment 10. As shown in FIG. 22 is a flowchart for explaining the processing of the tag device 1010 , and FIG. 23 is a flowchart for explaining the processing of the backend device 1030 . In addition, in FIG. 21, the same code|symbol as Example 2, 15 is attached|subjected to the functional structure common to Example 1, Example 8. Furthermore, in FIG. 21 , only one label device 1010 is illustrated, but actually a plurality of label devices 1010 exist.

以下,使用这些图说明本实施例的功能结构以及处理方法。Hereinafter, the functional configuration and processing method of this embodiment will be described using these figures.

<预处理><preprocessing>

与实施例8的不同点在于,在标签装置1010的多样值生成部1015中生成t种类(t≥2)的值的多样值z,并将其存储在多样值存储器1016(相当于“第一多样值存储器”)中,以及后端装置1030的数据库存储器1031(相当于“第二多样值存储器”)中存储由各标签装置1010共同的t种类(t≥2)的多样值z。The difference with Embodiment 8 is that in the diverse value generating unit 1015 of the tag device 1010, a diverse value z of values of t types (t≥2) is generated, and stored in a diverse value memory 1016 (equivalent to "the first Multivariate value memory"), and the database memory 1031 (equivalent to "second diverse value memory") of the back-end device 1030 stores the multivariate value z of t types (t≥2) common to each tag device 1010.

另外,作为多样值生成部1015,可以例示对z=1...t进行计数的计数器,进行z=H(seed,x)、x∈{1,...,t}的运算的散列运算装置,进行z=Hx(seed)、x∈{1,...,t}的运算的散列运算装置等。这里,seed表示初始值。以下,将多样值z表现为z=π(x)、计数值x∈{1,...,t}。而且,最好对应于各个x∈{1,...,t}的各多样值z=π(x)不一致。In addition, as the diverse value generation unit 1015, a counter that counts z=1...t, and a hash that performs operations of z=H(seed, x), x∈{1,...,t} can be exemplified. The computing device is a hash computing device or the like that performs the computation of z=H x (seed), x∈{1, . . . , t}. Here, seed represents an initial value. Hereinafter, the multivariate value z is expressed as z=π(x), and the count value x∈{1, . . . , t}. Furthermore, it is preferable that the various values z=π(x) corresponding to each x∈{1, . . . , t} do not agree.

进而,多样值z的生成以及存储不一定在预处理中进行,标签装置1010的通信处理时,或后端装置1030的检索处理时进行也可以。Furthermore, the generation and storage of the diverse value z is not necessarily performed in the preprocessing, but may be performed during the communication processing of the tag device 1010 or the retrieval processing of the backend device 1030 .

<标签装置的处理><Handling of Label Device>

以下,说明使读取装置120第i(i是自然数)次读取标签装置1010时的处理。另外,在计数值x的初始值(i=1)是1,计数值x在控制部115的控制下保存在存储器115a中。Hereinafter, the processing when causing the reading device 120 to read the tag device 1010 for the ith (i is a natural number) time will be described. In addition, when the initial value (i=1) of the count value x is 1, the count value x is stored in the memory 115 a under the control of the control unit 115 .

首先,在散列运算部1012(相当于“第二运算部”)中,从秘密值存储器1011中提取各要素eu,vu,并从多样值存储器1016中提取任何的多样值z(在本例中z=π(x))(步骤S191)。然后,散列运算部1012计算提取的各要素eu,vu和多样值z的位结合值(秘密值sk,i)的散列函数ak,i=G(sk,i)作为标签输出信息(步骤S192)。在本例中,设为秘密值sk,i=e1,v1|…|eu,vu|…|ed,vd|z,并设为标签输出信息ak,i=G(e1,vl|…|eu,vu|…|ed,vd|z)。另外,各要素eu,vu和多样值z的位配置顺序、位结合的多样值z的数不限于此。而且,x∈{1,...,t}所对应的多样值z=π(x)不一致的情况下,在秘密值存储器1011的要素不被更新期间,散列运算部1012生成标签输出信息ak,i所使用的多样值z对于每个通信不同。First, in the hash calculation unit 1012 (corresponding to the “second calculation unit”), each element e u, vu is extracted from the secret value memory 1011, and any various value z is extracted from the various value memory 1016 (in this In an example, z=π(x)) (step S191). Then, the hash operation unit 1012 calculates the hash function a k,i =G(s k ,i ) of the bit combination value (secret value s k,i ) of each extracted element e u,vu and the diversity value z as a label. The information is output (step S192). In this example, set the secret value sk , i = e 1, v1 |...|e u, vu |...|e d, vd |z, and set the label output information a k, i = G(e 1 , vl |...|e u, vu |...|e d, vd |z). In addition, the order of bit arrangement of each element e u, vu and the variety value z, and the number of bit-combined variety values z are not limited thereto. Furthermore, when the various values z=π(x) corresponding to x∈{1,...,t} do not match, the hash calculation unit 1012 generates label output information while the elements of the secret value memory 1011 are not updated. The diversity value z used for a k,i is different for each communication.

生成的标签输出信息ak,i被发送到接口114,接口114输出该标签输出信息ak,i(步骤S193)。The generated label output information a k,i is sent to the interface 114, and the interface 114 outputs the label output information a k,i (step S193).

之后,在控制部115中,进行x←x+1的运算(累加)(步骤S194),并判断是否为x>t(步骤S195)。这里,如果判断为不是x>t,则在存储器115a中保持x的值的状态下结束标签装置1010的处理。Thereafter, in the control unit 115, the calculation (cumulation) of x←x+1 is performed (step S194), and it is judged whether or not x>t (step S195). Here, if it is judged not to be x>t, the processing of the tag device 1010 ends while the value of x is held in the memory 115a.

另一方面,在判断为x>t的情况下,在控制部115中,将存储器115a的计数值x设为x←1(步骤S196),在散列运算部1013中,从秘密值存储器1011中至少提取一部分的eu’,vu’(u’∈{1,...,d}),并计算提取的eu’,vu’的散列值H(eu’,vu’)(步骤S197)。然后,在散列值运算部1013中,将该散列值H(eu’,vu’)作为新的eu’,vu’+1覆盖在秘密值存储器1011上(步骤S198)。另外,u’∈{1,...,d}的选择方法怎么样都可以。On the other hand, when it is determined that x>t, the control unit 115 sets the counter value x of the memory 115a to x←1 (step S196), and the hash operation unit 1013 retrieves the value from the secret value memory 1011 Extract at least a part of e u', vu' (u'∈{1,...,d}), and calculate the hash value H(e u', vu' ) of the extracted e u', vu' ( Step S197). Then, in the hash value calculation unit 1013, the hash value H( eu', vu' ) is overwritten on the secret value memory 1011 as new e u', vu'+1 (step S198). In addition, any selection method of u'∈{1, . . . , d} may be used.

<读取装置的处理><Handling of reading device>

与实施例8同样。Same as in Example 8.

<后端装置的处理><Handling of back-end devices>

从读取装置120发送的标签输出信息ak,i以及物流信息pd在通信部132中被接收,并存储在存储器136a中(步骤S201)。The tag output information a k, i and distribution information pd transmitted from the reader 120 are received by the communication unit 132 and stored in the memory 136a (step S201).

以此为触发,控制部136将1代入n并存储在存储器136a中(步骤S220),如下选择d个wu的组合,将该组合存储在存储器136a中(步骤S203)。Using this as a trigger, the control unit 136 substitutes 1 for n and stores it in the memory 136a (step S220), selects a combination of d w u as follows, and stores the combination in the memory 136a (step S203).

(w1,...,wd)∈Sw={w1,...,wd|wu∈[0,jmax]}(w 1 ,...,w d )∈S w ={w 1 ,...,w d |w u ∈[0,j max ]}

接着,控制部136参照存储器136a的n,d个wu的组合,进而参照散列值存储器838,检验对标签ID信息idn所对应的d个初始要素fu,0(u∈{1,...,d})分别使用了wu次散列函数H的散列值Hwu(fu,0)是否被存储在散列值存储器838中(是否生成完毕)(步骤S204)。另外,Hwu(fu,0)的上标字wu表示wuNext, the control unit 136 refers to the combination of n and d w u in the memory 136a, and further refers to the hash value memory 838, and checks the d initial elements f u , 0 (u∈{1, ..., d}) whether the hash value H wu (fu , 0 ) using the hash function H w u times is stored in the hash value memory 838 (whether the generation is completed) (step S204 ). In addition, the superscript wu of H wu (fu , 0 ) means w u .

这里,在判断为标签ID信息idn所对应的散列值Hwu(fu,0)中存在还没有被进行运算的值的情况下,散列运算部837从数据库存储器1031中提取上述“标签ID信息idn所对应的散列值Hwu(fu,0)中还没有被进行运算的值”所对应的初始要素fu,0,并对该初始要素fu,0使用wu次散列函数H并计算散列值Hwu(fu,0)(步骤S205)。计算出的散列值Hwu(fu,0)被存储在散列值存储器838中(步骤S206),返回步骤S204的处理。Here, when it is determined that the hash value H wu (fu , 0 ) corresponding to the tag ID information id n has a value that has not yet been calculated, the hash calculation unit 837 extracts the above-mentioned " The hash value H wu (fu , 0 ) corresponding to the tag ID information id n corresponds to the initial element f u, 0 corresponding to the value that has not yet been operated, and uses w u for the initial element f u, 0 second hash function H and calculate the hash value H wu (fu , 0 ) (step S205). The calculated hash value H wu (fu , 0 ) is stored in the hash value memory 838 (step S206), and the process returns to step S204.

另一方面,在步骤S204的判断中,在判断为标签ID信息idn所对应的散列值Hwu(fu,0)都生成完毕的情况下,控制部136参照存储器136a的n,d个wu的组合,使散列运算部1033(相当于“第三运算部”)从散列值存储器838中提取对标签ID信息idn所对应的d个初始要素fu,0(u∈{1,...,d})分别使用了wu次第一函数F1的散列值Hwu(fu,0)(步骤S207)。而且,控制部136将计数值x’设为1并存储在存储器136a中(步骤S208),从数据库存储器1031中提取多样值z=π(x’)并发送到散列运算部1033。然后,散列运算部1033计算对散列值Hwu(fu,0)和多样值z的位结合值使用了散列值G的运算值c(步骤S209)。另外,作为运算值c,例如可以例示c=G(Hw1(f1,0)|…|Hwu(fu,0)|…|Hwd(fd,0)|z),但各散列值Hwu(fu,0)和多样值z的位配置顺序、位结合的多样值z的数不限于此。但是,其顺序有必要对应于标签装置1010的散列运算部1012中的各要素的位配置顺序。On the other hand, in the judgment of step S204, when it is judged that the hash values H wu (fu , 0 ) corresponding to the tag ID information id n have all been generated, the control unit 136 refers to n, d in the memory 136a. The combination of w u makes the hash operation unit 1033 (equivalent to the “third operation unit”) extract from the hash value memory 838 d initial elements f u,0 (u∈) corresponding to the tag ID information id n {1, . . . , d}) respectively use the hash value H wu (fu , 0 ) of the first function F1 w u times (step S207 ). Then, the control unit 136 sets the counter value x′ to 1 and stores it in the memory 136 a (step S208 ), and extracts a variety value z=π(x′) from the database memory 1031 and sends it to the hash operation unit 1033 . Then, the hash operation unit 1033 calculates an operation value c obtained by using the hash value G for the bit combination value of the hash value H wu (fu ,0 ) and the diversity value z (step S209 ). In addition, as the calculated value c, for example, c=G(H w1 (f 1,0 )|...|H wu (f u,0 )|...|H wd (f d,0 )|z) can be exemplified, but each The bit arrangement order of the hash value H wu (fu , 0 ) and the various values z, and the number of the various values z combined with bits are not limited thereto. However, the order needs to correspond to the bit arrangement order of each element in the hash calculation unit 1012 of the tag device 1010 .

接着,在比较部134中,从存储器136a中读取标签输出信息ak,i,从散列运算部1033接受上述运算值c,比较它们从而判断是否为c=ak,i(步骤S210)。在本例中,比较散列值c=G(Hw1(f1,0)|…|Hwu(fu,0)|…|Hwd(fd,0)|z)和标签输出信息ak,iNext, in the comparison unit 134, the tag output information a k,i is read from the memory 136a, the above-mentioned calculation value c is received from the hash calculation unit 1033, and they are compared to determine whether c=a k,i (step S210) . In this example, compare the hash value c=G(H w1 (f 1, 0 )|…|H wu ( fu, 0 )|…|H wd (f d, 0 )|z) and the label output information a k, i .

这里,在判断为它们不一致的情况下,控制部136判断存储器136a的x’是否为t(步骤S211)。这里,在不是x’=t的情况下,控制部用x’+1更新存储器136a的x’并执行步骤S209以后的处理(步骤S323),另一方面,在判断为x’=t的情况下,控制部参照存储器136a判断是否所有的d个组合方式(w1,...,wd)∈Sw选择完毕(步骤S213)。Here, when it is judged that these do not match, the control part 136 judges whether x' of the memory 136a is t (step S211). Here, when x'=t is not the case, the control unit updates x' in the memory 136a with x'+1 and executes the processing after step S209 (step S323). On the other hand, when it is judged that x'=t Next, the control unit refers to the memory 136a to judge whether or not all the d combinations (w 1 , . . . , w d )εS w have been selected (step S213).

这里,在判断为存在还没有被选择的组合式样的情况下,控制部136选择新的组合(w1,...,wd)∈Sw,并将它们存储在存储器136a中(步骤S214),对于该新的组合以及n,执行步骤S204以后的处理。另一方面,在步骤S213的判断中,在所有的组合方式被选择了的情况下,控制部136参照存储器136a的n判断是否为n=m(步骤S215)。这里,在判断为不是n=m时,控制部136用n+1更新存储器136a的n(步骤S216),执行步骤S204以后的处理。另一方面,在判断为n=m的情况下错误结束处理(步骤S217)。Here, when it is judged that there are combinations that have not been selected yet, the control unit 136 selects new combinations (w 1 , . . . , w d )∈S w and stores them in the memory 136a (step S214 ), for the new combination and n, the processing after step S204 is executed. On the other hand, in the judgment of step S213, when all the combinations are selected, the control unit 136 refers to n of the memory 136a and judges whether or not n=m (step S215). Here, when it is judged that n=m is not, the control unit 136 updates n in the memory 136a with n+1 (step S216), and executes the processing after step S204. On the other hand, when it is judged that n=m, the processing is ended by mistake (step S217).

另外,步骤S204~216的处理,在控制部136的控制下,如果标签输出信息ak i与运算值c不一致,则相当于变化n、wu以及z的至少一部分的值,并再进行散列运算部1033以及比较部134中的处理。In addition, in the processing of steps S204 to 216, under the control of the control unit 136, if the label output information a k i does not match the calculated value c, it is equivalent to changing at least a part of the values of n, w u , and z, and then hashing Processing in the calculation unit 1033 and the comparison unit 134 .

另一方面,在步骤S210中,在判断为散列值c和标签输出信息ak,i一致的情况下,读写部135在控制部136的控制下,从数据库存储器1031中选择与对应于该散列值c的多个初始要素fu,0的组合所对应的标签ID信息idn,并提取该标签ID信息idn和与其对应的数据datan发送给通信部132。而且,读写部135从存储器136a接受物流信息pd,将该物流信息pd作为对应于标签ID信息idn的数据datan,追加写入数据库存储器1031(步骤S218)。被发送到通信部132的标签ID信息idn和数据datan通过网络140被发送到读取装置120(步骤S219)。On the other hand, in step S210, if it is determined that the hash value c matches the tag output information a k,i , the read/write unit 135 selects from the database memory 1031 the information corresponding to The tag ID information id n corresponding to the combination of multiple initial elements f u and 0 of the hash value c is extracted, and the tag ID information id n and corresponding data data n are extracted and sent to the communication unit 132 . Then, the read/write unit 135 receives the physical distribution information pd from the memory 136a, and additionally writes the physical distribution information pd into the database memory 1031 as data data n corresponding to the tag ID information id n (step S218). The tag ID information id n and data data n sent to the communication unit 132 are sent to the reader 120 via the network 140 (step S219 ).

<实施例10的特征><Features of Embodiment 10>

[不可追踪性][Untraceability]

本实施例的标签装置1010将要素eu,vu和多样值z的位结合值的散列值作为标签输出信息ak,i。因此,如果不更新要素eu,vu也可以使多样值z变化,则可以使输出值变化。而且,由于散列函数的单方向性,而无法取得这样变化的输出值的相关。而且,由于多样值z为t种类的值,所以标签装置即使不更新要素eu,vu也可以进行最大t次的追踪困难的通信。The labeling device 1010 of this embodiment outputs the information a k,i using the hash value of the element eu ,vu and the bit-combined value of the diversity value z as a label. Therefore, it is possible to change the output value by changing the diversity value z without updating the element e u, vu . Furthermore, due to the unidirectionality of the hash function, it is impossible to correlate such a changed output value. Furthermore, since the multivariate value z is a value of t types, the tag device can perform communications that are difficult to trace up to t times without updating the elements e u, vu .

[效率性][efficiency]

本实施例的标签装置1010对t次通信仅更新依次秘密值存储器11的要素eu,vu。因此,可以将标签装置1010的更新处理运算量降低到1/t。The tag device 1010 of this embodiment updates only the elements e u, vu of the sequential secret value memory 11 for t times of communication. Therefore, it is possible to reduce the update processing calculation amount of the tag device 1010 to 1/t.

而且,后端装置1030的散列值c和标签输出信息ak,i的比较处理每次最大可以进行T次而不用变更散列值Hwu(fu,0)的组合。因此,即使在增加了标签装置210的允许通信次数(从读取装置120到标签装置1010的调用次数的最大值)的情况下,后端装置1030中的散列处理也不怎么增加。Furthermore, the comparison process between the hash value c of the backend device 1030 and the label output information a k,i can be performed T times at most each time without changing the combination of the hash value H wu (fu ,0 ). Therefore, even when the allowable number of communications of the tag device 210 (the maximum number of calls from the reading device 120 to the tag device 1010) is increased, the hash processing in the backend device 1030 does not increase much.

[实施例11][Example 11]

实施例11是实施例10的变形例,标签装置的多样值存储器中对各u(u∈{1,...,d})存储取tu种类(tu≥2)的值的多样值zu,将从秘密值存储器中提取的各要素eu,vu和任何的多样值zu的位结合值的标签输出信息ak,i=G(e1,v1|z1|…|ed,vd|zd)作为输出值,这一点与实施例10不同。而且,秘密值存储器的各u(u∈{1,...,d})所对应的要素eu,vu的更新分别每tu次通信进行1次,但在实施例11中各要素eu,vu被更新的通信时点移位,在标签装置每次输出标签输出信息ak,i时,秘密值存储器的其中一个的要素eu’,vu’(u’∈{1,...,d})被更新。由此,即使在哪个通信时点标签装置被干预也无法追踪标签装置。Embodiment 11 is a modified example of Embodiment 10. In the multi-value memory of the tag device, a multi-value that takes the value of t u type (t u ≥ 2) is stored for each u (u ∈ {1, ..., d}) z u , the label output information a k ,i =G(e 1,v1 |z 1 |…|e d , vd |z d ) as the output value, which is different from Embodiment 10. In addition, the elements e u and vu corresponding to each u (u∈{1,...,d}) of the secret value memory are updated once every t u communication, but in the eleventh embodiment, each element e The communication time point when u and vu are updated is shifted. When the tag device outputs the tag output information a k, i each time, one of the elements e u', vu' (u'∈{1, .. ., d}) is updated. Therefore, even if the tag device is tampered with at any time of communication, the tag device cannot be tracked.

以下,仅说明和实施例1、实施例10的不同点,对与实施例1、实施例10的方式共同的事项省略说明。Hereinafter, only the points of difference from Embodiment 1 and Embodiment 10 will be described, and descriptions of matters common to the aspects of Embodiment 1 and Embodiment 10 will be omitted.

图24是例示实施例11中的标签自动识别系统1100的整体结构的图。而且,图25是用于说明标签装置1110的处理的流程图,图26是用于说明后端装置1130的处理的一部分的流程图。另外,在图24中,对与实施例1、实施例8共同的功能结构赋予与实施例2、15相同的标号。而且,在图24中,仅例示了一个标签装置1110,但实际存在多个标签装置1110。FIG. 24 is a diagram illustrating an overall configuration of an automatic tag identification system 1100 in Embodiment 11. As shown in FIG. Furthermore, FIG. 25 is a flowchart for explaining the processing of the tag device 1110 , and FIG. 26 is a flowchart for explaining a part of the processing of the backend device 1130 . In addition, in FIG. 24, the same code|symbol as Example 2, 15 is attached|subjected to the functional structure common to Example 1, Example 8. Furthermore, in FIG. 24 , only one label device 1110 is illustrated, but actually a plurality of label devices 1110 exist.

以下,使用这些图说明本实施例的功能结构以及处理方法。Hereinafter, the functional configuration and processing method of this embodiment will be described using these figures.

<预处理><preprocessing>

与实施例10的不同点在于,在标签装置1110的多样值生成部1115中,对各u(u∈{1,...,d})设定取tu种类(tu≥2)的值的多样值zu,并将其存储在多样值存储器1116(相当于“第一多样值存储器”)中,以及在后端装置1130的数据库存储器1131(相当于“第二多样值存储器”)中对各u(u∈{1,...,d})存储取tu种类(tu≥2)的值的多样值zu。另外,数据库存储器1131中存储的各多样值zu与各标签装置1110中存储的多样值zu相同。The difference from Embodiment 10 is that, in the multi-value generating unit 1115 of the tag device 1110, a value of tu type (t u 2) is set for each u (u∈{1,...,d}). The multi-value z u of the value, and store it in the multi-value storage 1116 (equivalent to "the first multi-value storage"), and in the database storage 1131 of the back-end device 1130 (equivalent to the "second multi-value storage") ”) stores a variety of values z u that take values of the type t u (t u ≥ 2) for each u (u∈{1, . . . , d}). In addition, the various values z u stored in the database memory 1131 are the same as the various values z u stored in each tag device 1110 .

另外,作为多样值生成部1115,可以例示对于各u(u ∈{1,...,d})对zu=1...t进行计数的计数器,进行zu=H(seed,xu)、xu∈{1,...,tu}的运算的散列运算装置,进行zu=Hxu(seed)、xu∈{1,...,tu}的运算的散列运算装置等。以下,将多样值zu表现为zu=πu(xu)、xu∈{1,...,tu}。而且,对于同一个u,最好将πu设定为对应于各个xu∈{1,...,tu}的各多样值zu=πu(xu)不一致。In addition, as the diverse value generation unit 1115, a counter that counts z u =1...t for each u(u ∈ {1,...,d}) can be exemplified, and z u =H(seed, x u ), x u ∈ {1, ..., t u } operation hash operation device, performing z u = H xu (seed), x u ∈ {1, ..., t u } operation Hash operation device, etc. Hereinafter, the multivariate value z u is expressed as z uu (x u ), x u ∈ {1, . . . , t u }. Moreover, for the same u, it is better to set π u so that the various values z uu (x u ) corresponding to each x u ∈ {1,...,t u } are inconsistent.

而且,在实施例11中,将各xu设为xu=i+εu(u∈{1,...,d})。这里,i表示标签装置1110的通信次数,εu表示示出从各xu的i的偏离的常数(0≤εu≤rmax的整数)。这里,rmax是从读取装置120到标签装置1110的调用次数的最大值。Furthermore, in Embodiment 11, each x u is set to x u =i+ε u (u∈{1,...,d}). Here, i represents the number of times of communication of the tag device 1110, and εu represents a constant (integer of 0≤εu≤rmax ) indicating a deviation from i of each x u . Here, r max is the maximum value of the calling times from the reading device 120 to the tag device 1110 .

进而,在实施例11中,在所有的通信时点,设定εu以及tu,以便任何的xu一定为xu=tu。例如,将对于各u(u∈{1,...,d})的tu都设为同一值,设定各εu,以便εu(u∈{1,...,d})的集合成为小于tu的自然数的整体集合。Furthermore, in Embodiment 11, ε u and t u are set so that any x u is always x u =t u at all communication timings. For example, set t u for each u(u∈{1,...,d}) to the same value, and set each ε u so that ε u (u∈{1,...,d}) The set of becomes the whole set of natural numbers less than t u .

而且,多样值zu的生成以及存储不一定在预处理中进行,在标签装置1110的通信处理时,或后端装置1130的检索处理时进行也可以。In addition, generation and storage of the diverse value z u are not necessarily performed in the pre-processing, but may be performed during the communication processing of the tag device 1110 or the retrieval processing of the back-end device 1130 .

<标签装置的处理><Handling of Label Device>

以下,说明使读取装置120第i(i是自然数)次读取标签装置1110时的处理。另外,计数值xu(u∈{1,...,d})的初始值(i=1)为1+εu,各计数值xu在控制部115的控制下保存在存储器115a中。Hereinafter, the processing when causing the reading device 120 to read the tag device 1110 for the ith (i is a natural number) time will be described. In addition, the initial value (i=1) of the count value x u (u∈{1, ..., d}) is 1+ε u , and each count value x u is stored in the memory 115a under the control of the control unit 115 .

首先,在散列运算部1112(相当于“第二运算部”)中,从秘密值存储器1111中提取各要素eu,vu,并从多样值存储器1116中提取任何的多样值zu(在本例中为zu=πu(xu))(步骤S231)。然后,散列运算部1112计算对提取的各要素eu,vu和任何的多样值z的位结合值(秘密值sk,i)的散列值的标签输出信息ak,i=G(e1,v1|z1|…|ed,vd|zd)(步骤S232)。另外,在对于同一个u,将πu设定为对应于各个xu∈{1,...,tu}的各多样值zu=πu(xu)不一致的情况下,秘密值存储器1111的要素不被更新期间,散列运算部1112生成标签输出信息ak,i所使用的多样值zu,对于每个通信不同。而且,秘密值sk,i=e1,v1|z1|…|ed,vd|zd中的位结合顺序不特别限定于此。生成的标签输出信息ak,i被发送到接口114,接口114发送该标签输出信息ak,i(步骤S233)。First, in the hash calculation unit 1112 (corresponding to the “second calculation unit”), each element e u, vu is extracted from the secret value memory 1111, and any various value z u is extracted from the various value memory 1116 (in In this example, z uu (x u )) (step S231). Then, the hash calculation unit 1112 calculates the tag output information a k ,i =G( e 1, v1 |z 1 |...|e d, vd |z d ) (step S232). In addition, when π u is set such that various values z uu (x u ) corresponding to each x u ∈ {1,...,t u } do not match for the same u, the secret value While the elements of the memory 1111 are not being updated, the various values z u used by the hash calculation unit 1112 to generate the tag output information a k, i are different for each communication. Also, the order of combining bits in the secret value s k,i =e 1,v1 |z 1 |...| ed,vd |z d is not particularly limited thereto. The generated label output information a k,i is sent to the interface 114, and the interface 114 sends the label output information a k,i (step S233).

之后,在控制部136中,对存储器136a的xu进行xu←xu+1(u∈{1,...,d})的运算(步骤S234)。这里,在实施例11中,在所有的通信时点,设定εu以及tu,以便任何的xu一定为xu=tu。因此,通过该xu←xu+1的运算,一定任何的xu成为xu>tu。控制部136接着将1代入该成为xu>tu的xu(步骤S235)。另外,在本实施例中,将对应于该xu的u设为u’。Thereafter, in the control unit 136, the calculation of x u ← x u + 1 (u∈{1, . . . , d}) is performed on x u in the memory 136a (step S234). Here, in the eleventh embodiment, ε u and t u are set so that any x u is always x u =t u at all communication timings. Therefore, by the operation of x u ← x u +1, any x u must be x u >t u . Next, the control unit 136 substitutes 1 into the x u where x u >t u (step S235). In addition, in this embodiment, u corresponding to this x u is set to u'.

接着,在散列运算部813中,从秘密值存储器1111中提取一部分的要素eu’,vu’(上述u’∈{1,...,d}所对应的要素),并计算提取的要素eu’,vu’的散列值H(eu’,vu’)(步骤S236)。然后,在散列运算部813中,将该散列值H(eu’,vu’)作为新的要素eu’,vu+1覆盖在秘密值存储器1111上(步骤S237),结束标签装置1110的处理。Next, in the hash operation unit 813, a part of elements e u', vu' (elements corresponding to the aforementioned u'∈{1,...,d}) are extracted from the secret value memory 1111, and the extracted Hash value H( eu', vu' ) of elements e u', vu' (step S236). Then, in the hash calculation unit 813, the hash value H( eu', vu' ) is overwritten on the secret value memory 1111 as a new element eu', vu+1 (step S237), and the tag device is terminated. 1110 processing.

通过以上的处理,在每次接口114输出标签输出信息ak,i时,在散列运算部813中,从秘密值存储器1111至少提取一个要素eu’,vu’(u’∈{1,...,d}),并计算提取的要素eu’,vu’的散列值H(eu’,vu’),并更新秘密值存储器1111。Through the above processing, each time the interface 114 outputs the label output information a k,i , in the hash operation unit 813, at least one element e u', vu' (u'∈{1, ..., d}), and calculate the hash value H(eu ', vu') of the extracted elements e u ', vu' , and update the secret value memory 1111.

<读取装置的处理><Handling of reading device>

与第一实施方式同样。The same as the first embodiment.

