US20050055557A1 - Personal authentication system and portable unit and storage medium used therefor - Google Patents

Personal authentication system and portable unit and storage medium used therefor Download PDF

Info

Publication number
US20050055557A1
US20050055557A1 US10/968,985 US96898504A US2005055557A1 US 20050055557 A1 US20050055557 A1 US 20050055557A1 US 96898504 A US96898504 A US 96898504A US 2005055557 A1 US2005055557 A1 US 2005055557A1
Authority
US
United States
Prior art keywords
section
authentication
card
unit
registration data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/968,985
Inventor
Miki Yamada
Tomoaki Morijiri
Toshiaki Saisho
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Priority to US10/968,985 priority Critical patent/US20050055557A1/en
Publication of US20050055557A1 publication Critical patent/US20050055557A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • the present invention relates to a personal authentication system using a portable unit such as an IC card and a portable unit and storage medium used for the system, more particularly, to a personal authentication system capable of preventing fraud based on tapping, and a portable unit and storage medium used for the system.
  • Magnetic cards are generally used as ID cards of this type. Recently, high-security, high-performance IC cards incorporating semiconductor chips have been used. As compared with a magnetic card, this IC card is designed to make it difficult to read/write internal information, and hence is expected to prevent frauds such as counterfeiting and leakage of information.
  • an IC card is designed to register personal authentication information therein. This allows the collation section of a personal authentication unit to collate the personal authentication information transmitted from the IC card with input information separately obtained by input operation, thereby verifying the right of the person who holds the IC card.
  • the personal authentication information may be a password or the like.
  • a portable unit comprising storage means for storing registration data, and encryption means for encrypting the registration data stored in the storage means in executing personal authentication based on the registration data and new input information, and supplying the obtained ciphertext to a personal authentication unit which is communicatively connected to the portable unit and executes the personal authentication.
  • a personal authentication unit having tamper resistance comprising tamper-resistant decryption means for obtaining registration data by decrypting a ciphertext supplied from a portable unit for storing the registration data and outputting the ciphertext obtained by encrypting the registration data, input means for inputting input information, and collation means for collating the registration data obtained from the decryption means with the input information input from the input means.
  • a portable unit comprising means for storing registration data, and encryption means for, in executing a personal authentication based on the registration data and new input information, supplying a ciphertext obtained by encrypting the registration data stored in the storage means to a fixed section which is communicatively connected to the portable unit and performs transfer processing including encryption between the portable unit and a plurality of personal authentication units for performing personal authentication.
  • a personal authentication system having tamper resistance comprising a tamper-resistant fixed section including first tamper-resistant decryption means for obtaining registration data by decrypting a ciphertext supplied from a portable unit for storing the registration data and outputting the ciphertext obtained by encrypting the registration data, encryption means for sending the ciphertext obtained by encrypting the registration data obtained from the first decryption means with a predetermined cryptographic key, a plurality of tamper-resistant personal authentication units each of which is movably installed, second decryption means for obtaining registration data by decrypting the ciphertext sent from the encryption means with a predetermined cryptographic key, and collation means for collating the registration data obtained from the second decryption means with the input information.
  • a computer readable medium used for a tamper-resistant portable unit which can communicate with a personal authentication unit for executing personal authentication and includes a computer, the medium storing a program for causing the computer to execute a procedure for storing registration data in storage means, and causing the computer to execute an encryption procedure for encrypting the registration data and supplying a obtained ciphertext to the personal authentication unit when executing the personal authentication.
  • a computer readable medium used for a tamper-resistant personal authentication unit having a computer for executing a personal authentication on the basis of a ciphertext supplied from a tamper-resistant portable unit for storing registration data and outputting a ciphertext obtained by encrypting the registration data, the medium storing a program for causing the computer to execute a decryption procedure for obtaining registration data by decrypting the ciphertext supplied from the portable unit, causing the computer to execute an input procedure for inputting input information, and causing the computer to execute a collation procedure for collating the registration data obtained by the decrypt procedure with the input information.
  • a computer readable medium used for a tamper-resistant portable unit having a computer and capable of communicating with a personal authentication system including a tamper-resistant fixed section which has a computer and obtains registration data by decrypting a ciphertext supplied from a tamper-resistant portable unit for storing registration data and outputting a ciphertext obtained by encrypting the registration data, encrypts the obtained registration data by using a predetermined cryptographic key, and transfers the ciphertext to one or more personal authentication units for executing personal authentications, and the plurality of tamper-resistant personal authentication units each of which has a computer, decrypts the ciphertext from the fixed section, and collates obtained information with input information, thereby executing a personal authentication, the medium storing a program for causing the computer to execute a procedure for storing registration data, and causing the computer to execute an encryption procedure for supplying the ciphertext obtained by encrypting the registration data to
  • a computer readable medium used for a personal authentication system including a tamper-resistant fixed section which has a computer and obtains registration data by decrypting a ciphertext supplied from a tamper-resistant portable unit for storing registration data and outputting a ciphertext obtained by encrypting the registration data, encrypts the obtained registration data by using a predetermined cryptographic key, and transfers the ciphertext to one or more personal authentication units for executing personal authentications, and the plurality of tamper-resistant personal authentication units each of which has a computer, decrypts the ciphertext from the fixed section, and collates obtained information with input information, thereby executing a personal authentication, the medium storing a program for causing the computer of the fixed section to execute a first decryption procedure for obtaining registration data by decrypting a ciphertext supplied from the portable unit, causing the computer to execute a second encrypt procedure for encrypting the registration data obtained by
  • a personal authentication system in which even if data between the portable unit and the personal authentication unit is tapped, any information is prevented from being read from the tapped contents, and fraudulent use of the information can be prevented, and a portable unit and storage medium used for the system.
  • FIG. 1 is a block diagram showing the arrangement of a personal authentication system according to the first embodiment of the present invention
  • FIG. 2 is a flow chart for explaining the operation of the first embodiment
  • FIG. 3 is a schematic view for explaining a mutual authentication procedure in the first embodiment
  • FIG. 4 is a block diagram showing the arrangement of a personal authentication system according to the second embodiment of the present invention.
  • FIG. 5 is a flow chart for explaining the operation of the second embodiment.
  • biometrics is a technique of recognizing persons by using biological data.
  • the technical range of biometrics includes, for example, fingerprint recognition, speech recognition, handwritten signature recognition, retina scan recognition, and hand geometry recognition (hand shape, finger length, and the like).
  • each embodiment can also be effectively applied to an arrangement designed to collate passwords with input data.
  • FIG. 1 is a block diagram showing the arrangement of a personal authentication system according to the first embodiment of the present invention.
  • This personal authentication system includes a tamper-resistant IC card 10 and tamper-resistant sensor unit 20 as two types of main constituent elements.
  • tamper resistance is the property of protecting internal information from peeping and tampering. This property can be implemented by adding a known function such as the function of erasing internal information in response to unauthorized access.
  • This personal authentication system includes a client unit 40 .
  • the client unit 40 has a reader/writer function of capable of reading/writing information from/in the inserted IC card (portable unit) 10 , the sensor unit 20 , and business software 30 as well as the general computer function of performing arithmetic processing, display processing, and the like.
  • the reader/writer function may be provided as a discrete unit.
  • the client unit 40 and IC card 10 are implemented by computers which load programs from storage media such as magnetic disks and are controlled by the programs. Note that when biological data is to be registered, the IC card 10 loads a program and operates on the basis of the program afterward.
  • the IC card 10 has tamper resistance and includes a biological data storage section 11 , authentication section 12 , cryptographic key storage section 13 , and encryption section 14 .
  • the biological data storage section 11 is a section in which personal biological data is readably stored in advance.
  • biological data for example, fingerprint data, speech (voiceprint) data, handwritten signature data, retina pattern data, or hand geometry data can be used, as needed.
  • the IC card may be implemented by using firmware designed in advance instead of loading of a program.
  • the authentication section 12 performs a mutual authentication with the sensor unit 20 , and has a certificate 15 for certifying the validity of the self-unit (IC card), a public key Pa of an authentication office for verifying the certificate sent from the sensor unit 20 , an authentication office name for collating verified contents, and a private key Si of the self-unit.
  • the certificate 15 has at least the following three data: the value of a public key Pi of the IC card, the name of the authentication office that has issued the certificate 15 , and the signature obtained by digital signature of a combination of the value of the public key Pi and the authentication office name with a private key Sa of the authentication office.
  • the authentication section 12 has the function of verifying a certificate from the sensor unit 20 when the IC card 10 is inserted into the client unit 40 , the function of causing the IC card to authenticate information indicating that the sensor unit 20 has a private key Ss of the sensor unit 20 , and the function of causing the sensor unit 20 to authenticate information indicating that the IC card 10 has the private key Si.
  • the function of verifying a certificate from the sensor unit 20 is constituted by the function of receiving the certificate 17 from the sensor unit 20 and the function of verifying the certificate received from the sensor unit 20 by using the public key Pa of the authentication office, and checking the verified result by using the authentication office name.
