Parent-child card authentication system

An authentication system, mother-child technology, applied in user identity/authority verification, key distribution, can solve problems such as no consideration

Inactive Publication Date: 2007-05-09
PANASONIC CORP
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As far as the applicant knows, the management of the life cycle between IC cards that have established such a relationship has not been considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Parent-child card authentication system
  • Parent-child card authentication system
  • Parent-child card authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0073] (Embodiment 1 (mainly explain claims 1 and 10))

[0074] As the first embodiment, a parent-child card authentication system that uses the first-generation card certified by the root certification authority as the original card and inherits its authentication from generation to generation to generate descendant cards will be described.

[0075] FIG. 6 is a conceptual diagram of the parent-child card authentication system in Embodiment 1. FIG. The upper part of Fig. 6 depicts the classification of certification authorities. These accreditation bodies have the relationship that the accreditation body located above certifies the accreditation body directly below it. The root certification authority may also be the certification authority located at the root of FIG. 6 . Alternatively, it could be the Certification Authority directly above the Generation 1 card. When the root certification authority is located at the root of Figure 6, the first generation card certified by...

Embodiment approach 2

[0100] (Embodiment 2 (mainly explain claim 2))

[0101] The parent-child card authentication system in which the N+1th generation card existence proof information includes information uniquely identifying the N+1th generation card as Embodiment 2 will be described.

[0102] (Embodiment 2: Structure)

[0103] Embodiment 2 is a form in which in the mother-child card authentication system of Embodiment 1, self-identification information as information for uniquely identifying the N+1th generation card is included in the N+1th generation card existence proof information. "Unique identification" means to uniquely designate the N+1th generation card.

[0104] As an example of including self-identification information, the value stored as the target in FIG. 8 is a value obtained by combining the name or logo of the N+1th generation card manufacturer with the manufacturer's manufacturing number. Alternatively, such a value may be replaced with the name or the like of the N+1th gener...

Embodiment approach 3

[0107] (Embodiment 3 (mainly explain claim 3))

[0108] A parent-child card authentication system in which the N+1th generation card existence proof information of the third embodiment includes information uniquely identifying the Nth generation card will be described.

[0109] (Embodiment 3: Structure)

[0110] Embodiment 3 is a form in which in the mother-child card authentication system of Embodiment 1 or 2, the N+1th generation card existence proof information includes the mother card identification information as information for uniquely identifying the Nth generation card. "Unique identification" means to uniquely designate the Nth generation card.

[0111] As an example of including the master card identification information, the value stored as the issuer in FIG. 8 is a value obtained by combining the name or logo of the Nth generation card manufacturer with the manufacturer's serial number. Alternatively, such a value may be replaced with the name of the Nth generat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention settle the problems that even when a special relationship is present between IC card owners, authority of one of the IC card owners cannot be easily given to the other owner of the IC card. An IC card of a second owner can issue a public key certificate of the IC card of a first owner so that the IC card of the first owner can be recognized as a child card of the IC card of the second owner. Thus, the first generation card authenticated by a route authentication station is set as an ancestor which can generate a descendent card which receives the authentication. By checking which parent card has issued the public key authentication owned by the child card, it is possible to given the authority of the parent card to the child card.

Description

technical field [0001] The present invention relates to authentication of storage devices such as IC cards capable of setting a parent-child relationship. Background technique [0002] Storage devices such as IC cards (see, for example, Patent Document 1) are capable of storing more information than magnetic cards and the like, and are capable of processing such as encryption by including a CPU inside, and are attracting attention at present. For example, it is used as a commuter pass for automatic ticket checking in trains and the like (see, for example, Patent Document 2), and has begun to be used as a medium of electronic money in unmanned vending stores and the like. [0003] In order to use an IC card in actual commodity transactions, two steps are required, namely (1) a step of receiving certification from a certification body and (2) a step of receiving issuance processing by a card issuer (see, for example, Patent Document 3). In (1) the step of accepting the certif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08G06K17/00G06K19/10
Inventor 田靡雅基伊藤快鹤切惠美竹内康雄
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products