<后端装置的处理><Handling of back-end devices>

实施例11与实施例10的不同点在于代替图23所示的步骤S208到S213的处理,进行图S26的处理。Embodiment 11 differs from Embodiment 10 in that the processing of FIG. S26 is performed instead of the processing of steps S208 to S213 shown in FIG. 23 .

即,步骤S207的处理后,控制部136如下选择(x1,...,xd)∈Sx的组合,并将它们存储在存储器136a中(步骤S241)。That is, after the process of step S207, the control unit 136 selects combinations of (x 1 , . . . , x d )∈S x as follows, and stores them in the memory 136a (step S241).

(x1,...,xd)∈Sx={x1,...,xd|xu∈[0,tu]}(x 1 ,...,x d )∈S x ={x 1 ,...,x d |x u ∈[0,t u ]}

然后,控制部136参照存储器136a的(x1,...,xd)∈Sx的组合,从数据库存储器1131提取对应于它们的d个多样值zu=π(xu)(u∈{1,...,d})并发送到散列运算部1133。散列运算部1133计算对散列值Hwu(fu,0)和多样值zu的位结合值使用散列值G的运算值c(步骤S242)。另外,作为运算值c,例如可以例示c=G(Hw1(f1,0)|z1|…|Hwu(fu,0)|zu…|Hwd(fd,0)|zd),但各散列值Hwu(fu,0)和多样值zu的位配置顺序不限定于此。但是,其顺序必须与标签装置1110的散列运算部1112的各要素的位配置顺序对应。Then, the control unit 136 refers to the combination of (x 1 , ..., x d )∈S x in the memory 136a, and extracts d diverse values z u =π(x u )(u∈ {1,...,d}) and sent to the hash operation unit 1133. The hash operation unit 1133 calculates an operation value c obtained by using the hash value G for the bit combination value of the hash value H wu (fu , 0 ) and the diversity value z u (step S242). In addition, as the calculated value c, for example, c=G(H w1 (f 1,0 )|z 1 |...|H wu (f u,0 )|z u ...|H wd (f d,0 )| z d ), but the order of bit arrangement of each hash value H wu (fu , 0 ) and diversity value z u is not limited to this. However, the order must correspond to the bit arrangement order of each element of the hash calculation unit 1112 of the tag device 1110 .

接着,在比较部134中,从存储器136a读取标签输出信息ak,i,从散列运算部1133接受上述运算值c,对它们进行比较从而判断是否为c=ak,i(步骤S243)。在本例中,比较散列值c=G(Hw1(f1,0)|z1|…|Hwu(fu,0)|zu…|Hwd(fd,0)|zd)和标签输出信息ak,iNext, in the comparison unit 134, the tag output information a k,i is read from the memory 136a, the above-mentioned calculation value c is received from the hash operation unit 1133, and they are compared to determine whether c=a k,i (step S243 ). In this example, compare the hash values c=G(H w1 (f 1,0 )|z 1 |...|H wu (f u,0 )|z u ...|H wd (f d,0 )|z d ) and label output information a k, i .

这里,在判断为它们不一致的情况下,控制部136参照存储器136a判断所有的组合式样(x1,...,xd)∈Sx是否选择完毕(步骤S244)。这里,在判断为不是所有的组合式样(x1,...,xd)∈Sx选择完毕的情况下,控制部136选择新的组合(x1,...,xd)∈Sx,并将它们存储在存储器136a之后,执行步骤S242以后的处理。另一方面,通过步骤S244的判断,在判断为所有的组合式样(x1,...,xd)∈Sx选择完毕的情况下,进至图23的步骤S213。另一方面,在步骤S243的处理中判断为c=ak,i的情况下,进至图23的步骤S218。Here, when it is determined that they do not match, the control unit 136 refers to the memory 136a to determine whether or not all combination patterns (x 1 , . . . , x d )εS x have been selected (step S244). Here, when it is determined that not all combination patterns (x 1 , ..., x d )∈S x have been selected, the control unit 136 selects a new combination (x 1 , ..., x d )∈S x , and store them in the memory 136a, the processing after step S242 is executed. On the other hand, when it is judged by the judgment in step S244 that all combination patterns (x 1 , ..., x d )∈S x have been selected, the process proceeds to step S213 in FIG. 23 . On the other hand, when it is determined in the process of step S243 that c= ak,i , the process proceeds to step S218 of FIG. 23 .

[效率性][efficiency]

后端装置1130的散列值c和标签输出信息ak,i的比较处理每次最大进行t1+t2+...+td-1+td次而不用变更散列值Hwu(fu,0)的组合。因此,即使在增加了标签装置1110的允许通信次数(从读取装置120到标签装置1110的调用次数的最大值)的情况下,后端装置1130中的处理也不怎么增加。The comparison process between the hash value c of the back-end device 1130 and the tag output information a k,i is performed at most t 1 +t 2 +...+t d-1 +t d times each time without changing the hash value H wu (fu , 0 ) combinations. Therefore, even in the case where the allowable number of communications of the tag device 1110 (the maximum number of calls from the reading device 120 to the tag device 1110 ) is increased, the processing in the backend device 1130 does not increase so much.

[不可追踪性][Untraceability]

实施例11的标签装置1110在每次输出标签输出信息ak,i时,通过散列链更新存储在秘密值存储器1111中的任何的要素eu’,vu’(u’∈{1,...,d})。因此,即使标签装置1110被干预,秘密值存储器1111内的要素eu’,vu’泄漏给攻击者,由于散列函数的单方向性,攻击者也无法取得更新前的要素eu’,vu’-t和更新后的要素eu’,vu’的相关。因此,攻击者也无法取得从秘密值存储器1111取得的要素和过去从标签装置输出的输出值的相关。由此,可以防止标签装置1110的追踪。The labeling device 1110 of Embodiment 11 updates any element e u', vu' (u'∈{1,. . . , d}). Therefore, even if the tag device 1110 is tampered with and the elements e u', vu' in the secret value memory 1111 are leaked to the attacker, due to the unidirectional nature of the hash function, the attacker cannot obtain the elements e u', vu before the update Correlation of '-t and updated elements e u', vu' . Therefore, an attacker cannot obtain the correlation between the element obtained from the secret value memory 1111 and the output value output from the tag device in the past. Thus, tracking of the tag device 1110 can be prevented.

进而,在实施例11中,即使在标签装置1110被干预,各多样值zu泄漏的情况下,存储在秘密值存储器1111中的任何的要素eu’,vu’被覆盖更新。由此,可以将标签装置1110被干预的情况下的影响抑制到最小限度。Furthermore, in Embodiment 11, even if the tag device 1110 is tampered with and various values z u are leaked, any elements eu ', vu' stored in the secret value memory 1111 are overwritten and updated. In this way, it is possible to minimize the influence when the tag device 1110 is tampered with.

另外,在实施例11中,在所有的通信时点,设定εu以及tu,以便任何的xu一定为xu=tu。换言之,例如,设为ti=t2=...=td,将对应于要素eu,vu的计数器xu每次偏离一个的(xu=i+u/d)。In addition, in Embodiment 11, ε u and t u are set so that any x u is always x u =t u at all communication timings. In other words, for example, assuming t i =t 2 =...=t d , the counter x u corresponding to the elements e u, vu is shifted one by one (x u =i+u/d).

但是,不使tu(u∈{1,...,d})都相等,将对应于各要素eu,vu的计数器xu每次偏离将最大的tu进行了d等分的间隔也可以。在该情况下,有时不满足完全的前向安全(forward secure)的性质,但至少可以抑制被干预时的影响。However, instead of making all t u (u∈{1,...,d}) equal, the counter x u corresponding to each element e u, vu deviates every time the largest t u is divided into d equal intervals also can. In this case, the property of complete forward security may not be satisfied, but at least the influence of the intervention can be suppressed.

[实施例12][Example 12]

实施例12是实施例11的变形例。与实施例11同样,在实施例12中各要素eu,vu被更新的通信时点也移位。但是,在实施例12中,标签装置在每一次将标签输出信息ak,i输出∑u=1 dtu次时,提取任何的要素eu’,vu’,并计算提取的要素eu’,vu’的散列值H(eu’,vu’)。Example 12 is a modified example of Example 11. Similar to the eleventh embodiment, in the twelfth embodiment, the communication timing at which the elements e u and vu are updated is also shifted. However, in Embodiment 12, when the labeling device outputs the label output information a k,i every time ∑ u=1 d t u times, it extracts any element e u', vu' , and calculates the extracted element e u The hash value H(e u', vu' ) of ', vu' .

具体来说,实施例12的标签装置对于来自外部的每个访问,对与d个要素eu,vu的任何一个对应的计数器xu∈{1,...,tu}累加(例如,以e1,v1…ed,vd的顺序每次加1)。这里,由于该计数器xu对应于构成标签输出信息ak,i=G(e1,v1|z1…|ed,vd|zd)的多样值zu,所以该标签装置不更新各要素eu,vu,而可以将不同的值的标签输出信息ak,i输出∑u=1 dtu次。在本实施例中,在每次输出∑u=1 dtu次该标签输出信息ak,i时更新任何的各要素eu,vu,由此保持标签装置的输出值的多样性,同时将标签装置的更新运算量抑制在最小限度。Specifically, the tag device of Embodiment 12 accumulates a counter x u ∈ {1, ..., t u } corresponding to any one of d elements e u, vu for each access from the outside (for example, Add 1 each time in the order of e 1, v1 ... e d, vd ). Here, since the counter x u corresponds to the diverse value z u constituting the tag output information a k,i =G(e 1, v1 | z 1 ... | e d, vd | z d ), the tag device does not update each elements e u, vu , and label output information a k, i of different values can be output ∑ u=1 d t u times. In this embodiment, any element e u, vu is updated when the tag output information a k,i is output every time Σ u=1 d t u times, thereby maintaining the diversity of the output value of the tag device, and at the same time Minimizes the amount of updating calculations for tag devices.

以下,说明与实施例1、11的不同点,并省略与实施例1、11共同的事项的说明。Hereinafter, differences from Embodiments 1 and 11 will be described, and descriptions of matters common to Embodiments 1 and 11 will be omitted.

图27是用于说明实施例12的标签装置的处理的流程图。另外,整体的功能结构与实施例11同样(图24)。Fig. 27 is a flowchart for explaining the processing of the label device according to the twelfth embodiment. In addition, the overall functional structure is the same as that of Embodiment 11 (FIG. 24).

以下,使用这些图说明本实施例的处理方法。Hereinafter, the processing method of this embodiment will be described using these figures.

<预处理><preprocessing>

在实施例11中,设为xu=i+εu(u∈{1,...,d}),在所有的通信时点,设定εu以及tu,以便任何的xu一定为xu=tu,但在实施例12中,不特别进行这样的限定。In Embodiment 11, set x u =i+ε u (u∈{1,...,d}), set ε u and t u at all communication time points, so that any x u must be x u =t u , but in Example 12, such a limitation is not particularly imposed.

<标签装置的处理><Handling of Label Device>

以下,说明使读取装置20第i次读取标签装置310时的处理。另外,计数值xu(u∈{1,...,d})的初始值(i=1)为1,u’以及u’的初始值也是1。另外,u’对应于更新的要素eu’,vu’,u”对应于累加的要素eu’,vu’的计数值xu”。而且,各参数在控制部136的控制下存储在存储器136a中。Hereinafter, the processing when the reading device 20 is made to read the tag device 310 for the ith time will be described. In addition, the initial value (i=1) of the count value x u (u∈{1, . . . , d}) is 1, and the initial values of u′ and u′ are also 1. In addition, u' corresponds to the updated element e u', vu' , and u" corresponds to the count value x u" of the accumulated element e u', vu' . Furthermore, each parameter is stored in the memory 136 a under the control of the control unit 136 .

首先,在散列运算部1112中,从秘密值存储器1111中提取各要素eu,vu,并从多样值存储器1116中提取任何的多样值zu(在本例中为zu=πu(xu))(步骤S241)。然后,散列运算部1112计算提取的各要素eu,vu和任何的多样值zu的位结合值的标签输出信息ak,i=G(e1,v1|z1|…|ed,vd|zd)(步骤S242)。First, in the hash operation unit 1112, each element e u, vu is extracted from the secret value memory 1111, and any various value z u is extracted from the various value memory 1116 (in this example, z u = π u ( x u )) (step S241). Then, the hash operation unit 1112 calculates the tag output information a k ,i = G(e 1,v1 |z 1 |...| ed , vd |z d ) (step S242).

生成的标签输出信息ak,i被发送到接口114,接口114发送该标签输出信息ak,i(步骤S243)。The generated label output information a k,i is sent to the interface 114, and the interface 114 sends the label output information a k,i (step S243).

之后,在控制部136中,对存储器的xu”进行xu”←xu”+1(u”∈{1,...,d})的运算(步骤S244),并判断是否为xu”>tu”(tu”是xu”的最大值)(步骤S245)。这里,在判断为不是xu”>tu”的情况下结束标签装置1110的处理。Afterwards, in the control unit 136, the calculation of x u ← x u” + 1 (u” ∈ {1, . u" >t u" (t u" is the maximum value of x u" ) (step S245). Here, when it is judged not to be x u" >t u", the processing of the labeling device 1110 ends.

另一方面,在判断为是xu”>tu”的情况下,控制部136将u”+1代入存储器136a的u”(步骤S246),并判断是否为u”>d(步骤S247)。这里,在不是u”>d的情况下,结束标签装置1110的处理,在u”>d的情况下,在散列运算部813中,从秘密值存储器1111中提取要素eu’,vu’(对应于上述u’∈{1,...,d}的要素),并计算提取的要素eu’,vu’的散列值H(eu’,vu’)(步骤S248)。然后,在散列运算部813中,将该散列值H(eu’,vu’)作为新的要素eu’,vu’+1覆盖保存在秘密值存储器1111上(步骤S249)。On the other hand, when it is judged that x u" >t u" , the control unit 136 substitutes u"+1 into u" in the memory 136a (step S246), and judges whether u">d (step S247) Here, if u">d is not the case, the processing of the tag device 1110 is terminated, and in the case of u">d, the hash operation unit 813 extracts the elements e u', vu from the secret value memory 1111 ' (corresponding to the elements of u'∈{1,...,d} above), and calculate the hash value H(eu ', vu' ) of the extracted elements e u', vu' (step S248). Then, in the hash operation unit 813, the hash value H( eu', vu' ) is overwritten and stored in the secret value memory 1111 as a new element eu', vu'+1 (step S249).

之后,例如,在散列运算部813中,进行vu’←vu’+1的运算(更新次数)(步骤S250),并判断vu’是否超过要素eu’,vu’的更新次数的最大值(max)(步骤S251)。这里,在判断为不是vu’>max的情况下,结束标签装置1110的处理,在为vu’>max的情况下,在控制部136中,进行u’←u’+1(成为更新对象的要素的变更)和vu’←0(重置成为更新对象的要素的更新次数)的运算(步骤S252),并将这些结果存储在存储器136a中,从而结束标签装置1110中的处理。Afterwards, for example, in the hash operation unit 813, the calculation (number of updates) of vu'←vu'+1 is performed (step S250), and it is judged whether vu' exceeds the maximum value of the update times of elements e u', vu' (max) (step S251). Here, if it is judged not to be vu'>max, the processing of the labeling device 1110 ends, and if vu'>max, the control unit 136 performs u'←u'+1 (update target element change) and vu'←0 (resetting the update count of the element to be updated) (step S252), and these results are stored in the memory 136a, and the processing in the tag device 1110 ends.

通过以上的处理,在每次接口114输出∑u=1 dtu次标签输出信息ak,i时,在散列运算部813中,从秘密值存储器1111中提取任何的要素eu’,vu’,并计算提取的要素eu’,vu’的散列值H(eu’,vu’),更新秘密值存储器11。Through the above processing, every time the interface 114 outputs the label output information a k,i for Σ u=1 d t u times, in the hash calculation unit 813, any element e u′ is extracted from the secret value memory 1111, vu' , calculate the hash value H(e u ', vu' ) of the extracted elements e u', vu' , and update the secret value memory 11.

<读取装置的处理><Handling of reading device>

与实施例8同样。Same as in Example 8.

<后端装置的处理><Handling of back-end devices>

与实施例11同样。Same as in Example 11.

<实施例12的特征><Features of Embodiment 12>

[效率性][efficiency]

在实施例12中,由于在每次标签装置1110进行∑u=1 dtu次通信时,更新任何的要素eu’,vu’,所以可以削减标签装置1110的更新处理运算量。换言之,在本实施方式中,每次通信时置换∑u=1 dtu个多样值,同时生成并输出标签输出信息ak,i(e1,v1|z1|…|ed,vd|zd)。因此,在∑u=1 dtu次通信中,不更新要素eu,vu而可以确保标签装置的输出值的多样性。而且,通过在每次∑u=1 dtu次通信时更新任何的要素eu’,vu’,进而可以确保下一个∑u=1 dtu次的通信中的输出值的多样性。而且,要素eu’,vu’的更新在每∑u=1 dtu次通信时进行一次就可以,所以可以将标签装置1110的更新运算量抑制在最小限度。In the twelfth embodiment, since any element e u', vu' is updated every time the tag device 1110 performs Σ u = 1 d t u communications, it is possible to reduce the computational load of update processing of the tag device 1110. In other words, in this embodiment, Σ u=1 d t u diverse values are replaced each time of communication, and the label output information a k,i (e 1,v1 |z 1 |...|e d,vd |z d ). Therefore, in Σ u = 1 d t u times of communication, the diversity of the output value of the tag device can be ensured without updating the elements eu , vu . Furthermore, by updating any element e u', vu' every time Σ u = 1 d t u communication, it is possible to ensure the diversity of output values in the next Σ u = 1 d t u communication. In addition, the updating of the elements eu', vu' may be performed once every Σu =1 d tu communication, so the amount of updating computation of the tag device 1110 can be kept to a minimum.

[不可追踪性][Untraceability]

本实施例的标签装置1110在每次接口1114输出∑u=1 dtu次标签输出信息ak,i时,散列运算部813更新秘密值存储器1111。因此,即使标签装置1110被干预,秘密值存储器1111内的要素eu’,vu’泄漏给攻击者,攻击者可以得知的标签装置1110的过去的输出值的数也小于∑u=1 dtu个。由此,削减标签装置1110的更新运算处理量,同时可以抑制标签装置1110的追踪。The tag device 1110 of this embodiment updates the secret value memory 1111 every time the interface 1114 outputs tag output information a k,i times Σ u=1 d t u times. Therefore, even if the tag device 1110 is tampered with, and the elements e u' and vu' in the secret value memory 1111 are leaked to the attacker, the number of past output values of the tag device 1110 that the attacker can know is less than Σ u=1 d t u . Thereby, the amount of update calculation processing of the tag device 1110 can be reduced, and tracking of the tag device 1110 can be suppressed.

[实施例13][Example 13]

实施例13是实施例1至4、6至12的变形例,特征在于使用的两种类的散列函数G(x)以及散列函数H(x)。Embodiment 13 is a modified example of Embodiments 1 to 4 and 6 to 12, and is characterized in that two types of hash function G(x) and hash function H(x) are used.

以下,仅说明散列函数H(x),G(x)。Hereinafter, only the hash functions H(x), G(x) will be described.

<No1><No1>

本例的散列函数G(x)在将r设为自然数,将hash设为{0,1}*→{0,1}r的散列函数的情况下,是hash(1|x),散列函数H(x)是hash(0|x)。另外,α|β表示α和β的位结合。而且,也可以将散列函数G(x)设为hash(0|x),并将散列函数H(x)设为hash(1|x)。The hash function G(x) in this example is hash(1|x) when r is set as a natural number and hash is set as a hash function of {0, 1} * → {0, 1} r , The hash function H(x) is hash(0|x). In addition, α|β indicates a bit combination of α and β. Furthermore, the hash function G(x) may be hash(0|x), and the hash function H(x) may be hash(1|x).

<No2><No2>

本例的散列函数H(x)(第一函数F1)是在将r,s设为自然数,将hash设为{0,1}*→{0,1}r的散列函数,设为p∈{0,1}s的情况下的hash(p|x)。而且,散列函数G(x)(第二函数F2)是在设为p∈{0,1}s,p≠q的情况下的hash(q|x)。The hash function H(x) (first function F1) in this example is a hash function where r and s are set as natural numbers, and hash is set to {0, 1} * → {0, 1} r , set to hash(p|x) in the case of p ∈ {0, 1} s . Furthermore, the hash function G(x) (second function F2) is hash(q|x) when p∈{0,1} s and p≠q.

<No3><No3>

本例的散列函数H(x)(第一函数F1)是在设为p∈{0,1}s,将p对x的填充(padding)(对于x的p的填充)设为pad(x,p)的情况下的hash(pad(x,p))。而且,散列函数G(x)(第二函数F2)是在设为p∈{0,1}s、p≠q,将p对x的填充(padding)(对于x的p的填充)设为pad(x,p)的情况下的hash(pad(x,q))。另外,p或q对于x的填充位置(位列的位置)不特别限定。例如,可以在x的前或后将p或q位结合,或者也可以在x的位列的中途插入p或q。The hash function H(x) (the first function F1) in this example is set to p∈{0, 1} s , and the padding of p to x (the padding of p for x) is set to pad( hash(pad(x, p)) in the case of x, p). Furthermore, the hash function G(x) (second function F2) assumes p∈{0, 1} s and p≠q, and sets the padding of p to x (padding of p to x) to hash(pad(x,q)) in the case of pad(x,p). In addition, p or q is not particularly limited to the filling position (position of the bit string) of x. For example, p or q may be combined before or after x, or p or q may be inserted in the middle of the bit sequence of x.

<No4><No4>

本例的散列函数H(x)(第一函数F1)是在将hash设为{0,1}*→{0,1}r的散列函数的情况下的hash(x),散列函数G(x)(第二函数F2)是在将rx设为x的位反转的情况下的hash(rx)。The hash function H(x) (first function F1) of this example is hash(x) in the case where hash is set to {0, 1} * →{0, 1} r hash function, hash The function G(x) (second function F2 ) is hash(rx) in which rx is bit-reversed of x.

<实施例13的效果><Effect of Example 13>

在本实施例中,仅使用一种类的散列函数,不丧失其特性(单方向性,输出随机值)而可以实现两种类的散列运算G(x),H(x)。由此,可以缩小构成散列函数的电路规模。其结果,可以缩小标签装置中的电路规模并可以实现标签装置的低成本。In this embodiment, only one type of hash function is used, and two types of hash operations G(x), H(x) can be realized without losing its characteristics (unidirectionality, random value output). Thereby, the circuit scale constituting the hash function can be reduced. As a result, the scale of the circuit in the label device can be reduced and the cost of the label device can be realized.

[第二实施方式][Second Embodiment]

<结构><structure>

接着,说明本发明的第二实施方式。Next, a second embodiment of the present invention will be described.

在本方式中,在设置在标签装置的外部的更新装置中,将存储在标签装置中的隐匿ID信息通过规定的时机更新为难以把握与其的关联性的新的隐匿ID信息。In this form, the update device installed outside the tag device updates the privileged ID information stored in the tag device with new privileged ID information whose correlation is difficult to ascertain at predetermined timing.

<结构><structure>

图28是例示本方式的概略结构的方框图。FIG. 28 is a block diagram illustrating a schematic configuration of this embodiment.

如图28所例示的,本方式的更新系统1500具有标签装置1510以及设在其外部的安全服务器装置1560。As shown in FIG. 28 , the update system 1500 of this embodiment has a tag device 1510 and a security server device 1560 installed outside it.

标签装置1510具有:秘密值存储器,存储将各标签装置固有的ID信息隐匿的隐匿ID信息;读写部1512,与秘密值存储器电连接;以及第一输出部1513和第二输入部1514,与读写部1512电连接。The tag device 1510 has: a secret value storage, which stores hidden ID information that hides the inherent ID information of each tag device; a read-write unit 1512, electrically connected to the secret value storage; and a first output unit 1513 and a second input unit 1514, connected to The read/write unit 1512 is electrically connected.

而且,安全服务器装置1560具有:第一输入部1561;更新部1562,与第一输入部1561电连接;以及第二输出部1563,与更新部1562连接。Furthermore, the security server device 1560 has: a first input unit 1561 ; an update unit 1562 electrically connected to the first input unit 1561 ; and a second output unit 1563 connected to the update unit 1562 .

<隐匿ID的更新处理><Update processing of anonymity ID>

如下进行隐匿ID的更新。The update of the anonymity ID is performed as follows.

首先,通过规定的时机,标签装置1510在读写部1512中读出存储在该秘密值存储器1511中的隐匿ID信息sidh,在第一输出部1513中,对设在各标签装置的外部的安全服务器装置1560输出隐匿ID信息sidhFirst, at a predetermined timing, the tag device 1510 reads out the hidden ID information sid h stored in the secret value memory 1511 in the read/write unit 1512, and in the first output unit 1513, sends a message to the external ID of each tag device. The security server device 1560 outputs the hidden ID information sid h .

安全服务器装置1560在第一输入部1561中接受隐匿ID信息sidh的输入。然后,在更新部1562中,生成难以掌握与隐匿ID信息sidh的关联性的新的隐匿ID信息sidh’,在第二输出部1563中,对标签装置1510输出新的隐匿ID信息sidh’。The security server device 1560 accepts the input of the privileged ID information sid h through the first input unit 1561 . Then, in the update unit 1562, new privileged ID information sid h whose correlation with the privileged ID information sid h is difficult to grasp is generated, and in the second output unit 1563, the new privileged ID information sid h is output to the tag device 1510. '.

标签装置1510在第二输入部1514中,接受新的隐匿ID信息sidh’的输入,在读写部1512中,将该新的隐匿ID信息sidh’存储在秘密值存储器1511中。The tag device 1510 receives input of new privileged ID information sid h ' in the second input unit 1514, and stores the new privileged ID information sid h ' in the secret value memory 1511 in the read/write unit 1512.

[实施例14][Example 14]

图29是例示实施例14中的更新系统2000的整体结构的概念图。FIG. 29 is a conceptual diagram illustrating the overall configuration of an update system 2000 in Embodiment 14.

如该图所例示的,更新系统2000具有:贴在商品等上的无线标签装置等标签装置2010;客户机装置2020;管理与纯文本的ID关联的流通信息的后端装置2050;以及进行ID的复原或隐匿ID的再隐匿处理等的安全服务器装置2060(进行通过网络发送的隐匿ID的再隐匿处理的服务器装置,相当于“更新装置”)。而且,该客户机装置2020、后端装置2050以及安全服务器装置2060通过因特网等网络2070可通信地连接。另外,客户机装置2020包括作为第一实施方式中说明的读取装置的功能。而且,在第一实施方式中,在标签装置、读取装置以及后端装置中实现的效果,由标签装置2010、客户机装置2020、后端装置2050以及安全服务器装置2060实现。而且,为了说明的简略,在该图中例示了标签装置2010、客户机装置2020、后端装置2050以及安全服务器装置2060,但也可以通常标签装置为多个,客户机装置、后端装置以及安全服务器装置为多个。As illustrated in this figure, the update system 2000 has: a tag device 2010 such as a wireless tag device attached to a commodity; a client device 2020; a back-end device 2050 that manages distribution information associated with a plain text ID; The security server device 2060 (the server device that performs the re-blind processing of the privileged ID transmitted through the network, corresponds to the "update device") such as the restoration of the privileged ID or the re-cloaking process of the privileged ID. Furthermore, the client device 2020, the backend device 2050, and the security server device 2060 are communicably connected via a network 2070 such as the Internet. In addition, the client device 2020 includes the function as the reading device described in the first embodiment. Furthermore, in the first embodiment, the effects realized by the tag device, the reader device, and the backend device are realized by the tag device 2010 , the client device 2020 , the backend device 2050 , and the security server device 2060 . Moreover, for the sake of simplicity of description, the tag device 2010, the client device 2020, the back-end device 2050, and the security server device 2060 are illustrated in the figure, but generally there may be a plurality of tag devices, and the client device, the back-end device and the There are multiple security server devices.

本例的客户机装置2020首先从标签装置2010读取隐匿ID,并将其发送到安全服务器装置2060。安全服务器装置2060从该隐匿ID复原ID,并将该ID发回到客户机装置2020。接收到ID的客户机装置2020访问后端装置2050,请求ID、读取日期、读取位置、温度等信息的写入,或与ID关联的信息的取得等。而且,可以假设一种代理模型的利用方式:客户机装置2020将隐匿ID发送到安全服务器装置2060,安全服务器装置2060直接访问后端装置2050。而且,本实施例的特征部分在于安全服务器装置2060等设在标签装置2010的外部的装置将标签装置2010内的隐匿ID再隐匿(将隐匿ID更新为其它的隐匿ID)。The client device 2020 of this example first reads the privileged ID from the tag device 2010 and sends it to the security server device 2060 . The secure server device 2060 recovers the ID from the shielded ID and sends the ID back to the client device 2020. The client device 2020 having received the ID accesses the backend device 2050 to request writing of information such as the ID, reading date, reading position, temperature, etc., or acquisition of information related to the ID. Furthermore, it is assumed that a proxy model is utilized: the client device 2020 sends the anonymized ID to the security server device 2060 , and the security server device 2060 directly accesses the backend device 2050 . Furthermore, the characteristic part of the present embodiment is that the security server device 2060 and other devices installed outside the tag device 2010 re-blind the anonymized ID in the tag device 2010 (update the anonymized ID to another anonymized ID).

图30是例示本实施例中的更新系统1的功能结构的方框图。FIG. 30 is a block diagram illustrating the functional structure of the update system 1 in this embodiment.

