CPC H04L 9/3247 (2013.01) [H04L 9/08 (2013.01); G06F 21/32 (2013.01)] | 20 Claims |
1. A utilization management system configured to manage use of a usage target object, comprising:
a utilization control device configured to control use of the usage target object by locking/unlocking, access control or encrypting/decrypting based on a use permit;
a management device configured to manage the usage target object by association with the utilization control device;
a provider terminal configured to set hole data required for verification of the use permit in the utilization control device; and
a user terminal configured to notify the utilization control device of the use permit,
wherein the management device: comprises at least one processor configured to execute a computer readable instruction so as to:
manage transaction information including conditions for using the usage target object,
manage a first secret key and a pre-registered first public key associated with the utilization control device,
manage a second secret key and a second public key associated with the utilization control device,
generate a first signature for the hole data by using the first secret key and send the hole data with the first signature to the provider terminal, the hole data including the second public key, and
generate a second signature for the use permit by using the second secret key and send the use permit with the second signature to the user terminal, the use permit including the transaction information,
wherein the provider terminal is configured to send the hole data with the first signature received from the management device to the utilization control device via Near Field Communication,
wherein the user terminal is configured to send the use permit with the second signature received from the management device to the utilization control device via the Near Field Communication,
wherein the utilization control device is configured to communicate only via the Near Field Communication, and comprises at least one processor configured to execute a computer readable instruction so as to:
verify the first signature received together with the hole data from the provider terminal by using the pre-registered first public key and set the hole data in the utilization control device when the first signature and the hole data have been verified,
verify the second signature received together with the use permit from the user terminal by using the second public key included in the hole data set in the utilization control device and obtain the transaction information included in the use permit when the second signature and the use permit have been verified, and
lift a restriction on use of the usage target object by referring to the transaction information when conditions specified by the transaction information are satisfied.
|