WO2005067200A1 - 認証装置及び被認証装置及び鍵更新方法 - Google Patents
認証装置及び被認証装置及び鍵更新方法 Download PDFInfo
- Publication number
- WO2005067200A1 WO2005067200A1 PCT/JP2004/005879 JP2004005879W WO2005067200A1 WO 2005067200 A1 WO2005067200 A1 WO 2005067200A1 JP 2004005879 W JP2004005879 W JP 2004005879W WO 2005067200 A1 WO2005067200 A1 WO 2005067200A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- key
- identifier
- authenticated
- unit
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07B—TICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
- G07B15/00—Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
- G07B15/06—Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems
- G07B15/063—Arrangements for road pricing or congestion charging of vehicles or vehicle users, e.g. automatic toll systems using wireless information transmission between the vehicle and a fixed station
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Definitions
- the present invention relates to an authentication device, a device to be authenticated, or a key updating method for both devices.
- it relates to mobile devices and mobile communication systems with wireless communication functions, such as ETC (non-stop automatic fee payment system) and drive-through.
- ETC non-stop automatic fee payment system
- drive-through wireless communication functions
- identity verification is performed to confirm that the user is a valid user who can receive the service. At that time, if authentication fails due to no key, expiration, etc., the service cannot be received. If the user neglected the procedure for updating the key, such as updating the key, even if the user is an authorized user (even if there is no intention to commit fraud), the user will not be able to receive services. There was a problem.
- the key updated by performing the key update The purpose of this is to provide services and improve the availability of services and the convenience of users.
- An authentication device includes: an authentication processing unit that performs authentication processing with a device to be authenticated using an authentication key;
- the device to be authenticated does not hold an authentication key used for the authentication process by the authentication processing unit, a new authentication key is generated, and the authentication key used for the authentication process by the authentication processing unit is An update key for generating a new authentication key for updating the authentication key when the authentication processing unit has failed in the authentication process with the authentication target device when the authentication processing unit holds the authentication key. And a generator.
- the authentication processing unit is characterized in that an authentication process with the device to be authenticated is performed again using the new authentication key generated by the update key generation unit.
- the authentication device further includes:
- a receiving unit that receives a predetermined algorithm identifier and a predetermined encryption key identifier from the device to be authenticated
- the update key generation unit generates the new authentication key based on the predetermined algorithm identifier and the predetermined encryption key identifier received by the reception unit,
- the authentication device further comprises:
- a transmitting unit that transmits the new authentication key generated by the update key generating unit to the device to be authenticated
- the authentication processing unit uses the new authentication key transmitted by the transmission unit to perform an authentication process with the device to be authenticated again using the new authentication key.
- a device to be authenticated according to the present invention includes: a storage unit that stores a predetermined algorithm identifier and a predetermined encryption key identifier;
- An authentication processing unit that performs an authentication process with the device to be authenticated by using an authentication key
- a transmitting unit that transmits, to the authentication device, a predetermined algorithm identifier and a predetermined encryption key identifier stored in the storage unit when the authentication processing between the authentication device and the authentication device fails.
- a receiving unit that receives a new authentication key based on the predetermined algorithm identifier and the predetermined encryption key identifier transmitted from the authentication device by the transmission unit;
- the authentication processing unit may perform an authentication process again with the authentication device using a new authentication key received by the reception unit.
- a predetermined algorithm identifier and a predetermined symbol key identifier stored by the unit are transmitted to the authentication device.
- the key updating method is characterized in that, when an authentication process using an authentication key between an authenticated device that stores a predetermined algorithm identifier and a predetermined encryption key identifier and an authentication device fails, A first transmission step of transmitting predetermined information from the authentication device to the device to be authenticated,
- a first receiving step in which the device to be authenticated receives the predetermined information transmitted from the authentication device in the first transmitting step, After the predetermined information is received in the first receiving step, a second transmitting the stored predetermined algorithm identifier and predetermined encryption key identifier from the authenticated device to the authentication device. Transmitting step;
- a second receiving step in which the authentication device receives the predetermined algorithm identifier and the predetermined symbol key identifier transmitted in the second transmitting step, and a predetermined algorithm received in the second receiving step Identifier and specified key key identifier
- a third receiving step in which the device to be authenticated receives the new authentication key transmitted in the third transmitting step
- FIG. 1 is a diagram showing a configuration of an authentication system according to the first embodiment.