<标签装置><label device>

本例的标签装置2010包括:秘密值存储器2011、读写部2012(相当于“第一读写部”)、接口2013(相当于“第一输出部”“第二输入部”)、存储器2014a以及控制部2014。The tag device 2010 of this example includes: a secret value memory 2011, a read-write unit 2012 (equivalent to a “first read-write unit”), an interface 2013 (equivalent to a “first output unit” and a “second input unit”), a memory 2014a And the control unit 2014.

这里,秘密值存储器2011、存储器2014a例如是EEPROM(ElectronicallyErasable and Programmable Read Only Memory)、FeRAM(Ferroelectric RandomAccess Memory)、闪存、NV(Nonvolatile)RAM等可读写的RAM(RandomAccess Memory)。而且,读写部2012是在控制部2014的控制下,在秘密值存储器2011的规定的地址读写数据的硬件。而且,控制部2014例如是控制标签装置2010整体的处理地构成的集成电路。Here, the secret value storage 2011 and the storage 2014a are, for example, EEPROM (Electronically Erasable and Programmable Read Only Memory), FeRAM (Ferroelectric Random Access Memory), flash memory, NV (Nonvolatile) RAM and other readable and writable RAM (Random Access Memory). Furthermore, the read/write unit 2012 is hardware for reading and writing data at predetermined addresses in the secret value memory 2011 under the control of the control unit 2014 . Furthermore, the control unit 2014 is, for example, an integrated circuit configured to control the overall processing of the label device 2010 .

接口2013是通过无线或有线对客户机装置2020输入输出数据的硬件。具体来说,接口2013例如具有:编码·解码电路,通过NRZ码或曼彻斯特编码或米勒码或单极RZ编码等进行编码·解码;调制·解调电路,通过ASK(Amplitude Shift Keying)或PSK(Phase Shift Keying)或FSK(Frequency ShiftKeying)等进行调制·解调;以及偶极天线或微带天线或环形天线或带芯线圈等天线,使用长波带或ISM带(Industry Science Medical band)的频率进行信号的发送接收。另外,通信方式例如利用电磁感应方式或电波方式。The interface 2013 is hardware for inputting and outputting data to the client device 2020 via wireless or wired. Specifically, the interface 2013 has, for example, an encoding/decoding circuit for encoding/decoding by NRZ code, Manchester encoding, Miller code, or unipolar RZ encoding, etc.; a modulation/demodulation circuit for performing encoding/decoding by ASK (Amplitude Shift Keying) or PSK (Phase Shift Keying) or FSK (Frequency Shift Keying) for modulation and demodulation; and antennas such as dipole antennas, microstrip antennas, loop antennas, or cored coils, using frequencies in the long wave band or ISM band (Industry Science Medical band) Send and receive signals. In addition, the communication method utilizes, for example, an electromagnetic induction method or a radio wave method.

而且,秘密值存储器2011与读写部2012电连接,读写部2012与接口2013电连接。而且,虽然在该图中省略了,但控制部2014与标签装置2010的各部分电连接。Furthermore, the secret value memory 2011 is electrically connected to the read/write unit 2012 , and the read/write unit 2012 is electrically connected to the interface 2013 . Furthermore, although omitted in this figure, the control unit 2014 is electrically connected to each part of the label device 2010 .

<客户机装置><client device>

本例的客户机装置2020具有:接口2022、通信部2021、存储器2024a以及控制部2024。The client device 2020 of this example has an interface 2022 , a communication unit 2021 , a memory 2024 a , and a control unit 2024 .

物流信息存储器121例如是硬盘装置、软盘等磁记录装置,DVD-RAM(Random Access Memory)、CD-R(Recordable)/RW(ReWritable)等光盘装置、MO(Magneto-Optical disc)等光磁记录装置、EEP-ROM(ElectronicallyErasable and Programmable-Read Only Memory)、闪存(flash memory)等半导体存储器等。接口2022例如是与接口2013同样的硬件。通信部2021例如是LAN卡、调制解调器、终端适配器等,控制部2023例如是具有存储器2023a的CISC(Complex Instruction Set Computer)方式、RISC(Reduced InstructionSet Computer)方式等的CPU(Central Processing Unit)。The logistics information memory 121 is, for example, a magnetic recording device such as a hard disk device and a floppy disk, an optical disk device such as DVD-RAM (Random Access Memory), CD-R (Recordable)/RW (ReWritable), or an opto-magnetic recording device such as MO (Magneto-Optical disc). Devices, EEP-ROM (Electronically Erasable and Programmable-Read Only Memory), semiconductor memory such as flash memory, etc. The interface 2022 is, for example, the same hardware as the interface 2013 . The communication unit 2021 is, for example, a LAN card, a modem, a terminal adapter, etc., and the control unit 2023 is, for example, a CPU (Central Processing Unit) of a CISC (Complex Instruction Set Computer) method or a RISC (Reduced Instruction Set Computer) method having a memory 2023a.

而且,与接口22以及通信部2021电连接,虽然在该图中省略了,但控制部2024与客户机装置2020的各部分电连接。Furthermore, it is electrically connected to the interface 22 and the communication unit 2021 , and although omitted in the figure, the control unit 2024 is electrically connected to various parts of the client device 2020 .

<更新装置><update device>

安全服务器装置2060具有:通信部2062(相当于“第一输入部”“第二输出部”)、随机数生成部2063、读写部2064(相当于“第二读写部”)、隐匿ID存储器2061、存储器2065a以及控制部2065。另外,随机数生成部2063、读写部2964以及隐匿ID存储器2061构成“更新部”。具体来说,安全服务器2060通过使公知的诺伊曼型计算机执行规定的程序而构成,所述计算机通过总线连接例如CPU、RAM、ROM(Read Only Memory))、磁记录装置或光盘装置等外部存储装置、LAN卡或调制解调器或终端适配器等。而且,该CPU读出存储在RAM中的程序,并执行根据其的处理,从而实现以下所示的各处理功能。The security server device 2060 has: a communication unit 2062 (corresponding to a "first input unit" and a "second output unit"), a random number generation unit 2063, a reading and writing unit 2064 (corresponding to a "second reading and writing unit"), a secret ID The memory 2061, the memory 2065a, and the control unit 2065. In addition, the random number generator 2063, the read/write unit 2964, and the privileged ID memory 2061 constitute an "update unit". Specifically, the security server 2060 is configured by causing a well-known Neumann computer to execute a predetermined program, and the computer is connected to external devices such as a CPU, RAM, ROM (Read Only Memory), magnetic recording device, or optical disk device through a bus. Storage device, LAN card or modem or terminal adapter, etc. Further, the CPU reads out the program stored in the RAM and executes processing according to it, thereby realizing each processing function shown below.

<处理><processing>

图31是用于说明本发明的处理顺序的流程图。以下,使用图29至图31说明本实施例的功能结构以及处理。另外,标签装置2010、客户机装置2020以及安全服务器装置2060分别通过控制部2014、2023、2065的控制执行各处理。而且,被处理的数据逐一存储在存储器2014a、2023a或2065a中,进行运算等处理时被调用,以下省略其说明。Fig. 31 is a flowchart for explaining the processing procedure of the present invention. Hereinafter, the functional configuration and processing of this embodiment will be described using FIGS. 29 to 31 . In addition, the tag device 2010, the client device 2020, and the security server device 2060 execute respective processes under the control of the control units 2014, 2023, and 2065, respectively. Furthermore, the data to be processed is stored in the memory 2014a, 2023a, or 2065a one by one, and is called when processing such as calculation is performed, and its description will be omitted below.

<预处理><preprocessing>

本例的隐匿ID信息是对应于标签ID信息idh的随机值rh。标签装置2010的秘密值存储器2011中作为隐匿ID信息sidh,存储该标签装置2010固有的标签ID信息idh所对应的随机值rh。而且,安全服务器装置2060的隐匿ID存储器2061中存储对应于各标签装置2010的标签ID信息id1,...,idm,和对应于这些各标签ID信息的随机值r1,...,rm的隐匿ID信息。另外,h是大于等于1小于等于m的自然数,作为各标签装置2010所对应的号码。而且,m是标签装置的总数。The hidden ID information in this example is a random value r h corresponding to the tag ID information id h . The secret value memory 2011 of the tag device 2010 stores a random value r h corresponding to the tag ID information id h inherent to the tag device 2010 as the hidden ID information sid h . Moreover, the hidden ID memory 2061 of the security server device 2060 stores tag ID information id 1 , ..., id m corresponding to each tag device 2010, and random values r 1 , ... corresponding to these tag ID information. , the hidden ID information of rm . In addition, h is a natural number greater than or equal to 1 and less than or equal to m, and serves as a number corresponding to each tag device 2010 . Also, m is the total number of tag devices.

<隐匿ID信息更新处理><Hidden ID information update process>

首先,利用任何的认证技术在客户机装置2020和安全服务器装置2060之间进行相互认证。而且,客户机装置2020和安全服务器装置2060的通信由任何的加密技术加密而进行。First, mutual authentication is performed between the client device 2020 and the secure server device 2060 using any authentication technique. Furthermore, the communication between the client device 2020 and the security server device 2060 is encrypted by any encryption technique.

隐匿ID信息sidh的更新处理以如下情况为触发而开始,例如通过门廊等外出时一定通过的场所的情况或存储在标签装置2010内的隐匿ID信息的使用次数(计数值达到规定值)等。通过该触发,首先,客户机装置2020在接口2022中对标签装置2010发送读取指示(步骤S301)。该读取指示在标签装置2010的接口2013中被接收,并以此为触发,读写部2012从秘密值存储器2011中提取隐匿ID信息sidh(步骤S302)。提取的隐匿ID信息sidh被从接口2013发送(输出)到客户机装置2020(步骤S303)。该隐匿ID信息sidh在客户机装置2020的接口2022中被接收,与隐匿ID信息的更新委托(在加密请求)同时从通信部2021通过网络2070被发送到安全服务器装置2060(步骤S304)。The update process of the hidden ID information sid h is triggered by the following situations, for example, when passing through a place that must be passed when going out, such as a porch, or the number of times of use of the hidden ID information stored in the tag device 2010 (the count value reaches a predetermined value), etc. . With this trigger, first, the client device 2020 transmits a read instruction to the tag device 2010 through the interface 2022 (step S301 ). The reading instruction is received by the interface 2013 of the tag device 2010, and as a trigger, the read/write unit 2012 extracts the concealed ID information sid h from the secret value memory 2011 (step S302). The extracted privileged ID information sid h is sent (output) from the interface 2013 to the client device 2020 (step S303). The privileged ID information sid h is received by the interface 2022 of the client device 2020, and is transmitted from the communication unit 2021 to the security server device 2060 through the network 2070 simultaneously with the privileged ID information update request (encrypted request) (step S304).

该隐匿ID信息(sidh)等信息在安全服务器装置2060的通信部2062中被接收(接受输入)(步骤S305)并被发送到读写部2064。而且,以此为触发,在随机数生成部2063(相当于“随机值生成部”)中,生成作为随机值的随机数rh’(步骤S306)。Information such as the privileged ID information (sid h ) is received (input accepted) by the communication unit 2062 of the security server device 2060 (step S305 ), and is sent to the read/write unit 2064 . Then, using this as a trigger, the random number r h ' as a random value is generated in the random number generator 2063 (corresponding to the "random value generator") (step S306).

另外,进行该随机数rh’的生成,并使其不与隐匿ID存储器2061的隐匿ID信息的值相同。而且,该生成例如使用基于用SHA-1等单方向性散列函数构成的计算量理论的虚拟随机数生成算法来进行,生成的随机数rh’被发送到读写部2064。读写部2064从隐匿ID存储器2061中检索(选择)隐匿ID信息sidh所对应的标签ID信息idh,并将随机数rh’(相当于“随机值”)作为新的隐匿ID信息sidh’与该标签ID信息idh对应,并存储在隐匿ID存储器2061中(步骤S307)。而且,读写部2064将新的隐匿ID信息sidh’=rh’发送到通信部2062,通信部2062将该新的隐匿ID信息sidh通过网络2070发送到客户机装置2020(相当于“对标签装置输出”)(步骤S308)。In addition, this random number r h ′ is generated so as not to be the same as the value of the privileged ID information in the privileged ID memory 2061 . Then, this generation is performed using, for example, a pseudorandom number generation algorithm based on a calculation amount theory constituted by a unidirectional hash function such as SHA-1, and the generated random number r h ′ is sent to the read/write unit 2064. The read-write unit 2064 retrieves (selects) the tag ID information id h corresponding to the hidden ID information sid h from the hidden ID memory 2061, and uses the random number r h ' (equivalent to a "random value") as the new hidden ID information sid h ' corresponds to the tag ID information id h , and is stored in the hidden ID memory 2061 (step S307). Then, the reading/writing unit 2064 transmits the new privileged ID information sid h '=r h ' to the communication unit 2062, and the communication unit 2062 transmits the new privileged ID information sid h to the client device 2020 via the network 2070 (equivalent to " Output ") to the label device (step S308).

被发送的新的隐匿ID信息sidh’在客户机装置2020的通信部2021中被接收,并通过接口2022被发送到标签装置2010(步骤S309)。标签装置2010在接口2013中接收该新的随机数rh’(接受输入)并发送到读写部2012。读写部2012将该新的隐匿ID信息sidh’发送到秘密值存储器2011,并存储在其中(步骤S310)。之后,标签装置2010对于来自读取装置(未图示)的读取请求,将该新的隐匿ID信息sidh’通过读取装置发送到后端装置2050。后端装置2050将接受到的隐匿ID信息sidh’发送到数据库存储器1131,数据库存储器1131由通信部2062接收该信息并发送到读写部2064。读写部2064从隐匿ID存储器2061中检索与该隐匿ID信息sidh’一致的随机值,并读出与一致的随机值rh对应的标签ID信息idh并发送到通信部2062,通信部2062将其发送到后端装置2050。The transmitted new privileged ID information sid h ' is received by the communication unit 2021 of the client device 2020, and is transmitted to the tag device 2010 through the interface 2022 (step S309). The tag device 2010 receives this new random number r h ' through the interface 2013 (accepts input) and sends it to the read/write unit 2012. The read/write unit 2012 sends the new hidden ID information sid h ' to the secret value memory 2011, and stores it therein (step S310). Afterwards, the tag device 2010 sends the new concealed ID information sid h ' to the backend device 2050 through the reading device in response to a reading request from the reading device (not shown). The backend device 2050 sends the received concealed ID information sid h ′ to the database storage 1131 , and the database storage 1131 receives the information by the communication unit 2062 and sends it to the read-write unit 2064 . The read-write unit 2064 retrieves a random value consistent with the hidden ID information sid h ' from the hidden ID memory 2061, and reads out the tag ID information id h corresponding to the consistent random value r h and sends it to the communication unit 2062, and the communication unit 2062 sends it to backend device 2050.

<实施例14的特征><Features of Embodiment 14>

在本实施例中,可以在任意的定时更新存储在标签装置2010中的隐匿ID信息。因此,可以避免基于通信历史等中残留的隐匿ID信息的共同性追踪标签装置2010,而侵犯隐私。而且,由于将随机值作为隐匿ID信息,所以攻击者无法得知更新前后的隐匿ID信息的关联性。从而,可以稳固地实现防止标签装置2010的追踪。进而,由于由标签装置2010外部的安全服务器装置2060进行复杂的再隐匿处理,所以不必在标签装置2010自身中设置再隐匿处理所需的电路等。其结果,可以将标签装置2010自身的成本抑制较低。In this embodiment, the privileged ID information stored in the tag device 2010 can be updated at any timing. Therefore, it is possible to avoid privacy violation by tracking the tag device 2010 based on the commonality of concealed ID information remaining in the communication history and the like. Moreover, since the random value is used as the privileged ID information, an attacker cannot know the relevance of the privileged ID information before and after the update. Therefore, tracking prevention of the tag device 2010 can be stably realized. Furthermore, since the security server device 2060 outside the tag device 2010 performs complicated re-cloaking processing, it is not necessary to provide circuits and the like necessary for re-cloaking processing in the tag device 2010 itself. As a result, the cost of the label device 2010 itself can be kept low.

[实施例15][Example 15]

本实施例是实施例14的变形例,将通过共同密钥加密方式的加密文本作为隐匿ID信息,这一点与实施例14不同。以下,以与实施例14的不同点为中心进行说明。This embodiment is a modified example of the fourteenth embodiment, and differs from the fourteenth embodiment in that the encrypted text by the common key encryption method is used as the confidentiality ID information. Hereinafter, the difference from Example 14 will be mainly explained.

图32是例示本实施例中的更新系统2100的功能结构的方框图,图33是用于说明该处理顺序的流程图。以下,使用这些图说明本实施例的功能结构以及处理。另外,在图32中,对于与实施例14共同的结构赋予与图30相同的标号。而且,安全服务器装置2160通过控制部2065的控制执行各处理。而且,密钥存储器2161、读写部2064、ID提取部2166、加密部2167以及随机数生成部2063构成“更新部”。FIG. 32 is a block diagram illustrating the functional configuration of the update system 2100 in this embodiment, and FIG. 33 is a flowchart for explaining the processing procedure. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In addition, in FIG. 32 , the same reference numerals as in FIG. 30 are assigned to the configurations common to those of the fourteenth embodiment. Furthermore, the security server device 2160 executes each process under the control of the control unit 2065 . Furthermore, the key memory 2161, the read/write unit 2064, the ID extraction unit 2166, the encryption unit 2167, and the random number generation unit 2063 constitute an "update unit".

<预处理><preprocessing>

本方式的隐匿ID信息是具有通过AES等共同密钥加密方式的第一加密文本和使用该加密的共同密钥所对应的密钥ID信息的信息。在本例中,标签装置2110的隐匿ID信息设为sidh=(ekj(idh|r),kidj)。另外,h是大于等于1小于等于n的自然数,是各密钥所对应的号码。这里,m表示标签装置的总数,n表示密钥的总数。而且,kj表示第j个共同密钥,kidj表示共同密钥kj所对应的密钥ID信息,r表示随机数,进而ek(α)表示使用共同密钥k通过共同密钥加密方式将α进行了加密的加密文本,α|β表示α和β的位结合。The privileged ID information in this form is information having the first encrypted text encrypted by a common key encryption method such as AES and the key ID information corresponding to the common key encrypted using this encryption. In this example, the hidden ID information of the tag device 2110 is set to sid h =(ek j (id h |r), kid j ). In addition, h is a natural number greater than or equal to 1 and less than or equal to n, and is a number corresponding to each key. Here, m represents the total number of tag devices, and n represents the total number of keys. Moreover, k j represents the jth common key, kid j represents the key ID information corresponding to the common key k j , r represents a random number, and ek(α) represents the use of the common key k through the common key encryption method The cipher text encrypted with α, α|β represents the bit combination of α and β.

本例的标签装置2110的秘密值存储器2111中存储该标签ID信息idh所对应的隐匿ID信息sidh=(ekj(idh|r),kidj)。而且,安全服务器装置2160(相当于“更新装置”)的密钥存储器2161中对应存储各密钥ID信息(kid1,...,kidn)和共同密钥(k1,...,kn)。进而,将关于sidh=(ekj(idh|r),kidj)中的随机数r的大小(位长)和填充位置的信息存储在存储器2065a中。The hidden ID information sid h =(ek j (id h |r), kid j ) corresponding to the tag ID information id h is stored in the secret value memory 2111 of the tag device 2110 in this example. Moreover, the key memory 2161 of the security server device 2160 (equivalent to "update device") stores each key ID information (kid 1 , ..., kid n ) and common keys (k 1 , ..., k n ). Furthermore, information on the size (bit length) and stuffing position of the random number r in sid h =(ek j (id h |r), kid j ) is stored in the memory 2065a.

另外,在本例中,标签装置的总数m比密钥的总数n充分大(m>>n),对没有关联性的标签装置分配相同的密钥ID信息。即,例如,不是对在相同种类的商品上分别附带的标签装置分配相同的密钥ID信息,而是对在无关系的商品上分别附带的标签装置分配相同的密钥ID信息。由此,可以防止从密钥ID信息确定商品种类或商品个体。In addition, in this example, the total number m of tag devices is sufficiently larger than the total number n of keys (m>>n), and the same key ID information is assigned to unrelated tag devices. That is, for example, instead of assigning the same key ID information to tag devices attached to products of the same type, the same key ID information is assigned to tag devices attached to unrelated products. Thereby, it is possible to prevent the type of product or the individual product from being specified from the key ID information.

<隐匿ID更新处理><Anonymous ID update processing>

与实施例14同样,首先客户机装置2020对标签装置2110发送读取指示(步骤S320)。标签装置2110从秘密值存储器2111提取隐匿ID信息(sidh=(ekj(idh|r),kidj))(步骤S321),并发送到客户机装置2020(步骤S322)。接受到该信息的客户机装置320将该隐匿ID信息sidh和更新委托同时发送到安全服务器装置2160(步骤S323)。As in the fourteenth embodiment, first, the client device 2020 transmits a reading instruction to the tag device 2110 (step S320). The tag device 2110 extracts the privileged ID information (sid h =(ek j (id h |r), kid j )) from the secret value memory 2111 (step S321), and transmits it to the client device 2020 (step S322). The client device 320 having received this information transmits the privileged ID information sid h and an update request to the security server device 2160 at the same time (step S323).

该隐匿ID信息sidh等信息在安全服务器装置2160的通信部2062中被接收(步骤S324),构成该隐匿ID信息sidh的第一加密文本ekj(idh|r)被发送到ID提取部2266,密钥ID信息kidj被发送到读写部2064。而且,kidj也记录在存储器2065a中。Information such as the hidden ID information sid h is received in the communication unit 2062 of the security server device 2160 (step S324), and the first encrypted text ek j (id h | r) constituting the hidden ID information sid h is sent to the ID extraction In the unit 2266, the key ID information kid j is sent to the read/write unit 2064. Furthermore, kid j is also recorded in the memory 2065a.

接受到密钥ID信息(kidj)的读写部2064从密钥存储器2161中提取对应于该密钥ID信息kidj的共同密钥kj,发送到ID提取部2166(步骤S326)。收到该密钥的ID提取部2166使用该共同密钥kj将第一加密文本(ekj(idh|r))解码,并提取标签ID信息idh。即,ID提取部2166通过idh=dkj(ekj(idh|r))来计算(idh|r),使用关于存储器2065a中存储的随机数r的大小和其填充位置的信息提取idh(步骤S326)。这里,dk(α)表示通过共同密钥k的加密文本α的解码。另外,计算出的标签ID信息idh与共同密钥kj同时被发送到加密部2167(步骤S327)。加密部2167使用发送的共同密钥kj、标签ID信息idh、随机数r’、以及关于存储在存储器2065a中的随机数的大小和其填充位置的信息,生成(计算)第二加密文本(ekj(idh|r’))(难以把握与第一加密文本的关联性的第二加密文本),并将其发送到通信部2062(步骤S328)。The read/write unit 2064 that has received the key ID information (kid j ) extracts the common key k j corresponding to the key ID information kid j from the key memory 2161, and sends it to the ID extraction unit 2166 (step S326). The ID extraction unit 2166 having received the key decodes the first encrypted text (ek j (id h |r)) using the common key k j , and extracts the tag ID information id h . That is, the ID extracting section 2166 calculates (id h | r) by id h = dk j (ek j (id h | r)), using information about the size of the random number r stored in the memory 2065 a and its filling position to extract id h (step S326). Here, dk(α) denotes decoding of encrypted text α by common key k. In addition, the calculated tag ID information id h is sent to the encryption unit 2167 at the same time as the common key k j (step S327). The encryption unit 2167 generates (calculates) the second encrypted text using the transmitted common key k j , tag ID information id h , random number r′, and information on the size of the random number and its padding position stored in the memory 2065 a (ek j (id h |r')) (the second encrypted text whose correlation with the first encrypted text is difficult to ascertain) is sent to the communication unit 2062 (step S328).

通信部2062将发送的加密文本(ekj(idh|r’))以及存储器2065a内的密钥ID信息kidj作为新的隐匿ID信息(sidh’=(ekj(idh|r’),kidj))发送(输出)(步骤S329)。The communication unit 2062 uses the transmitted encrypted text (ek j (id h |r')) and the key ID information kid j in the memory 2065a as new concealed ID information (sid h '=(ek j (id h |r') ), kid j )) send (output) (step S329).

发送的新的隐匿ID信息sidh’与实施例14同样经由网络2070在客户机装置2020中被接收,并被发送到标签装置2110(步骤S330)。标签装置2110在接口2013中接收该新的隐匿ID信息sidh’,并由读写部2012存储在秘密值存储器2111内(步骤S331),对于之后来自读取装置的读取请求,将该新的隐匿ID信息sidh’通过读取装置发送到后端装置2050。后端装置2050将收到的隐匿ID信息sidh’发送到安全服务器装置2160,安全服务器装置2160通过通信部2062接收。之后,安全服务器装置2160通过与步骤S324、325同样的顺序将标签ID信息解码,并通过通信部2062以及网络2070将其发送到后端装置2050。The transmitted new privileged ID information sid h ' is received by the client device 2020 via the network 2070 as in the fourteenth embodiment, and is transmitted to the tag device 2110 (step S330). The tag device 2110 receives the new concealed ID information sid h ' in the interface 2013, and is stored in the secret value memory 2111 by the read-write unit 2012 (step S331), and the new hidden ID information sid h ' is sent to the read request from the reading device afterwards. The hidden ID information sid h ' of is sent to the backend device 2050 through the reading device. The backend device 2050 sends the received hidden ID information sid h ' to the security server device 2160, and the security server device 2160 receives it through the communication unit 2062. Thereafter, the security server device 2160 decodes the tag ID information through the same procedure as steps S324 and S325 , and transmits it to the backend device 2050 through the communication unit 2062 and the network 2070 .

<实施例15的特征><Features of Embodiment 15>

在本实施例中,由于将包含通过共同密钥加密方式的加密文本的信息作为隐匿ID信息,所以不知道该共同密钥的攻击者无法得知更新前后的隐匿ID信息的关联性。从而,可以稳固地实现防止标签装置2010的追踪。In this embodiment, since the information including the encrypted text by the common key encryption method is used as the privileged ID information, an attacker who does not know the common key cannot know the relationship between the privileged ID information before and after the update. Therefore, tracking prevention of the tag device 2010 can be stably realized.

另外,在本实施例中,通过随机数和ID的按位加(exclusive logic sum)的加密文本构成隐匿ID信息,但只要存有概率加密的性质(即使用相同密钥将相同ID加密,也可以输出不同的加密文本的性质),也可以通过其它方法构成隐匿ID信息。这一点与实施例16也同样。In addition, in this embodiment, the encrypted text of the random number and the bitwise addition (exclusive logic sum) of the ID constitutes the hidden ID information, but as long as there is the property of probabilistic encryption (that is, the same ID is encrypted with the same key, The properties of different encrypted texts can be output), and the hidden ID information can also be formed by other methods. This point is also the same as in Example 16.

[实施例16][Example 16]

实施例16是实施例14的变形例,将通过公开密钥加密方式的加密文本作为隐匿ID信息,这一点与实施例14不同。以下,以与实施例14的不同点为中心进行说明。The sixteenth embodiment is a modified example of the fourteenth embodiment, and differs from the fourteenth embodiment in that the encrypted text by the public key encryption method is used as the confidential ID information. Hereinafter, the difference from Example 14 will be mainly explained.

图34是例示本实施例中的更新系统2200的功能结构的方框图,图35是用于说明该处理顺序的流程图。以下,使用这些图说明本实施例的功能结构以及处理。另外,在图34中,对于与实施例14共同的结构,赋予与实施例14相同的标号。而且,读写部2064、密钥存储器2261、ID提取部2266、加密部2267以及随机数生成部2063构成“更新部”。FIG. 34 is a block diagram illustrating the functional configuration of the update system 2200 in this embodiment, and FIG. 35 is a flowchart for explaining the processing procedure. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In addition, in FIG. 34, the same code|symbol as Example 14 is attached|subjected to the structure common to Example 14. As shown in FIG. Furthermore, the read/write unit 2064, the key memory 2261, the ID extraction unit 2266, the encryption unit 2267, and the random number generation unit 2063 constitute an "update unit".

<预处理><preprocessing>

本方式的隐匿ID信息是具有通过RSA等公开密钥加密方式的第一加密文本和使用该加密的公开密钥所对应的密钥ID信息的信息。在本例中,标签装置2210的隐匿ID信息设为sidh=(epkj(idh|r),kidj)。另外,pkj表示第j个公开密钥,kidj表示公开密钥kj所对应的密钥ID信息,epk(α)表示使用公开密钥pk通过公开密钥加密方式将α进行了加密的加密文本。The privileged ID information in this embodiment is information having a first encrypted text encrypted by a public key encryption method such as RSA and key ID information corresponding to the encrypted public key. In this example, the hidden ID information of the tag device 2210 is set as sid h =(epk j (id h |r), kid j ). In addition, pk j represents the jth public key, kid j represents the key ID information corresponding to the public key k j , and epk(α) represents the encryption of α using the public key pk through public key encryption. encrypted text.

