IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0263017
(2005-11-01)
|
등록번호 |
US-7747538
(2010-07-19)
|
우선권정보 |
JP-11-226406(1999-08-10); JP-11-349336(1999-12-08) |
발명자
/ 주소 |
- Hatanaka, Masayuki
- Kamada, Jun
- Hatakeyama, Takahisa
- Hasebe, Takayuki
- Kotani, Seigou
- Furuta, Shigeki
- Anazawa, Takeaki
- Tonegawa, Tadaaki
- Hioki, Toshiaki
- Kanamori, Miwa
- Hori, Toshihiro
|
출원인 / 주소 |
- Fujitsu Limited
- Renesas Technology Corp.
- Sanyo Electric Co., Ltd.
|
대리인 / 주소 |
Westerman, Hattori, Daniels & Adrian, LLP
|
인용정보 |
피인용 횟수 :
2 인용 특허 :
4 |
초록
▼
A memory card 110 extracts a session key Ks from the data applied onto a data bus BS3 by carrying out a decryption process. An encryption processing unit 1406 encrypts a public encryption key KPcard(1) of memory card 110 based on session key Ks, and applies the encrypted key to a server via data bus
A memory card 110 extracts a session key Ks from the data applied onto a data bus BS3 by carrying out a decryption process. An encryption processing unit 1406 encrypts a public encryption key KPcard(1) of memory card 110 based on session key Ks, and applies the encrypted key to a server via data bus BS3. A memory 1412 receives from a server data such as license key Kc, license ID data License-ID and user ID data User-ID encrypted with a public encryption key KPcard(1) differing for each memory card for storage, and receives encrypted content data [Dc]Kc encrypted with license key Kc from data bus BS3 for storage.
대표청구항
▼
The invention claimed is: 1. A memory card to receive and record encrypted data and decryption information data to decrypt said encrypted data, comprising: a first storage unit storing said encrypted data, a first key hold unit storing a predetermined first public encryption key corresponding to sa
The invention claimed is: 1. A memory card to receive and record encrypted data and decryption information data to decrypt said encrypted data, comprising: a first storage unit storing said encrypted data, a first key hold unit storing a predetermined first public encryption key corresponding to said memory card and its own authentication data, said memory card being a first party, encrypted so as to be decryptable with a public authentication key, the encrypted predetermined first public encryption key and its own authentication data being stored in the first key hold unit allowing output to an external source, a second key hold unit storing a first private decryption key to decrypt data encrypted with the first public encryption key, a first decryption processing unit receiving a first symmetric key that is encrypted with the first public encryption key, and configured to apply a decryption process on the received first symmetric key, the received first symmetric key being updated and transmitted for each communication of said decryption information data, a third key hold unit to store a second public encryption key unique to each said memory card, a session key generation unit generating a second symmetric key updated for each communication of said decryption information data, a first encryption processing unit encrypting said second public encryption key and said second symmetric key based on said first symmetric key for output, a second decryption processing unit to decrypt using said second symmetric key said decryption information data encrypted by said second public encryption key at an external source, and further encrypted by the second symmetric key, a second storage unit storing said decryption information data encrypted with said second public encryption key that is an output of said second decryption processing unit, a fourth key hold unit storing a second private decryption key to decrypt data encrypted by said second public encryption key, a third decryption processing unit decrypting data stored in said second storage unit based on said second private decryption key to extract said decryption information data, a fifth key hold unit storing said public authentication key, a fourth decryption processing unit decrypting and extracting an externally applied third public encryption key of another party, said another party being a second party, encrypted so as to be decryptable with said public authentication key, and a second authentication data of another party, a control unit conducting an authentication process based on said second authentication data extracted by said fourth decryption processing unit, and inhibiting output of said decryption information data when the authenticity is not verified, a third encryption processing unit extracting a second symmetric key updated for each communication by said session key generation unit based on said third public encryption key for output, and a third encryption processing unit to apply encryption based on an externally applied unique fourth public encryption key of another party, wherein i) said second decryption processing unit is configured to decrypt and output said first symmetric key encrypted with the second symmetric key, or the fourth public encryption key and first symmetric key, ii) when said fourth public encryption key is extracted by said second decryption processing unit, said third decryption processing unit is configured to extract decryption information data from data recorded in said first storage unit, said third encryption processing unit encrypts an output of said third decryption processing unit using a fourth public encryption key output by said second decryption processing unit, and said first encryption processing unit encrypts an output of said third encryption processing unit based on the second symmetric key extracted by said second decryption processing unit for output, iii) when only said second symmetric key is extracted by said second decryption processing unit, said second