  • the function of causing the authentication section 12 to authenticate information indicating that the sensor unit 20 has the private key Ss is constituted by the function of sending the certificates 15 to the sensor unit 20 and the function of generating a new cryptographic key R (pseudorandom number) if the determination result obtained by verifying the certificate indicates “true”, the function of encrypting the cryptographic key R with a public key Ps of the sensor unit 20 , which is obtained from the certificate from the sensor unit 20 , and sending the obtained ciphertext Ps[R] to the sensor unit 20 , and the function of checking whether the cryptographic key R obtained by decrypting a ciphertext Pi[R] received from the sensor unit 20 with the private key Si of the self-unit coincides with the cryptographic key R sent from the self-unit. If the determination result indicates “true”, the cryptographic key R is written in the cryptographic key storage section 13 .
  • the cryptographic key R is not limited to a pseudorandom number but is preferably a pseudorandom number in order to prevent a prediction from a set of ciphertexts R[D] based on each cryptographic key R generated in the past.
  • the function of causing the sensor unit 20 to authenticate information indicating that the self-unit has the private key Si is constituted by the function of generating a reply M 1 +M 2 containing a message M 1 received from the sensor unit 20 , and generating R[M 1 +M 2 +Si[M 1 +M 2 ]+certificate 15 ] by encrypting, using a random number R, both a signature Si[M 1 +M 2 ] obtained by signing M 1 +M 2 with the private key Si of the self-unit and the certificate 15 of the self-unit, and the function of sending the resultant data to the sensor unit 20 , together with Ps[R] obtained by encrypting the random number R with the public key Ps of the sensor unit 20 which is obtained from the certificate from the sensor unit 20 .
  • R[M 1 +M 2 +Si[M 1 +M 2 ]+certificate 15 ]+PS[R] will be referred to as a digital sealed letter DE[M 1 +M 2 , Si, Ps; R] hereinafter.
  • the cryptographic key storage section 13 stores the cryptographic key R that can be read out by the encryption section 14 .
  • the encryption section 14 has the function of sending the ciphertext R[D] obtained by encrypting the biological data D in the biological data storage section 11 with the cryptographic key R in the cryptographic key storage section 13 to a decryption section 23 in the sensor unit 20 .
  • the sensor unit 20 has tamper resistance and includes an authentication section 21 , a decryption key storage section 22 , the decryption section 23 , a sensor 24 , a collation section 25 , and an arithmetic section 26 .
  • the authentication section 21 performs a mutual authentication with the IC card 10 , and includes a certificate 27 for certifying the validity of the self-unit (sensor unit), the public key Pa of the authentication office for verifying the certificate 15 sent from the IC card 10 , the authentication office name for confirming verified contents, and the private key Ss of the self-unit.
  • the certificate 27 has at least the following three data: the value of a public key Ps of the sensor unit 20 , the name of the authentication office that has issued the certificate 27 , and the signature obtained by digital signature of a combination of the value of the public key Ps and the authentication office name with the private key Sa of the authentication office.
  • the authentication section 21 has the function of verifying the certificate 15 from the IC card 10 when the IC card 10 is inserted into the client unit 40 , the function of causing the IC card 10 to authenticate information indicating that the self-unit has the private key Si of the IC card 10 , and the function of causing the IC card 10 to authenticate information indicating that the self-unit has the private key Ss of the sensor unit 20 .
  • the function of verifying the certificate 15 from the IC card 10 is constituted by the function of sending the certificate 27 to the IC card 10 and the function of verifying the certificate 15 received from the IC card 10 by using the public key Pa of the authentication office, and confirming the verified result by using the authentication office name.
  • the function of causing the IC card 10 to authenticating information indicating that the self-unit has the private key Si of the IC card 10 is constituted by the function of generating a message M 1 with different contents (containing, for example, a random number, time data, and the like) for each authentication, and sending the message M 1 to the IC card 10 , the function of checking whether the message M 1 obtained by decrypting the digital sealed letter DE[M 1 +M 2 , Si, Ps; R] received from the IC card 10 with the private key Ss of the self-unit coincides with the message M 1 sent from the self-unit, and the function of, if the determination result of the certificate 15 contained in the digital sealed letter [M 1 +M 2 , Si, Ps; R] indicates “true”, verifying that the signature Si[M 1 +M 2 ] contained in the digital sealed letter [M 1 +M 2 , Si, Ps; R] is signed by the IC card 10 .
  • the determination result of the message M 1 is “true” and it is verified that the IC card 10 has signed, the authentication processing by the IC card 10 is terminated. If the determination result is “false” or the signature is not verified, an error display signal is generated, and processing is terminated.
  • the function of causing the IC card 10 to authenticate information indicating that the self-unit has the private key Ss of the sensor unit 20 is constituted by the function of decrypting the ciphertext Ps[R] received from the IC card 10 with the private key Ss of the self-unit, encrypting the obtained cryptographic key R with the public key Pi of the IC card 10 which is obtained from the certificate from the IC card 10 , and sending the obtained ciphertext Pi[R] to the IC card 10 , and the function of writing the random number R in the decryption key storage section 22 .
  • the decryption key storage section 22 stores the random number R written by the authentication section 21 such that the decryption section 23 can read it out.
  • the decryption section 23 has the function of decrypting the ciphertext R[D] with the random number R in the decryption key storage section 22 upon reception of the ciphertext R[D] from the encryption section 14 of the IC card 10 , and supplying the obtained biological data D to the collation section 25 .
  • the sensor 24 has the function of biologically measuring the user (IC card holder), generating biological measurement data Dm by electronically converting the measurement result, and supplying the biological measurement data Dm to the collation section 25 .
  • the collation section 25 has the function of collating the biological measurement data Dm received from the sensor 24 with the biological data D received from the decryption section 23 and supplying permission data to the arithmetic section 26 if the two data coincide with each other, and the function of generating an error display signal if the data do not coincide with each other.
  • a fingerprint collation unit, hand geometry collation unit, and the like can be used by the sensor 24 and collation section 25 , as needed.
  • the arithmetic section 26 has the function of computing the permission data received from the collation section 25 and supplying the resultant data to the business software 30 .
  • the business software 30 is an application that has arbitrary contents and can be executed upon reception of the resultant data from the arithmetic section 26 .
  • arbitrary computer software such as an accounting program or plant control program can be used.
  • the client unit 40 is powered on by the user to display an instruction such as a command or user ID input request, and waits for insertion of the IC card 10 .
  • step ST 1 When the user inserts the IC card 10 into the client unit 40 (step ST 1 ), the authentication sections 12 and 21 of the IC card 10 and sensor unit 20 execute verification of certificates and mutual authentication of mutually authenticating that both have private keys (step ST 2 ).
  • step ST 2 The mutual authentication in step ST 2 will be described in detail with reference to FIG. 3 showing an authentication procedure.
  • the authentication section 21 of the sensor unit 20 sends the certificate 27 and the message M 1 with different contents (e.g., a random number, time data, and the like) to the IC card 10 (step ST 21 ).
  • the message M 1 is used for authentication by the IC card 10 .
  • the authentication section 12 of the IC card 10 then verifies the signature of the authentication office (not shown) which is contained in the certificate received from the sensor unit 20 by using the public key Pa of the authentication office, confirms the verified result by using the authentication name, and terminates verification of the certificate 27 if the determination result is “true” (step ST 221 ).
  • the authentication section 12 of the IC card 10 generates the reply M 1 +M 2 to the message M 1 (step ST 222 ), and newly generates the cryptographic key R (step ST 223 ).
  • the authentication section 12 then generates the digital sealed letter DE[M 1 +M 2 , Si, Ps; R] containing the certificate 15 and sends it to the sensor unit 20 (step ST 224 ).
  • the authentication section 21 of the sensor unit 20 decrypts the digital sealed letter DE[M 1 +M 2 , Si, Ps; R] received from the IC card 10 by using the private key Ss of the self-unit so as to obtain the signature Si[M 1 +M 2 ] and the cryptographic key R of the certificate 15 of the IC card 10 (step ST 231 ).
  • the authentication section 21 then decrypts the signature of the authentication office which is contained in the certificate 15 by using the public key Pa of the authentication office, performs true-false determination of the decryption result by using the authentication office name, and terminates the verification of the certificate 15 if the determination result is “true” (step ST 232 ).
  • the authentication section 21 of the sensor unit 20 vertifies the signature Si[M 1 +M 2 ] of the IC card 10 by using the public key Pi of the IC card 10 which is obtained from the certificate 15 , and performs true-false determination of the verified result by using M 1 +M 2 or a message digest of M 1 +M 2 .
  • the authentication section 21 also performs true-false determination to check whether the message M 1 received from the sensor unit 20 coincides with the message M 1 generated by the self-unit. If both the determination results are “true”, the authentication section 21 completes the authentication of information indicating that the IC card 10 has the private key Si of the IC card 10 and is currently connected to the client unit 40 , and writes the cryptographic key R in the decryption key storage section 22 . If either of the two determination results is “false”, an error display signal is generated, and the processing is terminated (step ST 233 ).
  • the authentication section 21 of the sensor unit 20 encrypts the cryptographic key R with the public key Pi of the IC card 10 , and sends the obtained ciphertext Pi[R] to the IC card 10 (step ST 234 ).
  • the authentication section 12 of the IC card 10 checks whether the cryptographic key R obtained by decrypting the ciphertext Pi[R] received from the sensor unit 20 with the private key Si of the self-unit coincides with the cryptographic key R sent from the self-unit. If the determination result is “true”, the authentication section 12 completes authentication of information indicating that the sensor unit 20 has the private key Ss of the sensor unit 20 and is currently connected to the client unit 40 , and writes the cryptographic key R in the cryptographic key storage section 13 . If the determination result is “false”, an error display signal is generated, and the processing is terminated (step ST 24 ). The mutual authentication procedure in step ST 2 is terminated (step ST 2 ).
  • step ST 2 may be replaced with another procedure of mutually verifying certificates, mutually performing authentication, and sharing the cryptographic key R while concealing it from a communication path.
  • the encryption section 14 encrypts the biological data D in the biological data storage section 11 with the cryptographic key R in the cryptographic key storage section 13 , and supplies the obtained ciphertext R[D] to the decryption section 23 in the sensor unit 20 (step ST 3 ).