- FIG. 2 is a diagram illustrating the concept of the authentication system according to the first embodiment.
- FIG. 3 is a flowchart showing a procedure of a key updating method according to the first embodiment.
- FIG. 4 is a diagram illustrating an example of a frame of communication information 1.
- FIG. 5 is a diagram showing an example of a frame of communication information 2.
- FIG. 6 is a diagram showing an example of a frame of communication information 3.
- FIG. 7 is a diagram illustrating an example of a frame of communication information 4.
- FIG. 8 is a flowchart showing a procedure up to a key update process according to the second embodiment.
- FIG. 1 A first figure.
- FIG. 9 is a hardware configuration diagram. BEST MODE FOR CARRYING OUT THE INVENTION
- the key is updated by the key updating means, and then authentication is performed.
- FIG. 1 is a diagram showing a configuration of an authentication system according to the first embodiment.
- the authentication system includes a communication device 100 serving as an authentication device and a communication device 200 serving as a device to be authenticated.
- the communication device 100 includes an antenna 101, a communication processing unit 110, a storage unit 120, a control unit 130, an update processing unit 196, and an authentication processing unit 197.
- the communication processing unit 110 includes a reception unit 111 and a transmission unit 112.
- the update processing section 196 includes an encryption processing section 140, a random number generation section 150, an update key generation section 160, an individual key generation section 170, a temporary key generation section 180, an update data generation section 190, and an update. It has a confirmation data check section 195.
- the communication device 200 includes an antenna 201, a communication processing unit 210, a storage unit 220, a control unit 230, an update processing unit 296, and an authentication processing unit 297.
- the communication processing unit 210 includes a reception unit 211 and a transmission unit 212.
- the update processing unit 296 includes an encryption processing unit 240, a random number generation unit 250, a temporary key generation unit 280, and an update data check unit. 290, and an update confirmation data generation unit 295.
- ETC automated toll collection
- the communication device 100 is configured as a roadside device on the store side
- the communication device 200 is configured as a vehicle-mounted device on the automobile side.
- FIG. 2 is a diagram illustrating the concept of the authentication system according to the first embodiment.
- ETC electronic book
- drive-through etc.
- the communication device 100 when the communication device 100 is configured as a roadside device on the store side, and when the communication device 200 is configured as a vehicle-mounted device on the automobile side, service provision through ETC, drive-through, etc.
- the store-side roadside machine continues to wait for the user (automobile) to come to the store (pass) with the authentication process performed after startup.
- the roadside unit When a user comes to the store, the roadside unit sends an authentication request to the onboard unit installed in the car.
- the onboard unit transmits necessary information to the roadside unit according to the instruction of the roadside unit. If the roadside unit determines that the information received from the onboard unit is old or has no key, it enters a key update state and issues a key update request to the onboard unit. The onboard unit updates the key according to the instructions of the roadside unit.
- the roadside unit After the key update is completed, the roadside unit enters the authentication state, and performs authentication processing for the onboard unit.
- the authentication system or the authentication method according to the first embodiment includes a key updating unit.
- the authentication process and the update process are separated. No update process is performed during the authentication process.
- the key is updated before the authentication process is performed. That is, at the initial stage (when there is no key information), the key update processing is performed. Alternatively, during normal operation, the authentication process is performed and the key information used for authentication is If the information is old, perform the key update process.
- FIG. 3 is a flowchart showing a procedure of a key updating method according to the first embodiment.
- the storage unit 120 stores a predetermined algorithm identifier, a predetermined encryption key identifier, and an algorithm corresponding to the predetermined algorithm identifier.
- the storage unit 220 stores a predetermined algorithm identifier, a predetermined encryption key identifier, an algorithm corresponding to the predetermined algorithm identifier, a symbol key corresponding to the predetermined encryption key identifier, and a device unique number. .
- the storage unit 220 stores an old or expired authentication key and an identifier of the authentication key. Alternatively, the storage unit 220 may not store the authentication key.
- the predetermined encryption key identifier is a key identifier (update identifier) dedicated to key update.
