METHOD AND APPARATUS FOR ENCRYPTED AUTHENTICATION
First Claim
1. A method for encrypted authentication between a first device and a second device that transmit or receive a plurality of kinds of data, wherein the result of encrypted authentication performed on one kind of data is applied to the other kinds of data.
1 Assignment
0 Petitions
Accused Products
Abstract
A sink device including a first data processing unit and a second data processing unit authenticates the processing units, when turned on, to generate first authentication keys having the same data. When a data request is issued from the sink device to the source device, device authentication is made between the source device and the first data processing unit to generate second authentication keys having the same data. The source device encrypts an exchange key using the second authentication key, and sends the encrypted exchange key to the first data processing unit. The first data processing unit decrypts the encrypted exchange key using the second authentication key, encrypts the decrypted exchange key using the first authentication key, and sends the encrypted exchange key to the second data processing unit. The second data processing unit decrypts the encrypted exchange key using the first authentication key to obtain an exchange key.
13 Citations
15 Claims
- 1. A method for encrypted authentication between a first device and a second device that transmit or receive a plurality of kinds of data, wherein the result of encrypted authentication performed on one kind of data is applied to the other kinds of data.
-
8. An apparatus for encrypted authentication between a first device and a second device that transmit or receive data, the apparatus comprising:
-
an authentication-key generating section configured to authenticate the second device that transmits a plurality of kinds of data and the first device to generate authentication keys; and a processing section configured to apply the result of encrypted authentication in the processing of one kind of data using the authentication keys to the processing of the other kinds of data. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
Specification