1. Field of the Invention
The present invention relates to a method for generating a device unique key, a secret information LSI with a secret information processing function using the method, a host device mounted with the LSI, a recording medium with an authentication function used in the host device, and a portable terminal with the recording medium having an authentication function. Particularly, it relates to a method for changing a device unique ID including user information (user ID) such as a phone number in a system in which a device unique key is generated in accordance with the device unique ID including the user information when a host device such as a portable terminal is registered or replaced.
2. Description of the Related Art
There is a case where contents of music data, image data or games are downloaded to a host device such as a portable terminal from the Internet or a site managed by a portable phone company or the like, and the contents are stored in a target device so as to be used on the host device such as the portable terminal.
For example, the target device designates a memory card such as an SD card. There is often a charge for the contents, and the contents often include copyrighted ones. The contents cannot be copied but made usable only on the user's host device such as the portable terminal where the contents have been downloaded. Thus, the copyrights of the contents are protected.
The host device such as the portable terminal acquires a device unique ID including a user ID such as a phone number from an external device when the host device is registered or replaced. A device unique key is generated from the device unique ID. The contents are encrypted with the device unique key so that the contents can be used only on the user's host device such as the portable terminal where the contents have been downloaded. Thus, the copyrights of the contents are protected. JP-A-2002-342168 discloses a method for transferring data between host devices such as portable terminals while securing copyright protection of data stored in the host devices such as the portable terminals.
In the aforementioned background-art method for changing a device unique ID, a host device such as a portable terminal acquires a device unique ID including a user ID such as a phone number from an external device when the host device is shipped or replaced. However, the method has a problem that it is difficult to protect the device unique ID or deal with an illegal access.
The present invention was developed in consideration of the foregoing situation. It is an object of the invention to provide a method for generating a device unique key to thereby establish a system for protecting a device unique ID including a user ID such as a phone number acquired from an external device when a host device such as a portable terminal is shipped or replaced, a secret information LSI with a secret information processing function using the method, a host device mounted with the LSI, a recording medium with an authentication function used in the host device, and a portable terminal with the recording medium having an authentication function.
A method for generating a device unique key according to the invention includes the steps of: integrating a fixed ID and a user ID to thereby generate a device unique ID, the fixed ID being determined for a host device in advance and stored in a storage portion of the host device, the user ID being able to be determined desirably by a user; and generating a device unique key based on the device unique ID.
In the method according to the invention, a fixed ID determined for a host device in advance and a user ID which can be determined desirably by a user are integrated to generate a device unique ID. Due to the device unique ID generated newly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention further includes the steps of: making a key generator of a key management mechanism encrypt the fixed ID to thereby generate an encrypted fixed ID; making a secret information processing portion of the host device decrypt the encrypted fixed ID and store the decrypted fixed ID as the fixed ID into the storage portion of the host device; making an I/F of the host device acquire the user ID the user can determine desirably; and making the secret information processing portion of the host device integrate the fixed ID and the user ID to thereby generate a device unique ID.
In the method according to the invention, a device unique key is generated based on an encrypted device unique ID obtained by encrypting a device unique ID. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method in which the step of generating the device unique ID includes the steps of: generating change field information defining a field of the device unique ID in which the user ID should be input; and making the host device input the user ID into a desired field of the device unique ID in accordance with the change field information so as to integrate the user ID with the fixed ID to thereby generate the device unique ID. In addition, the method for generating a device unique key according to the invention includes a method including the step of setting the user ID in the desired field based on the change field information and then making the secret information processing portion of the host device integrate the user ID with the fixed ID so as to generate the device unique ID.
In the method according to the invention, a device unique ID is generated based on change field information defining a field of the device unique ID in which the user ID should be input. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method further including the steps of: making the secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID; storing the encrypted device unique ID into the storage portion of the host device; and making the secret information processing portion of the host device generate a device unique key based on the device unique ID.
In the method according to the invention, an encrypted device unique ID is generated and stored in the storage portion as it is. When the encrypted device unique ID is used, the encrypted device unique ID is decrypted, and a device unique key is generated based on the decrypted device unique ID. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented. That is, when mutual authentication is established between the target device and the host device, an authentication key can be obtained. The device unique ID is bound with the authentication key so that a device unique key is generated. Here, the binding may be performed so that the authentication key is encrypted with the device unique ID, or a logical product is obtained between the device unique ID and the authentication key. In short, it is essential to associate the device unique ID with the authentication key to thereby obtain a device unique key.
