WO2006003711A1 - プリペイドカードとその決済システム及び電子鍵 - Google Patents
プリペイドカードとその決済システム及び電子鍵 Download PDFInfo
- Publication number
- WO2006003711A1 WO2006003711A1 PCT/JP2004/009534 JP2004009534W WO2006003711A1 WO 2006003711 A1 WO2006003711 A1 WO 2006003711A1 JP 2004009534 W JP2004009534 W JP 2004009534W WO 2006003711 A1 WO2006003711 A1 WO 2006003711A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identification information
- circuit
- prepaid card
- output
- gate
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/28—Pre-payment schemes, e.g. "pay before"
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
Definitions
- the present invention relates to a prepaid card, its settlement system, and an electronic key, and in particular, effectively uses an identification information generation circuit that is considered so that micro-element variation in semiconductor manufacturing technology can be used appropriately. It is related to effective technology.
- Patent Document 1 JP 2002-184872
- Patent Document 2 Japanese Patent Laid-Open No. 2003-332245
- one object of the present invention is to provide a simple, low-cost and highly reliable prepaid force force, a settlement system thereof, and an electronic key.
- FIG. 1 is a block diagram showing an embodiment of an IC prepaid card payment system according to the present invention.
- FIG. 2 is a block diagram showing an embodiment of an integrated circuit that generates the authenticator of FIG. 1.
- FIG. 3 is a typical configuration diagram of an integrated circuit device on which the integrated circuit of FIG. 2 is mounted.
- FIG. 4 is a typical block diagram related to an IC prepaid card according to the present application.
- FIG. 5 is an explanatory diagram of a typical manufacturing process according to the IC prepaid card of FIG.
- FIG. 6 is an explanatory diagram of a usage pattern of an embodiment of an IC prepaid card according to the present invention.
- FIG. 7 is a block diagram of another embodiment of an integrated circuit provided in an integrated circuit device in an IC prepaid card according to the present invention.
- FIG. 8 is a block diagram showing an embodiment of an IC prepaid card authentication processing method according to the present invention.
- FIG. 9 is a block diagram showing another embodiment of the IC prepaid card authentication processing method according to the present invention.
- FIG. 10 is a block diagram showing an embodiment of an authenticator generating circuit according to the present invention.
- 11 A block diagram showing another embodiment of a semiconductor chip used in the present invention.
- FIG. 12 A schematic diagram for explaining the manufacturing process of the IC prepaid card according to the present invention.
- FIG. 13 is a detailed block diagram showing an example of the card inspection process of FIG.
- FIG. 14 is a configuration diagram for explaining an authentication processing method of the IC prepaid card 470 according to the present invention.
- FIG. 15 is a block diagram showing an embodiment in which an electronic key using the identification information generating circuit is applied to plaintext encryption / decryption.
- FIG. 16 is a configuration diagram showing an embodiment of a method for providing a specific service using an electronic key according to the present invention, and a method for providing a specific service.
- FIG. 17 is a block diagram showing another embodiment of an encryption communication method or a specific service providing method using an electronic key according to the present invention.
- FIG. 18 is a block diagram showing still another embodiment of a method for providing a specific service using an electronic key according to the present invention and a method for providing a specific service.
- FIG. 19 A block diagram showing an embodiment of a method of using an electronic key according to the present invention.
- FIG. 20 is an explanatory diagram of an example of the identification information 800 formed by the identification information generation circuit shown in FIG. 25 or FIG.
- FIG. 21 is an explanatory diagram showing an example of an electronic key such as an encryption key used in the encryption technology according to the present invention.
- FIG. 22 is a schematic diagram showing the basic concept of the principle of the cryptographic technique according to the present invention.
- FIG. 23 is a block diagram showing an embodiment according to an encryption method using the composite block key.
- FIG. 24 is an explanatory diagram of the decryption method of the composite key ciphertext shown in FIG.
- FIG. 25 is a logic circuit diagram showing an embodiment of the identification information generation times used in the present invention.
- FIG. 26 is a specific circuit diagram showing one embodiment of a basic circuit in the identification information generating circuit of FIG. 25.
- FIG. 27 is a block diagram showing another embodiment of an identification information generating circuit used in the present invention.
- FIG. 28 is a specific circuit diagram showing one embodiment of the circuit elements in FIG. 27.
- FIG. 29 is a circuit diagram showing one embodiment of the clocked inverter circuit in FIG. 27.
- FIG. 30 is a schematic waveform diagram for explaining an example of the operation of the identification information generating circuit of FIG. 27.
- FIG. 25 shows a logic circuit diagram of one embodiment of the identification information generation times used for the prepaid card and its payment system and electronic key according to the present invention.
- the identification information generation circuit 1000 is composed of n basic circuits 1010 represented by 0 ⁇ n ⁇ 1.
- 1-bit identification signal also called authenticator
- the basic circuit 1010 that forms DO is composed of NAND gate circuits G1-G4.
- NAND gate circuits G1-G4 In the 2-input NAND gate circuit G1, one input and output are coupled.
- the common input / output of this gate circuit G1 is connected to one input of the gate circuit G2.
- the output of gate circuit G2 is connected to one input of gate circuit G3.
- the output of the gate circuit G3 is connected to one input of the gate circuit G4.
- the operation control signal ACT is commonly supplied to the other inputs of these gate circuits G1 to G4.
- each of the gate circuits G1 to G4 has the operation control signal when the operation control signal ACT is set to an inactive level such as a low level (logic 0). Regardless of the other input signal different from ACT, the output signal is set to high level (logic 1), and no DC current is generated in each of the gate circuits Gl and G2. That is, in this embodiment circuit, the operation control signal ACT is set to an activation level such as a high level (logic 1) at a timing when identification information is required.
- each of the gate circuits G1 to G4 performs an operation as an inverter circuit in which an inverted signal is formed in response to the other input signal different from the operation control signal ACT.
- Gate circuit G1 consists of N-channel MOSFETs Q1 and Q3 connected in series between output node Z and circuit ground potential VSS, and P-channel MOSFE TQ2 connected in parallel between output node N1 and power supply voltage VDD. And Q4.
- the gates of the MOSFETs Q1 and Q2 are connected in common Input 1 of X.
- the gates of the MOSFETs Q3 and Q4 are connected in common and used as the second input Y.
- the input Y and output Z are connected in common, although there is no particular limitation.
- the other gate circuits G2 to G4 are composed of the same circuits as above.
- the gate circuits G1 to G4 are configured to have the same characteristics within a practically controllable range in designing and manufacturing a semiconductor integrated circuit. .
- a technique for making a plurality of gate circuits have the same characteristics will be briefly described below. It will be understood that in the gate circuit G1 G4, the characteristic logic threshold is generally determined by the P-channel MOSFET and the N-channel MOSFET that compose it. From this point of view, it can be understood that a CMOS gate circuit with the same characteristics can be configured by MOSFETs having the same ratio W / L of channel width W and channel length L but different sizes. However, the influence on the electrical characteristics due to the manufacturing variation of the semiconductor integrated circuit device is different for elements of different sizes.
- each of the plurality of gate circuits G1 to G4 which are powerful, preferably includes a mutual element, that is, a P-channel MOSFET and an N-channel MOSFET.
- a mutual element that is, a P-channel MOSFET and an N-channel MOSFET.
- Each other has the same structure and the same size. Needless to say, these devices are manufactured according to the characteristics of a semiconductor integrated circuit in which the same devices are manufactured together under the same process.
- the plurality of gate circuits G1 to G4 are equally affected by manufacturing variations such as variations in processing dimensions in manufacturing semiconductor integrated circuits, variations in thickness of various layers, and variations in impurity concentration. .
- the determination output of the logic threshold values of the two gate circuits G1 and G2 is output from the gate circuit G2.
