摘要:
A non-contact identification semiconductor device is provided with a semiconductor chip including a receiving circuit that receives an inquiry to the non-contact identification semiconductor device, a memory that stores identification information of multiple bits and a sending circuit that sends the identification information. An antenna coupled to said semiconductor chip receives the identification information from said semiconductor chip and transmits the identification information outside of said non-contact semiconductor. The long side length of the semiconductor chip is not greater than 0.5 mm in plane dimension, and the identification information is stored by a pattern printed by an electron beam.
摘要:
In a signature generating method where not necessarily all of a plurality of signature generating devices work together each time to generate signatures, the present invention seeks to correctly and securely reflect data relating to previous signatures. When generating signatures, the data used for the next signature is sent beforehand to the other signature generating devices. Also, when generating signatures, at least one of the devices is used consecutively, thus allowing history data to be shared during signature generation.
摘要:
In a method of mounting a planar electronic circuit chip onto a flexible sheet together with another planar electronic element, the electronic circuit part and the another electric element are selected so that the planar surface of the another electric element is greater than the planar surface of the electronic circuit chip, and the another electric element and the electronic circuit chip are mounted on the sheet so that the planar surface of the another electric element and the planar surface of the electronic circuit chip are in parallel with the sheet surface, and the planer surface of the electronic circuit chip is accommodated within the planar surface of the another electric element as viewed in a direction perpendicular to the sheet surface.
摘要:
In a data encryption/decryption method including an encryption step and a decryption step. In the encryption step, there are prepared n pairs of secret keys and public keys in a public-key cryptographic scheme, where n is a positive integer. A new key is generated in accordance with at least one of the public keys. Data is encrypted in a common-key cryptographic scheme by use of the new key. There is prepared a (k,n) threshold logic (k is an integer equal to or less than n) having terms associated with the new key and the n public keys. A calculation of the threshold logic is conducted by use of the new key and the n public keys, and encrypted data and a result of the calculation of the threshold logic are stored. In the decryption step, the new key is restored from k secret keys selected from the n secret keys and the stored result of the threshold logic calculation in accordance with a threshold reverse logic corresponding to the threshold logic and stored data is decrypted by the restored key in the common-key cryptographic scheme.
摘要:
In an IC card incorporating residual multiplier hardware for implementing a high-speed algorithm for a residual multiplication arithmetic, a method and a device capable of executing public key encryption processing such as an elliptic curve encryption processing at a high speed. Residual arithmetic succeeding to generation of a random number and residual arithmetic in a signature generating processing can be executed by using a residual multiplier. Further, in order to use effectively the residual multiplier for arithmetic operation on an elliptic curve, the point on the elliptic curve is transformed from a two-dimensional affine coordinate system to a three-dimensional coordinate system. Additionally, multiplicative inverse arithmetic for realizing reverse transformation from the three-dimensional coordinate system to the two-dimensional affine coordinate system as well as for determining a signature s can be executed only with the residual multiplication arithmetic. By making use of the residual multiplier in this manner, the processing speed can be increased. Computation complexity can be reduced by storing previously those parameters which are used frequently and constant multiplies of a base point of the elliptic curve in the form of tables, which also contributes to increasing of processing speed.
摘要:
According to a cryptographic communication system which can safely perform cipher conversion processing when cryptographic communication is performed between terminals using different cipher types, when a terminal 10A-1 connected to a LAN-A using a cryptographic algorithm C1 transmits data to a terminal 10B-1 connected to a LAN-B using a cryptographic algorithm C2, the terminal 10A-1 generates two meaningless data items from the data to be transmitted, decrypts the two generated data items according to the cryptographic algorithm C1, and then transmits the decrypted data to two cryptographic protocol conversion servers and for dividing the data into two data items. Each of the cryptographic protocol conversion servers decrypts each transmitted data item, the re-encrypts the decrypted data according to the cryptographic algorithm C2, and then transmits the data to the terminal 10B-1. The terminal 10B-1 restores original transmission data on the basis of the two data items transmitted from the respective cryptographic protocol conversion servers.
摘要:
A method and apparatus for carrying out limited encipherment broadcast by generating a cipher key obtained from destination information added to service information are provided. An information service station transmits to each receiving station a random number, destination information for designating a destination station, and enciphered data obtained by enciphering service information by a common key generating by using the random number and destination information. An IC card at each receiving station which is provided in advance with a key generating function from the information service station, generates the common key by using the received random number and destination information only when it is confirmed from the destination information that the receiving station has a data redeption right, and deciphers the enciphered data by using the common key to obtain the original service information. The processing time required for generating the common key can be reduced because of a small amount of data to be used.
摘要:
According to the invention, techniques for authenticating that a digitally signed document is genuine. Specific embodiments according to the present invention can determine whether a digital signature was generated by a digital signature generator, or if the digital signature was generated by a third party posing as the digital signature generator. Specific embodiments can provide independent verification of digital signer identity based upon prior signed messages, time/date stamps, and the like. Techniques according to the present invention can be embodied in methods, apparatus, computer software and systems.
摘要:
A non-contact identification semiconductor device is provided with a semiconductor chip including a receiving circuit that receives an inquiry to the non-contact identification semiconductor device, a memory that stores identification information of multiple bits and a sending circuit that sends the identification information. An antenna coupled to said semiconductor chip receives the identification information from said semiconductor chip and transmits the identification information outside of said non-contact semiconductor. The long side length of the semiconductor chip is not greater than 0.5 mm in plane dimension, and the identification information is stored by a pattern printed by an electron beam.
摘要:
An identification code management method and management system includes that the issue and distribution of an ID code having a message authentication code are managed thereby to efficiently and reliably manage a material object using the ID code. An electronic circuit chip with an ID code having a message authentication code stored in a read-only area is used as an identification tag. The information at an ID code order receiving terminal and an identification tag production factory terminal are consolidated and collectively managed at an ID code management terminal. Thereby, the ID code management terminal is inquired of highly confidential information or requested to process the information as required so that an ID code utilization terminal is not required to store the same information.