The method for generating a device unique key according to the invention includes a method further including the steps of: making the secret information processing portion of the host device generate an authentication key based on mutual authentication between the host device and a target device; and making the secret information processing portion of the host device generate a device unique key based on the device unique ID and using the authentication key generated in the step of generating the authentication key.
In the method for generating a device unique key according to the invention, an authentication key is generated based on mutual authentication between the host device and the target device. When the mutual authentication is not established, a subsequent device unique ID generating process cannot be executed. Accordingly, illegal access from an unauthorized host device can be prevented.
The method for generating a device unique key according to the invention includes a method further including the steps of: making the key generator of the key management mechanism encrypt the change field information to thereby generate encrypted change field information, and store the encrypted change field information into the host device; and making the secret information processing portion of the host device acquire the encrypted change field information and decrypt the change field information.
In the method according to the invention, change field information is encrypted with a key so as to generate an encrypted change field information, while the encrypted change field information is decrypted with the key so as to acquire the change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method further including the step of making an external device I/F of the host device acquire the change field information from the external device.
In the method according to the invention, the host device acquires change field information from the external device. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method in which the step of acquiring the change field information is a step of acquiring the change field information as encrypted change field information.
In the method according to the invention, the host device acquires change field information from the external device in the form of encrypted change field information. Accordingly, protection can be further enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method further including the step of calculating a hash value of the change field information.
In the method according to the invention, a hash value of the change field information is calculated in the host device, and a hash value of the change field information is calculated in the key management mechanism or the like in advance and input to the host device, the hash values are compared in a comparison circuit. When the hash values do not coincide with each other, an abnormal termination process such as reset or suspension of a processing circuit is performed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method in which the change field information is plain text.
In the method according to the invention, the change field information is stored as plain text. Accordingly, confidentialty is poor but management is easy. When the change field information is plain text, it is desired from the point of view of confidentially that the change field information is stored, for example, in the secret information processing portion of the host device.
The method for generating a device unique key according to the invention includes a method further including the step of making an external device I/F of the host device acquire the user ID from an external device when the device unique ID is registered, exchanged, updated or changed.
In the method according to the invention, the user ID is acquired from the external device when the device unique ID is registered, exchanged, updated or changed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method in which the step of acquiring the user ID is a step of acquiring the user ID as an encrypted user ID.
In the method according to the invention, the host device acquires the user ID as an encrypted user ID from the external device. Accordingly, protection can be further enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method further including the step of calculating a hash value of the user ID.
In the method according to the invention, a hash value of the user ID is calculated in the host device, and compared with a stored hash value calculated in the host device or the like by a comparison circuit. When the hash values do not coincide with each other, an abnormal termination process such as reset or suspension of a processing circuit is performed. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method in which the user ID is plain text.
In the method according to the invention, the user ID is stored as plain text. Accordingly, confidentially is poor but management is easy. When the user ID is plain text, it is desired from the point of view of confidentialty that the user ID is stored, for example, in the secret information processing portion of the host device.
The method for generating a device unique key according to the invention includes a method further including the step of making a secret information processing portion of the host device judge the number of times with which the device unique ID has been changed, and update the device unique ID as long as the number of times with which the device unique ID has been changed is not larger than a predetermined number.
In the method according to the invention, the number of times with which the device unique ID has been changed is determined. When the number of times with which the device unique ID has been changed does not exceed a predetermined number, the device unique ID is updated. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method further including the step of making the host device generate an authentication key from information stored in the host device and information stored in the target device.
According to the method according to the invention, illegal access can be prevented more surely.
The method for generating a device unique key according to the invention includes a method in which the host device stores initial-value of the user ID, and it is determined whether the initial-value of the user ID coincides with a user ID portion obtained by a secret information processing portion of the host device decrypting an encrypted fixed ID stored by the host device, or not.
In the method according to the invention, initial-value of the user ID is stored and compared with a user ID in each case. Accordingly, illegal access can be prevented more surely.
The method for generating a device unique key according to the invention includes a method further including the step of making a secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID, and outputting the encrypted device unique ID.
In the method according to the invention, the encrypted device unique ID is encrypted. Accordingly, even when the encrypted device unique ID is stored outside the secret information processing portion, confidentialty can be secured. Accordingly, falsification of the device unique ID or illegal access can be prevented.
The method for generating a device unique key according to the invention includes a method in which the host device stores initial-value of the user ID; and it is determined whether a user ID obtained by decrypting and then separating the encrypted device unique ID input again into the secret information processing portion coincides with the initial value of the user ID stored by the host device in advance, or not.
According to the method according to the invention, authentication can be performed more easily and more surely.
