Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
1999-11-18
2001-07-31
Swann, Tod (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C705S067000
Reexamination Certificate
active
06269445
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates in general to an electronic shopping system by which an order of products to be purchased by a user and the processing of clearing up a sum of products purchased by the user using a credit card can be safely carried out on a communication network, and more particularly to an electronic shopping method and an electronic shopping system by which an order of products to be purchased by a user and the processing of clearing up a sum of products purchased by the user using a credit card can be safely carried out using a cipher communication method.
2. Description of the Related Art
Until the present time, a large number of cipher communication methods have been proposed. These cipher communication methods are roughly classified into a method in which a key is held in common by utilizing a public key concept and a method in which the public key concept is not employed. For example, as for the method of employing the public key concept, there is well known a key distribution method based on a RSA cipher disclosed in an article of “A Method of Obtaining Digital Signatures and Public Key Cryptosystems” by R. L. Rivest, A. Shamir and L. Adleman, Communication of the ACM, Vol. 21, No. 2, pp.120 to 126, 1978, or public key distribution method disclosed in an article of “New Directions in Cryptology” by W. Diffice and M. Hellman, IEEE Transaction of the Information Theory, Vol. IT-22, No. 6, pp.644 to 654, 1976.
On the other hand, as for a method of not employing the public key concept, as disclosed in “ISO/IEC DIS 11770-2”, pp. 1-23 there is well known a method including the following steps.
For example, it is assumed that three entities A, B and C are present on a communication network, and the entities A and C hold a key K(A, C) in common, and the entities B and C hold a key K(B, C)in common. In this connection, the entity C is assumed to be sufficiently reliable.
Step 1: Firstly, the entity A selects a key K at random, and then calculates a cipher text C(P) which has been obtained by enciphering a document P to be notified using the key K, i.e., C(P)=E(K: P). Now, E(K: P) shows the result of enciphering the document P using the key K. In addition, the entity A calculates a cipher text C(K) which has been obtained by enciphering the key K using the key K(A, C), i.e., C(K)=E(K(A, C): K). Both C(P) and C(K) thus obtained are transmitted to the entity B through a communication network.
Step 2: The entity B transmits C(K) which has been supplied thereto through the communication network to the entity C.
Step 3: The entity C deciphers the key K using the key K(A, C) on the basis of K=D(K(A, C): C(P)). Now, D(K: P) shows the result of deciphering the document P using the key K. Next, the entity C calculates a cipher text C′(K) which has been obtained by enciphering the deciphered key using the key K(B, C), i.e., C′(K)=E(K(B, C): K), and then transmits the resultant C′(K) to the entity B.
Step 4: The entity B deciphers the key K from C′(K) using the key K(B, C) on the basis of K=D(K(B, C): C′(K)), and then deciphers the document P using the key K on the basis of P=D(K: C(K)).
In such a way, the entity B can obtain the contents of the document P.
A large number of cipher communication methods as described above have been proposed. If employing any one of those methods, an electronic shopping system can be designed which is such that by utilizing the communication network, a user purchases desired products from a retail store, and requests a credit card company of its payment. For example, in the above-mentioned method of not employing the public key, the user, the retail store, the credit card company, and the document may be made correspond to the entities A, B, C and a written order of the products to be purchased by the user, respectively.
According to a sort of electronic shopping system, in general, the user can order safely surely the desired products and also request the credit card company of its payment.
In the above-mentioned electronic shopping system, however, for example, there is a possibility that the following problem arises. That is, there is a possibility that since the credit card company can not authenticate the legality of the user, the retail store produces the false written order to send it to the credit card company.
In addition, there may be a case where the user does not desire that the contents of the products purchased by himself/herself become known to the credit card company. However, in the above-mentioned electronic shopping system, it is impossible that out of the contents of the document P corresponding to the written order, for example, only the information relating to the purchased products is not made become known to the credit card company.
SUMMARY OF THE INVENTION
In view of the foregoing problems associated with the prior art, it is therefore an object of the present invention to provide an electronic shopping method and an electronic shopping system by which a credit card company can authenticate the legality of a user and the legality of a sum of products purchased by the user on the basis of information sent from a retail store.
In addition, it is another object of the present invention to provide an electronic shopping method and an electronic shopping system which are designed in such a way that information relating to the products purchased by a user can become known to only a retail store, and also a credit card company can not become aware of only information, including information relating to a sum of purchased products, required for clearing up a sum of purchased products.
The above-mentioned objects of the present invention are attained by the provision of an electronic shopping method in which by using a communication network to which a first apparatus for being operated by a user, a second apparatus associated with a retail store for providing information with respect to products to be purchased by the user, and a third apparatus associated with a credit card company for paying the prices for the products purchased by the user are connected, the user operates the first apparatus so as to transmit a written order that the user purchases the desired products to the second apparatus, and the second apparatus transmits at least predetermined information of the written order of interest to the third apparatus, the method including that:
both the first apparatus and the third apparatus hold a first key in common, and both the second apparatus and the third apparatus hold a second key in common;
the first apparatus calculates a first cipher text which is obtained by enciphering the written order exhibiting the products to be purchased using a third key selected at random, a second cipher text which is obtained by enciphering the third key using the first key, and authentication information relating to at least a predetermined part of the written order, and then transmits the first cipher text, the second cipher text and the authentication information to the second apparatus through the communication network;
the second apparatus transmits the second cipher text to the third apparatus;
the third apparatus deciphers the third key using the first key on the basis of the second cipher text, and calculates a third cipher text which is obtained by enciphering the resultant third key using the second key, and then transmits the third cipher text to the second apparatus through the communication network;
the second apparatus deciphers the third key using the second key on the basis of the third cipher text, and also deciphers the written order using the resultant third key on the basis of the first cipher text, and authenticates the predetermined part of the written order by referring to the authentication information, and calculates a four cipher text which is obtained by enciphering the predetermined part of the written order using the second key, and then transmits both the authentication information
Miyazaki Satoshi
Nishioka Mototsugu
Antonelli Terry Stout & Kraus LLP
Hitachi , Ltd.
Smithers Matthew
Swann Tod
LandOfFree
Electronic shopping method, electronic shopping system and... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Electronic shopping method, electronic shopping system and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Electronic shopping method, electronic shopping system and... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2520922