本例的标签装置2110的秘密值存储器2211中存储该隐匿ID信息(sidh=(epkj(idh|r),kidj))。而且,安全服务器装置2260(相当于“更新装置”)的密钥存储器2261中对应存储各密钥ID信息(kid1,...,kidn)和公开密钥加密方式的共同密钥(sk1,...,skn)以及公开密钥(pk1,...,pkn)(密钥对(skj,pkj))。进而,将关于sidh=(epkj(idh|r),kidj)中的随机数r的大小(位长)和填充位置(位位置)的信息存储在存储器2065a中。The privileged ID information (sid h =(epk j (id h |r), kid j )) is stored in the secret value memory 2211 of the tag device 2110 of this example. Moreover, in the key memory 2261 of the security server device 2260 (corresponding to the "update device"), each key ID information (kid 1 , ..., kid n ) and the common key (sk 1 , ..., sk n ) and public keys (pk 1 , ..., pk n ) (key pair (sk j , pk j )). Furthermore, information on the size (bit length) and stuffing position (bit position) of the random number r in sid h =(epk j (id h |r), kid j ) is stored in the memory 2065a.

另外,与实施例15同样,在本例中,对没有关联性的标签标签装置分配相同的隐匿ID信息。由此,可以防止从密钥ID信息确定商品种类和商品个体。In addition, as in the fifteenth embodiment, in this example, the same privileged ID information is assigned to unrelated tag devices. Thereby, it is possible to prevent the item type and individual item from being specified from the key ID information.

<隐匿ID更新处理><Anonymous ID update processing>

与实施例14同样,首先客户机装置2020对标签装置2210发送读取指示(步骤S340)。标签装置2210从秘密值存储器2211提取隐匿ID信息(sidh=(epkj(idh|r),kidj))(步骤S341),并发送到客户机装置2020(步骤S342)。接受到该信息的客户机装置2020将该隐匿ID信息sidh和更新委托同时发送到安全服务器装置2260(步骤S343)。As in the fourteenth embodiment, first, the client device 2020 transmits a reading instruction to the tag device 2210 (step S340). The tag device 2210 extracts the privileged ID information (sid h =(epk j (id h |r), kid j )) from the secret value memory 2211 (step S341), and transmits it to the client device 2020 (step S342). The client device 2020 having received this information transmits the privileged ID information sid h and an update request to the security server device 2260 at the same time (step S343).

该隐匿ID信息sidh等信息在安全服务器装置2260的通信部2062中被接收(步骤S344),构成该隐匿ID信息sidh的第一加密文本epkj(idh|r)被发送到ID提取部266,密钥ID信息kidj被发送到读写部2064。而且,密钥ID信息kidj也记录在存储器2065a中。Information such as the hidden ID information sid h is received in the communication unit 2062 of the security server device 2260 (step S344), and the first encrypted text epk j (id h | r) constituting the hidden ID information sid h is sent to the ID extraction part 266, the key ID information kid j is sent to the read/write part 2064. Furthermore, key ID information kid j is also recorded in the memory 2065a.

接受到密钥ID信息kidj的读写部2064从密钥存储器2261中提取对应于该密钥ID信息kidj的密钥skj以及公开密钥epkj(密钥对),将密钥skj发送到ID提取部2266,将公开密钥epkj发送到加密部2267(步骤S345)。收到密钥skj的ID提取部2266使用该密钥skj将第一加密文本(epkj(idh|r))解码,并提取标签ID信息idh。即,通过idh=dskj(epkj(idh|r))来计算(idh|r),使用存储器2065a的随机数r的大小和其填充位置的信息计算idh(步骤S346)。这里,dsk(α)表示通过密钥sk的加密文本α的解码。另外,计算出的标签ID信息idh被发送到加密部2267。而且,随机数生成部2063生成随机数r’,将其发送到加密部2267(步骤S347)。加密部2267使用发送的公开密钥kj、标签ID信息idh、随机数r’、以及随机数的大小和其填充位置的信息,生成(计算)加密文本(epkj(idh|r’))(难以把握与第一加密文本的关联性的第二加密文本),并将其发送到通信部2062(步骤S348)。The read-write unit 2064 that has received the key ID information kid j extracts the key sk j and the public key epk j (key pair) corresponding to the key ID information kid j from the key memory 2261, and converts the key sk j is sent to the ID extraction unit 2266, and the public key epk j is sent to the encryption unit 2267 (step S345). The ID extraction unit 2266 having received the key sk j decodes the first encrypted text (epk j (id h |r)) using the key sk j , and extracts the tag ID information id h . That is, (id h | r) is calculated by id h = dsk j (epk j (id h | r)), and id h is calculated using information on the size of the random number r in the memory 2065a and its filling position (step S346). Here, dsk(α) denotes decoding of encrypted text α by key sk. In addition, the calculated tag ID information id h is sent to the encryption unit 2267 . Then, the random number generation unit 2063 generates a random number r', and sends it to the encryption unit 2267 (step S347). The encryption unit 2267 generates ( calculates ) an encrypted text (epk j (id h r ' )) (the second encrypted text whose relationship with the first encrypted text is difficult to grasp) is sent to the communication unit 2062 (step S348).

通信部2062将发送的第二加密文本(epkj(idh|r’))以及存储器2065a内的密钥ID信息kidj作为新的隐匿ID信息sidh’=(ekj(idh|r’),kidj)发送(输出)(步骤S349)。The communication unit 2062 uses the transmitted second encrypted text (epk j (id h |r')) and the key ID information kid j in the memory 2065a as new concealed ID information sid h '=(ek j (id h |r '), kid j ) are sent (output) (step S349).

发送的新的隐匿ID信息sidh’与实施例14同样经由网络2070在客户机装置2020中被接收,并被发送到标签装置2210(步骤S350)。标签装置2210将该新的隐匿ID信息sidh’在读写部2012中存储在秘密值存储器2211内(步骤S351)。然后,对于之后来自读取装置的读取请求,将该新的隐匿ID信息sidh’通过读取装置发送到后端装置2050。后端装置2050将收到的隐匿ID信息sidh’发送到安全服务器装置2260,安全服务器装置2260通过通信部2062接收。之后,安全服务器装置2260通过与步骤S345、346同样的顺序将标签ID信息解码,并通过通信部2062以及网络2070将其发送到后端装置2050。The transmitted new privileged ID information sid h ' is received by the client device 2020 via the network 2070 as in the fourteenth embodiment, and is transmitted to the tag device 2210 (step S350). The tag device 2210 stores the new hidden ID information sid h ' in the secret value memory 2211 in the read/write unit 2012 (step S351). Then, for subsequent reading requests from the reading device, the new concealed ID information sid h ' is sent to the back-end device 2050 through the reading device. The backend device 2050 sends the received concealed ID information sid h ' to the security server device 2260, and the security server device 2260 receives it through the communication unit 2062. Thereafter, the security server device 2260 decodes the tag ID information through the same procedure as steps S345 and 346 , and transmits it to the backend device 2050 through the communication unit 2062 and the network 2070 .

<实施例16的特征><Features of Embodiment 16>

在本实施例中,由于将包含通过公开密钥加密方式的加密文本的信息作为隐匿ID信息,所以不知道该密钥的攻击者无法得知更新前后的隐匿ID信息的关联性。从而,可以稳固地实现防止标签装置2210的追踪。In this embodiment, since the information including the encrypted text by the public key encryption method is used as the privileged ID information, an attacker who does not know the key cannot know the relationship between the privileged ID information before and after the update. Therefore, the tracking prevention of the tag device 2210 can be stably realized.

<实施例17><Example 17>

本实施例是实施例14的变形例,使用具有再加密的性质(仅使用被加密的数据和公开密钥可以生成其它的加密文本的加密的性质。使用相同的密钥进行解码。)的加密算法进行隐匿ID信息的更新,这一点与实施例14不同。以下,以与实施例14的不同点为中心进行说明。This embodiment is a modified example of the fourteenth embodiment, using encryption with the property of re-encryption (encryption property in which other encrypted text can be generated using only the encrypted data and the public key. Decryption is performed using the same key.) The algorithm updates the hidden ID information, which is different from the fourteenth embodiment. Hereinafter, the difference from Example 14 will be mainly explained.

图36是例示本实施例中的更新系统2300的功能结构的方框图,图37是用于说明其处理顺序的流程图。以下,使用这些图说明本实施例的功能结构以及处理。另外,在图36中,对于与实施例14共同的结构赋予与实施例14相同的标号。而且,安全服务器装置2360通过控制部2065的控制来执行各处理。而且,密钥存储器2361、读写部2064、随机数生成部2063、余数乘法运算部2366以及余数幂运算部2367构成“更新部”。FIG. 36 is a block diagram illustrating the functional configuration of the update system 2300 in this embodiment, and FIG. 37 is a flowchart for explaining its processing procedure. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In addition, in FIG. 36, the same code|symbol as Example 14 is attached|subjected to the structure common to Example 14. As shown in FIG. Furthermore, the security server device 2360 executes each process under the control of the control unit 2065 . Furthermore, the key memory 2361, the read/write unit 2064, the random number generator 2063, the remainder multiplication unit 2366, and the remainder power calculation unit 2367 constitute an "update unit".

<预处理><preprocessing>

本方式的隐匿ID信息是具有通过有再加密的性质的加密算法(公开密钥加密方式)的第一加密文本和使用该加密的公开密钥所对应的密钥ID信息的信息。在本例中,使用ElGamal加密(例如,参照冈本龙明、山本博资,“現代暗号”,1998,p118~119。)将标签装置2310的隐匿ID信息设为sidh=(grmod p,idh·pkj rmod p,kidj)。另外,g表示公开的生成元,p表示充分大的素数,r表示大于等于0小于p-1的任意的整数,pkj=gxjmod p表示第j个公开密钥,skj表示第j个密钥,(gr mod p,idh·pkj rmod p,kidj)表示加密文本。另外,pkj=gskjmod p的上标字“skj”表示“pkj”。而且,在以下的记载以及图中,省略“mod p”来记载。The privileged ID information in this form is information having the first encrypted text passed through the encryption algorithm (public key encryption method) having the property of re-encryption and the key ID information corresponding to the encrypted public key. In this example, use ElGamal encryption (for example, refer to Okamoto Ryuaki, Yamamoto Hiroshi, "Modern Cipher", 1998, p118-119.) The hidden ID information of the tag device 2310 is set as sid h =(g r mod p, id h pk j r mod p, kid j ). In addition, g represents a public generator, p represents a sufficiently large prime number, r represents an arbitrary integer greater than or equal to 0 and less than p-1, pk j = g xj mod p represents the jth public key, and sk j represents the jth public key A key, (g r mod p, id h pk j r mod p, kid j ) represents the encrypted text. In addition, the superscript "skj" of pk j =g skj mod p means "pk j ". In addition, in the following description and drawings, "mod p" is omitted and described.

本例的标签装置2310的秘密值存储器2311中存储该隐匿ID信息sidh=(gr,idh·pkj r,kidj)。而且,安全服务器装置2360(相当于“更新装置”)的密钥存储器2261中对应存储各密钥ID信息(kid1,...,kidn)和公开密钥(pk1,...,pkn)。进而,生成元g储在存储器2065a中。The confidentiality ID information sid h =(g r , id h ·pk j r , kid j ) is stored in the secret value memory 2311 of the tag device 2310 of this example. Moreover, each key ID information (kid 1 , ..., kid n ) and public keys (pk 1 , ..., pk n ). Furthermore, the generator g is stored in the memory 2065a.

另外,在本例中,对没有关联性的标签装置分配相同的密钥ID信息。由此,可以防止从密钥ID信息确定商品种类或商品个体。In addition, in this example, the same key ID information is assigned to unrelated tag devices. Thereby, it is possible to prevent the type of product or the individual product from being specified from the key ID information.

<隐匿ID更新处理><Anonymous ID update processing>

与实施例14同样,首先客户机装置2020对标签装置2310发送读取指示(步骤S360)。标签装置2310从秘密值存储器2311提取隐匿ID信息sidh=(gr,idh·pkj r,kidj)(步骤S361),并发送到客户机装置2020(步骤S362)。接受到该信息的客户机装置2020将该隐匿ID信息sidh和更新委托同时发送到安全服务器装置2260(步骤S363)。As in the fourteenth embodiment, first, the client device 2020 transmits a read instruction to the tag device 2310 (step S360). The tag device 2310 extracts privileged ID information sid h =(g r , id h ·pk j r , kid j ) from the secret value memory 2311 (step S361), and transmits it to the client device 2020 (step S362). The client device 2020 having received this information transmits the privileged ID information sid h and an update request to the security server device 2260 at the same time (step S363).

该隐匿ID信息sidh等信息在安全服务器装置2360的通信部2062中被接收(步骤S364),构成该隐匿ID信息sidh的(gr,idh·pkj r)被发送到余数乘法运算部2366(构成“加密部”),kidj被发送到读写部2064。而且,kidj也记录在存储器2065a中。Information such as the privileged ID information sid h is received by the communication unit 2062 of the security server device 2360 (step S364), and (g r , id h ·pk j r ) constituting the privileged ID information sid h is sent to the remainder multiplication operation. The kid j is sent to the read/write unit 2064 by the unit 2366 (constituting the “encryption unit”). Furthermore, kid j is also recorded in the memory 2065a.

接受到密钥ID信息kidj的读写部2064从密钥存储器2361中提取对应于该密钥ID信息kidj的公开密钥pkj,将其发送到余数幂运算部2367(构成“加密部”)(步骤S365)。以此为触发,随机数生成部2063生成大于等于0小于p-1的随机数r’,将其发送到余数幂运算部2367(步骤S366)。余数幂运算部2367使用存储器2065a内的生成元g、收到的公开密钥pkj以及随机数r’进行(gr’,pkj r’)的运算,将其结果发送到余数乘法运算部2366(步骤S367)。余数乘法运算部2366使用收到的(gr’,pkj r’)和(gr,idh,pkj r)运算(gr+r’,idh,pkj r+r’),将其运算结果作为新的加密文本(第二加密文本)发送到通信部2062(步骤S368)。The read/write unit 2064 that has received the key ID information kid j extracts the public key pk j corresponding to the key ID information kid j from the key memory 2361, and sends it to the remainder exponentiation unit 2367 (constituting the “encryption unit”). ") (step S365). Using this as a trigger, the random number generation unit 2063 generates a random number r′ greater than or equal to 0 and less than p−1, and sends it to the remainder exponentiation unit 2367 (step S366 ). The remainder exponentiation unit 2367 uses the generator g in the memory 2065a, the received public key pk j and the random number r' to perform (g r ', pk j r ') calculation, and sends the result to the remainder multiplication unit 2366 (step S367). The remainder multiplication unit 2366 uses the received (g r ', pk j r ') and (g r , id h , pk j r ) to calculate (g r+r ', id h , pk j r+r '), The calculation result is sent to the communication unit 2062 as a new encrypted text (second encrypted text) (step S368).

通信部2062将发送的加密文本(gr+r’,idh·pkj r+r’)(难以掌握与第一加密文本的关联性的第二加密文本)以及存储器2065a内的密钥ID信息kidj作为新的隐匿ID信息(sidh’=(ekj(idh|r’),kidj))发送(输出)(步骤S369)。The communication unit 2062 transmits the encrypted text (g r+r ', id h pk j r+r ') (the second encrypted text whose correlation with the first encrypted text is difficult to grasp) and the key ID stored in the memory 2065a. The information kid j is sent (output) as new privileged ID information (sid h '=(ek j (id h |r'), kid j )) (step S369).

发送的新的隐匿ID信息sidh’与实施例14同样经由网络2070在客户机装置2020中被接收,并被发送到标签装置2310(步骤S370)。然后,标签装置2310将该新的隐匿ID信息sidh’在读写部2012中存储在秘密值存储器2311内(步骤S371)。然后,标签装置2310对于读取请求,响应该新的隐匿ID信息(sidh’)。The transmitted new privileged ID information sid h ' is received by the client device 2020 via the network 2070 as in the fourteenth embodiment, and is transmitted to the tag device 2310 (step S370). Then, the tag device 2310 stores the new privileged ID information sid h ' in the secret value memory 2311 in the read/write unit 2012 (step S371). Then, the tag device 2310 responds to the read request with the new privileged ID information (sid h ').

<实施例17的特征><Features of Embodiment 17>

在本实施例中,由于使用具有再加密的性质的加密算法更新隐匿ID信息,所以不对纯文本的ID解码而可以更新隐匿ID信息。从而,不会在隐匿ID信息的更新处理时ID被盗听,可以稳固地实现防止标签装置2310的追踪。In this embodiment, since the privileged ID information is updated using an encryption algorithm having a re-encryption property, the privileged ID information can be updated without decoding the plain text ID. Therefore, the ID will not be intercepted during the update process of the concealed ID information, and the tracking prevention of the tag device 2310 can be stably realized.

另外,在本实施例中,安全服务器装置2360的密钥存储器2361中存储公开密钥(pk1,...,pkn),但安全服务器装置2360不保持公开密钥(pk1,...,pkn)而从规定的公开密钥服务器取得公开密钥(pk1,...,pkn)也可以。In addition, in this embodiment, the public key (pk 1 , . . . , pk n ) is stored in the key memory 2361 of the security server device 2360, but the security server device 2360 does not hold the public key (pk 1 , .. ., pk n ) and public keys (pk 1 , . . . , pk n ) may be acquired from a predetermined public key server.

而且,在本实施例中使用了ElGamal加密,只要是具有再加密的性质的加密算法,使用高次余数加密等其它的算法也可以。Furthermore, although ElGamal encryption is used in this embodiment, other algorithms such as high-order remainder encryption may be used as long as the encryption algorithm has the property of re-encryption.

而且,作为实施例16以及实施例17的变形,用共同密钥将标签ID信息加密,将使用上述公开密钥加密方式的公开密钥对该共同密钥和该标签ID信息的加密文本加密的信息作为隐匿ID信息也可以(混合加密)。在该情况下,安全服务器装置用对应于该公开密钥的密钥将隐匿ID信息解码而取得共同密钥,并使用该共同密钥将标签ID信息的加密文本解码而取得标签ID信息。之后,安全服务器装置通过共同密钥加密方式从该标签ID信息生成其它的加密文本,并将共同密钥和加密文本进一步通过公开加密方式加密。然后,与实施例16等同样,将该新的隐匿ID信息存储在标签装置的秘密值存储器中。Furthermore, as a modification of Embodiment 16 and Embodiment 17, the tag ID information is encrypted with a common key, and the encrypted text of the common key and the tag ID information is encrypted using the public key of the above-mentioned public key encryption method. Information can also be used as anonymized ID information (hybrid encryption). In this case, the security server device decodes the privileged ID information with the key corresponding to the public key to obtain the common key, and decodes the encrypted text of the tag ID information using the common key to obtain the tag ID information. Afterwards, the security server device generates other encrypted text from the tag ID information by common key encryption, and further encrypts the common key and the encrypted text by public encryption. Then, the new privileged ID information is stored in the secret value memory of the tag device in the same manner as in the sixteenth embodiment.

[实施例18][Example 18]

实施例18在隐匿ID信息的更新时变更安全服务器装置。以下,以与实施例14的不同点为中心进行说明。In the eighteenth embodiment, the security server device is changed when the privacy ID information is updated. Hereinafter, the difference from Example 14 will be mainly explained.

图38是例示本实施例的更新系统2400的整体结构的概念图。另外,在图38中,对于与实施例14共同的结构赋予与实施例14相同的标号。FIG. 38 is a conceptual diagram illustrating an overall configuration of an update system 2400 of the present embodiment. In addition, in FIG. 38, the same code|symbol as Example 14 is attached|subjected to the structure common to Example 14. As shown in FIG.

如该图中例示的,更新系统2400具有:标签装置2410、客户机装置2020(相当于“更新委托装置”)、多个安全服务器装置2460-1~v(相当于“更新装置”)以及后端装置2050,可通过网络2070通信地连接。As illustrated in this figure, the update system 2400 includes a tag device 2410, a client device 2020 (corresponding to an "update request device"), a plurality of security server devices 2460-1~v (corresponding to an "update device"), and subsequent The end device 2050 can be communicatively connected via the network 2070 .

图39是例示本实施例中的更新系统2400的功能结构的方框图,图40是用于说明该处理的流程图。以下,使用这些图说明本实施例的功能结构以及处理。另外,在图39中,对于与实施例14共同的结构,赋予与实施例14相同的标号。而且,为了简化说明,在图38、39中,仅表示了两个安全服务器装置2460-1、2460-2,但也可以通过大于等于两个的安全服务器构成系统。进而,在图39中,仅记载了说明所必需的处理功能·数据,但安全服务器装置2460-1、2460-2也可以互相兼有它们各自具有的处理功能和数据。通过安全服务器装置2460-1、2460-2,控制部2465-1、2465-2的控制进行各处理。FIG. 39 is a block diagram illustrating the functional configuration of the update system 2400 in this embodiment, and FIG. 40 is a flowchart for explaining the processing. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In addition, in FIG. 39, the same code|symbol as Example 14 is attached|subjected to the structure common to Example 14. As shown in FIG. Furthermore, in order to simplify the description, only two security server devices 2460-1 and 2460-2 are shown in Figs. 38 and 39, but the system may be constituted by two or more security servers. Furthermore, in FIG. 39, only the processing functions and data necessary for the description are described, but the security server apparatuses 2460-1 and 2460-2 may mutually share their respective processing functions and data. Each process is performed under the control of the security server apparatuses 2460-1, 2460-2 and the control units 2465-1, 2465-2.

<预处理><preprocessing>

本方式的隐匿ID信息是具有通过公开密钥加密方式的加密文本和该加密所使用的公开密钥所对应的密钥ID信息的信息。在本例中,标签装置2410的隐匿ID信息设为sidh=(epkj(idh),kidj)。The privileged ID information in this embodiment is information having encrypted text by the public key encryption method and key ID information corresponding to the public key used for the encryption. In this example, the hidden ID information of the tag device 2410 is set as sid h =(epk j (id h ), kid j ).

本例的标签装置2410的秘密值存储器2411中存储该隐匿ID信息sidh=(epkj(idh),kidj))。而且,安全服务器装置2460-1的密钥存储器2461-1中对应存储各密钥ID信息(kid1,...,kidn)和公开密钥加密方式的密钥(sk1,...,skn)。进而,安全服务器装置2460-2的密钥存储器2461-2中对应存储各密钥ID信息(kid1,...,kidn)和公开密钥加密方式的公开密钥(pk1,...,pkn)。The confidentiality ID information sid h =(epk j (id h ), kid j )) is stored in the secret value memory 2411 of the tag device 2410 of this example. Furthermore, the key memory 2461-1 of the security server device 2460-1 stores each key ID information (kid 1 , ..., kid n ) and keys (sk 1 , ... , sk n ). Furthermore, in the key memory 2461-2 of the security server device 2460-2, each key ID information (kid 1 , . . . , kid n ) and public keys (pk 1 , .. ., pk n ).

另外,在本例中,对没有关联性的标签标签装置分配相同的隐匿ID信息。由此,可以防止从密钥ID信息确定商品种类和商品个体。In addition, in this example, the same privileged ID information is assigned to unrelated tag tag devices. Thereby, it is possible to prevent the item type and individual item from being specified from the key ID information.

<隐匿ID更新处理><Anonymous ID update processing>

与实施例14同样,首先客户机装置2020对标签装置2410发送读取指示(步骤S380)。标签装置2410从秘密值存储器2411提取隐匿ID信息(sidh=(epkj(idh),kidj))(步骤S381),并发送到客户机装置2020(步骤S382)。接受到该信息的客户机装置2020在通信部2021(相当于“第一ID输出部”)中,将从该标签装置2410中提取的隐匿ID信息sidh和解码委托同时发送到安全服务器装置2460-1(步骤S383)。另外,安全服务器装置2460-1是管理在该时点存储在标签装置2410中的隐匿ID信息的安全服务器装置。As in the fourteenth embodiment, first, the client device 2020 transmits a reading instruction to the tag device 2410 (step S380). The tag device 2410 extracts the privileged ID information (sid h =(epk j (id h ), kid j )) from the secret value memory 2411 (step S381), and transmits it to the client device 2020 (step S382). The client device 2020 having received this information transmits the privileged ID information sid h extracted from the tag device 2410 and a decryption request to the security server device 2460 at the same time in the communication unit 2021 (corresponding to the "first ID output unit"). -1 (step S383). In addition, the security server device 2460-1 is a security server device that manages the privileged ID information stored in the tag device 2410 at this point in time.

该隐匿ID信息sidh等信息在安全服务器装置2460-1的通信部2462-1(相当于“第一输入部”)中被接收(步骤S384),构成该隐匿ID信息sidh的epkj(idh)被发送到ID提取部2466-1,kidj被发送到读写部2464-1。接受到密钥ID信息kidj的读写部2464-1从密钥存储器2461-1中提取对应于该密钥ID信息kidj的密钥skj,将该密钥skj发送到ID提取部2466-1(步骤S385)。收到密钥skj的ID提取部2466-1使用该密钥skj将加密文本(epkj(idh))解码,并求标签ID信息idh(idh=dskj(epkj(idh)))(步骤S386)。求出的标签ID信息idh被发送到通信部2462-1(相当于“第二输出部”),并从此处通过网络2070被发送(输出)到客户机装置2020(步骤S387)。Information such as the hidden ID information sid h is received by the communication unit 2462-1 (corresponding to the "first input unit") of the security server device 2460-1 (step S384), and the epk j ( id h ) is sent to the ID extracting unit 2466-1, and kid j is sent to the reading/writing unit 2464-1. The read/write unit 2464-1 that has received the key ID information kid j extracts the key sk j corresponding to the key ID information kid j from the key memory 2461-1, and sends the key sk j to the ID extraction unit 2466-1 (step S385). The ID extraction unit 2466-1 having received the key sk j decodes the encrypted text (epk j (id h )) using the key sk j , and obtains the tag ID information id h (id h =dsk j (epk j (id h ) h ))) (step S386). The obtained tag ID information id h is sent to the communication unit 2462-1 (corresponding to the "second output unit"), and from there it is sent (output) to the client device 2020 via the network 2070 (step S387).

从安全服务器装置2460-1输出的标签ID信息idh在客户机装置2020的通信部2021中被接收(接受输入)(步骤S388)。之后,通信部2021发送(输出)标签ID信息idh到任意选择了的安全服务器安全服务器装置2460-2,并进行隐匿ID信息的更新委托(步骤S389)。The tag ID information id h output from the security server device 2460-1 is received (input accepted) in the communication unit 2021 of the client device 2020 (step S388). After that, the communication unit 2021 transmits (outputs) the tag ID information id h to the arbitrarily selected security server device 2460-2, and requests an update of the privileged ID information (step S389).

安全服务器装置2460-2的通信部2462-2(相当于“第三输入部”)接收通过网络2070发送的该标签ID信息idh(接受输入)并发送到加密部2467-2(步骤S390)。而且以此为触发,密钥选择部2468-2进行密钥的选择,将该信息发送到读写部2464-2(步骤S391)。在本例的情况下,密钥选择部2468-2从大于等于1小于等于n的自然数中选择任意(随机数等)的密钥号i,将该密钥号i发送到读写部2464-2。读写部2464-2从密钥存储器2461-2中提取收到的密钥号i所对应的密钥ID信息kidi以及公开密钥pki,发送到加密部2467-2(步骤S392)。加密部2467-2使用收到的开密钥pki将标签ID信息idh加密(隐匿)(epkj(idh)),生成该加密文本和密钥ID信息kidi构成的新的隐匿ID信息(sidh’=(epkj(idh),kidi))(步骤S393)。生成的隐匿ID信息sidh’被发送到通信部2462-2,通信部2462-2(相当于“第三输出部”)将该隐匿ID信息sidh’通过网络2070发送(输出)到客户机装置2020(步骤S394)。The communication part 2462-2 (corresponding to "the third input part") of the security server device 2460-2 receives the tag ID information id h sent via the network 2070 (accepts input) and sends it to the encryption part 2467-2 (step S390) . Then, this triggers the key selection unit 2468-2 to select a key and transmits the information to the read/write unit 2464-2 (step S391). In this example, the key selection unit 2468-2 selects an arbitrary (random number, etc.) key number i from natural numbers greater than or equal to 1 and less than or equal to n, and sends the key number i to the read/write unit 2464- 2. The read/write unit 2464-2 extracts the key ID information kid i and public key pki corresponding to the received key number i from the key memory 2461-2, and sends them to the encryption unit 2467-2 (step S392). The encryption unit 2467-2 encrypts (conceals) the tag ID information id h using the received decryption key pk i (epk j (id h )), and generates a new concealed ID composed of the encrypted text and the key ID information kid i Information (sid h '=(epk j (id h ), kid i )) (step S393). The generated privileged ID information sid h ' is sent to the communication unit 2462-2, and the communication unit 2462-2 (corresponding to the "third output unit") transmits (outputs) the privileged ID information sid h ' to the client via the network 2070 device 2020 (step S394).

客户机装置2020在通信部2021(相当于“第二输入部”)中接收该(隐匿ID信息sidh’)(接受输入)(步骤S396)。标签装置2410将该新的隐匿ID信息sidh’存储在秘密值存储器2411内(步骤S397),对以后的读取请求响应该新的隐匿ID信息sidh’。以后,安全服务器装置2460-2成为管理存储在标签装置2410中的隐匿ID信息的安全服务器装置。从而,该新的隐匿ID信息sidh’的解码以后在安全服务器装置2460-2中进行,作为该解码结果的标签ID信息idh被发送到客户机装置2020或后端装置2050等。安全服务器装置2460-2中的隐匿ID信息sidh’的解码使用存储在密钥存储器2461-2中的密钥ski(对应于kidi的密钥:未图示)进行。The client device 2020 receives this (privileged ID information sid h ') in the communication unit 2021 (corresponding to the "second input unit") (accepts input) (step S396). The tag device 2410 stores the new hidden ID information sid h ' in the secret value memory 2411 (step S397), and responds to the new hidden ID information sid h ' for subsequent read requests. Thereafter, the security server device 2460-2 becomes a security server device that manages the privileged ID information stored in the tag device 2410. Therefore, decoding of this new privileged ID information sid h ' is performed in the security server device 2460-2 thereafter, and the tag ID information id h as a result of the decoding is transmitted to the client device 2020, the backend device 2050, and the like. The decryption of the privileged ID information sid h ' in the security server device 2460-2 is performed using the key sk i (the key corresponding to the kid i : not shown) stored in the key memory 2461-2.