The method for generating a device unique key according to the invention includes a method further including the steps of: making a secret information processing portion of the host device encrypt the device unique ID to thereby generate an encrypted device unique ID; making the secret information processing portion of the host device decrypt an encrypted device unique ID to thereby generate a device unique ID, the encrypted device unique ID being input from the storage portion of the host device through an I/F of the host device; and comparing a user ID input from the outside of the host device through the I/F with a user ID portion of the decrypted device unique ID, and regarding the input user ID as unauthorized and suspending a subsequent encryption/decryption process when the input user ID does not coincide with the user ID portion of the decrypted device unique ID.
According to the method according to the invention, illegality can be found in an early stage.
The method for generating a device unique key according to the invention includes a method further including the steps of: making a key generator of a key management mechanism add a determination flag region and encrypt the fixed ID to thereby generate an encrypted fixed ID; making a secret information processing portion of the host device integrate the fixed ID with the user ID and update the determination flag region to thereby generate a device unique ID; and generating a device unique key based on the device unique ID.
According to the method according to the invention, when a determination flag region is added simply, whether the user ID has been updated or not can be determined without requiring a determination step in an early stage.
The method for generating a device unique key according to the invention includes a method further including the steps of: determining whether the determination flag region has been updated or not; and regarding the determination flag region as unauthorized and suspending processing when the determination flag region has not been updated.
According to the method according to the invention, illegality can be found in an early stage.
The method for generating a device unique key according to the invention includes a method in which the storage portion is disposed in a secret information processing portion.
According to the method, confidentialty can be secured more surely.
The method for generating a device unique key according to the invention includes a method in which the storage portion is disposed in the host device but out of a secret information processing portion of the host device.
According to the method, confidentialty becomes poor. However, if a non-volatile memory or the like is used as the storage portion, the contract details can be taken over extremely easily when the terminal device is changed and updated.
The method for generating a device unique key according to the invention includes a method in which the user ID is encrypted, and input as an encrypted user ID to the secret information processing portion of the host device.
In the method according to the invention, the user ID can be hidden. Accordingly, security can be further enhanced.
A device unique ID according to the invention includes: a fixed ID determined for a host device in advance; and a user ID a user can determine desirably; wherein the fixed ID and the user ID are integrated with each other whenever the user ID is used so that the device unique ID has a data structure which can be changed whenever the device unique ID is used.
The device unique ID according to the invention includes a device unique ID having a data structure in which the fixed ID and the user ID are integrated based on change field information defining a field of the device unique ID the user ID should be input into.
A secret information LSI according to the invention includes a secret information processing portion for generating a device unique ID; wherein the device unique ID has a data structure in which a fixed ID determined for a host device in advance and a user ID a user can determine desirably whenever the user ID is used are integrated with each other so that the data structure can be changed whenever the device unique ID is used.
The secret information LSI according to the invention includes a secret information LSI in which the secret information processing portion integrates the fixed ID with the user ID based on change field information so as to generate the device unique ID, the change field information defining a field of the device unique ID the user ID should be input into.
The secret information LSI according to the invention has a secret information processing function in which the fixed ID determined for the host device in advance and the user ID the user can determine desirably are integrated, and a device unique ID is generated based on the change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
A host device according to the invention includes the secret information LSI.
The host device according to the invention includes a host device further including: a decryption circuit for decrypting an encrypted fixed ID; a storage portion for storing the decrypted fixed ID; an I/F for inputting the user ID the user can determine desirably; and a secret information processing portion by which the fixed ID is read from the storage portion, and the fixed ID and the user ID input through the I/F are integrated to generate a device unique ID.
The host device according to the invention includes a host device further including an encryption circuit for encrypting the device unique ID to thereby generate an encrypted device unique ID.
The host device according to the invention includes a host device further including an authentication key generating circuit for generating an authentication key based on mutual authentication between the host device and the target device.
The LSI according to the invention includes an LSI further including a storage area for storing encrypted change field information.
The host device according to the invention includes a host device further including an external device I/F through which the user ID can be acquired from an external device when the device unique ID is registered, replaced, updated or changed.
The host device according to the invention includes a host device further including an external device I/F through which the change field information can be input from the external device.
The host device according to the invention includes a host device further including a determination circuit for determining the number of times with which the device unique ID has been changed.
A recording medium according to the invention is a recording medium with an authentication function used in the host device.
A portable terminal having a recording medium according to the invention includes a secret information processing function and an authentication function.
In a method for distributing contents using the method according to the invention, a fixed ID determined for the host device in advance and a user ID the user can determine desirably are integrated, and a device unique ID is generated based on change field information. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
A database according to the invention accumulates contents distributed by the contents distributing method. Accordingly, protection of the device unique ID can be enhanced, and illegal access can be prevented.