  • the decryption section 23 decrypts the ciphertext R[D] with the cryptographic key R in the decryption key storage section 22 , and supplies the obtained biological data D to the collation section 25 .
  • the sensor 24 performs a biological measurement on the fingerprint of the user or the like.
  • biological measurement e.g., measuring a fingerprint
  • a finger of the user is put on a measurement surface and a measurement is executed.
  • the sensor 24 Upon reception of a biological measurement signal (step ST 5 ), the sensor 24 generates the biological measurement data Dm by electronically converting the biological measurement result, and supplies the biological measurement data Dm to the collation section 25 .
  • the collation section 25 collates the biological measurement data Dm with the biological data D received from the decryption section 23 to authenticate personal identification (step ST 6 ). If the two data D and Dm do not coincide with each other, “NO” is determined, and an error display signal is generated. If the two data D and Dm coincide with each other., “YES” is determined, and permission data is supplied to the arithmetic section 26 .
  • the arithmetic section 26 computes this permission data (step ST 7 ) and supplies the resultant data to the business software 30 .
  • the business software 30 Upon reception of the resultant data from the arithmetic section 26 , the business software 30 starts to run.
  • the encryption section 14 of the IC card 10 encrypts the biological data D and supplies the obtained ciphertext R[D] to the sensor unit 20 .
  • the decryption section 23 of the sensor unit 20 decrypts the ciphertext R[D] to obtain the biological data D.
  • the collation section 25 then collates the obtained biological data D with the input biological measurement data Dm.
  • the authentication section 12 In the IC card 10 , the authentication section 12 generates the cryptographic key R (pseudorandom number), and the encryption section 14 supplies, to the sensor unit 20 , the ciphertext Ps[R] obtained by encrypting the cryptographic key R with the public key Ps of the sensor unit 20 , and the ciphertext R[D] obtained by encrypting the biological data D with the cryptographic key R.
  • the cryptographic key R of the biological data D can be easily changed. Changing the cryptographic key R frequently can therefore prevent leakage of the biological data D due to tapping or the like and execution of a fraudulent command by a software replacement, thereby increasing the resistance to cryptanalytic attacks.
  • the IC card 10 and sensor unit 20 perform the mutual authentication, the reliability of personal authentication can be improved.
  • a ciphertext can be sent using a different key for every personal authentication by only sending the biological data D from the IC card 10 to the sensor unit 20 upon general digital sealed letter processing (encrypting the text and signature and certification with a random number and further encrypting the random number with the public key of the other party) without taking the procedure in step ST 2 . Therefore, an effect similar to that of the present invention can be obtained.
  • the IC card 10 generates the cryptographic key R, and the key is shared by the sensor unit 20 for every personal authentication. Even if, therefore, internal information leaks from a specific IC card 10 or sensor unit 20 , chain reaction leakage of internal information from another IC card 10 or sensor unit 20 can be prevented.
  • the key pair (public key Ps—private key Ss) of the sensor unit 20 and the cryptographic key R of the IC card 10 can be independently updated, a convenient system having high resistance to cryptanalytic attacks can be realized.
  • the utility of the system can be further improved because there is no possibility that a password is forgotten and a note on which the password is written is read by another person.
  • FIG. 4 is a block diagram showing the arrangement of a personal authentication system according to the second embodiment of the present invention.
  • the same reference numerals as in FIG. 1 denote the same parts in FIG. 4 , and a detailed description thereof will be omitted. The differences between these embodiments will be mainly described below.
  • This embodiment is a modification of the first embodiment.
  • the arrangement of this modification corresponds to a large-scale system, allowing connection of a plurality of sensor units 20 B.
  • a client unit 40 A in place of the sensor unit 20 includes a tamper-resistant client authentication section 20 A and tamper-resistant sensor unit 20 B.
  • FIG. 4 shows only one sensor unit. In practice, however, a plurality of sensor units 20 B are present. These sensor units 10 B may detect the same biological data or different biological data.
  • the sensor units 20 B are movably and detachably connected to the client unit 40 A.
  • One client authentication section 20 A is used, and it has tamper resistance. That is, this section is a fixed section fixed to the client unit.
  • the client authentication section 20 A may be fixed to the client unit 40 A by welding or mounted thereon with a lock.
  • This personal authentication system includes three types of tamper-resistant constituent elements, namely an IC card 10 , the client authentication section 20 A, and the sensor unit 20 B.
  • the client authentication section 20 A has the function of performing a mutual authentication with the IC card 10 , decrypting the ciphertext received from the IC card 10 , encrypting the decryption result with a secret key, and supplying the resultant ciphertext to the sensor unit 20 B.
  • the client authentication section 20 A has tamper resistance and includes an authentication section 21 , decryption key storage section 22 , decryption section 23 a , secret key storage section 28 a , and encryption section 29 .
  • the authentication section 21 and decryption key storage section 22 have the same functions as those described above.
  • the decryption section 23 a has the same decrypting function as that described above and serves to supply obtained biological data D to the encryption section 29 .
  • the secret key storage section 28 a is a section in which a secret key Ck supplied from management software (not shown) is stored so as to be read out by the encryption section 29 .
  • management software is software to be handled by only an authorized manager and may be installed in the client unit 40 A or another server unit (not shown).
  • the encryption section 29 has the function of encrypting the biological data D received from the decryption section 23 a with the secret key Ck in the secret key storage section 28 a and supplying the obtained ciphertext Ck[D] to a decryption section 23 b in the sensor unit 20 B.
  • the sensor unit 20 B has tamper resistance and includes a secret key storage section 28 b , the decryption section 23 b , a sensor 24 , a collation section 25 , and an arithmetic section 26 .
  • the secret key storage section 28 b is a section in which the secret key Ck supplied from the management software (not shown) is stored so as to be read out by the decryption section 23 b.
  • the decryption section 23 b has the function of decrypting the ciphertext Ck[D] with the secret key Ck in the secret key storage section 28 b upon reception of the ciphertext Ck[D] from the encryption section 29 of the client authentication section 20 A, and supplying the obtained biological data D to the collation section 25 .
  • the sensor 24 , collation section 25 , and arithmetic section 26 have the same functions as those described above.
  • This operation is performed in the same manner as described above up to the decryption processing in steps ST 1 through ST 4 .
  • the decryption section 23 a of the client unit 40 A has the same decrypting function as that described above, and decrypts ciphertext R[D] with the cryptographic key R in the decryption key storage section 22 upon reception of the ciphertext R[D] from an encryption section 14 of the IC card 10 (step ST 4 ).
  • the decryption section 23 a supplies the obtained biological data D to the encryption section 29 .
  • the encryption section 29 supplies the ciphertext Ck[D], obtained by encrypting the biological data D received from the decryption section 23 a with the secret key Ck in the secret key storage section 28 a , to the decryption section 23 b in the sensor unit 20 B (step ST 4 a ).
  • the decryption section 23 b decrypts the ciphertext Ck[D] with the secret key Ck in the secret key storage section 28 b (step ST 4 b ), and supplies the obtained biological data D to the collation section 25 .
  • steps ST 5 through ST 7 are executed in the same manner as described above, and execution of business software 30 is started if the user is authenticated.
  • a personal authentication system includes a plurality of sensor units 20 B
  • the same effects as those of the first embodiment can be obtained by connecting each sensor unit 20 B to the client authentication section 20 A according to the secret key scheme.
  • connection of each sensor unit 20 B is changed or the cryptographic key of the client authentication section 20 A is replaced with another one, since the identity of the client unit 40 A can be guaranteed, safety can be assured.
  • the tamper-resistant client authentication section 20 A performs authentication processing, even if a plurality of sensor units 20 B are connected or each sensor unit 20 B is detachable, the safety of authentication processing can be assured.
  • one client authentication section 20 A performs authentication processing, only the key pair (public key Ps—private key Ss) of the client authentication section 20 A needs to be updated in updating the cryptographic key even in a large-scale arrangement including a plurality of sensor units 20 B and a plurality of IC cards 10 .
  • the updated public key Ps can be sent to the IC card 10 in a mutual authentication, the cryptographic key can be easily updated. That is, this system is high in utility.
  • the collation section 25 outputs resultant information through the arithmetic section 26 .
  • the present invention is not limited to this.
  • the present invention can be executed in the same manner and the same effects as those described above can be obtained even in a scheme of concealing a computation result to the business software 30 in starting the execution of the business software 30 with an arrangement in which the arithmetic section 26 encrypts the computation result by using the public key Pi of the IC card 10 and sends the resultant data to the IC card 10 , and the IC card 10 starts the business software 30 through a server unit (not shown).
  • the two authentication sections 12 and 21 perform mutual authentications using certificates.
  • the present invention is not limited to this. Even in a secret key scheme in which both the IC card 10 and the client unit 40 or 40 A respectively have secret keys, the present invention can be executed in the same manner and the same effects as those described-above can be obtained.
  • the biological data D is held in the IC card 10
  • the biological measurement data Dm is input from the sensor 24 in the client unit 40 or 40 A
  • the two data D and Dm are collated with each other.
  • the present invention is not limited to this.
  • the present invention can be executed in the same manner and the same effects as those described above can be obtained even in a scheme in which a password (user information) is held in the IC card 10 , a password (user information) is input from an input device (keyboard, touch panel, or the like) in the client unit 40 or 40 A, and the two passwords are collated with each other.
  • the portable unit has been described as the IC card 10 having tamper resistance.
  • the present invention is not limited to this. Even if the portable unit is an arbitrary personal information unit such as a portable telephone or electronic notepad, the present invention can be executed in the same manner and the same effects as those described above can be obtained as long as the unit has tamper resistance and is portable.
  • the communication scheme between the portable unit and the client unit can be modified to an arbitrary communication scheme such as a scheme using radio waves or infrared rays (light having an arbitrary wavelength).

