CN1227595C - Portable electronic medium - Google Patents

Portable electronic medium Download PDF

Info

Publication number
CN1227595C
CN1227595C CNB008198837A CN00819883A CN1227595C CN 1227595 C CN1227595 C CN 1227595C CN B008198837 A CNB008198837 A CN B008198837A CN 00819883 A CN00819883 A CN 00819883A CN 1227595 C CN1227595 C CN 1227595C
Authority
CN
China
Prior art keywords
mentioned
memory
storer
record
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB008198837A
Other languages
Chinese (zh)
Other versions
CN1454350A (en
Inventor
池田英贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Priority claimed from PCT/JP2000/006348 external-priority patent/WO2002023349A1/en
Publication of CN1454350A publication Critical patent/CN1454350A/en
Application granted granted Critical
Publication of CN1227595C publication Critical patent/CN1227595C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/08Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers from or to individual record carriers, e.g. punched card, memory card, integrated circuit [IC] card or smart card
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C29/00Checking stores for correct operation ; Subsequent repair; Testing stores during standby or offline operation
    • G11C29/52Protection of memory contents; Detection of errors in memory contents

Abstract

The present invention relates to a portable electronic medium which comprises a base plate (2) with a wiring, a storage (4) for storing data and a verifying cipher key and LSI for the control of the storage, wherein LSI is composed of a bare chip and is arranged on the base plate (2), LSI comprises an inner storage (3b) comprising the stored data and a verifying cipher key and a control unit (3a) for controlling data record for the storage (4) or data reproduction from the storage (4), and LSI is encapsulated by resin and is bonded to the base plate (2) by a gold wire; the storage (4) is welded on the base plate (2). The control unit (3a) judges whether the storage (4) is correct by matching the verifying cipher key recorded in the storage (4) and the verifying cipher key recorded in the inner storage (3b).