- the determination signal is amplified by the subsequent gate circuits G3 and G4 to obtain a CMOS level binary signal.
- This binary signal is used as 1-bit identification information or an authenticator 1020 as described later. Therefore, strictly speaking, the gate circuits G3 and G4 simply perform an amplification operation, so that the P-channel MOSFETs and the N-channel MOSFETs have the same structure as each other, like the gate circuits G1 and G2.
- it is configured with the same structure and the same size mainly from the viewpoint of circuit design.
- the cause of variation in the logic threshold of the gate circuit is the MOS transistor characteristics It may be considered that the variation of the is dominant.
- the causes of variations in MOS transistor characteristics include the gate width of the MOS transistor, the gate insulating film thickness, the conductivity-determining impurity concentration and its distribution, and the like. These variations can be divided into macro and micro parts.
- the macro part is the gate width variation among multiple wafers in the same lot.
- the variation in the micro portion is mainly taken into consideration, and the variation in the elements arranged at relatively close positions was examined. Such micro variations are observed as randomly occurring between relatively close elements.
- the variation in the logic threshold value of the gate circuits Gl and G2 in FIG. 25 is considered to be random.
- Such variations in characteristic characteristics of semiconductor elements are used as unique identification information.
- the variation in the logic threshold can be regarded as the variation of the N-channel MOS transistor plus the variation of the P-channel MOS transistor.
- the range of variation becomes wider, and it is possible to effectively generate an identification number or identification information.
- the identification information generation circuit of FIG. 25 by setting the operation control signal ACT to the high level, the identification information (identifier consisting of n bits such as the multiple force DO—Dn—1 of the basic circuit 1010). Or an authenticator).
- the N-channel MOSFET Q1 in FIG. 26 when the circuit is in a stopped state, that is, when the operation control signal ACT is at a low level, the N-channel MOSFET Q1 in FIG. 26 is turned off, and the through current generated by connecting the input Y and the output node X Is suppressed.
- the advantage of using a NAND circuit as a gate circuit is that it is a standard element of a CMOS logic LSI, so it does not limit the products to be applied. In other words, circuit design is easy because it consists of a complete logic description type circuit.
- the operation control signal ACT is the force supplied to the gate of Q1 of the series N-channel MOSFET. Instead, the operation control signal ACT is supplied to the gate of N-channel MOSFET Q3, and the output node Z May be connected to the gate of Q3 of the N-channel MOSFET.
- What is important in the transistor level circuit description is the signal connection position of the MOSFET in each NAND element.
- the outputs of the gate circuits G1 to G4 that is, the potentials of the nodes Nl, N2 and N3 automatically become the power supply voltage. Therefore, it is possible to prevent fluctuations in characteristics due to NBTI of the P-channel MOSFET to which these signals are connected.
- a MOS transistor may fluctuate undesirably due to electric field stress whose threshold voltage depends on electric field strength and temperature.
- NBTI Negative Bias
- Temporal Instability is a phenomenon that appears prominently in P-channel MOSFETs.
- a method is often used in which the voltage applied to the gate of the PMOS is set to a high voltage during non-target times.
- the logic threshold value judgment operation is performed according to the high level of the operation control signal ACT, and the power control signal ACT is set to the low level and the P channel type is set in the case other than the logic threshold value judgment operation.
- the gate of the MOSFET is a fixed voltage so as to supply a power supply voltage.
- the gate, drain, source, and substrate (channel) all have the same potential equal to the power supply voltage, and fluctuations in the logic threshold due to the aging of the MOSFET are minimized. This is particularly effective in obtaining identification information by combining the output signals of the basic circuits as described above.
- the P-channel MOSFET Q2 and the like to which the low level of the operation control signal ACT is supplied in the stop state are turned off when identification information is generated in which the operation control signal ACT is set to the high level. It is not involved in information generation operations. For this reason, the stop state becomes longer, and even if the logic threshold value fluctuates due to aging of the MOSFET, there is virtually no problem.
- the gate circuits G3 and G4 that operate as an amplifier circuit do not need to be set as described above, but it is easy to use the same gate circuits G1 and G2 in terms of circuit design or element layout. This is advantageous in hiding the existence of the identification information generation circuit 1000 as will be described later.
- NOR gate may be used instead of the force NAND that forms a basic circuit using a NAND gate.
- a basic circuit Is activated when the operation control signal ACT is at low level (logic 0).
- NBTI the deterioration phenomenon caused by the electric field stress called NBTI is particularly remarkable in the P-channel MOSFET.
- other devices such as polysilicon FETs and organic transistors, if the degradation phenomenon is significant not in the P-channel type but in the N-channel type, it is desirable to use a NOR gate. Les.
- the NAND gates G2, G3, and G4 in each basic circuit are always connected to the power supply VDD by connecting the common control signal ACT connected to the power supply VDD (logic 1).
- the basic function of this embodiment does not change.
- FIG. 27 shows a block diagram of another embodiment of the identification information generating circuit used in the present invention.
- the basic circuit (element circuit) 1020 shown in Fig. 28 is arranged in a matrix like M X N pieces.
- a basic circuit 1020 shown in FIG. 28 is connected in series, and a NAND circuit GO selected by a row selection signal R0 or the like and a row selection circuit 1021 including a clocked inverter circuit CN0 are provided at its output section.
- the basic circuits 1020 constituting each of the M rows are selected in common by a column selection signal CO-CM-1 formed by a column decoder.
- One of the N basic circuits arranged in the row direction is selected by a row selection signal R0-RN-1 formed by the row decoder 1023.
- the row selection signal R0-RN-1 is also used as a selection signal for the row selection circuit 1021 including the NAND gate circuit GO and the clocked inverter circuit CN0.
- the output signals of the N clocked inverter circuits are connected in common and selected.
- the output signal of the clocked inverter circuit corresponding to one row is transmitted to the NAND gate circuit G11.
- a clock CLK is supplied to an M-ary counter 1024 through a NAND gate circuit G10 whose gate is controlled by an operation control signal ACT and an inverter circuit INV10.
- the M-ary counter 1024 performs a count operation of 0 to 1 in response to the clock CLK, and the column decoder 1022 that receives a powerful count output sets the C0 CM-1 to A selection signal is formed and the output signal of the basic circuit 1020 is output serially.
- the carry signal of the M-ary counter 1024 is supplied to the N-ary counter 1025, the N-ary counter 1025 performs a counting operation corresponding to one rotation of the M-ary counter 1024.
- the M basic circuits 1020 arranged in the row direction are read, the row selection is switched, and the N basic circuits 1020 are read until the 0th row force RN—the first row. Overflow is carried out.
- the M X N bit identification information D can be output through the gate circuit Gl 1 and the inverter circuit INV11 in the M X N cycle.
- FIG. 28 shows a specific circuit diagram of an embodiment of the circuit element shown in FIG.
- a gate circuit G5 for providing a row / column selection function and a gate circuit G6 operating as an inverter circuit are added to the gate circuits G1 to G4 shown in FIG.
- a column selection signal Ci and a row selection signal Ri are supplied to two inputs of the NAND gate circuit G5.
- the gate circuit G3 is supplied with the output signal Di of the previous basic circuit in the row.
- the unselected basic circuit performs the operation of transmitting the signal Di from the previous stage input through the gate circuits G3 and G4 as the output signal Di + 1 as it is.
- only one basic circuit in which the row and column are selected is set to the above-described operating state and output.
- the clocked inverter circuit CN in FIG. 27 is connected in series between the power supply voltage VDD and the ground potential VSS of the circuit, P-channel M ⁇ SFETQ11, Q12 and N-channel M ⁇ SFETQ14. Q13 force is composed.
- the gates of P-channel MOSFET Q11 and N-channel MOSFET Q13 are connected in common to serve as input terminal A.
