Method for issuing ic card storing encryption key information
It is possible to issue an IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an IC card having a group code G(A) to a company A and an IC card having a group code G(B) to a company B. When a company staff α inputs a unique personal code P(α) and performs initialization, in the IC card, calculation is performed according to a predetermined algorithm using the P(α) and G(A). Data uniquely determined by the calculation is stored as encryption key information K(α) in the IC card. Even if the company staff α loses the IC card, it is possible to obtain the IC card having the same encryption key information K(α) as before by performing initialization again by using the IC card delivered by the IC card provider X.
The present invention relates to a method for issuing IC cards storing encryption key information, and particularly relates to a method for respectively issuing a plurality of IC cards, each storing unique encryption key information, to specific individuals belonging to specific groups.
BACKGROUND ARTIC cards are used in various applications as portable information recording media of extremely high confidentiality and recently many companies distribute multifunctional IC cards, serving as company staff ID cards at the same time, to their respective company staff. There are also many examples, where such confidentiality is noted and an IC card is used as a storage medium for storing key data which is used to encrypt and decrypt information. Often in a general encryption method, a secret encryption key or encryption key table (here, these shall be referred to collectively as “encryption key information”) is used as a seed in an encryption algorithm. In an encryption process of converting predetermined plaintext data into encrypted text data, a process using this secret encryption key information is executed. In this case, the secret encryption key information used in the encryption process becomes an essential element for a decryption process of restoring the encrypted text data to plaintext data. That is, the decryption cannot be performed as long as the secret encryption key information is not provided. Thus by storing this secret encryption key information in an IC card, access of the encryption key by an illicit means is made extremely difficult and security of the encrypted text itself can be improved.
In general, decryption of encrypted text should be permitted only to a person permitted by the person who carried out the encryption, and the encryption key information must be unique data that differs for each individual. Thus in an multifunctional IC card that serves in common as a company staff ID card, a unique encryption key information is determined for each company staff, and in the process of issuing the IC cards, a process of storing this unique encryption key information in each IC card is performed. The IC cards issued to the respective company staff are thus put in a state of storing unique encryption key information that differ from each other. Because as mentioned above, the encryption key information is a secret key code used by a processor in an encryption process and a decryption process, it is data that even the company staff who owns the IC card does not normally need to know and is maintained as secret data inside the IC card.
In issuing such IC cards storing encryption key information, an issuing process that takes security into adequate consideration is required to prevent leakage of the encryption key information. Thus a method has been proposed in which, when an IC card is issued, encryption key information itself is sent into the IC card in an encrypted state and is decrypted and stored inside the IC card.
As mentioned above, the encryption key information stored inside an IC card should essentially be handled as secret data that not even the person who owns the IC card knows and is ideally data that exists only inside the IC card and is preferably data that nobody can know of. For example, by making a code, generated randomly using random numbers inside the IC card, be stored as it is as encryption key information inside an IC card, information that nobody can know of is stored as the encryption key information in just the IC card.
However for practical use, such an ideal method cannot be employed since there is a need to leave open a way of reissuing an IC card. As mentioned already, in order to perform a process of decrypting encrypted data using specific encryption key information, the same encryption key information as that used for encryption is necessary. Thus when an IC card is lost or the IC card is damaged by any chance, unless an IC card storing the same encryption key information can be reissued, data that had been encrypted in the past can never be decrypted again. Thus for practical use, a method is often employed in which the same information as the encryption key information stored inside the IC card is stored somewhere externally to enable reissuing of an IC card, and when reissuing must be performed, the externally stored encrypted key information is written into a new IC card.
Such a method of storing encryption key information outside of an IC card does not present a problem under the premise that the storage is implemented under strict management by a trustworthy manager. However, in terms of practical use, problems of not being able to ensure sufficient security arise. Normally when a company distributes IC cards that function as company staff ID cards to respective company staff, the company generally requests an IC card provider (such as a major printing company) to perform the IC card procurement and issuing tasks. In this case, the management of the encryption key information of each individual company staff must be entrusted to the IC card provider. Even if the task of storing encryption key information for reissuing is to be performed in the company itself, as long as at least the process of issuing the individual IC cards is entrusted to the IC card provider, the data of the encryption key information according to each individual company staff must be handed over to the IC card provider at the time of issuing.
