US 12,081,675 B2
Content use system, permission terminal, browsing terminal, distribution terminal, and content use program
Hiroki Watanabe, Musashino (JP); Shigenori Ohashi, Musashino (JP); Tatsuro Ishida, Musashino (JP); Shigeru Fujimura, Musashino (JP); and Atsushi Nakadaira, Musashino (JP)
Assigned to Nippon Telegraph and Telephone Corporation, Tokyo (JP)
Appl. No. 17/617,838
Filed by Nippon Telegraph and Telephone Corporation, Tokyo (JP)
PCT Filed Jun. 17, 2019, PCT No. PCT/JP2019/023904
§ 371(c)(1), (2) Date Dec. 9, 2021,
PCT Pub. No. WO2020/255207, PCT Pub. Date Dec. 24, 2020.
Prior Publication US 2022/0247570 A1, Aug. 4, 2022
Int. Cl. G06F 21/00 (2013.01); G06F 21/64 (2013.01); H04L 9/00 (2022.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/3247 (2013.01) [G06F 21/64 (2013.01); H04L 9/30 (2013.01); H04L 9/50 (2022.05)] 5 Claims
OG exemplary drawing
 
1. A content use system comprising:
a permission terminal; and
a browsing terminal, wherein
the permission terminal includes one or more processors configured to:
generate access information for content using a content public key of the content and a user public key of a browser of the content, and
register the access information in a blockchain, wherein
the access information includes an aggregate public key that is generated based on aggregating the content public key and the user public key, a message for the content, and a content signature obtained by signing the message with a content private key corresponding to the content public key, wherein
the browsing terminal includes one or more processors configured to:
acquire the access information of content from the blockchain,
generate an aggregate signature based on aggregating (i) the content signature, and (ii) a user signature obtained by signing the message with a user private key corresponding to the user public key, and
verify whether a particular user is authorized to access the content based on the aggregate public key included in the access information, and the aggregate signature obtained based on the user private key of the particular user, and
transmit a content request including the user signature or the aggregate signature in response to determining that the verification succeeds.