JPH0253153A - Ciphering system for memory medium - Google Patents

Ciphering system for memory medium

Info

Publication number
JPH0253153A
JPH0253153A JP63203859A JP20385988A JPH0253153A JP H0253153 A JPH0253153 A JP H0253153A JP 63203859 A JP63203859 A JP 63203859A JP 20385988 A JP20385988 A JP 20385988A JP H0253153 A JPH0253153 A JP H0253153A
Authority
JP
Japan
Prior art keywords
data
storage medium
memory medium
encryption
ciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP63203859A
Other languages
Japanese (ja)
Other versions
JPH0754537B2 (en
Inventor
Noriko Igarashi
五十嵐 徳子
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to JP63203859A priority Critical patent/JPH0754537B2/en
Publication of JPH0253153A publication Critical patent/JPH0253153A/en
Publication of JPH0754537B2 publication Critical patent/JPH0754537B2/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

PURPOSE:To decide a memory medium produced by its own company via a memory medium access means and at the same time to prevent the forgery of an outsider by ciphering the data confirming a memory medium production means via this means and through two types of ciphering parts. CONSTITUTION:A memory medium production means 1-1 owns two types of data including the number of a magnetic card issuing device to confirm a magnetic card which is produced by its own company. A confirmation data 1-4 and an original data 1-6 are ciphered by a 1st ciphering part 1-5 and a 2nd ciphering part 1-7 and written into a memory medium 1-2. A memory medium access means 1-3 trusts the amount of money, etc., serving as the read data 1-13-2 included in an original data 1-13 only when the ciphered sentence confirmation data 1-8 and the ciphered sentence data 1-9 are compounded by the 1st and 2nd decoding parts 1-10 and 1-11 and the coincidence is secured between both data. Thus the means 1-3 can decide whether the memory medium 1-2 like a telephone card, etc., is produced by its own company or not.

Description

【発明の詳細な説明】 〔産業上の利用分野〕 本発明は物流、運輸、金融、その他に関わる記憶媒体の
暗号化方式に関し、特にプリペイドカード(テレホンカ
ード、オレンジカード)等の金券と同等に扱われる記憶
媒体内のデータを暗号化し、セキュリティを高めるため
の記憶媒体の暗号化方式に関する。
[Detailed Description of the Invention] [Industrial Application Field] The present invention relates to an encryption method for storage media related to logistics, transportation, finance, and others, and in particular, to an encryption method equivalent to a cash voucher such as a prepaid card (telephone card, orange card), etc. The present invention relates to a storage medium encryption method for encrypting data in a storage medium to improve security.

〔従来の技術〕[Conventional technology]

従来、この種の暗号化方式は、記憶媒体作成手段と記憶
媒体アクセス手段との情報伝達をする記憶媒体に対して
一組の暗号復号化部を使用するのが通例であった。
Conventionally, this type of encryption system has typically used a set of encryption/decryption units for a storage medium that communicates information between storage medium creation means and storage medium access means.

ここで、第3図を参照しながら従来の記憶媒体の暗号化
方式について考察する。図中、記憶媒体作成手段3−I
において、暗号化部3−3を用いて原文データ3−2を
暗号化する。この暗号化された暗文データ3−4を記憶
媒体3−5に書き込む。
Here, a conventional storage medium encryption method will be considered with reference to FIG. In the figure, storage medium creation means 3-I
In the step, the original data 3-2 is encrypted using the encryption unit 3-3. This encrypted cryptographic data 3-4 is written into the storage medium 3-5.

記憶媒体アクセス手段3−6では、記憶媒体3−5に書
き込まれた暗文データ3−4を復号化部3−7を用いて
原文データ3−8に復号化する。この復号化された原文
データ3−8のデータ更新を行い。
The storage medium access means 3-6 decrypts the encrypted data 3-4 written in the storage medium 3-5 into original data 3-8 using the decryption unit 3-7. This decrypted original text data 3-8 is updated.

更新された原文データ3−9を記憶媒体作成手段3−1
の暗号化部3−3と同一の暗号化部3−10を用いて暗
文データ3−11に暗号化し、記憶媒体3−5に書き込
みを行なっていた。
The updated original text data 3-9 is stored in the storage medium creating means 3-1.
The encrypting unit 3-10, which is the same as the encrypting unit 3-3, is used to encrypt the cryptographic data 3-11 and write it into the storage medium 3-5.