- the encryption key corresponding to the predetermined encryption key identifier is a key exclusively for key update.
- the identifier of the key for exclusive use of the key update and the key for exclusive use of the key update are used in a key update process associated with the generation of a new key at the initial stage (for example, when the device is shipped) or in a key update process that occurs during a normal operation. This is used in any case of key update processing for generating another new key in an emergency when there is no authentication key that can be shared between 100 and 200. It is not used for authentication processing.
- the authentication processing unit 197 performs an authentication process with the communication device 200 to be the device to be authenticated.
- the authentication processing unit 297 performs an authentication process with the communication device 100 serving as an authentication device.
- it is performed using an authentication key.
- the storage unit 220 stores an old or expired authentication key, or when the storage unit 220 does not store an authentication key, Since the key cannot be used, the authentication process here will fail.
- the random number generation unit 150 when the above-mentioned authentication process fails as a random number generation step, the random number generation unit 150 generates a random number 1.
- transmitting section 112 transmits random number 1 (an example of predetermined information) generated by random number generating section 150 to communication apparatus 200 as communication information 1. I do.
- the communication device 100 By transmitting the random number 1 as the communication information 1 to the communication device 200, the communication device 100 notifies the communication device 200 that the process has shifted from the authentication process to the key update process.
- the receiving unit 211 receives the random number 1 transmitted by the transmitting unit 112 as communication information 1.
- the communication device 200 determines that the key update has been requested from the communication device 100 0 by receiving the random number 1 of the receiver 2 11 1.
- the random number generation unit 250 generates a random number 2 as a part of the authentication processing step.
- the transmission unit 212 transmits a predetermined algorithm identifier, a predetermined encryption key identifier, an apparatus unique number, and a random number generation unit 250 stored in the storage unit 220.
- the generated random number 2 is transmitted as communication information 2 to the communication device 200 that is the authentication device. If it exists, the identifier of the old or expired authentication key and the identifier of the corresponding algorithm are transmitted together.
- one algorithm identifier and one encryption key identifier are represented as a set as a profile, and the communication information 2 is a random number 2, a device unique number, the number of profiles for the number of sets, and each profile identifier for the number of profiles.
- each profile identifier is data in which an algorithm identifier paired with a profile represented by each profile identifier is associated with a symbol key identifier.
- the transmitting unit 212 includes at least one algorithm identifier and at least one encryption key identifier, each storing one algorithm identifier and one encryption key identifier as a set of profiles by the storage unit 220. Is transmitted to the communication device 100 as an authentication device.
- the receiving unit 111 receives, from the communication device 200 to be the authenticated device, the random number 2, the device unique number, the number of profiles corresponding to the number of sets, and at least the number of profiles corresponding to the number of profiles.
- the communication information 2 having at least one algorithm identifier and at least one encryption key identifier corresponding to each profile identifier of one profile identifier and at least one profile identifier is received.
- the renewal key generation unit 160 selects the update key generation unit from the at least one algorithm identifier and the at least one encryption key identifier received by the reception unit 111.
- a predetermined encryption key identifier which is an identifier of a key exclusively used for key update and the predetermined algorithm identifier corresponding to the predetermined encryption key identifier are selected.
- the update key generation unit 160 generates a new authentication key to be an update key using the device unique number and the like received by the reception unit 111 and a hash value, for example. In other words, based on the predetermined algorithm identifier and the predetermined symbol key identifier received by the reception unit 111, the update key generation unit 160 performs the authentication process by the authentication processing unit 197.
- the communication device 200 serving as the device to be authenticated does not hold the authentication key to be used, a new authentication key is generated, and the authentication key used for the authentication process by the
- the authentication processing unit 197 fails to perform authentication with the communication device 200 serving as the device to be authenticated when the communication device 200 serving as the authentication device holds the authentication data, the authentication is performed. Generate a new authentication key to update the authentication key.
- the individual key generation unit 170 The individual key serving as the key for updating the key possessed by the communication device 200 serving as the encryption key corresponding to the predetermined encryption key identifier selected by the update key generation unit 160 is used as the update key generation unit 16 Generated in the same way as 0.
