WO2003067811A1 - Terminal de communication mobile, procede de traitement d'informations, programme de traitement de donnees et support d'enregistrement - Google Patents
Terminal de communication mobile, procede de traitement d'informations, programme de traitement de donnees et support d'enregistrement Download PDFInfo
- Publication number
- WO2003067811A1 WO2003067811A1 PCT/JP2003/001299 JP0301299W WO03067811A1 WO 2003067811 A1 WO2003067811 A1 WO 2003067811A1 JP 0301299 W JP0301299 W JP 0301299W WO 03067811 A1 WO03067811 A1 WO 03067811A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- key
- encryption
- information
- encrypted
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to a mobile communication terminal, an information processing method, a data processing program, and a recording medium.
- encryption key data (hereinafter referred to as “encryption key”) is used.
- encryption key data encryption using an encryption key has become more difficult. In some cases, it is not always effective in preventing unauthorized data such as data theft or tampering by a third party.
- the present invention provides a mobile communication terminal, an information processing method, a data processing program, and a recording medium that make it difficult to analyze encrypted data and ensure high confidentiality of the data. That is the task.
- a mobile communication terminal uses a first encryption key to encrypt data stored in the mobile communication terminal (regardless of file or program, singular or plural).
- Data encryption means first key encryption means for encrypting the first encryption key using a second encryption key, and encryption by the data encryption means
- generating means for generating an encrypted file of the data.
- a data encryption step a first key encryption step of encrypting the first encryption key using a second encryption key, and data encrypted in the data encryption step; From the first encryption key encrypted in the key encryption step and user-specific information that can identify the user of the mobile communication terminal for generating the second code key, Generating an encrypted file for generating an encrypted file.
- a data processing program provides a computer with a data encryption function of encrypting data using a first encryption key, and a data encryption function using a second encryption key.
- a first key encryption function for encrypting a first encryption key, data encrypted by the data encryption function, and a first encryption key encrypted by the first key encryption function And an encrypted file generation function of generating an encrypted file of the data from user-specific information capable of identifying a user of the mobile communication terminal for generating the second encryption key.
- the data encryption file includes the data encrypted using the first encryption key, the first encryption key encrypted using the second encryption key, It is generated from the user unique information for generating the second key.
- the generated encrypted file is double-encrypted, and compared with the encrypted file encrypted using the unencrypted encryption key. Analysis becomes difficult. This prevents fraudulent activities such as data snooping and tampering by third parties. As a result, high confidentiality of data can be secured.
- the generated encrypted file includes user-specific information that can identify the user of the mobile communication terminal, the encrypted file is decrypted by the mobile communication terminal of another user. Low risk.
- a mobile communication terminal comprises: a data encryption unit for encrypting data using a first encryption key; and a first falsification check data of the data.
- a first tampering check data generating means for generating the additional information, the additional information including the first tampering check data generated by the first tampering check data generating means being encrypted using a second encryption key.
- a second information including information encryption means, data encrypted by the data encryption means, additional information encrypted by the additional information encryption means, and user-specific information capable of identifying a user of the mobile communication terminal.
- an encryption file generating means for generating an encryption file of the data from the encryption key information.
- an information processing method in which a mobile communication terminal processes data, wherein the data is encrypted using a first encryption key.
- a data encryption step, a first falsification check data generation step for generating first falsification check data of the data, and a first falsification check generated in the first falsification check data generation step An additional information encryption step of encrypting additional information including data using a second encryption key; data encrypted in the data encryption step; and encrypted data in the additional information encryption step.
- an encrypted file generating step of generating an encrypted file of the data from the additional information and second key information including user-specific information capable of identifying a user of the mobile communication terminal. You can .
- a data processing program comprises: a data encryption function for encrypting data using a first encryption key; and a first tampering check of the data.
- a first falsification check data generating function for generating the first falsification check data, and additional information including the first falsification check data generated by the first falsification check data generation function using a second encryption key.
- the file generation function may be realized.
- the data encrypted file includes the data encrypted using the first encryption key, the additional information including the first falsification check data of the data, and the user unique information.
- the generated encrypted file contains both the encrypted data and the data that has been converted and then encrypted for the falsification check, making it difficult to analyze the data.
- high confidentiality of data can be secured.
- the generated encrypted file since the generated encrypted file includes user-specific information that can identify the user of the mobile communication terminal, the risk of the encrypted file being decrypted by the mobile communication terminal of another user is low.
- the mobile communication terminal according to the present invention further includes a second key generation unit that generates the second encryption key using the second encryption key information.
- the mobile communication terminal further includes a second key generation step of generating the second encryption key using the second encryption key information.
- the data processing program according to the present invention further realizes a second key generation function of generating the second encryption key using the second encryption key information.
- the second encryption key is generated using the second encryption key information including the user unique information capable of identifying the user of the mobile communication terminal. Further, the additional information including the data for falsification check is encrypted using the second encryption key. That is, when decrypting additional information, user-specific information is indispensable. Therefore, the risk that the encrypted file is decrypted by the mobile communication terminal of another user is low, and the risk that the additional information is decrypted by the mobile communication terminal of another user is low. As a result, higher confidentiality of data can be secured.
- the second key information Contains identification information for identifying an algorithm for generating the second encryption key, wherein the second key generation means generates a second encryption key using an algorithm identified by the identification information.
- the second encryption key information includes identification information for identifying an algorithm for generating the second key, and the second key generation In the step, the mobile communication terminal generates a second encryption key using an algorithm identified by the identification information.
- the second encryption key information includes identification information for identifying an algorithm for generating the second encryption key;
- the generation function realizes a function of generating a second encryption key using an algorithm identified by the identification information.
- the second encryption key is generated using the algorithm identified by the identification information included in the second encryption key information. That is, the mobile communication terminal appropriately selects an algorithm for generating the second encryption key according to the type of the second encryption key information. Therefore, it is more difficult for a third party to specify the algorithm used to generate the second key, compared to the case where the second key is always generated using the same algorithm, and the data is concealed. Properties can be further improved. More preferably, according to the mobile communication terminal of the present invention, the additional information includes first encryption key information necessary for generating the first encryption key.
- the additional information includes first encryption key information necessary for generating the first encryption key.
- the additional information includes first encryption key information necessary for generating the first encryption key.
- the falsification check data not only the falsification check data but also the first encryption key necessary for generating the first encryption key is included in the attached information decoded using the second encryption key.
- Key information is included. Therefore, decoding of the additional information becomes more difficult. As a result, Data confidentiality is further improved.
- the encryption strength can be changed by using a combination of encryption keys and encryption key information.
- a mobile communication terminal is a mobile communication terminal that receives an encrypted file from the mobile communication terminal described above, wherein: data encrypted by the data encryption unit from the encrypted file; Acquiring means for acquiring the first key encrypted by the first key encrypting means, the user unique information, and the first unique key using the user unique information acquired by the acquiring means.
- a first key decryption means for decrypting the encryption key; and a data decryption means for decrypting the data using the first encryption key decrypted by the first key decryption means. .
- An information processing method is an information processing method in which a mobile communication terminal decrypts data encrypted by the above information processing method.
- a data decoding step of decoding the data is an information processing method in which a mobile communication terminal decrypts data encrypted by the above information processing method.
- a data processing program includes: a computer having data encrypted by a function realized by the above-described data processing program; and a computer encrypted from the encryption file by the data encryption function.
- An acquisition function for acquiring the first encryption key encrypted by the first key encryption function and the user unique information; and the first encryption key using the user unique information acquired by the acquisition function.
- the first key decryption function for decrypting the key and the first key decryption function And a data decryption function of decrypting the data using the first encryption key.