〔発明が解決しようとする課題〕[Problem to be solved by the invention]

上述した従来の暗号化方式は、記憶媒体作成手段の暗号
化部と記憶媒体アクセス手段の暗号化部とが同一のため
に、記憶媒体に原文データを暗号化し暗文データを書き
込んでも以下のような欠点がある。例えば記憶媒体アク
セス手段が第三者の手に渡ってしまった場合に、記憶媒
体アクセス手段の復号化部で記憶媒体の暗文データを解
読され、多量の新しい記憶媒体に記憶媒体アクセス手段
の暗号化部で暗文データを作成されてしまう。
In the conventional encryption method described above, the encryption section of the storage medium creation means and the encryption section of the storage medium access means are the same, so even if the original data is encrypted and the encrypted data is written to the storage medium, the following will occur. There are some drawbacks. For example, if the storage medium access means falls into the hands of a third party, the encrypted data on the storage medium is decrypted by the decryption unit of the storage medium access means, and a large amount of new storage media is stored in the encrypted data of the storage medium access means. Code data is created in the encryption department.

〔課題を解決するための手段〕[Means to solve the problem]

本発明による記憶媒体の暗号化方式は、記憶媒体作成手
段を認識する認証データを暗号化する第一の暗号化部と
原文データを暗号化する第二の暗号化部とを有する記憶
媒体作成手段と。
The storage medium encryption method according to the present invention includes a storage medium creation means that has a first encryption section that encrypts authentication data that recognizes the storage medium creation means and a second encryption section that encrypts original text data. and.

暗文認証データと暗文データとを有する記憶媒体と、記
憶媒体の暗文認証データを復号化する第一の復号化部と
暗文データを復号化する第二の復号化部と暗号データを
復号化した原文データを更新後、再び記憶媒体に原文デ
ータを暗号化する第、三の暗号化部とを有する記憶媒体
アクセス手段とを有している。
A storage medium having ciphertext authentication data and the ciphertext data, a first decryption unit that decrypts the ciphertext authentication data of the storage medium, a second decryption unit that decrypts the ciphertext data, and the ciphertext data. and a storage medium access means having third and third encryption units for encrypting the original data in the storage medium again after updating the decrypted original data.

〔実施例〕〔Example〕

次に1本発明について図面を参照しつつ説明する。 Next, one aspect of the present invention will be explained with reference to the drawings.

第1図は本発明における一実施例構成の概略図を示す。FIG. 1 shows a schematic diagram of the configuration of an embodiment of the present invention.

図中、l−1はテレホンカードやオレンジカード等の磁
気カード発行装置である記憶媒体作成手段、1−2はテ
レホンカードやオレンジカード等の磁気カードである記
憶媒体、■−3は公衆電話や券売機等の記憶媒体アクセ
ス手段をそれぞれ表わす。
In the figure, l-1 is a storage medium creating means that is a magnetic card issuing device such as a telephone card or orange card, 1-2 is a storage medium that is a magnetic card such as a telephone card or orange card, and ■-3 is a public telephone or Each represents a storage medium access means such as a ticket vending machine.

記憶媒体作成手段1−I Fi自社発行の磁気カードで
あることを確認するために磁気カード発行装置番号を含
むデータを二種類持っている。1つは認証データ1−4
であシ、もう1つは原文データ1−6である。この二種
類のデータは個々別の暗号化部で暗号化される。その1
つは認証データ1−4を暗号化する第一の暗号化部1−
5であシ、もう1つは原文データ1−6を暗号化する第
二の暗号化部1−7である。暗号化された暗文認証デー
タ1−8と暗文データ1−9はそれぞれ記憶媒体1−2
に書き込まれる。
Storage medium creation means 1-I Fi has two types of data including a magnetic card issuing device number to confirm that the card is a self-issued magnetic card. One is authentication data 1-4
Well, the other one is original data 1-6. These two types of data are encrypted by separate encryption units. Part 1
The first encryption unit 1- encrypts the authentication data 1-4.
5 and the other is a second encryption unit 1-7 that encrypts the original data 1-6. The encrypted cryptogram authentication data 1-8 and cryptogram data 1-9 are stored in the storage medium 1-2, respectively.
will be written to.