- the temporary key generation unit 180 uses a predetermined encryption key identifier by using an algorithm corresponding to the predetermined algorithm identifier selected by the update key generation unit 160.
- the random numbers 1 and 2 are encrypted with the individual key generated by the individual key generation unit 170 that is the encryption key corresponding to the Generate a temporary key.
- the update data generation unit 190 transmits all or a part of the random number 2 and a new authentication key as an update key to the encryption processing unit 14
- the update data is generated by encrypting with the temporary key generated by the temporary key generation unit 180 using 0.
- the transmission unit 112 As a transmission step, the transmission unit 112 generates a predetermined algorithm identifier, a predetermined encryption key identifier, a predetermined profile identifier, and update data selected by the update key generation unit 160.
- the update data generated by the unit 190 is transmitted as communication information 3 to the communication device 200 serving as the device to be authenticated.
- the receiving unit 2111 includes a predetermined algorithm identifier and a predetermined encryption key identifier transmitted from the communication device 100 as the authentication device by the transmitting unit 2122.
- a profile identifier and update data corresponding to the predetermined algorithm identifier and the predetermined encryption key identifier are received as communication information 3.
- the receiving unit 211 transmits a new algorithm based on the predetermined algorithm identifier and the predetermined encryption key identifier transmitted by the transmitting unit 212 from the communication device 100 serving as the authentication device.
- the cryptographic processing unit 240 checks the profile identifier received by the receiving unit 211, and determines a predetermined encryption key identifier and a predetermined algorithm identifier corresponding to the profile identifier. Check.
- the temporary key generation unit 280 uses an algorithm corresponding to a predetermined algorithm identifier received by the reception unit 211 and confirmed by the encryption processing unit 240. Then, the random numbers 1 and 2 are encrypted with the individual keys stored in the storage unit 220 using the encryption processing unit 240 to generate the temporary key as an example of the update processing encryption key. As described above, the key sharing of the same temporary key has been achieved between the communication devices 100 and 200. In this embodiment, the temporary key generators 180 and 280 encrypt with the individual key when generating the temporary key. However, the authentication device and the device to be authenticated may perform the same process. Therefore, it may be decrypted.
- the update data check unit 290 transmits the encrypted update data received as communication information 3 by the reception unit 211 to the temporary key generation unit 2.
- the decryption is performed using the encryption processing unit 240 using the temporary key generated by 80.
- the update data check unit 290 transmits the data of the decrypted update data to the random number 2 transmitted by the communication device 200 to the communication device 100. Check if it is all or part. If the data of the decrypted update data is all or part of the random number 2, communication for authentication processing is performed properly with the communication device 100, not with an unauthorized attacker. Means that it is. In other words, it means that one of the authentication processes between the communication devices 100 and 200 has succeeded. Then, the update data check unit 290 converts the new authentication key received by the receiving unit 211 obtained by decrypting The key is updated as an update key for performing authentication processing between the communication device 100 and the communication device 200. The update key is stored in the storage unit 220
- the update confirmation data generation unit 295 generates all or a part of the random number 1 by the symbol processing unit 240 and the temporary key generation unit 280.
- Update confirmation data is generated by encrypting with the specified temporary key.
- transmission section 2 12 transmits the update confirmation data generated by update confirmation data generation section 2 95 to communication apparatus 100 as communication information 4.
- the receiving unit 111 receives update confirmation data as communication information 4 from the communication device 200.
- the update confirmation data check unit 195 uses the encrypted update confirmation data received as communication information 4 by the reception unit 111, as a temporary key generation unit. Decryption is performed by the encryption processing unit 140 using the temporary key generated by 180.
- step S221 as an update confirmation data check step, the update confirmation data check unit 195 checks whether the decrypted update confirmation data is the random number 1 transmitted by the communication device 100 to the communication device 200. Check if it is all or part. If the decrypted update confirmation data is all or part of the random number 1, communication for authentication processing is performed properly with the communication device 200, not with an unauthorized attacker. Means that In other words, it means that the other of the authentication processes between the communication devices 100 and 200 was successful.
