Method and apparatus for cryptographic processing
First Claim
1. A non-transitory computer-readable storage medium storing a computer program that causes a computer having a memory and a processor, to perform a process comprising:
- acquiring, by the processor, a first key and a second key different from the first key, from the memory;
generating, by the processor, first encrypted data by making a logical calculation between data for authentication and the first key, and generating second encrypted data by making the logical calculation between the first encrypted data and the second key;
transmitting, by the processor, the second encrypted data to a calculation apparatus which manages third encrypted data as registered data, the third encrypted data being generated by making the logical calculation between the first encrypted data and a third key; and
transmitting, by the processor, the second key to a determination apparatus which maintains the third key, generates encrypted key data by making the logical calculation between a key received from the computer and the third key, and transmits the encrypted key data to the calculation apparatus;
receiving, by the processor, an authentication result from the determination apparatus, wherein the authentication result is based on the data for authentication;
wherein the third encrypted data are equal to data generated by making the logical calculation between the second encrypted data and the encrypted key data.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic processing apparatus that holds a first key, and receives authentication object data upon authentication includes a communication unit and a computing unit. The communication unit communicates with a calculation apparatus and a determination apparatus. In the calculation apparatus, encrypted registration data obtained by encrypting registration data twice, once with the first key and once with a second key, is registered. The registration data is data against which the authentication object data is verified. The determination apparatus uses the second key upon the authentication. When registering the encrypted registration data in the calculation apparatus, the computing unit generates a key different from the first key, generates encrypted data by encrypting the registration data twice, once with the first key and once with the different key, transmits the different key to the determination apparatus, and the encrypted data to the calculation apparatus, through the communication unit.
14 Citations
7 Claims
-
1. A non-transitory computer-readable storage medium storing a computer program that causes a computer having a memory and a processor, to perform a process comprising:
-
acquiring, by the processor, a first key and a second key different from the first key, from the memory; generating, by the processor, first encrypted data by making a logical calculation between data for authentication and the first key, and generating second encrypted data by making the logical calculation between the first encrypted data and the second key; transmitting, by the processor, the second encrypted data to a calculation apparatus which manages third encrypted data as registered data, the third encrypted data being generated by making the logical calculation between the first encrypted data and a third key; and transmitting, by the processor, the second key to a determination apparatus which maintains the third key, generates encrypted key data by making the logical calculation between a key received from the computer and the third key, and transmits the encrypted key data to the calculation apparatus; receiving, by the processor, an authentication result from the determination apparatus, wherein the authentication result is based on the data for authentication; wherein the third encrypted data are equal to data generated by making the logical calculation between the second encrypted data and the encrypted key data. - View Dependent Claims (2, 3)
-
-
4. A cryptographic processing method executed by a computer having a memory and a processor, the cryptographic processing method comprising:
-
acquiring, by the processor, a first key and a second key different from the first key, from the memory; generating, by the processor, first encrypted data by making a logical calculation between data for authentication and the first key, and generating second encrypted data by making the logical calculation between the first encrypted data and the second key; transmitting, by the processor, the second encrypted data to a calculation apparatus which manages third encrypted data as registered data, the third encrypted data being generated by making the logical calculation between the first encrypted data and a third key; and transmitting, by the processor, the second key to a determination apparatus which maintains the third key, generates encrypted key data by making the logical calculation between a key received from the computer and the third key, and transmits the encrypted key data to the calculation apparatus; receiving an authentication result from the determination apparatus, wherein the authentication result is based on the data for authentication; wherein the third encrypted data are equal to data generated by making the logical calculation between the second encrypted data and the encrypted key data.
-
-
5. A cryptographic processing apparatus comprising:
-
a memory configured to store a first key and a second key different from the first key; and a processor configured to perform a process including; generating first encrypted data by making a logical calculation between data for authentication and the first key, and generating second encrypted data by making the logical calculation between the first encrypted data and the second key; transmitting the second encrypted data to a calculation apparatus which manages third encrypted data as registered data, the third encrypted data being generated by making the logical calculation between the first encrypted data and a third key; and transmitting the second key to a determination apparatus which maintains the third key, generates encrypted key data by making the logical calculation between a key received from the cryptographic processing apparatus and the third key, and transmits the encrypted key data to the calculation apparatus; receiving an authentication result from the determination apparatus, wherein the authentication result is based on the data for authentication; wherein the third encrypted data are equal to data generated by making the logical calculation between the second encrypted data and the encrypted key data. - View Dependent Claims (6, 7)
-
Specification