記憶媒体アクセス手段1−3は、テレホンカードやオレ
ンジカード等の記憶媒体1−2が自社発行のカードであ
るか否かを確認するために、暗文認証データ1−8と暗
文データ1−9をそれぞれ。
The storage medium access means 1-3 uses the cryptogram authentication data 1-8 and the cryptogram data 1- to confirm whether the storage medium 1-2 such as a telephone card or an orange card is a card issued by the company. 9 each.

第一の復号化部1−10と第二の復号化部1−11で復
号化した認証データ1−12と原文データ1−13内の
認証データ1−13とが判断部1−14で一致した場合
にのみ、原文データ1−13内の実データ!−15−2
(第1図(b))である金額等の情報を信頼する。こう
して、記憶媒体アクセス手段1−3 H。
The authentication data 1-12 decrypted by the first decryption unit 1-10 and the second decryption unit 1-11 and the authentication data 1-13 in the original data 1-13 match in the determination unit 1-14. Only when the actual data in the original data 1-13! -15-2
(Figure 1(b)). Thus, the storage medium access means 1-3H.

更新部1−15で金額等の更新を行い、更新後の原文デ
ータ1−16を記憶媒体作成手段1−1と同じ第三の暗
号化部1−17で暗号化し記憶媒体1−2に書き込む。
The update unit 1-15 updates the amount, etc., and the updated original data 1-16 is encrypted by the third encryption unit 1-17, which is the same as the storage medium creation means 1-1, and written to the storage medium 1-2. .

第2図を参照して、記憶媒体アクセス手段1−3におい
て第三者の手に渡った記憶媒体アクセス手段で新規に作
成された記憶媒体が読み込まれた場合の動作について説
明する。
Referring to FIG. 2, the operation when a newly created storage medium is read by the storage medium access means 1-3 that has fallen into the hands of a third party will be described.

偽造記憶媒体から暗文認証データと暗文データを読み、
暗文認証データの復号化と暗文データの復号化を行う。
Read the cryptogram authentication data and cryptogram data from the fake storage medium,
Decrypts ciphertext authentication data and decrypts ciphertext data.

ここで、第三者の手に渡った記憶媒体アクセス手段には
認証データを暗号化する第一の暗号化部が無いため、新
規の記憶媒体には認証データを暗号化できな・い。この
ため、認証データの不一致が起こり、記憶媒体アクセス
手段では不正記憶媒体と見なし処理を中断する。
Here, since the storage medium access means that has fallen into the hands of a third party does not have the first encryption unit for encrypting the authentication data, it is not possible to encrypt the authentication data on the new storage medium. As a result, a mismatch in authentication data occurs, and the storage medium access means considers the storage medium to be an unauthorized storage medium and interrupts the process.

〔発明の効果〕〔Effect of the invention〕

以上説明したように本発明は、記憶媒体を作成する手段
を認証するデータを二種類の暗号化部で記憶媒体に暗号
化することにより、記憶媒体アクセス手段で自社発行の
記憶媒体を判断できるとともに、記憶媒体アクセス手段
が第三者の手に渡っても一糧類の暗号化部しか持たない
ため、記憶媒体を多量に偽造されることを防止する効果
がある。
As explained above, the present invention enables the storage medium access means to determine whether the storage medium is issued by the company by encrypting the data for authenticating the means for creating the storage medium into the storage medium using two types of encryption units. Even if the storage medium access means falls into the hands of a third party, it has only a small amount of encryption, which has the effect of preventing a large number of storage media from being forged.

【図面の簡単な説明】[Brief explanation of the drawing]

第1図は本発明の一実施例の記憶媒体の暗号化方式構成
の概略図、第2図は本発明による記憶媒体アクセス手段
の動作を示すフローチャート、第3図は従来の記憶媒体
の暗号化方式構成の概略図である。 図中、  l−1,3−1は記憶媒体作成手段、  l
−2゜3−5は記憶媒体、  1−3.3−6は記憶媒
体アクセス手段を示す。
FIG. 1 is a schematic diagram of a storage medium encryption system configuration according to an embodiment of the present invention, FIG. 2 is a flowchart showing the operation of the storage medium access means according to the present invention, and FIG. 3 is a conventional storage medium encryption method. FIG. 2 is a schematic diagram of the system configuration. In the figure, l-1 and 3-1 are storage medium creation means, l
-2°3-5 is a storage medium, and 1-3.3-6 is a storage medium access means.