- the mobile communication terminal to which the data is to be transferred includes: the data encrypted by using the first encryption key; the first encryption key that is encrypted by using the second encryption key; The encrypted file of the data generated from the user-specific information is decrypted.
- the encrypted file is encrypted so that it is difficult to analyze the data in order to prevent third parties from seeing or falsifying the data. Therefore, highly confidential data transfer from the source mobile communication terminal to the destination mobile communication terminal becomes possible.
- a mobile communication terminal is a mobile communication terminal that receives an encrypted file from the mobile communication terminal described above, wherein: from the encrypted file, data encrypted by the data encryption unit; A data obtaining unit that obtains the additional information encrypted by the additional information encrypting unit and the second encryption key information; and a second key information obtained by the data obtaining unit.
- a second key generation unit that generates the second key, and an additional information decryption unit that decrypts the additional information using a second encryption key generated by the second key generation unit A first encryption key information acquisition unit that acquires the first encryption key information and the first tampering check data from the additional information decrypted by the additional information decryption unit; By key information acquisition means Using a first key generation unit that generates the first encryption key using the obtained first encryption key information, and a first symbol generated by the first key generation unit, Data decryption means for decrypting the data acquired by the data acquisition means.
- an information processing method is an information processing method in which a mobile communication terminal decrypts data encrypted by the above-described information processing method.
- the data processing program includes: a computer having data encrypted by a function realized by the above-described data processing program; and Using the additional information encrypted by the additional information encryption function, the data acquisition function of acquiring the second encryption key information, and the second encryption key information acquired by the data acquisition function, A second key generation function for generating the second encryption key; and an additional information decryption function for decrypting the additional information using the second encryption key generated by the second key generation function.
- a first encryption key information acquisition function for acquiring the first encryption key information and the first tampering check data from the additional information decrypted by the additional information decryption function;
- a first key generation function for generating the first encryption key using the first encryption key information acquired by the first encryption key information acquisition function; and a first key generation function for generating the first encryption key information.
- a data decryption function for decrypting the data acquired by the data acquisition function.
- the mobile communication terminal to which the data is to be transferred includes: the data encrypted using the first encryption key; the additional information encrypted using the second encryption key; The data encryption file generated from the second encryption key information including the unique information is decrypted.
- the encrypted file has been encrypted so that it is more difficult to analyze the data in order to prevent the data from being stolen or tampered with by a third party. But Thus, data transfer with higher confidentiality from the source mobile communication terminal to the destination mobile communication terminal can be performed.
- the mobile communication terminal includes: a second tampering check data generating unit that generates a second tampering check data of the data decrypted by the data decrypting unit;
- the information processing apparatus further includes a collation means for collating the first falsification check data acquired by the key information acquisition means with the second falsification check data generated by the second falsification check data generation means.
- the information processing method further comprises: a second falsification check data generation step of generating second falsification check data of the data decrypted in the data decryption step;
- the method further includes a collation step of collating the first falsification check data acquired in the key information acquisition step with the second falsification check data generated in the second falsification check data generation step.
- the data processing program includes: a second falsification check data generation function for generating second falsification check data of the data decrypted by the data decryption function; (1)
- the computer further includes a collation function for collating the first falsification check data acquired by the encryption key information acquisition function with the second falsification check data generated by the second falsification check data generation function.
- the second tampering check data for determining whether or not the decrypted data has been tampered with is generated.
- the generated second falsification check data is collated with the first falsification check data. If the result of the comparison is that the data for both tampering checks is the same, it is determined that the data to be migrated has not been tampered with.
- the data for tampering check is different, it is determined that the data to be transferred may have been tampered with during the data transfer process. In this way, the data transfer destination mobile communication terminal determines whether or not the data has been tampered with, so that the user of the mobile communication terminal can check the validity of the transferred data. Sex can be easily grasped. Also, for example, if the data may have been tampered with, the use (including playback) of the data is prohibited, and the inconvenience associated with the use of the tampered data (authentication not possible, virus infection, etc.) ) Can be avoided.
- the information processing technology according to the present invention can be widely used. Can be implemented.
- data encryption means for encrypting data using a first encryption key, and third falsification for generating data for third falsification of the first encryption key.
- a second encryption key including data encrypted by the data encryption unit, additional information encrypted by the additional information encryption unit, and user-specific information capable of identifying a user of the mobile communication terminal.
- an encrypted file generation unit that generates an encrypted file of the data from the information.
- An information processing method is an information processing method in which a mobile communication terminal processes data, wherein the data encryption step encrypts data using a first encryption key; and the first encryption key A third falsification check data generation step of generating the third falsification check data of the second step, and additional information including the third falsification check data generated in the third falsification check data generation step of the second falsification check data.
- An encryption file generation step of generating an encryption file of the data from second encryption key information including user-specific information capable of identifying a user may also be included.
- the computer includes a data encryption function for encrypting data using a first key, and a third encryption key for the first encryption key.
- additional information including a third falsification check data generation function for generating falsification check data and third falsification check data generated by the third falsification check data generation function is used.
- Information encryption function for encrypting the data, the data encrypted by the data encryption function, the additional information encrypted by the additional information encryption function, and a user unique to the user of the mobile communication terminal. It is also possible to realize an encrypted file generation function of generating an encrypted file of the data from the second encryption key information including the information.
- the data encryption file includes the data encrypted using the first encryption key, the additional information including the third falsification check data of the first encryption key, It is generated from the user-specific information.
- the generated encrypted file contains both the encrypted data and the first encryption key that has been converted and then encrypted for tampering checking, making it difficult to analyze the data. become.
- the generated encrypted file includes user-specific information that can identify the user of the mobile communication terminal, so that the risk that the encrypted file is decrypted by the mobile communication terminal of another user can be reduced.
- an encrypted file may be generated from additional information including data for falsification of the second encryption key without being limited to the first key.
- FIG. 1 is a schematic diagram showing the overall configuration of the data processing system.
- FIG. 2 is a block diagram showing a functional configuration of the transmitting-side mobile phone.
- FIG. 3 is a diagram illustrating a configuration inside a storage unit of the transmitting-side mobile phone according to the first embodiment.
- FIG. 4 is a diagram conceptually showing a flow of a data encoding process executed by the transmitting-side mobile phone in the first embodiment.
- FIG. 5 shows the data recovery performed by the receiving mobile phone in the first embodiment. It is a figure which shows the flow of a decoding process notionally.
- FIG. 6 is a diagram illustrating a configuration example of the key B-related information according to the second embodiment.
- FIG. 7 is a diagram conceptually showing a flow of a data encryption process executed by the transmitting-side mobile phone in the second embodiment.
- FIG. 8A is a diagram illustrating a configuration inside a storage unit of a transmitting-side mobile phone according to the third embodiment.
- FIG. 8B is a diagram showing a configuration inside the storage unit of the receiving-side mobile phone according to the third embodiment.
- FIG. 9 is a diagram conceptually showing a flow of a data encryption process executed by the transmitting-side mobile phone in the third embodiment.
- FIG. 10 is a diagram conceptually showing a flow of a data encryption process executed by a transmitting-side mobile phone in a modification of the third embodiment.
- FIG. 11 is a diagram conceptually showing a flow of a data decoding process executed by the receiving-side mobile phone in the third embodiment.
- FIG. 12A is a diagram illustrating a configuration inside a storage unit of a transmitting-side mobile phone according to the fourth embodiment.
- FIG. 12B is a diagram showing a configuration example of the key B related information in the fourth embodiment.