- the key update process between the communication devices 100 and 200 is completed. Thereafter, the authentication processing unit 197 is generated by the update key generation unit 160. The authentication process with the communication device 200 as the device to be authenticated is performed again using the new authentication key thus obtained. In other words, the authentication processing unit 297 again uses the new authentication key received by the reception unit 211 to perform authentication processing with the communication device 100 as the authentication device again. Do it.
- FIG. 4 is a diagram illustrating an example of a frame of communication information 1.
- communication information 1 has a header and random number 1 data.
- FIG. 5 is a diagram showing an example of a frame of communication information 2.
- communication information 2 includes a header, random number 2 data, a device unique number (device unique No.), the number of profiles (Profi 1e number), and a Profile 1 e as a profile identifier for identifying each profile. 1, ⁇ ⁇ • It has a Profilen, an algorithm identifier (algorithm ID) and an encryption key identifier (key ID) corresponding to each profile identifier.
- algorithm ID an algorithm identifier
- key ID an encryption key identifier
- the identifier of the key dedicated to key update (update identifier) and the algorithm identifier corresponding to the update identifier are described in the last number of the profile.
- data is configured so that the correspondence between each profile identifier, the algorithm identifier corresponding to each profile identifier, and the encryption key identifier can be understood.
- FIG. 6 is a diagram showing an example of a frame of communication information 3.
- communication information 3 includes a header, a Profile 1 en as a predetermined profile identifier for identifying the selected predetermined profile, an algorithm identifier (algorithm ID) corresponding to the predetermined profile identifier, and an encryption key. It has an identifier (key ID) and update data.
- data is configured such that a predetermined profile identifier, an algorithm identifier corresponding to the predetermined profile identifier, and an encryption key identifier can be associated with each other.
- FIG. 7 is a diagram illustrating an example of a frame of communication information 4.
- communication information 4 has a header and update confirmation data.
- control unit 130 controls each unit of the communication device 100. Further, the control unit 230 controls each unit of the communication device 200. Further, storage section 120 stores data generated during processing performed in each section of communication apparatus 100. Further, storage section 220 stores data generated during processing performed by each section of communication apparatus 200.
- the key updating method is performed using an authentication key between an authentication target device that stores a predetermined algorithm identifier and a predetermined encryption key identifier, and the authentication device.
- a second transmitting step of transmitting an identifier to the authentication device and a second receiving step of receiving, by the authentication device, the predetermined algorithm identifier and the predetermined encryption key identifier transmitted in the second transmitting step. And on A generation step in which the authentication device generates a new authentication key based on the predetermined algorithm identifier and the predetermined encryption key identifier received in the second reception step; and a new generation key generated in the generation step.
- the on-board unit that performs the authentication method switches to key update according to the instruction from the roadside unit (key update is performed).
- the in-vehicle unit does not switch to the key update or request the key update at its own discretion.
- the roadside unit that implements this authentication method requests and checks the key information from the onboard unit, and if necessary, instructs the onboard unit to update the key. That is, the processing is performed under the initiative of the roadside machine.
- the present invention is applied to an automobile (vehicle-mounted device) and a roadside device (store system) in ETC, drive-through, and the like, and is assumed, but the communication device is not limited.
- the communication device is not limited.
- base stations and mobile phones wireless LANs (base stations and personal computers), R-W (leader Z writer) and RFT ag (electronic tags), as well as communications between fixed stations and mobile stations, It can be applied to communication and the like.
- the key can be updated even when there is no key or the key has expired, and after that, a legitimate user can be provided with the service.
- the service availability of the system using the present invention and the convenience of the user can be improved.
- a setup operation is further unnecessary. Specifically, for example, at the time of shipment of the vehicle-mounted device and installation of the vehicle-mounted device in a car, it is not necessary to set up the vehicle-mounted device-specific information such as a key used for encrypted communication. As a result, the same on-board unit can be produced in production, and production efficiency is improved. Since the information unique to the vehicle is important for maintaining the security of the system, the acquisition of the unique information at the time of setup involves detailed restrictions such as registration and limitation of the workers. However, the setup Tsu installation can distribution costs and work in any of skill in the art for up work is not required is reduced.
- FIG. 8 is a flowchart showing a procedure up to a key update process according to the second embodiment.
- the authentication processing unit 197 performs an authentication process with the communication device 200 to be the device to be authenticated.
