Key implementation system
A technology for installing system and keys, which is applied in the field of systems for installing keys on media cards, can solve problems such as increased manufacturing costs, achieve scalability and low cost, and prevent information leakage or improper behavior
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 approach
[0069] figure 1 It is a configuration diagram showing the configuration of the key installation system according to the first embodiment of the present invention.
[0070] The key installation system is composed of a component 1 , key writing means 12 , medium 13 and device key providing means 14 . Furthermore, the component 1 is constituted by an LSI 10 and a nonvolatile memory 11 .
[0071] The LSI manufacturer provides the LSI 10 to the component manufacturer. When LSI is developed / manufactured, in LSI 10, two types of ID (Identifier: identification code) namely ID1 and ID2; two types of LSI keys (LSI key A, LSI key B); two types of encryption keys are installed. generation process (first encryption key generation unit 100, second encryption key generation unit 105); three encryption processes (first decoding unit 101, second encryption unit 103, second decoding unit 104); key content decoding processing (content decoding processing unit 107).
[0072] The component man...
no. 2 approach
[0110] image 3 It is a configuration diagram showing the configuration of a key installation system according to the second embodiment of the present invention. exist image 3 In the key writing device 22, the component 2, the medium 23, the structural elements of the device key providing device 24 and their actions, and figure 1 The key writing device 12, the component 1, the medium 13, and the device key providing device 14 in the first embodiment shown are basically the same. Here, only the parts different from the first embodiment will be described.
[0111] The process of setting the device key in the component 2 by the component manufacturer is different from the first embodiment in the following points:
[0112] - Addition of verification processing of the decoded device key by the first verification unit 202
[0113]In the process of setting an encrypted device key for a component, the first verifying unit 202 checks whether the value of a predetermined bit field ...
no. 3 approach
[0125] Figure 5 It is a configuration diagram showing the configuration of the key installation system in the third embodiment of the present invention. figure 1 The configuration of the key installation system in the first embodiment shown is different from that of the LSI 30 , so only this difference will be described.
[0126] In the third embodiment, the same algorithm is used as the decoding algorithm of the first decoding unit 101 and the second decoding unit 104 in the first embodiment, and circuits are shared. This processing is performed in the encryption decoding unit 301 . In addition, generally known encryption processing and decoding processing can reduce the circuit size by sharing core processing, compared to implementing them as completely independent circuits. In addition to this, the processing circuit of the second decoding unit 104 is also installed in the encryption decoding unit 301 .
[0127] In this embodiment, the same algorithm is used as the encr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 