Description

The authentication method of portable electronic medium
Technical field
The present invention relates to as the portable electronic medium that respectively control circuit of the storer of record data and this storer of control is installed in a storage card on the card.
Background technology
Generally, respectively the storer of record data and the control circuit of this storer of control (control LSI) are being installed under the situation on the card (substrate), storer corresponds respectively to substrate with control with LSI and is connected by scolder.
Therefore, when can easily changing storer, pull down control and resolve with LSI and just become possibility.
Thus, only change storer and use, the puppet that perhaps increases memory span brings up and becomes possibility.
Summary of the invention
The present invention considers above-mentioned situation, and purpose is by forbidding having with control circuit the installation of the storer storer in addition of corresponding relation, preventing the forgery that storer carried out that utilizes installation different.
The present invention seeks to make parsing to the control circuit of the control store difficulty that becomes.
In order to achieve the above object, the invention provides a kind of portable electronic medium, comprising: the substrate that is applied with distribution; Be installed on this substrate, record data also record the first memory of authenticate key; And comprise record data and record the second memory of authenticate key, carry out the record of data or the control module that control is reproduced the data that are recorded in the above-mentioned first memory with control to above-mentioned first memory, constituted by chip, and be installed on the aforesaid substrate and be connected to the control circuit of aforesaid substrate; Above-mentioned control module, whether consistent according to the authenticate key that is recorded in the above-mentioned first memory with the authenticate key in being recorded in above-mentioned second memory, judge whether above-mentioned first memory is correct.
For this reason, the present invention also provides a kind of portable electronic medium, comprising: the substrate that is applied with distribution; Be installed on this substrate the first memory of record data; And comprise record data and writing down the second memory of the status information of above-mentioned first memory, carry out the record of data or control module that control is reproduced the data that are recorded in the above-mentioned first memory with control to above-mentioned first memory, constituted by chip, be installed on the aforesaid substrate and be connected to the control circuit of aforesaid substrate; Above-mentioned control module, according to the state of above-mentioned first memory whether with the status information accordance that is recorded in above-mentioned first memory in the above-mentioned second memory, judge whether above-mentioned first memory correct.
For this reason, the present invention and then a kind of portable electronic medium is provided comprises: the substrate that is applied with distribution; Be installed on this substrate, record data also record the first memory of the enciphered data after authenticate key encrypted; And comprise record data and record the second memory of authenticate key, encryption key and decoding program, carry out the record of data or the control module that control is reproduced the data that are recorded in the above-mentioned first memory with control to above-mentioned first memory, constituted by chip, and be installed on the aforesaid substrate and be connected to the control circuit of aforesaid substrate; Above-mentioned control module, be decoded into authenticate key by being recorded in the enciphered data that encryption key in the above-mentioned second memory and decoding program will be recorded in the above-mentioned first memory, whether consistent according to this authenticate key with the authenticate key in being recorded in above-mentioned second memory, judge whether above-mentioned first memory is correct.
Description of drawings
Fig. 1 is the figure of the inner structure of expression storage card of the present invention.
Fig. 2 is the figure of the inner structure of expression storage card.
Fig. 3 is the figure of section structure of the inside of expression storage card.
Fig. 4 is the figure of the inner structure of expression storage card.
Fig. 5 is the figure of the controll block of expression storage card.
Fig. 6, the 8th is used for illustrating the figure of record example of the authenticate key of first form of implementation.
The process flow diagram of the processing when Fig. 7 is processing when being used for illustrating the startup of storage card of first form of implementation or power supply voltage supplying.
Fig. 9 is the figure of record example of status information that is used for illustrating the storer of second form of implementation.
Figure 10 is the process flow diagram that is used for illustrating the authentication processing of second form of implementation.
Figure 11 is the figure of the recording status of the last music information handled the last time in the storer of the storage card of expression in second form of implementation.
Figure 12 is used for illustrating the memory state recording of information processing of second form of implementation and the process flow diagram of authentication processing.
Figure 13 is the figure of the memory state recording of information example of the internal storage in expression second form of implementation.
Figure 14, the 16th is used for illustrating the figure of record example of enciphered data, authenticate key, encryption key and the decoding program of the 3rd form of implementation.
Figure 15 is the process flow diagram that is used for illustrating the authentication processing of the 3rd form of implementation.
Figure 17, the 19th is used for illustrating the figure of record example of enciphered data, authenticate key, encryption key, decoding program and the encipheror of the 4th form of implementation.
Figure 18 is the process flow diagram that is used for illustrating the authentication processing of the 4th form of implementation.
Figure 20 is the integrally-built figure of the Internet connected system in expression the 5th form of implementation.
Figure 21 is the figure of the Internet link information login service of the storage card in the wholesale sales shop that is used for illustrating in the Internet of the 5th form of implementation connected system.
Embodiment
Below, form of implementation of the present invention is described.
At first, the structure of from Fig. 1 to Fig. 3, representing storage card (SD card) M as portable electronic medium.Fig. 1 is the figure of inner structure of expression storage card M of the present invention, and Fig. 2 is the figure of the inner structure of expression storage card M, and Fig. 3 is the figure of section structure of the inside of expression storage card M.
Promptly, storage card M, storer control LSI (control circuit, controller) 3, storer (external memory storage, first memory) 4, chip part 5 and other IC6 are installed on the substrate 2 of holding external connection terminals 1, and as shown in Figure 4, are accommodated in the shell 7.
