Ic Card for Encryption or Decryption Process and Encrypted Communication System and Encrypted Communication Method Using the Same

Inactive Publication Date: 2007-09-27
DAI NIPPON PRINTING CO LTD
View PDF11 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0033] According to the present invention, the encryption key information necessary for the encryption process or the decryption process is generated inside the IC card by a computation process based on the two codes of the fixed code and the variable code that are stored inside the IC card. Here, the fixed code is data that has been written into the IC card in advance and is arranged to be non-rewritable. Thus for example, by writing, into IC cards to be issued to a specific company, the same fixed code unique to the company, the fixed code becomes data stored only in the IC cards owned by company staff of the company and sufficient security measures can thus be taken against an unspecified number of persons outside the company. Meanwhile, since the variable code is a code that can be rewritten freely, flexible accommodation is enabled by rewriting the variable code anew each time a change of member of a project team occurs.

Problems solved by technology

That is, the decryption cannot be performed as long as the secret encryption key information is not provided.
Obviously in such a case, conventional encrypted communication arts enable encrypted communication of a mode such that deciphering cannot be performed by company staff not involved in the specific project.
However, a project team in a company is liable to undergo a change of members frequently through dissolution, joining of groups, addition of new members, leaving of existing members, etc.
However, flexibility and security are generally conflicting elements and if flexibility is provided, security is inevitably compromised accordingly.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ic Card for Encryption or Decryption Process and Encrypted Communication System and Encrypted Communication Method Using the Same
  • Ic Card for Encryption or Decryption Process and Encrypted Communication System and Encrypted Communication Method Using the Same
  • Ic Card for Encryption or Decryption Process and Encrypted Communication System and Encrypted Communication Method Using the Same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

>>

[0041] An encrypted communication system according to the present invention is a system for performing encrypted communication using IC cards for an encryption or a decryption process. Thus first, an arrangement of a general IC card that stores encryption key information and processes of encryption and decryption using this IC card shall be described briefly. FIG. 1 is a block diagram for describing an arrangement of a general IC card 100, that is widely used presently, and an encryption process using this IC card 100. As illustrated, this IC card 100 has a memory 110, a CPU 120, and an I / O unit 130. In this illustrated example, memory 110 is arranged from a ROM 111, which is a non-rewritable, nonvolatile memory, an EEPROM 112, which is a rewritable, nonvolatile memory, and a RAM 113, which is a rewritable, volatile memory. Programs for executing various processing functions that IC card 100 is equipped with are stored in ROM 111, and various data to be recorded in IC card 100 are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

It is possible to perform encrypted communication between members of a group while assuring a sufficient security compatible with a change of the members. An IC card having the same fixed code F(a) is distributed to all the staffs of company A. When communication is performed between a staff α and a staff β belonging to the same project group, α of the transmission side writes an arbitrary variable code V(1) in the IC card (100a) so as to generate encryption key information K(a1) according to F(a) and V(1) in the IC card and encrypt data D1 by using K(a1). β of the reception side writes the variable code V(1) received from a in the IC card (100b) so as to generate encryption key information K(a1). By using this K(a1), the encrypted data D2 received is decrypted to obtain data D3. The fixed code F(a) is different for each of the companies and rewrite-disabled so as to assure security.

Description

TECHNICAL FIELD [0001] The present invention relates to an encrypted communication system and an encrypted communication method, and particularly relates to arts of performing encrypted communication using an IC card which executes an encryption or a decryption process. BACKGROUND ART [0002] With the spread of computer networks in recent years, encrypted communication arts have become extremely important and essential. In a general encrypted communication method, data to be subject to transmission is encrypted at a transmitter side and transmitted as encrypted text data to a receiver side, and at the receiver side, the transmitted encrypted text data is decrypted to obtain the original data subject to transmission. Thus to perform encrypted communication between the two sides, in addition to providing means for sending and receiving data, a means for executing an encryption process must be provided at the transmitter side and a means for executing a decryption process must be provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08G06K19/10G09C1/00H04L9/10
CPCH04L9/0827H04L2209/56H04L9/0897H04L9/0836
Inventor HANDA, FUKIOYANO, YOSHIHIROCHIKADA, TAKAYUKINIWATA, SYOUZOU
Owner DAI NIPPON PRINTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products