- the authentication processing unit 297 performs an authentication process with the communication device 100 as an authentication device. At the time of authentication processing, this is performed using the authentication key.
- the storage unit 220 stores an old or expired authentication key, or when the storage unit 220 does not store an authentication key, Since the key cannot be used, the authentication process here will fail.
- the transmitting unit 112 transmits failure data indicating that the authentication process has failed to the communication device 200.
- the receiving unit 211 receives the failure data from the communication device 100.
- the transmitting unit 212 transmits (replies) confirmation data (Ack) indicating that the failed data has been received to the communication device 100.
- the communication device 100 starts key update processing by the key update method shown in FIG.
- the authentication processing unit 197 when the authentication processing unit 197 determines that the authentication processing has failed, the authentication processing unit 197 immediately starts the key update processing by the key update method shown in FIG. 3, but as shown in FIG. Alternatively, after confirming that the authentication processing has failed between the communication devices 100 and 200, the key update processing by the key update method may be started.
- FIG. 9 is a hardware configuration diagram.
- a CPU Central Processing Unit
- the CPU 37 has a RAM (R and om Access Memory) 4 built in or via a bus 38.
- a storage device or a storage unit which is connected to a communication port 44 capable of communicating with the outside. Further, as shown in FIG. 9, it may be connected to a storage device such as a ROM (Read Only 1 Memory) 39 and a magnetic disk device 46.
- ROM Read Only 1 Memory
- the program group 49 in FIG. 9 stores a program executed by what has been described as “unit” in the description of each embodiment.
- the program group 49 is stored in the storage device.
- the program group 49 is executed by the CPU 37, OS 47 and the like.
- the storage device stores the result of each process.
- Such communication devices 100 and 200 are not limited to roadside devices on the store side and vehicle-mounted devices on the vehicle side in ETC, drive-through, etc., but also between mobile communication devices such as mobile phones and wired communication devices. It can be used as an authentication device or a device to be authenticated between communication devices, or between a wired and wireless communication device via a base station.
- the key can be renewed even if there is no key or the key has expired, and then a legitimate user can be provided with the service.
- System availability and user convenience can be improved.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/584,193 US7721092B2 (en) | 2003-12-26 | 2004-04-23 | Authenticating device, authenticated device and key updating method |
JP2005516782A JP4567602B2 (ja) | 2003-12-26 | 2004-04-23 | 認証装置及び被認証装置及び鍵更新方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2003-432447 | 2003-12-26 | ||
JP2003432447 | 2003-12-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005067200A1 true WO2005067200A1 (ja) | 2005-07-21 |
Family
ID=34746860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/005879 WO2005067200A1 (ja) | 2003-12-26 | 2004-04-23 | 認証装置及び被認証装置及び鍵更新方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US7721092B2 (ja) |
JP (1) | JP4567602B2 (ja) |
CN (1) | CN100553192C (ja) |
TW (1) | TWI250760B (ja) |
