METHOD FOR ISSUING IC CARD STORING ENCRYPTION KEY INFORMATION
0 Assignments
0 Petitions
Accused Products
Abstract
It is possible to issue an. IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff α inputs a unique personal code P(α) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(α) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(α) in the IC card. Even if the company staff α loses the IC card, it is possible to obtain the IC card having the same encryption key information K(α) as before by performing initialization again by using the IC card delivered by the IC card provider X.
-
Citations
14 Claims
-
1-10. -10. (canceled)
-
11. A method for executing an encryption/decryption process using IC cards issued to specific individuals belonging to specific groups, respectively, said IC cards having a CPU, a memory and an I/O unit performing transaction of information with respect to the exterior and having stored in the memory, a key information generating program, which, by performing a calculation process based on a predetermined algorithm using at least two pieces of data, generates encryption key information that is uniquely determined by the two pieces of data and an encryption/decryption program for carrying out a process for executing an encryption/decryption process using said encryption key information inside or outside the IC cards, said method comprising an issuing process and an encryption/decryption process:
-
said issuing process comprising, a step in which the CPU writes a secret group code, defined for a group to which an individual, to whom the IC card is to be issued, belongs, into the memory based on a write command provided from the exterior via the I/O unit, a step in which the CPU writes a first secret personal code and a second secret personal code, designated by an individual to whom the IC card is to be issued, into the memory based on a write command provided from the exterior via the I/O unit, and a step in which the CPU generates a first key table based on the first secret personal code and the secret group code, and a second key table based on the second secret personal code and the secret group code, by executing said key information generating program, and writes both of the key tables as encryption key information into the memory, and said encryption/decryption process comprising, a step in which the CPU generates an encryption key, used in encryption or decryption, based on a command provided from the exterior via the I/O unit, said encryption key is obtained by synthesizing a portion of the first key table and a portion of the second key table by executing said encryption/decryption program, and a step in which the CPU executes an encryption/decryption process using said encryption key or outputs said encryption key to the outside, by executing said encryption/decryption program.
-
-
13. An IC card, used for executing an encryption process or a decryption process using unique encryption key information, the IC card comprising:
-
a CPU, a memory, and an I/O unit performing transaction of information with respect to the exterior; there being stored in the memory, a program for performing a process of storing encryption key information generating data, provided from the exterior, into a first storage location, a second storage location and a third storage location, respectively, inside the memory, a program for generating a first key table by performing a calculation process based on a predetermined algorithm using a first data stored in the first storage location and a second data stored in the second storage location, said first key table being uniquely determined according to the first data and the second data, and storing said first key table in the memory as encryption key information, a program for generating a second key table by performing a calculation process based on a predetermined algorithm using a first data stored in the first storage location and a third data stored in the third storage location, said second key table being uniquely determined according to the first data and the third data, and storing said second key table in the memory as encryption key information, a program for generating an encryption key, used in encryption or decryption, by synthesizing a portion of the first key table and a portion of the second key table, and a program for executing the encryption process or the decryption process inside the IC card using said encryption key.
-
-
14. An IC card, used for executing an encryption process or a decryption process using unique encryption key information, the IC card comprising:
-
a CPU, a memory, and an I/O unit performing transaction of information with respect to the exterior; there being stored in the memory, a program for performing a process of storing encryption key information generating data, provided from the exterior, into a first storage location, a second storage location and a third storage location, respectively, inside the memory, a program for generating a first key table by performing a calculation process based on a predetermined algorithm using a first data stored in the first storage location and a second data stored in the second storage location, said first key table being uniquely determined according to the first data and the second data, and storing said first key table in the memory as encryption key information, a program for generating a second key table by performing a calculation process based on a predetermined algorithm using a first data stored in the first storage location and a third data stored in the third storage location, said second key table being uniquely determined according to the first data and the third data, and storing said second key table in the memory as encryption key information, a program for generating an encryption key, used in encryption or decryption, by synthesizing a portion of the first key table and a portion of the second key table, and a program for reading out said encryption key for execution of the encryption process or the decryption process outside the IC card.
-
Specification