Claims (1)

【特許請求の範囲】[Claims] 1.記憶媒体作成手段を認識する認証データを暗号化す
る第一の暗号化部と原文データを暗号化する第二の暗号
化部とを有する記憶媒体作成手段と,暗文認証データと
暗文データとを有する記憶媒体と,該記憶媒体の暗文認
証データを復号化する第一の復号化部と前記暗文データ
を復号化する第二の復号化部と暗文データを復号化した
原文データを更新後,再び記憶媒体に原文データを暗号
化する第三の暗号化部とを有する記憶媒体アクセス手段
とを含むことを特徴とする記憶媒体の暗号化方式。
1. A storage medium creation means having a first encryption section for encrypting authentication data that recognizes the storage medium creation means and a second encryption section for encrypting original text data; a first decryption unit that decrypts the ciphertext authentication data of the storage medium, a second decryption unit that decrypts the ciphertext data, and an original text data obtained by decrypting the ciphertext data. 1. An encryption method for a storage medium, comprising: a storage medium access means having a third encryption unit for encrypting the original text data in the storage medium again after updating.
JP63203859A 1988-08-18 1988-08-18 Storage medium encryption method Expired - Lifetime JPH0754537B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP63203859A JPH0754537B2 (en) 1988-08-18 1988-08-18 Storage medium encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP63203859A JPH0754537B2 (en) 1988-08-18 1988-08-18 Storage medium encryption method

Publications (2)

Publication Number Publication Date
JPH0253153A true JPH0253153A (en) 1990-02-22
JPH0754537B2 JPH0754537B2 (en) 1995-06-07

Family

ID=16480878

Family Applications (1)

Application Number Title Priority Date Filing Date
JP63203859A Expired - Lifetime JPH0754537B2 (en) 1988-08-18 1988-08-18 Storage medium encryption method

Country Status (1)

Country Link
JP (1) JPH0754537B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04247737A (en) * 1991-02-01 1992-09-03 Kokusai Denshin Denwa Co Ltd <Kdd> Enciphering device
JPH08130516A (en) * 1994-10-31 1996-05-21 Sony Corp Digital signal receiving system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6314304A (en) * 1986-07-04 1988-01-21 Glory Ltd Authorized identification method for authorized identification medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6314304A (en) * 1986-07-04 1988-01-21 Glory Ltd Authorized identification method for authorized identification medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04247737A (en) * 1991-02-01 1992-09-03 Kokusai Denshin Denwa Co Ltd <Kdd> Enciphering device
JPH08130516A (en) * 1994-10-31 1996-05-21 Sony Corp Digital signal receiving system

Also Published As

Publication number Publication date
JPH0754537B2 (en) 1995-06-07

Similar Documents

Publication Publication Date Title
US5319705A (en) Method and system for multimedia access control enablement
US7797541B2 (en) Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device
US20070168291A1 (en) Electronic negotiable documents
CN109903052A (en) A kind of block chain endorsement method and mobile device
JP2019536319A (en) Unauthorized copy protection (anti-cloning) methods and systems
JPH10503037A (en) Verification technology
EP0808535A1 (en) Electronic negotiable documents
EP2136311A1 (en) Data storage method, client device, storage device, and program
JPH0253153A (en) Ciphering system for memory medium
EP0886248B1 (en) Method and apparatus for registration of information with plural institutions and recording medium with registration program stored thereon
JP2004287805A (en) Slave card issuance system and slave card utilization system
JP4607483B2 (en) ID tag and reader / writer
JPH0375983A (en) Card utilizing system
JP3693709B2 (en) Information writing / reading method for portable information recording medium
JP3810945B2 (en) Data recording device for recording medium
JPH04205397A (en) Auxiliary recording medium managing method for hybrid card
JPH1188318A (en) Method for changing cipher key for authentication
JP2767499B2 (en) Card issuance management method
JP2004046754A (en) Ic card authentication system and method
JPH03198182A (en) Ic card data processing system
JP2002304589A (en) Settlement system
JP2003174442A (en) Cryptographic key generation processing method
JPS5962975A (en) Identifying system of person himself
JPH1091741A (en) System for preventing fraudulent alternation and forgery of storage medium
KR19990024082A (en) Electronic record card identification system and method

Legal Events

Date Code Title Description
FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080607

Year of fee payment: 13

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090607

Year of fee payment: 14

EXPY Cancellation because of completion of term
FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090607

Year of fee payment: 14