<实施例18的特征><Features of Embodiment 18>

在实施例18中,通过管理标签装置2410的隐匿ID信息的安全服务器装置2460-1将隐匿ID信息解码,进而通过其它的安全服务器装置2460-2生成新的隐匿ID信息,更新存储在标签装置2410中的隐匿ID信息。换言之,同时进行隐匿ID信息的更新和管理标签装置2410的隐匿ID信息的安全服务器装置的变更。由此,防止隐匿ID信息的更新历史信息集中于一台安全服务器装置,可以降低来自安全服务器装置的信息泄漏或恶意设定的安全服务器装置的不正当行为的危险。进而,通过将变更后的安全服务器装置设为公众无法访问的局部装置,可以进一步实现高度的安全性。In Embodiment 18, the security server device 2460-1 that manages the hidden ID information of the tag device 2410 decodes the hidden ID information, and then generates new hidden ID information through other security server devices 2460-2, and updates the hidden ID information stored in the tag device. Anonymized ID information in 2410. In other words, the update of the privileged ID information and the change of the security server device that manages the privileged ID information of the tag device 2410 are performed simultaneously. This prevents the update history information of the anonymized ID information from being concentrated in one security server device, and reduces the risk of information leakage from the security server device or fraudulent behavior of a maliciously set security server device. Furthermore, by setting the changed security server device as a local device that cannot be accessed by the public, further high security can be realized.

另外,代替公开密钥加密方式使用共同密钥加密方式构成本实施例的更新系统也可以。Also, the update system of this embodiment may be configured using a common key encryption method instead of the public key encryption method.

而且,如实施例14那样,应用将随机值作为隐匿ID信息的方式构成本实施例的更新系统也可以。在该情况下,在新的安全服务器装置中,代替上述加密而生成随机值,在实施例14那样的隐匿ID存储器中新追加生成的随机值(=隐匿ID)以及ID。Furthermore, as in the fourteenth embodiment, the update system of the present embodiment may be constituted by using a random value as the confidentiality ID information. In this case, in the new secure server device, a random value is generated instead of the encryption described above, and the generated random value (=privileged ID) and ID are newly added to the privileged ID memory as in the fourteenth embodiment.

[实施例19][Example 19]

在实施例19中,客户机装置进行隐匿ID信息的再隐匿处理。即,客户机装置作为更新装置起作用。在该情况下,客户机装置进行直接读取的隐匿ID信息的再隐匿处理。In the nineteenth embodiment, the client device performs re-privilege processing of the privileged ID information. That is, the client device functions as an update device. In this case, the client device performs re-privilege processing of directly read privileged ID information.

图41是例示本实施例的更新系统2500的功能结构的方框图,图42是用于说明该处理顺序的流程图。以下,使用这些图说明本实施例的功能结构以及处理。在图41中,对于与实施例14共同的结构赋予与实施例14相同的标号。以下以与实施例14的不同点为中心进行说明。FIG. 41 is a block diagram illustrating the functional configuration of the update system 2500 of this embodiment, and FIG. 42 is a flowchart for explaining the processing procedure. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In FIG. 41 , the same reference numerals as those in the fourteenth embodiment are assigned to the structures common to those in the fourteenth embodiment. The following description will focus on the differences from Example 14.

<预处理><preprocessing>

本方式的隐匿ID信息是具有带有再加密的性质的加密算法()的加密文本和该加密所使用的公开密钥所对应的密钥ID信息的信息。在本例中,标签装置2410的隐匿ID信息设为sidh=(gr,idh·pkj r,kidj)。The privileged ID information in this embodiment is information having an encrypted text of an encryption algorithm ( ) having a re-encryption property and key ID information corresponding to a public key used for the encryption. In this example, the hidden ID information of the tag device 2410 is set to sid h =(g r , id h ·pk j r , kid j ).

本例的标签装置2410的秘密值存储器2411中存储该隐匿ID信息(sidh=(gr,idh·pkj r,kidj)))。而且,安全服务器装置2520(相当于“更新装置”)的密钥存储器2524中对应存储各密钥ID信息(kid1,...,kidn)和公开密钥(pk1,...,pkn)。进而,余数幂运算部2527的存储器中存储生成元g。The confidential value memory 2411 of the tag device 2410 of this example stores the privileged ID information (sid h =(g r , id h ·pk j r , kid j ))). Moreover, the key ID information (kid 1 , ..., kid n ) and public keys (pk 1 , ..., pk n ). Furthermore, the generator g is stored in the memory of the remainder exponentiation unit 2527 .

另外,在本例中,对没有关联性的标签标签装置分配相同的隐匿ID信息。由此,可以防止从密钥ID信息确定商品种类和商品个体。In addition, in this example, the same privileged ID information is assigned to unrelated tag tag devices. Thereby, it is possible to prevent the item type and individual item from being specified from the key ID information.

<隐匿ID更新处理><Hidden ID update processing>

客户机装置2520通过控制部2023的控制执行以下的处理。The client device 2520 executes the following processing under the control of the control unit 2023 .

与实施例14同样,首先,客户机装置2520对标签装置2510发送读取指示(步骤S400)。标签装置2520从存储器2511中提取隐匿ID信息(sidh=(gr,idh·pkj r,kidj))(步骤S401),发送到客户机装置2520(步骤S402)。As in the fourteenth embodiment, first, the client device 2520 transmits a reading instruction to the tag device 2510 (step S400). The tag device 2520 extracts the privileged ID information (sid h =(g r , id h ·pk j r , kid j )) from the memory 2511 (step S401), and sends it to the client device 2520 (step S402).

该隐匿ID信息sidh在客户机装置2520的接口2022中被接收(步骤S403),构成该隐匿ID信息sidh的加密文本(gr,idh·pkj r)被发送到余数乘法运算部2528(构成“加密部”),kidj被送到读写部2525。kidj记录在存储器2023a中。The privileged ID information sid h is received by the interface 2022 of the client device 2520 (step S403), and the encrypted text (g r , id h ·pk j r ) constituting the privileged ID information sid h is sent to the remainder multiplication unit 2528 (constitute "encryption unit"), kid j is sent to read/write unit 2525. The kid j is recorded in the memory 2023a.

接受到密钥ID信息kidj的读写部2525从密钥存储器2524中提取对应于该密钥ID信息kidj的公开密钥pkj,将其发送到余数幂运算部2527(构成“加密部”)(步骤S404)。以此为触发,随机数生成部2526生成大于等于0小于p-1的随机数r’,将其发送到余数幂运算部2527(步骤S405)。余数幂运算部2527使自身的存储器内的生成元g、收到的公开密钥(pkj)以及随机数r’进行(gr’,pkj r’)的运算,将其结果发送到余数乘法运算部2528(步骤S406)。余数乘法运算部2528使用收到的(gr,pkj r’)和(gr,idh·pkj r)运算(gr+r’,idh·pkj r+r’),将其运算结果作为新的加密文本发送到接口2022(步骤S407)。然后,接口2022将发送的加密文本(gr+r’,idh·pkj r+r’)以及接口2022的存储器内的密钥ID信息kidj作为新的隐匿ID信息(sidh’=((gr+r’,idh·pkj r+r’,kidj))发送(输出)(步骤S408)。The read-write unit 2525 that has received the key ID information kid j extracts the public key pk j corresponding to the key ID information kid j from the key memory 2524, and sends it to the remainder exponentiation unit 2527 (constituting the “encryption unit”). ") (step S404). Using this as a trigger, the random number generation unit 2526 generates a random number r′ greater than or equal to 0 and less than p−1, and sends it to the remainder exponentiation unit 2527 (step S405 ). The remainder exponentiation unit 2527 performs (g r ', pk j r ') operation on the generator g in its own memory, the received public key (pk j ) and the random number r', and sends the result to the remainder The multiplication unit 2528 (step S406). The remainder multiplication unit 2528 uses the received (g r , pk j r ') and (g r , id h pk j r ) to calculate (g r+r ', id h pk j r+r '), and The calculation result is sent to the interface 2022 as a new encrypted text (step S407). Then, the interface 2022 uses the sent encrypted text (g r+r ', id h pk j r+r ') and the key ID information kid j in the memory of the interface 2022 as new hidden ID information (sid h '= ((g r+r ', id h ·pk j r+r ', kid j )) is sent (output) (step S408).

发送的新的隐匿ID信息sidh’在标签装置2510的接口2013中被接收,经由读写部2012存储在存储器2511(步骤S409)。之后,标签装置2510对读取请求响应该新的隐匿ID信息sidh’。The transmitted new secret ID information sid h ' is received by the interface 2013 of the tag device 2510, and stored in the memory 2511 via the read/write unit 2012 (step S409). Afterwards, the tag device 2510 responds to the read request with the new concealed ID information sid h '.

<实施例19的特征><Features of Embodiment 19>

在实施例19中,客户机装置2520进行标签装置2510内的隐匿ID信息的再隐匿。这里,客户机装置2520进行再隐匿处理的仅是在接口2022中直接读取的隐匿ID信息。因此,可以抑制信息泄漏到第三者,并可以确保更高的安全性。In the nineteenth embodiment, the client device 2520 re-blinds ID information in the tag device 2510 . Here, the client device 2520 re-privileges only the privileged ID information directly read from the interface 2022 . Therefore, leakage of information to a third party can be suppressed, and higher security can be ensured.

另外,在本实施例中,安全服务器装置2520的密钥存储器2524中存储了公开密钥(pk1,...,pkn),但安全服务器装置2520也可以不保持公开密钥(pk1,...,pkn)而从规定的公开密钥服务器中取得公开密钥(pk1,...,pkn)而使用。In addition, in this embodiment, the public key ( pk 1 , . , ..., pk n ) to obtain and use public keys (pk 1 , ..., pk n ) from a predetermined public key server.

而且,将从实施例14到实施例16的方式的任何一个安全服务器装置的结构应用于客户机装置2520,并执行本实施例的处理也可以。Furthermore, the client device 2520 may apply the configuration of any one of the security server devices in the modes of the fourteenth to sixteenth embodiments to execute the processing of the present embodiment.

[实施例20][Example 20]

接着,说明实施例20。Next, Example 20 will be described.

在本实施例中,在客户机装置(相当于“更新委托装置”)中取得多个隐匿ID信息,使用从那里选择了的隐匿ID信息更新标签装置内的隐匿ID信息。In this embodiment, a plurality of privileged ID information is acquired in a client device (corresponding to an "update requesting device"), and the privileged ID information in the tag device is updated using the privileged ID information selected therefrom.

图43是例示本实施例中的更新系统2600的功能结构的方框图,图44是用于说明其处理顺序的流程图。以下,使用这些图说明本实施例的功能结构以及处理。在图43中对于与实施例14共同的结构赋予与实施例14相同的标号。而且,以下以与实施例14的不同点为中心进行说明。FIG. 43 is a block diagram illustrating the functional configuration of update system 2600 in this embodiment, and FIG. 44 is a flowchart for explaining its processing procedure. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In FIG. 43, the same reference numerals as in the fourteenth embodiment are given to the structures common to the fourteenth embodiment. Furthermore, the following description will focus on the differences from the fourteenth embodiment.

<预处理><preprocessing>

首先,在客户机装置2620的通信部2021(相当于“隐匿ID输入部”)中接收通过网络2070发送的多个种类的隐匿ID信息(sidh-1,...,p)(接受输入)(步骤S410)。该多个种类的隐匿ID信息(sidh-1,...,p)是通过重复多次从实施例14到实施例17中任何的方法,或者通过安全服务器装置2660发送一次多个种类的隐匿ID信息而得到的信息。而且,在利用实施例14的方法的情况下,安全服务器装置2660的隐匿ID存储器中对于一个标签ID信息需要保持多个隐匿ID信息(sidh-1,...,p)。与此相对,在利用从实施例15到实施例17的方法的情况下,存储在安全服务器装置2660中的信息也可以与实施例15到实施例17同样。First, the communication unit 2021 (corresponding to the “privileged ID input unit”) of the client device 2620 receives multiple types of privileged ID information (sid h −1, . . . , p) transmitted via the network 2070 (accept input ) (step S410). The multiple types of concealed ID information (sid h -1, ..., p) are repeated multiple times from any method in embodiment 14 to embodiment 17, or the security server device 2660 sends multiple types of information once. Information obtained by hiding ID information. Furthermore, when using the method of the fourteenth embodiment, the privileged ID memory of the security server device 2660 needs to hold a plurality of privileged ID information (sid h -1, . . . , p) for one tag ID information. On the other hand, when using the methods of Embodiment 15 to Embodiment 17, the information stored in the security server device 2660 may be the same as that of Embodiment 15 to Embodiment 17.

通信部2021将这些隐匿ID信息(sidh-1,...,p)发送到读写部2624,读写部2624将它们存储在隐匿ID存储器2625中(步骤S411)。The communication unit 2021 sends these privileged ID information (sid h -1, . . . , p) to the read/write unit 2624, and the read/write unit 2624 stores them in the privileged ID memory 2625 (step S411).

<隐匿ID更新处理><Anonymous ID update processing>

客户机装置2620通过控制部2023的控制执行以下的处理。The client device 2620 executes the following processing under the control of the control unit 2023 .

首先,在控制部2023中,判断是否有进行隐匿ID更新的规定的触发(时机)(步骤S412)。作为该触发,例如可以举出从标签装置2610中读取了隐匿ID信息,或表示标签装置2610内的隐匿ID信息的使用次数的计数值达到规定值。这里,在没有规定的触发的情况下,继续步骤S412的判断,在有规定的触发的情况下,在读写部2624(相当于“隐匿ID提取部”)中,从隐匿ID存储器2625中提取一个隐匿ID信息sidh-j(步骤S413)。这一个隐匿ID信息sidh-j的选择,例如可以随机进行,或者也可以以sidh-1、sidh-2、...的排列顺序选择,在sidh-p之后再次返回sidh-1。提取的一个隐匿ID信息sidh-j从读写部2624发送到接口2022(相当于“隐匿ID输出部”),并从此处对标签装置2610发送(输出)(步骤S414)。First, in the control unit 2023, it is judged whether or not there is a predetermined trigger (timing) to update the privilege ID (step S412). As this trigger, for example, the privileged ID information is read from the tag device 2610, or the count value indicating the number of times the privileged ID information in the tag device 2610 is used reaches a predetermined value. Here, if there is no predetermined trigger, the judgment in step S412 is continued, and if there is a predetermined trigger, the read/write unit 2624 (corresponding to the “privileged ID extraction unit”) extracts the ID from the privileged ID memory 2625. A hidden ID information sid h -j (step S413). The selection of the concealed ID information sid h -j can be done randomly, for example, or can be selected in the order of sid h -1, sid h -2, ..., and return to sid h - again after sid h -p 1. The extracted private ID information sid h -j is sent from the read/write unit 2624 to the interface 2022 (corresponding to the “private ID output unit”), and then sent (output) to the tag device 2610 (step S414).

标签装置2610在接口2013中接收该隐匿ID信息sidh-j(步骤S415),经由读写部2012存储在秘密值存储器2611中(步骤S416)。之后,标签装置2610对于来自读取装置的读取请求响应该新的隐匿ID信息sidh’。The tag device 2610 receives the privileged ID information sid h -j through the interface 2013 (step S415), and stores it in the secret value memory 2611 via the read/write unit 2012 (step S416). Afterwards, the tag device 2610 responds to the new covert ID information sid h ' to the read request from the reading device.

<实施例20的特征><Features of Embodiment 20>

在本实施例中,在客户机装置2620中预先存储多个种类的隐匿ID信息,通过从此处选择的隐匿ID信息更新标签装置2610的隐匿ID信息。这里,在客户机装置2620内进行更新所使用的隐匿ID信息的选择,在客户机装置2620和标签装置2610之间局部地进行该发送。因此,可以抑制信息泄漏到第三者,并可以确保更高的安全性。而且,如果进行一次从安全服务器装置2660向客户机装置2620发送多个种类的隐匿ID信息,则可以降低对安全服务器装置2660的访问次数,所以可以减轻伴随隐匿ID信息的更新处理的系统的性能下降。In this embodiment, a plurality of types of privileged ID information are stored in advance in the client device 2620, and the privileged ID information of the tag device 2610 is updated with the privileged ID information selected therefrom. Here, the selection of the privileged ID information used for updating is performed within the client device 2620 , and the transmission is performed locally between the client device 2620 and the tag device 2610 . Therefore, leakage of information to a third party can be suppressed, and higher security can be ensured. Furthermore, if multiple types of privileged ID information are sent from the secure server device 2660 to the client device 2620 at one time, the number of accesses to the secure server device 2660 can be reduced, so the performance of the system accompanying the update process of the privileged ID information can be reduced. decline.

隐匿ID信息的选择·存储的时机不限于以上所述,而且,在存储在客户机装置2620中的隐匿ID信息全部用尽之后,从安全服务器装置2660再次取得多个种类的隐匿ID信息,并存储在客户机装置2620中也可以。The timing of selecting and storing the privileged ID information is not limited to the above, and after all the privileged ID information stored in the client device 2620 is exhausted, multiple types of privileged ID information are acquired again from the security server device 2660, and Storage in the client device 2620 is also possible.

[实施例21][Example 21]

接着,说明实施例21。Next, Example 21 will be described.

本实施例是实施例20的变形例,客户机装置取得从多个安全服务器装置(“更新装置”)输出的隐匿ID信息,这一点与实施例20不同。This embodiment is a modified example of the twentieth embodiment, and differs from the twentieth embodiment in that the client device acquires the privileged ID information output from a plurality of security server devices ("update devices").

图45是例示本实施例中的更新系统2700的功能结构的方框图。以下,使用这些图说明本实施例的功能结构以及处理。在图45中对于与实施例14或实施例20共同的结构赋予与实施例14或实施例20相同的标号。而且,以下以与实施例20的不同点为中心进行说明。FIG. 45 is a block diagram illustrating the functional structure of the update system 2700 in this embodiment. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In FIG. 45 , the same reference numerals as those in Embodiment 14 or Embodiment 20 are given to the structures common to Embodiment 14 or Embodiment 20. In addition, the following description will focus on the differences from the twentieth embodiment.

<预处理><preprocessing>

与实施例20的不同点仅在于,客户机装置2620从多个安全服务器装置2760-1、2760-2、...、2760-p接收多个种类的隐匿ID信息(sidh-1,...,p)。另外,多个安全服务器装置2760-1、2760-2、...、2760-p中的ID的隐匿,例如使用实施例18的方法。The only difference from Embodiment 20 is that the client device 2620 receives multiple types of anonymized ID information (sid h -1, . . . , p). In addition, the concealment of the IDs in the plurality of security server apparatuses 2760-1, 2760-2, . . . , 2760-p uses, for example, the method of the eighteenth embodiment.

<隐匿ID更新处理><Anonymous ID update processing>

与实施例20相同。Same as Example 20.

<实施例21的特征><Features of Embodiment 21>

在本实施例中,在客户机装置2620中取得由多个安全服务器装置2760-1、2760-2、...、2760-p生成的隐匿ID信息。因此,可以防止隐匿ID信息的更新历史集中于一个安全服务器装置,并可以实现更高的安全性。In this embodiment, the client device 2620 acquires the privileged ID information generated by the plurality of security server devices 2760-1, 2760-2, . . . , 2760-p. Therefore, it is possible to prevent the update history of the anonymized ID information from being concentrated in one secure server device, and higher security can be realized.

而且,如前所述,在实施例20中,在利用实施例14的方法生成隐匿ID信息的情况下,安全服务器装置的隐匿ID存储器中对于一个密钥ID信息需要保持多个隐匿ID信息(sidh-1,...,p)。但是,在本实施例中,即使在利用实施例14的方法生成隐匿ID信息的情况下,各安全服务器装置管理的隐匿ID信息对于一个密钥ID信息仅一个隐匿ID信息就可以。这一点可以简化隐匿ID信息的管理。Moreover, as described above, in Embodiment 20, in the case of generating privileged ID information using the method of Embodiment 14, a plurality of privileged ID information ( sid h -1,...,p). However, in the present embodiment, even when the privileged ID information is generated by the method of the fourteenth embodiment, the privileged ID information managed by each security server device only needs one privileged ID information for one key ID information. This simplifies the management of anonymous ID information.

[实施例22][Example 22]

接着,说明实施例22。Next, Example 22 will be described.

本实施例是实施例20以及实施例21的变形例,将取得的多个隐匿ID信息存储在标签装置内,而不是存储在客户机装置内。This embodiment is a modified example of the twentieth and twenty-first embodiments, and stores the obtained plurality of privileged ID information in the tag device instead of in the client device.

图46是例示本实施例中的更新系统2800的功能结构的方框图。以下,使用这些图说明本实施例的功能结构以及处理。在图46中对于与实施例14共同的结构赋予与实施例14相同的标号。而且,以下以与实施例14、实施例20以及实施例21的不同点为中心进行说明。FIG. 46 is a block diagram illustrating the functional structure of the update system 2800 in this embodiment. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In FIG. 46, the same reference numerals as those in the fourteenth embodiment are given to the structures in common with the fourteenth embodiment. Furthermore, the following description will focus on the differences from Example 14, Example 20, and Example 21.

<预处理><preprocessing>

首先,在客户机装置2020的通信部2021中,接收通过网络2070发送的多个种类的隐匿ID信息(sidh-1,...,p)。接收的多个种类的隐匿ID信息(sidh-1,...,p)被发送到接口2022,并从此处对标签装置2810发送。First, the communication unit 2021 of the client device 2020 receives a plurality of types of privileged ID information (sid h -1, . . . , p) transmitted via the network 2070 . The received multiple types of privileged ID information (sid h -1, . . . , p) are sent to the interface 2022, and are sent to the tag device 2810 from there.

标签装置2810在接口2013(相当于“隐匿ID输入部”)中,接收多个种类的隐匿ID信息(sidh-1,...,p)(接受输入),并将它们发送到读写部2012。读写部2012将它们存储再隐匿ID存储器2811中,隐匿ID信息(sidh-1,...,p)可以是从一个安全服务器装置输出的信息,也可以是从多个安全服务器装置输出的信息。The tag device 2810 receives multiple types of hidden ID information (sid h -1, . Ministry 2012. The read-write unit 2012 stores them in the hidden ID memory 2811. The hidden ID information (sid h -1, ..., p) can be output from one security server device, or can be output from multiple security server devices. Information.

<隐匿ID更新处理><Anonymous ID update processing>

标签装置2810的读写部2012(相当于“隐匿ID提取部”)在控制部2014的控制下,例如,以来自读取装置的读取指示作为触发(时机),从隐匿ID存储器2811中任意地(例如,随机地)提取一个隐匿ID信息(sidh-j),并将其从接口2013发送。发送的隐匿ID信息(sidh-j)如实施例14所述,使用于后端装置中的处理。Under the control of the control unit 2014, the read/write unit 2012 (corresponding to the “hidden ID extracting unit”) of the tag device 2810, for example, takes a reading instruction from the reading device as a trigger (timing), and randomly selects any ID from the hidden ID memory 2811. A covert ID information (sid h -j) is randomly (for example, randomly) extracted and sent from the interface 2013. The sent hidden ID information (sid h -j) is used for processing in the backend device as described in Embodiment 14.

<实施例22的特征><Features of Embodiment 22>

在本实施例中,标签装置2810中存储多个隐匿ID信息(sidh-1,...,p),并使用从它们中选择的一个隐匿ID信息(sidh-j)。由此,关于ID的信息的取得等所使用的隐匿ID信息不会在每次相同,可以抑制对标签装置2810的追踪。而且,由于标签装置2810自身中存储多个种类的隐匿ID信息(sidh-1,...,p),所以即使在无法访问客户机装置2020的情况下(例如,没有客户机装置2020的功能的读取装置中的读取处理时),也可以更新使用的隐匿ID信息。In this embodiment, a plurality of concealed ID information (sid h -1, . . . , p) are stored in the tag device 2810, and one concealed ID information (sid h -j) selected from them is used. Thereby, the privileged ID information used for acquisition of the ID information etc. will not be the same every time, and tracking of the tag apparatus 2810 can be suppressed. Moreover, since the tag device 2810 itself stores a plurality of types of hidden ID information (sid h -1, ..., p), even if the client device 2020 cannot be accessed (for example, there is no client device 2020 During the reading process in the reading device of the function), the privileged ID information used can also be updated.

[实施例23][Example 23]

在本实施例中,在标签装置中设有秘密值存储器,所述秘密值存储器具有存储密钥ID信息的只读区域和存储第一隐匿ID信息的可改写区域。而且,在隐匿ID信息的再隐匿处理时,从该隐匿ID存储器提取密钥ID信息和第一隐匿ID信息并输出。In this embodiment, a secret value memory is provided in the tag device, and the secret value memory has a read-only area for storing key ID information and a rewritable area for storing first hidden ID information. Then, at the time of re-blinding of the privileged ID information, the key ID information and the first privileged ID information are extracted from the privileged ID memory and output.

更新装置接受这些密钥ID信息和第一隐匿ID信息的输入,并提取该密钥ID信息所对应的密钥。然后,使用提取的密钥和第一隐匿ID信息生成难以掌握与第一隐匿ID信息的关联性的第二隐匿ID信息,并输出该第二隐匿ID信息。The updating device accepts the input of the key ID information and the first hidden ID information, and extracts the key corresponding to the key ID information. Then, using the extracted key and the first privileged ID information, second privileged ID information whose association with the first privileged ID information is difficult to grasp is generated, and the second privileged ID information is output.

标签装置接受该第二隐匿ID信息的输入,并将输入的第二隐匿ID信息存储在隐匿ID存储器的可改写区域中。The tag device accepts the input of the second concealed ID information, and stores the input second concealed ID information in the rewritable area of the concealed ID memory.

这里,在更新装置中被更新的仅是隐匿ID信息。而且,在标签装置中被改写的仅是可改写区域内的隐匿ID信息,只读区域内的密钥ID信息没有变化。因此,即使在可改写区域内的隐匿ID信息被改写为不同的标签装置所对应的隐匿ID信息的情况下,该隐匿ID信息的解码处理所使用的密钥ID信息为原密钥ID信息的原样。因此,该改写的隐匿ID信息的解码时选择的解码服务器例如是基于原密钥ID信息选择的解码服务器,有时无法适当进行该改写的隐匿ID信息的解码处理。而且,即使在共同解码服务器的情况下,该改写的隐匿ID信息的解码处理所使用的密钥也是对应于原密钥ID信息的密钥。从而,该解码结果也异常。Here, only the privileged ID information is updated by the updating device. Moreover, only the hidden ID information in the rewritable area is rewritten in the tag device, and the key ID information in the read-only area remains unchanged. Therefore, even if the hidden ID information in the rewritable area is rewritten into the hidden ID information corresponding to a different tag device, the key ID information used in the decoding process of the hidden ID information is the key ID information of the original key ID information. as is. Therefore, the decoding server selected when decoding the rewritten privileged ID information is, for example, a decoding server selected based on the original key ID information, and the decoding process of the rewritten privileged ID information may not be properly performed. Furthermore, even in the case of a common decoding server, the key used for the decoding process of the rewritten privileged ID information is a key corresponding to the original key ID information. Therefore, this decoding result is also abnormal.

以下,参照附图说明该实施例。Hereinafter, this embodiment will be described with reference to the drawings.

图47是本例示实施例的更新系统3000的整体结构的概念图。FIG. 47 is a conceptual diagram of the overall configuration of the update system 3000 of the present exemplary embodiment.

如该图所例示的,更新系统3000具有:贴在商品等上的无线标签等标签装置3010、客户机装置3020、管理与纯文本的ID关联的流通信息等的后端装置3050、进行隐匿ID信息的再隐匿处理的安全服务器装置3060、以及进行ID的复原处理的安全服务器装置3070。而且,客户机装置3020、后端装置3050以及安全服务器装置3060、3070可通过因特网等网络3080通信地连接。另外,为了简化说明,在该图中,标签装置3010、客户机装置3020、后端装置3050以及安全服务器装置3060、3070分别例示了一个,但通常标签装置为多个,客户机装置、后端装置以及安全服务器也可以有多个。进而,也可以代替安全服务器装置3060、3070使用具有安全服务器装置3060、3070的两功能的安全服务器装置。As illustrated in this figure, the update system 3000 includes a tag device 3010 such as a wireless tag attached to a product, etc., a client device 3020, a back-end device 3050 that manages distribution information related to a plain text ID, etc., and performs ID concealment. A security server device 3060 for re-confidentialization of information, and a security server device 3070 for restoring IDs. Furthermore, the client device 3020, the backend device 3050, and the security server devices 3060 and 3070 can be communicatively connected via a network 3080 such as the Internet. In addition, in order to simplify the description, in this figure, each of the tag device 3010, the client device 3020, the back-end device 3050, and the security server device 3060, 3070 is illustrated as an example, but usually there are multiple tag devices, and the client device, the back-end device There may also be multiple devices and security servers. Furthermore, instead of the security server devices 3060 and 3070, a security server device having both functions of the security server devices 3060 and 3070 may be used.