- P channel Child B The control signal supplied from the terminal C is supplied to the gate of the N-channel MOSFET Q14, and the control signal is inverted by the inverter circuit INV12 and supplied to the gate of the P-channel MOSFET Q12.
- the clocked inverter circuit CN in FIG. 29 may have a configuration in which a transfer gate is provided at the output portion of the CMOS inverter circuit.
- FIG. 30 is a schematic waveform diagram for explaining an example of the operation of the identification information generation circuit of FIG.
- the clock CLK is input while the operation control signal ACT is at the high activation level
- the column selection signal CO—CM—1 is output from the column decoder accordingly.
- the row selection signal R0 of the 0th row is set to the selection level, so that the output signal of the basic circuit of the 0th row is changed to the column selection signal C0—CM—1. Correspondingly output serially.
- the N-ary counter When the basic circuit on the 0th row is read, the N-ary counter performs a counting operation of +1 by the carry signal, and the first row R1 is selected instead of deselecting the 0th row R0. To. In this way, the basic circuits up to the N-1st line are read sequentially. The number of cycles required to select all M X N basic circuits (unit identification circuits) is M X N times.
- identification information generating circuit 1000 random identification information can be obtained automatically only by incorporating a gate circuit or the like into a semiconductor integrated circuit and manufacturing it by a normal process. This eliminates the need to write the identification number one by one as in the prior art 1, and has the first feature that it can be manufactured at a very low cost.
- the identification information generating circuit 1000 has a second feature that it is substantially impossible to decode. In other words, it uses the micro-element variation of the threshold voltage of the gate circuit as described above appropriately, and there is a characteristic circuit pattern corresponding to the identification number as in Prior Art 1. It is impossible to decipher from Shinare. And the existence location is also composed of a gate circuit, so it is difficult to decipher the existence location by using a normal logic circuit. If only the chip is taken out in order to decode the circuit pattern, mechanical stress, chemicals and plasma damage are added to the semiconductor chip in the process, and the element characteristics themselves are also changed. Fluctuates and becomes meaningless information even if it is output.
- the powerful identification information generation circuit 1000 is used for the following prepaid force and its payment system and electronic key, thereby realizing low-cost and safe transactions. You can get a prepaid card and its payment system and electronic key
- FIG. 1 shows a block diagram of an embodiment of an IC prepaid card settlement system according to the present invention.
- a typical use form regarding an IC prepaid card and its settlement system is shown.
- a user 126 who wants to receive a specific service such as admission of an event or purchase of a product inserts the IC prepaid card 120 according to the present invention into the IC card reader 121, thereby Using the communication means such as the above, the authentication is received by the IC prepaid card management company 123 and the service is provided.
- the card management company 123 in cooperation with a credit company (not shown), can perform cash settlement if the credit is withdrawn at the stage when the strength and credential are established.
- the outline of the authentication procedure for the IC prepaid card 120 will be described as follows. ⁇
- the card management company 123 uses the identification information (authentication) recorded in the integrated circuit device (semiconductor chip) provided with the identification information generation circuit 1000 mounted on the IC prepaid card 120 with respect to the IC card reader 121.
- Child Request 124.
- the card reader 121 returns the authenticator 124 to the card management company 123 via the Internet 122.
- the card management company 123 verifies the authenticator 124 against the registered identification information 125 that is preliminarily registered, and when the verification is successful, sends an authentication response to the card reader 121. As a result, the user 126 can receive the service.
- One service is provided for each of the above-mentioned authenticators 124. Once authentication and service are provided, the authenticator 124 loses the right to receive the provision of the service after strong authentication. .
- FIG. 2 shows a block diagram of one embodiment of an integrated circuit that generates the authenticator of FIG.
- a control signal 20 is generated in response to a request for the control input 10 input to the control circuit 100 in the integrated circuit 01, and the authenticator 30 is generated from the authenticator generation circuit 101 by the control signal 20.
- the authenticator 30 is output through the output circuit 102.
- the authenticator generation circuit 101 includes an identification information generation circuit 1000 as shown in FIG. 25 or FIG.
- authenticator In the following specification of the present application, what is called the authenticator is referred to as “authenticator” or “identifier” depending on the purpose.
- the “authenticator” and “identifier” are both information generated from the authenticator generation circuit (identification information generation circuit 1000) 101.
- the properties and characteristics are the same.
- the “identifier” is used to mean information given to an integrated circuit or a device on which the integrated circuit is mounted so as to distinguish it from other devices.
- “authenticator” means that the owner of a device equipped with the authenticator has the qualification or right to receive a specific service with the person providing the service in advance. It is used in the sense of information to prove that
- FIG. 3 shows a typical configuration diagram of an integrated circuit device on which the integrated circuit 01 is mounted.
- the integrated circuit 01 constitutes the integrated circuit device 110 alone or together with another integrated circuit 02.
- the input / output and control circuit 130 generates a control signal 10 to the integrated circuit 01 by a signal given from the external connection electrode 132 of the integrated circuit device 110, and outputs the output 50 of the integrated circuit 01 to the outside or other Tell the integrated circuit 02.
- FIG. 4 shows a typical configuration diagram related to an IC prepaid card among the inventions disclosed in the present application.
- the integrated circuit device 110 according to the present invention is mounted on a base material (resin or the like) of the IC prepaid card 120 and exchanges electrical signals with the outside through the electrodes 112.
- the IC prepaid card 120 shows a communication method via the electrical contact 112, but is not particularly concerned with the method, for example, a non-contact method in which an antenna is formed on the base material.
- a prepaid card such as a public telephone card (hereinafter referred to as a "telephone card")
- a telephone communication company When a general user purchases the telephone card, The user can use the public telephone up to the purchase amount.
- bus use cards such as buses and trains
- convenience store prepaid cards Similar to the telephone card, there are bus use cards such as buses and trains, and convenience store prepaid cards.
- telephone cards that are widely used in Japan apply a magnetic material to a resin sheet and magnetically record data such as the amount used on the magnetic material.
- alteration of the magnetic data or forgery of the card itself is difficult. It cannot be said that it is relatively easy and safe, and it is difficult to issue a card with a high usage limit.
- so-called IC prepaid cards that use integrated circuit devices (ICs), which have a low risk of tampering and counterfeiting, are also popular.
- IC prepaid cards have the problem of high manufacturing costs compared to magnetic cards.
- the present invention is effective in solving both the prepaid card and the IC prepaid card.
- the objects and effects of the present invention relating to the integrated circuit 01 will be understood based on the following embodiments relating to an inexpensive and highly secure IC prepaid card.
- FIG. 5 is an explanatory view of a typical manufacturing process related to the IC prepaid card 120.
- the integrated circuit device 110 on the wafer 150 that has completed the semiconductor manufacturing process is inspected for an electrical function and the like in the IC inspection process 151, and at the same time, from the authenticator generation circuit 101 in the integrated circuit 110. 30 is read.
- the authenticator 30 is stored in the information storage device 155 as a registered authenticator 154 from an IC inspection device (not shown) in the IC inspection step 151.
- the integrated circuit 110 that has undergone the IC inspection process 151 is processed into the IC prepaid card 120 by an assembly process 152.
- the IC prepaid card 120 is then subjected to a final inspection in a card inspection step 153.
- the authenticator 101 is stored in the authentication information storage device 155 from the card inspection device.
- the registration authenticator 154 is collected from the IC inspection process or card inspection process and the force inspection process 153, but the acquisition and the authentication information storage device 155 can be obtained by either one of them. Can be stored in The IC prepaid card 120 that has passed the card inspection step 153 is shipped as a non-defective product.
- FIG. 6 shows an explanatory diagram of a usage pattern of an embodiment of the IC prepaid card according to the present invention. This figure shows in more detail the processing method that is effective for authentication with the card management company using the IC prepaid card 120 manufactured as described above.