decryption processing unit extracts decryption information data from data stored in said first storage unit, and said third encryption processing unit encrypts an output of said second decryption processing unit based on the second symmetric key extracted by said second decryption processing unit for output, in the case where there is an output request for decryption information data from an external source, and said control unit does not inhibit output of decryption information data. 2. The memory card according to claim 1, wherein said decryption information data further includes access control data to control output of said decryption information data from the memory card, said memory card further comprising a third storage unit storing said access control data extracted from said decryption information data encrypted with said second public encryption key by said third decryption processing unit, wherein said control unit inhibits output of decryption information data based on said access control data stored in said third storage unit. 3. The memory card according to claim 2, wherein a record space of said memory card is divided into a security region that cannot be read out and rewritten by a third party, a semi-security region that can be read out by a third party, data stored in said semi-security region subjected to encryption unique to the memory card, and a non-security region that can be read out and rewritten by a third party, said security region including said first key hold unit, said third key hold unit, and said third storage unit, said semi-security region including said second storage unit, and said non-security region including said first storage unit. 4. The memory card according to claim 3, wherein said semi-security region and said non-security region are arranged on the same memory. 5. A memory card to receive and record encrypted data and decryption information data to decrypt said encrypted data, comprising: a first storage unit storing said encrypted data, a first key hold unit storing a predetermined first public encryption key corresponding to said memory card and its own authentication data, said memory card being a first party, encrypted so as to be decryptable with a public authentication key, the encrypted predetermined first public encryption key and its own authentication data being stored in the first key hold unit allowing output to an external source, a second key hold unit storing a first private decryption key to decrypt data encrypted with the first public encryption key, a first decryption processing unit receiving a first symmetric key that is encrypted with the first public encryption key, and applying a decryption process on the received first symmetric key, the received first symmetric key being updated and transmitted for each communication of said decryption information data, a third key hold unit to store a second public encryption key unique to each said memory card, a session key generation unit generating a second symmetric key updated for each communication of said decryption information data, a first encryption processing unit encrypting said second public encryption key and said second symmetric key based on said first symmetric key for output, a second decryption processing unit to decrypt using said second symmetric key said decryption information data encrypted by said second public encryption key at an external source, and further encrypted by the second symmetric key, a fourth key hold unit storing a second private decryption key to decrypt data encrypted by said second public encryption key, a third decryption processing unit receiving decryption information data encrypted with said second public encryption key at an external source to decrypt said decryption information data using said second private decryption key, a second storage unit storing said decryption information data, a fifth key hold unit storing said public authentication key, a fourth decryption processing unit decrypting and extracting an externally applied third public encryption key of another party. said another party being a second party. encrypted so as to be decryptable with said public authentication key, and second authentication data of another party, a control unit conducting an authentication process based on said second authentication data extracted by said fourth decryption processing unit, and inhibiting output of said decryption information data when the authenticity is not verified, a third encryption processing unit encrypting a second symmetric key updated for each communication by said session key generation unit based on said third public encryption key for output, and a third encryption processing unit to apply encryption based on an externally applied unique fourth public encryption key of another party, wherein i) said second decryption processing unit further decrypts and extracts said first symmetric key encrypted with the second symmetric key at an external source, or the fourth public encryption key and first symmetric key, ii) when said fourth public encryption key is extracted by said second decryption processing unit, said third encryption processing unit encrypts decryption information recorded in said second storage unit using a fourth public encryption key extracted by said second decryption processing unit, and said first encryption processing unit encrypts an output of said third encryption processing unit based on the second symmetric key extracted by said second decryption processing unit for output, iii) when only said second symmetric key is extracted by said second decryption processing unit, said third encryption processing unit encrypts decryption information recorded in said second storage unit based on the second symmetric key extracted by said second decryption