The user in this document means not a final customer but a maker manufacturing host devices or a shop selling or registering the host devices.
The encryption/decryption in the invention includes both encryption/decryption using a secret key system and a public key system. When the invention is applied to a public key system, it will go well if a secret key is used as a key.
As described above, according to the invention, a fixed ID determined before a host device such as a portable terminal is shipped or replaced is, for example, encrypted in advance and stored in the host device such as the portable terminal. After a user ID such as a phone number is registered from an external device when the host device is shipped or replaced, the fixed ID and the user ID are integrated so that a new device unique ID is generated. Thus, a new device unique ID can be generated whenever a user ID is registered. A device unique key is generated based on the device unique ID. Accordingly, protectability of the device unique ID can be enhanced, and illegal access can be prevented.
Embodiment 1 which is the best mode for carrying out the invention will be described below. In Embodiment 1, a device unique key generating system as an embodiment of the invention will be described.
The target device 101 is a memory card represented by an SD card. When a host device intends to change a device unique ID, the target device 101 performs an authentication process between the target device and the host device. When the target device 101 fails in authentication, the target device 101 is not allowed to generate a key (secret key) serving as an authentication key for decrypting secret information encrypted in advance. With such a configuration, the encrypted secret information can be prevented from being decrypted in an unauthorized host device.
As shown in
The external device 103 is an information management system such as a server. The external device 103 connected to the host device 102 inputs a user ID to the host device 102. When secret information is to be read or written between the target device 101 and the host device 102, the host device 102 has to perform authentication between the target device 101 and the host device 102. Here, in
The key management mechanism 121 is designed to give key information to a key K2 of the secret information LSI 111 of the host device 102 in advance. The key information serves to decrypt this encrypted device unique ID (ID1). When authentication of the key K2 is approved in the secret information LSI 111 of the host device 102, a decryption circuit 113 decrypts the encrypted device unique ID (ID1) with the key K2 so as to acquire the device unique ID (ID0) constituted by the fixed ID portion (IDF) and the variable ID information portion (IDc0). A separation circuit 114 separates this device unique ID into the fixed ID portion (IDF) and the variable ID information portion (IDc0). On this occasion the separation circuit 114 extracts only the fixed ID portion (IDF) while leaving behind the variable ID information portion (IDc0) entirely filled with “0”. Further, the encrypted device unique ID (SID) output from the secret information LSI is input into the secret information LSI again and decrypted by a decryption circuit 118.
When the authentication succeeds thus, the host device 102 reads secret information from the target device 101 through the target I/F portion 104. The host device 102 uses the secret information decrypted by the secret information processing portion 105. Although the secret information processing portion 105 is activated to operate by the host CPU 106, the secret information processing portion 105 is hidden hardware. When the secret information processing portion 105 is activated, the secret information processing portion 105 performs only a predetermined sequence in which security is secured or less security is required.
Here, an integration circuit 115 integrates change field information IF, a user ID (IDu1) and the fixed ID portion (IDF) to thereby form a device unique ID (ID1). The change field information IF is built in the host device 102 in advance. The user ID (IDu1) is input from the external device 103 through the external I/F portion 112. The fixed ID portion (IDF) is extracted by the separation circuit 114. The device unique ID (ID1) obtained thus is encrypted with a key K3 so that an encrypted device unique ID (SID1) is obtained.
Further, the encrypted device unique ID (SID1) obtained thus is decrypted with a key K4 again by the decryption circuit 118 so that a device unique key (device unique secret key) KI is generated by a device unique key generation processing circuit 117 again. The reference numeral 119 designates an encryption/decryption processing control circuit.
Examples of the host device 102 include communicatable portable music player/portable audio player serving as a portable terminal, a network connected portable game machine and a portable phone. Examples of the target device 101 include a memory card (SD card) with an authenticatable copyright protection function, a DVD (DVDRAM) with a copyright protection function and a hard disk with a copyright protection function. Examples of the external device 103 include an information management system such as a server and a phone number registration machine.
First, in a mutual authentication processing step 201 between the host device and the target device, it is determined whether the host device is an unauthorized device or not. When the mutual authentication succeeds here, an encrypted fixed ID is decrypted with a key (K2 in
Then, a change field information processing step 203 is executed. This change field information processing step 203 is a process for handing over designated change field information to a device unique ID generating step 205. In a user ID externally acquiring step 204, a user ID is acquired from the external device and stored in the host device 102.
Further, in the device unique ID generating step 205, the pieces of information obtained in the encrypted fixed ID decryption processing step 202, the change field information processing step 203 and the user ID externally acquiring step 204 are integrated so that a device unique ID is generated.
