Method for issuing ic card storing encryption key information

a technology of encryption key and issuing method, which is applied in the field of issuing issuing issuing issuing issuing issuing issuing issuing encryption key information, which can solve the problems of data that had been encrypted in the past cannot be decrypted, the ideal method cannot be employed, and the data cannot be decrypted. it cannot achieve the effect of sufficient security

Inactive Publication Date: 2007-07-19
DAI NIPPON PRINTING CO LTD
View PDF8 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0040] With the present invention's method for issuing IC cards storing encryption key information, the encryption key information is prepared using the secret group code and the secret personal code in the interior of an IC card and is stored as it is in the IC card. Here, the secret group code is a code defined for a group to which an individual, to whom the IC card is issued, belongs, and this code can be put in the custody, for example, of a manager of an IC card provider. Meanwhile, the secret personal code is a code designated by the individual to whom the IC card is issued, and this code can be put in the custody of the individual him / herself. Because neither the secret group code nor the secret individual code is the encryption key information in itself, the encryption key information inside the IC card is maintained in a state of being stored without being known to anyone. When the IC card is lost or damaged by any chance, the IC card can be reissued because, by inputting the secret group code, kept in the custody of the manager, and the secret personal code, kept in the custody of the individual, into a new IC card, the same encryption key information can be prepared in the interior of the IC card again. The present invention thus enables an issuing process to be carried out in a mode enabling reissuing and yet enabling the ensuring of sufficient security in cases where plurality of IC cards, each storing unique encryption key information, are respectively issued to specific individuals belonging to specific groups.

Problems solved by technology

That is, the decryption cannot be performed as long as the secret encryption key information is not provided.
However for practical use, such an ideal method cannot be employed since there is a need to leave open a way of reissuing an IC card.
Thus when an IC card is lost or the IC card is damaged by any chance, unless an IC card storing the same encryption key information can be reissued, data that had been encrypted in the past can never be decrypted again.
However, in terms of practical use, problems of not being able to ensure sufficient security arise.
However, that a person who will commit an illicit act absolutely does not exist among company staff involved in an IC card issuing task cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for issuing ic card storing encryption key information
  • Method for issuing ic card storing encryption key information
  • Method for issuing ic card storing encryption key information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention shall now be described based on an illustrated embodiment.

[0050]>>

[0051] First, an arrangement of a general IC card that stores encryption key information and a mode of use of this IC card shall be described briefly. FIG. 1 is a block diagram for describing an arrangement of a general IC card 100 that is widely used presently and an encryption process using this IC card 100. As illustrated, this IC card 100 has a memory 110, a CPU 120, and an I / O unit 130. In this illustrated example, memory 110 is arranged from a ROM 111, which is a non-rewritable, nonvolatile memory, an EEPROM 112, which is a rewritable, nonvolatile memory, and a RAM 113 which is a rewritable, volatile memory. Programs for executing various processing functions that IC card 100 is equipped with are stored in ROM 111, and various data to be recorded in IC card 100 are stored in EEPROM 112. RAM 113 is used as a working area when CPU 120 executes various processes.

[0052] Memory 110 is a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff α inputs a unique personal code P(α) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(α) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(α) in the IC card. Even if the company staff α loses the IC card, it is possible to obtain the IC card having the same encryption key information K(α) as before by performing initialization again by using the IC card delivered by the IC card provider X.

Description

TECHNICAL FIELD [0001] The present invention relates to a method for issuing IC cards storing encryption key information, and particularly relates to a method for respectively issuing a plurality of IC cards, each storing unique encryption key information, to specific individuals belonging to specific groups. BACKGROUND ART [0002] IC cards are used in various applications as portable information recording media of extremely high confidentiality and recently many companies distribute multifunctional IC cards, serving as company staff ID cards at the same time, to their respective company staff. There are also many examples, where such confidentiality is noted and an IC card is used as a storage medium for storing key data which is used to encrypt and decrypt information. Often in a general encryption method, a secret encryption key or encryption key table (here, these shall be referred to collectively as “encryption key information”) is used as a seed in an encryption algorithm. In a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00G06K19/10G06K17/00G07F7/10G09C1/00H04L9/08H04L9/10
CPCH04L9/0833H04L9/0897G07F7/1008G06Q20/355G06Q20/40975G06Q20/341
Inventor HANDA, FUKIOYANA, YOSHIHIROCHIKADA, TAKAYUKINIWATA, SYOUZOU
Owner DAI NIPPON PRINTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products