Abstract

When a personal authentication is to be executed, the encryption section of an IC card encrypts biological data and supplies the obtained ciphertext to a sensor unit. When the decryption section of the sensor unit obtains biological data by decrypting the ciphertext, a collation section collates the biological data with input biological measurement data, thereby authenticating personal identification.

Description

    BACKGROUND OF THE INVENTION
  • This application is based on Japanese Patent Application No. 11-41564, filed Feb. 19, 1999, the contents of which are incorporated herein by reference.
  • The present invention relates to a personal authentication system using a portable unit such as an IC card and a portable unit and storage medium used for the system, more particularly, to a personal authentication system capable of preventing fraud based on tapping, and a portable unit and storage medium used for the system.
  • In general, in a field in which personal rights are verified, personal authentication systems are widely used to verify the rights of persons who hold portable ID card such as credit cards used in business transactions or entrance/exit management cards in restricted areas.
  • Magnetic cards are generally used as ID cards of this type. Recently, high-security, high-performance IC cards incorporating semiconductor chips have been used. As compared with a magnetic card, this IC card is designed to make it difficult to read/write internal information, and hence is expected to prevent frauds such as counterfeiting and leakage of information.
  • If, however, such an IC card is simply designed to hold internal information, it is difficult to prevent another person from fraudulently using the card upon loss or theft or pretending that the card is lost.
  • In order to prevent such frauds, an IC card is designed to register personal authentication information therein. This allows the collation section of a personal authentication unit to collate the personal authentication information transmitted from the IC card with input information separately obtained by input operation, thereby verifying the right of the person who holds the IC card. Note that the personal authentication information may be a password or the like.
  • In the above personal authentication system, however, there is a possibility that communication contents between the IC card and the IC card reader/writer and between the IC card reader/writer and the collation section of the sensor unit are tapped, and the personal authentication information is fraudulently read out and used.
  • BRIEF SUMMARY OF THE INVENTION
  • It is an object of the present invention to provide a personal authentication system in which even if data between a portable unit and a personal authentication unit is tapped, any information is prevented from being read from the tapped contents, and fraudulent use of the information can be prevented, and a portable unit and storage medium used for the system.
  • In order to achieve the above object, according to the first aspect of the present invention, there is provided a portable unit comprising storage means for storing registration data, and encryption means for encrypting the registration data stored in the storage means in executing personal authentication based on the registration data and new input information, and supplying the obtained ciphertext to a personal authentication unit which is communicatively connected to the portable unit and executes the personal authentication.
  • According to the second aspect of the present invention, there is provided a personal authentication unit having tamper resistance, comprising tamper-resistant decryption means for obtaining registration data by decrypting a ciphertext supplied from a portable unit for storing the registration data and outputting the ciphertext obtained by encrypting the registration data, input means for inputting input information, and collation means for collating the registration data obtained from the decryption means with the input information input from the input means.
  • According to the third aspect of the present invention, there is provided a portable unit comprising means for storing registration data, and encryption means for, in executing a personal authentication based on the registration data and new input information, supplying a ciphertext obtained by encrypting the registration data stored in the storage means to a fixed section which is communicatively connected to the portable unit and performs transfer processing including encryption between the portable unit and a plurality of personal authentication units for performing personal authentication.
  • According to the fourth aspect of the present invention, there is provided a personal authentication system having tamper resistance, comprising a tamper-resistant fixed section including first tamper-resistant decryption means for obtaining registration data by decrypting a ciphertext supplied from a portable unit for storing the registration data and outputting the ciphertext obtained by encrypting the registration data, encryption means for sending the ciphertext obtained by encrypting the registration data obtained from the first decryption means with a predetermined cryptographic key, a plurality of tamper-resistant personal authentication units each of which is movably installed, second decryption means for obtaining registration data by decrypting the ciphertext sent from the encryption means with a predetermined cryptographic key, and collation means for collating the registration data obtained from the second decryption means with the input information.
  • According to the fifth aspect of the present invention, there is provided a computer readable medium used for a tamper-resistant portable unit which can communicate with a personal authentication unit for executing personal authentication and includes a computer, the medium storing a program for causing the computer to execute a procedure for storing registration data in storage means, and causing the computer to execute an encryption procedure for encrypting the registration data and supplying a obtained ciphertext to the personal authentication unit when executing the personal authentication.
  • According to the sixth aspect of the present invention, there is provided a computer readable medium used for a tamper-resistant personal authentication unit having a computer for executing a personal authentication on the basis of a ciphertext supplied from a tamper-resistant portable unit for storing registration data and outputting a ciphertext obtained by encrypting the registration data, the medium storing a program for causing the computer to execute a decryption procedure for obtaining registration data by decrypting the ciphertext supplied from the portable unit, causing the computer to execute an input procedure for inputting input information, and causing the computer to execute a collation procedure for collating the registration data obtained by the decrypt procedure with the input information.
  • According to the seventh aspect of the present invention, there is provided a computer readable medium used for a tamper-resistant portable unit having a computer and capable of communicating with a personal authentication system including a tamper-resistant fixed section which has a computer and obtains registration data by decrypting a ciphertext supplied from a tamper-resistant portable unit for storing registration data and outputting a ciphertext obtained by encrypting the registration data, encrypts the obtained registration data by using a predetermined cryptographic key, and transfers the ciphertext to one or more personal authentication units for executing personal authentications, and the plurality of tamper-resistant personal authentication units each of which has a computer, decrypts the ciphertext from the fixed section, and collates obtained information with input information, thereby executing a personal authentication, the medium storing a program for causing the computer to execute a procedure for storing registration data, and causing the computer to execute an encryption procedure for supplying the ciphertext obtained by encrypting the registration data to the fixed section when executing the personal authentication.
  • According to the eighth aspect of the present invention, there is provided a computer readable medium used for a personal authentication system including a tamper-resistant fixed section which has a computer and obtains registration data by decrypting a ciphertext supplied from a tamper-resistant portable unit for storing registration data and outputting a ciphertext obtained by encrypting the registration data, encrypts the obtained registration data by using a predetermined cryptographic key, and transfers the ciphertext to one or more personal authentication units for executing personal authentications, and the plurality of tamper-resistant personal authentication units each of which has a computer, decrypts the ciphertext from the fixed section, and collates obtained information with input information, thereby executing a personal authentication, the medium storing a program for causing the computer of the fixed section to execute a first decryption procedure for obtaining registration data by decrypting a ciphertext supplied from the portable unit, causing the computer to execute a second encrypt procedure for encrypting the registration data obtained by the first decryption procedure with a predetermined cryptographic key and sending the obtained ciphertext, causing at least one of the computers of the personal authentication units to execute a second decryption procedure for obtaining registration data by decrypting the ciphertext sent by the second encryption procedure with a predetermined cryptographic key, and causing the computer to execute a collation procedure for collating the registration data obtained by the second decrypt procedure with the input information.
  • According to the present invention, there are provided a personal authentication system in which even if data between the portable unit and the personal authentication unit is tapped, any information is prevented from being read from the tapped contents, and fraudulent use of the information can be prevented, and a portable unit and storage medium used for the system.
  • Additional objects and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objects and advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out hereinafter.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
  • The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate presently preferred embodiments of the invention, and together with the general description given above and the detailed description of the preferred embodiments given below, serve to explain the principles of the invention.
  • FIG. 1 is a block diagram showing the arrangement of a personal authentication system according to the first embodiment of the present invention;
  • FIG. 2 is a flow chart for explaining the operation of the first embodiment;
  • FIG. 3 is a schematic view for explaining a mutual authentication procedure in the first embodiment;
  • FIG. 4 is a block diagram showing the arrangement of a personal authentication system according to the second embodiment of the present invention; and
  • FIG. 5 is a flow chart for explaining the operation of the second embodiment.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Each embodiment of the present invention will be described below with reference to the views of the accompanying drawing. More specifically, in each embodiment described below, personal biological data is used instead of conventional passwords in consideration of biometric techniques that have currently received attention. Note that biometrics is a technique of recognizing persons by using biological data. The technical range of biometrics includes, for example, fingerprint recognition, speech recognition, handwritten signature recognition, retina scan recognition, and hand geometry recognition (hand shape, finger length, and the like). However, each embodiment can also be effectively applied to an arrangement designed to collate passwords with input data.
  • (First Embodiment)
  • FIG. 1 is a block diagram showing the arrangement of a personal authentication system according to the first embodiment of the present invention. This personal authentication system includes a tamper-resistant IC card 10 and tamper-resistant sensor unit 20 as two types of main constituent elements.
  • Note that tamper resistance is the property of protecting internal information from peeping and tampering. This property can be implemented by adding a known function such as the function of erasing internal information in response to unauthorized access.
  • This personal authentication system includes a client unit 40. The client unit 40 has a reader/writer function of capable of reading/writing information from/in the inserted IC card (portable unit) 10, the sensor unit 20, and business software 30 as well as the general computer function of performing arithmetic processing, display processing, and the like. Note that the reader/writer function may be provided as a discrete unit. The client unit 40 and IC card 10 are implemented by computers which load programs from storage media such as magnetic disks and are controlled by the programs. Note that when biological data is to be registered, the IC card 10 loads a program and operates on the basis of the program afterward.
  • In this case, the IC card 10 has tamper resistance and includes a biological data storage section 11, authentication section 12, cryptographic key storage section 13, and encryption section 14. The biological data storage section 11 is a section in which personal biological data is readably stored in advance. As biological data, for example, fingerprint data, speech (voiceprint) data, handwritten signature data, retina pattern data, or hand geometry data can be used, as needed. Note that the IC card may be implemented by using firmware designed in advance instead of loading of a program.
  • The authentication section 12 performs a mutual authentication with the sensor unit 20, and has a certificate 15 for certifying the validity of the self-unit (IC card), a public key Pa of an authentication office for verifying the certificate sent from the sensor unit 20, an authentication office name for collating verified contents, and a private key Si of the self-unit.
  • The certificate 15 has at least the following three data: the value of a public key Pi of the IC card, the name of the authentication office that has issued the certificate 15, and the signature obtained by digital signature of a combination of the value of the public key Pi and the authentication office name with a private key Sa of the authentication office.