- the authenticator 30 in the IC prepaid card 120 inserted into the card reader 121 is sent to the authentication processing system 163 of the card management company 123, and the authentication information managed in the authentication processing system 163
- the database 160 is queried.
- the authentication information data base 160 includes a plurality of authentication information records 163 including an authentication registration information field 161 and an exhaustion flag field 162.
- the information of the authentication registration information finale 161 is the registration authenticator 154 of FIG.
- the total number of information records 153 matches the total number of IC prepaid cards 120 shipped.
- the verification performed in the authentication processing system 163 includes "a verification process” for the authentication information record 163 in the authentication information database 160 that matches the code of the authenticator 30, and the verification authentication information record
- the state of the exhaust field 162 in 163 is “update process”.
- the “collating process” includes calculating the distance between the authenticator 30 and the codes of the authentication registration information 154 in all the authentication registration information fields 161 registered in the authentication information database 160, and The authentication information record 163 including the authentication registration information 154 having the smallest Hamming distance is selected, and the “updating process” is a logic when the exhaustion field 162 of the collated authentication information record 163 is logical 0. It should be updated to 1 and remain at logic 1 when at logic 1.
- the exhaustion flag finale 162 is all logic 0 at the time of registration, and the logic 0 is "not verified", that is, the user 126 who owns the IC prepaid card 110 is entitled to receive a specific service.
- Logic 1 means “verified”, that is, the user 126 has used up the right.
- the authentication information record 163 in which the exhaustion flag field becomes logic 1 is not subject to the next verification. In the inquiry, if the exhaust field force S is “verification is not completed”, the authentication processing system 163 notifies the card reader 121 of authentication.
- the Hamming distance refers to two symbol sequences (xl, ⁇ 2, ⁇ 3 ⁇ ⁇ ) and (yl, y2, y3---yn). The total number of places.
- the authenticator 30 generated by the authenticator generation circuit 101 shown in FIG. 2 is completely random (random), and has the property that there is no correlation between the authenticator generation circuits 101.
- the probability distribution of the Hamming distance among the innumerable identifiers 30 can be estimated.
- the minimum Hamming distance between the plurality of authenticators 30 can be estimated from the probability distribution.
- the authenticator 30 is subject to fluctuations in some of the bits that constitute the operating principle.
- different bits hereinafter referred to as “variable bits”
- the two It is difficult to verify the identity of the authenticator by an exact match of the bits of both authenticators.
- the total number of variable bits included in the authenticator 30 is smaller than the minimum Hamming distance, it is possible to distinguish between the same authenticator 30 and different authenticators 30.
- FIG. 7 shows a block diagram of an embodiment different from the integrated circuit 01 shown in FIG. 2 relating to the integrated circuit device in the IC prepaid card 110.
- the integrated circuit 01 generates a single authenticator 30.
- the integrated circuit 03 generates a plurality of authenticators.
- a control signal 166 is generated in response to a request for the control input 164 input to the control circuit 165 in the integrated circuit 03, and one of the plurality of authenticator generation circuits 101 selected by the control signal 166 is authenticated.
- the authenticator 169 is output through the output circuit 168.
- the authentication force of one authenticator generation circuit 101 may be divided so that the force applied is also a plurality of authenticator generation circuits.
- the integrated circuit 03 By mounting the integrated circuit 03 on the integrated circuit device 110 as shown in FIG. 3 and mounting it on the IC prepaid card 120 as shown in FIG. 4, the IC prepaid card 120 can be used like a coupon ticket. Can do.
- the objects and effects of the invention relating to the integrated circuit 03 will be understood from the authentication processing method relating to the IC prepaid card 170 on which the integrated circuit 03 is mounted.
- FIG. 8 shows a configuration diagram of an embodiment of a method for processing authentication of the IC prepaid card 170 on which the integrated circuit 03 is mounted.
- the first authenticator (i) of the authenticator 171 in the IC prepaid card 170 inserted into the card reader 121 is sent to the authentication processing system 172 of the card management company 123, and in the authentication processing system 172 It is checked against the registration authenticator 154 in the authentication registration information field 176 in the authentication information database 174 managed.
- the authentication information database 174 includes an authentication registration information field 176 and an exhaustion flag flag. It consists of multiple authentication information records 175 consisting of fields 177.
- the information in the authentication registration information field 176 is authentication registration information 154 obtained by the same process and method as in FIG. 5.
- the total number of the authentication information records 176 is the total number of shipments of the IC prepaid card 170. And the number of authenticators 171 included in the IC prepaid card 170 respectively.
- the verification in the authentication processing system 172 includes "a verification process" of the authentication information record 175 in the authentication information database 174 that matches the code of the authenticator (i), and the verification authentication information. It consists of “updating” the state of the exhaust field 177 in the record 175.
- the “matching step” means calculating a Hamming distance between the authenticator (i) and the codes of the authentication registration information 154 of all the authentication registration information fields 176 registered in the authentication information database 174, and The authentication information record 176 including the authentication registration information 154 having the smallest Hamming distance is selected, and the “updating process” means that when the exhausted field 177 of the verified authentication information record 175 is logic 0, It should be updated to 1 and remain at logic 1 when at logic 1.
- the exhaustion flag finale 177 is all logical 0 at the time of registration, and the logical 0 is “not verified”, that is, the user 126 who owns the IC prepaid card 110 has the right to receive a specific service.
- Logic 1 means “verified”, that is, the user 126 has used up the right. Further, the authentication information record 175 in which the exhaustion flag field is 1 is not subject to the next verification.
- the authentication processing system 172 notifies the card reader 121 of authentication. However, if the flag field is already exhausted as shown in the figure, the authentication processing system 172 and the card reader 121 are notified of the authentication refusal, and the notification is made.
- the received IC prepaid field 170 sends an authentication processing system 172 next to the authentication code in the authentication code 171 to the authentication processing system 172.
- the data in the authentication registration information field 176 of the authentication information record 175 in which the exhaustion field is logical 0 in the authentication information database 174 managed in the authentication processing system 172 is checked again. If the authentication information record 175 is verified by the verification, the authentication information record
- the exhaust flag field 177 in code 175 is set to logic 1.
- the authentication processing system 172 After the verification is established, the authentication processing system 172 notifies the card reader 121 of authentication. In addition, there is no limit to the number of authenticators 171 and integrated circuits 03 included in one IC prepaid card, and multiple authenticators 171 are authenticated in a single authentication operation, and user 126 is an expensive service. Can also be provided.
- FIG. 9 shows a configuration diagram of another embodiment of the authentication processing method of the IC prepaid card 170 on which the integrated circuit 03 is mounted.
- the first authenticator (a) of the authenticator 171 in the IC prepaid card 170 inserted in the card reader 121 is used as an identifier for identifying the IC prepaid card 170, and the authentication processing system 183 of the card management company 123 is used. And is collated with information in the identification information field 186 of the card identification registration information record 185 in the authentication information database 184 managed in the authentication processing system 183.
- the card identification record 185 is composed of a plurality of card identification records 185 including a registration identifier field 186 and an available authentication number field 187. Each of the card identification records 185 is further subordinate to a plurality of registered authenticator fields 190.
- the registration identifier field 186 and the registration authenticator field 190 are authentication registration information 154 obtained by the same process and method as in FIG. 5, and the total number of the card identification records 185 is the same as that of the shipment.
- the total number of the IC prepaid card 170, and the total number of the registration authenticator field 190 is obtained by subtracting the total number of the IC prepaid card 170 shipped from the total number of the authenticators 171 included in the shipped IC prepaid card 170. Matches the number. Since the collation is the same as the contents of the previous embodiment, the description is omitted.
