SECURE DEVICE, INFORMATION PROCESSING TERMINAL, SERVER, AND AUTHENTICATION METHOD
First Claim
1. A secure device that is mounted in an information processing terminal, stores data and executes a calculation in a concealed manner, the secure device comprising:
- a storage section that stores an application that allows the information processing terminal to perform processing;
a instruction document execution section that embeds, in the application, authentication information used to calculate an authentication key required in authentication processing between the application and the secure device;
a calculation complication section that creates a calculation problem, with a calculation result selected in advance for an answer, and embeds the calculation problem in the application as part of an authentication information calculation;
an authentication information calculation section that calculates the authentication information and the calculation result, and generates the authentication key; and
an authentication processing section that performs authentication processing with the application executed by the information processing terminal, using the authentication key.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure device can make contents of terminal application authentication information calculation a different complicated calculation process at each time while suppressing the processing load in the secure device and a card application code size to low values. When issuing of a terminal application (302) is requested from an application loader (301) to an application management unit (1011), an instruction content execution unit (1012) embeds authentication information used for calculation of an authentication key required for authentication with an application causing an information processing terminal (30) to perform a process, into the terminal application (302). A calculation complicating unit (1013) creates a calculation problem having a calculation result as an answer and embeds it as a part of the authentication information calculation into the terminal application (302). An authentication information calculation unit (1014) calculates authentication information with the calculation result to create an authentication key. An authentication processing unit (1032) performs authentication of the terminal application (302) by the authentication key. This does not complicate the calculation process while making the authentication information calculation of the terminal application (302) a different complicated calculation at each time.
6 Citations
17 Claims
-
1. A secure device that is mounted in an information processing terminal, stores data and executes a calculation in a concealed manner, the secure device comprising:
-
a storage section that stores an application that allows the information processing terminal to perform processing; a instruction document execution section that embeds, in the application, authentication information used to calculate an authentication key required in authentication processing between the application and the secure device; a calculation complication section that creates a calculation problem, with a calculation result selected in advance for an answer, and embeds the calculation problem in the application as part of an authentication information calculation; an authentication information calculation section that calculates the authentication information and the calculation result, and generates the authentication key; and an authentication processing section that performs authentication processing with the application executed by the information processing terminal, using the authentication key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An information processing terminal comprising a secure device that stores data and executes a calculation in a concealed manner, and an application loader that requests an issue of an application and receives and starts an application including a complicated calculation from the secure device, wherein the secure device comprises:
-
a storage section that stores an application that allows the information processing terminal to perform processing; a instruction document execution section that embeds, in the application, authentication information used to calculate an authentication key required in authentication processing between the application and the secure device; a calculation complication section that creates a calculation problem, with a calculation result selected in advance for an answer, and embeds the calculation problem in the application as part of an authentication information calculation; an authentication information calculation section that calculates the authentication information and the calculation result, and generates the authentication key; and an authentication processing section that performs authentication processing with the application executed by the information processing terminal, using the authentication key. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A server transmitting an application that allows an information processing terminal to perform processing, to the information processing terminal, the server comprising:
-
a storage section that stores the application; a instruction document execution section that embeds, in the application, authentication information used to calculate an authentication key required in authentication processing between the application and the secure device; a calculation complication section that creates a calculation problem, with a calculation result selected in advance for an answer, and embeds the calculation problem in the application as part of an authentication information calculation; an authentication information calculation section that calculates the authentication information and the calculation result, and generates the authentication key; and an authentication processing section that performs authentication processing with the application executed by the information processing terminal, using the authentication key. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. An authentication method comprising the steps of:
-
selecting authentication information used to calculate an authentication key that is required in authentication processing with an application for allowing the information processing terminal to perform processing, and a calculation result; creating a calculation problem whose answer is the selected calculation result; embedding the selected authentication information in the application, and embedding the created calculation problem in the application as part of an authentication information calculation; transmitting the application, in which the authentication information and the calculation problem are embedded, to the information processing terminal; and performing authentication processing with the application executed by the information processing terminal using the authentication key which is created by calculating the authentication information embedded in the application transmitted to the information processing terminal and the calculation result.
-
Specification