  • More specifically, the authentication section 12 has the function of verifying a certificate from the sensor unit 20 when the IC card 10 is inserted into the client unit 40, the function of causing the IC card to authenticate information indicating that the sensor unit 20 has a private key Ss of the sensor unit 20, and the function of causing the sensor unit 20 to authenticate information indicating that the IC card 10 has the private key Si.
  • In the authentication section 12, the function of verifying a certificate from the sensor unit 20 is constituted by the function of receiving the certificate 17 from the sensor unit 20 and the function of verifying the certificate received from the sensor unit 20 by using the public key Pa of the authentication office, and checking the verified result by using the authentication office name.
  • The function of causing the authentication section 12 to authenticate information indicating that the sensor unit 20 has the private key Ss is constituted by the function of sending the certificates 15 to the sensor unit 20 and the function of generating a new cryptographic key R (pseudorandom number) if the determination result obtained by verifying the certificate indicates “true”, the function of encrypting the cryptographic key R with a public key Ps of the sensor unit 20, which is obtained from the certificate from the sensor unit 20, and sending the obtained ciphertext Ps[R] to the sensor unit 20, and the function of checking whether the cryptographic key R obtained by decrypting a ciphertext Pi[R] received from the sensor unit 20 with the private key Si of the self-unit coincides with the cryptographic key R sent from the self-unit. If the determination result indicates “true”, the cryptographic key R is written in the cryptographic key storage section 13.
  • Note that the cryptographic key R is not limited to a pseudorandom number but is preferably a pseudorandom number in order to prevent a prediction from a set of ciphertexts R[D] based on each cryptographic key R generated in the past.
  • In the authentication section 12, the function of causing the sensor unit 20 to authenticate information indicating that the self-unit has the private key Si is constituted by the function of generating a reply M1+M2 containing a message M1 received from the sensor unit 20, and generating R[M1+M2+Si[M1+M2]+certificate 15] by encrypting, using a random number R, both a signature Si[M1+M2] obtained by signing M1+M2 with the private key Si of the self-unit and the certificate 15 of the self-unit, and the function of sending the resultant data to the sensor unit 20, together with Ps[R] obtained by encrypting the random number R with the public key Ps of the sensor unit 20 which is obtained from the certificate from the sensor unit 20. Note that R[M1+M2+Si[M1+M2]+certificate 15]+PS[R] will be referred to as a digital sealed letter DE[M1+M2, Si, Ps; R] hereinafter.
  • The cryptographic key storage section 13 stores the cryptographic key R that can be read out by the encryption section 14.
  • The encryption section 14 has the function of sending the ciphertext R[D] obtained by encrypting the biological data D in the biological data storage section 11 with the cryptographic key R in the cryptographic key storage section 13 to a decryption section 23 in the sensor unit 20.
  • The sensor unit 20 has tamper resistance and includes an authentication section 21, a decryption key storage section 22, the decryption section 23, a sensor 24, a collation section 25, and an arithmetic section 26.
  • The authentication section 21 performs a mutual authentication with the IC card 10, and includes a certificate 27 for certifying the validity of the self-unit (sensor unit), the public key Pa of the authentication office for verifying the certificate 15 sent from the IC card 10, the authentication office name for confirming verified contents, and the private key Ss of the self-unit. The certificate 27 has at least the following three data: the value of a public key Ps of the sensor unit 20, the name of the authentication office that has issued the certificate 27, and the signature obtained by digital signature of a combination of the value of the public key Ps and the authentication office name with the private key Sa of the authentication office.
  • More specifically, the authentication section 21 has the function of verifying the certificate 15 from the IC card 10 when the IC card 10 is inserted into the client unit 40, the function of causing the IC card 10 to authenticate information indicating that the self-unit has the private key Si of the IC card 10, and the function of causing the IC card 10 to authenticate information indicating that the self-unit has the private key Ss of the sensor unit 20.
  • In the authentication section 21, the function of verifying the certificate 15 from the IC card 10 is constituted by the function of sending the certificate 27 to the IC card 10 and the function of verifying the certificate 15 received from the IC card 10 by using the public key Pa of the authentication office, and confirming the verified result by using the authentication office name.
  • In the authentication section 21, the function of causing the IC card 10 to authenticating information indicating that the self-unit has the private key Si of the IC card 10 is constituted by the function of generating a message M1 with different contents (containing, for example, a random number, time data, and the like) for each authentication, and sending the message M1 to the IC card 10, the function of checking whether the message M1 obtained by decrypting the digital sealed letter DE[M1+M2, Si, Ps; R] received from the IC card 10 with the private key Ss of the self-unit coincides with the message M1 sent from the self-unit, and the function of, if the determination result of the certificate 15 contained in the digital sealed letter [M1+M2, Si, Ps; R] indicates “true”, verifying that the signature Si[M1+M2] contained in the digital sealed letter [M1+M2, Si, Ps; R] is signed by the IC card 10. If the determination result of the message M1 is “true” and it is verified that the IC card 10 has signed, the authentication processing by the IC card 10 is terminated. If the determination result is “false” or the signature is not verified, an error display signal is generated, and processing is terminated.
  • In the authentication section 21, the function of causing the IC card 10 to authenticate information indicating that the self-unit has the private key Ss of the sensor unit 20 is constituted by the function of decrypting the ciphertext Ps[R] received from the IC card 10 with the private key Ss of the self-unit, encrypting the obtained cryptographic key R with the public key Pi of the IC card 10 which is obtained from the certificate from the IC card 10, and sending the obtained ciphertext Pi[R] to the IC card 10, and the function of writing the random number R in the decryption key storage section 22.
  • The decryption key storage section 22 stores the random number R written by the authentication section 21 such that the decryption section 23 can read it out.
  • The decryption section 23 has the function of decrypting the ciphertext R[D] with the random number R in the decryption key storage section 22 upon reception of the ciphertext R[D] from the encryption section 14 of the IC card 10, and supplying the obtained biological data D to the collation section 25.
  • The sensor 24 has the function of biologically measuring the user (IC card holder), generating biological measurement data Dm by electronically converting the measurement result, and supplying the biological measurement data Dm to the collation section 25.
  • The collation section 25 has the function of collating the biological measurement data Dm received from the sensor 24 with the biological data D received from the decryption section 23 and supplying permission data to the arithmetic section 26 if the two data coincide with each other, and the function of generating an error display signal if the data do not coincide with each other. Note that a fingerprint collation unit, hand geometry collation unit, and the like can be used by the sensor 24 and collation section 25, as needed.
  • The arithmetic section 26 has the function of computing the permission data received from the collation section 25 and supplying the resultant data to the business software 30.
  • The business software 30 is an application that has arbitrary contents and can be executed upon reception of the resultant data from the arithmetic section 26. For example, arbitrary computer software such as an accounting program or plant control program can be used.
  • The operation of the personal authentication system having the above arrangement will be described next with reference to the flow chart of FIG. 2. Assume that when a user starts the business software 30 on a client/server system in a company to start terminal jobs, the user is authenticated by the IC card 10.
  • The client unit 40 is powered on by the user to display an instruction such as a command or user ID input request, and waits for insertion of the IC card 10.
  • When the user inserts the IC card 10 into the client unit 40 (step ST1), the authentication sections 12 and 21 of the IC card 10 and sensor unit 20 execute verification of certificates and mutual authentication of mutually authenticating that both have private keys (step ST2).
  • The mutual authentication in step ST2 will be described in detail with reference to FIG. 3 showing an authentication procedure.
  • Every time the IC card 10 is inserted into the client unit 40, the authentication section 21 of the sensor unit 20 sends the certificate 27 and the message M1 with different contents (e.g., a random number, time data, and the like) to the IC card 10 (step ST21). The message M1 is used for authentication by the IC card 10.
  • The authentication section 12 of the IC card 10 then verifies the signature of the authentication office (not shown) which is contained in the certificate received from the sensor unit 20 by using the public key Pa of the authentication office, confirms the verified result by using the authentication name, and terminates verification of the certificate 27 if the determination result is “true” (step ST221).
  • The authentication section 12 of the IC card 10 generates the reply M1+M2 to the message M1 (step ST222), and newly generates the cryptographic key R (step ST223). The authentication section 12 then generates the digital sealed letter DE[M1+M2, Si, Ps; R] containing the certificate 15 and sends it to the sensor unit 20 (step ST224).
  • The authentication section 21 of the sensor unit 20 decrypts the digital sealed letter DE[M1+M2, Si, Ps; R] received from the IC card 10 by using the private key Ss of the self-unit so as to obtain the signature Si[M1+M2] and the cryptographic key R of the certificate 15 of the IC card 10 (step ST231). The authentication section 21 then decrypts the signature of the authentication office which is contained in the certificate 15 by using the public key Pa of the authentication office, performs true-false determination of the decryption result by using the authentication office name, and terminates the verification of the certificate 15 if the determination result is “true” (step ST232).
  • If both the true-false determination results obtained by the authentication sections 12 and 21 are “false”, an error display signal is generated, and the processing is terminated.
  • The authentication section 21 of the sensor unit 20 vertifies the signature Si[M1+M2] of the IC card 10 by using the public key Pi of the IC card 10 which is obtained from the certificate 15, and performs true-false determination of the verified result by using M1+M2 or a message digest of M1+M2. The authentication section 21 also performs true-false determination to check whether the message M1 received from the sensor unit 20 coincides with the message M1 generated by the self-unit. If both the determination results are “true”, the authentication section 21 completes the authentication of information indicating that the IC card 10 has the private key Si of the IC card 10 and is currently connected to the client unit 40, and writes the cryptographic key R in the decryption key storage section 22. If either of the two determination results is “false”, an error display signal is generated, and the processing is terminated (step ST233).
  • The authentication section 21 of the sensor unit 20 encrypts the cryptographic key R with the public key Pi of the IC card 10, and sends the obtained ciphertext Pi[R] to the IC card 10 (step ST234).
  • The authentication section 12 of the IC card 10 then checks whether the cryptographic key R obtained by decrypting the ciphertext Pi[R] received from the sensor unit 20 with the private key Si of the self-unit coincides with the cryptographic key R sent from the self-unit. If the determination result is “true”, the authentication section 12 completes authentication of information indicating that the sensor unit 20 has the private key Ss of the sensor unit 20 and is currently connected to the client unit 40, and writes the cryptographic key R in the cryptographic key storage section 13. If the determination result is “false”, an error display signal is generated, and the processing is terminated (step ST24). The mutual authentication procedure in step ST2 is terminated (step ST2).
  • The above mutual authentication procedure (step ST2) may be replaced with another procedure of mutually verifying certificates, mutually performing authentication, and sharing the cryptographic key R while concealing it from a communication path.
  • A case wherein both the true-false determination results in the authentication sections 12 and 21 are “true”, and mutual authentication is complete will be described next. When this mutual authentication is complete, the two authentication sections 12 and 21 eventually share the newly generated random number R to allow the use of the random number R as a cryptographic key. However, after the mutual authentication, another cryptographic key may be generated and sent from the IC card 10 to sensor unit 20.
  • In the IC card 10, the encryption section 14 encrypts the biological data D in the biological data storage section 11 with the cryptographic key R in the cryptographic key storage section 13, and supplies the obtained ciphertext R[D] to the decryption section 23 in the sensor unit 20 (step ST3).
  • In the sensor unit 20, upon reception of the ciphertext R[D], the decryption section 23 decrypts the ciphertext R[D] with the cryptographic key R in the decryption key storage section 22, and supplies the obtained biological data D to the collation section 25.
