Check patentability & draft patents in minutes with Patsnap Eureka AI!

Data processing apparatus and method

一种数据处理设备、数据处理的技术,应用在认证和加密领域,能够解决不能抵抗重放攻击等问题,达到抗攻击性强、过程简单的效果

Inactive Publication Date: 2007-12-12
CANON KK
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0038] The two-pass authentication method is essentially not resistant to replay attacks (replayattack)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing apparatus and method
  • Data processing apparatus and method
  • Data processing apparatus and method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0054] Structure of the authentication system

[0055] FIG. 1 is a block diagram showing the configuration of an image processing apparatus having a device authentication function.

[0056] The image processing device includes an image input device 10 such as a digital camera and an anti-attack information holding device 20 such as a smart card. When realizing the image processing apparatus, it is not necessary to use all the components shown in FIG. 1 . Images sensed by the image input device 10 are not limited to still images but include moving images.

[0057] · Image input device

[0058] In the image input device 10 , an image sensor 101 such as a CCD or a CMOS sensor converts light input through a lens 102 into an electrical signal. The display unit 103 displays image data and various setting values ​​and states of the image input device 10 on a liquid crystal monitor and a plurality of display panels. The operation unit 104 includes various buttons, setting dials,...

no. 2 example

[0098] Information processing according to the second embodiment of the present invention will be described below. In the second embodiment, the same reference numerals as in the first embodiment denote the same components, and detailed description thereof will not be repeated.

[0099] In the authentication process of the first embodiment, the data sent from the authentication unit 202 to the authentication unit 105 is the response data RES and the encrypted key information E Ks (Ki). This data as a whole changes every authentication. The response data RES is changed at each authentication according to the challenge data CHA which is a random number. However, encrypted key information generated from key information Ki and system key information Ks having fixed values ​​takes a fixed value. The second embodiment focuses on this situation, and a method of not setting the encrypted key information to a fixed value will be described below.

[0100] Configuration for Device ...

no. 3 example

[0107] Information processing according to a third embodiment of the present invention will be described below. In the third embodiment, the same reference numerals as in the first and second embodiments denote the same components, and detailed description thereof will not be repeated.

[0108] The first and second embodiments have described systems for device authentication between the image input device 10 and the information holding device 20 . The system is not an image input device suitable only for generating image data. The third embodiment will describe an example in which the system is applied to an image browsing device using image data.

[0109] Structure of the authentication system

[0110] FIG. 6 is a block diagram showing the configuration of an image processing apparatus with a device authentication function.

[0111] This image processing device includes an information holding device 20 and an image browsing device 30 such as a PC. In realizing the image...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To realize device authentication which is highly resistant to attacks with simple procedures. Hence, an authentication unit (105) of an image input apparatus (10) transmits first data to an authentication unit (202) of an information holding device (20), and receives, from the authentication unit (202), encrypted key information and second data which is generated from the first data. The authentication unit (105) authenticates a partner device based on the first data and second data. In the case that authentication is successful, the authentication unit (105) of the image input apparatus (10) decrypts the encrypted key information to acquire key information. Then the image input apparatus (10) encrypts data using the key information, and transmits the encrypted data to the partner device.

Description

technical field [0001] The present invention relates to authentication and encryption technology between interconnected devices. Background technique [0002] In recent years, image capturing using digital cameras has become widespread. This is because an image captured by a digital camera does not deteriorate over time, can be easily stored and searched, and can be easily transmitted to a remote place. [0003] With the development of semiconductor processes, the capacity of memory cards for recording image data has rapidly increased. In recent years, memory cards even on the order of gigabytes have come into common use, and a single memory card can record a large amount of image data. On the other hand, a large amount of image data may be leaked at one time from a lost or stolen memory card. Leakage of a large amount of image data poses serious problems from the viewpoint of secrecy protection. [0004] As a measure to prevent leakage of image data, a method of encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/00H04N1/32H04L9/32H04N101/00
CPCH04L9/3273H04L2209/60H04N1/4486G06F21/00G06F15/00
Inventor 田头信博
Owner CANON KK
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More