Program update method and server
First Claim
Patent Images
1. A secure device including an LSI device and an external memory provided outside the LSI device, whereinthe LSI device comprises:
- an inherent key storage section configured to generate and store an inherent key unique to the LSI device;
an encryption section configured to generate inherent key-encrypted information by encrypting information received from outside of the LSI device using the inherent key;
an output section configured to output the inherent key-encrypted information to the external memory; and
a boot-up state selection section configured to select either one of a first boot-up state where a sequence of processes including an encrypting process using the inherent key are performed for boot-up and a second boot-up state where a sequence of processes including decrypting process using the inherent key are performed for boot-up,wherein the inherent key stored in the inherent key storage section becomes unchangeable after generated.
1 Assignment
0 Petitions
Accused Products
Abstract
A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
56 Citations
11 Claims
-
1. A secure device including an LSI device and an external memory provided outside the LSI device, wherein
the LSI device comprises: -
an inherent key storage section configured to generate and store an inherent key unique to the LSI device; an encryption section configured to generate inherent key-encrypted information by encrypting information received from outside of the LSI device using the inherent key; an output section configured to output the inherent key-encrypted information to the external memory; and a boot-up state selection section configured to select either one of a first boot-up state where a sequence of processes including an encrypting process using the inherent key are performed for boot-up and a second boot-up state where a sequence of processes including decrypting process using the inherent key are performed for boot-up, wherein the inherent key stored in the inherent key storage section becomes unchangeable after generated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An LSI device, comprising:
-
an inherent key storage section configured to generate and store an inherent key unique to the LSI device; an encryption section configured to generate inherent key-encrypted information which is information encrypted using the inherent key; an output section configured to output the inherent key-encrypted information to an external memory which is provided outside the LSI device; and a boot-up state selection section configured to select either one of a first boot-up state where a sequence of processes including an encrypting process using the inherent key are performed for boot-up and a second boot-up state where a sequence of processes including decrypting process using the inherent key are performed for boot-up, wherein the inherent key stored in the inherent key storage section becomes unchangeable after generated.
-
-
11. An encryption method in a secure device including an LSI device and an external memory provided outside the LSI device, comprising the steps of:
-
generating, by the LSI device, an inherent key unique to the LSI device and storing the inherent key in an inherent key storage medium; generating inherent key-encrypted information by encrypting information received from outside of the LSI device using the inherent key; outputting the inherent key-encrypted information to the external memory; and selecting either one of a first boot-up state where a sequence of processes including an encrypting process using the inherent key are performed for boot-up and a second boot-up state where a sequence of processes including decrypting process using the inherent key are performed for boot-up, wherein the inherent key stored in the inherent key storage medium becomes unchangeable after generated.
-
Specification