WO (1) | WO2005067200A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009278397A (ja) * | 2008-05-15 | 2009-11-26 | Mitsubishi Electric Corp | 通信装置及び路側機及び車載器及び通信方法及び通信プログラム |
CN101102152B (zh) * | 2006-07-03 | 2011-05-11 | 华为技术有限公司 | 无源光网络中保证数据安全的方法 |
JP2018527778A (ja) * | 2015-06-25 | 2018-09-20 | ジェムアルト エスアー | セキュリティエレメントを認証するための少なくとも1つの認証パラメータを置き換える方法及び対応するセキュリティエレメント |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060026427A1 (en) * | 2004-07-30 | 2006-02-02 | Jefferson Stanley T | Method and system for entity authentication using an untrusted device and a trusted device |
US8213602B2 (en) * | 2006-11-27 | 2012-07-03 | Broadcom Corporation | Method and system for encrypting and decrypting a transport stream using multiple algorithms |
US8468580B1 (en) * | 2009-08-20 | 2013-06-18 | Apple Inc. | Secure communication between trusted parties |
CN104077814B (zh) * | 2013-03-29 | 2017-07-11 | 深圳市金溢科技股份有限公司 | 电子不停车收费系统、设备、认证方法及交易方法 |
US10148430B1 (en) * | 2013-04-17 | 2018-12-04 | Amazon Technologies, Inc | Revocable stream ciphers for upgrading encryption in a shared resource environment |
JP2015001764A (ja) * | 2013-06-13 | 2015-01-05 | パナソニックIpマネジメント株式会社 | 認証方法、通信システム、機器およびサーバ |
JP6160544B2 (ja) * | 2014-04-07 | 2017-07-12 | 株式会社デンソー | 車載器 |
EP4236196A3 (en) * | 2014-05-08 | 2023-10-18 | Panasonic Intellectual Property Corporation of America | In-vehicle network system, fraud-sensing electronic control unit, and anti-fraud method |
CN114022964B (zh) * | 2021-09-24 | 2024-05-17 | 北京中交国通智能交通系统技术有限公司 | Etc应用秘钥更新方法、装置及系统 |
WO2023121671A1 (en) * | 2021-12-23 | 2023-06-29 | Eque Corporation | Systems configured for validation with a dynamic cryptographic code and methods thereof |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1185014A (ja) * | 1997-09-12 | 1999-03-30 | Teruo Matsumoto | 暗号情報交換方式 |
JP2001357370A (ja) * | 2000-06-15 | 2001-12-26 | Sony Corp | データ記憶装置およびデータ記憶方法、情報処理装置および情報処理方法、並びに記録媒体 |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5081677A (en) | 1990-08-31 | 1992-01-14 | International Business Machines Corp. | Crypotographic key version control facility |
EP0656708A1 (en) | 1993-12-03 | 1995-06-07 | International Business Machines Corporation | System and method for the transmission and validation of an updated encryption key between two users |
JP3445490B2 (ja) | 1998-03-25 | 2003-09-08 | 株式会社日立製作所 | 移動体通信方法および移動体通信システム |
WO2000019652A1 (en) | 1998-10-01 | 2000-04-06 | University Of Maryland | Distributed shared key generation and management using fractional keys |
JP2000138674A (ja) | 1998-10-30 | 2000-05-16 | Matsushita Electric Ind Co Ltd | 機器認証および暗号通信システム |
EP0998073B1 (en) | 1998-10-30 | 2006-06-14 | Matsushita Electric Industrial Co., Ltd. | Method and system for inter-equipment authentication and key delivery |
JP3015362B1 (ja) | 1998-12-25 | 2000-03-06 | 松下電器産業株式会社 | Etc認証システム及び認証方法 |
US6895507B1 (en) * | 1999-07-02 | 2005-05-17 | Time Certain, Llc | Method and system for determining and maintaining trust in digital data files with certifiable time |
FI20000760A0 (fi) * | 2000-03-31 | 2000-03-31 | Nokia Corp | Autentikointi pakettidataverkossa |
US20020071563A1 (en) | 2000-12-12 | 2002-06-13 | Kurn David Michael | Method and apparatus for cryptographic key rollover during operation |
WO2002096151A1 (en) | 2001-05-22 | 2002-11-28 | Flarion Technologies, Inc. | Authentication system for mobile entities |
JP2003196240A (ja) | 2001-12-28 | 2003-07-11 | Brother Ind Ltd | サービス提供装置、サービス提供システム、サービス提供プログラムおよび当該プログラムを記録したコンピュータ読み取り可能な記録媒体 |
US7961884B2 (en) * | 2002-08-13 | 2011-06-14 | Ipass Inc. | Method and system for changing security information in a computer network |
CN1457173A (zh) * | 2002-05-08 | 2003-11-19 | 英华达股份有限公司 | 更新网络加密钥匙码的方法 |
