Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
1998-01-30
2001-05-29
Peeso, Thomas R. (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S159000, C713S168000, C713S172000, C380S255000
Reexamination Certificate
active
06240517
ABSTRACT:
BACKGROUND OF THE INVENTION
The present invention relates to authentication of an IC (Integrated Circuit) card and, more particularly, to an IC card, an IC card processing system for processing the IC card, and an IC card authentication method of authenticating the IC card.
At present, a public telephone can be used by a telephone card serving as a kind of prepaid card. In the future, an IC card will function as a prepaid card to use the public telephones. In this case, confirmation of the validity of the IC card (authentication of the IC card) by the device (public telephone) is performed as follows. For example, key data permanently held by the device is processed by key data stored in the IC card to authenticate the IC card by the processing results. Alternatively, a password number input by the card holder may be used. This card authentication is basically executed by a program and the like stored in the device for processing the card.
In the above card authentication, however, if transmission contents between the IC card and the device are monitored, the monitored data may be used as clues for card forgery or system analysis. Further, the device may be stolen to analyze a program stored in it, and the analyzed program may be used as a clue for card forgery or system analysis.
BRIEF SUMMARY OF THE INVENTION
It is an object of the present invention to provide an IC card, an IC card processing system, and an IC card authentication method in which secret information serving as the main key of security hardly leaks out.
It is another object of the present invention to provide an IC card processing system and authentication method in which, even when secret information serving as the main key of security leaks out, illicit use with the leaking secret information can be prevented.
According to the present invention, there is provided an IC card, comprising: communication means for externally performing data communication; memory means for storing value data representing an effective value, and authentication code generation data used to generate authentication code necessary for authentication of the IC card; and authentication code generation means for processing the value data stored in the memory means and external data externally supplied via the communication means, by using the authentication code generation data stored in the memory means to generate the authentication code.
According to the present invention, there is provided an IC card processing system comprising an IC card, and an IC card processing device for processing the IC card, the IC card having: first communication means for performing reception of random number data transmitted from the IC card processing device, and transmission of value data representing an effective value and first authentication code generated by the IC card to the IC card processing device; first memory means for storing the value data, and first authentication code generation data used to generate the first authentication code; and first authentication code generation means for processing the value data stored in the first memory means and the random number data received via the first communication means, by using the first authentication code generation data stored in the first memory means to generate the first authentication code, and the IC card processing device having: second communication means for performing reception of the value data and the first authentication code transmitted from the IC card, and transmission of the random number data generated by the IC card processing device to the IC card; second memory means for storing second authentication code generation data identical to the first authentication code generation data to generate second authentication code; random number generation means for generating the random number data; second authentication code generation means for processing the value data received via the second communication means and the random number data generated by the random number generation means, by using the second authentication code generation data stored in the second memory means to generate the second authentication code; determination means for comparing the second authentication code generated by the second authentication code generation means with the first authentication code received via the second communication means to determine validity of the IC card subjected to communication via the second communication means; and card handling means for handling the IC card subjected to communication via the second communication means on the basis of a determination result of the determination means.
According to the present invention, there is provided an IC card authentication method executed in an IC card in which value data representing an effective value and first authentication code generation data are stored, and an IC card processing device which processes the IC card and stores second authentication code generation data identical to the first authentication code generation data, comprising: the first step of generating random number data; the second step of processing the value data stored in the IC card and the random number data generated in the first step, by using the first authentication code generation data stored in the IC card to generate first authentication code; the third step of processing the value data stored in the IC card and the random number data generated in the first step, by using the second authentication code generation data stored in the IC card processing device to generate second authentication code; and the fourth step of comparing the first authentication code with the second authentication code to authenticate the IC card.
Additional object and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The object and advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out in the appended claims.
REFERENCES:
patent: 4799061 (1989-01-01), Abraham et al.
patent: 5293029 (1994-03-01), Iijima
patent: 5436971 (1995-07-01), Armbrust et al.
patent: 5546446 (1996-08-01), Tsumokawa et al.
patent: 5774546 (1998-06-01), Handelman et al.
patent: 5857024 (1999-01-01), Nishino et al.
patent: 5901284 (1999-05-01), Hamdy-Swink
patent: 5917168 (1999-06-01), Nakamura et al.
patent: 0552392 (1993-07-01), None
patent: 0654919 (1995-05-01), None
patent: 0723251 (1996-07-01), None
Kabushiki Kaisha Toshiba
Peeso Thomas R.
Pillsbury Madison & Sutro LLP Intellectual Property Group
LandOfFree
Integrated circuit card, integrated circuit card processing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Integrated circuit card, integrated circuit card processing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Integrated circuit card, integrated circuit card processing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2520507