processing unit for output, in the case where there is an output request for decryption information data from an external source, and said control unit inhibits output of decryption information data. 6. The memory card according to claim 5, wherein said decryption information data further includes access control data to control output of said decryption information data from the memory card, wherein said control unit inhibits output of decryption information data based on said access control data stored in said second storage unit. 7. The memory card according to claim 6, wherein a record space of said memory card is divided into a security region that cannot be read out and rewritten by a third party, and a non-security region that can be read out and rewritten by a third party, said security region including said first key hold unit, said third key hold unit, and said second storage unit, said non-security region including said first storage unit. 8. A memory card to receive and record encrypted data and decryption information data to decrypt said encrypted data, comprising: a first key hold unit storing a predetermined first public encryption key corresponding to said memory card and its own authentication data, said memory card being a first party, encrypted so as to be decryptable by a public authentication key, the encrypted predetermined first public encryption key and its own authentication data being stored in the first key hold unit allowing output to an external source, a second key hold unit storing a first private decryption key to decrypt data encrypted by a first public encryption key, a first decryption processing unit receiving a first symmetric key that is encrypted with the first public encryption key, and applying a decryption process on the received first symmetric key, the received first symmetric key being updated and transmitted for each communication of said decryption information data, a third key hold unit to store a second public encryption key unique to each said memory card, a session key generation unit generating a second symmetric key updated for each communication of said encryption information data, a first encryption processing unit encrypting said second public encryption key and said second symmetric key based on said first symmetric key for output, a second decryption processing unit to decrypt using said second symmetric key said decryption information data encrypted with said second public encryption key at an external source and further encrypted with the second symmetric key, a fourth key hold unit storing a second private decryption key to decrypt data encrypted with said second public encryption key, a third decryption processing unit receiving decryption information data encrypted with said second public encryption key at an external source to decrypt said decryption information data using said second private decryption key, a storage unit storing said decryption information data, a fifth key hold unit storing said public authentication key, a fourth decryption processing unit decrypting and extracting an externally applied third public encryption key of another party, said another party being a second party, encrypted so as to be decryptable with said public authentication key, and second authentication data of another party, a control unit conducting an authentication process based on said second authentication data extracted by said fourth decryption processing unit, and inhibiting output of said decryption information data when the authenticity is not verified, a third encryption processing unit encrypting a second symmetric key updated for each communication by said session key generation unit based on said third public encryption key for output, and a third encryption processing unit to apply encryption based on an externally applied unique fourth public encryption key of another party, wherein i) said second decryption processing unit further decrypts and extracts said first symmetric key encrypted with the second symmetric key at an external source, or the fourth public encryption key and first symmetric key, ii) when said fourth public encryption key is extracted by said second decryption processing unit, said third decryption processing unit encrypts decryption information recorded in said storage unit using a fourth public encryption key extracted by said second decryption processing unit, and said first encryption processing unit encrypts an output of said third encryption processing unit based on the second symmetric key extracted by said second decryption processing unit for output, iii) when only said second symmetric key is extracted by said second decryption processing unit, said third encryption processing unit encrypts decryption information recorded in said storage unit based on the second symmetric key extracted by said second decryption processing unit for output, in the case where there is an output request for decryption information data from an external source, and said control unit inhibits output of decryption information data. 9. The memory card according to claim 8, wherein said decryption information data further includes access control data to control output of said decryption information data from the memory card, wherein said control unit inhibits output of decryption information data based on said access control data stored in said storage unit. 10. The memory card according to claim 9, wherein a record space of said memory card is divided into a security region that cannot be read out and rewritten by a third party, and a non-security region that can be read out and rewritten by a third party, said security region including said first key hold unit, said third key hold unit, and said storage unit.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.