The patent's assignee for patent number 8528104 is
News editors obtained the following quote from the background information supplied by the inventors: "Along with diffusion of information processing devices such as personal computers, PDAs, cellular phones, and the like in recent years, it is conceivable that a technique for providing a service by use of a so-called digital ticket (hereinafter referred simply to as a ticket in the present invention) will become widespread. Such a ticket allows fraudulent duplication because of the nature of electronic data. Accordingly, it is conceivable to be increasingly necessary to prevent acts of performing multiple accesses by use of a fraudulently duplicated ticket (hereinafter referred to as multiple uses).
"Although such fraudulent acts must be eliminated, the ticket in the present invention is a piece of electronic data, and it is difficult to prevent the multiple uses of the duplicated ticket only by means of a software unit.
"Therefore, it is understood that elimination of the above-described fraudulent acts must depend on hardware to some extent. However, a security device implemented in hardware has a limitation in hardware resources allocatable for this purpose. For this reason, with regard to conventionally used security devices, it is also conceivable that data for preventing the fraudulent acts must be stored in an area outside the security device. In this case, it is possible to execute complicated encryption processing between the security device and the external area. However, such processing may cause response delays in transactions and may damage efficiency of using electronic tickets. On the other hand, a method of storing the data for preventing fraudulent acts in the external area has a disadvantage of damaging reliability of the security device itself due to fraudulent accesses to the data for preventing the fraudulent acts.
"A method of storing an encryption key in an encrypted format outside the security device has been heretofore known. However, it is hard to say that the method sufficiently addresses a question of restricting the number of signatures, i.e. restricting the multiple uses. In this case, it is also conceivable to add a counter to a key Blob. However, reliability of the counter must be assured at the same time. Accordingly, adoption of a data format in which the counter is simply added is not sufficient in terms of eliminating the fraudulent multiple uses.
"The following document is considered:
"[Non-Patent Document 1] Terada et al., 'Copy Prevention Scheme for Rights Trading Infrastructure',
Most Popular Stories
- American Airlines, US Airways Complete Merger
- ACA Delay Stresses Small Businesses
- Questions Remain in Jenni Rivera's Death
- Harley Issues Motorcycle Recall
- Unemployed Wait as Lawmakers Debate
- General Dynamics Plans 200 New Jobs in N.M.
- Auto Dealer Builds Big Solar Project
- Entrepreneurs' Next Creation May Be New Laws
- Saab Gets Back into the Game; U.S. Auto Sales Soar
- Dell Offers Undisclosed Number of Employee Buyouts