  • The sensor 24 performs a biological measurement on the fingerprint of the user or the like. In biological measurement, e.g., measuring a fingerprint, a finger of the user is put on a measurement surface and a measurement is executed. Upon reception of a biological measurement signal (step ST5), the sensor 24 generates the biological measurement data Dm by electronically converting the biological measurement result, and supplies the biological measurement data Dm to the collation section 25.
  • The collation section 25 collates the biological measurement data Dm with the biological data D received from the decryption section 23 to authenticate personal identification (step ST6). If the two data D and Dm do not coincide with each other, “NO” is determined, and an error display signal is generated. If the two data D and Dm coincide with each other., “YES” is determined, and permission data is supplied to the arithmetic section 26.
  • The arithmetic section 26 computes this permission data (step ST7) and supplies the resultant data to the business software 30. Upon reception of the resultant data from the arithmetic section 26, the business software 30 starts to run.
  • As described above, according to this embodiment, in executing personal authentication, the encryption section 14 of the IC card 10 encrypts the biological data D and supplies the obtained ciphertext R[D] to the sensor unit 20. The decryption section 23 of the sensor unit 20 decrypts the ciphertext R[D] to obtain the biological data D. The collation section 25 then collates the obtained biological data D with the input biological measurement data Dm. With this operation, even if the data between the IC card 10 and sensor unit 20 is tapped, since the data is a ciphertext, no information can be read from the tapped contents. This makes it possible to prevent fraud.
  • In the IC card 10, the authentication section 12 generates the cryptographic key R (pseudorandom number), and the encryption section 14 supplies, to the sensor unit 20, the ciphertext Ps[R] obtained by encrypting the cryptographic key R with the public key Ps of the sensor unit 20, and the ciphertext R[D] obtained by encrypting the biological data D with the cryptographic key R. For this reason, the cryptographic key R of the biological data D can be easily changed. Changing the cryptographic key R frequently can therefore prevent leakage of the biological data D due to tapping or the like and execution of a fraudulent command by a software replacement, thereby increasing the resistance to cryptanalytic attacks.
  • In addition, since the IC card 10 and sensor unit 20 perform the mutual authentication, the reliability of personal authentication can be improved.
  • For example, a ciphertext can be sent using a different key for every personal authentication by only sending the biological data D from the IC card 10 to the sensor unit 20 upon general digital sealed letter processing (encrypting the text and signature and certification with a random number and further encrypting the random number with the public key of the other party) without taking the procedure in step ST2. Therefore, an effect similar to that of the present invention can be obtained.
  • With general digital sealed letter processing, however, there is no guarantee whether the biological data is the one obtained currently. Assume that in the client unit 40, software installed by a fraudulent replacement holds a signal obtained from the IC card 10 a week ago and currently sends the signal to the sensor unit 20 so as to fool the sensor unit 20. In this case as well, the sensor unit 20 determines that the IC card 10 is currently inserted.
  • In contrast to this, according to this embodiment, since the above mutual authentication including the exchange of random numbers is performed, it can be checked whether the IC card 10 is inserted at the instant and the sensor unit 20 is connected at the instant. This makes it possible to execute the personal authentication more reliably.
  • In addition, the IC card 10 generates the cryptographic key R, and the key is shared by the sensor unit 20 for every personal authentication. Even if, therefore, internal information leaks from a specific IC card 10 or sensor unit 20, chain reaction leakage of internal information from another IC card 10 or sensor unit 20 can be prevented.
  • Furthermore, since the key pair (public key Ps—private key Ss) of the sensor unit 20 and the cryptographic key R of the IC card 10 can be independently updated, a convenient system having high resistance to cryptanalytic attacks can be realized.
  • With the use of biometric techniques, in addition to the above effects, the utility of the system can be further improved because there is no possibility that a password is forgotten and a note on which the password is written is read by another person.
  • (Second Embodiment)
  • FIG. 4 is a block diagram showing the arrangement of a personal authentication system according to the second embodiment of the present invention. The same reference numerals as in FIG. 1 denote the same parts in FIG. 4, and a detailed description thereof will be omitted. The differences between these embodiments will be mainly described below.
  • This embodiment is a modification of the first embodiment. The arrangement of this modification corresponds to a large-scale system, allowing connection of a plurality of sensor units 20B. A client unit 40A in place of the sensor unit 20 includes a tamper-resistant client authentication section 20A and tamper-resistant sensor unit 20B. For the sake of illustrative convenience, FIG. 4 shows only one sensor unit. In practice, however, a plurality of sensor units 20B are present. These sensor units 10B may detect the same biological data or different biological data. In addition, the sensor units 20B are movably and detachably connected to the client unit 40A.
  • One client authentication section 20A is used, and it has tamper resistance. That is, this section is a fixed section fixed to the client unit. The client authentication section 20A may be fixed to the client unit 40A by welding or mounted thereon with a lock.
  • This personal authentication system includes three types of tamper-resistant constituent elements, namely an IC card 10, the client authentication section 20A, and the sensor unit 20B.
  • In this case, the client authentication section 20A has the function of performing a mutual authentication with the IC card 10, decrypting the ciphertext received from the IC card 10, encrypting the decryption result with a secret key, and supplying the resultant ciphertext to the sensor unit 20B.
  • More specifically, the client authentication section 20A has tamper resistance and includes an authentication section 21, decryption key storage section 22, decryption section 23 a, secret key storage section 28 a, and encryption section 29. Note that the authentication section 21 and decryption key storage section 22 have the same functions as those described above.
  • The decryption section 23 a has the same decrypting function as that described above and serves to supply obtained biological data D to the encryption section 29.
  • The secret key storage section 28 a is a section in which a secret key Ck supplied from management software (not shown) is stored so as to be read out by the encryption section 29. Note that the management software is software to be handled by only an authorized manager and may be installed in the client unit 40A or another server unit (not shown).
  • The encryption section 29 has the function of encrypting the biological data D received from the decryption section 23 a with the secret key Ck in the secret key storage section 28 a and supplying the obtained ciphertext Ck[D] to a decryption section 23 b in the sensor unit 20B.
  • The sensor unit 20B has tamper resistance and includes a secret key storage section 28 b, the decryption section 23 b, a sensor 24, a collation section 25, and an arithmetic section 26.
  • The secret key storage section 28 b is a section in which the secret key Ck supplied from the management software (not shown) is stored so as to be read out by the decryption section 23 b.
  • The decryption section 23 b has the function of decrypting the ciphertext Ck[D] with the secret key Ck in the secret key storage section 28 b upon reception of the ciphertext Ck[D] from the encryption section 29 of the client authentication section 20A, and supplying the obtained biological data D to the collation section 25.
  • The sensor 24, collation section 25, and arithmetic section 26 have the same functions as those described above.
  • The operation of the personal authentication system having the above arrangement will be described next with reference to the flow chart of FIG. 5.
  • This operation is performed in the same manner as described above up to the decryption processing in steps ST1 through ST4.
  • More specifically, the decryption section 23 a of the client unit 40A has the same decrypting function as that described above, and decrypts ciphertext R[D] with the cryptographic key R in the decryption key storage section 22 upon reception of the ciphertext R[D] from an encryption section 14 of the IC card 10 (step ST4).
  • Note, however, that the decryption section 23 a supplies the obtained biological data D to the encryption section 29.
  • The encryption section 29 supplies the ciphertext Ck[D], obtained by encrypting the biological data D received from the decryption section 23 a with the secret key Ck in the secret key storage section 28 a, to the decryption section 23 b in the sensor unit 20B (step ST4 a).
  • In the sensor unit 20B, upon reception of the ciphertext Ck[D] from the encryption section 29 of the client authentication section 20A, the decryption section 23 b decrypts the ciphertext Ck[D] with the secret key Ck in the secret key storage section 28 b (step ST4 b), and supplies the obtained biological data D to the collation section 25.
  • Subsequently, steps ST5 through ST7 are executed in the same manner as described above, and execution of business software 30 is started if the user is authenticated.
  • As described above, according to this embodiment, even if a personal authentication system includes a plurality of sensor units 20B, the same effects as those of the first embodiment can be obtained by connecting each sensor unit 20B to the client authentication section 20A according to the secret key scheme. In addition, even if connection of each sensor unit 20B is changed or the cryptographic key of the client authentication section 20A is replaced with another one, since the identity of the client unit 40A can be guaranteed, safety can be assured.
  • Similarly, since the tamper-resistant client authentication section 20A performs authentication processing, even if a plurality of sensor units 20B are connected or each sensor unit 20B is detachable, the safety of authentication processing can be assured.
  • In addition, since one client authentication section 20A performs authentication processing, only the key pair (public key Ps—private key Ss) of the client authentication section 20A needs to be updated in updating the cryptographic key even in a large-scale arrangement including a plurality of sensor units 20B and a plurality of IC cards 10. In this case, since the updated public key Ps can be sent to the IC card 10 in a mutual authentication, the cryptographic key can be easily updated. That is, this system is high in utility.
  • (Other Embodiments)
  • Note that the techniques described in the above embodiments can be applied, as programs that can be executed by computers, to various units by writing the programs in storage media such as magnetic disks (floppy disks, hard disks, and the like), optical disks (CD-ROMs, DVDS, and the like), magnetooptical disks (MOs), and semiconductor memories, or transmitting the programs through communication media.
  • In each embodiment described above, the collation section 25 outputs resultant information through the arithmetic section 26. However, the present invention is not limited to this. The present invention can be executed in the same manner and the same effects as those described above can be obtained even in a scheme of concealing a computation result to the business software 30 in starting the execution of the business software 30 with an arrangement in which the arithmetic section 26 encrypts the computation result by using the public key Pi of the IC card 10 and sends the resultant data to the IC card 10, and the IC card 10 starts the business software 30 through a server unit (not shown).
  • Furthermore in each embodiment described above, the two authentication sections 12 and 21 perform mutual authentications using certificates. However, the present invention is not limited to this. Even in a secret key scheme in which both the IC card 10 and the client unit 40 or 40A respectively have secret keys, the present invention can be executed in the same manner and the same effects as those described-above can be obtained.
  • In each embodiment described above, the biological data D is held in the IC card 10, the biological measurement data Dm is input from the sensor 24 in the client unit 40 or 40A, and the two data D and Dm are collated with each other. However, the present invention is not limited to this. The present invention can be executed in the same manner and the same effects as those described above can be obtained even in a scheme in which a password (user information) is held in the IC card 10, a password (user information) is input from an input device (keyboard, touch panel, or the like) in the client unit 40 or 40A, and the two passwords are collated with each other.
  • In each embodiment described above, the portable unit has been described as the IC card 10 having tamper resistance. However, the present invention is not limited to this. Even if the portable unit is an arbitrary personal information unit such as a portable telephone or electronic notepad, the present invention can be executed in the same manner and the same effects as those described above can be obtained as long as the unit has tamper resistance and is portable. Furthermore, the communication scheme between the portable unit and the client unit can be modified to an arbitrary communication scheme such as a scheme using radio waves or infrared rays (light having an arbitrary wavelength).
  • Various changes and modifications can be made within the spirit and scope of the invention.
  • Additional advantages and modifications will readily occur to those skilled in the art. Therefore, the invention in its broader aspects is not limited to the specific details and representative embodiments shown and described herein. Accordingly, various modifications may be made without departing from the spirit or scope of the general inventive concept as defined by the appended claims and their equivalents.

