摘要:
A user i calculates authentication application information involving a random-number parameter and transmits it to a sales company A. At the sales company A, the received authentication application information is one-way transformed using a random-number parameter and is transmitted to the user i as authentication challenged information. At the user i, an identification number for credit membership of the user and a password are inputted and the received authentication challenge information is transformed using the password to create authentication response information. Then the identification number of the user i and the authentication response information are transmitted to the sales company A. At the sales company A, the received authentication response information is one-way transformed so that the random-number parameter is cancelled so as to produce authentication reference information. Then the received identification number and the authentication reference information are transmitted to the credit company b. At the credit company b, transformed secret information which is stored in advance is retrieved using the received identification number as a key and it is determined whether the transformed secret information and the authentication reference information are equal. If they are equal, the credit company b transmits to the sales company A authentication information indicating correctness of the user i, and if they are not equal, it transmits authentication information indicating that the user i can not be authenticated as a correct user. At the sales company A, the authentication information transmitted from the credit company b is transmitted to the user i.
摘要:
An authentication communication system is capable of storing information relating to revoked devices in less area than is conventionally required.A computer unit stores in advance revocation information that indicates at least one revoked apparatus, and when authenticating a driver unit judges, based on the revocation information, whether or not the driver unit is revoked. The computer unit prohibits communication with the driver unit when the driver unit is judged to be revoked, and communicates with the driver unit when the driver unit is judged not to be revoked.
摘要:
In an information input/output system, a user device inputs and outputs information to and from external sources including a key management device. The system includes the key management device that securely outputs invalid-device information specifying an invalid device unit that has been made invalid for use, and the user device that includes an input/output unit and a host unit. Via the input/output unit, input and output of information is enabled between the host unit and the external sources. The host unit securely receives, via the input/output unit, the invalid-device information outputted by the key management device and judges whether or not the input/output unit is an invalid device unit by referring to the received invalid-device information. When judging, that the input/output unit is an invalid device, the host unit thereafter prohibits input and output via the input/output unit. Due to this construction, the host unit can correctly judge whether or not the input/output unit is an invalid device unit.
摘要:
An encryption transmission apparatus and an encryption reception apparatus avoid attack that takes advantage of a re-transmission request. A server apparatus encrypts a content key five times, thereby generating five encrypted content keys, calculates a hash value of the content key, and transmits the five encrypted content keys and the hash value. An image playback apparatus receives the five encrypted content keys and the hash value, decrypts the five encrypted content keys thereby generating five content keys, calculates hash values, each corresponding to the generated content keys, and compares the calculated hash values with the received hash value, respectively. If at least one of the five calculated hash values matches the received hash value, the corresponding content key is considered correct. Conversely, if none of the five calculated hash values matches the received hash value, it is considered a decryption error.
摘要:
A system structured from a management device, a content key distribution device and a plurality of terminals suppresses the data volume of a terminal revocation list (TRL). The management device generates and transmits a TRL formed from data that expresses terminal IDs of all terminals to be invalidated, by only a value and a position of a common bit string in the IDs, to the content key distribution device. Each terminal holds a terminal ID that includes a manufacturer ID and a serial number, and requests the distribution of a content key by sending the terminal ID to the content key distribution device. The content key distribution device refers to the TRL, judges whether the terminal ID transmitted from the terminal is that of an invalidated terminal, and if negative, encrypts and transmits the content key to the terminal.
摘要:
The present invention pertains to a transmission apparatus for generating an encrypted text by encrypting a plaintext, which includes a parameter storage unit for storing a random parameter (the number of terms whose coefficients indicate 1) adapted to an encryption key and an encryption apparatus and a decryption apparatus; an encryption unit for generating, from the plaintext, the encrypted text using the encryption key and the random parameter stored in the parameter storage unit, complying with an encryption algorithm based on the NTRU™ method; and a key updating unit for updating the random parameter stored in the parameter storage unit and the encryption key, as time passes.
摘要:
A secure device is provided that can store programs therein, the secure device including: a low-protection level storage unit; a high-protection level storage unit; a program acquiring unit that acquires a program and corresponding additional information, the additional information used for determining a storage destination of the acquired program; an additional information analyzing unit that stores the acquired program in one of the low-protection level storage unit and the high-protection level storage unit, according to additional information; an area searching unit; a protection level judging unit; and a program storing unit.
摘要:
An encryption device encrypts a message, and includes a function value output unit that calculates a function value of the message using a one-way converting function. The encryption device also includes a numerical array output unit having an initial array decision unit that generates an initial decision array V1 having n1 elements of 1, n2 elements of −1, and (n−n1−n2) elements of 0. Further, the numerical array output unit includes an array element replacement unit that changes the array element of the initial array V1 generated by the initial array decision unit according to an input integer X, and outputs the array V. The encryption device also includes a text generation unit that generates encrypted text, based on the message, according to a polynomial which corresponds to the array V.
摘要:
A positional information storage system stores and verifies positional information of a mobile terminal apparatus. The positional information storage system stores (i) the positional information, (ii) time information, and (iii) signature data that is generated by placing a digital signature on a combination of the time information and the positional information of the mobile terminal apparatus only if a user of the mobile terminal apparatus is successfully authenticated. The positional information storage system also verifies whether the signature data is authentic. With this construction, it is possible to authenticate a person carrying the mobile terminal apparatus, and to verify whether data to be stored in the memory has been tampered with.
摘要:
An encryption apparatus 100a is comprised of the following: a CRL storage unit 111 that stores a CRL; a device key ring storage unit 112 that stores a device key KD_A specific to each copyright protection module 210a used by a decryption apparatus 200a; a content key storage unit 113 that stores a content key Kc that is a secret key for encrypting a content; a hashing function processing unit 114 that calculates a hash value of the CRL stored in the CRL storage unit 111 according to a hashing function; an Ex-OR unit 115 that obtains an exclusive OR value between the hash value and the device key KD_A; and an Enc unit 116 that encrypts the content key Kc using an output value from the Ex-OR unit, and stores the hash value, the encrypted content key and the encrypted content in a DVD2a.