×

Method for issuing IC card storing encryption key information

  • US 8,099,771 B2
  • Filed: 05/19/2011
  • Issued: 01/17/2012
  • Est. Priority Date: 05/06/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for executing an encryption/decryption process using IC cards issued to specific individuals belonging to specific groups, respectively, said IC cards having a CPU, a memory and an I/O unit performing transaction of information with respect to the exterior and having stored in the memory, a key information generating program, which, by performing a calculation process based on a predetermined algorithm using at least two pieces of data, generates encryption key information that is uniquely determined by the two pieces of data and an encryption/decryption program for carrying out a process for executing an encryption/decryption process using said encryption key information inside or outside the IC cards, said method comprising an issuing process and an encryption/decryption process:

  • said issuing process comprising,a step in which the CPU writes a secret group code, defined for a group to which an individual, to whom the IC card is to be issued, belongs, into the memory based on a write command provided from the exterior via the I/O unit,a step in which the CPU writes a first secret personal code and a second secret personal code, designated by an individual to whom the IC card is to be issued, into the memory based on a write command provided from the exterior via the I/O unit, anda step in which the CPU generates a first key table based on the first secret personal code and the secret group code, and a second key table based on the second secret personal code and the secret group code, by executing said key information generating program, and writes both of the key tables as encryption key information into the memory, andsaid encryption/decryption process comprising,a step in which the CPU generates an encryption key, used in encryption or decryption, based on a command provided from the exterior via the I/O unit, said encryption key is obtained by synthesizing a portion of the first key table and a portion of the second key table by executing said encryption/decryption program, anda step in which the CPU executes an encryption/decryption process using said encryption key or outputs said encryption key to the outside, by executing said encryption/decryption program.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×