- the number of available authentication field 187 is the total number of authenticators 171 in the IC prepaid card 170 at the time of registration, and 0 or more is the number of users 126 who own the IC prepaid card 170. There is a right to receive the specific service as many times as the number of available authentications field 187, and 0 means that the user 126 has used up the right. However, if the usable authentication number field 187 is already 0, the authenticator 171 has been exhausted, and the usable authentication number field 187 The card identification record 185 that has become SO is not subject to verification.
- the authentication processing system 183 sends the value (indx) of the available authentication number field 187 of the force identification registration information record 185 to the IC prepaid card 170 described above. Forward.
- the IC prepaid card 170 receiving the (indx) extracts (indx) —the first position authenticator (2) from the top of the authenticator 171 and sends it to the authentication processing system 183.
- the authentication processing system 183 matches the authenticator (189) with the authenticator 189 subordinate to the card identification record 185.
- the number in the usable authentication number field 187 in the card identification record 185 is set to _1, and the IC prepaid card 170 is Notify authentication.
- FIG. 10 shows a block diagram of an embodiment of an authenticator generation circuit according to the present invention. This embodiment eliminates the influence of the change of the authenticator 30 related to the authenticator generation circuit 101 constituted by the identification information generation circuit 1000 as shown in FIG. 25 and FIG. 27, and further authenticates difficult to falsify. Is directed to the generator circuit.
- the outline of the authenticator generating circuit will be described.
- the first authenticator at a certain point of time outputted from the authenticator generating circuit 101 is temporarily stored in the nonvolatile memory (PROM) 401, and the memory of the memory is stored.
- PROM nonvolatile memory
- the second authenticator is always used, and the first authenticator and the second authenticator are compared and falsification has occurred. It is necessary to prepare a method for detecting the self.
- a control signal 411 is generated, and an authentication code 412 is generated from the authentication code generation circuit 101 by the control signal 411.
- (Non-volatile memory: read-only memory capable of electrical batch writing) 401 stores an authenticator 412.
- the output 413 of the PROM 401 storing the authenticator 412 is output to the output terminal 50 through the output circuit 403.
- an authenticator can be recorded in a writable memory means that if the reverse is turned back, the possibility of falsification of the authenticator by rewriting the contents of the memory, etc. is recalled by itself. Loses the advantage of the authenticator generation circuit that is targeted by attackers (hereinafter referred to as “attacker”) and cannot be tampered with in the first place Resulting in.
- the comparison circuit 402 calculates the hamming distance between the authenticator 412 and the output 413 of the PROM 401 in which the authenticator 412 is stored. If the Hamming distance is equal to or greater than a specified value, the detection result 414 indicates that the output circuit 403 The output 50 is forcibly disabled.
- the worst possible dangerous situation is that an attacker can obtain a method that allows the attacker to selectively and freely change the value of the PR OM401.
- the attacker can only change the value of the PROM 401 within the specified value by the operation of the comparison circuit 402.
- the hamming distances of significant authenticator values are far away from each other, and the value of the authenticator is changed to another significant authenticator by slightly changing the authenticator value. It is difficult to apply.
- the attacker can only change the value of the authenticator generation circuit within the specified value by the action of the comparison circuit, as in the attack of 1). .
- the operating principle of the authenticator generation circuit uses subtle characteristic variations of the MOS transistor element, in order to change the value of the authenticator generating circuit, for example, light, heat, ions, etc. It is necessary to take a method of giving energy, which is more difficult than the attack on PROM 401 described in 1) above, and even more difficult to change to an arbitrary value.
- the attack method 2) requires a considerable amount of energy for the act of falsification with low tampering selectivity.
- attack method of 3) is a combination of the above 1) and 2). Perhaps the attacker changes the value of the authenticator of the authenticator generation circuit by 2), and then by 1) It seems that the method of avoiding the detection of the comparison circuit is taken. However, attack method 3) above However, it is not different from 2) in the difficulty of arbitrarily changing the value of the authenticator generation circuit. That is, the integrated circuit 04 can generate an authenticator for constructing a highly secure system against the tampering attacks by the attackers 1) to 3) that can be assumed.
- the objects and advantages of the invention relating to the integrated circuit 04 will be better understood in other embodiments described herein.
- FIG. 11 is a block diagram showing another embodiment of the semiconductor chip used in the present invention. This embodiment is directed to another integrated circuit on which the integrated circuit 04 is mounted.
- integrated circuit 05 RAM 504, arithmetic unit 505 and hash function 506 are added to integrated circuit 04. Has been. An outline of the purpose and effect of the invention relating to the integrated circuit 05 will be described. It is possible to authenticate an integrated circuit or the like on which the integrated circuit 05 is mounted.
- a control signal 511 is generated in response to a request for the control input 510 input to the control circuit 500 in the integrated circuit 05, and an authenticator 513 is generated from the integrated circuit 04 by the control signal 511.
- the authenticator 513 is a value stored in the PROM 401 in the integrated circuit 04 and shows the same value every time a read operation is performed.
- the RAM 504 is a temporarily readable / writable memory, and temporarily stores an external reference value 515 given to the control circuit 500 from the control signal 510.
- the computing unit 505 performs an exclusive OR operation between the output value 513 of the integrated circuit 04 and the output value 516 of the RAM 504, and the NO / SH function 506 is the value of the output value 517 of the computing unit 500.
- the hash value is calculated, and the output circuit 503 outputs the output value 518 of the hash function to the output terminal 520.
- FIG. 12 shows a manufacturing process of an IC prepaid card 470 in which the integrated circuit 05 is mounted on an integrated circuit device as shown in FIG. 3 and mounted in the same manner as the IC prepaid card as shown in FIG. A schematic diagram is shown.
- the integrated circuit device 460 on which the integrated circuit 05 on the wafer 450 on which the semiconductor manufacturing pre-process has been completed is inspected for electrical performance in the IC inspection process 461 and processed into the IC prepaid card 470 in the assembly process 462.
- the Thereafter, the IC prepaid card 470 is subjected to a final inspection in a card inspection process 463.
- the card inspection In the step 463, the output value 465 of the reference value generator 474 and the hash value 466 obtained by the hash function in the integrated circuit 05 mounted on the IC prepaid card 470 based on the output value 465 are illustrated. Acquired by a card inspection device that does not, and registers it in the authentication information storage device 467. The IC prepaid card 470 that has passed the card inspection process 463 is shipped as a non-defective product.
- the seed value 472 in a specific order (for example, the head) uses the hash value 473 generated by the seed key as an identifier of the IC prepaid force 470. Therefore, it is the same regardless of the IC prepaid card 470.
- FIG. 13 shows a detailed configuration diagram of the card inspection process 463.
- the IC prepaid card 470 (in this figure, the IC prepaid card 470 is mounted with an integrated circuit device on which the integrated circuit 05 is mounted, and the object and effect of the invention to be described here are
- the seed value 472 generated by the reference value generator 474 is input to (only the configuration necessary and sufficient for understanding is extracted and shown).
- the secret value is automatically generated by the integrated circuit 04 and cannot be known from the outside.
- the calculator 478 calculates an exclusive OR of the seed value 472 and the secret value 477.
- a hash value 473 is generated from the calculation result through the no-shake function 471. Even if the seed value 472 is the same, if the IC prepaid card 470 is different, the secret value 477 is different, and thus a hash value 473 having a completely different value is generated.
- the Due to the characteristics of the one-way hash function it is impossible to reversely calculate the seed value 472 and the concealment value 477 from the no-shake value 473 even if the IC prepaid card 470 can be obtained.
- FIG. 14 shows a configuration diagram of an authentication processing method of the IC prepaid card 470 on which the integrated circuit 05 is mounted.