As a matter of course, an IC card provider handles the data of the encryption key information of each individual company staff provided from a client company under adequate consideration so that thorough security can be ensured. However, that a person who will commit an illicit act absolutely does not exist among company staff involved in an IC card issuing task cannot be guaranteed. Also, because an IC card provider generally receives orders from a plurality of clients, there is a possibility for encryption key information concerning company staff of a client company A to be handed over to a company staff of another client company B due to some form of negligence, even if it is not intentional.
An object of the present invention is thus to provide a method for issuing IC cards containing encryption key information that enables an issuing process to be carried out in a mode enabling reissuing and yet enabling the ensuring of sufficient security in cases where plurality of IC cards, each storing unique encryption key information, are respectively issued to specific individuals belonging to specific groups.
DISCLOSURE OF INVENTION(1) The first feature of the present invention resides in a method for issuing a plurality of IC cards, each storing unique encryption key information, to specific individuals belonging to specific groups, the method comprising the steps of:
preparing IC cards, each having a CPU, a memory, and an I/O unit, which performs transaction of information with respect to the exterior, and having stored in the memory, a key information generating program, which, by performing a calculation process based on a predetermined algorithm using at least two pieces of data, generates encryption key information that is uniquely determined by the two pieces of data;
defining a secret group code for each group, and writing the secret group code, defined for a group to which an individual, to whom an IC card is to be issued, belongs, into the memory of each prepared IC card;
writing a predetermined secret personal code, designated by an individual to whom an IC card is to be issued, into the memory of each prepared IC card; and
making the CPU execute the key information generating program to generate encryption key information using at least the two pieces of data of the secret group code and the secret personal code and store this encryption key information into the memory of each IC card.
(2) The second feature of the present invention resides in a method for issuing IC cards storing encryption key information having the first feature, wherein
an encryption key itself, which is used for encryption or decryption, is generated as the encryption key information.
(3) The third feature of the present invention resides in a method for issuing IC cards storing encryption key information having the first feature, wherein
a key table, a portion of which is used as an encryption key used for encryption or decryption, is generated as the encryption key information.
(4) The fourth feature of the present invention resides in a method for issuing IC cards storing encryption key information having the third feature, wherein
two codes are written as secret personal codes, a first key table is generated based on a first secret personal code and a secret group code, a second key table is generated based on a second secret personal code and a secret group code, the two key tables are stored in each IC card as encryption key information, and an encryption key, used in encryption or decryption, is enabled to be obtained by synthesizing a portion of the first key table and a portion of the second key table.
(5) The fifth feature of the present invention resides in a method for issuing IC cards storing encryption key information having any of the first to the fourth features, wherein
a routine, which, when the key information generating program is executed on an IC card for a predetermined number of times, records an instruction prohibiting subsequent execution of the program in the IC card, and a routine, which, when the instruction is recorded, prohibits the execution of the program, are included in the key information generating program.
(6) The sixth feature of the present invention resides in a method for issuing IC cards storing encryption key information having any of the first to the fifth features, wherein
each secret group code is managed so as to be in a state in which it can be known only by a manager not belonging to any group, or only by a manager belonging to a corresponding group, or only by a manager not belonging to any group and a manager belonging to a corresponding group, and
each secret personal code is managed so as to be in a state in which it can be known only by a corresponding individual.
(7) The seventh feature of the present invention resides in an IC card issued by the IC card issuing method having any of the first to the fifth features.
(8) The eighth feature of the present invention resides in a key information generating program used in the IC card issuing method having any of the first to the fifth features.
(9) The ninth feature of the present invention resides in an IC card, used for executing an encryption process or a decryption process using unique encryption key information, the IC card comprising:
a CPU, a memory, and an I/O unit performing transaction of information with respect to the exterior;
there being stored in the memory,
a program for performing a process of storing encryption key information generating data, provided from the exterior, into a first storage location and a second storage location, respectively, inside the memory,
a program for performing a calculation process based on a predetermined algorithm using a first data stored in the first storage location and a second data stored in the second storage location to generate encryption key information that is uniquely determined according to the two pieces of data and storing the encryption key information in the memory, and
a program for executing the encryption process or the decryption process inside the IC card using the encryption key information.
(10) The tenth feature of the present invention resides in an IC card, used for executing an encryption process or a decryption process using unique encryption key information, the IC card comprising:
a CPU, a memory, and an I/O unit performing transaction of information with respect to the exterior;
there being stored in the memory,
a program for performing a process of storing encryption key information generating data, provided from the exterior, into a first storage location and a second storage location, respectively, inside the memory,
a program for performing a calculation process based on a predetermined algorithm using a first data stored in the first storage location and a second data stored in the second storage location to generate encryption key information that is uniquely determined according to the two pieces of data and storing the encryption key information in the memory, and
a program for reading out the encryption key information or a portion thereof for execution of the encryption process or the decryption process outside the IC card.
With the present invention's method for issuing IC cards storing encryption key information, the encryption key information is prepared using the secret group code and the secret personal code in the interior of an IC card and is stored as it is in the IC card. Here, the secret group code is a code defined for a group to which an individual, to whom the IC card is issued, belongs, and this code can be put in the custody, for example, of a manager of an IC card provider. Meanwhile, the secret personal code is a code designated by the individual to whom the IC card is issued, and this code can be put in the custody of the individual him/herself. Because neither the secret group code nor the secret individual code is the encryption key information in itself, the encryption key information inside the IC card is maintained in a state of being stored without being known to anyone. When the IC card is lost or damaged by any chance, the IC card can be reissued because, by inputting the secret group code, kept in the custody of the manager, and the secret personal code, kept in the custody of the individual, into a new IC card, the same encryption key information can be prepared in the interior of the IC card again. The present invention thus enables an issuing process to be carried out in a mode enabling reissuing and yet enabling the ensuring of sufficient security in cases where plurality of IC cards, each storing unique encryption key information, are respectively issued to specific individuals belonging to specific groups.
BRIEF DESCRIPTION OF DRAWINGS
The present invention shall now be described based on an illustrated embodiment.
<<<Section 1. General IC Card Storing Encryption Key Information>>>
First, an arrangement of a general IC card that stores encryption key information and a mode of use of this IC card shall be described briefly.
Memory 110 is accessible only by CPU 120, and memory 110 cannot be accessed directly from the exterior. Access from the exterior is carried out via I/O unit 130. That is, commands provided from the exterior via I/O unit 130 are executed by CPU 120 based on programs inside ROM 111, and CPU 120 returns execution results as responses to the exterior via I/O unit 130. The illustrated example is an example of an IC card having functions of executing an encryption process of converting plaintext data to encrypted text data and executing an opposite decoding process of converting encrypted text data to plaintext data, and a program for carrying out the encryption and decryption are stored in ROM 111 and an encryption key used by this program is stored in EEPROM 112.
When a predetermined encryption command and plaintext data are provided to IC card 100 via I/O unit 130, CPU 120 executes the provided encryption command based on the program inside ROM 111 and thereby performs a process of applying the predetermined encryption process to the provided plaintext data and outputting the obtained encrypted text data along with a response to the exterior via I/O unit 130. In performing this encryption process, the encryption key stored in EEPROM 112 is used. Oppositely when a predetermined decryption command and encrypted text data are provided to IC card 100 via I/O unit 130, CPU 120 executes the provided decryption command based on the program inside ROM 111 and thereby performs a process of applying the predetermined decryption process to the provided encrypted text data to restore the original plaintext data and outputting the plaintext data along with a response to the exterior via I/O unit 130. The encryption key stored in EEPROM 112 is also used when this decryption process is performed. Here, unless the same key as the encryption key used in the encryption process is used, the plaintext data cannot be restored correctly.
Though an example in which the encryption and decryption program is prepared in ROM 111 was described above, this program may be prepared in EEPROM 112 instead. When the encryption and decryption program is prepared in EEPROM 112, this processing program can be rewritten as necessary. Also, though for the sake of description, IC card 100 having just the encryption and decryption process functions is described here, because IC card 100 is used for various applications, programs for executing the various processes of these various applications are stored in ROM 111 or EEPROM 112 for practical use.
Because the encryption key stored in EEPROM 112 is read out to the exterior of IC card 100 with the embodiment shown in
A case where such IC cards, each storing an encryption key for performing encryption and decryption processes, are issued as company staff ID cards shall now be considered. As mentioned above, normally when a company distributes IC cards that function as company staff ID cards to respective company staff, the company generally requests an IC card provider (such as a major printing company) to perform the IC card procurement and issuing tasks.
The encryption keys stored in the respective IC cards are unique keys that differ from each other. In the illustrated example, unique encryption keys K(α), K(β), K(γ), K(δ), K(ε), and K(ζ) are stored in IC cards issued to company staff α, β, γ, δ, ε, and ζ, respectively. In a case where IC cards storing such unique encryption keys are issued, conventionally, these encryption key data are generally prepared by IC card provider X and a process of writing the individual encryption keys into the individual IC cards is performed at the time of issue. And in consideration of the convenience of reissue, the encryption key data are kept in custody by IC card provider X or kept in custody by management staff of client company A and client company B. In any case, because as long as the IC card issuing task is entrusted to IC card provider X, the encryption key data must be provided to the IC card provider X side, the possibility of leakage of the encryption keys due to an illicit act or negligence on the part of IC card provider X cannot be denied. The possibility that someone who will commit an illicit act exists in client company A or client company B also cannot be denied. Encryption keys used for encryption and decryption processes inherently should be managed under tight security so that such leakage will not occur.
As a method of preventing such leakage, there is a method of making random encryption keys be generated using random numbers inside the individual IC cards and storing the encryption keys as they are in the IC cards. However with this method, if an IC card is lost or damaged by any chance, because the encryption key is then lost forever and the IC card cannot be reissued, it becomes impossible to decrypt data that had been encrypted in the past. The present invention provides an IC card issuing method that enables sufficient security to be ensured and yet enable reissuing.
<<<Section 2. Basic Embodiment of the Invention>>>
Though any algorithm may be used as the predetermined algorithm A, a simple algorithm, in which the sum of secret group code G, which is a four-digit numeral, and secret personal code P, which is likewise a four digit numeral, is determined and the lower four digits of this sum is used as encryption key information K, is shown as an example in the FIGURE. For example if secret group code G is the numeral, “6789,” and secret personal code P is the numeral, “5151,” encryption key information K that is the numeral, “1940,” is generated as illustrated. By employing such an algorithm, when two pieces of data G and P are provided, encryption key information K that is determined uniquely according to these two pieces of data can be generated.
The algorithm for generating encryption key information K is not necessarily restricted to a calculation process based on two pieces of data, and as long as at least the two pieces of data of secret group code G and secret personal code P are used and encryption key information K that is uniquely determined according to these two pieces of data is obtained, the algorithm may be a calculation using a third piece of data or a fourth piece of data.
By thus arranging encryption key information K to be generated by an algorithm using the two pieces of data of secret group code G and secret personal code P, the request of ensuring sufficient security and the request of enabling reissuing of the IC card can both be met. That is, in regard to ensuring sufficient security, because the two codes of secret group code G and secret personal code P are necessary to obtain encryption key information K and encryption key information K cannot be generated with just one of either code, if secret group code G and secret personal code P are respectively kept in separate management environments, the possibility of acquiring encryption key information K by an illicit method can be reduced significantly. Meanwhile, because as long as the two codes of secret group code G and secret personal code P are available, encryption key information K can be generated at any time as information that is determined uniquely based on the two codes, the IC card can be reissued in case of an emergency.
In step S2 that follows, the writing of a secret group code G is performed, and in step S3, the writing of a secret personal code P is performed. These writing processes are actually performed by providing, to IC card 100, data to be written along with a predetermined write command. Then in the last step S4, a process of generating encryption key information K is performed. That is, the process shown in
The writing processes of steps S2 and S3 may be performed on EEPROM 112 or on RAM 113. However, since RAM 113 is a volatile memory, if a step in which the supply of power to IC card 100 is stopped temporarily is carried out before the execution of step S4, writing into EEPROM 112, which is a nonvolatile memory, must be performed.
An embodiment, in which the issuing method according to the present invention is applied to the specific example shown in
First, IC card provider X defines secret group codes G respectively according to the companies. In the illustrated example, a secret group code G(A) is defined for client company A and a secret group code G(B) is defined for client company B. These codes G(A) and G(B) may be any codes as long as the codes differ from each other. Also, though not illustrated, if there is a third client company C, a fourth client company D, etc., different secret group codes G(C), G(D), etc., are defined respectively for these companies as well. Thus in the present invention, a secret group code is a unique code that is provided in common to a single group.
Though an example where one company is handled as one group shall be described here, a department or a section within the same company may also be handled as one group. In this case, mutually different secret group codes are allocated according to the departments or sections, to which the staff belong, even if the departments or sections are of the same company. Oppositely, a plurality of companies may be handled together as one group.
In step S2 of
Though the processes of steps S1 and S2 of the first half of
Thus after the above-described initialization process has been executed, unique encryption key information K(α), K(β), and K(γ) are respectively stored in the IC cards owned by company staff α, β, and γ, respectively, and can be used in encryption and decryption processes. Likewise, because three IC cards, into which secret group code G(B) has been written, are delivered to client company B, company staff δ, ε, and ζ can respectively obtain IC cards, respectively having encryption key information K(δ), K(ε), and K(ζ) stored therein by performing the process of writing unique secret personal codes P(δ), P(ε), and P(ζ) into their own IC cards and thereafter providing the execution command for making the key information generating program be executed.
In executing the above-described initialization process, a computer, which is equipped with an IC card reader/writer device and in which a specialized initialization program is incorporated, is preferably prepared. Specifically, arrangements are made so that when a company staff inserts his/her own IC card into the reader/writer device of the computer and executes the initialization program, a message urging the input of secret personal code P is displayed on a screen of the computer, and when the company staff inputs an arbitrary code as secret personal code P, the command for performing the process of writing (step 3 of
As can be understood from the embodiment shown in
With the example shown in
The secret group codes may instead be kept and managed by company staff of the respective client companies. For example, secret group code G(A) may be kept and managed by a company staff of client company A and secret group code G(B) may be kept and managed by a company staff of client company B so that IC card provider X is not involved whatsoever in the custody and management of these codes. Obviously, the codes may be kept and managed by both company staff of client companies A and B and a manager of IC card provider X.
Meanwhile, each secret personal code P is preferably managed so that only the corresponding individual knows of it. For example, secret personal code P(α) concerning company staff α is a code that company staff α has input in performing the initialization process on his/her own IC card and can be made a secret code that is known only to α. However, since this secret personal code P is essential for reissuing the IC card in case of emergency, the secret personal code input in the initialization process is preferably a code that will never be forgotten and is preferably recorded as a confidential note if possible.
As mentioned above the advantage of the present invention is that while ensuring sufficient security concerning encryption key information stored in individual IC cards, reissuing of the IC cards is enabled in case of emergency. For example, when company staff α loses or damages his/her IC card, he/she will not be able to restore any data that have been encrypted in the past unless he/she uses the IC card. In such a case, company staff α can acquire a reissued IC card by simply having IC card provider X deliver a new IC card and performing the initialization process using the same secret personal code P(α) used before. In this case, because IC card provider X performs a delivery to client company A, the IC card is delivered with secret group code G(A) written therein. Thus as long as company staff a performs the initialization process using the same secret personal code P(α) as before, the same encryption key information K(α) as before becomes stored inside the reissued IC card and restoration of data that had been encrypted in the past is thus enabled.
<<<Section 3. Modification Examples of the Invention>>>
The illustrated basic embodiment of the present invention was described above, and some modification examples of the present invention shall now be described.
(1) Example of Using an Encryption Key Table
Though an example, in which an encryption process and a decryption process are performed using an encryption key stored in an IC card, is illustrated in
Encryption key information K used in the present invention is data generated by the processing process shown in
(2) Example of Using Two Key Tables
A modification example shown in
With the specific example shown in
Here, in performing the encryption process, for example, an instruction to “use the result of joining four bytes from the third byte onward of the second key table to four bytes from the 14th byte onward of the first key table as the encryption key” is provided to execute the encryption process. Because the existence of two key tables in the IC card is an essential requirement in such a mode of use, the security is improved further.
(3) Example of Restricting the Execution of the Encryption Key Information Generating Process to a Predetermined Number of Times
As described above, the process of step S4 of
However, from the standpoint of ensuring security, the execution of the key information generating program is preferably restricted to a predetermined number of times (for example, once). This is because, if an IC card is to be issued by a legitimate method, the process of the key information generating program is a process that suffices to be executed once (or a number of times in consideration of mistakes) in the above-described initialization process and is not a process that needs to be executed repeatedly. Meanwhile, if the IC card is put in the hands of an illicit user, this illicit user may rewrite the secret group code and secret personal code by an illicit means and repeatedly execute the key information generating program to analyze the key information generating algorithm, etc. In consideration of this point, it is reasonable to restrict the execution of the key information generating program to just a predetermined number of times.
For practical use, a routine, which records, into the IC card (for example, into EEPROM 112), an instruction that prohibits further execution of the key information generating program when the program has been executed on the IC card for just the predetermined number of times, and a routine, which prohibits execution when the above instruction is recorded, are included in the key information generating program prepared inside the IC card.
Claims
1. A method for issuing a plurality of IC cards, each storing unique encryption key information, to specific individuals belonging to specific groups, the method for issuing IC cards storing encryption key information comprising the steps of:
- preparing IC cards (100), each having a CPU (120), a memory (110), and an I/O unit (130), which performs transaction of information with respect to the exterior, and having stored in the memory, a key information generating program, which, by performing a calculation process based on a predetermined algorithm using at least two pieces of data, generates encryption key information that is uniquely determined by the two pieces of data (S1);
- defining a secret group code (G) for each group, and writing the secret group code, defined for a group to which an individual, to whom an IC card is to be issued, belongs, into the memory of each prepared IC card (S2);
- writing a predetermined secret personal code (P), designated by an individual to whom an IC card is to be issued, into the memory of each prepared IC card (S3); and
- making the CPU execute the key information generating program to generate encryption key information (K) using at least the two pieces of data of the secret group code and the secret personal code and store this encryption key information into the memory of each IC card.
2. The method for issuing IC cards storing encryption key information according to claim 1, wherein
- an encryption key itself, which is used for encryption or decryption, is generated as the encryption key information (K).
3. The method for issuing IC cards storing encryption key information according to claim 1, wherein
- a key table, a portion of which is used as an encryption key used for encryption or decryption, is generated as the encryption key information (K).
4. The method for issuing IC cards storing encryption key information according to claim 3, wherein
- two codes are written as secret personal codes (P), a first key table is generated based on a first secret personal code (P(a1)) and a secret group code (G(A)), a second key table is generated based on a second secret personal code (P(a2)) and a secret group code (G(A)), the two key tables are stored in each IC card as encryption key information, and an encryption key, used in encryption or decryption, is enabled to be obtained by synthesizing a portion of the first key table and a portion of the second key table.
5. The method for issuing IC cards storing encryption key information according to claim 1, wherein
- a routine, which, when the key information generating program is executed on an IC card for a predetermined number of times, records an instruction prohibiting subsequent execution of the program in the IC card, and a routine, which, when the instruction is recorded, prohibits the execution of the program, are included in the key information generating program.
6. The method for issuing IC cards storing encryption key information according to claim 1, wherein
- each secret group code is managed so as to be in a state in which it can be known only by a manager not belonging to any group, or only by a manager belonging to a corresponding group, or only by a manager not belonging to any group and a manager belonging to a corresponding group, and
- each secret personal code is managed so as to be in a state in which it can be known only by a corresponding individual.
7. An IC card issued by the IC card issuing method according to claim 1.
8. The key information generating program used in the IC card issuing method according to claim 1 or an IC card storing said program.
9. An IC card, used for executing an encryption process or a decryption process using unique encryption key information, the IC card comprising:
- a CPU (120), a memory (110), and an I/O unit (130) performing transaction of information with respect to the exterior;
- there being stored in the memory (110),
- a program for performing a process of storing encryption key information generating data, provided from the exterior, into a first storage location and a second storage location, respectively, inside the memory,
- a program for performing a calculation process based on a predetermined algorithm using a first data stored in the first storage location and a second data stored in the second storage location to generate encryption key information that is uniquely determined according to the two pieces of data and storing the encryption key information in the memory, and
- a program for executing the encryption process or the decryption process inside the IC card using the encryption key information.
10. An IC card, used for executing an encryption process or a decryption process using unique encryption key information, the IC card comprising:
- a CPU (120), a memory (110), and an I/O unit (130) performing transaction of information with respect to the exterior;
- there being stored in the memory (110),
- a program for performing a process of storing encryption key information generating data, provided from the exterior, into a first storage location and a second storage location, respectively, inside the memory,
- a program for performing a calculation process based on a predetermined algorithm using a first data stored in the first storage location and a second data stored in the second storage location to generate encryption key information that is uniquely determined according to the two pieces of data and storing the encryption key information in the memory, and
- a program for reading out the encryption key information or a portion thereof for execution of the encryption process or the decryption process outside the IC card.
Type: Application
Filed: May 2, 2005
Publication Date: Jul 19, 2007
Inventors: Fukio Handa (Tokyo), Yoshihiro Yana (Tokyo), Takayuki Chikada (Tokyo), Syouzou Niwata (Tokyo)
Application Number: 11/579,080
International Classification: H04L 9/00 (20060101);