- FIG. 13 is a diagram conceptually showing a flow of data encryption processing executed by the transmitting-side mobile phone in the fourth embodiment.
- FIG. 14 is a diagram conceptually showing a flow of a data encryption process executed by a transmitting-side mobile phone in a modification of the fourth embodiment.
- FIG. 1 is a schematic diagram illustrating an example of the overall configuration of a data processing system 1 according to the present embodiment.
- data processing system Reference numeral 1 denotes a mobile phone 10 (corresponding to a mobile communication terminal) and a receiver mobile phone 20 (corresponding to a mobile communication terminal).
- the transmitting mobile phone 10 is connected to the mobile communication network 30 via the base station 41, and the receiving mobile phone 20 is connected to the mobile communication network 30 via the base station 42.
- the transmitting mobile phone 10 and the receiving mobile phone 20 can mutually transmit and receive data via the mobile communication network 30.
- FIG. 2 is a block diagram showing a functional configuration of the transmitting-side mobile phone 10.
- the transmitting side mobile phone 10 includes a control unit 11 1 (data encryption means, first key encryption means, encrypted file generation means, first falsification check data generation means, additional information (Corresponding to encryption means, encrypted file generation means, and second key generation means), input section 12, RAM I 3, display section 14, storage section 15, and antenna 16a.
- a voice processing unit 17 having a microphone 17a and a speaker 17b.Each unit is connected via a bus 18 so that various signals can be input and output. ing. ⁇
- the control unit 11 reads the program stored in the storage unit 15 into the RAM 3, and centrally controls each unit according to the program. That is, the control unit 11 encrypts the data to be transferred to the receiving-side mobile phone 20 according to the input signal from the input unit 12 and the program read out to the RAM I 3, Is executed, and the processing result is temporarily stored in RAM I3. Then, the processing result stored in the RAM 13 is stored in a predetermined area in the storage unit 15 as necessary.
- the input unit 12 includes various operation buttons for instructing 0N / 0FF of a power supply, selection of a function, and the like, and these various operation buttons are pressed individually or in combination. An input signal corresponding to the indicated content is output to the control unit 11.
- the RAM (Random Access Memory) 13 is composed of a volatile semiconductor memory, and temporarily stores programs and data read from a storage unit 15 described later in various processes executed by the control unit 11. To be stored.
- the RAM I 3 also has a function of a V RAM (Video RAM) for temporarily storing data displayed on the display unit 14.
- the display unit 14 includes an LCD (Liquid Crystal Display), EL (Electro Luminescence), or the like, and displays display data on a screen in accordance with a display signal input from the control unit 11.
- LCD Liquid Crystal Display
- EL Electro Luminescence
- the storage unit 15 is composed of a nonvolatile semiconductor memory such as an electrically erasable and programmable ROM (EEPROM), and includes data necessary for performing various processes and data generated as a result of performing various processes. And so on.
- EEPROM electrically erasable and programmable ROM
- the storage unit 15 includes a data storage area 15 1 a, a key A storage area 15 1 b, a key B storage area 15 1 c, and a key B information storage area 15 1 d. It has a key B generation algorithm storage area 15 1 e inside.
- the data storage area 151 a stores data to be migrated to the receiving-side mobile phone 20, that is, encrypted data.
- the data includes files and programs, and includes, for example, user information (user name and telephone number), telephone directory, and ring melody.
- the data may be a data group stored in a folder.
- an encryption key (corresponding to the first encryption key) for encrypting data read from the data storage area 15 1 a is stored as “key A”.
- the key A may be stored in the key A storage area 15 1 b prior to the data encryption instruction, but is generated in response to an encryption start instruction from the control unit 11. It may be something.
- the key A can be arbitrarily set and changed according to the level of copyright protection for the data to be encrypted and the strength of encryption.
- the key A read from the key A storage area 15 1b is stored in the key B storage area 15 1 c.
- Key for encryption (corresponding to the second encryption key) Power S Stored as “Key B”.
- the key B the data corresponding to the user-specific information included in the key B information described later can be used as it is (without any modification or processing). For example, if “telephone number”, which is one of the user-specific information, is included in the key B information, the numeric data “09012345678” must be stored in the key B storage area 15 1 c. become.
- key B data newly generated according to an encryption start instruction from the control unit 11 may be used. That is, data generated by appropriately changing or processing data corresponding to user-specific information included in key B information described below is used as key B. More specifically, when “phone number”, which is one of the user-specific information, is included in the key B information, the key B is, for example, “090123456780901234567809012345678” in which “09012345678” is continuous. Data. Therefore, this data is stored in the key B storage area 15 1 c.
- the user-specific information is reflected on the key B stored by any of the above methods.
- the key B can be arbitrarily changed according to the level of copyright protection for the data to be encrypted and the strength of encryption.
- the key B information storage area 15 1 d stores “key B information” including at least one piece of user-specific information.
- the user-specific information is information for indicating what data is to be acquired (key B) or what data is necessary for generating key B, and does not indicate such data itself. For example, when the user-specific information is a telephone number, these data are numeric data “09012345678” indicated by the user-specific information “phone number”.
- the user-specific information is information that can identify the user of the transmitting-side mobile phone 10.
- the user-specific information is preferably information that cannot be rewritten even by the user of the transmitting-side mobile phone 10. For example, the telephone number, user ID, and manufacturer of the transmitting-side mobile phone 10 are preferred.
- the key B generation algorithm storage area 1 5 1 e stores the key B generation algorithm. Have been.
- the key B generation algorithm is a key B generation algorithm that is used only when a key B is newly generated using data corresponding to the above-mentioned user-specific information. If there are multiple pieces of user-specific information in the key B information, the key B generation algorithm selects some pieces of user-specific information from among the plurality of pieces of user-specific information. Use the corresponding data to generate key B.
- the wireless communication unit 16 controls wireless communication with the base station 41.
- the wireless communication unit 16 is a circuit having a modulation / demodulation unit (not shown) for modulating and demodulating a signal and a codec (not shown) for encoding and decoding a signal. Yes, with antenna 16a.
- the antenna 16a is provided in the upper part of the housing of the transmitting-side mobile phone 10 so as to be extendable, and transmits and receives radio waves to and from the base station 41.
- the audio processing unit 17 includes a converter, an amplifier, and the like, and includes a microphone 17a and a speaker 17b.
- the voice processing unit 17 converts the voice data input from the control unit 11 into an analog signal by a converter (not shown) at the time of a call, and outputs the analog signal from the speaker 17 b via an amplifier (not shown). Sound. Further, the voice processing unit 17 converts a voice signal input from the microphone 17 a into a digital signal by a converter during a call, and outputs the digital signal to the control unit 11.
- the receiving side mobile phone 20 includes the control unit 21 (acquisition unit, first key decryption unit, data decryption unit, data acquisition unit, second key generation unit, additional information decryption unit, (Corresponding to 1 encryption key information acquisition means, 1st key generation means, data decryption means, 2nd falsification check data generation means, and verification means), input section 22, RAM 23, and display section 24, a storage unit 25, a wireless communication unit 26 having an antenna 26a, and an audio processing unit 27 having a microphone 27a and a speaker 27b.
- Each unit is connected via a bus 28 so that various signals can be input and output.
- an operation of the transmitting-side mobile phone 10 in the present embodiment will be described, and an information processing method according to the present invention will be described.
- the following steps are realized by the control unit 11 executing the program stored in the storage unit 15 shown in FIG.
- “XXY” indicates data encrypted using “X” power S “ ⁇ ”.
- “data X key ⁇ ” indicates data that is encrypted using key ⁇ .
