Abstract:
In one example embodiment, an information processing apparatus determines whether a target ID is a unique ID or a partial randomization ID that includes a first part being replaced by a different number and a second part being generated based on the unique ID. In response to the target ID being the partial randomization ID, the information processing apparatus generates an access key based on the second part of the partial randomization ID and a key. The information processing apparatus executes a mutual authentication process using the generated access key.
Abstract:
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM AND COMMUNICATION SYTEM An information processing device includes: a data storage portion that can store user data used in a particular non-contact communication service and management information to manage the user data in different storage areas corresponding to different encryption methods and that has a first storage area storing management information corresponding to a first encryption method; an issuing information receiver that receives issuing information encrypted with the first encryption method from an issuing device delivering the issuing information to issue management information corresponding to a second encryption method; an issuing information decryption portion that decrypts the received issuing information with the first encryption method, based on the management information corresponding to the first encryption method stored in the first storage area; and a management information issuing portion that, based on the decrypted issuing information, issues the management information corresponding to the second encryption method and stores it in a second storage area.
Abstract:
An information processing device includes: a data storage portion that can store user data used in a particular non-contact communication service and management information to manage the user data in different storage areas corresponding to different encryption methods and that has a first storage area storing management information corresponding to a first encryption method; an issuing information receiver that receives issuing information encrypted with the first encryption method from an issuing device delivering the issuing information to issue management information corresponding to a second encryption method; an issuing information decryption portion that decrypts the received issuing information with the first encryption method, based on the management information corresponding to the first encryption method stored in the first storage area; and a management information issuing portion that, based on the decrypted issuing information, issues the management information corresponding to the second encryption method and stores it in a second storage area.
Abstract:
PROBLEM TO BE SOLVED: To update a key version of a key value used for mutual authentication. SOLUTION: A storage part 159 makes a first key value associated with first class information indicating a class of the first key value to hold the value and the information, and also makes a second key value different from the first key value associated with second class information indicating a class of the second key value to hold the value and the information. A detection responding part 211 sends predetermined first class information in response to a request for class information from a communication apparatus at the other end of communication. A mutual authentication part 213 performs mutual authentication with the communication apparatus using the first key value corresponding to the first class information if an authentication initiation command ordering an initiation of mutual authentication is sent back from the communication apparatus in response to the sent first class information, or performs the mutual authentication with the communication apparatus using the second key value corresponding to the second class information if the second class information is sent back from the communication apparatus in response to the first sent class information. The invention may be applied to an IC card or the like for the mutual authentication with an R/W. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an information processor, an information processing method and a program, capable of inhibiting a fraudulent operation conducted to a storage area using the encryption system of low security strength.SOLUTION: An IC card 1 capable of coping with a DES system and an AES system having security strength different from that of the DES system includes: an inhibition information reception part 71 for receiving inhibition information for inhibiting a predetermined operation conducted to the storage area of the IC card using the DES system from an issuing device 5 using the AES system; an inhibition flag setting part 74 for performing inhibition processing for inhibiting the predetermined operation by the inhibition information; an operation request reception part 75 for receiving the request of an operation from a service provision device 3 or an issuance device 5; and an operation execution part 77 for executing the requested operation when the requested operation is not pertinent to the predetermined operation inhibited by the inhibition information.
Abstract:
PROBLEM TO BE SOLVED: To prevent the leakage of a card-unique ID of an IC card. SOLUTION: In step S12, a state of a held target ID randomization flag is determined. When the target ID randomization flag is determined to be valid, a partial randomization ID is notified as a target ID to an R/W 10. In such a case, an access key is generated by making two bytes of a lower-order of a card number of the partial randomization ID act on a degeneration key. To the contrary, when the target ID randomization flag is determined to be invalid, the card-unique ID is notified as a target ID to the R/W. In such a case, the access key is generated by making six bytes of a card number of the card-unique ID act on the degeneration key. The invention is applicable to a contactless communication system. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To enable one information processing device capable of non-contact communication to be flexibly compatible with a plurality of encryption methods. SOLUTION: The information processing device includes: a data storage portion that can store user data used for utilizing a prescribed non-contact service using a non-contact communication and management information to manage the user data by different storage area corresponding to a plurality of different encryption methods and that has a first storage area storing management information corresponding to a first encryption method; an issuing information receiver that receives issuing information encrypted with the first encryption method from an issuing device delivering the issuing information to issue management information corresponding to a second encryption method; an issuing information decryption portion that decrypts the received issuing information with the first encryption method, on the basis of the management information corresponding to the first encryption method stored in the first storage area; and a management information issuing portion that, on the basis of the decrypted issuing information, issues the management information corresponding to the second encryption method and stores it in a second storage area. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To obviate the need for an additional procedure in changing over a cryptographic algorithm supported by an IC card. SOLUTION: This information processor is equipped with: a plurality of cryptographic algorithm parts each mutually authenticating an external device by using cryptographic methods or cryptography keys different from one another; and a data storage part storing a plurality of code-based information pieces provided on the basis of the cryptographic algorithm part and including the types of codes identifying a cryptography method used by each cryptographic algorithm part, and invalidation control information for making at least one cryptographic algorithm part within the plurality cryptographic algorithm parts invalid. In the information processor, at least a first cryptographic algorithm part within the plurality of cryptographic algorithm parts makes another cryptographic algorithm part invalid in accordance with the invalidation control information stored in the data storage part when succeeding in mutual authentication with the external device. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a remote control system or the like by which a user can simply and easily take in a user interface desired by the user in consideration of universal design. SOLUTION: The remote control system is composed of an operation target device which has at least a storage part for storing two or more user interface programs, a short-range radio communication part for transmitting the user interface program by executing the short-range radio communication in between a remote control device, and a reception part for receiving an operation signal from the remote control device, and the remote control device which has at least a short-range radio communication part for receiving the user interface program by executing the short-range radio communication in between the control target device, a display unit for displaying the user interface on the basis of the user interface program, an operation part capable of operating the user interface displayed on the display unit, and an operation signal transmitting part for transmitting the corresponding operation signal to the operation target device on the basis of the operation of the user interface. COPYRIGHT: (C)2006,JPO&NCIPI