The external connection terminals 1 of aforesaid substrate 2 adopts hard gold-plated in order to improve the contact persistence.
Among the face 2a of the opposition side of face, apply and be applicable to the soft gold-plated of gold wire bonding with external connection terminals 1 above-mentioned basic 2.
In this face 2a, die bonding is controlled with the above-mentioned storer of chip as the storer control of bare chip and is used LSI3, and gold wire bonding connects substrate 2 and bare chip (storer control LSI3), and encapsulates with potting resin 8.Then, the storer 4 of welded and installed TSOP type, chip part 5 and other IC6.
Like this, use LSI3, just have the effect of the parsing difficulty that makes key data by substrate 2 bare chip ground being installed above-mentioned storer control.
Then, to the control circuit of said memory card M, use Fig. 5 to describe.
This storage card M, as shown in Figure 5, comprise as carry out with the external connection terminals 1 of the associative unit of the exchanges data of external device (ED) (not have diagram), be connected to this outside splicing ear 1 interface unit 9, be connected to this interface unit 9 storer control with LSI3 be operatively connected to the storer 4 that this storer is controlled the record-playback of the data of using LSI3.Above-mentioned interface unit 9 is made of chip part 5 and other IC6.
LSI3 is used in storer control, comprises the control module 3a that integral body is controlled and writes down control program that this control module 3a uses and internal storage (second memory) 3b of record data.
Said memory card M is supplied to supply voltage with being connected of external device (ED) (not diagram) time.
[first form of implementation]
Then, in above-mentioned such structure, use the authenticate key that is write down under the state that can not rewrite above-mentioned internal storage 3b, above-mentioned storer 4, the form of implementation of carrying out the authentication of above-mentioned storer 4 describes.
In the case, in above-mentioned internal storage 3b, as shown in Figure 6, write down unique value in advance, and be to carry out record with rewriting as authenticate key.
In addition, in above-mentioned storer 4, also as shown in Figure 6, can not write down and the identical authenticate key of authenticate key that in above-mentioned internal storage 3b, is write down with rewriting.
Above-mentioned storer 4 and internal storage 3b are made up of the ROM cell that can not rewrite and rewritable ROM cell, record above-mentioned authenticate key in this ROM cell that can not rewrite.
Then, in above-mentioned such structure, the processing during when said memory card M starts or from the power supply voltage supplying of said external device describes with reference to process flow diagram shown in Figure 7.
That is, during when storage card starts or from the power supply voltage supplying of said external device, control module 3a carries out self diagnosis (ST1).The result of this self diagnosis, control module 3a diagnostic result for situation about confirming under (ST2), the authenticate key (ST3) of playback record in storer 4, the playback record authenticate key (ST4) in internal storage 3, relatively they whether consistent (ST5).
Control module 3a is both authenticate keys when consistent in this result relatively, be called storer 4 for correct authentication (authenticate-acknowledge) (ST6), and become holding state (ST7).
In addition, being diagnosed as in above-mentioned steps 2 under the situation of NG, is under the situation of NG in the authentication by above-mentioned steps 6 perhaps, control module 3a abort process (ST8).
Authentication by above-mentioned steps 6 is that the situation of NG is to say, the comparative result of above-mentioned steps 5 is that storer 4 is incorrect situation because authenticate key is inconsistent.
Although in the above-mentioned example, to when storage card starts or from the power supply voltage supplying of said external device the time, the situation of carrying out the authentication of storer 4 is illustrated, but also can similarly implement with above-mentioned under the situation of the authentication of just carrying out storer 4 whenever the visit of carrying out storer 4.
As the access process of carrying out,, carry out when perhaps carrying out the reproduction of the music information that write down or program at the music information that is carrying out supplying with or the record of program from the outside to above-mentioned storer 4.
In addition, also can be with in order to be used for and storer 4 authenticates and the authenticate key that is recorded in internal storage 3b is used for the authentication between external device (ED) and card M.And then, as shown in Figure 8, also can be in the internal storage 3b of card M, the external authentication key K 2 that storage is used for the internal authentication key K 1 that authenticates with storer 4 and is used for authenticating with external device (ED).
[second form of implementation]
Then, to in above-mentioned such structure, state (form of the processing) information of the above-mentioned storer 4 of last time is write down in above-mentioned storer control with LSI3, and when carrying out the visit of storer 4 next time, whether by identical with the status information of the storer 4 of the state that records storer 4, the form of implementation of carrying out the authentication of above-mentioned storer 4 describes.
In the case, control module 3a, when the processing in said memory card M finishes, as shown in Figure 9, the status information of the above-mentioned storer 4 of record in internal storage 3b.File allocation table), the verification of the verification of the integral body of above-mentioned storer 4 and (checking computations value), the content that write down in storer 4 when processing last time finishes and (checking computations value) etc. the status information of above-mentioned storer 4 is, the zone that is utilized when handled last time (FAT:.Thus, in internal storage 3b, just write down the zone that utilized when handling last time (FAT: file allocation table), the verification of the integral body of perhaps above-mentioned storer 4 and, perhaps the verification of the last content of handling in last time that in storer 4, is write down and etc.
In addition, above-mentioned storer 4 is made of non-volatile storer, keeps the state of the storer handled last time.Above-mentioned internal storage 3b is made of non-volatile storer, keeps the status information of storer 4.
Then, in above-mentioned such structure, the authentication processing when carrying out the access process to above-mentioned storer 4 describes with reference to process flow diagram shown in Figure 10.
The access process of carrying out to above-mentioned storer 4 is, music information or the program supplied with from the outside are carried out record, perhaps the music information that write down or program reproduced etc.
That is, control module 3a is when storer 4 conducts interviews, and confirms the recording status (ST11) of storer 4, and judges that the zone (FAT) that utilized when handling last time (ST12).Whether consistent (ST13) compares in the zone (FAT) that the zone (FAT) that is utilized when then, control module 3a handled this last time of judging is utilized when handling with the last time in being recorded in above-mentioned internal storage 3b.
Control module 3a this result relatively for both when consistent, be called storer 4 for correct authentication (authenticate-acknowledge) (ST14), and carry out access process (ST15) to above-mentioned storer 4.Handle as this visit, for example, carry out the record (writing) of data, perhaps the reproduction of recorded data (reading).
After carrying out this visit and handling, control module 3a records (rewriting) above-mentioned internal storage 3b (ST16) in the zone (FAT) that utilizes of access process thus.
In addition, control module 3a the result of the comparison by above-mentioned steps 13 for both when inconsistent, setting authentication is the NG and the processing (ST17) of breaking off a visit.
Although in above-mentioned example, status information as storer 4, with FAT is that example is illustrated, but also can similarly implement under the situation of the verification of the last content of handling in the verification of the integral body of above-mentioned storer 4 and (checking computations value) or in last time that is write down in storer 4 and (checking computations value) etc.
Last to what handled in above-mentioned last time, as shown in Figure 11, the memory state recording of information that music information " A " is recorded with length " BB " in the situation of address " AAAA " of storer 4 is handled and authentication processing, describes with reference to process flow diagram shown in Figure 12.
That is, control module 3a calculates for the verification of above-mentioned music information " A " and (checking computations value) " CC " (ST21).
Then, control module 3a, by the start-of-record address " AAAA " of above-mentioned storer 4, the length " BB " and the above-mentioned verification that calculates of recorded information are added to Information ID of giving above-mentioned music information " A " in advance with (checking computations value) " CC ", generate memory state information (ST22), as shown in Figure 13, be recorded in (ST23) among the internal storage 3b.
Then, control module 3a confirms the recording status (ST25) of storer 4 then when storer 4 conducts interviews (ST24), judges the last information (ST26) of length for " BB " of handling in last time that write down from the address " AAAA " of storer 4.
Then, control module 3a calculates the verification of information of the length " BB " that obtains for the address " AAAA " from storer 4 and (checking computations value) " CC " (ST27).
Then, control module 3a is judged as memory state information (ST28) by the above-mentioned address of judging " AAAA ", length " BB " and the verification that calculated and (checking computations value) " CC ", and whether the memory state information when relatively this memory state information was handled with the last time that storer 3b internally reads consistent (ST29).
Control module 3a this result relatively for both when consistent, be called storer 4 for correct authentication (authenticate-acknowledge) (ST30), and carry out access process (ST31) to above-mentioned storer 4.
In addition, control module 3a the comparative result by above-mentioned steps 29 for both when inconsistent, setting authentication is the NG and the processing (ST32) of breaking off a visit.
[the 3rd form of implementation]
Then, to in above-mentioned such structure, use records the enciphered data of the authenticate key in the above-mentioned storer 4 under the state that can not rewrite, with the authenticate key portion, decoding program and the encryption key that record under the state that can not rewrite among the above-mentioned internal storage 3b, the form of implementation of carrying out the authentication of above-mentioned storer 4 describes.
In the case, in above-mentioned storer 4, as shown in Figure 14, the enciphered data after record is encrypted authenticate key with unique encryption key in advance, and be to carry out record with rewriting.
In addition, in above-mentioned internal storage 3b, as shown in Figure 14, can not write down the identical authenticate key of authenticate key before the encryption with the enciphered data that in above-mentioned storer 4, is write down with rewriting, the decoding program that the enciphered data that is write down in above-mentioned storer 4 is decoded, and the encryption key when decoding program is decoded to enciphered data thus.
Above-mentioned storer 4 and internal storage 3b are made up of the ROM cell that can not rewrite and rewritable ROM cell, record above-mentioned authenticate key in this ROM cell that can not rewrite.
Then, in above-mentioned such structure, the authentication processing of above-mentioned storer 4 describes with reference to process flow diagram shown in Figure 15.
That is the enciphered data (ST41) of control module 3a playback record in storer 4.Then, control module 3a decodes to above-mentioned enciphered data of reading with the encryption key that is recorded among the internal storage 3b by based on the decoding program that is recorded among the internal storage 3b, obtains authenticate key (ST42).And then, control module 3a relatively this resulting authenticate key and be recorded in internal storage 3b in authenticate key whether consistent (ST43).
Control module 3a is both authenticate keys when consistent in this result relatively, be called storer 4 for correct authentication (authenticate-acknowledge) (ST44).
In addition, control module 3a the result of the comparison by above-mentioned steps 43 for both when inconsistent, setting authentication is NG (ST45).
In addition, also can be with in order to be used for and storer 4 authenticates and the authenticate key that is recorded in internal storage 3b is used for the authentication between external device (ED) and storage card M.And then, as shown in Figure 16, also can be in the internal storage 3b of storage card M, storage is used for the internal authentication key K 1 of the authentication of storer 4 and is used for external authentication key K 2 with the authentication of external device (ED).
[the 4th form of implementation]
Then, to in above-mentioned such structure, when encrypting and recording above-mentioned storer 4 from the reception data of external device (ED), use authentication processing (step 41~45) by above-mentioned the 3rd form of implementation, with the authentication processing (step 11~14) by above-mentioned second form of implementation, the form of implementation of carrying out the authentication of above-mentioned storer 4 describes.
In the case, in above-mentioned storer 4, as shown in Figure 17, record has carried out the enciphered data of encrypting with unique encryption key to authenticate key in advance, and is to carry out record with rewriting.
In addition, in above-mentioned internal storage 3b, as shown in Figure 17, can not write down the identical authenticate key of authenticate key before the encryption with the enciphered data that in above-mentioned storer 4, is write down with rewriting, to the encipheror of encrypting from the reception data of said external device, the decoding program that the enciphered data that is write down in above-mentioned storer 4 is decoded, and the encryption key when encrypting receiving data and when enciphered data being decoded by above-mentioned decoding program by above-mentioned encrypted code program.
In addition, in internal storage 3b, as shown in Figure 17, write down the zone (FAT: file allocation table) that was utilized when handling last time, the verification of the integral body of perhaps above-mentioned storer 4 and, perhaps the verification of the last content of handling in last time that in storer 4, is write down and etc.
Above-mentioned storer 4 and internal storage 3b are made up of the ROM cell that can not rewrite and rewritable ROM cell, record above-mentioned authenticate key in this ROM cell that can not rewrite.Rewritable ROM cell is made of non-volatile storer, keeps the state of the storer handled last time.
Then, in above-mentioned such structure, the authentication processing during from the Data Receiving of said external device describes with reference to process flow diagram shown in Figure 180.
That is, control module 3a carries out the authentication processing (ST52) by above-mentioned the 3rd form of implementation, and then carries out the authentication processing (ST53) by above-mentioned second form of implementation when external device (ED) receives data (ST51).
When control module 3a is affirmation in this result for each authentication processing (ST54),, the above-mentioned data that receive are encrypted (ST55) with the encryption key that is recorded among the internal storage 3b based on the encipheror that is recorded among the internal storage 3b.
Then, control module 3a records storer 4 (ST56) with this ciphered data.
After this end of record (EOR), control module 3a arrives (rewriting) above-mentioned internal storage 3b (ST57) with the state recording of storer 4.
In addition, when control module 3a is NG in the authentication processing of any, abort process (ST58).
In addition, decoding and also similarly moving under the situation about reproducing being recorded in encrypted data in the above-mentioned storer 4 with above-mentioned.
As to above-mentioned storer 4 recorded data, can be music information or program etc.
In addition, also can be with in order to be used for and storer 4 authenticates and the authenticate key that is recorded in internal storage 3b is used for the authentication between external device (ED) and storage card M.And then, as shown in Figure 19, also can be in the internal storage 3b of storage card M, storage is used for the internal authentication key K 1 of the authentication of storer 4 and is used for external authentication key K 2 with the authentication of external device (ED).
[the 5th form of implementation]
The utilization example of storage card M with above-mentioned authentication function then, is described.
Illustrate with reference to Figure 20, Figure 21, for example storage card M is used in the example of the situation of the Internet connected system.
That is, Figure 20 is the integrally-built figure that expression has utilized the Internet connected system of the storage card M with authentication function that above-mentioned built-in storer confirms usefulness.
In the figure, each electronic equipment of PC (personal computer) 11, for example portable phone 12, Electrofax 13 and TV device (television equipment) 14 as mobile phone, all have in any case predetermined movable recording medium can be installed, the draw-in groove that for example has the storage card M of the postage-stamp-sized that can not directly visit the storage area that is hidden from the outside is connected the communication interface (not diagram) of necessary modulator-demodular unit etc. with subtend the Internet 15 grades.
In this form of implementation, in the storer 4 of storage card M, for the electronic equipment that can be installed from this storage card M (draw-in groove) (by the server of internet providers, just pass through supplier parties) be connected to the Internet 15, login has the Internet link information 150 of compositions such as user ID, user cipher, email account, mail password, DNS (dns server address), access interface (telephone number of connecting object).The data layout of the Internet link information of being logined in the storer 4 of this storage card M 150 is unified into and the irrelevant predetermined format of various electronic equipments (device) such as above-mentioned PC11, portable phone 12, Electrofax 13 and TV device.
In addition, in PC11, be equipped with to have write down and be used for when storage card M is installed in the draw-in groove of self, automatically starting, read the Internet link information 150 of predetermined format and be connected to (but computing machine read) above-mentioned storer 4 of the specific application program (the Internet connect set application program) 110 of the Internet 15 automatically from the storer 4 of this storage card M.When this carries out the startup of storage card M, utilize the authentication processing of the built-in storer affirmation usefulness of above-mentioned first, second, third form of implementation.In addition, the authentication of storer for situation about confirming under, and then can use the authenticate key that is stored in the internal storage 3b in the storage card M and PC11 as external device (ED) between discern.Then, when these authentications are affirmation, start above-mentioned specific application program.
In addition, in the electronic equipment of other kinds such as portable phone 12, Electrofax 13 and TV device 14, also be equipped with and write down the recording medium that application program (below, be called application) 110 connect to be set in the Internet.This recording medium is ROM, disk set, flash memory etc.In addition, using 110 also can download by communication line.
Like this, in electronic equipments such as PC11, portable phone 12, Electrofax 13 and TV device 14, carry the structure of using (the Internet connects setting and uses) 110 by being made as, the user only logins the storage card M that the Internet link information 150 is arranged by being carried in the storer 4, and, just can be connected to the Internet 15 from this equipment simply with the draw-in groove that this storage card M is installed to above-mentioned electronic equipment (electronic equipments such as PC11, portable phone 12, Electrofax 13 and TV device 14) aptly.Here, owing to do not exist with ... the electronic equipment of use, so the user also can be connected to the Internet 15 from any equipment by being used alternatingly a storage card M.
So in this form of implementation, just have the shop of carrying out the login service of the Internet link information 150 to the storer 4 of storage card M.Client takes storage card M to this kind shop, perhaps buys storage card M in this shop, and the storer 4 in this shop to this storage card M carries out the login of the Internet link information 150.In Figure 20, in wholesale sales shop 16 and convenience store 17, carry out the Internet link information login service.For this reason, in wholesale sales shop 16, just prepare to have the PC160 of (but computing machine the read) storage medium that is carrying the application (the Internet link information login application program) 180 of having write down the Internet link information login usefulness.In addition, in convenience store 17, preparation has is carrying the application (link information login in the Internet is used) 180 that the storer 4 that has not only write down to storage card M carries out the Internet link information login usefulness, has also write down the information of (but computing machine read) storage medium of carrying out the application of digital content download usefulness to storage card M, MD (minidisk) etc. and has write terminal 170.
The result of the login service in the link information login service shop, the Internet of wholesale sales shop 16, convenience store 17 etc., with internet providers (below, slightly be called supplier) 18 numbers of users (intrant's number) of contracting, can add up by different these suppliers 18 and by each link information login service shop, the Internet.So each supplier 18, during predetermined is unit, for example be unit with the moon, to the company that provides of native system (movable recording medium the Internet connected system), link information login service shop, the Internet (wholesale sales shop 16, convenience store 17 etc.) carry out cash reimbursement 19.
Then, the service of carrying out the Internet link information login (writing) with reference to the link information login service shop, the Internet in the system of Figure 21 subtend Figure 20, the storer 4 of storage card M in for example wholesale sales shop 16 describes.
At first, in draw-in groove at PC160, user's storage card M is installed shown in arrow a like that after, the Internet link information login is used 180 and is just started.So just (conclude with the company of the system that Figure 20 is provided contract is arranged) shows supplier's guide look picture (supplier has a guide look of picture) 201 on the display of PC160.
When the user supplier have a guide look of on the picture select desirable supplier after, perhaps after the salesman in wholesale sales shop 16 selected the supplier of customer requirements, PC160 just showed the picture 202 of representing the member's treaty content between selected therewith supplier according to using 180.This picture 202 is provided with ACK button 202a, after pressing (selection) this ACK button 202a, just switches to the selection picture 203 of method of payment.Here after selecting method of payment, just switch to email account and generate picture 204.Here, after the candidate of the email account that the setting user wishes, PC160 is connected by carrying out circuit (the Internet) with the specified vendor server 210 of user, the method of payment that the user is specified, email account send to this server 210, just shown in arrow b, entrust affirmation like that, and switch to picture 205 at line justification.
The supplier's of user's appointment server 210 is checked from first candidate the desirable email account of user whether to give other users successively, and decision gives the user with this account if just give.When if all candidates are all finished, just the PC160 in wholesale sales shop 16 generates email account once more from server 210 requests.
After the giving of decision user desirable email account, server 210 and then decision give this user's user ID, user cipher, mail password, and will comprise these information and DNS, visit contact, the necessary information of the connection of the Internet is sent to the PC160 in wholesale sales shop 16.
So PC160 in wholesale sales shop 16, the information that sends based on server 210 from supplier, generation comprises the Internet link information 150 of the predetermined format of user ID, user cipher, mail password, DNS, visit contact, this the Internet link information 150 is encrypted with the media key Km that illustrates later according to predetermined algorithm, the action that beginning writes to the storer 4 of the storage card M of the draw-in groove that is installed in this PC160, and switch to the picture 206 that is just writing in information.
When the storer 4 to above-mentioned storage card M carries out write operation, carry out the authentication processing of above-mentioned the 4th form of implementation.In addition, the authentication of storer for situation about confirming under so that can use among the internal storage 3b that is stored in the storage card M authenticate key and PC11 as external device (ED) between authenticate.Then, when these authentications are affirmation, just begin write activity.
After PC160 finishes writing of the Internet link information 150 that the storer 4 to storage card M carries out, just switch to inquiry picture 207 from the information of cryptoguard storage card M to user's query whether use.
If under the situation that request is protected with password, PC160 just makes user's designated pin.PC160 encrypts the password of user's appointment according to predetermined algorithm and is written to storage card M as password.The password that this is encrypted just becomes the key that is used for taking out from storage card M media key.After PC160 writes storage card 15 with password 311, just finish a series of the Internet link information and write processing, just user's login process.In the case, PC160 is when switching to the picture 208 that expression user login finishes, for example shown in arrow c, like that user's login is finished, be notified to all contract counting servers 211 of company's (system provides company) of exploitation native system via the Internet.On the other hand, do not asking under the situation about comprising with password, PC160 finishes in the picture 208 being directly switch to user login, and like that user's login being finished shown in arrow c is notified to contract counting server 211.In this user login finishes notice, include the supplier's that the user contracts information.
Contract counting server 211 is counted the number of users (intrant's number) that (statistics) and each supplier contract by each supplier and by the link information login service shop, the Internet in each wholesale sales shop 16 etc.So, after the PC160 from wholesale sales shop 16 notifies the user to login to finish, contract counting server 211, just make intrant's counting number of the supplier who is notified add 1, intrant's counting number that the shop (wholesale sales shop 16) of the login service that is connected to the Internet link information that this supplier uses is received adds 1.
As described above,, in storer is controlled with LSI, this key data is authenticated, only under the situation of unanimity, carry out just becoming possibility to the visit of storer as preventing that the technology of forging storage card from writing the data that become key to certain zone of storer.
For this reason, for example both just replaced to the big storer of memory span, because storer control is inconsistent so can not conduct interviews to storer with the authentication of LSI.
Equally, both just desired to use LSI, used several storeies, because authentication is inconsistent so can not conduct interviews to storer for a storer control.
In addition, key data is encrypted so that the key data in can not resolving memory also is effective.
The present invention, provide a kind of by the storer that comprises record data, control is carried out the record of data or is controlled at the control module of the reproduction of recorded data in the above-mentioned storer to this storer, the storer of the employed built-in internal storage of this control module is controlled the storage card with LSI constituted, above-mentioned control module, whether consistent according to the authenticate key that is recorded in the above-mentioned storer with the authenticate key in being recorded in above-mentioned internal storage, judge whether above-mentioned storer is correct.

Claims (3)

1. the authentication method of a portable electronic medium, this portable electronic medium is by constituting with the lower part: by the soft gold-plated substrate that is implemented wiring; Be installed on this substrate the first memory of record data by scolder; Constitute by a bare chip, cover each bare chip and be installed on the aforesaid substrate with potting resin, and the control circuit that is connected with aforesaid substrate by gold wire bonding, this bare chip is built-in with the lower part: in record data, the start-of-record address of the above-mentioned first memory that record had used when handling last time as the status information of above-mentioned first memory, the length of recorded information, from the start-of-record address to the verification of the information of the length of recorded information and second memory; Control is to above-mentioned first memory record data, or the control assembly of the data of control playback of recorded in above-mentioned first memory, the part of wherein above-mentioned first memory and second memory is a nonvolatile memory, and the authentication method of this portable electronic medium is characterised in that:
Above-mentioned control assembly is when conducting interviews to above-mentioned first memory, the start-of-record address of using when handling the last time of judging above-mentioned first memory and the length of recorded information, begin from this start-of-record address of judging to calculate to the verification of the information of the length of recorded information and, according to the above-mentioned start-of-record address of judging, the length of recorded information, the verification that calculates and with the start-of-record address that is recorded in the above-mentioned first memory that had used when handling last time in the above-mentioned second memory, the length of recorded information, verification judges with whether consistent whether above-mentioned first memory is correct.
2. the authentication method of portable electronic medium according to claim 1 is characterized in that: the status information that is writing down above-mentioned first memory in non-volatile storer of second memory.
3. the authentication method of portable electronic medium according to claim 1 is characterized in that:
In above-mentioned second memory, record the control program of above-mentioned control assembly.
CNB008198837A 2000-09-18 2000-09-18 Portable electronic medium Expired - Fee Related CN1227595C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2000/006348 WO2002023349A1 (en) 2000-09-18 2000-09-18 Portable electronic medium

Publications (2)

Publication Number Publication Date
CN1454350A CN1454350A (en) 2003-11-05
CN1227595C true CN1227595C (en) 2005-11-16

Family

ID=34141195

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB008198837A Expired - Fee Related CN1227595C (en) 2000-09-18 2000-09-18 Portable electronic medium

Country Status (3)

Country Link
JP (1) JPWO2002023349A1 (en)
KR (1) KR100550367B1 (en)
CN (1) CN1227595C (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464313C (en) * 2005-05-20 2009-02-25 联想(北京)有限公司 Mobile memory device and method for accessing encrypted data in mobile memory device
JP4568196B2 (en) * 2005-09-01 2010-10-27 株式会社東芝 Processor, computer system and authentication method

Also Published As

Publication number Publication date
KR20030030009A (en) 2003-04-16
CN1454350A (en) 2003-11-05
KR100550367B1 (en) 2006-02-09
JPWO2002023349A1 (en) 2004-01-22

Similar Documents

Publication Publication Date Title
CN1178140C (en) Safety type memory equipment possessing enhanced compatibility
CN1156785C (en) Electronic data management system
WO2002023349A1 (en) Portable electronic medium
CN1280737C (en) Safety authentication method for movable storage device and read and write identification device
JP4733167B2 (en) Information processing apparatus, information processing method, information processing program, and information processing system
CN1284725A (en) Card-shape semiconductor memory and its manufacturing, operating and setting method
CN1225711C (en) Digital content issuing system and digital content issuing method
CN1726478A (en) Memory device and electronic device using the same
CN1293408A (en) Semiconductor storage device and its operation setting method
CN1313688A (en) Information supplying and processing device and method, and program storing medium
CN1860471A (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device
CN101064893A (en) IC module and cellular phone
CN1914603A (en) Use authentication method, use authentication program, information processing device, and recording medium
CN1182471C (en) Universal computer and administration method of copyright using therein
CN1863049A (en) Radio communication system, reader/writer apparatus, key managing method, and computer program
CN1853173A (en) Electronic data management device, control program, and data management method
CN1685419A (en) Data recording medium, data recording method, data processing device, data distribution method, data distribution device, data transmission method, data transmission device, data distribution system a
CN1643536A (en) Method of managing data stored on a chip card that can be read by mobile telephone
CN1555557A (en) Writing device, semiconductor memory card, program, and method
CN1081380C (en) Data reproducing device
CN1913429A (en) Physic identification method and electronic device
JP2008541219A (en) Data structure of flash memory having system area having variable size capable of data update, USB memory device having flash memory, and method for controlling system area
CN1313937C (en) Information viewing/listening system
CN1227595C (en) Portable electronic medium
CN1710507A (en) Content reproduction apparatus, content reproduction method, content management apparatus, content management method and computer program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20051116

Termination date: 20100918