When the device unique ID is generated thus, a device unique secret key is generated in a device unique secret key generating step 206 using the device unique ID generated in the device unique ID generating step 205. This secret key will be used as a key for hiding information.
When the device unique ID is set illegally, the sequence is terminated abnormally.
Here, the keys K1 to K4 shown in
As shown in
Change field information defines a field of the device unique ID in which the user ID should be put. For example, as shown in
The host device generates a device unique ID from an encrypted fixed ID 403 acquired internally from the host device and a user ID 405 acquired from the external device, and encrypts the device unique ID with a key so as to generate an encrypted device unique ID (encrypted device unique ID generating step 406). This encrypted device unique ID is stored in a storage portion of the host device. The encrypted device unique ID is decrypted with a key 404 by the secret information processing portion of the host device so that a device unique secret key is generated by use of the authentication key 402 (Step 408). Then, this device unique key (device unique secret key) 409 is stored in the host device.
(Encrypted Device Unique ID Generating Process 1)
Processes will be described below in detail as examples of the invention.
The host device 102 has an encrypted fixed ID and a key (502) for decrypting the encrypted fixed ID. When the host device retrieve the encrypted fixed ID stored in the FLASH 110 in
Since the change field information is plain text, the change field information is stored in the secret information processing portion 105 in the secret information LSI 111 in
Further, the generated device unique ID and a device unique ID generating flag are stored in the secret information processing portion 105. Here, the generated device unique ID is encrypted with a key by the secret information processing portion 105 in
Here, the key 502 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 502 used to encrypt the device unique ID. In addition, the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
In
In
The device unique ID 507 is encrypted with the key 502 by the host device so that the encrypted device unique ID is obtained (Step 508). This encrypted device unique ID is stored in the host device. The encrypted fixed ID, the change field information and the encrypted device unique ID are stored in the FLASH 110. The user ID 505 acquired from the external device is stored in the RAM 108.
According to the encrypted device unique ID generating process in this Example, only the user ID is input from the external device while the change field information is provided in the host device in advance. Thus, procedure and management are simplified. In addition, since the change field information is plain text, there is an advantage that it is not necessary to decrypt the change field information. When priority is given to the confidentially of the change field information, the change field information may be stored in the secret information LSI.
(Encrypted Device Unique ID Generating Process 2)
As shown in
That is, as shown in
Next, this encrypted device unique ID generating process will be described along the flow chart of
First, the encrypted fixed ID 601 stored in the FLASH 110 in advance is read. The encrypted fixed ID 601 is decrypted with the key 602 by the secret information processing portion 105 in
When it is concluded in the hash value comparing step 608 that the hash value 605 and the hash value 607 are equal to each other, the host device acquires a user ID 609 from the external device 103 in
The host device stores the generated device unique ID 611 and the generated device unique ID generating flag 613 in the secret information processing portion 105. Here, the host device uses the secret information processing portion 105 in
Here, the key 602 used to decrypt the encrypted fixed ID does not have to be the same as the key 602 used to encrypt the device unique ID. In addition, the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
In
According to the encrypted device unique ID generating process in this Example, only the user ID is input from the external device while the change field information and the hash value are stored in the host device in advance. Thus, procedure and management are simplified. In addition, when the change field information is falsified from the outside such as an external device, the falsification can be detected.
(Encrypted Device Unique ID Generating Process 3)
The host device has an encrypted fixed ID 701, encrypted change field information 704, and a key 702 for decrypting the encrypted fixed ID and the encrypted change field information. When the host device reads the encrypted fixed ID 701 stored in the FLASH 110 in
When the host device then reads the encrypted change field information 704 stored in the FLASH 110 in
The host device acquires a user ID 706 from the external device 103 in
The device unique ID 708 and the device unique ID generating flag 710 generated thus are stored in the secret information processing portion 105. Here, the host device uses the secret information processing portion 105 in
Here, the key 702 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 702 used to encrypt the device unique ID. In addition, the fixed ID or the change field information does not have to be encrypted as long as access thereto from any unauthorized external device or the like can be blocked.
In
According to the encrypted device unique ID generating process in this Example, only the user ID is input from the external device while the encrypted change field information is provided in the host device in advance. Thus, procedure and management are simplified. In addition, even if the encrypted change field information can be read from the outside such as an external device, the change field information can be prevented from being browsed because the change field information is encrypted.