本例的客户机装置3020从标签装置10读取隐匿ID信息,将其发送到安全服务器装置3070。安全服务器装置3070将从隐匿ID信息复原ID,并将该ID发送回客户机装置3020。收到ID的客户机装置3020访问后端装置3050,请求读取日期时间、读取位置、温度等信息的写入,或与ID关联的信息的取得等。而且,可以设想一种代理模型的利用方式,客户机装置3020将隐匿ID信息发送到安全服务器装置3070,安全服务器装置3070可以直接访问后端装置3050。The client device 3020 of this example reads the privileged ID information from the tag device 10 and sends it to the security server device 3070 . The secure server device 3070 will recover the ID from the concealed ID information and send the ID back to the client device 3020. The client device 3020 having received the ID accesses the backend device 3050 to request writing of information such as date and time, reading position, temperature, etc., or acquisition of information related to the ID. In addition, a proxy model utilization method is conceivable in which the client device 3020 sends the anonymized ID information to the security server device 3070, and the security server device 3070 can directly access the backend device 3050.

而且,通过规定的时机,标签装置3010内的隐匿ID信息在安全服务器装置3060中被再隐匿处理(将隐匿ID信息更新为其它的隐匿ID信息),标签装置3010内的隐匿ID信息被更新。由于可以可靠地确保隐匿ID信息的更新时机,所以例如也可以在家的门廊中设置客户机装置3020。在该情况下,在保持标签装置的用户每次通过门廊时,客户机装置3020读取标签装置3010的隐匿ID信息,并由安全服务器装置3060将其再隐匿,再次写入标签装置。And, at a predetermined timing, the privileged ID information in the tag device 3010 is re-cloaked in the security server device 3060 (updates the privileged ID information to other privileged ID information), and the privileged ID information in the tag device 3010 is updated. Since the update timing of the privacy ID information can be reliably ensured, the client device 3020 can be installed, for example, on the porch of a home. In this case, every time the user holding the tag device passes through the hallway, the client device 3020 reads the concealed ID information of the tag device 3010, and the security server device 3060 re-cloaks it and writes it into the tag device again.

然后,本实施例的特征部分在于,标签装置3010具备隐匿ID存储器,所述隐匿ID存储器具有存储密钥ID信息的只读区域和存储隐匿ID信息可改写区域,以及再隐匿的隐匿ID信息写入可改写区域,但是不进行存储密钥ID信息的只读区域的更新。存储在可改写区域内的密钥ID信息中不包含密钥ID信息。Then, the characteristic part of this embodiment is that the tag device 3010 is equipped with a concealed ID memory, and the concealed ID memory has a read-only area for storing key ID information and a rewritable area for storing concealed ID information, as well as a write-only area for hiding the concealed ID information. The rewritable area is entered, but the read-only area storing the key ID information is not updated. Key ID information is not included in the key ID information stored in the rewritable area.

<功能结构·处理><Functional structure and processing>

图48是例示本实施例中的更新系统3000的功能结构的图,图49以及图50是用于说明其处理顺序的流程图。以下,使用这些图说明本实施例的功能结构以及处理。另外,省略图48以后的后端装置的记载。而且,标签装置3010、客户机装置3020、以及安全服务器装置3060、3070分别通过控制部3014、3023、3065、3075的控制来执行各处理。而且,被处理的数据逐一存储在存储器3014a、3023a、3065a或3075a中,在进行运算等处理时被调用,以下省略该说明。FIG. 48 is a diagram illustrating the functional configuration of the update system 3000 in this embodiment, and FIGS. 49 and 50 are flowcharts illustrating the processing procedures thereof. Hereinafter, the functional configuration and processing of this embodiment will be described using these figures. In addition, the description of the back-end device after FIG. 48 is omitted. Furthermore, the tag device 3010, the client device 3020, and the security server devices 3060 and 3070 execute respective processes under the control of the control units 3014, 3023, 3065 and 3075, respectively. Furthermore, the data to be processed is stored in the memory 3014a, 3023a, 3065a, or 3075a one by one, and is called when processing such as calculation is performed, and the description thereof will be omitted below.

<预处理><preprocessing>

在本方式中,使用通过具有再加密的性质的加密算法(公开密钥加密方式)的加密文本作为隐匿ID信息。在本例中,使用椭圆ElGamal加密。In this method, an encrypted text using an encryption algorithm (public key encryption method) having a re-encryption property is used as the privileged ID information. In this example, elliptic ElGamal encryption is used.

如图48所例示的,本例的标签装置3010具有秘密值存储器3011,所述秘密值存储器3011具有只读区域3011a和可改写区域3011b。这里,作为秘密值存储器3011,使用EEPROM等可改写ROM(Read Only Memory)等可改写的存储器,也可以将该规定区域分配给只读区域3011a和可改写区域3011b,或者使用ROM等不可改写的存储器构成只读区域3011a,使用EEPROM等可改写存储器构成可改写区域3011b。而且,该只读区域3011a中存储(记录)确定密钥skj以及公开密钥pkj的密钥ID信息kidj,可改写区域3011b中存储隐匿ID信息sidh=(gr,idh·pkj r)。As illustrated in FIG. 48, the tag device 3010 of this example has a secret value memory 3011 having a read-only area 3011a and a rewritable area 3011b. Here, as the secret value memory 3011, a rewritable memory such as a rewritable ROM (Read Only Memory) such as EEPROM is used, and the predetermined area may be allocated to the read-only area 3011a and the rewritable area 3011b, or a non-rewritable memory such as a ROM may be used. The memory constitutes the read-only area 3011a, and a rewritable memory such as EEPROM constitutes the rewritable area 3011b. Further, key ID information kid j of the specific key sk j and public key pk j is stored (recorded) in the read-only area 3011a, and hidden ID information sid h =(g r , id h · pk j r ).

而且,安全服务器装置3060(“更新装置”)的存储器3065a中存储有生成元g,安全服务器装置3070(相当于“解码装置”)的密钥存储器3071中对应存储有各密钥ID信息(kid1,...,kidn)、密钥(sk1,...,skn)以及公开密钥(pk1,...,pkn)。Moreover, the generator g is stored in the memory 3065a of the security server device 3060 ("updating device"), and each key ID information (kid 1 , . . . , kid n ), keys (sk 1 , . . . , sk n ), and public keys (pk 1 , . . . , pk n ).

在本例中,标签装置的总数m充分大于密钥的总数n(m>>n),对于没有关联性的标签装置分配相同的密钥ID信息。即,例如,不对在相同种类的商品上分别附带的标签装置分配相同的密钥ID信息,而对在无关联的商品上分别附带的标签装置分配相同的密钥ID信息。由此,可以防止从密钥ID信息唯一确定商品种类或商品个体等。In this example, the total number m of tag devices is sufficiently larger than the total number n of keys (m>>n), and the same key ID information is assigned to unrelated tag devices. That is, for example, the same key ID information is not assigned to tag devices attached to products of the same type, but the same key ID information is assigned to tag devices attached to unrelated products. Thereby, it is possible to prevent the type of product, individual product, etc. from being uniquely identified from the key ID information.

<隐匿ID解码处理><Concealed ID decoding processing>

最初,说明在对后端装置3050请求与ID关联的信息的取得等时进行的密钥ID信息的解码处理。First, the decoding process of the key ID information performed when requesting the backend device 3050 to acquire information related to the ID, etc. will be described.

首先,利用任何的认证技术在客户机装置3020和安全服务器装置3070之间进行相互认证。另外,客户机装置3020和安全服务器装置3070的通信通过任何的加密技术加密而进行。First, mutual authentication is performed between the client device 3020 and the secure server device 3070 using any authentication technique. In addition, the communication between the client device 3020 and the security server device 3070 is encrypted by any encryption technique.

接着,客户机装置3020在接口3022中向标签装置3010发送读取指示(步骤S501)。该读取指示在标签装置3010的接口3013中被接收,以此为触发,读写部3012从秘密值存储器3011的只读区域3011a中提取密钥ID信息kidj,从可改写区域3011b中提取隐匿ID信息sidh(步骤S502)。提取的隐匿ID信息sidh以及密钥ID信息kidj通过接口3013被发送到客户机装置3020(步骤S503),在客户机装置3020的接口3022中被接收。客户机装置3020例如从收到的密钥ID信息kidj确定安全服务器装置3070的地址,并对该安全服务器装置3070从通信部3021通过网络3080发送隐匿ID信息sidh以及密钥ID信息kidj(步骤S504)。Next, the client device 3020 sends a reading instruction to the tag device 3010 through the interface 3022 (step S501 ). The reading instruction is received in the interface 3013 of the tag device 3010. Triggered by this, the read-write unit 3012 extracts the key ID information kid j from the read-only area 3011a of the secret value memory 3011, and extracts the key ID information kid j from the rewritable area 3011b. Conceal ID information sid h (step S502). The extracted privileged ID information sid h and key ID information kid j are sent to the client device 3020 through the interface 3013 (step S503 ), and are received in the interface 3022 of the client device 3020 . For example, the client device 3020 determines the address of the security server device 3070 from the received key ID information kid j , and transmits the hidden ID information sid h and the key ID information kid j to the security server device 3070 from the communication unit 3021 through the network 3080. (step S504).

发送的隐匿ID信息sidh以及密钥ID信息kidj在安全服务器装置3070的通信部3072(相当于“隐匿ID输入部”)中被接收(接受输入)(步骤S505),隐匿ID信息sidh被发送到解码部3074(相当于“ID计算部”),密钥ID信息kidj被发送到读取部3073。读取部3073(相当于“密钥提取部”)从密钥存储器3071中提取发送的密钥ID信息kidj所对应的密钥skj,并发送到解码部3074(步骤S506)。解码部3074使用发送的隐匿ID信息sidh和密钥skj计算将隐匿ID信息sidh解码的标签ID信息idh。在本例中,进行idh=(idh·pkj r)/(gr)skj的运算,计算标签ID信息idh。该算式中的指数“skj”表示“skj”。计算出的标签ID信息idh被发送到通信部3072,并从此处通过网络3080被向客户机装置3020发送(步骤S508)。客户机装置3020在通信部3021中接收发送的标签ID信息idh(步骤S509),并将该标签ID信息idh用于之后的对后端装置3050的询问。The transmitted privileged ID information sid h and key ID information kid j are received (input accepted) in the communication unit 3072 (corresponding to the “hidden ID input unit”) of the security server device 3070 (step S505), and the secret ID information sid h The key ID information kid j is sent to the reading unit 3073 . The reading unit 3073 (corresponding to the "key extracting unit") extracts the key sk j corresponding to the transmitted key ID information kid j from the key memory 3071, and sends it to the decoding unit 3074 (step S506). The decoding unit 3074 calculates tag ID information id h that decodes the privileged ID information sid h using the transmitted privileged ID information sid h and the key sk j . In this example, the calculation of id h = (id h ·pk j r )/(g r ) skj is performed to calculate the tag ID information id h . The exponent "skj" in this formula represents "sk j ". The calculated tag ID information id h is sent to the communication unit 3072, and from there to the client device 3020 via the network 3080 (step S508). The client device 3020 receives the transmitted tag ID information id h in the communication unit 3021 (step S509 ), and uses the tag ID information id h for subsequent inquiries to the backend device 3050 .

<隐匿ID更新处理><Anonymous ID update processing>

接着,说明本实施例中的隐匿ID信息的更新处理。Next, the update processing of the privileged ID information in this embodiment will be described.

首先,利用任何的认证技术在客户机装置3020和安全服务器装置3060之间进行相互认证。另外,客户机装置3020和安全服务器装置3060的通信通过任何的加密技术加密而进行。First, mutual authentication is performed between the client device 3020 and the secure server device 3060 using any authentication technique. In addition, the communication between the client device 3020 and the security server device 3060 is encrypted by any encryption technique.

本例的隐匿ID信息的更新处理,以任意的时机、例如,通过门廊等外出时一定通过的场所的情况或存储在标签装置3010内的隐匿ID信息的使用次数(计数值达到规定值)等。通过该触发,客户机装置3020在接口3022中对标签装置3010发送读取指示(步骤S511)。该读取指示在标签装置3010的接口3013中被接收,并以此为触发,读写部3012(相当于“隐匿ID提取部”)从秘密值存储器3011的只读区域3011a中提取密钥ID信息kidj,从可改写区域3011b中提取隐匿ID信息sidh(步骤S512)。提取的隐匿ID信息sidh以及密钥ID信息kidj被通过接口3013(相当于“密钥ID提取部”)发送(输出)到客户机装置3020(步骤S513),在客户机装置3020的接口3022中被接收。客户机装置3020将收到的隐匿ID信息sidh以及密钥ID信息kidj通过通信部3021以及网络3080发送到安全服务器装置3060(步骤S514)。The update process of the private ID information in this example is performed at an arbitrary timing, for example, when passing through a place such as a porch or the like when going out, or the number of times the private ID information stored in the tag device 3010 is used (the count value reaches a predetermined value), etc. . By this trigger, the client device 3020 transmits a read instruction to the tag device 3010 through the interface 3022 (step S511 ). The reading instruction is received in the interface 3013 of the tag device 3010, and as a trigger, the read/write unit 3012 (corresponding to the “hidden ID extraction unit”) extracts the key ID from the read-only area 3011a of the secret value memory 3011 information kid j , extract hidden ID information sid h from the rewritable area 3011b (step S512). The extracted hidden ID information sid h and key ID information kid j are sent (output) to the client device 3020 through the interface 3013 (corresponding to the "key ID extraction part") (step S513), and the interface of the client device 3020 Received in 3022. The client device 3020 transmits the received privileged ID information sid h and key ID information kid j to the security server device 3060 through the communication unit 3021 and the network 3080 (step S514).

安全服务器装置3060在通信部3061(相当于“隐匿ID输入部”)中接收(接受输入)该隐匿ID信息sidh以及密钥ID信息kidj(步骤S515),并将隐匿ID信息(sidh=(gr,idh·pkj r))发送到余数乘法运算部3064(构成“隐匿ID更新部”)。而且,通信部3061(相当于“密钥提取部”)将该密钥ID信息kidj和公开密钥取得请求同时通过网络3080发送到安全服务器装置3070。The secure server device 3060 receives (accepts input) the privileged ID information sid h and the key ID information kid j in the communication unit 3061 (corresponding to the “privileged ID input unit”) (step S515), and transfers the privileged ID information (sid h =(g r , id h ·pk j r )) is sent to the remainder multiplication unit 3064 (constituting a "privileged ID update unit"). Then, the communication unit 3061 (corresponding to the “key extraction unit”) transmits the key ID information kid j and the public key acquisition request to the security server device 3070 through the network 3080 at the same time.

安全服务器装置3070在通信部3072中接收它们,将密钥ID信息kidj发送到读取部3073。读取部3073从密钥存储器3071中提取对应于该密钥ID信息kidj的公开密钥pkj,并将提取的公开密钥pkj通过通信部3072以及网络3080发送回安全服务器装置3060。The security server device 3070 receives these in the communication unit 3072 and transmits the key ID information kid j to the reading unit 3073 . The reading unit 3073 extracts the public key pk j corresponding to the key ID information kid j from the key memory 3071 , and sends the extracted public key pk j back to the security server device 3060 through the communication unit 3072 and the network 3080 .

安全服务器装置3060在通信部3061中接收(提取)该公开密钥pkj,发送到余数幂运算部3063(构成“隐匿ID更新部”)(步骤S516)。而且,例如以此为触发,随机数生成部3062生成大于等于0小于p-1的随机数r’,并将其发送到余数幂运算部3063(步骤S517)。余数幂运算部3063使用存储器3065a内的生成元g、收到的公开密钥pkj以及随机数r’进行(gr’,pkj r’)的运算,将其结果发送到余数乘法运算部3064(步骤S518)。余数乘法运算部3064使用收到的(gr’,pkj r’)和(gr,idh·pkj r)运算(gr+r’,idh·pkj r+r’),将其运算结果(加密文本)作为新的隐匿ID信息发送到通信部3061(步骤S519)。通信部3061将发送的隐匿ID信息(sidh’=(ekj(idh|r’),kidj))(难以掌握与更新前的隐匿ID信息(sidh)的关联性的隐匿ID信息(sidh’))通过网络3080发送(输出)到客户机装置3020(步骤S520)。The security server device 3060 receives (extracts) the public key pk j in the communication unit 3061, and sends it to the remainder exponentiation unit 3063 (constituting a "privileged ID update unit") (step S516). Then, for example, triggered by this, the random number generation unit 3062 generates a random number r′ greater than or equal to 0 and smaller than p−1, and sends it to the remainder exponentiation unit 3063 (step S517 ). The remainder exponentiation unit 3063 uses the generator g in the memory 3065a, the received public key pk j and the random number r' to perform (g r ', pk j r ') calculation, and sends the result to the remainder multiplication unit 3064 (step S518). The remainder multiplication unit 3064 uses the received (g r ', pk j r ') and (g r , id h pk j r ) to calculate (g r+r ', id h pk j r+r '), The calculation result (encrypted text) is sent to the communication unit 3061 as new privileged ID information (step S519). The communication unit 3061 transmits the privileged ID information (sid h '=(ek j (id h |r'), kid j )) (private ID information whose correlation with the privileged ID information (sid h ) before the update is difficult to grasp (sid h ')) is sent (output) to the client device 3020 through the network 3080 (step S520).

发送的新的隐匿ID信息sidh’在客户机装置3020的通信部3021中被接收,并通过接口3022被发送到标签装置3010(步骤S521)。标签装置3010在接口3013(相当于“隐匿ID输入部”)中接收(接受输入)该新的隐匿ID信息sidh’(步骤S522),并将该新的隐匿ID信息sidh’在读写部3012(相当于“隐匿ID存储部”)中存储在可改写区域3011b内(步骤S523)。然后,标签装置3010对于读取请求,响应该新的隐匿ID信息sidh’。The transmitted new privileged ID information sid h ' is received by the communication unit 3021 of the client device 3020, and is transmitted to the tag device 3010 through the interface 3022 (step S521). The tag device 3010 receives (accepts input) the new hidden ID information sid h ' in the interface 3013 (equivalent to the "hidden ID input part") (step S522), and reads and writes the new hidden ID information sid h ' stored in the rewritable area 3011b in the rewritable area 3011b (step S523). Then, the tag device 3010 responds to the read request with the new privileged ID information sid h '.

<实施例23的特征><Features of Embodiment 23>

在本实施例中,在标签装置3010中设有秘密值存储器3011,所述秘密值存储器3011具有存储密钥ID信息的只读区域3011a和存储隐匿ID信息的可改写区域3011b,仅将存储在可改写区域3011b中的隐匿ID信息再隐匿、更新。因此,在隐匿ID信息的再隐匿处理时,在可改写区域3011b中写入其它的标签装置的隐匿ID信息的情况下,也可以检测这样的不当·错误。In this embodiment, a secret value memory 3011 is provided in the tag device 3010. The secret value memory 3011 has a read-only area 3011a for storing key ID information and a rewritable area 3011b for storing hidden ID information. The hidden ID information in the rewritable area 3011b is hidden and updated again. Therefore, when the privileged ID information of another tag device is written in the rewritable area 3011b during the re-privilege process of the privileged ID information, such an inappropriateness/error can be detected.

例如,在图48中,考虑在标签装置3010具有的秘密值存储器3011的可改写区域3011b中存储了密钥ID信息kid1所对应的其它的标签装置的隐匿ID信息(gr,ID2·pk1 r)的情况。即使在该情况下,存储在只读区域3011a中的密钥ID信息也通常是kidj,在安全服务器装置3070的解码处理时,是在读取部3073中从密钥存储器3071中提取的密钥ID信息kidj所对应的skj。因此,解码部3074中的解码结果为(idh·pkj r)/(gr)skj=(idh·(gskl)r)/(gr)skj=ID2·gskl/gskj,其运算结果是异常数据。从而,该解码结果成为异常数据,可以检测其它的标签装置的隐匿ID信息被写入。For example, in FIG. 48 , it is considered that the hidden ID information (g r , ID 2 · pk 1 r ). Even in this case, the key ID information stored in the read-only area 3011a is usually kid j , which is the key ID information extracted from the key memory 3071 by the reading unit 3073 during the decoding process of the security server device 3070 . sk j corresponding to the key ID information kid j . Therefore, the decoding result in the decoding unit 3074 is (id h ·pk j r )/(g r ) skj =(id h ·(g skl ) r )/(g r ) skj =ID 2 ·g skl /g skj , the operation result is abnormal data. Therefore, the decoding result becomes abnormal data, and it is possible to detect that the privileged ID information of another tag device has been written.

而且,不进行通过口令等访问可改写区域3011b的控制,而可以防止隐匿ID信息的不正当改写等,所以也可以抑制该控制电路成本,进而也不需要访问控制用的复杂的口令管理等。Furthermore, access control of the rewritable area 3011b by password etc. is not performed, and unauthorized rewriting of the confidentiality ID information, etc. can be prevented, so that the cost of the control circuit can also be suppressed, and complicated password management for access control, etc. are not required.

即,可以更可靠·安全·低成本地执行隐匿ID信息的任意的定时的更新,并可以进行关于标签装置3010的隐私的保护。That is, it is possible to update the privileged ID information at an arbitrary timing more reliably, securely, and at low cost, and to protect the privacy of the tag device 3010 .

另外,在本实施例中,使用椭圆ElGamal加密进行了隐匿ID信息的生成·更新等,但也可以使用具有再加密的性质的加密,或者专利申请2003-359157号公报所示的再隐匿方法。而且,也可以将安全服务器装置3060、3070一体化,安全服务器装置3060还可以具有公开密钥的存储器。In addition, in this embodiment, generation and update of privileged ID information are performed using elliptic ElGamal encryption, but encryption having the property of re-encryption or the re-privilege method disclosed in Patent Application Publication No. 2003-359157 may also be used. Furthermore, the security server devices 3060 and 3070 may be integrated, and the security server device 3060 may further have a memory for a public key.

[实施例24][Example 24]

本实施例是实施例23的变形例,通过确认隐匿ID信息的解码结果是否与ID的格式矛盾,来确认从标签装置输出的隐匿ID信息是否有误。以下,以与实施例23的不同点为中心进行说明,对于与实施例23共同的事项省略说明。This embodiment is a modified example of Embodiment 23. By confirming whether the decoding result of the concealed ID information is inconsistent with the format of the ID, it is confirmed whether the concealed ID information output from the tag device is correct. Hereinafter, the difference from the twenty-third embodiment will be mainly described, and the description of the items common to the twenty-third embodiment will be omitted.

图51是例示本实施例中的安全服务器装置3170(相当于“解码装置”)的功能结构的图,图52是例示本实施例中的标签ID信息3200的格式的图。而且,图53是用于说明安全服务器装置3170的处理顺序的流程图。在图51中对于与实施例23共同的功能结构赋予与实施例23相同的标号。FIG. 51 is a diagram illustrating a functional configuration of a security server device 3170 (corresponding to "decoding device") in this embodiment, and FIG. 52 is a diagram illustrating a format of tag ID information 3200 in this embodiment. Moreover, FIG. 53 is a flowchart for explaining the processing procedure of the security server apparatus 3170. In FIG. 51, the same reference numerals as those in the twenty-third embodiment are assigned to the functional configurations in common with the twenty-third embodiment.

<整体结构·硬件结构><Overall structure · Hardware structure>

除了安全服务器装置3070被置换为安全服务器装置3170以外,与实施例23相同。Except that the security server device 3070 is replaced with the security server device 3170, it is the same as the embodiment 23.

<预处理><preprocessing>

与实施例23的不同点在于安全服务器装置3170具有的有效值存储器3176中存储ID的各字段的有效值。其它与实施例23同样。The difference from Embodiment 23 is that the effective value of each field of ID is stored in the effective value memory 3176 of the security server device 3170 . Others are the same as in Example 23.

<隐匿ID解码处理><Concealed ID decoding processing>

与实施例23的不同点在于,代替所述安全服务器装置3070的处理(图49:步骤S505~S508),安全服务器装置3170进行图53所例示的处理。以下,说明安全服务器装置3170的处理,省略其它的处理的说明。The difference from Embodiment 23 is that the security server device 3170 performs the processing illustrated in FIG. 53 instead of the processing of the security server device 3070 (FIG. 49: steps S505 to S508). Hereinafter, the processing of the security server device 3170 will be described, and the description of other processing will be omitted.

与实施例23同样,从客户机装置3020发送的隐匿ID信息sidh以及密钥ID信息kidj在安全服务器装置3170的通信部3072(相当于“隐匿ID输入部”)中被接收(接受输入)(步骤S531),隐匿ID信息sidh被发送到解码部3074(相当于“ID计算部”),密钥ID信息kidj被发送到读取部3073。读取部3073(相当于“密钥提取部”)从密钥存储器3071中提取发送的密钥ID信息kidj所对应的密钥skj,并发送到解码部3074(步骤S532)。解码部3074使用发送的隐匿ID信息sidh和密钥skj计算将隐匿ID信息sidh解码的标签ID信息idhSimilar to Embodiment 23, the privileged ID information sid h and the key ID information kid j transmitted from the client device 3020 are received by the communication unit 3072 (corresponding to the "privileged ID input unit") of the security server device 3170 (accept input). ) (step S531), the privileged ID information sid h is sent to the decoding unit 3074 (corresponding to the “ID calculation unit”), and the key ID information kid j is sent to the reading unit 3073. The reading unit 3073 (corresponding to the "key extracting unit") extracts the key sk j corresponding to the transmitted key ID information kid j from the key memory 3071, and sends it to the decoding unit 3074 (step S532). The decoding unit 3074 calculates tag ID information id h that decodes the privileged ID information sid h using the transmitted privileged ID information sid h and the key sk j .

计算出的隐匿ID信息sidh被发送到ID结构检验部3177,在此处进行该隐匿ID信息sidh的结构的检验(步骤S534)。如图52所例示的,本例的ID3200具有报头(header)(h)3204、版本码(vc)3202、制造者码(mc)3202、商品码(pc)3204、序列码(sc)3205的各字段。有效值存储器3176中存储各字段的值可取的有效值,ID结构检验部3177比较取得的标签ID信息idh的各字段的值和从有效值存储器3176提取的有效值,并检验收到的标签ID信息idh的各字段值是否在有效值范围内。这里,在检验成功了的情况下(步骤S535),ID结构检验部3177将标签ID信息idh发送到通信部3072,通信部3072将标签ID信息idh发送到客户机装置3020(步骤S536)。另一方面,在检验不成功的情况下(步骤S535),ID结构检验部3177将标签ID信息idh废弃而结束处理。The calculated privileged ID information sid h is sent to the ID structure checking unit 3177, where the structure of the privileged ID information sid h is checked (step S534). As shown in Figure 52, the ID 3200 of this example has a header (header) (h) 3204, a version code (vc) 3202, a manufacturer code (mc) 3202, a product code (pc) 3204, and a serial code (sc) 3205. fields. The effective value memory 3176 stores the effective value that the value of each field can take, and the ID structure inspection unit 3177 compares the value of each field of the tag ID information id h obtained with the effective value extracted from the effective value memory 3176, and checks the received tag Whether each field value of the ID information id h is within the range of valid values. Here, when the verification is successful (step S535), the ID structure verification unit 3177 transmits the tag ID information id h to the communication unit 3072, and the communication unit 3072 transmits the tag ID information id h to the client device 3020 (step S536). . On the other hand, when the verification is unsuccessful (step S535), the ID structure verification unit 3177 discards the tag ID information id h and ends the processing.

<实施例24的特征><Features of Embodiment 24>

在本实施例中,在安全服务器装置3170的ID结构检验部3177中,检验解码后的标签ID信息idh是否与规定的ID格式矛盾。由此,可以可靠地发现在标签装置的可改写区域写入其它的标签装置的隐匿ID信息而引起的隐匿ID信息的解码结果的数据异常。In the present embodiment, in the ID structure checking unit 3177 of the security server device 3170, it is checked whether the decoded tag ID information id h contradicts a predetermined ID format. Thereby, it is possible to reliably detect the data abnormality of the decoding result of the privileged ID information caused by writing the privileged ID information of another tag device in the rewritable area of the tag device.

[实施例25][Example 25]

本实施例是实施例23的变形例,在进行隐匿ID信息的再隐匿处理时,对密钥ID信息和再隐匿的隐匿ID信息使用密钥,并附带数字签名、MAC等认证信息,这一点与实施例23不同。以下,以与实施例23的不同点为中心进行说明,对于与实施例23共同的事项省略说明。This embodiment is a modified example of Embodiment 23. When performing the re-confidential processing of concealed ID information, a key is used for key ID information and concealed concealed ID information, and authentication information such as a digital signature and MAC is attached. It is different from Example 23. Hereinafter, the difference from the twenty-third embodiment will be mainly described, and the description of the items common to the twenty-third embodiment will be omitted.

图54以及图55是例示本实施例中的更新系统3300的功能结构的图,图56以及图57是用于说明其处理顺序的流程图。另外,在图54以及图55中对于与实施例23相同的功能结构赋予与实施例23相同的标号。FIGS. 54 and 55 are diagrams illustrating the functional configuration of the update system 3300 in this embodiment, and FIGS. 56 and 57 are flowcharts illustrating the processing procedures thereof. In addition, in FIGS. 54 and 55 , the same functional configurations as those in the twentieth embodiment are assigned the same reference numerals as in the twentieth embodiment.

