摘要:
A theft prevention system capable of preventing theft of a target object by disabling the authorized key of the target object in the case where the authorized key has been stolen. When the authorized key is lost, a mobile telephone instructs a vehicle control device to set a warning mode. On receipt of this warning mode instruction, the vehicle control device sets warning mode, generates an electronic key, and transmits the generated electronic key to the mobile telephone, which receives and stores the electronic key. Once the warning mode is set in the vehicle, locking and unlocking are only possible using the electronic key. If the authorized key is found, the mobile telephone instructs the vehicle control device to set the normal mode. Upon receipt of this normal mode instruction, the vehicle control device sets the normal mode in the vehicle.
摘要:
A theft prevention system capable of preventing theft of a target object by disabling the authorized key of the target object in the case where the authorized key has been stolen. When the authorized key is lost, a mobile telephone 100 instructs a vehicle control device 300a to set a warning mode. On receipt of this warning mode instruction, the vehicle control device 300a sets warning mode, generates an electronic key, and transmits the generated electronic key to the mobile telephone 100, which receives and stores the electronic key. Once the warning mode is set in the vehicle, locking and unlocking are only possible using the electronic key. If the authorized key is found, the mobile telephone 100 instructs the vehicle control device 300a to set the normal mode. Upon receipt of this normal mode instruction, the vehicle control device 300a sets the normal mode in the vehicle. Once the normal mode is set in the vehicle, locking and unlocking are only possible using the authorized key.
摘要:
A service user's personal information that has been verified and to which a digital signature has been attached by a personal information verification apparatus (signed-personal information) is stored in a highly secure form within a service user apparatus. For receiving services, the service user apparatus transmits the signed-personal information stored there into a service provider apparatus. The service provider apparatus verifies the signed-personal information based on the digital signature, and then provides services based on the personal information.
摘要:
The subkey data generating unit 101 has two different subkey key generation processes. When encrypting a (T*n)th plaintex block (where T denotes a predetermined cycle and n is a positive integer), sixteen sets of subkey data are generated. In all other cases, two sets of subkey data are generated. The encrypting unit 100 encrypts the plaintex using the generated sixteen or two sets of subkey data.
摘要:
A content reproduction apparatus (1) which reproduces digital contents, and includes a device key storage unit (110) holding a device key (110a) specific to the content reproduction apparatus (1) in a manner that does not allow access from outside the content reproduction apparatus (1). The content reproduction apparatus (1), also includes a device ID storage unit (19) holding device key index information (19a) that is in a one-to-one association with a device key (110a), an instruction code receiving unit (14a) receiving an instruction code to output index information, a device key index information obtainment processing unit (10a) outputting, to outside, the device key index information (19a) stored in the device ID storage unit (19) based on the instruction, and a device key index information output processing unit (11a).
摘要:
In an authentication system, a key registration apparatus receives input of an identifier unique to a second device, generates first key data from the identifier according to a predetermined key generation algorithm, and transmits the generated first key data to a first device, which receives and stores the first key data, and authenticates the second device with use of the first key data. The second device stores in advance second key data generated from the identifier according to the predetermined key generation algorithm, and is authenticated by the first device with use of the second key data. Accordingly, the first and second devices cannot be registered without using the key registration apparatus, thereby preventing communication with unregistered devices. This enables usage of content to be limited to individual usage in the home of a user, and can be realized even with devices that are not connected outside the home.
摘要:
An encryption device encrypts a message, and includes a function value output unit that calculates a function value of the message using a one-way converting function. The encryption device also includes a numerical array output unit having an initial array decision unit that generates an initial decision array V1 having n1 elements of 1, n2 elements of −1, and (n−n1−n2) elements of 0. Further, the numerical array output unit includes an array element replacement unit that changes the array element of the initial array V1 generated by the initial array decision unit according to an input integer X, and outputs the array V. The encryption device also includes a text generation unit that generates encrypted text, based on the message, according to a polynomial which corresponds to the array V.
摘要:
A content reproduction apparatus (1) which reproduces digital contents, including a device key storage unit (110) which holds a device key (110a) specific to the content reproduction apparatus (1) in a manner which does not allow access from outside the content reproduction apparatus (1), a device ID storage unit (19) which holds device key index information (19a) which is in a one-to-one association with a device key (110a), an instruction code receiving unit (14a) which receives an instruction code to output index information, a device key index information obtainment processing unit (10a) which outputs, to outside, the device key index information (19a) stored in the device ID storage unit (19) based on the instruction, and the device key index information output processing unit (11a).
摘要:
An object of the present invention is to provide a technology to improve security against spoofing in a method of authentication using a challenge and response system.In the method of authentication of the present invention, the piece of challenge data is transmitted from the sever 10 to the terminal 20 (S104), and then the piece of response data, which is the decrypted challenge data (S105), is transmitted from the terminal to the server (S107). Further, whether the piece of response data is the piece of challenge data decrypted or not is judged based on encryption performed in the server 10 (S109). When the result of judgment is affirmative, the parameter used both for encryption and decryption is renewed to a parameter to be used in the next authentication (S111, S112).
摘要:
A data converter (1) capable of reducing a size of the total implementation in a device is a processing apparatus that performs secret converting processing predetermined to input data with 64 bits, the data converter including a finite field polynomial cubing unit (10), data integrating units (11a) to (11d), (12) and (13), a first converter (14), a second converter (15), a data splitting unit (16), and a data integrating unit (17). The finite field polynomial cubing unit (10) performs cubing, on the 32 bits data, in the polynomial residue class ring with a value in the finite field GF (28) as a coefficient and respectively outputs data with 32 bits.