Claims (5)

1-3. (Canceled)
4. A personal authentication unit having tamper resistance, comprising:
tamper-resistant decryption means for obtaining registration data by decrypting an encrypted registration data supplied from a portable unit for storing the registration data and outputting the encrypted registration data obtained by encrypting the registration data;
input means for inputting input information; and
collation means for collating the registration data obtained from said decryption means with the input information input from said input means.
5-7. (Canceled)
8. A computer readable medium used for a tamper-resistant personal authentication unit having a computer and executing a personal authentication on the basis of an encrypted registration data supplied from a tamper-resistant portable unit for storing registration data and outputting the encrypted registration data obtained by encrypting the registration data, said medium storing a program which when executed performs a method comprising:
causing said computer to execute a decryption procedure for obtaining registration data by decrypting the encrypted registration data supplied from said portable unit;
causing said computer to execute an input procedure for inputting input information; and
causing said computer to execute a collation procedure for collating the registration data obtained by the decrypt procedure with the input information.
9-19. (Canceled)
US10/968,985 1999-02-19 2004-10-21 Personal authentication system and portable unit and storage medium used therefor Abandoned US20050055557A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/968,985 US20050055557A1 (en) 1999-02-19 2004-10-21 Personal authentication system and portable unit and storage medium used therefor

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP11-041564 1999-02-19
JP04156499A JP4176898B2 (en) 1999-02-19 1999-02-19 Personal authentication system, portable device and storage medium used therefor
US09/506,377 US6910131B1 (en) 1999-02-19 2000-02-18 Personal authentication system and portable unit and storage medium used therefor
US10/968,985 US20050055557A1 (en) 1999-02-19 2004-10-21 Personal authentication system and portable unit and storage medium used therefor

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/506,377 Continuation US6910131B1 (en) 1999-02-19 2000-02-18 Personal authentication system and portable unit and storage medium used therefor

Publications (1)

Publication Number Publication Date
US20050055557A1 true US20050055557A1 (en) 2005-03-10

Family

ID=12611949

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/506,377 Expired - Lifetime US6910131B1 (en) 1999-02-19 2000-02-18 Personal authentication system and portable unit and storage medium used therefor
US10/968,985 Abandoned US20050055557A1 (en) 1999-02-19 2004-10-21 Personal authentication system and portable unit and storage medium used therefor

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/506,377 Expired - Lifetime US6910131B1 (en) 1999-02-19 2000-02-18 Personal authentication system and portable unit and storage medium used therefor

Country Status (2)

Country Link
US (2) US6910131B1 (en)
JP (1) JP4176898B2 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050154875A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporaion Method and system for establishing a trust framework based on smart key devices
US20050154898A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporation Method and system for protecting master secrets using smart key devices
US20070094501A1 (en) * 2005-10-25 2007-04-26 Hidehisa Takamizawa Authentication system, device, and program
US20080065887A1 (en) * 2002-11-05 2008-03-13 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US20080209545A1 (en) * 2007-01-24 2008-08-28 Tomoyuki Asano Authentication System, Information Processing Apparatus and Method, Program, and Recording Medium
US20110239004A1 (en) * 2010-03-29 2011-09-29 Sony Corporation Memory device, host device, and memory system
CN102568097A (en) * 2010-12-08 2012-07-11 邵通 Method and system for improving safety of electronic wallets
WO2014037037A1 (en) * 2012-09-05 2014-03-13 Nec Europe Ltd. Method and system for biometrical identification of a user
US9811671B1 (en) 2000-05-24 2017-11-07 Copilot Ventures Fund Iii Llc Authentication method and system
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US9846814B1 (en) 2008-04-23 2017-12-19 Copilot Ventures Fund Iii Llc Authentication method and system
US20180083932A1 (en) * 2016-09-16 2018-03-22 Bank Of America Corporation Systems and devices for hardened remote storage of private cryptography keys used for authentication
US10574692B2 (en) * 2016-05-30 2020-02-25 Christopher Nathan Tyrwhitt Drake Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements
EP3215977B1 (en) * 2014-11-05 2021-03-31 Bundesdruckerei GmbH Method for altering a data structure stored in a chip card, signature device and electronic system
US20220385655A1 (en) * 2017-09-08 2022-12-01 Kabushiki Kaisha Toshiba Communication control system and communication control device

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4176898B2 (en) * 1999-02-19 2008-11-05 株式会社東芝 Personal authentication system, portable device and storage medium used therefor
FR2806187B1 (en) * 2000-03-10 2004-03-05 Gemplus Card Int BIOMETRIC IDENTIFICATION METHOD, PORTABLE ELECTRONIC DEVICE AND ELECTRONIC BIOMETRIC DATA ACQUISITION DEVICE FOR IMPLEMENTING IT
DE60117197T2 (en) * 2000-04-26 2006-07-27 Semiconductor Energy Laboratory Co., Ltd., Atsugi Communication system and method for identifying a person by means of biological information
US7137008B1 (en) 2000-07-25 2006-11-14 Laurence Hamid Flexible method of user authentication
US9098685B2 (en) * 2000-07-25 2015-08-04 Activcard Ireland Limited Flexible method of user authentication
KR20030038798A (en) * 2000-10-05 2003-05-16 소니 가부시끼 가이샤 Comparing device, data communication system, and data communication method
JP4602606B2 (en) * 2001-08-15 2010-12-22 ソニー株式会社 Authentication processing system, authentication processing method, authentication device, and computer program
US20030061480A1 (en) * 2001-09-14 2003-03-27 Franck Le Method of authenticating IP paging requests as security mechanism, device and system therefor
JP2003110544A (en) * 2001-09-28 2003-04-11 Toshiba Corp Device and method for enciphering and deciphering
JP4145118B2 (en) * 2001-11-26 2008-09-03 松下電器産業株式会社 Application authentication system
GB0210692D0 (en) * 2002-05-10 2002-06-19 Assendon Ltd Smart card token for remote authentication
AU2002328624A1 (en) 2002-08-16 2004-03-03 Fujitsu Frontech Limited Transaction terminal unit, and transaction terminal control method
US20040049686A1 (en) * 2002-09-05 2004-03-11 Chun-Yu Chen Fingerprint identification applied data storage system and method
JP2004104539A (en) 2002-09-11 2004-04-02 Renesas Technology Corp Memory card
US20040199661A1 (en) * 2003-03-05 2004-10-07 Murdock Joseph Bert System and method for the dynamic discovery of network destinations
US20050080844A1 (en) * 2003-10-10 2005-04-14 Sridhar Dathathraya System and method for managing scan destination profiles
JP4707373B2 (en) * 2003-12-16 2011-06-22 株式会社リコー Electronic device, electronic device control method, program, recording medium, management system, and replacement member
JP4420201B2 (en) * 2004-02-27 2010-02-24 インターナショナル・ビジネス・マシーンズ・コーポレーション Authentication method using hardware token, hardware token, computer apparatus, and program
JP2005301988A (en) * 2004-03-15 2005-10-27 Sanyo Electric Co Ltd Living body information processor, personal authentication device, personal authentication system, living body information processing method, and personal authentication method
JP4664644B2 (en) * 2004-10-08 2011-04-06 富士通株式会社 Biometric authentication device and terminal
EP2033132A4 (en) * 2006-06-23 2010-09-08 Semiconductor Energy Lab Personal data management system and nonvolatile memory card
JP5347417B2 (en) * 2008-10-10 2013-11-20 富士電機株式会社 IC card system, its host device, program
US11509649B2 (en) * 2020-10-01 2022-11-22 Oboren Systems, Inc. Exclusive self-escrow method and apparatus

