Authenticator, authenticatee and authentication method
First Claim
1. A host device capable of performing an authentication process with a memory device which includes card key data hidden in the memory device and unique to the memory device, the host device comprising:
- a decryptor;
a selector;
a hardware processor; and
a comparator,wherein the host device is configured to;
receive first data from the memory device;
generate, second data by the decryptor decrypting the received first data using third key data hidden in the host device;
receive key index data from the memory device;
select, by the selector, first key data based on the received key index data, the first key data pre-stored and hidden in the host device, wherein the first key data is derived from the card key data and the card key data is capable of being generated from the first key data, and wherein the third key data is independent of the card key data and the card key data is incapable of being generated from the third key data;
transmit first information data and random number data to the memory device, the first information data pre-stored in the host device;
generate, by the processor, second key data based on the selected first key data and the random number data;
generate, by the processor, third data based on the generated second key data and the second data;
receive fourth data from the memory device; and
compare, by the comparator, the generated third data with received fourth data.
4 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, an authenticator which authenticates an authenticatee, which stores first key information (NKey) that is hidden, includes a memory configured to store second key information (HKey) which is hidden, a random number generation module configured to generate random number information, and a data generation module configured to generate a session key (SKey) by using the second key information (HKey) and the random number information. The authenticator is configured such that the second key information (HKey) is generated from the first key information (NKey) but the first key information (NKey) is not generated from the second key information (HKey).
128 Citations
10 Claims
-
1. A host device capable of performing an authentication process with a memory device which includes card key data hidden in the memory device and unique to the memory device, the host device comprising:
-
a decryptor; a selector; a hardware processor; and a comparator, wherein the host device is configured to; receive first data from the memory device; generate, second data by the decryptor decrypting the received first data using third key data hidden in the host device; receive key index data from the memory device; select, by the selector, first key data based on the received key index data, the first key data pre-stored and hidden in the host device, wherein the first key data is derived from the card key data and the card key data is capable of being generated from the first key data, and wherein the third key data is independent of the card key data and the card key data is incapable of being generated from the third key data; transmit first information data and random number data to the memory device, the first information data pre-stored in the host device; generate, by the processor, second key data based on the selected first key data and the random number data; generate, by the processor, third data based on the generated second key data and the second data; receive fourth data from the memory device; and compare, by the comparator, the generated third data with received fourth data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A host device capable of performing an authentication process with a memory device which includes card key data hidden in the memory device and unique to the memory device, the host device comprising:
-
a decryptor; a selector; and a hardware processor, wherein the host device is configured to; receive first data from the memory device; generate second data by the decryptor decrypting the received first data using third key data hidden in the host device; select, by the selector, first key data based on key index data, the first key data pre-stored and hidden in the host device, wherein the first key data is derived from the card key data and the card key data is capable of being generated from the first key data, and wherein the third key data is independent of the card key data and the card key data is incapable of being generated from the third key data; transmit first information data and random number data to the memory device, the first information data pre-stored in the host device; and generate second key data by the processor executing an AES (Advanced Encryption Standard) encryption process based on the selected first key data and the random number data. - View Dependent Claims (7, 8, 9, 10)
-
Specification