(Encrypted Device Unique ID Generating Process 4)
The host device has a key 802 for decrypting an encrypted fixed ID 801 and encrypting a device unique ID. When the host device reads the encrypted fixed ID 801 stored in the FLASH 110 in
The host device acquires change field information 804 and a user ID 805 from the external device 103 in
In
According to the encrypted device unique ID generating process in this Example, the change field information can be set from the external device effectively, for example, in setting a plurality of user IDs.
(Encrypted Device Unique ID Generating Process 5)
The host device has a key 902 for decrypting an encrypted fixed ID 901 and encrypting a device unique ID. (The key 902 is also used for encryption as will be described later.) When the host device reads the encrypted fixed ID 901 stored in the FLASH 110 in
The host device acquires change field information 904 and a hash value 905 of the change field information from the external device 103. In a step 906 for calculating the hash value of the acquired change field information 904, the host device calculates a hash value 907. In a hash value comparing step 908, the host device compares the hash value 907 with the hash value 905 acquired from the external device. When falsification of the change field information 904 is not detected, the host device stores the change field information 904 in the secret information processing portion 105 in
The host device then acquires a user ID 909 from the external device 103 and stores the user ID 909 in the RAM 108. In an integration processing step 910, the host device uses the secret information processing portion 105 in
In
According to the encrypted device unique ID generating process in this Example, the change field information and the hash value of the change field information are acquired from the external device. It is therefore possible to detect falsification of the change field information.
(Encrypted Device Unique ID Generating Process 6)
The host device has an encrypted fixed ID 1001, and a key 1002 used to decrypt the encrypted fixed ID and encrypted change field information and to encrypt a device unique ID 1008. When the host device reads the encrypted fixed ID 1001 stored in the FLASH 110 in
The host device acquires encrypted change field information 1004 from the external device 103 and stores the encrypted change field information 1004 in the RAM 108. When the host device reads the encrypted change field information 1004 stored in the RAM 108, the host device uses the secret information processing portion 105 in
Then, the host device acquires a user ID 1006 from the external device 103 and stores the user ID 1006 in the RAM 108. In an integration processing step 1007, the host device uses the secret information processing portion 105 in
Here, the key 1002 used to decrypt the encrypted fixed ID does not have to be the same as the key 1002 used to encrypt the device unique ID. Further, the key used to decrypt the encrypted fixed ID, the key used to encrypt the device unique ID and the key used to decrypt the encrypted change field information may be totally different from one another.
In
According to the encrypted device unique ID generating process in this Example, the encrypted change field information and the user ID are acquired from the external device. It is therefore possible to hide the change field information.
(Encrypted Device Unique ID Generating Process 7)
The host device has an encrypted fixed ID 1101, and a key 1102 for decrypting encrypted change field information 1104 and the encrypted fixed ID and for encrypting a device unique ID 1112. When the host device reads the encrypted fixed ID 1101 stored in the FLASH 110 in
When the host device then reads the encrypted change field information 1104 stored in the FLASH 110 in
The host device acquires a user ID 1106 and a hash value 1107 of the user ID from the external device 103. In a step 1108 for calculating the hash value of the acquired user ID 1106, the host device calculates a hash value 1109. In a hash value comparing step 1110, the host device compares the hash value 1107 with the hash value 1109. When falsification of the user ID 1106 is not detected, the host device stores the user ID 1106 in the secret information processing portion 105 in
In an integration processing step 1111, the host device uses the secret information processing portion 105 in
Here, the key 1102 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 1102 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 12 may be used as the method for setting the change field information.
In
According to the encrypted device unique ID generating process in this Example, the user ID and the hash value of the user ID are acquired from the external device. It is therefore possible to detect falsification of the user ID.
(Encrypted Device Unique ID Generating Process 8)
When the host device reads the encrypted fixed ID 1201 stored in the FLASH 110 in
Then, the host device reads the change field information 1205 stored in the FLASH 110 in
The host device acquires an encrypted user ID 1206 from the external device 103 and stores the encrypted user ID 1206 in the RAM 108. When the host device reads the encrypted user ID 1206 stored in the RAM 108, the host device uses the secret information processing portion 105 in
In an integration processing step 1208, the host device uses the secret information processing portion 105 in
Here, the key 1202 used to decrypt the encrypted fixed ID does not have to be the same as the key 1202 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 12 may be used the method for setting the change field information.
In
According to the encrypted device unique ID generating process in this Example, the encrypted user ID is acquired from the external device. It is therefore possible to hide the user ID.