- FIG. 4 is a diagram conceptually showing a flow of a data encryption process performed by the transmitting-side mobile phone 10.
- the control unit 11 acquires data to be decoded from the data storage area 15a.
- the control unit 11 encrypts the data using the key A obtained from the key A storage area 15 1b (S11). As a result, "data X key A" is generated.
- the control unit 11 acquires or generates the key B.
- the control unit 11 obtains data corresponding to the user unique information in the key B information from a predetermined area of the storage unit 15. After that, the above data itself is stored as the key B in the key B storage area 15 1 c.
- the user-specific information is the telephone number of the mobile phone 10 on the transmitting side
- data “09012345678” is stored in the key B storage area 15 1 c.
- the control unit 11 When the control unit 11 generates the key B, the control unit 11 first obtains the key B information from the key B information storage area 15 1 d. Subsequently, the key B generation algorithm is obtained from the key B generation algorithm storage area 15 1 e. The control unit 11 generates the key B based on the user-specific information included in the key B information by executing the key B generation algorithm. The generated key B is stored in the key B storage area 15 1 c. For example, when the user-specific information is the telephone number of the transmitting mobile phone 10, data in which “09012345678” continues a predetermined number of times is stored in the key B storage area 151c. This key B can be arbitrarily changed at the time of storage or after storage according to the level of copyright protection for the data to be encrypted and the strength of encryption. Is also good.
- control unit 11 encrypts the key A using the key B obtained from the key B storage area 151c (S13). As a result, "Key A X Key B" is generated.
- the control unit 11 acquires the key B information from the key B information storage area 15 1 d, and combines the data of “data X key A”, “key AX key B”, and key B information. Yes (S14).
- combining refers to generating one or more files from multiple data.
- an encrypted file is generated.
- the transmitting-side mobile phone 10 transfers the generated encrypted file to the receiving-side mobile phone 20.
- the transfer of the encrypted file includes, for example, transfer via a server device, transfer via a recording medium such as UIM, transfer using short-range wireless communication such as IrDA (Infrared Data Association), Bluetooth (registered trademark), etc.
- IrDA Infrared Data Association
- Bluetooth registered trademark
- the encrypted file is composed of data encrypted using the key A (data X key A) and key A encrypted using the key B (key AX key B) and key B information.
- the generated encrypted file is double-encrypted, and compared to an encrypted file that has been encrypted using an unencrypted encryption key. Data analysis becomes difficult. As a result, it is possible to prevent fraudulent activities such as data snooping and tampering by a third party. As a result, high confidentiality of data can be secured.
- the generated encrypted file contains user-specific information that can identify the user of the mobile phone 10 on the transmitting side, so that there is a low risk that the encrypted file will be decrypted by another user. ,.
- FIG. 5 is a diagram conceptually showing a flow of a data decryption process executed by the receiving-side mobile phone 20.
- the receiving mobile phone 20 obtains the encrypted file from the transmitting mobile phone 10.
- the control unit 21 transmits the obtained encrypted file to each of “data X key A”, “key AX key B”, and key B information. Separate into data (T11).
- separation refers to generating a plurality of data from one or a plurality of files.
- the control unit 21 acquires the key B generation algorithm from the key B generation algorithm storage area 15 1 e.
- the control unit 21 obtains or generates the key B by the above-described method based on the user unique information in the key B information obtained in T11 using the key B generation algorithm. (T12).
- the control unit 21 decrypts the “key AX key B” using the key B (T 13). As a result, key A is generated.
- the control unit 21 decrypts the “data X key A” using the generated key A (T 14). As a result, the data stored in the data storage area 15 1 a is restored.
- data generated from the data decrypted using the key A, the key A decrypted using the key B, and the key B information Decrypt the encrypted file.
- the encrypted file is encrypted so that it is difficult to analyze the data in order to prevent the data from being stolen or tampered with by a third party. Therefore, it is possible to transfer highly confidential data from the transmitting mobile phone 10 to the receiving mobile phone 20.
- FIG. 6 The basic configuration of the data processing system according to the present embodiment is the same as the configuration of the data processing system 1 according to the first embodiment. Therefore, the same reference numerals are given to the respective components, and the description thereof will be omitted. The differences from the first embodiment will be described in detail.
- the second embodiment is based on the premise that a key B is generated by changing or processing data corresponding to user-specific information.
- the transmitting mobile phone 10 in the second embodiment stores a plurality of key B generation algorithms in the key B generation algorithm storage area 15 1 e shown in FIG.
- the key B generation algorithm is appropriately selected and used. Is different from the transmitting mobile phone.
- FIG. 6 is a diagram showing a configuration example of the key B-related information 2 51 stored in the key B information storage area 15 Id (see FIG. 3).
- the key B-related information 251 is configured to include at least a header 251a, key B information 251b, and key B generation algorithm information 251c.
- the header 251 a stores information indicating the position where the key B information 25 1 b and the key B generation algorithm information 25 1 c are stored. That is, the control unit 11 refers to the header 25 1 a and extracts the key B information 25 1 b and the key B generation algorithm information 25 1 c from the key B related information 25 1.
- the key B information 25 1 b stores “key B information” necessary for generating key B (corresponding to the second encryption key).
- the key B information (corresponding to the second encryption key information) includes at least one piece of user-specific information capable of identifying the user of the transmitting-side mobile phone 10.
- the user-specific information is, for example, the telephone number of the transmitting mobile phone 10, the user ID, the serial number of the transmitting mobile phone 10, the ID of the UIM, and the like.
- Key B generation algorithm information 2 5 1 c contains key B generation algorithm storage area 1 5
- the control unit 1 1 Selects the algorithm to be used for key B generation from the multiple key B generation algorithms based on this key B generation algorithm information.
- header 25 1 a header 25 1 a, key B information 25 1 b, and key B generation algorithm information 2
- FIG. 7 is a diagram conceptually showing a flow of a data encryption process executed by the transmitting-side mobile phone 10.
- the operation of the transmitting mobile phone 10 in the present embodiment is different in the processing of S12.
- the control unit 11 acquires the key B related information 2 51 from the key B information storage area 15 1 d. Subsequently, the control unit 11 refers to the header 251a included in the obtained key B-related information 251, and determines the key B information 25 1b and the key B generation algorithm information 25 1c. get. Further, the controller 11 generates a key B generation algorithm identified by the key B generation algorithm information 25 1 c from a plurality of key B generation algorithms stored in the key B generation algorithm storage area 15 1 e. Select and get the algorithm. Then, the control unit 11 uses the key B generation algorithm obtained from the key B generation algorithm storage area 15 1 e to generate the user-specific information in the key B information obtained from the key B information storage area 15 1 d. Generate key B from the corresponding data.
- key B is generated using an algorithm identified by the key B generation algorithm information. Therefore, the algorithm used is changed according to the key B generation algorithm information. This makes it more difficult for a third party to specify the used algorithm than in a case where the key B is always generated using the same algorithm, and the confidentiality of the data can be further improved.
- the basic configuration of the data processing system according to the present embodiment is the same as the configuration of the data processing system 1 according to the first embodiment. Therefore, the same reference numerals are given to the components, and the description thereof will be omitted. Difference from 1 embodiment Will be described in detail.
- the data processing system 1 of the present embodiment differs from the data processing system 1 of the first embodiment in the internal configuration of the storage unit 15 of the transmitting mobile phone 10 and the storage unit 25 of the receiving mobile phone 20. I do.
- the storage unit 15 includes a data storage area 152a, a key A information storage area 152b, a key A generation algorithm storage area 152c, and a tampering check algorithm. It has a storage area 15 2 d, a data list storage area 15 2 e, a key B information storage area 15 2 f, and a key B generation algorithm storage area 15 2 g.
