Secure device, information processing terminal, server, and authentication method

A security device and server technology, applied in key distribution, can solve problems such as complex calculation of authentication information, and achieve the effect of ensuring security

Inactive Publication Date: 2008-12-17
PANASONIC CORP
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in a security device with a limited CPU processing speed or limited memory operation processing capacity, it is impossible to make the authentication information calculation too complicated
In addition, in a server that accepts r...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure device, information processing terminal, server, and authentication method
  • Secure device, information processing terminal, server, and authentication method
  • Secure device, information processing terminal, server, and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0044] In Embodiment 1 of the present invention, a security device for holding terminal applications will be described. This security device is installed in the information processing terminal, and when the information processing terminal requests the start-up of the terminal application, the terminal application embedded with the method (method) and authentication information for performing the authentication information complicated by the security device is released. operation. Then, if the information processing terminal starts the terminal application, the terminal application calculates the authentication key through more complicated calculation and processing than the security device, and then the security device calculates the authentication key through simpler calculation and processing, so that there is a connection between the security device and the information processing terminal. authentication using the authentication key.

[0045] FIG. 1 is a diagram showing a ...

Embodiment approach 2

[0095] The configurations of information processing terminal 30 and security device 10 in Embodiment 2 are the same as in Embodiment 1 in FIG. 1 . However, the content of the calculation complexity information 1023 and the operation of the calculation complexity unit 1013 that processes the content are different.

[0096] First, an outline of the principle of making the operation of the authentication information complex operation section 3021 more complex and the operation of the authentication information operation section 1014 simpler will be described. To simplify the description, the number n of authentication information 3041 to 304n is set to 4, and the authentication information 3041 to 3044 are respectively set to a, b, c, and d. However, unlike the first embodiment, the authentication information 3041 is not set as the inverse value C. At this time, the values ​​of the authentication information 3041 to 3044 are all 64 bits. In a specific example of Embodiment 2, t...

Embodiment approach 3

[0112] The configurations of the information processing terminal 30 and the security device 10 according to the third embodiment are the same as those of the information processing terminal 30 and the security device 10 according to the first embodiment shown in FIG. 1 . However, the contents of the computation complexity information 1023 and the operation of the computation complexity section 1013 processing the contents are different from those of the first embodiment.

[0113] FIG. 6 is a configuration diagram showing an example of the calculation complexity information 1023 used by the calculation complexity means in Embodiment 3 of the present invention. The calculation complexity information 1023 will be described using FIG. 6 . The difference from Embodiment 2 is that not only a pair that is multiplied to 1, but also a pair of arbitrary numbers can be described. The result of the multiplication is the information of 'answer' of 'pair2' in Figure 6, which indicates that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A secure device can make contents of terminal application authentication information calculation a different complicated calculation process at each time while suppressing the processing load in the secure device and a card application code size to low values. When issuing of a terminal application (302) is requested from an application loader (301) to an application management unit (1011), an instruction content execution unit (1012) embeds authentication information used for calculation of an authentication key required for authentication with an application causing an information processing terminal (30) to perform a process, into the terminal application (302). A calculation complicating unit (1013) creates a calculation problem having a calculation result as an answer and embeds it as a part of the authentication information calculation into the terminal application (302). An authentication information calculation unit (1014) calculates authentication information with the calculation result to create an authentication key. An authentication processing unit (1032) performs authentication of the terminal application (302) by the authentication key. This does not complicate the calculation process while making the authentication information calculation of the terminal application (302) a different complicated calculation at each time.

Description

technical field [0001] The present invention relates to a security device, an information processing terminal, a server and their authentication methods for authentication through asymmetric operation. In particular, it relates to security devices such as IC (Integrated Circuit) cards that securely hold data; information processing terminals such as mobile phones, PDAs (Personal Digital Assistants, Personal Digital Assistants) and personal computers equipped with such security devices; the server of the data; and the authentication method. Background technique [0002] In recent years, security devices such as IC cards that have a CPU (Central Processing Unit) and a tamper-resistant storage area are able to run card applications (hereinafter, applications are abbreviated as 'applications' as appropriate), and are used in electronic money Or monthly tickets, electronic tickets and other services. By installing the security device on an information processing terminal such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/20G06K17/00G06K19/07G06K19/10H04L9/08G06F21/31G06F21/34
Inventor 竹川视野高山久
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products