- the IC prepaid force 470 inserted in the card reader 121 applies a service authentication request to the authentication system 660 in the card management company 123.
- the card management company 123 sends an authenticator number (indxO) and an identification reference value R0 to the IC prepaid card 470 in order to identify the IC prepaid card 470.
- the authenticator number (indxO) is used to identify the IC prepaid card 470 out of the authenticator 652.
- the reference value R0 is a value common to all other IC prepaid cards 470.
- the IC prepaid card 470 that has received the authenticator number (indxO) and the identification reference value R0 calculates the authentication value 651 of the number designated by the authenticator number (indxO) and the reference value RO.
- the hash value HO is obtained by applying the result 657 calculated in 656 to the hash function, and the system 660 is answered.
- the authentication system 660 collates the hash value H0 with the card identifier record 661 in the authentication information database 664. Since the collation is the same as the contents of the previous embodiment, the description is omitted.
- the authentication information database 664 includes a plurality of card identifier records 661 including a registration identifier field 662 and a usable authentication number field 666. Each of the card identification records 661 is further subordinate to a plurality of registered authenticator records 667 including a reference value field 669 and a hash value field 670.
- the reference value field 669 and the hash value field 670 are the reference value 465 and the registered hash value 466 acquired in the card inspection step 463 of FIG. 12, and the total number of the card identification records 661 is shipped.
- the total number of the IC prepaid card 470, and the total number of the registered authenticator records 667 is the total number of the IC prepaid cards 470 shipped from the total number of the authenticators 651 included in the shipped IC prepaid card 470. It matches the number obtained by subtracting.
- the number of available authentication fields 666 is the total number of authenticators 652 in the IC prepaid card 470 at the time of registration, and the number of zero or more is the number of users 126 who own the IC prepaid card 470. There is a right to receive the specific service as many times as the value of the usable authentication number field 666, and 0 means that the user 126 has used up the right. If the usable authentication number field 666 is already 0, the authenticator 652 is exhausted, and the card identification record 661 for which the usable authentication number field 666 is 0 must be the target. Les.
- the authentication processing system 660 includes a value (indx) of the usable authentication number field 666 of the card identifier record 661, and (Indx) —transfers the value R of the reference value field 669 in the first registered authenticator record 667 to the IC prepaid card 470.
- the IC prepaid card 470 that has received the (indx) and the reference value R reads (indx) —the first position authenticator from the beginning of the authenticator 65 2, and the authentication value by the computing unit 656 And a hash value H obtained by multiplying the hash function 658 of the exclusive OR result of the value and the reference value R is sent to the authentication processing system 660.
- the authentication processing system 660 that has received the hash value H includes the registration authenticator record 667 corresponding to the reference value R of the reference value field 669 in the registration authenticator record 667 sent to the destination of the hash value H. Confirm that the value matches the value in the hash value field 670.
- the numerical value of the usable authentication number field 666 in the card identification record 666 is set to 1, and the IC prepaid card 470 is notified of authentication.
- Information of the authenticator itself is exchanged between the IC prepaid card 470 and the authentication processing system 660 so that the power of the IC prepaid card 470 and the power of the processing method can be understood. Therefore, it is possible to realize an authentication system that is highly secure against counterfeiting and tampering.
- the present authentication system can reuse the same IC prepaid card 470 by updating the value of the reference value field 669 and the value of the hash value field 670 in the registered authenticator record 667. .
- the IC prepaid card 470 is inserted into a dedicated IC card renewal terminal, newly charged, and a new reference value and hash value are registered in the database 664 of the authentication processing system 660 of the card management company 123. In this way, even if the same IC prepaid card is used, forgery of the IC prepaid card and impersonation of the user by a third party can be prevented.
- FIG. 15 shows a block diagram of an embodiment in which an electronic key using the identification information generating circuit is applied to plaintext encryption / decryption.
- the purpose of the present invention relating to the symbol * decoding circuit and the outline of the effect will be described as follows.
- the cipher text is used for encryption. Therefore, decryption is not possible without using the encryption circuit having the secret key (electronic key).
- the value of the encryption key used in the decryption circuit can be assigned or written from outside the decryption circuit. It is characterized by the fact that it is not necessary to program the memory element or the like and the value cannot be read out, and it is possible to construct an extremely secure cryptographic system.
- the integrated circuit 700 includes an encryption circuit 701 and a decryption circuit 702.
- the plaintext 704 is transferred to the ciphertext 706 using the secret key 703, and the ciphertext 706 is converted to the original plaintext 704 using the secret key 703. This is the same as plain text 705.
- the encryption circuit 701 and the decryption circuit 702 employ a common key system represented by DES and AES. Since DES can use the same device for encryption and decryption, the scale of the integrated circuit can be reduced.
- the secret key 703 is mainly generated by the integrated circuit 04. Therefore, the above-described safety effect can be obtained without risk of falsification or leakage of the secret key.
- FIG. 16 shows a configuration diagram of an embodiment of the encryption communication method or the specific service providing method using the electronic key according to the present invention.
- the electronic key of this embodiment is realized as a prepaid card on which the integrated circuit 700 is mounted.
- the ciphertext 712 is transmitted from the plaintext 710 using the function of the integrated circuit 710 mounted on the electronic key 713 provided in the form of prepaid or the like. Create Thereafter, the sender 711 sends the electronic key 713 and the ciphertext 712 to the information receiver 715.
- the encrypted ciphertext 712 uses a means 717 such as recording on a flexible disk or DVD, or transmitted via a network or the like, and the electronic key 713 uses a transfer means 716 such as manual delivery, mail, or home delivery.
- the receiver 715 uses the decryption function of the integrated circuit 700 mounted on the electronic key 713 to decrypt the ciphertext 712 to obtain the plaintext 714.
- the plaintext 714 cannot be obtained without the electronic key 713, so that the security is high. Further, since the sender does not know the value of the common key used for encryption, the ciphertext cannot be decrypted without the electronic key 713 itself. Here, it is assumed that the sender and receiver of information are different. In this case, the electronic key 713 is used as a key of electronic data obtained by encrypting important information.
- FIG. 17 shows a configuration diagram of another embodiment of the encryption communication method or the specific service providing method using the electronic key according to the present invention.
- Main examples of the embodiment shown in Fig. 16 The purpose was that sender 710 encrypted and sent important information to recipient 715.
- the important information in FIG. 16 is replaced with a key for encryption.
- the sender 720 common key 721, electronic key 713, encrypted common key 723, common key 725, receiver 726, transfer means 729, and transmission means 730 in FIG. It corresponds to hand 711, plaintext 710, electronic key 713, ciphertext 712, plaintext 714, receiver 715, transport means 716 and transmission means 717.
- the sender 720 and the receiver 726 are connected to the receiver 726 and the common key by the same procedure as in FIG.
- the plaintexts 722 and 728 are converted into ciphertext 731 by using the common key and the common key encryption method ⁇ decryptors 724 and 727. Can be exchanged.
- the electronic key 713, the common key 725, and the bag decryption device 727 are made into a plastic case like one integrated circuit device or a prepaid card. By incorporating it in 732, higher safety can be obtained. Further, the common key 721 and the key number ⁇ common key 723 may be plural as in the authenticator of the embodiment of the IC prepaid card instead of one.
- FIG. 18 shows a configuration diagram of still another embodiment of the encryption communication method or the specific service providing method using the electronic key according to the present invention.
- An example of a suitable usage method of this embodiment is that a record company distributes software content such as music and video to an authorized user via the Internet, for example. The effect will be better understood.
- the IC prepaid card 470 has a one-way hash function.
- the common key 750 is a hash value generated from the key type 752 by the hash function.
- the sender 751 registers the combination of the key type 752 and the common key 750 in advance in a database (not shown).
- the sender 751 encrypts the plaintext 753 by using the common key 750 and the decryption device 754.
- the receiver 756 obtains 759 the IC prepaid card 470, similarly obtains the Internet equality key type 752, and generates the common key 756 from the key type 752 using the IC prepaid card 470. This allows both parties to share the same common keys 750 and 755 in advance.
- the ciphertext 761 encrypted by the sender 751 using the common key is decrypted with the common key 755 using the trap decryption device 757 to obtain a plaintext 758.
- the sender 751 and the receiver 756 can be exchanged to exchange information bidirectionally.
- the integrated circuit device 740, the common key 755, and the decryption device 757 are combined into one integrated circuit device (IC prepaid card) 762. Safety can be obtained.
- FIG. 19 shows a block diagram of an embodiment of a method for using an electronic key according to the present invention. This embodiment is directed to the case where software content such as music and video is distributed via the Internet.
- a distributor who distributes various contents (1) registers the key type 752 and the common key 750 in a database (not shown) as advance preparation.
- the distributor (2) distributes the IC prepaid card 470 to general users.
- a user who (3) purchases the IC prepaid card 470 (4) uses the card reader 121 or the like to request (5) distribution of content to the distributor.
- the distributor receiving the request receives the IC prepaid card 470 possessed by the requesting user.
- the IC prepaid card 470 calculates (9) a hash value, which is the received reference value identification information, and (10) answers to the distributor.
- the distributor confirms whether the received identification information matches the reference value sent earlier, and if it is authorized S (ll) authentication, (12) To share the common key (13) Send the key type.
- the user who receives the key type (14) calculates a hash value that is a common key. As a result, the key can be shared by both parties and encryption communication is possible.
- the user requests (15) content using encryption.
- the distributor (16) encrypts the requested content using the common key and (17) distributes it to the user.
- the user decrypts the distributed content using the common key (18).
- the "encryption key” used for encryption and decryption (decryption) in encryption technology is the “encryption key” used for encryption and the “decryption key” used for decryption is completely " Must match.
- the combination of both keys is strictly defined as “encryption key” ⁇ “decryption key”. It is considered to be the concept of “match” in the sense). This is the iron rule and common sense of cryptography.
- the “encryption key” here is a “key having a mathematical meaning” in an encryption technology rather than a “key that represents a feature” in security technology or authentication technology.
- an encryption key is formed by an identification information generation circuit using micro-element variations in threshold voltage such as the gate circuit as described above, in order to always reliably extract certain information.
- a storage circuit such as a PROM.
- the inventor of the present application has devised a new encryption technique that breaks the common sense of the “signature key” in the encryption technique based on various studies and considerations related to the present invention. That is, a character string or a part of a number string constituting an “encryption key” as formed by an identification information generation circuit using micro-element variation in threshold voltage of the gate circuit or the like is changed slightly. Even an unstable “encryption key” can be used to decrypt information and ciphertext.
- FIG. 20 is an explanatory diagram showing an example of the identification information 800 formed by the identification information generation circuit shown in FIG. 25 or FIG.
- the identification information 800 due to the principle of the identification information generation circuit, part of bit information constituting the identification information 800 varies randomly. The amount of variation depends on the manufacturing process of the integrated circuit device on which the identification information generating circuit is mounted, but is a few percent. In other words, if the identification information is composed of K bits, this identification information includes “[K] X [average fluctuation amount]” fluctuation bits on average. In any case, the knowledge information 800 itself cannot be used as an “encryption key” used for the encryption technology as described above.
- FIG. 21 shows an explanatory diagram of an example of an electronic key such as an encryption key used in the encryption technique according to the present invention.
- a general “encryption key” of several tens to one hundred bits is used.
- FIG. 22 shows a schematic diagram of the basic concept of the principle of the cryptographic technique according to the present invention.
- the plaintext 812 is encrypted by the encryption device 811
- the composite block key 820 created based on the identification information 800 is used, the same number of ciphertexts 813 as the type of the composite block key 820 are obtained from the same plaintext 812. Generated. In the case of the above example, the number is 91,390.
- the decryption device 814 uses the decryption block key 821 to decrypt the ciphertext 813, it is decrypted if the decryption block key 821 is exactly the same as the composite block key 820.
- the 91 and 390 types of plaintext 815 are all the same as the original plaintext 812.
- the decryption block key 821 and the composite block key 820 are the same.
- the situation handled by the present invention is that only the identification information 800 is used as the source of the “encryption key” at the time of the encryption and decryption, both in the case of ⁇ ⁇ ⁇ and decryption. Therefore, there is no knowledge about the decryption block key 820 and the composite block key 821 that are substantially used.
- the identification information 800 which is a prime element of the "encryption key" changes its constituent bit information from the principle as described above.
- the key 8 20 and the composite block key 821 are rather premised on not being identical. However, if there are at least one composite block key 820 that is not affected by the fluctuation in the 91,390 types of composite block keys 820, it is possible to obtain a correctly decrypted plain 815.
- the identification information 800 includes variable bits at a certain rate. Therefore, some of the blocks 801 obtained by dividing the identification information 800 include some variable bits. For this reason, the 91,390 types of composite block keys 821 are not the ones that are all affected by fluctuations, but probabilistically the same as the composite block key 820 at the time of encryption. In other words, plaintext 1 to plaintext M in the decrypted plaintext 815 are correctly decrypted with the same composite block key 821 as the composite block key 820. Whether or not the data has been correctly decrypted can be confirmed by a text digest using a verification code or a hash value inserted in the plaintext 812 in advance.
- the block of the identification information 800 is affected by the variable bits. It is synonymous with 4 or more blocks 801 that are not present.
- the probability that the block 801 in the identification information 800 is less than 4 blocks not affected by variable bits is about 2 X 10— ⁇ I / SX IC ⁇ S, billion A fraction). In other words, there is a probability that there are only 500 billion pieces of identification information 800 that cannot be decoded at last, and it can be considered that decoding is practically possible in most cases.
- FIG. 23 shows a configuration diagram of an embodiment that is effective for an encryption method using the composite block key.
- the plaintext 834 is encrypted by the encryption device 835 using the common key 831 generated by the random number generator 830 to create a ciphertext 839.
- a composite key 833 is the composite block key 820 generated by the composite key generation circuit 832, and the common key 831 is a composite key encryption device 836 using the composite key 833, Generate 840.
- a combination of the ciphertext 839 and the encryption common key 840 is referred to as a composite key ciphertext 837.
- the ciphertext 839 is obtained by signing with a common key 831.
- the value of the common key 831 is generated artificially by the random number generator 830, and the common key 831 is signed by the composite key 833.
- the common key 833 is determined artificially by the identification information generation circuit in the composite key generation circuit 832. No one knows the true values of the two keys, and the composite key code sentence 837 cannot be decrypted unless the method described below is used.
- FIG. 24 shows an explanatory diagram of a method of decrypting the composite key ciphertext 837.
- the common key 853 necessary for decrypting the ciphertext 839 included in the composite key ciphertext 837 it is necessary to decrypt the encrypted common key 840.
- a composite key 851 is required, but the composite key 851 can only be generated by the composite key generation circuit 832 itself used for encryption. Therefore, a highly confidential and secure encryption system can be realized.
- a random number generation circuit 830 In order to realize an encryption method having the above-described features, a random number generation circuit 830, a composite key generation circuit 832, a composite key encryption device 836, and an encryption device 835 necessary for encryption are used. It is desirable that the necessary composite key decryption device 852, decryption device 857 and the common composite key generation circuit are built in an integrated circuit device or a plastic card.
- the identification information 800 is biased or periodic, the encryption method becomes extremely weak.
- the fact that the identification information generating circuit that generates the identification information 800 generates disordered identification information supports the actions and effects of the present invention.