- the data storage area 15 2 a stores data to be transferred to the receiving-side mobile phone 20, that is, data to be encrypted.
- the data includes a file program, for example, user information (user name and telephone number), a telephone directory, a ringtone, and the like.
- the data may be a data group stored in a folder.
- the key A information storage area 15 2 b stores “key A information” necessary for generating key A (corresponding to the first encryption key).
- the key A information (corresponding to the first encryption key information) includes, for example, arbitrary numbers such as the telephone number of the transmitting mobile phone 10, the user ID, the serial number of the transmitting mobile phone 10, the time, and a random number. From the viewpoint of difficulty in data analysis, it is desirable to use information different from the key B information described later.
- the key A generation algorithm storage area 1 52 2 c stores a “key A generation algorithm” which is an algorithm for generating the key A using the key A information.
- the falsification check algorithm storage area 15 2 d contains data for falsification check 1 (corresponding to the first falsification check data) from the data read from the data storage area 15 2 a.
- Stores a tampering check algorithm which is an algorithm.
- the tampering check algorithm is, for example, a hash function, and more specifically, MD (Message Digest) 2, MD 4, MD 5, SHA (Secure Hash Algorithm) -1 or the like.
- the data list storage area 1 5 2 e contains information (name, identification) for identifying the data stored in the folder when the data is stored in the folder. Number, etc.) are stored as a “data list”.
- the key B information storage area 152 f stores the “key B information” required to generate key B (corresponding to the second encryption key).
- the key B information (corresponding to the second encryption key information) includes at least one piece of user-specific information capable of identifying the user of the transmitting mobile phone 10.
- the user-specific information is information that cannot be rewritten by the user of the transmitting mobile phone 10, such as the telephone number of the transmitting mobile phone 10, the user ID, the serial number of the transmitting mobile phone 10, and the UIM ID. And so on.
- the key B generation algorithm storage area 15 2 g stores a “key B generation algorithm” that is an algorithm for generating a key B using key B information.
- the storage unit 25 stores the key B generation algorithm storage area 2 as shown in FIG. 8B.
- the key B generation algorithm storage area 2 52 a stores “key B generation algorithm” which is an algorithm for generating key B using key B information.
- the key A generation algorithm storage area 2 52 b stores a “key A generation algorithm” which is an algorithm for generating a key A using the key A information.
- the tampering check algorithm storage area 255c stores a tampering check algorithm that is an algorithm for generating tampering check data 2 (corresponding to the second tampering check data) from the decrypted data. ing.
- the tampering check algorithm is, for example, a hash function, and more specifically, MD (Message Digest) 2, MD 4, MD 5, SHA (Secure Hash Algorithm) -1 and the like.
- Figure 9 shows the outline of the data encryption process performed by the transmitting mobile phone 10.
- the control unit 11 acquires the key A information from the key A information storage area 15 2 b. Further, the control unit 11 acquires the key A generation algorithm from the key A generation algorithm storage area 152c. Next, the control unit 11 generates the key A from the key A information obtained from the key A information storage area 15 2 b using the key A generation algorithm obtained from the key A generation algorithm storage area 15 2 c. Yes (S21).
- the key A may be arbitrarily changeable at the time of generation or after generation according to the level of copyright protection of the data to be encrypted and the strength of encryption.
- control unit 11 acquires data to be encrypted from the data storage area 152a.
- control unit 11 encrypts the data using the key A generated in S21 (S22). As a result, "data X key A" is generated.
- control unit 11 obtains the tampering check algorithm from the tampering check algorithm storage area 15 2 d and uses the tampering check algorithm to check tampering from the data obtained from the data storage area 15 2 a.
- Generate data 1 for use S23). For example, if the tampering check algorithm is a hash function, tampering check data 1 corresponds to the hash value.
- the control unit 11 includes the falsification check data 1 generated in S23, the data list obtained from the data list storage area 15 2e, and the key obtained from the key A information storage area 15 2b. Combine each data with the A information (S24). Here, combining means generating one or more files from a plurality of data. As a result, additional information including data 1 for falsification check, a data list, and key A information is generated.
- the control unit 11 acquires key B information from the key B information storage area 15 2 f. Further, the control unit 11 acquires the key B generation algorithm from the key B generation algorithm storage area 152 g. Next, the control unit 11 generates the key B from the key B information obtained from the key B information storage area 152 f using the key B generation algorithm obtained from the key B generation algorithm storage area 152 g. Yes (S25). The key B is generated at or after the generation of the key B. May be changed as desired.
- control unit 11 encrypts the additional information generated in S24 using the key B generated in S25 (S26). As a result, “additional information X key B” is generated. Then, the control unit 11 obtains the key B information from the key B information storage area 15 2 f, and stores each data of “data X key A”, “additional information X key B”, and key B information. Join (S27). As a result, an encrypted file is generated. The transmitting mobile phone 10 transfers the generated encrypted file to the receiving mobile phone 20.
- the transfer of the encrypted file may be performed by, for example, transfer via a server device, transfer via a recording medium such as UIM, or transfer using short-range wireless communication such as IrDA (Infrared Data Association) or Bluetooth (registered trademark). It is.
- control unit 11 may extract the data list from the additional information and encrypt only the additional information other than the data list.
- the data list is attached to the additional information in an encrypted state, and then incorporated into the encrypted file.
- the load on the transmitting mobile phone 10 due to the data encryption processing is reduced.
- the data capacity of the encrypted file is reduced, and the free space of the storage unit 15 can be saved.
- the encrypted file is composed of the data encrypted using the key A, the additional information including the data 1 for falsification check of the data, and the key B information. Generated.
- the generated encrypted file contains both the encrypted data and the data encrypted after being converted for tampering check, making it difficult to analyze the data. Become.
- higher confidentiality of data can be secured.
- the generated encrypted file includes the key B information including information that can identify the user of the mobile phone 10 on the transmitting side, there is a risk that the encrypted file may be decrypted by another user. Is low.
- the key B is
- the additional information including the data for EC-1 is encrypted using the key B. That is, when decoding the additional information, information that can identify the user is indispensable. Therefore, the risk that the encrypted file is decrypted by other users is low, and the risk that the additional information is decrypted by other users is low. As a result, higher confidentiality of data can be secured.
- FIG. 10 is a diagram conceptually showing a flow of a data encryption process in a modification of the third embodiment.
- the object of the tampering check by the tampering check algorithm is the data to be encrypted.
- the key A generated in S21 may be subjected to tampering check, or the key B generated in S25 may be subjected to tampering check.
- the falsification check data 3 (corresponding to the third falsification check data) in which the key A or the key B is converted for the falsification check is generated.
- Key A or key B usually has a smaller capacity than the above data and can be easily checked for tampering. Therefore, the processing load on the transmitting mobile phone 10 due to the tampering check is reduced. Also, since the tampering check data generated from the key A or B having a smaller capacity than the above data has a smaller capacity, the free space of the storage unit 15 can be saved. This embodiment is particularly suitable when a very high security level is not required for data migration.
- FIG. 11 is a diagram conceptually showing a flow of a data decryption process executed by the receiving-side mobile phone 20.
- the receiving mobile phone 20 acquires the encrypted file from the transmitting mobile phone 10.
- the control unit 21 separates and obtains the obtained encrypted file into key B information and data of “additional information X key B” and “data X key A” (T 21).
- control unit 21 sends the key B generation key from the key B generation algorithm storage area 25 2 a. Get the algorithm. Next, the control unit 21 generates a key B from the key B information obtained in T 21 using the key B generation algorithm obtained from the key B generation algorithm storage area 25 2 a (T 2 2) .
- control unit 21 decrypts the “additional information X key B” acquired at T 21 using the key B generated at T 22 (T 23). As a result, the additional information encrypted in S26 of FIG. 9 is restored.
- the control section 21 separates and acquires the additional information into data for falsification check 1, a data list, and key information (T24).
- the control unit 21 acquires the key A generation algorithm from the key ⁇ generation algorithm storage area 25 2 b. Next, the control unit 21 generates a key A from the key A information obtained in T 24 using the key A generation algorithm obtained from the key A generation algorithm storage area 25 2 b (T 25) .
- control unit 21 uses the key A generated in T25 to decrypt the “data X key A” obtained in T26 (T26). As a result, the data encrypted by the transmitting mobile phone 10 is restored.
- the receiving-side mobile phone 20 is generated from data encrypted using the key A, additional information encrypted using the key B, and key B information including user-specific information. Decrypt an encrypted file of data.
- the encrypted file has been encrypted so that it is more difficult to analyze the data in order to prevent the data from being stolen or tampered with by a third party. Therefore, data transfer with higher confidentiality from the transmitting mobile phone 10 to the receiving mobile phone 20 can be performed.
- the receiving-side mobile phone 20 performs the following process in order to determine the identity between the decrypted data and the encrypted data. That is, the control unit 21 obtains the tampering check algorithm from the tampering check algorithm storage area 255c. The control unit 21 generates the tampering check data 2 from the data decrypted in T26 using the acquired tampering check algorithm (T27). For example, if the tampering check algorithm is a hash function, Check data 2 corresponds to the hash value.
- the control unit 21 compares and checks the falsification check data 1 obtained from the additional information in T 24 with the falsification check data 2 generated in T 27, and checks each falsification check data. Is determined. As a result of the comparison and collation, if both data for falsification check are the same, the control unit 21 determines that the data to be transferred has not been falsified. On the other hand, if the tampering check data is different, the control unit 21 determines that there is a possibility that the data to be migrated has been tampered with during the data migration process.
- the user of the receiving-side mobile phone 20 can easily grasp the validity of the migrated data by the receiving-side mobile phone 20 determining whether or not the data has been tampered with. Also, for example, when data may be falsified, the use (including replay) of the data is prohibited, and the inconvenience associated with the use of falsified data (authentication not possible, virus infection, etc.) Can be avoided.
- the configuration of the data processing system according to the present embodiment is the same as the configuration of the data processing system 1 according to the third embodiment. Therefore, each component is given the same reference numeral, and the description thereof is omitted. The differences from the third embodiment will be described in detail.
- the data processing system 1 according to the present embodiment is different from the data processing system 1 according to the third embodiment in the internal configuration of the storage unit 15 of the transmitting mobile phone 10. That is, as shown in FIG. 12A, the storage unit 15 includes a data storage area 15 3 a, a key A information storage area 15 3 b, a key A generation algorithm storage area 15 3 c, and a tampering check. Storage area 15 3 d, data list storage area 15 3 e, key B information storage area 15 3 f, key B generation algorithm storage area 15 3 g, falsification check algorithm information storage area 15 Has 3 h inside.
- the falsification check algorithm information storage area 15 3 h stores information for identifying the tampering check algorithm. That is, a plurality of tampering check algorithms are stored in the tampering check algorithm storage area 15 3 d, and the control unit 11 outputs the tampering check algorithm information from the plurality of tampering check algorithms. Based on this, the algorithm to be used for the tampering check is selected.
- FIG. 12B is a diagram showing a configuration example of the key B-related information 154 stored in the key B information storage area 153 f.
- the key B-related information 154 includes at least a header 154a, key B information 154b, and key B generation algorithm information 154c.
- the header 154a stores information indicating the position where the key B information 154b and the key B generation algorithm information 154c are stored. That is, the control unit 11 refers to the header 154a, and extracts the key B-related information 154, ⁇ , B information 154b, and key B generation algorithm information 154c. .
- the key B information 154 b stores “key B information” necessary for generating the key B (corresponding to the second encryption key).
- This key B information (corresponding to the second encryption key information) includes at least one piece of user-specific information capable of identifying the user of the transmitting mobile phone 10.
- the user-specific information is, for example, the telephone number of the transmitting mobile phone 10, the user ID, the serial number of the transmitting mobile phone 10, the ID of UIM, and the like.
- the key B generation algorithm information 154c includes information for identifying a predetermined key B generation algorithm from a plurality of key B generation algorithms stored in the key B generation algorithm storage area 153g. (Corresponding to the identification information) is stored. That is, the control unit 11 selects an algorithm to be used for generating the key B from a plurality of key B generation algorithms based on the key B generation algorithm information.
- header 1 54 a, key B information 1 54 b, and key B generation algorithm information 1 Dummy data that is not used for encryption is inserted in the area other than 54c (the area indicated by “1” in the figure).
- the key B information 154b and the key B generation algorithm information 154c are stored may be arbitrarily changeable or may be fixed.
- the configuration of the key B related information 154 stored in the key B information storage area 153 f has been described.
- the key B information storage area 153b also includes the key B related information.
- the key A-related information having the same configuration as the link information 154 is stored.
- FIG. 3 is a diagram conceptually showing a flow of a data encryption process executed by the transmitting-side mobile phone 10.
- the operation of the transmitting-side mobile phone 10 in the present embodiment is the same as the operation of the transmitting-side mobile phone 10 described in the third embodiment in detail. That is, S31 to S37 shown in FIG. 13 correspond to S21 to S27 shown in FIG.
- S31, S33, S34, and S35 that perform processing different from that of the third embodiment will be described.
- the control unit 11 acquires key A-related information from the key A information storage area 1553b. Subsequently, the control unit 11 acquires key A information and key A generation algorithm information with reference to the header included in the acquired key A related information. Further, the control unit 11 identifies, based on the key A generation algorithm information, the key A generation algorithm information from the plurality of key A generation algorithms stored in the key A generation algorithm storage area 153c. Key A generation algorithm to be selected and obtained. Then, the control unit 11 generates the key A from the key A information obtained from the key A information storage area 153b using the key A generation algorithm obtained from the key A generation algorithm storage area 1553c. I do.
- the control unit 11 stores the tampering check algorithm information storage area. Acquire tampering check algorithm information from 1 5 3 h. Subsequently, based on the acquired tampering check algorithm information, the control unit 11 selects a tampering check algorithm from among a plurality of tampering check algorithms stored in the tampering check algorithm storage area 15 3 d. Select and acquire the tampering check algorithm identified by the information. Then, the control unit 11 generates data for falsification checking from the data obtained from the data storage area 153 a using the obtained falsification checking algorithm.
- the control unit 11 reads the falsification check data 1 generated in S33, the data list acquired from the data list storage area 15 3e, and the key A information storage area 15 3b.
- the acquired key A information is combined with the data of the tampering check algorithm information acquired in S33.
- additional information including falsification check data 1, a data list, key A information, and falsification check algorithm information is generated.
- the same processing as in S31 is performed on the key B related information. That is, the control unit 11 acquires the key B-related information from the key B information storage area 1553f. Subsequently, the control unit 11 acquires key B information and key B generation algorithm information with reference to the header included in the acquired key B related information.
- the control unit 11 uses the key B generation algorithm information from a plurality of key B generation algorithms stored in the key B generation algorithm storage area 15 3 g. Select and obtain the identified key B generation algorithm. Then, the control unit 11 generates a key B from the key B information obtained from the key B information storage area 15 3 f using the key B generation algorithm obtained from the key B generation algorithm storage area 15 3 g. .