(Encrypted Device Unique ID Generating Process 9)
When the host device reads the encrypted fixed ID 1301 stored in the FLASH 110 in
When the host device then reads the encrypted change field information 1304 stored in the FLASH 110 in
The host device acquires an encrypted user ID 1306 from the external device 103 and stores the encrypted user ID 1306 in the RAM 108. In a number-of-times-of-change information updating step 1307, the host device updates number-of-times-of change information 1308. In a number-of-times determining step 1310, the host device compares the number-of-times-of-change information 1308 with number-of-times-of-change control information 1309 set in the host device in advance. When the number-of-times-of-change information 1308 does not exceed the number-of-times-of-change control information 1309, the secret information processing portion 105 in
The device unique ID 1312 and the device unique ID generating flag 1314 generated thus are stored in the secret information processing portion 105. Here, the host device uses the secret information processing portion 105 in
Here, the key 1302 used to decrypt the encrypted fixed ID and the encrypted change field information does not have to be the same as the key 1302 used to encrypt the device unique ID. Further, any one of the methods described with reference to FIGS. 6 to 14 may be used as the method for setting the change field information and the user ID.
In
According to the encrypted device unique ID generating process in this Example, it is possible to control the number of times with which the device unique ID has been updated.
(Device Unique Secret Key Generating Process 1)
An encrypted device unique ID 1401 obtained by any one of the methods described with reference to FIGS. 6 to 16 is read from the FLASH 110 in
In an illegality detecting step 1405, it is determined whether there is or not an illegal attempt to generate a device unique secret key from a device unique ID generating flag 1404 and the device unique ID 1403 obtained by any one of the methods described with reference to FIGS. 6 to 16. When there is no illegal attempt, an authentication process is performed between the host device of
The host device decrypts contents with the obtained device unique secret key 1407. For example, encrypted contents data received from the external device 103 are decrypted with the device unique secret key 1407 stored in the FLASH 110, and stored in a predetermined contents data storage unit. Thus, a user can use the contents data.
In
According to the device unique secret key generating step in this Example, it is possible to detect an illegal ID. For example, the device unique secret key is not generated when the phone number is not registered.
Example 11 of the invention will be described below.
In the system in Example 8 shown in
That is, as shown in
On the other hand, a user ID input from the outside of the host device through the external IF 112 is compared with a user ID portion of the decrypted device unique ID by a comparison circuit 133. When the input user ID does not coincide with the user ID portion, the output control circuit 134 regards the user ID as unauthorized, and suspends a subsequent encryption/decryption process.
Further, the encrypted device unique ID is decrypted by the decryption circuit 118 and separated by a separation circuit 191. A user ID obtained thus is compared with an initial value of the user ID by a comparison circuit 192. When the user ID coincides with the initial value of the user ID, the user ID is regarded as not updated, and the sequence is terminated abnormally. Further, the user ID is compared with a user ID input from the external device by a comparison circuit 193. When the result of the comparison indicates that the user IDs do not coincide with each other, an encryption/decryption process is controlled by a control circuit 119 so as to terminate the sequence abnormally. The configuration on the upstream side of the comparison circuits in
When an encrypted fixed ID and a plaintext user ID are input in
Based on change field information IF, the fixed ID and the user ID are integrated by the integration circuit 115. The encrypted device unique ID is decrypted with the key K2 by the decryption circuit 113 and separated into the fixed ID portion and the user ID portion by a separation circuit 114.
The user ID input to the host device in the aforementioned manner and the initial value of the user ID registered in the host device in advance are compared with each other by the comparison circuit 133. The integrated device unique ID is encrypted again with the key K3 by the encryption circuit 116.
When the output of the comparison circuit 133 indicates that the input user ID does not coincide with the initial value of the registered user ID, the output control circuit 134 performs control not to output an encrypted device unique ID (SID).
Otherwise, the output control circuit generates an encrypted device unique ID (SID).
At the same time, the initial value of the decrypted user ID and a value attached to the secret information processing portion in advance are compared with each other by the comparison circuit 192. When the result of the comparison in the comparison circuit 192 indicates that the two values coincide with each other, the encryption/decryption processing control circuit 119 does not output a device unique secret key. Only when the comparison result indicates that the two values do not coincide with each other, the encryption/decryption processing control circuit 119 outputs a device unique secret key. That is, there is fear that an unregistered user ID would be decrypted if the user ID were used as it is. Therefore, it is checked here whether the user ID has been registered or not. Since determination is made based on the comparison with the information of the initial value in the aforementioned manner, security can be further enhanced.
The encrypted device unique ID output when the comparison circuit 133 concludes that the user ID coincides with the initial value of the user ID is then input into the secret information processing portion again and decrypted with the key K4 by the decryption circuit 118. An authentication secret key generated based on mutual authentication between the host device and the target device and a device unique ID are input to a device unique key generation processing circuit 117. Thus, a device unique key (device unique secret key) KI is generated.
