摘要:
A data processing device, in a system performing authentication among a plurality of storage device (IC cards etc.), able to maintain security of authentication at other device even when secrecy of key data held by part of the devices is lost, wherein a key generation unit generates individual key data unique to an IC card based on identification data unique to the IC cards received from the ICs of the IC cards and a card processing unit performs mutual authentication with the IC based on the individual key data.
摘要:
A data processing device able to keep a technique for generation of the key data in a key generating means secret from a developer of an authenticating means, wherein an authentication program has a description for calling up a function in a key generation program and entering identification data of service etc. input from an IC of an IC card as input parameters of the function and wherein a key generation program generates a key by using the identification data written at predetermined addresses as input parameters in accordance with the execution of a code on the basis of the authentication program.
摘要:
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source has write authorization and the other access requests do not have write authorization when communication is performed with a plurality of access request sources. A management apparatus transmits, to a secure application module (SAM), a strong connection request requesting the obtainment of write authorization into the SAM. When it is determined that the strong connection has not already been assigned to the other management apparatuses, the SAM assigns the strong connection to the management apparatus in a state in which a weak connection having read authorization with the management apparatuses is maintained.
摘要:
An encryption apparatus capable of effectively preventing encryption data from being illegally generated is provided. Based on apparatus identification data of an integrated circuit (IC), which is input from a computer, a secure application module (SAM) selects an encryption method from among a plurality of different encryption methods. Based on the code of the IC, the SAM selects plaintext data to be encrypted from among the plurality of different pieces of plaintext data. The SAM outputs encryption data such that the selected plaintext data is encrypted by the selected encryption method.
摘要:
An encryption apparatus capable of effectively preventing encryption data from being illegally generated is provided. Based on apparatus identification data of an IC, which is input from a computer, a secure application module (SAM) selects an encryption method from among a plurality of different encryption methods. Based on the code of the IC, the SAM selects plaintext data to be encrypted from among the plurality of different pieces of plaintext data. The SAM outputs encryption data such that the selected plaintext data is encrypted by the selected encryption method.
摘要:
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source has write authorization and the other access requests do not have write authorization when communication is performed with a plurality of access request sources. A management apparatus transmits, to a secure application module (SAM), a strong connection request requesting the obtainment of write authorization into the SAM. When it is determined that the strong connection has not already been assigned to the other management apparatuses, the SAM assigns the strong connection to the management apparatus in a state in which a weak connection having read authorization with the management apparatuses is maintained.
摘要:
A data processing apparatus is provided which is capable of improving the responsiveness of communication in which only a maximum of one access request source has write authorization and the other access requests do not have write authorization when communication is performed with a plurality of access request sources. A management apparatus transmits, to a secure application module (SAM), a strong connection request requesting the obtainment of write authorization into the SAM. When it is determined that the strong connection has not already been assigned to the other management apparatuses, the SAM assigns the strong connection to the management apparatus in a state in which a weak connection having read authorization with the management apparatuses is maintained.
摘要:
Mutual authentication is performed by using first and second authentication key data between a first data processing device and a second data processing device. When the mutual authentication is succeeded, the first data processing device uses encryption key data for encrypting predetermined data and outputs the data to the second data processing device. The second data processing device decrypts the encrypted data by using decryption key data and judges whether the data is adequate or not for making the data to effective.
摘要:
An application program comprises a plurality of 1st application elements each having a plurality of versions. In this case, the versions are managed by using version management data each used for managing relations between a plurality of 2nd application elements each corresponding to one of the versions and the 1st application elements, and by using management data for managing relations between the 1st application elements and the version management data. As a result, it is possible to provide a data-processing apparatus capable of properly restricting users setting application programs in a server for security reasons.
摘要:
Synthetic key data hard to restore mutual authentication key data is generated by using the mutual authentication key data related to processing permitted to a user card 73 among processing relating SAM unit 9a and 9b. Then, the synthetic key data and key designation key data designating mutual authentication key data used for generating the synthetic data is written in the user card 73.