Process for the control of secret keys between two smart cards
First Claim
1. A process for controlling communication between a first and a second smart card using key-based cryptography, in which a first identify code is stored in the first smart card and a second identity code is stored in the second smart card, said process comprising the steps of:
- customizing said smart cards by;
writing into each of the smart cards an identical group cryptographic secret key, andwriting into each of the smart cards respective algorithms for processing the identical group cryptographic secret key and the first and second identity codes stored in said first and second smart cards, respectively; and
using said smart cards by;
transmitting the first identity code to the second smart card,transmitting the second identity code to the first smart card,calculating, by using said respective processing algorithms stored in said smart cards, first and second session keys for said first and second smart cards, respectively.
3 Assignments
0 Petitions
Accused Products
Abstract
A process for controlling communication between a first and a second smart card using key-based cryptography is provided. In the disclosed process, a first identity code is stored in the first smart card and a second identity code is stored in the second smart card. The smart cards are customized by writing into each of the smart cards an identical group secret key and respective algorithms for processing the identical group secret key and the first and second identity codes stored in the first and second smart cards, respectively. The smart cards are used by transmitting the first identity code to the second smart card, transmitting the second identity code to the first smart card, and calculating using the respective processing algorithms stored in the smart cards, first and second session keys for the first and second smart cards, respectively.
-
Citations
7 Claims
-
1. A process for controlling communication between a first and a second smart card using key-based cryptography, in which a first identify code is stored in the first smart card and a second identity code is stored in the second smart card, said process comprising the steps of:
-
customizing said smart cards by; writing into each of the smart cards an identical group cryptographic secret key, and writing into each of the smart cards respective algorithms for processing the identical group cryptographic secret key and the first and second identity codes stored in said first and second smart cards, respectively; and using said smart cards by; transmitting the first identity code to the second smart card, transmitting the second identity code to the first smart card, calculating, by using said respective processing algorithms stored in said smart cards, first and second session keys for said first and second smart cards, respectively. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification