JPH0253153A - Ciphering system for memory medium - Google Patents
Ciphering system for memory mediumInfo
- Publication number
- JPH0253153A JPH0253153A JP63203859A JP20385988A JPH0253153A JP H0253153 A JPH0253153 A JP H0253153A JP 63203859 A JP63203859 A JP 63203859A JP 20385988 A JP20385988 A JP 20385988A JP H0253153 A JPH0253153 A JP H0253153A
- Authority
- JP
- Japan
- Prior art keywords
- data
- storage medium
- memory medium
- encryption
- ciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims description 9
- 238000012790 confirmation Methods 0.000 abstract 2
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
Landscapes
- Storage Device Security (AREA)
Abstract
Description
【発明の詳細な説明】
〔産業上の利用分野〕
本発明は物流、運輸、金融、その他に関わる記憶媒体の
暗号化方式に関し、特にプリペイドカード(テレホンカ
ード、オレンジカード)等の金券と同等に扱われる記憶
媒体内のデータを暗号化し、セキュリティを高めるため
の記憶媒体の暗号化方式に関する。[Detailed Description of the Invention] [Industrial Application Field] The present invention relates to an encryption method for storage media related to logistics, transportation, finance, and others, and in particular, to an encryption method equivalent to a cash voucher such as a prepaid card (telephone card, orange card), etc. The present invention relates to a storage medium encryption method for encrypting data in a storage medium to improve security.
従来、この種の暗号化方式は、記憶媒体作成手段と記憶
媒体アクセス手段との情報伝達をする記憶媒体に対して
一組の暗号復号化部を使用するのが通例であった。Conventionally, this type of encryption system has typically used a set of encryption/decryption units for a storage medium that communicates information between storage medium creation means and storage medium access means.
ここで、第3図を参照しながら従来の記憶媒体の暗号化
方式について考察する。図中、記憶媒体作成手段3−I
において、暗号化部3−3を用いて原文データ3−2を
暗号化する。この暗号化された暗文データ3−4を記憶
媒体3−5に書き込む。Here, a conventional storage medium encryption method will be considered with reference to FIG. In the figure, storage medium creation means 3-I
In the step, the original data 3-2 is encrypted using the encryption unit 3-3. This encrypted cryptographic data 3-4 is written into the storage medium 3-5.
記憶媒体アクセス手段3−6では、記憶媒体3−5に書
き込まれた暗文データ3−4を復号化部3−7を用いて
原文データ3−8に復号化する。この復号化された原文
データ3−8のデータ更新を行い。The storage medium access means 3-6 decrypts the encrypted data 3-4 written in the storage medium 3-5 into original data 3-8 using the decryption unit 3-7. This decrypted original text data 3-8 is updated.
更新された原文データ3−9を記憶媒体作成手段3−1
の暗号化部3−3と同一の暗号化部3−10を用いて暗
文データ3−11に暗号化し、記憶媒体3−5に書き込
みを行なっていた。The updated original text data 3-9 is stored in the storage medium creating means 3-1.
The encrypting unit 3-10, which is the same as the encrypting unit 3-3, is used to encrypt the cryptographic data 3-11 and write it into the storage medium 3-5.
上述した従来の暗号化方式は、記憶媒体作成手段の暗号
化部と記憶媒体アクセス手段の暗号化部とが同一のため
に、記憶媒体に原文データを暗号化し暗文データを書き
込んでも以下のような欠点がある。例えば記憶媒体アク
セス手段が第三者の手に渡ってしまった場合に、記憶媒
体アクセス手段の復号化部で記憶媒体の暗文データを解
読され、多量の新しい記憶媒体に記憶媒体アクセス手段
の暗号化部で暗文データを作成されてしまう。In the conventional encryption method described above, the encryption section of the storage medium creation means and the encryption section of the storage medium access means are the same, so even if the original data is encrypted and the encrypted data is written to the storage medium, the following will occur. There are some drawbacks. For example, if the storage medium access means falls into the hands of a third party, the encrypted data on the storage medium is decrypted by the decryption unit of the storage medium access means, and a large amount of new storage media is stored in the encrypted data of the storage medium access means. Code data is created in the encryption department.
本発明による記憶媒体の暗号化方式は、記憶媒体作成手
段を認識する認証データを暗号化する第一の暗号化部と
原文データを暗号化する第二の暗号化部とを有する記憶
媒体作成手段と。The storage medium encryption method according to the present invention includes a storage medium creation means that has a first encryption section that encrypts authentication data that recognizes the storage medium creation means and a second encryption section that encrypts original text data. and.
暗文認証データと暗文データとを有する記憶媒体と、記
憶媒体の暗文認証データを復号化する第一の復号化部と
暗文データを復号化する第二の復号化部と暗号データを
復号化した原文データを更新後、再び記憶媒体に原文デ
ータを暗号化する第、三の暗号化部とを有する記憶媒体
アクセス手段とを有している。A storage medium having ciphertext authentication data and the ciphertext data, a first decryption unit that decrypts the ciphertext authentication data of the storage medium, a second decryption unit that decrypts the ciphertext data, and the ciphertext data. and a storage medium access means having third and third encryption units for encrypting the original data in the storage medium again after updating the decrypted original data.
次に1本発明について図面を参照しつつ説明する。 Next, one aspect of the present invention will be explained with reference to the drawings.
第1図は本発明における一実施例構成の概略図を示す。FIG. 1 shows a schematic diagram of the configuration of an embodiment of the present invention.
図中、l−1はテレホンカードやオレンジカード等の磁
気カード発行装置である記憶媒体作成手段、1−2はテ
レホンカードやオレンジカード等の磁気カードである記
憶媒体、■−3は公衆電話や券売機等の記憶媒体アクセ
ス手段をそれぞれ表わす。In the figure, l-1 is a storage medium creating means that is a magnetic card issuing device such as a telephone card or orange card, 1-2 is a storage medium that is a magnetic card such as a telephone card or orange card, and ■-3 is a public telephone or Each represents a storage medium access means such as a ticket vending machine.
記憶媒体作成手段1−I Fi自社発行の磁気カードで
あることを確認するために磁気カード発行装置番号を含
むデータを二種類持っている。1つは認証データ1−4
であシ、もう1つは原文データ1−6である。この二種
類のデータは個々別の暗号化部で暗号化される。その1
つは認証データ1−4を暗号化する第一の暗号化部1−
5であシ、もう1つは原文データ1−6を暗号化する第
二の暗号化部1−7である。暗号化された暗文認証デー
タ1−8と暗文データ1−9はそれぞれ記憶媒体1−2
に書き込まれる。Storage medium creation means 1-I Fi has two types of data including a magnetic card issuing device number to confirm that the card is a self-issued magnetic card. One is authentication data 1-4
Well, the other one is original data 1-6. These two types of data are encrypted by separate encryption units. Part 1
The first encryption unit 1- encrypts the authentication data 1-4.
5 and the other is a second encryption unit 1-7 that encrypts the original data 1-6. The encrypted cryptogram authentication data 1-8 and cryptogram data 1-9 are stored in the storage medium 1-2, respectively.
will be written to.
記憶媒体アクセス手段1−3は、テレホンカードやオレ
ンジカード等の記憶媒体1−2が自社発行のカードであ
るか否かを確認するために、暗文認証データ1−8と暗
文データ1−9をそれぞれ。The storage medium access means 1-3 uses the cryptogram authentication data 1-8 and the cryptogram data 1- to confirm whether the storage medium 1-2 such as a telephone card or an orange card is a card issued by the company. 9 each.
第一の復号化部1−10と第二の復号化部1−11で復
号化した認証データ1−12と原文データ1−13内の
認証データ1−13とが判断部1−14で一致した場合
にのみ、原文データ1−13内の実データ!−15−2
(第1図(b))である金額等の情報を信頼する。こう
して、記憶媒体アクセス手段1−3 H。The authentication data 1-12 decrypted by the first decryption unit 1-10 and the second decryption unit 1-11 and the authentication data 1-13 in the original data 1-13 match in the determination unit 1-14. Only when the actual data in the original data 1-13! -15-2
(Figure 1(b)). Thus, the storage medium access means 1-3H.
更新部1−15で金額等の更新を行い、更新後の原文デ
ータ1−16を記憶媒体作成手段1−1と同じ第三の暗
号化部1−17で暗号化し記憶媒体1−2に書き込む。The update unit 1-15 updates the amount, etc., and the updated original data 1-16 is encrypted by the third encryption unit 1-17, which is the same as the storage medium creation means 1-1, and written to the storage medium 1-2. .
第2図を参照して、記憶媒体アクセス手段1−3におい
て第三者の手に渡った記憶媒体アクセス手段で新規に作
成された記憶媒体が読み込まれた場合の動作について説
明する。Referring to FIG. 2, the operation when a newly created storage medium is read by the storage medium access means 1-3 that has fallen into the hands of a third party will be described.
偽造記憶媒体から暗文認証データと暗文データを読み、
暗文認証データの復号化と暗文データの復号化を行う。Read the cryptogram authentication data and cryptogram data from the fake storage medium,
Decrypts ciphertext authentication data and decrypts ciphertext data.
ここで、第三者の手に渡った記憶媒体アクセス手段には
認証データを暗号化する第一の暗号化部が無いため、新
規の記憶媒体には認証データを暗号化できな・い。この
ため、認証データの不一致が起こり、記憶媒体アクセス
手段では不正記憶媒体と見なし処理を中断する。Here, since the storage medium access means that has fallen into the hands of a third party does not have the first encryption unit for encrypting the authentication data, it is not possible to encrypt the authentication data on the new storage medium. As a result, a mismatch in authentication data occurs, and the storage medium access means considers the storage medium to be an unauthorized storage medium and interrupts the process.
以上説明したように本発明は、記憶媒体を作成する手段
を認証するデータを二種類の暗号化部で記憶媒体に暗号
化することにより、記憶媒体アクセス手段で自社発行の
記憶媒体を判断できるとともに、記憶媒体アクセス手段
が第三者の手に渡っても一糧類の暗号化部しか持たない
ため、記憶媒体を多量に偽造されることを防止する効果
がある。As explained above, the present invention enables the storage medium access means to determine whether the storage medium is issued by the company by encrypting the data for authenticating the means for creating the storage medium into the storage medium using two types of encryption units. Even if the storage medium access means falls into the hands of a third party, it has only a small amount of encryption, which has the effect of preventing a large number of storage media from being forged.
第1図は本発明の一実施例の記憶媒体の暗号化方式構成
の概略図、第2図は本発明による記憶媒体アクセス手段
の動作を示すフローチャート、第3図は従来の記憶媒体
の暗号化方式構成の概略図である。
図中、 l−1,3−1は記憶媒体作成手段、 l
−2゜3−5は記憶媒体、 1−3.3−6は記憶媒
体アクセス手段を示す。FIG. 1 is a schematic diagram of a storage medium encryption system configuration according to an embodiment of the present invention, FIG. 2 is a flowchart showing the operation of the storage medium access means according to the present invention, and FIG. 3 is a conventional storage medium encryption method. FIG. 2 is a schematic diagram of the system configuration. In the figure, l-1 and 3-1 are storage medium creation means, l
-2°3-5 is a storage medium, and 1-3.3-6 is a storage medium access means.