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4993068A (en) * 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
US5153918A (en) * 1990-11-19 1992-10-06 Vorec Corporation Security system for data communications
US5420924A (en) * 1993-04-26 1995-05-30 Pitney Bowes Inc. Secure identification card and method and apparatus for producing and authenticating same by comparison of a portion of an image to the whole
US5644710A (en) * 1995-02-13 1997-07-01 Eta Technologies Corporation Personal access management system
US5721779A (en) * 1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party
US5790668A (en) * 1995-12-19 1998-08-04 Mytec Technologies Inc. Method and apparatus for securely handling data in a database of biometrics and associated data
US5805712A (en) * 1994-05-31 1998-09-08 Intel Corporation Apparatus and method for providing secured communications
US5822431A (en) * 1996-01-19 1998-10-13 General Instrument Corporation Of Delaware Virtual authentication network for secure processors
US5825871A (en) * 1994-08-05 1998-10-20 Smart Tone Authentication, Inc. Information storage device for storing personal identification information
US5864622A (en) * 1992-11-20 1999-01-26 Pitney Bowes Inc. Secure identification card and method and apparatus for producing and authenticating same
US6076167A (en) * 1996-12-04 2000-06-13 Dew Engineering And Development Limited Method and system for improving security in network applications
US6085323A (en) * 1996-04-15 2000-07-04 Kabushiki Kaisha Toshiba Information processing system having function of securely protecting confidential information
US6484260B1 (en) * 1998-04-24 2002-11-19 Identix, Inc. Personal identification system
US6697947B1 (en) * 1999-06-17 2004-02-24 International Business Machines Corporation Biometric based multi-party authentication
US6910131B1 (en) * 1999-02-19 2005-06-21 Kabushiki Kaisha Toshiba Personal authentication system and portable unit and storage medium used therefor

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10154192A (en) 1996-09-27 1998-06-09 N T T Data Tsushin Kk Electronic money system and recording medium

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4993068A (en) * 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
US5153918A (en) * 1990-11-19 1992-10-06 Vorec Corporation Security system for data communications
US5864622A (en) * 1992-11-20 1999-01-26 Pitney Bowes Inc. Secure identification card and method and apparatus for producing and authenticating same
US5420924A (en) * 1993-04-26 1995-05-30 Pitney Bowes Inc. Secure identification card and method and apparatus for producing and authenticating same by comparison of a portion of an image to the whole
US5805712A (en) * 1994-05-31 1998-09-08 Intel Corporation Apparatus and method for providing secured communications
US5825871A (en) * 1994-08-05 1998-10-20 Smart Tone Authentication, Inc. Information storage device for storing personal identification information
US5644710A (en) * 1995-02-13 1997-07-01 Eta Technologies Corporation Personal access management system
US5721779A (en) * 1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party
US5790668A (en) * 1995-12-19 1998-08-04 Mytec Technologies Inc. Method and apparatus for securely handling data in a database of biometrics and associated data
US5822431A (en) * 1996-01-19 1998-10-13 General Instrument Corporation Of Delaware Virtual authentication network for secure processors
US6085323A (en) * 1996-04-15 2000-07-04 Kabushiki Kaisha Toshiba Information processing system having function of securely protecting confidential information
US6076167A (en) * 1996-12-04 2000-06-13 Dew Engineering And Development Limited Method and system for improving security in network applications
US6484260B1 (en) * 1998-04-24 2002-11-19 Identix, Inc. Personal identification system
US6910131B1 (en) * 1999-02-19 2005-06-21 Kabushiki Kaisha Toshiba Personal authentication system and portable unit and storage medium used therefor
US6697947B1 (en) * 1999-06-17 2004-02-24 International Business Machines Corporation Biometric based multi-party authentication

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9811671B1 (en) 2000-05-24 2017-11-07 Copilot Ventures Fund Iii Llc Authentication method and system
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US8065718B2 (en) * 2002-11-05 2011-11-22 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US20080065887A1 (en) * 2002-11-05 2008-03-13 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
US7711951B2 (en) * 2004-01-08 2010-05-04 International Business Machines Corporation Method and system for establishing a trust framework based on smart key devices
US20050154875A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporaion Method and system for establishing a trust framework based on smart key devices
US7849326B2 (en) 2004-01-08 2010-12-07 International Business Machines Corporation Method and system for protecting master secrets using smart key devices
US20050154898A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporation Method and system for protecting master secrets using smart key devices
US7840808B2 (en) * 2005-10-25 2010-11-23 Kabushiki Kaisha Toshiba Authentication system, device, and program
US20070094501A1 (en) * 2005-10-25 2007-04-26 Hidehisa Takamizawa Authentication system, device, and program
US20080209545A1 (en) * 2007-01-24 2008-08-28 Tomoyuki Asano Authentication System, Information Processing Apparatus and Method, Program, and Recording Medium
US8321672B2 (en) * 2007-01-24 2012-11-27 Sony Corporation Authentication system, information processing apparatus and method, program, and recording medium
US11924356B2 (en) 2008-04-23 2024-03-05 Copilot Ventures Fund Iii Llc Authentication method and system
US10275675B1 (en) 2008-04-23 2019-04-30 Copilot Ventures Fund Iii Llc Authentication method and system
US9846814B1 (en) 2008-04-23 2017-12-19 Copilot Ventures Fund Iii Llc Authentication method and system
US11600056B2 (en) 2008-04-23 2023-03-07 CoPilot Ventures III LLC Authentication method and system
US11200439B1 (en) 2008-04-23 2021-12-14 Copilot Ventures Fund Iii Llc Authentication method and system
US9053347B2 (en) * 2010-03-29 2015-06-09 Sony Corporation Memory device, host device, and memory system
US20110239004A1 (en) * 2010-03-29 2011-09-29 Sony Corporation Memory device, host device, and memory system
CN102568097A (en) * 2010-12-08 2012-07-11 邵通 Method and system for improving safety of electronic wallets
WO2014037037A1 (en) * 2012-09-05 2014-03-13 Nec Europe Ltd. Method and system for biometrical identification of a user
US9613250B2 (en) 2012-09-05 2017-04-04 Nec Corporation Method and system for biometrical identification of a user
EP3215977B1 (en) * 2014-11-05 2021-03-31 Bundesdruckerei GmbH Method for altering a data structure stored in a chip card, signature device and electronic system
US10574692B2 (en) * 2016-05-30 2020-02-25 Christopher Nathan Tyrwhitt Drake Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements
US10116633B2 (en) * 2016-09-16 2018-10-30 Bank Of America Corporation Systems and devices for hardened remote storage of private cryptography keys used for authentication
US20180083932A1 (en) * 2016-09-16 2018-03-22 Bank Of America Corporation Systems and devices for hardened remote storage of private cryptography keys used for authentication
US20220385655A1 (en) * 2017-09-08 2022-12-01 Kabushiki Kaisha Toshiba Communication control system and communication control device

Also Published As

Publication number Publication date
US6910131B1 (en) 2005-06-21
JP4176898B2 (en) 2008-11-05
JP2000242750A (en) 2000-09-08

Similar Documents

Publication Publication Date Title
US6910131B1 (en) Personal authentication system and portable unit and storage medium used therefor
EP1571525B1 (en) A method, a hardware token, and a computer program for authentication
US9979709B2 (en) Methods for secure restoration of personal identity credentials into electronic devices
JP5050066B2 (en) Portable electronic billing / authentication device and method
EP2648163B1 (en) A personalized biometric identification and non-repudiation system
CA2417770C (en) Trusted authentication digital signature (tads) system
JP4736744B2 (en) Processing device, auxiliary information generation device, terminal device, authentication device, and biometric authentication system
US7805614B2 (en) Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
US7552333B2 (en) Trusted authentication digital signature (tads) system
US20090293111A1 (en) Third party system for biometric authentication
KR100882617B1 (en) Storage medium issuing method and apparatus
JP2001007802A (en) Method and device for ciphering and deciphering living body information, and principal authentication system utilizing living body information
JP2000215172A (en) Personal authentication system
JPH1139483A (en) Fingerprint authentication card, memory card, authentication system, authentication device and portable equipment
JP2000215280A (en) Identity certification system
US20030070078A1 (en) Method and apparatus for adding security to online transactions using ordinary credit cards
JPH11339045A (en) Method for confirming and issuing electronic data, executing device therefor, medium recorded with processing program therefor and electronic data recording medium
JP4760124B2 (en) Authentication device, registration device, registration method, and authentication method
JP4199156B2 (en) Management system and management method
JPH11282983A (en) Individual identification method by fingerprint data
JP2002158655A (en) Certifying device, collating device and electronic certificate system with which these devices are connected
WO1999005816A1 (en) System and method for authenticating signatures
JP2005346489A (en) Biological information registration method, biological information registration device, authentication medium, program, and recording medium
Chandramouli A New Taxonomy for Analyzing Authentication Processes in Smart Card Usage Profiles
KR20010008028A (en) Smart card reading system having pc security and pki solution and for performing the same

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION