×

Authentication method performed between IC card and terminal unit and system therefor

  • US 5,355,413 A
  • Filed: 03/01/1993
  • Issued: 10/11/1994
  • Est. Priority Date: 03/06/1992
  • Status: Expired due to Term
First Claim
Patent Images

1. An authentication method for authentication between an IC card and a terminal unit in which both said IC card and said terminal unit include a plurality of authentication codes, each code having a corresponding time data item, encryption means for encrypting data according to a predetermined algorithm, and timer means, one of said IC card and said terminal unit, including means for generating random numbers and comparison means, said authentication method comprising:

  • generating a random number in a first device selected from an IC card and a terminal unit and transmitting the generated random number to a second device that is the other of said IC card and said terminal unit;

    a first encryption step of encrypting the received random number in the second device according to an algorithm using one of a plurality of authentication codes as a key to generate authentication data;

    transmitting the encrypted authentication data to the first device from the second device when a time represented by time data corresponding to the authentication code used has elapsed after transmission of a predetermined signal;

    a second encryption step of counting, in the first device, a time interval from transmission of a predetermined signal to reception of the authentication data from the second device and of encrypting the random number according to the algorithm using, as a key, the authentication code corresponding to the time data which coincides with the time interval counted in the second device to generate authentication data; and

    comparing in the first device the authentication data generated in said second encryption step with the authentication data transmitted from the second device and transmitting a result signal indicating coincidence or non-coincidence of the two authentication data to the second device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×