Claims (1)
る第一の暗号化部と原文データを暗号化する第二の暗号
化部とを有する記憶媒体作成手段と,暗文認証データと
暗文データとを有する記憶媒体と,該記憶媒体の暗文認
証データを復号化する第一の復号化部と前記暗文データ
を復号化する第二の復号化部と暗文データを復号化した
原文データを更新後,再び記憶媒体に原文データを暗号
化する第三の暗号化部とを有する記憶媒体アクセス手段
とを含むことを特徴とする記憶媒体の暗号化方式。1. A storage medium creation means having a first encryption section for encrypting authentication data that recognizes the storage medium creation means and a second encryption section for encrypting original text data; a first decryption unit that decrypts the ciphertext authentication data of the storage medium, a second decryption unit that decrypts the ciphertext data, and an original text data obtained by decrypting the ciphertext data. 1. An encryption method for a storage medium, comprising: a storage medium access means having a third encryption unit for encrypting the original text data in the storage medium again after updating.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP63203859A JPH0754537B2 (en) | 1988-08-18 | 1988-08-18 | Storage medium encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP63203859A JPH0754537B2 (en) | 1988-08-18 | 1988-08-18 | Storage medium encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
JPH0253153A true JPH0253153A (en) | 1990-02-22 |
JPH0754537B2 JPH0754537B2 (en) | 1995-06-07 |
Family
ID=16480878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP63203859A Expired - Lifetime JPH0754537B2 (en) | 1988-08-18 | 1988-08-18 | Storage medium encryption method |
Country Status (1)
Country | Link |
---|---|
JP (1) | JPH0754537B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04247737A (en) * | 1991-02-01 | 1992-09-03 | Kokusai Denshin Denwa Co Ltd <Kdd> | Enciphering device |
JPH08130516A (en) * | 1994-10-31 | 1996-05-21 | Sony Corp | Digital signal receiving system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6314304A (en) * | 1986-07-04 | 1988-01-21 | Glory Ltd | Authorized identification method for authorized identification medium |
-
1988
- 1988-08-18 JP JP63203859A patent/JPH0754537B2/en not_active Expired - Lifetime
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6314304A (en) * | 1986-07-04 | 1988-01-21 | Glory Ltd | Authorized identification method for authorized identification medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04247737A (en) * | 1991-02-01 | 1992-09-03 | Kokusai Denshin Denwa Co Ltd <Kdd> | Enciphering device |
JPH08130516A (en) * | 1994-10-31 | 1996-05-21 | Sony Corp | Digital signal receiving system |
Also Published As
Publication number | Publication date |
---|---|
JPH0754537B2 (en) | 1995-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5319705A (en) | Method and system for multimedia access control enablement | |
US7797541B2 (en) | Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device | |
US20070168291A1 (en) | Electronic negotiable documents | |
CN109903052A (en) | A kind of block chain endorsement method and mobile device | |
JP2019536319A (en) | Unauthorized copy protection (anti-cloning) methods and systems | |
JPH10503037A (en) | Verification technology | |
EP0808535A1 (en) | Electronic negotiable documents | |
EP2136311A1 (en) | Data storage method, client device, storage device, and program | |
JPH0253153A (en) | Ciphering system for memory medium | |
EP0886248B1 (en) | Method and apparatus for registration of information with plural institutions and recording medium with registration program stored thereon | |
JP2004287805A (en) | Slave card issuance system and slave card utilization system | |
JP4607483B2 (en) | ID tag and reader / writer | |
JPH0375983A (en) | Card utilizing system | |
JP3693709B2 (en) | Information writing / reading method for portable information recording medium | |
JP3810945B2 (en) | Data recording device for recording medium | |
JPH04205397A (en) | Auxiliary recording medium managing method for hybrid card | |
JPH1188318A (en) | Method for changing cipher key for authentication | |
JP2767499B2 (en) | Card issuance management method | |
JP2004046754A (en) | Ic card authentication system and method | |
JPH03198182A (en) | Ic card data processing system | |
JP2002304589A (en) | Settlement system | |
JP2003174442A (en) | Cryptographic key generation processing method | |
JPS5962975A (en) | Identifying system of person himself | |
JPH1091741A (en) | System for preventing fraudulent alternation and forgery of storage medium | |
KR19990024082A (en) | Electronic record card identification system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20080607 Year of fee payment: 13 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20090607 Year of fee payment: 14 |
|
EXPY | Cancellation because of completion of term | ||
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20090607 Year of fee payment: 14 |