US20050120203A1 (en) * | 2003-12-01 | 2005-06-02 | Ryhwei Yeh | Methods, systems and computer program products for automatic rekeying in an authentication environment |
-
2004
- 2004-04-23 CN CNB2004800352039A patent/CN100553192C/zh not_active Expired - Fee Related
- 2004-04-23 JP JP2005516782A patent/JP4567602B2/ja not_active Expired - Lifetime
- 2004-04-23 US US10/584,193 patent/US7721092B2/en not_active Expired - Fee Related
- 2004-04-23 WO PCT/JP2004/005879 patent/WO2005067200A1/ja active Application Filing
- 2004-05-05 TW TW093112613A patent/TWI250760B/zh not_active IP Right Cessation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1185014A (ja) * | 1997-09-12 | 1999-03-30 | Teruo Matsumoto | 暗号情報交換方式 |
JP2001357370A (ja) * | 2000-06-15 | 2001-12-26 | Sony Corp | データ記憶装置およびデータ記憶方法、情報処理装置および情報処理方法、並びに記録媒体 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101102152B (zh) * | 2006-07-03 | 2011-05-11 | 华为技术有限公司 | 无源光网络中保证数据安全的方法 |
JP2009278397A (ja) * | 2008-05-15 | 2009-11-26 | Mitsubishi Electric Corp | 通信装置及び路側機及び車載器及び通信方法及び通信プログラム |
JP2018527778A (ja) * | 2015-06-25 | 2018-09-20 | ジェムアルト エスアー | セキュリティエレメントを認証するための少なくとも1つの認証パラメータを置き換える方法及び対応するセキュリティエレメント |
Also Published As
Publication number | Publication date |
---|---|
US20070150731A1 (en) | 2007-06-28 |
TW200522644A (en) | 2005-07-01 |
CN100553192C (zh) | 2009-10-21 |
JP4567602B2 (ja) | 2010-10-20 |
US7721092B2 (en) | 2010-05-18 |
JPWO2005067200A1 (ja) | 2007-07-26 |
TWI250760B (en) | 2006-03-01 |
CN1886930A (zh) | 2006-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108698563B (zh) | 用于车辆的基于安全智能电话的访问和启动授权系统 | |
EP3780481B1 (en) | Method for upgrading vehicle-mounted device, and related device | |
US8222989B2 (en) | Method for the protection of a movable object, especially a vehicle, against unauthorized use | |
US7742603B2 (en) | Security for anonymous vehicular broadcast messages | |
EP1882346B1 (en) | Communication protocol and electronic communication system, in particular authentication control system, as well as corresponding method | |
KR101838511B1 (ko) | 암호화를 적용한 제어기 보안 방법 및 그 장치 | |
US7155607B2 (en) | Method for authentication between apparatuses using challenge and response system | |
US8422672B2 (en) | Authenticated device, authenticating device and authenticating method | |
CN109587518B (zh) | 图像传输装置、操作图像传输装置的方法以及片上系统 | |
WO2009147734A1 (ja) | 車両、メンテナンス装置、メンテナンスサービスシステム及びメンテナンスサービス方法 | |
JP3920583B2 (ja) | 通信セキュリティ保持方法及びその実施装置並びにその処理プログラム | |
CN115396121B (zh) | 安全芯片ota数据包的安全认证方法及安全芯片装置 | |
JP2006262184A (ja) | 権限所有装置および権限借用装置および制御装置および権限委譲システムおよび権限所有プログラムおよび権限所有方法 | |
WO2005067200A1 (ja) | 認証装置及び被認証装置及び鍵更新方法 | |
CN112396735B (zh) | 网联汽车数字钥匙安全认证方法及装置 | |
CN111083696B (zh) | 通信验证方法和系统、移动终端、车机端 | |
JP5016394B2 (ja) | 無線制御セキュリティシステム | |
JP5503692B2 (ja) | 無線制御セキュリティシステム | |
KR20160093764A (ko) | Otp rom을 활용하는 ecu 보안 통신 시스템 | |
CN114785532B (zh) | 一种基于双向签名认证的安全芯片通信方法及装置 | |
JP2005259028A (ja) | 利用者装置及び利用者装置用プログラム及び認証システム及びプログラム | |
JP4540681B2 (ja) | 通信セキュリティ保持方法及びその実施装置並びにその処理プログラム | |
WO2008015448A2 (en) | Mobile communications systems | |
CN114978505B (zh) | 一种车载密钥更新方法、装置、电子设备及存储介质 | |
CN116248280B (zh) | 免密钥发行的安全模组防盗用方法、安全模组及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480035203.9 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005516782 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
122 | Ep: pct application non-entry in european phase | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2007150731 Country of ref document: US Ref document number: 10584193 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 10584193 Country of ref document: US |