- control unit 11 may extract the data list from the additional information and encrypt only the additional information other than the data list.
- the data list is attached to the additional information in an encrypted state, and then embedded in the encrypted file.
- the load on the transmitting mobile phone 10 due to the data encryption processing is reduced.
- the data capacity of the encrypted file is reduced, and the free space of the storage unit 15 is reduced. Can save.
- the key A is generated using an algorithm identified by the identification information included in the key A information.
- key B is generated using an algorithm identified by the identification information included in the key B information.
- the data is converted into tampering check data using an algorithm identified by the tampering check algorithm information. Therefore, the algorithm used is changed according to the types of the key A information, the key B information, and the tampering check algorithm information. This makes it more difficult for a third party to identify the algorithm used, as compared to the case where the same algorithm is used to always generate the key A, key B, and data for tampering check, thereby reducing the confidentiality of the data. It can be further improved.
- FIG. 14 is a diagram conceptually showing a flow of a data encryption process in a modification of the fourth embodiment.
- the object of the tampering check by the selected tampering check algorithm is the data to be encrypted.
- the key A generated in S31 may be subjected to the tampering check, or the key B generated in S35 may be the target of the tampering check.
- tampering check data 3 in which key A or key B is converted for tampering checking is generated.
- Key A or key B usually has a smaller capacity than the above data and can be easily checked for tampering. Therefore, the processing load on the transmitting mobile phone 10 due to the tampering check is reduced. Also, since the tampering check data generated from the key A or B having a smaller capacity than the above data has a small capacity, the free space of the storage unit 15 can be saved. This embodiment is particularly suitable when a very high security level is not required for data migration.
- the embodiments described in the above embodiments are preferred examples of the data processing system according to the present invention, and the present invention is not limited to these embodiments.
- the encryption key and the decryption key are described as being the same (secret key encryption method), but may be different (public key encryption method).
- the recording medium refers to a reading device provided in hardware resources such as a general-purpose computer, which causes a change in energy such as magnetism, light, and electricity according to the description content of the data processing program. It can transmit the description of the data processing program to the reader in the form of the corresponding signal.
- Such recording media include, for example, ICMs such as UIMs, magnetic disks, optical disks, magneto-optical disks, which are detachably mounted on computers (including mobile phones, PHSs, etc.), as well as computers.
- the data processing program according to the present invention is partially or entirely received and recorded by the wireless communication unit 16 or the wireless communication unit 26 from another device via a transmission medium such as a communication line. It may be configured. Conversely, the data processing program according to the present invention may be transmitted via a transmission medium and installed in another device.
- the encrypted data file is composed of the data encrypted using the first encryption key and the second encrypted data. It is generated from the first encryption key encrypted using the encryption key and user-specific information. That is, the generated encrypted file is double-encrypted, and the data is compared with the encrypted file encrypted using the unencrypted key. Analysis becomes difficult. As a result, it is possible to prevent fraudulent activities such as data snooping and tampering by a third party. As a result, the data is high Confidentiality can be secured.
- the generated encrypted file includes user-specific information that can identify the user of the mobile communication terminal, there is a risk that the encrypted file is decrypted by the mobile communication terminal of another user. Poor.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20030705055 EP1387523B1 (en) | 2002-02-08 | 2003-02-07 | Mobile communication terminal, information processing method, data processing program, and recording medium |
CN038005468A CN1522517B (zh) | 2002-02-08 | 2003-02-07 | 移动通信终端、信息处理方法 |
US10/482,169 US7681030B2 (en) | 2002-02-08 | 2003-02-07 | Mobile communication terminal, information processing method, data processing program, and recording medium |
JP2003567029A JP4041465B2 (ja) | 2002-02-08 | 2003-02-07 | 移動通信端末、情報処理方法、データ処理プログラム、及び記録媒体 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002-32947 | 2002-02-08 | ||
JP2002032947 | 2002-02-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003067811A1 true WO2003067811A1 (fr) | 2003-08-14 |
Family
ID=27677986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/001299 WO2003067811A1 (fr) | 2002-02-08 | 2003-02-07 | Terminal de communication mobile, procede de traitement d'informations, programme de traitement de donnees et support d'enregistrement |
Country Status (5)
Country | Link |
---|---|
US (1) | US7681030B2 (ja) |
EP (1) | EP1387523B1 (ja) |
JP (1) | JP4041465B2 (ja) |
CN (1) | CN1522517B (ja) |
WO (1) | WO2003067811A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005311490A (ja) * | 2004-04-19 | 2005-11-04 | Sony Corp | セキュア通信を行う通信システム及び方法 |
JP2006303922A (ja) * | 2005-04-20 | 2006-11-02 | Brother Ind Ltd | 暗号鍵設定方法、暗号鍵設定装置、データ送信装置、データ受信装置、アクセスポイント、ネットワークシステム、及びプログラム |
JP2009141530A (ja) * | 2007-12-04 | 2009-06-25 | Ricoh Co Ltd | 画像形成装置及びデータ管理方法 |
US7861092B2 (en) | 2004-05-10 | 2010-12-28 | Koninklijke Philips Electronics N.V. | Personal communication apparatus capable of recording transactions secured with biometric data |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NO20050152D0 (no) * | 2005-01-11 | 2005-01-11 | Dnb Nor Bank Asa | Fremgangsmate ved frembringelse av sikkerhetskode og programmbar anordning for denne |
GB2425373B (en) * | 2005-04-21 | 2010-03-24 | Palm Tree Technology Ip Ltd | Network security system |
SE528538C2 (sv) * | 2005-05-10 | 2006-12-12 | Smarttrust Ab | Säkert backup-system och förfarande i ett mobilt telekommunikationsnätverk |
US8677395B2 (en) * | 2006-07-29 | 2014-03-18 | Goldspot Media, Inc. | Method and apparatus for operating a micro-splicer to insert alternate content while viewing multimedia content on a handheld device |
US20080040743A1 (en) * | 2006-07-29 | 2008-02-14 | Srinivasa Dharmaji | Micro-splicer for inserting alternate content to a content stream on a handheld device |
US8898073B2 (en) * | 2006-07-29 | 2014-11-25 | Goldspot Media, Inc. | Advertisement insertion during application launch in handheld, mobile display devices |