<整体结构·硬件结构><Overall structure · Hardware structure>

除了标签装置3010被置换为标签装置3310,安全服务器装置3060被置换为安全服务器装置3360(相当于“更新装置”),安全服务器装置3070被置换为安全服务器装置3370(相当于“解码装置”)以外,与实施例23相同。Except that the tag device 3010 is replaced by a tag device 3310, the security server device 3060 is replaced by a security server device 3360 (equivalent to "updating device"), and the security server device 3070 is replaced by a security server device 3370 (equivalent to "decoding device") Other than that, it is the same as in Example 23.

<预处理><preprocessing>

与实施例23的不同点在于标签装置3310的秘密值存储器3311的可改写区域3311b中存储隐匿ID信息sidh和数字签名(相当于“检验信息”)σ,以及安全服务器装置3360的密钥存储器3366中存储数字签名所使用的密钥sk和公开密钥pk。其它与实施例23同样。The difference from Embodiment 23 is that the hidden ID information sid h and digital signature (equivalent to "verification information") σ are stored in the rewritable area 3311b of the secret value memory 3311 of the tag device 3310, and the key memory of the security server device 3360 3366 stores the key sk and public key pk used for the digital signature. Others are the same as in Example 23.

<隐匿ID更新处理><Anonymous ID update processing>

接着,说明本实施例中的隐匿ID信息的更新处理。Next, the update processing of the privileged ID information in this embodiment will be described.

首先,客户机装置3020在接口3022中对标签装置3310发送读取指示(步骤S541)。该读取指示在标签装置3310的接口3013中被接收,并以此为触发,读写部3012从秘密值存储器3311的只读区域3011a中提取密钥ID信息kidj,从可改写区域3311b中提取隐匿ID信息sidh(步骤S542)。提取的隐匿ID信息sidh以及密钥ID信息kidj通过接口3013被发送到客户机装置3020(步骤S543),在客户机装置3020的接口3022中被接收。客户机装置3020通过通信部3021以及网络3080对安全服务器装置3360发送隐匿ID信息sidh以及密钥ID信息kidj(步骤S544)。First, the client device 3020 transmits a reading instruction to the tag device 3310 through the interface 3022 (step S541). The read instruction is received in the interface 3013 of the tag device 3310, and as a trigger, the read-write unit 3012 extracts the key ID information kid j from the read-only area 3011a of the secret value memory 3311, and extracts the key ID information kid j from the rewritable area 3311b. Extract hidden ID information sid h (step S542). The extracted privileged ID information sid h and key ID information kid j are sent to the client device 3020 through the interface 3013 (step S543 ), and are received in the interface 3022 of the client device 3020 . The client device 3020 transmits the privileged ID information sid h and key ID information kid j to the security server device 3360 through the communication unit 3021 and the network 3080 (step S544).

安全服务器装置3360在通信部3061中接收该隐匿ID信息sidh以及密钥ID信息kidj(步骤S545),将隐匿ID信息(sidh=(gr,idh·pkj r))发送到余数幂运算部3064。而且,与实施例23同样,在通信部3061中将密钥ID信息kidj发送到安全服务器装置3370,并取得(接收)在此处提取了的公开密钥pkj(步骤S546)。该公开密钥pkj被发送到余数幂运算部3063,进一步由随机数生成部3062生成的(步骤S547)随机数r’也被发送到余数幂乘法运算部3063。余数幂运算部3063进行(gr’,pkj r’)的运算,将其结果发送到余数乘法运算部3064(步骤S548),余数乘法运算部3064运算(gr+r’,idh·pkj r+r’),将其运算结果作为新的隐匿ID信息发送到通信部3061以及签名生成部3368(步骤S549)。以此为触发,读取部3367从密钥存储器3366提取密钥sk,并将其发送到签名生成部3368(步骤S550)。签名生成部3368(相当于“检验信息生成部”)还从通信部3061接受密钥ID信息kidj,例如,生成gr+r’、id·pkj r+r’、kidj的位结合数据(gr+r’|idh·pkj r+r’|kidj),并生成用密钥sk将该位结合数据加密的数字签名(相当于“检验信息”)σ’=Esk(gr+r’|idh·pkj r+r’|kidj)(步骤S551)。生成的新的数字签名σ’被发送到通信部3061,通信部3061(相当于“隐匿ID输出部”)将先发送的新的隐匿ID信息(sidh’=(gr+r’,idh·pkj r+r’))和新的数字签名σ’通过网络3080向客户机装置3020发送(输出)(步骤S552)。The secure server device 3360 receives the privileged ID information sid h and the key ID information kid j in the communication unit 3061 (step S545), and transmits the privileged ID information (sid h =(g r , id h ·pk j r )) to Remainder exponentiation unit 3064 . Then, as in the twenty-third embodiment, the communication unit 3061 transmits the key ID information kid j to the security server device 3370, and acquires (receives) the public key pk j extracted there (step S546). The public key pk j is sent to the remainder exponentiation unit 3063 , and the random number r′ generated by the random number generation unit 3062 (step S547 ) is also sent to the remainder exponentiation unit 3063 . The remainder power operation unit 3063 performs (g r ', pk j r ') operation, and sends the result to the remainder multiplication operation unit 3064 (step S548), and the remainder multiplication operation unit 3064 operates (g r+r ', id h · pk j r+r '), and send the calculation result to the communication unit 3061 and the signature generation unit 3368 as new privileged ID information (step S549). Triggered by this, the reading unit 3367 extracts the key sk from the key memory 3366, and sends it to the signature generating unit 3368 (step S550). The signature generation unit 3368 (equivalent to the "verification information generation unit") also receives the key ID information kid j from the communication unit 3061, and generates, for example, g r+r ', id ·pk j r+r ', bit j of kid j Combine data (g r+r '|id h pk j r+r '|kid j ), and generate a digital signature (equivalent to "verification information") that encrypts the bit-combined data with key sk σ'=E sk (g r+r '|id h ·pk j r+r '|kid j ) (step S551). The generated new digital signature σ' is sent to the communication unit 3061, and the communication unit 3061 (equivalent to the “hidden ID output unit”) sends the new hidden ID information (sid h '=(g r+r ', id h ·pk j r+r ')) and the new digital signature σ' are transmitted (output) to the client device 3020 via the network 3080 (step S552).

发送的新的隐匿ID信息sidh’以及数字签名σ’在客户机装置3020的通信部3021中被接收,并通过接口3022被发送到标签装置3310(步骤S553)。标签装置2310在接口3013(相当于“密钥ID输入部”)中接收(接受输入)该新的隐匿ID信息sidh’以及数字签名σ’(步骤S554),并将该新的隐匿ID信息sidh’以及数字签名σ’存储在秘密值存储器3311的可改写区域3311b内(步骤S555)。然后,标签装置3310对于读取请求,响应该新的隐匿ID信息sidh’以及数字签名σ’。The transmitted new privileged ID information sid h ' and digital signature σ' are received by the communication unit 3021 of the client device 3020, and are transmitted to the tag device 3310 through the interface 3022 (step S553). The tag device 2310 receives (accepts input) the new hidden ID information sid h ' and the digital signature σ' in the interface 3013 (equivalent to the "key ID input part") (step S554), and sends the new hidden ID information The sid h ' and the digital signature σ' are stored in the rewritable area 3311b of the secret value memory 3311 (step S555). Then, the tag device 3310 responds to the read request with the new concealed ID information sid h ' and the digital signature σ'.

<隐匿ID解码处理><Concealed ID decoding processing>

接着,说明本实施例中的隐匿ID信息的解码处理。Next, the decoding process of the privileged ID information in this embodiment will be described.

首先,客户机装置3020在接口3022中向标签装置3310发送读取指示(步骤S561)。该读取指示在标签装置3310的接口3013中被接收,并以此为触发,读写部3012从秘密值存储器3311的只读区域3011a中提取密钥ID信息kidj,并从可改写区域3311b中提取隐匿ID信息sidh’以及数字签名σ’(步骤S562)。提取的隐匿ID信息sidh’、数字签名σ’以及密钥ID信息kidj通过接口3013被发送到客户机装置3020(步骤S563),并在客户机装置3020的接口3022中被接收。客户机装置3020在通信部3021中将这些信息通过网络3080发送到安全服务器装置3370(步骤S564)。First, the client device 3020 sends a reading instruction to the tag device 3310 through the interface 3022 (step S561). The read instruction is received in the interface 3013 of the tag device 3310, and as a trigger, the read-write unit 3012 extracts the key ID information kid j from the read-only area 3011a of the secret value storage 3311, and extracts the key ID information kid j from the rewritable area 3311b Extract concealed ID information sid h ' and digital signature σ' from (step S562). The extracted concealment ID information sid h ', digital signature σ', and key ID information kid j are sent to the client device 3020 through the interface 3013 (step S563), and are received in the interface 3022 of the client device 3020. The client device 3020 transmits these pieces of information to the security server device 3370 via the network 3080 in the communication unit 3021 (step S564).

发送的隐匿ID信息sidh’、数字签名σ’以及密钥ID信息kidj在安全服务器装置3370的通信部3072(相当于“隐匿ID输入部”)中被接收(接受输入)(步骤S565),数字签名σ’被发送到签名检验部3370,隐匿ID信息sidh被发送到解码部3074(相当于“ID计算部”)以及签名检验部3376,密钥ID信息kidj被发送到读取部3073以及签名检验部3376。The transmitted privileged ID information sid h ', digital signature σ', and key ID information kid j are received (input accepted) by the communication unit 3072 (corresponding to the "privileged ID input unit") of the secure server device 3370 (step S565) , the digital signature σ' is sent to the signature verification unit 3370, the hidden ID information sid h is sent to the decoding unit 3074 (equivalent to the “ID calculation unit”) and the signature verification unit 3376, and the key ID information kid j is sent to the reader Section 3073 and signature verification section 3376.

而且,通信部3072通过网络3080将公开密钥取得请求发送到安全服务器装置3360,通过通信部3061接收到该请求的安全服务器装置3360在读取部3367中从密钥存储器3366中提取公开密钥pk,通过通信部3061以及网络3080将该公开密钥pk返回。该公开密钥pk在安全服务器装置3370的通信部3072中被接收(步骤S566),并被发送到签名检验部3376。Furthermore, the communication unit 3072 sends a public key acquisition request to the security server device 3360 through the network 3080, and the security server device 3360 that receives the request through the communication unit 3061 extracts the public key from the key memory 3366 in the reading unit 3367. pk returns the public key pk via the communication unit 3061 and the network 3080 . The public key pk is received by the communication unit 3072 of the security server device 3370 (step S566 ), and sent to the signature verification unit 3376 .

签名检验部3376使用该公开密钥pk将收到的数字签名σ’解码,并生成(Dpk(σ’))、gr+r’、idh·pkj r+r’、kidj的位结合数据(gr+r’|idh·pkj r+r’|kidj)。然后,根据Dpk(σ’)是否等于(gr+r’|idh·pkj r+r’|kidj)来进行数字签名σ’的检验(步骤S567)。这里,在不是Dpk(σ’)=(gr+r’|idh·pkj r+r’|kidj)的情况下,检验失败,并结束处理。另一方面,在是Dpk(σ’)=(gr+r’|idh·pkj r+r’|kidj)的情况下,读取部3073(相当于“密钥提取部”)从密钥存储器3071中提取发送的密钥ID信息kidj所对应的密钥skj,并发送到解码部3074(步骤S568)。解码部3074使用发送的隐匿ID信息sidh和密钥skj计算解码了隐匿ID信息sidh’的标签ID信息idh(idh=(idh·pkj r+r’)/(gr+r’)skj)(步骤S569)。另外,该算式中的指数“skj”表示“skj”。计算出的标签ID信息idh被发送到通信部3072,并从此处通过网络3080被向客户机装置3020发送(步骤S570)。客户机装置3020在通信部3021中接收发送的标签ID信息idh(步骤S571),并将该标签ID信息idh用于之后的对后端装置3050的询问。The signature verification unit 3376 decodes the received digital signature σ' using the public key pk, and generates (D pk (σ')), g r+r ', id h pk j r+r ', kid j Bit bound data (g r+r '|id h · pk j r+r '|kid j ). Then, according to whether D pk (σ') is equal to (g r+r '|id h ·pk j r+r '|kid j ), the digital signature σ' is verified (step S567). Here, if D pk (σ')=(g r+r '|id h ·pk j r+r '|kid j ), the verification fails and the process ends. On the other hand, in the case of D pk (σ')=(g r+r '|id h pk j r+r '|kid j ), the reading unit 3073 (corresponding to the "key extraction unit" ) Extract the key sk j corresponding to the sent key ID information kid j from the key memory 3071, and send it to the decoding unit 3074 (step S568). The decoding unit 3074 calculates the tag ID information id h ( id h = (id h pk j r+r ')/(g r +r ') skj ) (step S569). In addition, the exponent "skj" in this formula represents "sk j ". The calculated tag ID information id h is sent to the communication unit 3072, and from there to the client device 3020 via the network 3080 (step S570). The client device 3020 receives the transmitted tag ID information id h in the communication unit 3021 (step S571 ), and uses the tag ID information id h for subsequent inquiries to the backend device 3050 .

<实施例25的特征><Features of Embodiment 25>

在本实施例中,在再隐匿处理时,在安全服务器装置3360中,生成数字签名σ’=Esk(gr+r’|idh·pkj r+r’|kidj),在解码处理时,在安全服务器装置3370中,检验该数字签名σ’。因此,在解码处理时通过数字签名也可以检验再隐匿的隐匿ID信息的正当性,并可以更可靠地检测错误的隐匿ID信息存储在标签装置3310中的情况。In this embodiment, during the re-concealment process, in the security server device 3360, a digital signature σ'=E sk (g r+r '|id h ·pk j r+r '|kid j ) is generated, and after decoding During processing, the digital signature σ' is checked in the security server device 3370 . Therefore, the legitimacy of the re-confidentialed ID information can also be verified by the digital signature during the decoding process, and it is possible to more reliably detect that wrong privileged ID information is stored in the tag device 3310 .

在本方式中,在安全服务器装置3360中生成数字签名σ’,但安全服务器装置3370或公证机关服务器等也可以代为进行数字签名σ’的生成。In this embodiment, the digital signature σ' is generated in the security server device 3360, but the security server device 3370 or a notary office server may instead generate the digital signature σ'.

[实施例26][Example 26]

本实施例是实施例23的变形例,将构成标签ID信息的信息中仅将各标签装置固有的信息隐匿了的信息作为隐匿ID信息,这一点与实施例23不同。以下,以与实施例23的不同点为中心进行说明,对与实施例23共同的事项省略说明。This embodiment is a modified example of the twenty-third embodiment, and differs from the twenty-third embodiment in that only information in which only information unique to each tag device is concealed among the information constituting the tag ID information is concealed. Hereinafter, the difference from the twenty-third embodiment will be mainly described, and the description of the items common to the twenty-third embodiment will be omitted.

图58是例示本实施例中的标签装置3410的功能结构的图。另外,在图58中,对于与实施例23共同的功能结构,赋予与实施例23相同的标号。FIG. 58 is a diagram illustrating the functional configuration of the tag device 3410 in this embodiment. In addition, in FIG. 58, the same code|symbol as Example 23 is attached|subjected to the functional structure common to Example 23.

<整体结构·硬件结构><Overall structure · Hardware structure>

除了标签装置3010被置换为标签装置3410以外,与实施例23相同。It is the same as Example 23 except that the labeling device 3010 is replaced with the labeling device 3410 .

<预处理><preprocessing>

与实施例23的不同点在于将构成标签ID信息的信息中仅各标签装置固有的信息隐匿了的信息作为隐匿ID信息sidh。在使用图52所例示的数据结构的标签ID信息的情况下,序列码(sc)3205是各标签装置固有的信息,隐匿ID信息为sidh=(gr,sch·pkj r)。而且,该隐匿ID信息(sidh=(gr,sch·pkj r))存储在标签装置3410的秘密值存储器3411的可改写区域3411b中。而且,将对于构成标签ID信息的版本码(vc)3202、制造者码(mc)3202、商品码(pc)3204等商品共同的信息加密(E(vc),E(mc),E(pc)),存储在秘密值存储器3411的只读区域3411a中,这一点也与实施例23不同。另外,关于版本码(vc)3202等商品共同的信息的加密使用概率加密等,以便在相同的商品中可以得到不同的加密文本。The difference from the twenty-third embodiment is that among the information constituting the tag ID information, only the information unique to each tag device is concealed as the concealed ID information sid h . In the case of using the tag ID information of the data structure illustrated in FIG. 52 , the sequence code (sc) 3205 is information unique to each tag device, and the concealed ID information is sid h =(g r , sc h ·pk j r ). And, this privileged ID information (sid h =(g r , sc h ·pk j r )) is stored in the rewritable area 3411b of the secret value memory 3411 of the tag device 3410. Moreover, information common to products such as the version code (vc) 3202, the manufacturer code (mc) 3202, and the product code (pc) 3204 constituting the tag ID information is encrypted (E(vc), E(mc), E(pc )) is stored in the read-only area 3411a of the secret value storage 3411, which is also different from the twenty-third embodiment. In addition, probabilistic encryption is used for encryption of information common to products such as the version code (vc) 3202, so that different encrypted texts can be obtained for the same product.

<处理><processing>

本例的隐匿ID解码处理以及隐匿ID更新处理等处理除了将隐匿ID信息设为sidh=(gr,sch·pkj r)这一点,与实施例23同样。另外,在对后端装置3050询问等时,根据需要,在读写部3012中,从秘密值存储器3411的只读区域3411a提取E(vc),E(mc),E(pc)等,并将其通过接口3013、客户机装置3020等发送到后端装置3050,这一点也与第一实施方式不同。The privileged ID decoding process and privileged ID update process in this example are the same as those in the twenty-third embodiment except that the privileged ID information is set to sid h = (g r , sc h ·pk j r ). Also, when making an inquiry to the backend device 3050, etc., the read/write unit 3012 extracts E(vc), E(mc), E(pc), etc. from the read-only area 3411a of the secret value memory 3411 as necessary, and It is also different from the first embodiment in that it is sent to the backend device 3050 through the interface 3013, the client device 3020, and the like.

<实施例26的特征><Features of Embodiment 26>

在本实施例中,由于将仅各标签装置固有的信息隐匿了的信息作为隐匿ID信息,所以与将每个商品共同的信息隐匿了的隐匿ID信息的情况相比,可以削减成为隐匿处理对象的数据量,并可以减少计算量和通信量。In this embodiment, since only the information unique to each tag device is concealed as the concealed ID information, it is possible to reduce the number of persons subject to concealment processing compared with the case of concealed ID information that conceals information common to each product. The amount of data, and can reduce the amount of calculation and communication.

另外,本发明不限于上述各实施方式或实施例。例如,也可以用组合各实施例的方式来实施本发明,或者上述各种处理不仅根据记载按时间序列执行,也可以根据执行处理的装置的处理能力或需要而并行地或者个别地执行。此外,在不脱离本发明的主旨的范围内可以适当变更。In addition, this invention is not limited to each above-mentioned embodiment or an Example. For example, the present invention can also be implemented by combining the various embodiments, or the various processes described above can be executed not only in time series as described, but also in parallel or individually according to the processing capability or needs of the device performing the processing. In addition, it can change suitably in the range which does not deviate from the summary of this invention.

而且,由计算机实现上述各结构的情况下,各装置应有的功能的处理内容由程序记述。而且,通过由计算机执行该程序,在计算机上实现所述处理功能。Furthermore, when the above-mentioned configurations are realized by a computer, the processing contents of the functions of each device are described in a program. And, by executing the program by the computer, the processing functions are realized on the computer.

记述该处理内容的程序可以预先记录在计算机可读取的记录媒体中。作为计算机可读取的记录媒体,例如,可以是磁记录装置、光盘、光磁记录媒体、半导体存储器等存储器,具体来说,例如,作为磁记录装置可以使用硬盘装置、软盘、磁带等,作为光盘装置可以使用DVD(Digital Versatile Disc)、DVD-RAM(Random Access Memory)、CD-ROM(Compact Disc Read OnlyMemory)、CD-R(Recordable)/RW(ReWritable)等、作为光磁记录装置可以使用MO(Magneto-Optical disc)等、作为半导体存储器可以使用EEP-ROM(Electronically Erasable and Programmable-Read Only Memory)等。A program describing the content of the processing may be prerecorded on a computer-readable recording medium. As the computer-readable recording medium, for example, it may be a memory such as a magnetic recording device, an optical disk, a magneto-optical recording medium, or a semiconductor memory. Specifically, for example, a hard disk device, a floppy disk, or a magnetic tape may be used as the magnetic recording device. DVD (Digital Versatile Disc), DVD-RAM (Random Access Memory), CD-ROM (Compact Disc Read Only Memory), CD-R (Recordable)/RW (ReWritable), etc. can be used as optical-magnetic recording devices. MO (Magneto-Optical disc), etc., EEP-ROM (Electronically Erasable and Programmable-Read Only Memory) etc. can be used as semiconductor memory.

而且,该程序的流通,例如可以通过销售、转让、借贷记录该程序的DVD、CD-ROM等可移动型记录媒体等来进行。进而,将该程序存储在服务器计算机的存储装置中,经由网络从服务器计算机将该程序传送到其它的计算机,从而使该程序流通。Furthermore, distribution of the program can be performed, for example, by selling, transferring, or lending a portable recording medium such as DVD or CD-ROM on which the program is recorded. Furthermore, the program is stored in the storage device of the server computer, and the program is distributed from the server computer to other computers via a network.

执行这样的程序的计算机,例如,首先,将记录在可移动型记录媒体中的程序或者从计算机传送的程序临时存储在自身的存储装置中。然后,在处理执行时,该计算机读取存储在自身的记录媒体中的程序,并执行根据读取了的程序的处理。而且,作为该程序的其它的实施方式,计算机可以从可移动型记录媒体中直接读取程序,并执行根据该程序的处理,进而,在每次从服务器计算机将程序传送到该计算机时,逐次执行根据接受的程序的处理。而且,通过不从服务器计算机向该计算机传送程序,仅通过该执行指示和结果取得实现处理功能的所谓ASP(Application Service Provider)型的服务执行上述处理也可以。本方式的程序中包含符合程序并供电子计算机的处理用的信息(不是对于计算机的直接的指令但具有规定计算机的处理的性质的数据等)。A computer that executes such a program temporarily stores, for example, a program recorded on a removable recording medium or a program transferred from the computer in its own storage device. Then, when processing is executed, the computer reads a program stored in its own recording medium, and executes processing according to the read program. Furthermore, as another embodiment of the program, the computer may directly read the program from a removable recording medium and execute processing according to the program, and further, each time the program is transferred from the server computer to the computer, the Perform processing in accordance with accepted procedures. Furthermore, the above processing may be executed by a so-called ASP (Application Service Provider) type service that realizes the processing function only by the execution instruction and result acquisition without transferring the program from the server computer to the computer. The program in this form includes information (data, etc., which are not direct commands to the computer but have properties that prescribe the processing of the computer) that conforms to the program and is used for computer processing.

产业上的可利用性在于,根据本发明,例如可以抑制在RFID中根据标签装置的输出信息追踪标签装置的流通过程。The industrial applicability is that according to the present invention, for example, it is possible to suppress the tracking of the distribution process of the tag device based on the output information of the tag device in RFID.

Claims (19)

