摘要:
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source has write authorization and the other access requests do not have write authorization when communication is performed with a plurality of access request sources. A management apparatus transmits, to a secure application module (SAM), a strong connection request requesting the obtainment of write authorization into the SAM. When it is determined that the strong connection has not already been assigned to the other management apparatuses, the SAM assigns the strong connection to the management apparatus in a state in which a weak connection having read authorization with the management apparatuses is maintained.
摘要:
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source has write authorization and the other access requests do not have write authorization when communication is performed with a plurality of access request sources. A management apparatus transmits, to a secure application module (SAM), a strong connection request requesting the obtainment of write authorization into the SAM. When it is determined that the strong connection has not already been assigned to the other management apparatuses, the SAM assigns the strong connection to the management apparatus in a state in which a weak connection having read authorization with the management apparatuses is maintained.
摘要:
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source has write authorization and the other access requests do not have write authorization when communication is performed with a plurality of access request sources. A management apparatus transmits, to a secure application module (SAM), a strong connection request requesting the obtainment of write authorization into the SAM. When it is determined that the strong connection has not already been assigned to the other management apparatuses, the SAM assigns the strong connection to the management apparatus in a state in which a weak connection having read authorization with the management apparatuses is maintained.
摘要:
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source has write authorization and the other access requests do not have write authorization when communication is performed with a plurality of access request sources. A management apparatus transmits, to a secure application module (SAM), a strong connection request requesting the obtainment of write authorization into the SAM. When it is determined that the strong connection has not already been assigned to the other management apparatuses, the SAM assigns the strong connection to the management apparatus in a state in which a weak connection having read authorization with the management apparatuses is maintained.
摘要:
An encryption apparatus capable of effectively preventing encryption data from being illegally generated is provided. Based on apparatus identification data of an integrated circuit (IC), which is input from a computer, a secure application module (SAM) selects an encryption method from among a plurality of different encryption methods. Based on the code of the IC, the SAM selects plaintext data to be encrypted from among the plurality of different pieces of plaintext data. The SAM outputs encryption data such that the selected plaintext data is encrypted by the selected encryption method.
摘要:
An encryption apparatus capable of effectively preventing encryption data from being illegally generated is provided. Based on apparatus identification data of an IC, which is input from a computer, a secure application module (SAM) selects an encryption method from among a plurality of different encryption methods. Based on the code of the IC, the SAM selects plaintext data to be encrypted from among the plurality of different pieces of plaintext data. The SAM outputs encryption data such that the selected plaintext data is encrypted by the selected encryption method.
摘要:
Mutual authentication is performed by using first and second authentication key data between a first data processing device and a second data processing device. When the mutual authentication is succeeded, the first data processing device uses encryption key data for encrypting predetermined data and outputs the data to the second data processing device. The second data processing device decrypts the encrypted data by using decryption key data and judges whether the data is adequate or not for making the data to effective.
摘要:
A management device 20 outputs key designation data read from a card to a SAM unit 9a. The SAM unit 9a uses mutual authentication key data designated by key designation data to generate synthetic key data. The management device 20 and the SAM unit 9a use the synthetic key data for authentication. When the SAM unit 9a confirms the legitimacy of the management device 20, it executes processing related to one or more mutual authentication key data used for generating the synthetic key data.
摘要:
Synthetic key data hard to restore mutual authentication key data is generated by using the mutual authentication key data related to processing permitted to a user card 73 among processing relating SAM unit 9a and 9b. Then, the synthetic key data and key designation key data designating mutual authentication key data used for generating the synthetic data is written in the user card 73.
摘要:
Mutual authentication is performed by using first and second authentication key data between a first data processing device and a second data processing device. When the mutual authentication is succeeded, the first data processing device uses encryption key data for encrypting predetermined data and outputs the data to the second data processing device. The second data processing device decrypts the encrypted data by using decryption key data and judges whether the data is adequate or not for making the data to effective.