Device authentication system
First Claim
1. A device authentication system in which a first device authenticates a second device, wherein the first device comprises:
- a transmission/reception section that transmits and receives information to/from the second device;
a first information holding section that holds first authentication information in a secure area; and
a decider that makes a decision on authentication, the second device comprises;
a transmission/reception section that transmits and receives information to/from the first device;
a second information holding section that holds second authentication information;
an information acquirer that acquires third authentication information from outside of the second device; and
an authentication information generator which generates fourth authentication information from the second authentication information and the third authentication information, and outputs the fourth authentication information to the first device through the transmission/reception section, and the decider makes a decision on conformity between the first authentication information and the fourth authentication information to authenticate the second device.
1 Assignment
0 Petitions
Accused Products
Abstract
A device authentication system that enables secure and reliable authentication of an entity that is a device without a secure area. In the system, memory device 10 authenticates cellular phone 20. In the system, memory device 10 holds key 12 in a secure area, cellular phone holds serial number 21 and generates a key from the serial number and identification information provided from a user, and memory device 10 makes a decision on conformity between key 12 held therein and the key generated in cellular phone 20 to authenticate cellular phone 20. In the authenticate processing, it is possible to limit the use of data stored in memory device 10 only to specific cellular phones.
74 Citations
20 Claims
-
1. A device authentication system in which a first device authenticates a second device,
wherein the first device comprises: -
a transmission/reception section that transmits and receives information to/from the second device;
a first information holding section that holds first authentication information in a secure area; and
a decider that makes a decision on authentication, the second device comprises;
a transmission/reception section that transmits and receives information to/from the first device;
a second information holding section that holds second authentication information;
an information acquirer that acquires third authentication information from outside of the second device; and
an authentication information generator which generates fourth authentication information from the second authentication information and the third authentication information, and outputs the fourth authentication information to the first device through the transmission/reception section, and the decider makes a decision on conformity between the first authentication information and the fourth authentication information to authenticate the second device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device authentication method in which a first device authenticates a second device,
wherein the first device holds first authentication information in a secure area, the second device that holds second authentication information generates fourth authentication information form the second authentication information and third authentication information provided from outside of the second device, and the first device makes a decision on conformity between the first authentication information and the fourth authentication information to authenticate the second device.
-
8. A second device to be authenticated by a first device, comprising:
-
a transmission/reception section that transmits and receives information to/from the first device;
an information holding section that holds second authentication information;
an information acquirer that acquires third authentication information from outside of the second device; and
an authentication information generator which generates fourth authentication information from the second authentication information and the third authentication information, and outputs the fourth authentication information to the first device through the transmission/reception section. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A first device that authenticates a second device, comprising:
-
a transmission/reception section that transmits and receives information to/from the second device;
an information holding section that holds first authentication information in a secure area; and
a decider that makes a decision on conformity between the fourth authentication information received in the transmission/reception section and the first authentication information. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A program for having a computer, which is integrated into a second device to be authenticated by a first device, execute the procedures of:
-
generating fourth authentication information from second authentication information that the second device holds and third authentication information acquired from outside of the second device;
requesting an issue of random information to the first device; and
encrypting the random information received from the first device using the fourth authentication information to output to the first device.
-
Specification