1.一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,其特征在于,1. A label privacy protection method prevents the user's private information from being obtained according to the information output by the label device, and is characterized in that, 各标签装置的秘密值存储器中存储将各个标签ID信息idh隐匿了的隐匿ID信息sidhConcealed ID information sid h in which each tag ID information id h is concealed is stored in the secret value memory of each tag device, 上述各标签装置在读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中,对设在上述各标签装置的外部的更新装置输出上述隐匿ID信息sidhEach of the tag devices reads the privileged ID information sid h stored in the secret value memory in the read/write unit, and outputs the privileged ID information to an updating device provided outside the respective tag devices in the first output unit. sid h , 上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在更新部中生成难以掌握与上述隐匿ID信息sidh的关联性的新的隐匿ID信息sidh’,在第二输出部中对上述各标签装置输出上述新的隐匿ID信息sidh’,The updating device accepts input of the privileged ID information sid h in the first input unit, generates new privileged ID information sid h ' whose correlation with the privileged ID information sid h is difficult to grasp in the update unit, and outputs in the second output output the above-mentioned new hidden ID information sid h ' to each of the above-mentioned tag devices in the section, 上述各标签装置在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。Each of the tag devices receives input of the new privileged ID information sid h ' in the second input unit, and stores the new privileged ID information sid h ' in the secret value memory in the read/write unit. 2.一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,其特征在于,2. A label privacy protection method prevents the user's private information from being obtained according to the information output by the label device, and is characterized in that, 各标签装置h的秘密值存储器中存储与各个标签ID信息idh对应的隐匿ID信息sidh,其中,h∈{1,...,m},m是标签装置的总数,该隐匿ID信息sidh是随机值rhThe hidden ID information sid h corresponding to each tag ID information id h is stored in the secret value memory of each tag device h, where h∈{1,...,m}, m is the total number of tag devices, and the hidden ID information sid h is a random value r h , 设在上述各标签装置h的外部的更新装置的隐匿ID存储器中对应存储上述各标签ID信息idh,和与该标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh是随机值rhThe above-mentioned each tag ID information id h correspondingly stored in the hidden ID memory of the update device outside the above-mentioned each tag device h , and the hidden ID information sid h corresponding to the tag ID information id h , the hidden ID information sid h is random value r h , 上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对上述更新装置输出上述隐匿ID信息sidhEach tag device h reads the privileged ID information sid h stored in the secret value memory in the first read/write unit, outputs the privileged ID information sid h to the update device in the first output unit, 上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在随机值生成部中,生成新的随机值rh’,在第二读写部中,从上述隐匿ID存储器中选择被输入的上述隐匿ID信息sidh所对应的标签ID信息idh,将上述新的随机值rh’作为新的隐匿ID信息sidh’与之对应存储在该隐匿ID存储器中,在第二输出部中对上述各标签装置h输出上述新的隐匿ID信息sidh’,The updating device accepts input of the hidden ID information sid h in the first input unit, generates a new random value r h ' in the random value generating unit, and selects from the hidden ID memory in the second reading and writing unit. The tag ID information id h corresponding to the input hidden ID information sid h is stored in the hidden ID memory corresponding to the new random value r h ' as the new hidden ID information sid h ', and in the second In the output unit, the above-mentioned new hidden ID information sid h ' is output to each of the above-mentioned tag devices h, 上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。Each of the tag devices h receives input of the new privileged ID information sid h ' in the second input unit, and stores the new privileged ID information sid h ' in the secret value memory in the first read/write unit. 3.一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,其特征在于,3. A label privacy protection method prevents the user's private information from being obtained according to the information output by the label device, and is characterized in that, 各标签装置h的秘密值存储器中存储与各个标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh具有共同密钥加密方式的第一加密文本和该加密所使用的共同密钥Kj的密钥ID信息kidj,其中,h∈{1,...,m},m是标签装置的总数,j∈{1,...,n},n是密钥的总数,The hidden ID information sid h corresponding to each tag ID information id h is stored in the secret value memory of each tag device h. The hidden ID information sid h has the first encrypted text of the common key encryption method and the common key used for the encryption. Key ID information kid j of key K j , where, h∈{1,...,m}, m is the total number of tag devices, j∈{1,...,n}, n is the total number of keys , 在上述各标签装置h的外部设置的更新装置的密钥存储器中对应存储各密钥ID信息kidj和各共同密钥kjCorrespondingly store each key ID information kid j and each common key k j in the key memory of the update device installed outside the above-mentioned each tag device h, 上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对上述更新装置输出上述隐匿ID信息sidhEach tag device h reads the privileged ID information sid h stored in the secret value memory in the first read/write unit, outputs the privileged ID information sid h to the update device in the first output unit, 上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在第二读写部中,从上述密钥存储器中提取上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述共同密钥kj,在ID提取部中,使用上述第二读写部提取的上述共同密钥kj将上述第一加密文本解码,并提取标签ID信息idh,在加密部中,使用上述ID提取部提取的上述标签ID信息idh和该提取所使用的上述共同密钥kj,生成难以掌握与上述第一加密文本的关联性的第二加密文本,在第二输出部中对上述各标签装置h输出具有上述第二加密文本和该共同密钥kj的上述密钥ID信息kidj的新的隐匿ID信息sidh’,The updating device accepts the input of the privileged ID information sid h in the first input unit, and extracts the key ID information kid j included in the privileged ID information sid h from the key memory in the second read/write unit. Corresponding to the above-mentioned common key k j , in the ID extraction part, use the above-mentioned common key k j extracted by the above-mentioned second reading and writing part to decode the above-mentioned first encrypted text, and extract the tag ID information id h , and in the encryption part , using the tag ID information id h extracted by the ID extracting unit and the common key k j used for the extraction to generate a second encrypted text whose correlation with the first encrypted text is difficult to grasp, and output the second encrypted text to the second output unit Outputting new concealed ID information sid h ' with the above-mentioned second encrypted text and the above-mentioned key ID information kid j of the common key k j to each of the above-mentioned tag devices h , 上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。Each of the tag devices h receives input of the new privileged ID information sid h ' in the second input unit, and stores the new privileged ID information sid h ' in the secret value memory in the first read/write unit. 4.一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,其特征在于,4. A label privacy protection method, preventing the user's private information from being obtained according to the information output by the label device, characterized in that, 各标签装置h的秘密值存储器中存储与各个标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh具有公开密钥加密方式的第一加密文本和密钥对(skj,pkj)的密钥ID信息kidj,其中,h∈{1,...,m},m是标签装置的总数,skj是密钥,pkj是公开密钥,j∈{1,...,n},n是密钥的总数,The hidden ID information sid h corresponding to each tag ID information id h is stored in the secret value memory of each tag device h, and the hidden ID information sid h has the first encrypted text and key pair (sk j , pk j ) key ID information kid j , where, h∈{1,...,m}, m is the total number of tag devices, sk j is the key, pk j is the public key, j∈{1, ..., n}, where n is the total number of keys, 在上述各各标签装置h的外部设置的更新装置的密钥存储器中对应存储各密钥ID信息kidj和各密钥对(skj,pkj),Correspondingly store each key ID information kid j and each key pair (sk j , pk j ) in the key memory of the update device installed outside the above-mentioned each tag device h, 上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对上述更新装置输出上述隐匿ID信息sidhEach tag device h reads the privileged ID information sid h stored in the secret value memory in the first read/write unit, outputs the privileged ID information sid h to the update device in the first output unit, 上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在第二读写部中,从上述密钥存储器中提取被输入到上述第一输入部的上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的密钥对(skj,pkj),在ID提取部中,使用上述第二读写部提取的上述密钥skj将上述第一加密文本解码,并提取上述标签ID信息idh,在加密部中,使用上述ID提取部提取的上述标签ID信息idh和上述第二读写部提取的上述公开密钥pkj,生成难以掌握与上述第一加密文本的关联性的第二加密文本,在第二输出部中对上述各标签装置h输出具有上述第二加密文本和上述密钥对(skj,pkj)的上述密钥ID信息kidj的新的隐匿ID信息sidh’,The update device accepts input of the privileged ID information sid h in the first input unit, and extracts the privileged ID information sid h input into the first input unit from the key memory in the second read/write unit. The key pair (sk j , pk j ) corresponding to the above-mentioned key ID information kid j , in the ID extracting part, use the above-mentioned key sk j extracted by the above-mentioned second reading and writing part to decode the above-mentioned first encrypted text, And extract the above-mentioned tag ID information id h , in the encryption part, use the above-mentioned tag ID information id h extracted by the above-mentioned ID extraction part and the above-mentioned public key pk j extracted by the above-mentioned second reading and writing part to generate a key that is difficult to grasp and the above-mentioned first In the second encrypted text related to the encrypted text, the second output unit outputs the key ID information kid j having the second encrypted text and the key pair (sk j , pk j ) to each tag device h The new hidden ID information sid h ', 上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。Each of the tag devices h receives input of the new privileged ID information sid h ' in the second input unit, and stores the new privileged ID information sid h ' in the secret value memory in the first read/write unit. 5.一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,其特征在于,5. A label privacy protection method, preventing the user's private information from being obtained according to the information output by the label device, characterized in that, 各标签装置h的秘密值存储器中存储与各个标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh具有可再加密的公开密钥加密方式的第一加密文本和该公开密钥pkj的密钥ID信息kidj,其中,h∈{1,...,m},m是标签装置的总数,j∈{1,...,n},n是密钥的总数,The hidden ID information sid h corresponding to each tag ID information id h is stored in the secret value memory of each tag device h, and the hidden ID information sid h has the first encrypted text of the re-encryptable public key encryption method and the public key Key ID information kid j of key pk j , where, h∈{1,...,m}, m is the total number of tag devices, j∈{1,...,n}, n is the total number of keys , 在上述各标签装置h的外部设置的更新装置的密钥存储器中对应存储各密钥ID信息kidj和各公开密钥pkjCorrespondingly store each key ID information kid j and each public key pk j in the key memory of the update device installed outside the above-mentioned each tag device h, 上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对上述更新装置输出上述隐匿ID信息sidhEach tag device h reads the privileged ID information sid h stored in the secret value memory in the first read/write unit, outputs the privileged ID information sid h to the update device in the first output unit, 上述更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在第二读写部中,从上述密钥存储器中提取被输入到上述第一输入部的上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述公开密钥pkj,在加密部中,使用上述第二读写部提取的上述公开密钥pkj,将上述隐匿ID信息sidh具备的上述第一加密文本再加密,生成难以掌握与上述第一加密文本的关联性的第二加密文本,在第二输出部中对上述各标签装置h输出具有上述第二加密文本和上述公开密钥pkj的上述密钥ID信息kidj的新的隐匿ID信息sidh’,The update device accepts input of the privileged ID information sid h in the first input unit, and extracts the privileged ID information sid h input into the first input unit from the key memory in the second read/write unit. The above-mentioned public key pk j corresponding to the above-mentioned key ID information kid j , in the encryption part, uses the above-mentioned public key pk j extracted by the above-mentioned second reading and writing part, and converts the above-mentioned first public key included in the above-mentioned concealed ID information sid h to An encrypted text is re-encrypted to generate a second encrypted text that is difficult to grasp the relevance of the first encrypted text, and output the second encrypted text and the above-mentioned public key pk j to each tag device h in the second output unit. The new hidden ID information sid h ' of the above key ID information kid j , 上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。Each of the tag devices h receives input of the new privileged ID information sid h ' in the second input unit, and stores the new privileged ID information sid h ' in the secret value memory in the first read/write unit. 6.一种标签隐私保护方法,防止根据标签装置输出的信息取得用户的隐私信息,其特征在于,6. A label privacy protection method, preventing the user's private information from being obtained according to the information output by the label device, characterized in that, 各标签装置h的秘密值存储器中存储将各个标签ID信息idh隐匿了的隐匿ID信息sidh,其中,h∈{1,...,m},m是标签装置的总数,The secret value memory of each tag device h stores concealed ID information sid h that hides each tag ID information id h , wherein, h∈{1,...,m}, m is the total number of tag devices, 上述各标签装置h在第一读写部中读出存储在上述秘密值存储器中的上述隐匿ID信息sidh,在第一输出部中对设在上述各标签装置h的外部的第一更新装置输出上述隐匿ID信息sidhEach of the above tag devices h reads the above-mentioned privileged ID information sid h stored in the above-mentioned secret value memory in the first read/write unit, and transmits to the first updating device installed outside the above-mentioned each tag device h in the first output unit. Output the above hidden ID information sid h , 上述第一更新装置在第一输入部中接受上述隐匿ID信息sidh的输入,在ID提取部中,根据上述隐匿ID信息sidh求标签ID信息idh,在第二输出部中,对设在上述各标签装置h的外部的第二更新装置输出上述标签ID信息idhThe above-mentioned first updating device accepts the input of the above-mentioned concealed ID information sid h in the first input unit, in the ID extracting unit, obtains the tag ID information id h based on the above-mentioned concealed ID information sid h , and in the second output unit, Output the above-mentioned tag ID information id h at the second updating device outside each of the above-mentioned tag devices h, 上述第二更新装置在第三输入部中,接受上述标签ID信息idh的输入,在加密部中,生成将上述标签ID信息idh隐匿了的新的隐匿ID信息sidh’,在第三输出部中,对上述各标签装置h输出上述新的隐匿ID信息sidh’,The above-mentioned second updating device accepts the input of the above-mentioned tag ID information id h in the third input part, and in the encryption part, generates new concealed ID information sid h ' with the above-mentioned tag ID information id h concealed, and in the third In the output unit, the above-mentioned new hidden ID information sid h ' is output to each of the above-mentioned tag devices h, 上述各标签装置h在第二输入部中接受上述新的隐匿ID信息sidh’的输入,在上述第一读写部中将上述新的隐匿ID信息sidh’存储在上述秘密值存储器中。Each of the tag devices h receives input of the new privileged ID information sid h ' in the second input unit, and stores the new privileged ID information sid h ' in the secret value memory in the first read/write unit. 7.一种更新装置,更新标签装置的隐匿ID信息,其特征在于,7. An update device for updating the concealed ID information of the label device, characterized in that, 设置在上述标签装置的外部,set on the outside of the above labeling device, 具有:隐匿ID存储器,对应存储各标签ID信息idh和与该标签ID信息idh对应的隐匿ID信息sidh,该隐匿ID信息sidh是随机值rhIt has: a concealed ID memory, correspondingly storing each tag ID information id h and concealed ID information sid h corresponding to the tag ID information id h, and the concealed ID information sid h is a random value r h ; 第一输入部,接受从上述标签装置输出的隐匿ID信息sidh的输入;The first input unit accepts the input of the concealed ID information sid h output from the tag device; 随机值生成部,生成新的随机值rh’;The random value generation unit generates a new random value r h '; 第二读写部,连接到上述隐匿ID存储器,从该隐匿ID存储器中选择被输入到上述第一输入部的上述隐匿ID信息sidh所对应的标签ID信息idh,将上述新的随机值rh’作为新的隐匿ID信息sidh’与之对应存储在该隐匿ID存储器中;以及The second reading and writing unit is connected to the hidden ID memory, selects the tag ID information id h corresponding to the hidden ID information sid h input to the first input unit from the hidden ID memory, and uses the new random value r h 'is correspondingly stored in the hidden ID storage as new hidden ID information sid h '; and 第二输出部,对上述标签装置输出上述新的隐匿ID信息sidh’。The second output unit outputs the new privileged ID information sid h ' to the tag device. 8.一种更新装置,更新标签装置h的隐匿ID信息,其特征在于,8. An update device for updating the hidden ID information of the tag device h, characterized in that, 设置在上述标签装置h的外部,set on the outside of the above-mentioned labeling device h, 具有:密钥存储器,对应存储各密钥ID信息kidj和共同密钥加密方式的各共同密钥kj,其中,j∈{1,...,n},n是密钥的总数;It has: a key memory, correspondingly storing each key ID information kid j and each common key k j of the common key encryption method, wherein, j∈{1,...,n}, n is the total number of keys; 第一输入部,接受隐匿ID信息sidh的输入,该隐匿ID信息sidh具有第一加密文本和该加密所使用的共同密钥kj的密钥ID信息kidj,所述第一加密文本对应于标签ID信息idh的共同密钥加密方式;The first input unit accepts the input of the hidden ID information sid h , the hidden ID information sid h has the first encrypted text and the key ID information kid j of the common key k j used for the encryption, the first encrypted text A common key encryption method corresponding to the tag ID information id h ; 第二读写部,连接到上述密钥存储器,从该密钥存储器中提取上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述共同密钥kjThe second read-write unit is connected to the key storage, and extracts the common key k j corresponding to the key ID information kid j included in the concealed ID information sid h from the key storage; ID提取部,使用上述第二读写部提取的上述共同密钥kj将上述第一加密文本解码,并提取标签ID信息idhThe ID extraction unit decodes the first encrypted text by using the common key k j extracted by the second reading and writing unit, and extracts the tag ID information id h ; 加密部,使用上述ID提取部提取的上述标签ID信息idh,和该提取所使用的上述共同密钥kj,生成难以掌握与上述第一加密文本的关联性的第二加密文本;以及An encryption unit that uses the tag ID information id h extracted by the ID extraction unit and the common key k j used for the extraction to generate a second encrypted text whose correlation with the first encrypted text is difficult to grasp; and 第二输出部,对上述标签装置h输出具有上述第二加密文本和该共同密钥kj的上述密钥ID信息kidj的新的隐匿ID信息sidh’。The second output unit outputs new privileged ID information sid h ' having the second encrypted text and the key ID information kid j of the common key k j to the tag device h. 9.一种更新装置,更新标签装置h的隐匿ID信息,其特征在于,9. An update device for updating the hidden ID information of the tag device h, characterized in that, 设置在上述标签装置h的外部,set outside the above-mentioned labeling device h, 具有:密钥存储器,对应存储各密钥ID信息kidj和密钥对(skj,pkj),其中,j∈{1,...,n},n是密钥的总数,skj是密钥,pkj是公开密钥;It has: key memory, correspondingly storing each key ID information kid j and key pair (sk j , pk j ), where j∈{1,...,n}, n is the total number of keys, sk j is the key, pk j is the public key; 第一输入部,接受隐匿ID信息sidh的输入,该隐匿ID信息sidh具有第一加密文本和该加密所使用的公开密钥pkj的密钥ID信息kidj,所述第一加密文本对应于标签ID信息idh的公开密钥加密方式;The first input unit accepts the input of the hidden ID information sid h , the hidden ID information sid h has the first encrypted text and the key ID information kid j of the public key pk j used for the encryption, the first encrypted text Public key encryption method corresponding to tag ID information id h ; 第二读写部,连接到上述密钥存储器,从上述密钥存储器中提取被输入到上述第一输入部的上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述密钥对(skj,pkj);The second read/write unit is connected to the key memory, and extracts the key corresponding to the key ID information kid j included in the hidden ID information sid h input to the first input unit from the key memory. pair(sk j , pk j ); ID提取部,使用上述第二读写部提取的上述密钥skj将上述第一加密文本解码,并提取上述标签ID信息idhThe ID extracting part decodes the above-mentioned first encrypted text by using the above-mentioned key sk j extracted by the above-mentioned second reading and writing part, and extracts the above-mentioned tag ID information id h ; 加密部,使用上述ID提取部提取的上述标签ID信息idh,和上述第二读写部提取的上述公开密钥pkj,生成难以掌握与上述第一加密文本的关联性的第二加密文本;以及The encryption unit uses the tag ID information id h extracted by the ID extraction unit and the public key pk j extracted by the second reading/writing unit to generate a second encrypted text whose relationship with the first encrypted text is difficult to grasp. ;as well as 第二输出部,对上述标签装置h输出具有上述第二加密文本和与上述密钥对(skj,pkj)对应的上述密钥ID信息kidj的新的隐匿ID信息sidh’。The second output unit outputs new privileged ID information sid h ' having the second encrypted text and the key ID information kid j corresponding to the key pair (sk j , pk j ) to the tag device h. 10.一种更新装置,更新标签装置h的隐匿ID信息,其特征在于,10. An updating device for updating the concealed ID information of the tag device h, characterized in that, 设置在上述标签装置h的外部,set outside the above-mentioned labeling device h, 具有:密钥存储器,对应存储各密钥ID信息kidj和各公开密钥pkj,其中,j∈{1,...,n},n是密钥的总数;It has: a key storage, correspondingly storing each key ID information kid j and each public key pk j , where j∈{1,...,n}, n is the total number of keys; 第一输入部,接受隐匿ID信息sidh的输入,该隐匿ID信息sidh具有第一加密文本和该公开密钥pkj的密钥ID信息kidj,所述第一加密文本对应于标签ID信息idh的可再加密的公开密钥加密方式;The first input unit accepts the input of the hidden ID information sid h , the hidden ID information sid h has the first encrypted text and the key ID information kid j of the public key pk j , the first encrypted text corresponds to the tag ID Re-encryptable public key encryption of message id h ; 第二读写部,连接到上述密钥存储器,从上述密钥存储器中提取被输入到上述第一输入部的上述隐匿ID信息sidh具备的上述密钥ID信息kidj所对应的上述公开密钥pkjThe second read-write unit is connected to the key memory, and extracts from the key memory the public key corresponding to the key ID information kid j included in the concealed ID information sid h input to the first input unit. key pk j ; 加密部,使用上述第二读写部提取的上述公开密钥pkj,将上述隐匿ID信息sidh具备的上述第一加密文本再加密,生成难以掌握与该第一加密文本的关联性的第二加密文本;以及The encryption unit re-encrypts the first encrypted text included in the hidden ID information sid h by using the public key pk j extracted by the second reading/writing unit, and generates a second encrypted text whose relationship with the first encrypted text is difficult to grasp. Two encrypted texts; and 第二输出部,对上述标签装置h输出具有上述第二加密文本和该公开密钥pkj的上述密钥ID信息kidj的新的隐匿ID信息sidh’。The second output unit outputs new privileged ID information sid h ' having the second encrypted text and the key ID information kid j of the public key pk j to the tag device h. 11.如权利要求8至10的任何一项所述的更新装置,其特征在于,11. The updating device according to any one of claims 8 to 10, characterized in that, 上述密钥ID信息kidj是没有关联性的多个上述标签装置所共有的信息。The key ID information kid j is information shared by a plurality of unrelated tag devices. 12.一种更新委托装置,对更新装置委托标签装置的隐匿ID的更新,其特征在于,12. An update entrusting device that entrusts an update device to update the privacy ID of a tag device, wherein: 设在标签装置的外部,located on the outside of the labeling device, 具有:隐匿ID输入部,输入多个种类对应于同一标签ID信息idh的可再加密的加密文本的隐匿ID;It has: a concealed ID input unit for inputting a plurality of concealed IDs corresponding to re-encryptable encrypted text of the same tag ID information id h ; 隐匿ID存储器,存储输入的多个种类的上述隐匿ID;Concealed ID storage, storing the above-mentioned concealed IDs of multiple types input; 隐匿ID提取部,连接到上述隐匿ID存储器,在规定的时机从该隐匿ID存储器中提取一个隐匿ID;以及a hidden ID extraction unit connected to the aforementioned hidden ID storage, and extracts a hidden ID from the hidden ID storage at a prescribed timing; and 隐匿ID输出部,对上述标签装置输出提取的上述隐匿ID。The privileged ID output unit outputs the extracted privileged ID to the tag device. 13.一种标签隐私保护方法,防止根据从标签装置输出的信息取得用户的隐私信息,其特征在于,13. A label privacy protection method, preventing the user's private information from being obtained from the information output from the label device, characterized in that, 密钥存储器中将密钥ID和密钥对应存储;The key ID and the key are correspondingly stored in the key storage; 上述标签装置具有隐匿ID存储器,所述隐匿ID存储器具有存储密钥ID的只读区域,和存储第一隐匿ID的可改写区域,The tag device above has a concealed ID memory, and the concealed ID memory has a read-only area storing the key ID, and a rewritable area storing the first concealed ID, 上述标签装置在读写部中从上述隐匿ID存储器中提取上述密钥ID和上述第一隐匿ID,在第一输出部中对更新装置输出提取的上述密钥ID和上述第一隐匿ID,The tag device extracts the key ID and the first privileged ID from the privileged ID memory in the read/write unit, and outputs the extracted key ID and the first privileged ID to the updating device in the first output unit, 上述更新装置在第一输入部中接受上述密钥ID和上述第一隐匿ID的输入,在第一密钥提取部中,从上述密钥存储器中提取对应于被输入到第一输入部的上述密钥ID的密钥,在隐匿ID更新部中,使用上述第一密钥提取部提取的上述密钥,和被输入到上述第一输入部的上述第一隐匿ID,生成难以掌握与上述第一隐匿ID的关联性的第二隐匿ID,在第二输出部中,输出上述第二隐匿ID,The update device accepts the input of the key ID and the first confidential ID in the first input unit, and in the first key extracting unit, extracts from the key memory the key corresponding to the key ID input to the first input unit. As for the key of the key ID, in the secret ID update part, using the key extracted by the first key extracting part and the first secret ID input to the first input part, a key that is difficult to grasp is generated. A second hidden ID related to a hidden ID, outputting the second hidden ID in the second output unit, 上述标签装置在第二输入部中接受上述第二隐匿ID的输入,在上述读写部中将上述第二隐匿ID存储在上述隐匿ID存储器的上述可改写区域中。The tag device receives input of the second privileged ID in the second input unit, and stores the second privileged ID in the rewritable area of the privileged ID memory in the read/write unit. 14.如权利要求13所述的标签隐私保护方法,其特征在于,14. label privacy protection method as claimed in claim 13, is characterized in that, 上述更新装置还具有生成对于上述第二隐匿ID的检验信息的检验信息生成部,The update device further includes a verification information generating unit that generates verification information for the second privileged ID, 上述更新装置的第二输出部输出上述第二隐匿ID以及上述检验信息,The second output unit of the update device outputs the second privileged ID and the verification information, 上述标签装置的第二输入部接受上述第二隐匿ID以及上述检验信息的输入,The second input unit of the tag device accepts input of the second confidential ID and the verification information, 上述标签装置的上述读写部将上述第二隐匿ID以及上述检验信息存储在上述隐匿ID存储器的上述可改写区域。The read-write unit of the tag device stores the second privileged ID and the verification information in the rewritable area of the privileged ID memory. 15.如权利要求13所述的标签隐私保护方法,其特征在于,15. label privacy protection method as claimed in claim 13, is characterized in that, 上述标签装置在读写部中从上述隐匿ID存储器的只读区域中提取上述密钥ID,从上述可改写区域中提取第三隐匿ID,在第一输出部中,对解码装置输出提取的上述密钥ID和上述第三隐匿ID,The above-mentioned tag device extracts the above-mentioned key ID from the read-only area of the above-mentioned hidden ID memory in the read-write unit, extracts the third hidden ID from the above-mentioned rewritable area, and outputs the extracted above-mentioned ID to the decoding device in the first output unit. key ID and the above-mentioned third hidden ID, 上述解码装置在第三输入部中接受上述密钥ID和上述第三隐匿ID的输入,在第二密钥提取部中,从上述密钥存储器中提取输入到上述第三输入部的上述密钥ID所对应的密钥,使用输入到第三输入部的上述隐匿ID和上述第二密钥提取部提取的上述密钥,在ID计算部中计算ID,在ID结构检验部中检验计算出的ID的结构。The decoding device accepts input of the key ID and the third confidential ID in the third input unit, and extracts the key input to the third input unit in the second key extracting unit from the key memory. For the key corresponding to the ID, the ID is calculated in the ID calculation unit using the hidden ID input to the third input unit and the key extracted by the second key extraction unit, and the calculated ID is checked in the ID structure checking unit. The structure of the ID. 16.一种标签装置,用于标签自动识别系统,其特征在于,16. A label device for automatic label identification system, characterized in that, 具有:隐匿ID存储器,具有存储密钥ID的只读区域和存储第一隐匿ID的可改写区域;It has: hidden ID storage, with a read-only area for storing the key ID and a rewritable area for storing the first hidden ID; 读写部,从上述隐匿ID存储器中提取上述密钥ID和上述第一隐匿ID;The reading and writing unit extracts the key ID and the first hidden ID from the hidden ID storage; 第一输出部,输出提取的上述密钥ID和上述第一隐匿ID;以及a first output unit that outputs the extracted key ID and the first secret ID; and 第二输入部,接受难以掌握与上述第一隐匿ID的关联性的第二隐匿ID的输入,The second input unit accepts the input of the second confidential ID which is difficult to grasp the relationship with the first confidential ID, 上述读写部将输入的上述第二隐匿ID存储在上述隐匿ID存储器的上述可改写区域中。The read/write unit stores the input second privileged ID in the rewritable area of the privileged ID memory. 17.如权利要求16所述的标签装置,其特征在于,17. The labeling device of claim 16, wherein: 上述第二输入部还接受对于上述第二隐匿ID的检验信息的输入,The second input unit also accepts input of verification information for the second concealed ID, 上述读写部将输入的上述检验信息还存储在上述隐匿ID存储器的上述可改写区域中。The read/write unit also stores the input verification information in the rewritable area of the confidential ID memory. 18.如权利要求16所述的标签装置,其特征在于,18. The labeling device of claim 16, wherein: 上述隐匿ID是将构成ID的信息中仅将各标签装置固有的信息隐匿了的信息。The confidentiality ID described above is information in which only information unique to each tag device is concealed among the information constituting the ID. 19.如权利要求16所述的标签装置,其特征在于,19. The labeling device of claim 16, wherein: 对没有关联性的标签装置分配相同的上述密钥ID。The same key ID is assigned to unrelated tag devices.
CNB200710126268XA 2003-09-26 2004-09-27 Tag privacy protection method, update device, update request device, tag device Expired - Lifetime CN100568253C (en)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP2003334891 2003-09-26
JP334891/03 2003-09-26
JP359157/03 2003-10-20
JP383760/03 2003-11-13
JP124610/04 2004-04-20
JP145366/04 2004-05-14

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CNB2004800015073A Division CN100353342C (en) 2003-09-26 2004-09-27 Tag privacy protection method, tag device, backend device

Publications (2)

Publication Number Publication Date
CN101079091A CN101079091A (en) 2007-11-28
CN100568253C true CN100568253C (en) 2009-12-09

Family

ID=35822569

Family Applications (3)

Application Number Title Priority Date Filing Date
CN2009101673597A Expired - Lifetime CN101635021B (en) 2003-09-26 2004-09-27 Tag device, tag automayic identification system and tag privacy protection method
CNB2004800015073A Expired - Lifetime CN100353342C (en) 2003-09-26 2004-09-27 Tag privacy protection method, tag device, backend device
CNB200710126268XA Expired - Lifetime CN100568253C (en) 2003-09-26 2004-09-27 Tag privacy protection method, update device, update request device, tag device

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN2009101673597A Expired - Lifetime CN101635021B (en) 2003-09-26 2004-09-27 Tag device, tag automayic identification system and tag privacy protection method
CNB2004800015073A Expired - Lifetime CN100353342C (en) 2003-09-26 2004-09-27 Tag privacy protection method, tag device, backend device

Country Status (1)

Country Link
CN (3) CN101635021B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599829B (en) * 2008-06-06 2012-04-04 华为技术有限公司 Authentication Methods, Readers and Tags
CN101667308B (en) * 2008-09-04 2013-02-27 日电(中国)有限公司 Access control system, access control devices, access card and access control method
EP2960808A4 (en) * 2013-02-25 2016-10-26 Mitsubishi Electric Corp SERVER DEVICE, PRIVATE SEARCH PROGRAM, RECORDING MEDIUM, AND PRIVATE SEARCH SYSTEM
EP2821970B2 (en) 2013-07-05 2019-07-10 Assa Abloy Ab Access control communication device, method, computer program and computer program product
EP2821972B1 (en) 2013-07-05 2020-04-08 Assa Abloy Ab Key device and associated method, computer program and computer program product
US11294633B2 (en) * 2017-01-20 2022-04-05 Nippon Telegraph And Telephone Corporation Secure computation system, secure computation device, secure computation method, and program
EP3809331A4 (en) * 2018-06-14 2022-03-02 Kyocera Corporation RFID TAG AND RFID TAG SYSTEM
JP7138043B2 (en) * 2018-12-28 2022-09-15 日立Astemo株式会社 Information processing equipment
WO2020158842A1 (en) 2019-02-01 2020-08-06 株式会社東芝 Terminal device, data processing method, and program
EP4016507A4 (en) * 2019-08-14 2023-05-10 Nippon Telegraph And Telephone Corporation SECRET GRADIENT FALL CALCULATION METHOD, SECRET DEPTH LEARNING METHOD, SECRET GRADIENT FALL CALCULATION SYSTEM, SECRET DEPTH LEARNING SYSTEM, SECRET CALCULATION DEVICE AND PROGRAM
JP7322976B2 (en) * 2020-01-17 2023-08-08 日本電信電話株式会社 SECRET MAXIMUM CALCULATION DEVICE, METHOD AND PROGRAM
AU2020472126B2 (en) * 2020-10-16 2024-02-15 Nippon Telegraph And Telephone Corporation Secure exponent unification system, secure exponent unification apparatus, secure exponent unification method, secure sum computing system, secure sum-of-product computing system, and program
US20230379151A1 (en) * 2020-10-16 2023-11-23 Nippon Telegraph And Telephone Corporation Secure shift system, secure shift apparatus, secure shift method, and program

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4075269B2 (en) * 2000-02-29 2008-04-16 松下電工株式会社 ID data update method and registration / deletion card update method in ID system
US7000834B2 (en) * 2001-02-21 2006-02-21 International Business Machines Corporation Method to address security and privacy issue of the use of RFID systems to track consumer products

Also Published As

Publication number Publication date
CN1717665A (en) 2006-01-04
CN101635021B (en) 2011-08-10
CN100353342C (en) 2007-12-05
CN101635021A (en) 2010-01-27
CN101079091A (en) 2007-11-28

Similar Documents

Publication Publication Date Title
JP4866407B2 (en) Tag privacy protection method, tag device, update device, program thereof, and recording medium storing these programs
Gope et al. A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for Internet of Medical Things
US12367198B2 (en) Updatable private set intersection
US11245680B2 (en) Garbled circuit for device authentication
CN100568253C (en) Tag privacy protection method, update device, update request device, tag device
US20100045442A1 (en) RFID Privacy-Preserving Authentication System and Method
CN101256615B (en) Radio frequency recognizing privacy authentication method for dynamic cryptographic key update based on rarefaction tree
US20110047200A1 (en) A method and a system for validating a succession of events experienced by a device
EP3770888A1 (en) A behavioral and physical unclonable function and a multi-modal cryptographic authentication method using the same
Fei et al. PhenoAuth: A novel PUF-phenotype-based authentication protocol for IoT devices
Jin et al. PUF-based RFID authentication protocol against secret key leakage
CN118395474A (en) Privacy calculation enhanced blockchain solving system for safe circulation of supply chain data
US8681972B2 (en) Method of executing a cryptographic calculation
Zhou et al. Measuring privacy and security of iris fuzzy commitment
Asanuma et al. Even-Mansour Space-hard Cipher: White-box Cryptography Cipher Meets Physically Unclonable Function
CN119067144B (en) RFID smart card security authentication method and system
CN118072426B (en) Hash-based intelligent door lock user information storage method, unlocking method and intelligent door lock
CN112307499B (en) Mining method for encrypted data frequent item set in cloud computing
Munilla et al. Attacks on Secure Ownership Transfer for multi-tag multi-owner passive RFID environments
Oussama et al. A New Methodology for Preventing Vulnerabilities and Attacks on RFID Based Ultra-Lightweight SASI Protocols.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20091209

CX01 Expiry of patent term