COMMUNICATION CARD, CONFIDENTIAL INFORMATION PROCESSING SYSTEM, AND CONFIDENTIAL INFORMATION TRANSFER METHOD AND PROGRAM
First Claim
1. A communication card connectable to a host device, comprising:
- an interface unit operable to communicate with the host device;
a first communication unit operable to communicate with an external device other than the host device;
an encryption unit operable to perform encryption processing onto data transferred between the host device and the external device via said interface unit and said first communication unit;
a storage unit operable to store the following;
list information indicating a list of identifiers of unauthorized communication cards; and
communication key information used for performing encryption processing onto the data; and
a control unit operable to;
perform authentication processing between said communication card and the host device, and only when the authentication processing has been completed normally, allow the host device to control said first communication unit, cause said encryption unit to encrypt the data by using the communication key information after the authentication processing, and transfer the encrypted data to the host device via said interface unit, wherein the authentication processing includes processing of revoking, by using the list information, an unexpected unauthorized communication card.
2 Assignments
0 Petitions
Accused Products
Abstract
A communication card comprised of: an interface unit which communicates with the host; a first communication unit which communicates with an external device other than the host; an encryption unit which performs encryption processing onto data transferred between the host device and the external device via the interface unit and the first communication unit; a storage unit which stores: list information indicating a list of identifiers of unauthorized communication cards; and communication key information used for encryption; and a control unit which performs authentication processing, and only when the authentication processing has been completed normally, allows the host to control the first communication unit, causes said encryption unit to encrypt the data by using the communication key information after the authentication processing, and transfers the encrypted data to the host via the interface unit, in which the authentication processing includes processing of revoking an unauthorized communication card by using the list information.
63 Citations
25 Claims
-
1. A communication card connectable to a host device, comprising:
-
an interface unit operable to communicate with the host device;
a first communication unit operable to communicate with an external device other than the host device;
an encryption unit operable to perform encryption processing onto data transferred between the host device and the external device via said interface unit and said first communication unit;
a storage unit operable to store the following;
list information indicating a list of identifiers of unauthorized communication cards; and
communication key information used for performing encryption processing onto the data; and
a control unit operable to;
perform authentication processing between said communication card and the host device, and only when the authentication processing has been completed normally, allow the host device to control said first communication unit, cause said encryption unit to encrypt the data by using the communication key information after the authentication processing, and transfer the encrypted data to the host device via said interface unit, wherein the authentication processing includes processing of revoking, by using the list information, an unexpected unauthorized communication card. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A confidential information processing system comprising a host device and a communication card connectable to said host device,
said communication card including: -
an interface unit operable to communicate with said host device, a first communication unit operable to communicate with an external device other than said host device, an encryption unit operable to perform encryption processing onto data transferred between said host device and the external device via said interface unit and said first communication unit, a storage unit operable to store the following;
list information indicating a list of identifiers of unauthorized communication cards;
and communication key information used for performing encryption processing onto the data, and a first control unit operable to control said communication card, said host device including;
a card slot operable to connect with said communication card, and a second control unit operable to control said host device, wherein said host device and said communication card perform authentication processing between said communication card and said host device, and only when the authentication processing has been completed normally, said first control unit is operable to;
allow said host device to control said first communication unit;
cause said encryption unit to encrypt the data by using the communication key information after the authentication processing, and transfer the encrypted data to said host device via said interface unit, and wherein the authentication processing includes processing of revoking, by using the list information, an unexpected unauthorized communication card. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A confidential information transfer method used in a communication card including:
- an interface unit which communicates with a host device;
a first communication unit which communicates with an external device other than the host device;
an encryption unit which performs encryption processing onto data transferred between the host device and the external device via the interface unit and the first communication unit; and
a memory unit which stores list information indicating a list of unauthorized communication cards and communication key information used for performing encryption processing onto the data, said method comprising;
performing, between the communication card and the host device, authentication processing that includes processing of revoking, by using the list information, an unexpected unauthorized communication card;
allowing the host device to control the first communication unit only when the authentication processing has been completed normally; and
causing the encryption unit to encrypt the data by using the communication key information after the authentication processing, and transferring the encrypted data to the host device via the interface unit.
- an interface unit which communicates with a host device;
Specification