This invention is a validation protocol for determining whether an untrusted authentication chip is valid, or not. In another aspect it concerns a validation system for the protocol. The protocol may be used to determine the physical presence of a valid authentication chip. In this case a system may
This invention is a validation protocol for determining whether an untrusted authentication chip is valid, or not. In another aspect it concerns a validation system for the protocol. The protocol may be used to determine the physical presence of a valid authentication chip. In this case a system may call the trusted chip to generate a random number and a digital signature for it, encrypt them with a first key and then call a prove function in the untrusted chip. The prove function decrypts the random number and signature, and calculates another signature from the decrypted random number, for comparison with the decrypted one. If the comparison is successful the random number is encrypted with another key and sent back. Finally, a test function is called in the trusted chip to generate its own encrypted version of the random number using the second key and then compare it with the received version to validate the untrusted chip. The untrusted chip may be associated with a consumable so that validation of the untrusted chip authenticates the consumable.
대표청구항▼
The invention claimed is: 1. A validation protocol for determining authenticity of a printer consumable, said protocol including the steps of: providing a printer containing a first authentication chip and a printer consumable containing a second authentication chip; generating a secret random numb
The invention claimed is: 1. A validation protocol for determining authenticity of a printer consumable, said protocol including the steps of: providing a printer containing a first authentication chip and a printer consumable containing a second authentication chip; generating a secret random number and calculating a signature for the secret random number using a signature function, in the first chip, the first chip having a random function to produce random numbers from a seed, and the function advances after each successful validation, so that the next random number is produced from a new seed; encrypting the secret random number and the signature by a symmetric encryption function using a first key, in the first chip; passing the encrypted secret random number and signature from the first chip to the second chip; decrypting the encrypted secret random number and signature with a symmetric decryption function using the first key, in the second chip; calculating a signature for the decrypted secret random number using the signature function, in the second chip; comparing the signature calculated in the second chip with the signature decrypted, in the second chip; in the event that the two signatures match, in the second chip, encrypting the decrypted secret random number and a memory vector of the second chip by the symmetric encryption function using a second key to produce a first number and sending the memory vector and the first number to the first chip, the memory vector being comprised of variables holding updatable consumable state data of the printer consumable, the manner of updating the updatable consumable state data being protected by requiring clearing of the memory vector when access to change the updating manner is attempted; calling a test function in the first chip by the first chip first receiving the memory vector and the first number from the second chip, the test function including: encrypting the secret random number and the received memory vector by the symmetric encryption function using the second key, in the first chip, to produce a second number; comparing the second number with the first number, in the first chip, in the event that the comparison returns a match, considering the second chip to be valid and authorizing use of the printer consumable; and in the event that the comparison returns a mismatch, considering the second chip to be invalid and denying use of the printer consumable. 2. The protocol according to claim 1, where the first and second keys are held in both the first and second authentication chips, and are kept secret. 3. The protocol according to claim 1, where the symmetric decrypt function is held only in the second chip. 4. The protocol according to claim 1, where the signature function generates digital signatures of 160 bits. 5. The protocol according to claim 1, where the time taken to return an indication the second chip is invalid is the same for all bad inputs, and the time taken to return the secret random number encrypted with the second key is the same for all good inputs. 6. The protocol according to claim 1, where a test function is held only in the first chip to advance the secret random number if the second chip is valid; otherwise it returns an indication the second chip is invalid. 7. The protocol according to claim 6, where the time taken to return an indication the second chip is invalid is the same for all bad inputs, and the time taken to return an indication the second chip is valid is the same for all good inputs. 8. The protocol according to claim 1, where it is used to determine the physical presence of a valid authentication chip.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (43)
Chaussade Xavier,FRX ; Brot Michel,FRX, Assembly of a printer and its consumption tank for business machine.
Spies Terrence R. (Redmond WA) Spelman Jeffrey F. (Duvall WA) Simon Daniel R. (Redmond WA), Cryptography system and method for providing cryptographic services for a computer application.
Cohen Joshua L. ; Dean Cecil A. ; du Breuil Thomas L. ; Heer Daniel Nelson ; Maher David P. ; Poteat Vance Eugene ; Rance Robert John, Electronic identifiers for network terminal devices.
Suzuki Makoto,JPX ; Suzuki Takaaki,JPX, Image output device having function for judging installation of genuine cartridge and method for determining authenticit.
Shinada, Satoshi; Naka, Takahiro; Torigoe, Yusuke; Togawa, Yuki; Orii, Satoru; Uwai, Hikonosuke; Kumagai, Toshio, Ink cartridge, ink jet type printing apparatus using the same, and ink cartridge change control method in the apparatus.
Applegate Steven Lewis ; Clarke Cyrus Bradford ; Craig Timothy Philip ; Merrifield David Lee ; Molloy James John ; Newman Benjamin Keith ; Overall Gary Scott ; Ream Gregrory Lawrence ; Survant Thomas, Method and apparatus for storing data in a non-volatile memory circuit mounted on a printer's process cartridge.
Atalla Martin M. (Atherton CA) Hopkins W. Dale (Charlotte NC), Method and means for combining and managing personal verification and message authentication encrytions for network tran.
Sandstrom Brent B. (942 Copperkey Ct. Gilbert AZ 85233) Ewert Ernest R. (261 W. Verano Pl. Gilbert AZ 85233) Reisch Robert D. (2036 E. Clipper Cir. Gilbert AZ 85234), Method for securely storing electronic records.
Gilliland W. Keith (Webster NY) Midgley Christian G. (Fairport NY) Dana Francis W. (Ontario NY) Mutch Mark C. (University Heights OH), Monitor/warranty system for electrostatographic reproducing machines using replaceable cartridges.
Hoffmann Gerhard (Munchen DEX) Lukas Klaus (Ingolstadt DEX) Lechner Stephan (Munchen DEX) Steiner Ferdinand (Munchen DEX) Baumgartner Helmut (Munchen DEX) Lohmann Ekkehard (Bonn DEX) Leclerc Matthias, Process for detecting unauthorized introduction of any data transmitted by a transmitter to a receiver.
Ryan ; Jr. Frederick W. ; Sisson Robert W., System and method for mutual authentication and secure communications between a postage security device and a meter server.
Elliott, John C.; O'Connell, James A.; Ladouceur, Lawrence; Altman, William; Jarett, Keith, Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.