Semiconductor memory device
First Claim
1. A host device which can execute an authentication process with a memory device provided with a first area where read is restricted and readable second area and third area, whereinthe host device has first key data recorded as a set and is configured to:
- read encrypted secret data stored in the second area;
decrypt the encrypted secret data with family key data obtained based on family key block data read from the third area;
read key index data stored in the second area and select, from the set, the first key data corresponding to the key index data;
generate session key data by executing an AES (Advanced Encryption Standard) encryption process with number data and the selected first key data;
execute a conversion process using a one-way function with, as input values, the session key data and secret data generated by decrypting the encrypted secret data to thereby generate verification data; and
execute a conversion process using a one-way function with the secret data as an input value to thereby generate EMID.
5 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, a device includes a first memory area to store a first key. A second memory area stores encrypted secret identification (ID) information generated from secret ID information with a family key. A third memory area stores a family key block including data generated from the family key with an ID key. An authentication module performs authentication. A second key is generated from a first number with the first key, a session key is generated from a random number with the second key, and authentication information is generated from the secret ID information with the session key. The encrypted secret ID information, family key block and the authentication information is output.
57 Citations
16 Claims
-
1. A host device which can execute an authentication process with a memory device provided with a first area where read is restricted and readable second area and third area, wherein
the host device has first key data recorded as a set and is configured to: -
read encrypted secret data stored in the second area; decrypt the encrypted secret data with family key data obtained based on family key block data read from the third area; read key index data stored in the second area and select, from the set, the first key data corresponding to the key index data; generate session key data by executing an AES (Advanced Encryption Standard) encryption process with number data and the selected first key data; execute a conversion process using a one-way function with, as input values, the session key data and secret data generated by decrypting the encrypted secret data to thereby generate verification data; and execute a conversion process using a one-way function with the secret data as an input value to thereby generate EMID. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device which can execute an authentication process with an external device which has secret information stored in an unreadable manner, and encrypted secret information, family key block information and index information stored in a readable manner, wherein
the device has first key information recorded as a set and is configured to: -
read the encrypted secret information, the family key block information, and the index information from the external device; decrypt the encrypted secret information with family key information obtained based on the family key block information; select, from the set, the first key information corresponding to the index information; generate session key information with number information and the selected first key information; execute a conversion process using a one-way function with, as input values, the session key information and new secret information generated by decrypting the encrypted secret information to thereby generate verification information; and execute a conversion process using a one-way function with the new secret information as an input value to thereby generate identification information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system host device, which executes an authentication process with an external memory device, having first key information and secret information stored in an unreadable manner, and encrypted secret information, family key block information and index information stored in a readable manner, wherein
the external memory is configured to: -
generate second key information with the first key information; generate third key information with the second key information; and generate authentication information with the third key information and the secret information; and the host device has fourth key information recorded as a set and is configured to; read the encrypted secret information, the family key block information, and the index information from the memory device; decrypt the encrypted secret information with family key information obtained based on the family key block information; select, from the set, the fourth key information corresponding to the index information; generate fifth key information with number information and the selected fourth key information; execute a conversion process using a one-way function with, as input values, the fifth key information and new secret information generated by decrypting the encrypted secret information to thereby generate verification information; and execute a conversion process using a one-way function with the new secret information as an input value to thereby generate identification information.
-
-
16. A memory device which executes an authentication process with an external host device, wherein
the memory card has first key information and secret information stored in an unreadable manner in a first area, and encrypted secret information, family key block information and index information stored in a readable manner, and is configured to: -
generate second key information by executing an encryption process with the first key information; generate third key information by executing an encryption process with the second key information; and generate authentication information used for an authentication with the host device with the third key information and the secret information read from the first area; and the external host device has fourth key information and is configured to; decrypt the encrypted secret information with family key information obtained based on the family key block information; generate fifth key information with and the fourth key information; and generate identification information with the fifth key information.
-
Specification