Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for authentication, and device and method for authentication

a technology of authentication and system, applied in the field of authentication system and method, and authentication device and method, can solve the problems of reader writer b>101/b>, difficult to take an access to areas quickly,

Inactive Publication Date: 2007-05-08
SONY CORP
View PDF22 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0025]The authentication device described in another embodiment, the second decipherment means and changing means are additionally provided, when the first enciphered data which is generated by enciphering the second key using the first key and the second enciphered data which is generated by enciphering the third key having a prescribed relation to the second key using the first key are transmitted, together with the key identification number of the key to be changed, from the other device in order to change the first key out of the pl

Problems solved by technology

In the conventional system, it has been difficult to take an access to areas rapidly because mutual authentication processing is performed individually for each area.
As the result, it has been difficult that a reader writer 101 makes an access to a prescribed area of the IC card 102 and then writes and reads information in a short time, for example, when a commuter passes a gate installed at a ticket gate.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authentication, and device and method for authentication
  • System and method for authentication, and device and method for authentication
  • System and method for authentication, and device and method for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]FIG. 1 shows an exemplary structure of an authentication system of the present invention. The system comprises a controller 1, reader writer 2, and IC card 3. A user instead of a commutation ticket, for example, carries the IC card 3. The reader writer 2 is installed at a ticket gate of a rail way company who employs the IC card 3. In this specification, the term “system” means a whole apparatus having a plurality of devices.

[0047]The controller 1 is provided with a memory 11, which stores cipher keys for access to areas of a memory 31 of the IC card 3, and corresponding provider numbers. A communication section 12 communicates between a communication section 21 of the reader writer 2 by wire or radio transmission. A reduction processing section 13 reads a cipher key of a prescribed number out of a plurality of cipher keys stored in the memory 11, and generates one reduction key. A controller 14 controls operations of components in the controller 1, and performs authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In authentication using a plurality of cipher keys, the authentication time is shortened. In the case that an encipher key to encipher key are required to take an access to each area out of the area to area in a memory of an IC card, a plurality of areas to have an access is informed to the IC card from a reader writer, a plurality of cipher keys corresponding to these areas (for example, cipher key 1, cipher key 2, and cipher key 4) is read out, and reduction processing section generates one reduction key from these cipher keys. A random number which is generated from a random number generation section of the reader writer is transferred to the IC card, and an encipherment section enciphers the random number using the reduction key. The reader writer receives the enciphered random number from the IC card, and deciphers it using the reduction key, and judges the IC card to be proper if the deciphered random number is equal to the generated random number.

Description

BACKGROUND OF THE INVENTION[0001]This invention relates to a system and method for authentication and device and method for authentication, and particularly relates to a system and method for authentication and device and method for authentication which are capable of authenticating rapidly.DESCRIPTION OF RELATED ART[0002]FIG. 20 shows an exemplary structure of a conventional authentication system using an IC card. In this exemplary structure, authentication processing is performed between the IC card 102 and reader writer 101. In the IC card 102, the area for storing information is divided into 5 areas of area 1 to area 5. Respective areas correspond to different cipher key 1 to key 5. To take an access to area i, the corresponding cipher key i is required.[0003]When the reader writer 101 records a data in, for example, area 1 of the IC card, or reads a data stored therein, first mutual authentication processing is performed. The reader writer 101 previously stores the same cipher ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/14H04L9/16G06K17/00G07F7/10G09C1/00H04L29/06
CPCG06Q20/341G06Q20/3823G06Q20/40975G07F7/1008H04L63/062H04L9/32
Inventor KUSAKABE, SUSUMUTAKADA, MASAYUKIISHIBASHI, YOSHIHITO
Owner SONY CORP