- the advantage of using the identification information generation circuit is that it does not use a writable circuit element such as PROM, so it cannot be tampered with by rewriting, and cannot be manipulated artificially. There is no need for a process (can be realized with a standard CMOS process).
- the gate circuit can be replaced with an inverter circuit as shown in the second prior art.
- the CMOS gate circuit in order to reduce the power consumption, it is desirable to use the CMOS gate circuit as described above. I When an inverter circuit is used, it may be replaced with a clocked inverter circuit as shown in FIG. 29 in order to reduce the current consumption, and activated by an operation control signal.
- the present invention provides a prepaid card, its settlement system, and an electronic key that is provided with a service using a communication line such as a network, or a specific service provided by hand such as an admission ticket or a check. Can be widely used for what you receive.
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Description
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2006527635A JP4530229B2 (ja) | 2004-07-05 | 2004-07-05 | カード認証システム |
| PCT/JP2004/009534 WO2006003711A1 (ja) | 2004-07-05 | 2004-07-05 | プリペイドカードとその決済システム及び電子鍵 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/JP2004/009534 WO2006003711A1 (ja) | 2004-07-05 | 2004-07-05 | プリペイドカードとその決済システム及び電子鍵 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2006003711A1 true WO2006003711A1 (ja) | 2006-01-12 |
Family
ID=35782528
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2004/009534 WO2006003711A1 (ja) | 2004-07-05 | 2004-07-05 | プリペイドカードとその決済システム及び電子鍵 |
Country Status (2)
| Country | Link |
|---|---|
| JP (1) | JP4530229B2 (ja) |
| WO (1) | WO2006003711A1 (ja) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2010502068A (ja) * | 2006-08-22 | 2010-01-21 | ノキア シーメンス ネットワークス ゲゼルシャフト ミット ベシュレンクテル ハフツング ウント コンパニー コマンディトゲゼルシャフト | 認証方法 |
| US9183357B2 (en) | 2008-09-24 | 2015-11-10 | Panasonic Intellectual Property Management Co., Ltd. | Recording/reproducing system, recording medium device, and recording/reproducing device |
| JP2016063457A (ja) * | 2014-09-19 | 2016-04-25 | 株式会社東芝 | 認証システム、認証装置および認証方法 |
| US10574639B2 (en) | 2016-05-25 | 2020-02-25 | Panasonic Intellectual Property Management Co., Ltd. | Authentication apparatus utilizing physical characteristic |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10307867A (ja) * | 1997-05-06 | 1998-11-17 | Midei Shitei:Kk | プリペイド式集中管理決済システム及びその方法 |
| JP2002063518A (ja) * | 2000-08-21 | 2002-02-28 | Hitachi Software Eng Co Ltd | プリペイドカードおよびプリペイドカード処理装置 |
| JP2002163583A (ja) * | 2000-11-22 | 2002-06-07 | Ntt Data Corp | 電子取引方法、センタ及びプリペイドカード |
| JP2002184172A (ja) * | 2000-10-04 | 2002-06-28 | Rohm Co Ltd | データ記憶装置 |
| JP2002330122A (ja) * | 2001-04-27 | 2002-11-15 | Dainippon Printing Co Ltd | 通信システム |
| JP2003332452A (ja) * | 2002-05-17 | 2003-11-21 | Renesas Technology Corp | 半導体識別回路 |
| JP2003348065A (ja) * | 2002-05-23 | 2003-12-05 | Japan Datacom Co Ltd | データ分散保管システム |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP3874491B2 (ja) * | 1997-06-23 | 2007-01-31 | 大日本印刷株式会社 | プリペイドicカードシステムおよびプリペイドicカード |
| US6161213A (en) * | 1999-02-17 | 2000-12-12 | Icid, Llc | System for providing an integrated circuit with a unique identification |
| JP2001331750A (ja) * | 2000-05-23 | 2001-11-30 | Kazuo Sawatake | プリペイドカード照合システムおよび電子遊技管理システム |
| JPWO2002050910A1 (ja) * | 2000-12-01 | 2004-04-22 | 株式会社日立製作所 | 半導体集積回路装置の識別方法と半導体集積回路装置の製造方法及び半導体集積回路装置 |
| JP2004046754A (ja) * | 2002-07-16 | 2004-02-12 | Matsushita Electric Ind Co Ltd | Icカード認証システム及びicカード認証方法 |
-
2004
- 2004-07-05 JP JP2006527635A patent/JP4530229B2/ja not_active Expired - Fee Related
- 2004-07-05 WO PCT/JP2004/009534 patent/WO2006003711A1/ja active Application Filing
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH10307867A (ja) * | 1997-05-06 | 1998-11-17 | Midei Shitei:Kk | プリペイド式集中管理決済システム及びその方法 |
| JP2002063518A (ja) * | 2000-08-21 | 2002-02-28 | Hitachi Software Eng Co Ltd | プリペイドカードおよびプリペイドカード処理装置 |
| JP2002184172A (ja) * | 2000-10-04 | 2002-06-28 | Rohm Co Ltd | データ記憶装置 |
| JP2002163583A (ja) * | 2000-11-22 | 2002-06-07 | Ntt Data Corp | 電子取引方法、センタ及びプリペイドカード |
| JP2002330122A (ja) * | 2001-04-27 | 2002-11-15 | Dainippon Printing Co Ltd | 通信システム |
| JP2003332452A (ja) * | 2002-05-17 | 2003-11-21 | Renesas Technology Corp | 半導体識別回路 |
| JP2003348065A (ja) * | 2002-05-23 | 2003-12-05 | Japan Datacom Co Ltd | データ分散保管システム |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2010502068A (ja) * | 2006-08-22 | 2010-01-21 | ノキア シーメンス ネットワークス ゲゼルシャフト ミット ベシュレンクテル ハフツング ウント コンパニー コマンディトゲゼルシャフト | 認証方法 |
| US9411952B2 (en) | 2006-08-22 | 2016-08-09 | Nokia Siemens Networks Gmbh & Co. Kg | Method for authentication |
| US9183357B2 (en) | 2008-09-24 | 2015-11-10 | Panasonic Intellectual Property Management Co., Ltd. | Recording/reproducing system, recording medium device, and recording/reproducing device |
| JP2016063457A (ja) * | 2014-09-19 | 2016-04-25 | 株式会社東芝 | 認証システム、認証装置および認証方法 |
| US9852281B2 (en) | 2014-09-19 | 2017-12-26 | Kabushiki Kaisha Toshiba | Authentication system, authentication device, and authentication method |
| US10574639B2 (en) | 2016-05-25 | 2020-02-25 | Panasonic Intellectual Property Management Co., Ltd. | Authentication apparatus utilizing physical characteristic |
Also Published As
| Publication number | Publication date |
|---|---|
| JP4530229B2 (ja) | 2010-08-25 |
| JPWO2006003711A1 (ja) | 2008-04-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11797683B2 (en) | Security chip with resistance to external monitoring attacks | |
| US7564345B2 (en) | Volatile device keys and applications thereof | |
| Guajardo et al. | Physical unclonable functions and public-key crypto for FPGA IP protection | |
| Van Herrewege et al. | Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs | |
| US9621359B2 (en) | Systems and methods for authentication based on physically unclonable functions | |
| Mars et al. | New concept for physically-secured E-coins circulations | |
| JP4530229B2 (ja) | カード認証システム | |
| Maleki et al. | New clone-detection approach for RFID-based supply chains | |
| JP3889660B2 (ja) | 認証方法及び認証システム | |
| Rivain | On the physical security of cryptographic implementations | |
| Yang et al. | A lightweight authentication scheme for transport system farecards | |
| Nan | The Design of RFID Tag for “Mywallet” |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2006527635 Country of ref document: JP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| 122 | Ep: pct application non-entry in european phase |