In parallel with this, a user ID is separated from the device unique ID generated in the secret information processing portion by the separation circuit 191, and compared with the value attached to the secret information processing portion in advance by the comparison circuit 192. When the comparison result indicates that the separated user ID coincides with the attached value, reset etc. is executed so that a subsequent encryption/decryption process is prevented from being performed. When the comparison result indicates that the separated user ID does not coincide with the attached value, the user ID is regarded as normal, and the subsequent encryption/decryption process is allowed to be performed. Then, a user ID input from the outside is compared with the user ID separated by the separation circuit 191 by a comparison circuit 193. When the comparison result indicates that the two user IDs do not coincide with each other, reset etc. is executed so that a subsequent encryption/decryption process is prevented from being performed. When the comparison result indicates that the two user IDs coincide with each other, the user ID is regarded as normal, and the subsequent encryption/decryption process is allowed to be performed.
The other configuration is formed in the same manner as that in Example 11. In
According to this configuration, the user ID is encrypted with a desired key and stored in a hidden state into the outside of the secret information LSI 111. Since the encrypted user ID is read and integrated with the fixed ID and the change field information, the hidden state of the user ID can be kept easily.
Accordingly, even if the user ID is known, the device unique key cannot be generated by use of a raw user ID because the user ID is encrypted by the encryption circuit 161.
In terms of the circuit configuration, Example 13 is different from Example 11 in that an encrypted user ID is input from the external device to a decryption circuit 194 of the secret information LSI of the host device 102. Here, the user ID encrypted by the ID converter 151 of the key management mechanism is decrypted with a key K5 by a decryption circuit 194 in the secret information LSI of the host device, and integrated with a fixed ID and change field information by an integration circuit 115 in the same manner as in Example 11.
In this manner, the user ID is encrypted so that the user ID can be hidden more surely accordingly.
According to the embodiment, when the host device 102 downloads a ringing tone etc., a host CPU 106 gives an instruction to a secret information LSI 111 so that the secret information LSI 111 performs data exchange with the contents provider 113 through the external I/F portion 112 in the same manner as data exchange with the target device 101. In this manner, the contents provider 113 can be protected.
Next, Embodiment 3 of the invention will be described.
That is, the device unique ID is roughly constituted by three parts, i.e. a determination flag region, a fixed ID 301 and a user ID 304. When the determination flag region is provided in the device unique ID, it is possible to determine whether the user ID has been updated correctly or not. The determination flag region may contain one bit or a plurality of bits. The determination flag region is used only as a determination flag. The device unique key generating method based on a device unique ID constituted by the fixed ID and the user ID excluding the determination flag region may be used in a device unique key generating process.
As shown in
The device unique ID is formed by the key management mechanism so that a flag region is provided ahead of a fixed ID. The device unique ID where a user ID has not yet been registered has a configuration in which the fixed ID 301 and a user ID 303 are encrypted as shown in
Change field information defines a field of the device unique ID in which the user ID should be put in the same manner as in the aforementioned embodiment. For example, as shown in
The encrypted device unique ID is decrypted when a device unique key is generated. In this event, the flag is checked to determine whether the device unique ID has been updated correctly or not. When the flag has been asserted, the device unique key is generated. When the flag has not been asserted, processing is suspended to prevent the device unique key from being generated.
In a system shown in
The encrypted device unique ID (SID) is input to the secret information LSI 111 again and decrypted with a key K4 by a decryption circuit 118. A flag determination region is separated from the decrypted device unique ID by a separation circuit 195. The determination flag region is checked by a flag determination circuit 194. When the determination flag has not been asserted correctly, the processing is terminated abnormally. When the determination flag has been asserted, a device unique key generating process 117 is executed to generate a device unique key KI.
In this Example, when the encrypted device unique ID is decrypted to generate a device unique key, the flag is checked to determine the device unique ID has been updated correctly or not. When the flag has been asserted, the device unique key is generated. When the flag has not been asserted, processing is suspended to prevent the device unique key from being generated.
The same method as that described in Embodiment 1 may be used as the method for inputting change field information and a user ID in this Example. As for control of the number of times with which the device unique ID has been changed, the method described in Embodiment 1 may be combined likewise.
According to the embodiment, a determination flag region is defined in a device unique ID. Accordingly, input of an unauthorized encrypted device unique ID does not lead to operation. Thus, illegal access can be prevented.
The invention is applicable to a system for registration or model change of portable phones etc. because of very high security and simple management.
Number | Date | Country | Kind |
---|---|---|---|
P2005-079465 | Mar 2005 | JP | national |
P2005195213 | Jul 2005 | JP | national |