Abstract:
An information processing device includes: a data storage portion that can store user data used in a particular non-contact communication service and management information to manage the user data in different storage areas corresponding to different encryption methods and that has a first storage area storing management information corresponding to a first encryption method; an issuing information receiver that receives issuing information encrypted with the first encryption method from an issuing device delivering the issuing information to issue management information corresponding to a second encryption method; an issuing information decryption portion that decrypts the received issuing information with the first encryption method, based on the management information corresponding to the first encryption method stored in the first storage area; and a management information issuing portion that, based on the decrypted issuing information, issues the management information corresponding to the second encryption method and stores it in a second storage area.
Abstract:
In one example embodiment, an information processing apparatus determines whether a target ID is a unique ID or a partial randomization ID that includes a first part being replaced by a different number and a second part being generated based on the unique ID. In response to the target ID being the partial randomization ID, the information processing apparatus generates an access key based on the second part of the partial randomization ID and a key. The information processing apparatus executes a mutual authentication process using the generated access key.
Abstract:
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM AND COMMUNICATION SYTEM An information processing device includes: a data storage portion that can store user data used in a particular non-contact communication service and management information to manage the user data in different storage areas corresponding to different encryption methods and that has a first storage area storing management information corresponding to a first encryption method; an issuing information receiver that receives issuing information encrypted with the first encryption method from an issuing device delivering the issuing information to issue management information corresponding to a second encryption method; an issuing information decryption portion that decrypts the received issuing information with the first encryption method, based on the management information corresponding to the first encryption method stored in the first storage area; and a management information issuing portion that, based on the decrypted issuing information, issues the management information corresponding to the second encryption method and stores it in a second storage area.
Abstract:
PROBLEM TO BE SOLVED: To accurately obtain waiting time up to command retransmission from a controller. SOLUTION: After card command transmission processing, a reader/writer calculates total waiting time and transmits the calculated total waiting time to a controller 11 as an accepted packet (step S13). Concretely, the reader/writer calculates card waiting time by adding card command transmission processing time to the maximum response waiting time of card response. Further, the reader/writer calculates total waiting time according to following formula: total wait time = card waiting time × (retrial frequency +1)+ card access response generation time. This invention can be applied to a non-contact communication system. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To prevent injustice access.SOLUTION: A first information processing device 111 formed of, for example, an IC card receives a random number A from a second information processing device formed of, for example, a reader/writer, generates a time-variant key K2C, and ciphers the random number A with the time-variant key K2C. The ciphered random number A is transmitted to the second information processing device with a random number C that is basic information being a base of a time-variant of the time-variant key K2C. The second information processing device generates the time-variant key K2C with the random number C being the basic information and also generates the random number A as authentication information with the generated time-variant key K2C. The first information processing device is authenticated with the random number A as the authentication information.
Abstract:
PROBLEM TO BE SOLVED: To prevent illegal access. SOLUTION: A first information processing device 111 comprised of an IC card, for example, receives a random number A from a second information processing device comprised of a reader/writer, for example, generates a time variant key K2C for encrypting the random number A according to the time variant key K2C. The encrypted random number A is transmitted to the second information processing device together with a random number C as basic information that becomes the time-variant base of the time variant key K2C. The second information processing device generates the time variant key 2C in accordance with the random number C of the basic information and generates a random number A as authentication information in accordance with the time variant key 2C generated. The first information processing device is authenticated by the random number A as the authentication information. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a portable terminal that can respond appropriately by contactless communication by automatically selecting an appropriate device when there are a plurality of devices within a system of contactless communication.SOLUTION: The portable terminal includes: a contactless communication section for establishing contactless communication with an external communication apparatus; a plurality of storage sections for storing information to be exchanged with the communication apparatus; and a control section for controlling communication with the communication apparatus and setting an order of priority for information transmission from the plurality of storage sections to the communication apparatus, and the control section sets the order of priority of the plurality of storage sections according to the current time. When there are a plurality of devices within a system of contactless communication, an appropriate device can thus be automatically selected to respond appropriately by contactless communication.
Abstract:
PROBLEM TO BE SOLVED: To prevent the leakage of a card-unique ID of an IC card. SOLUTION: In step S12, a state of a held target ID randomization flag is determined. When the target ID randomization flag is determined to be valid, a partial randomization ID is notified as a target ID to an R/W 10. In such a case, an access key is generated by making two bytes of a lower-order of a card number of the partial randomization ID act on a degeneration key. To the contrary, when the target ID randomization flag is determined to be invalid, the card-unique ID is notified as a target ID to the R/W. In such a case, the access key is generated by making six bytes of a card number of the card-unique ID act on the degeneration key. The invention is applicable to a contactless communication system. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an IC chip and the like easily registering a service having a reading-dedicated access right to a user data area. SOLUTION: In this information processing system comprising a controller 1, a reader/writer 2, and an IC card 3, the IC card 3 registers an access method changeable service defined with a writable access right, allowing a change of an access method to the user data area provided in a memory 31, writes user data into the user data area through the access method changeable service according to a writing instruction of the user data received from the controller, and changes the access right of the access method changeable service into the reading-dedicated access right after the user data writing according to an access method change instruction received from the controller. Thereby, by writing the user data into the user data area without needing registration of two services or deletion of the service, the reading-dedicated service can be easily registered. COPYRIGHT: (C)2010,JPO&INPIT