US8522269B2 (en) * | 2006-08-22 | 2013-08-27 | Goldspot Media, Inc. | Method and apparatus for alternate content scheduling on mobile devices |
JP4424382B2 (ja) * | 2007-07-04 | 2010-03-03 | ソニー株式会社 | コンテンツ再生装置およびコンテンツ自動受信方法 |
CN101616408B (zh) * | 2008-06-23 | 2012-04-18 | 华为技术有限公司 | 密钥衍生方法、设备及系统 |
KR20100125875A (ko) * | 2009-05-22 | 2010-12-01 | 삼성전자주식회사 | 데이터 저장 장치 및 이를 포함하는 데이터 저장 시스템 |
BRPI1004907A2 (pt) * | 2009-07-22 | 2016-08-09 | Panasonic Coporation | unidade principal e unidade subordinada |
FR2963526B1 (fr) * | 2010-07-29 | 2012-09-07 | Myriad France | Telephone mobile muni d'un systeme securise d'identification |
US8611544B1 (en) | 2011-01-25 | 2013-12-17 | Adobe Systems Incorporated | Systems and methods for controlling electronic document use |
US9137014B2 (en) * | 2011-01-25 | 2015-09-15 | Adobe Systems Incorporated | Systems and methods for controlling electronic document use |
CN102781001A (zh) * | 2011-05-10 | 2012-11-14 | 中兴通讯股份有限公司 | 移动终端内置文件加密方法及移动终端 |
CN102647712B (zh) * | 2012-04-06 | 2017-06-16 | 惠州Tcl移动通信有限公司 | 一种手机数据加密方法以及解密方法 |
CN103581900B (zh) * | 2012-08-01 | 2016-12-21 | 中国移动通信集团公司 | 通信安全控制方法、装置、第一移动终端及移动健康设备 |
US9124386B2 (en) * | 2012-09-28 | 2015-09-01 | Saurabh Dadu | System, device, and method for securing voice authentication and end-to-end speech interaction |
US8935769B2 (en) | 2012-09-28 | 2015-01-13 | Liveensure, Inc. | Method for mobile security via multi-factor context authentication |
US9754097B2 (en) | 2014-02-21 | 2017-09-05 | Liveensure, Inc. | Method for peer to peer mobile context authentication |
US10904234B2 (en) | 2014-11-07 | 2021-01-26 | Privakey, Inc. | Systems and methods of device based customer authentication and authorization |
US9813400B2 (en) | 2014-11-07 | 2017-11-07 | Probaris Technologies, Inc. | Computer-implemented systems and methods of device based, internet-centric, authentication |
WO2018214052A1 (en) * | 2017-05-24 | 2018-11-29 | Qualcomm Incorporated | Uplink small data transmission in inactive state |
KR20220014095A (ko) * | 2020-07-28 | 2022-02-04 | 삼성에스디에스 주식회사 | 블록체인 기반의 데이터 분산 관리 방법 및 이를 위한 장치 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH01212041A (ja) * | 1988-02-18 | 1989-08-25 | Hitachi Ltd | 暗号化通信システム |
JPH10210026A (ja) * | 1996-10-31 | 1998-08-07 | Matsushita Electric Ind Co Ltd | 秘密鍵伝送方式 |
JP2000206876A (ja) * | 1999-01-12 | 2000-07-28 | Internatl Business Mach Corp <Ibm> | 2つの情報処理装置の間で保護された形で情報を処理するための方法およびシステム |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9020410D0 (en) * | 1990-09-19 | 1990-10-31 | Stc Plc | Sequence synchronisation |
US5375169A (en) * | 1993-05-28 | 1994-12-20 | Tecsec, Incorporated | Cryptographic key management method and apparatus |
JPH07295800A (ja) * | 1994-04-22 | 1995-11-10 | Advance Co Ltd | ソフトウエアプロテクト方式 |
US5604801A (en) * | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
US6085323A (en) * | 1996-04-15 | 2000-07-04 | Kabushiki Kaisha Toshiba | Information processing system having function of securely protecting confidential information |
EP0840477B1 (en) * | 1996-10-31 | 2012-07-18 | Panasonic Corporation | Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded |
US6009553A (en) * | 1997-12-15 | 1999-12-28 | The Whitaker Corporation | Adaptive error correction for a communications link |
US6084969A (en) * | 1997-12-31 | 2000-07-04 | V-One Corporation | Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network |
US6981141B1 (en) * | 1998-05-07 | 2005-12-27 | Maz Technologies, Inc | Transparent encryption and decryption with algorithm independent cryptographic engine that allows for containerization of encrypted files |
US6292899B1 (en) | 1998-09-23 | 2001-09-18 | Mcbride Randall C. | Volatile key apparatus for safeguarding confidential data stored in a computer system memory |
EP1022638A3 (en) * | 1999-01-12 | 2001-05-02 | International Business Machines Corporation | Method and system for securely handling information between two information processing devices |
TW529267B (en) * | 1999-03-15 | 2003-04-21 | Sony Corp | Data processing system and method for mutual identification between apparatuses |
US7073063B2 (en) * | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
US6950541B1 (en) * | 1999-05-11 | 2005-09-27 | Authentec, Inc. | Fingerprint sensor package including flexible circuit substrate and associated methods |
US6687375B1 (en) * | 1999-06-02 | 2004-02-03 | International Business Machines Corporation | Generating user-dependent keys and random numbers |
WO2001013358A1 (fr) * | 1999-08-10 | 2001-02-22 | Fujitsu Limited | Carte memoire |
US7373517B1 (en) * | 1999-08-19 | 2008-05-13 | Visto Corporation | System and method for encrypting and decrypting files |
DE60128290T2 (de) * | 2000-05-11 | 2007-08-30 | Matsushita Electric Industrial Co., Ltd., Kadoma | Vorrichtung zur Dateienverwaltung |
JP4187935B2 (ja) * | 2000-08-23 | 2008-11-26 | 株式会社東芝 | 無線通信システム、送信装置、受信装置及びコンテンツデータ転送方法 |
JP4524480B2 (ja) * | 2000-11-24 | 2010-08-18 | 三洋電機株式会社 | データ端末装置 |
US20020077988A1 (en) * | 2000-12-19 | 2002-06-20 | Sasaki Gary D. | Distributing digital content |
US7142882B2 (en) * | 2001-03-09 | 2006-11-28 | Schmidt Dominik J | Single chip wireless communication integrated circuit |
US6989484B2 (en) * | 2001-04-17 | 2006-01-24 | Intel Corporation | Controlling sharing of files by portable devices |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US20030126435A1 (en) * | 2001-12-28 | 2003-07-03 | Mizell Jerry L. | Method, mobile telecommunication network, and node for authenticating an originator of a data transfer |
-
2003
- 2003-02-07 WO PCT/JP2003/001299 patent/WO2003067811A1/ja active Application Filing
- 2003-02-07 CN CN038005468A patent/CN1522517B/zh not_active Expired - Fee Related
- 2003-02-07 EP EP20030705055 patent/EP1387523B1/en not_active Expired - Lifetime
- 2003-02-07 JP JP2003567029A patent/JP4041465B2/ja not_active Expired - Fee Related
- 2003-02-07 US US10/482,169 patent/US7681030B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH01212041A (ja) * | 1988-02-18 | 1989-08-25 | Hitachi Ltd | 暗号化通信システム |
JPH10210026A (ja) * | 1996-10-31 | 1998-08-07 | Matsushita Electric Ind Co Ltd | 秘密鍵伝送方式 |
JP2000206876A (ja) * | 1999-01-12 | 2000-07-28 | Internatl Business Mach Corp <Ibm> | 2つの情報処理装置の間で保護された形で情報を処理するための方法およびシステム |
Non-Patent Citations (1)
Title |
---|
See also references of EP1387523A4 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005311490A (ja) * | 2004-04-19 | 2005-11-04 | Sony Corp | セキュア通信を行う通信システム及び方法 |
US7861092B2 (en) | 2004-05-10 | 2010-12-28 | Koninklijke Philips Electronics N.V. | Personal communication apparatus capable of recording transactions secured with biometric data |
JP2006303922A (ja) * | 2005-04-20 | 2006-11-02 | Brother Ind Ltd | 暗号鍵設定方法、暗号鍵設定装置、データ送信装置、データ受信装置、アクセスポイント、ネットワークシステム、及びプログラム |
US8037301B2 (en) | 2005-04-20 | 2011-10-11 | Brother Kogyo Kabushiki Kaisha | Setting an encryption key |
JP2009141530A (ja) * | 2007-12-04 | 2009-06-25 | Ricoh Co Ltd | 画像形成装置及びデータ管理方法 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2003067811A1 (ja) | 2005-06-02 |
US20040171399A1 (en) | 2004-09-02 |
US7681030B2 (en) | 2010-03-16 |
CN1522517B (zh) | 2010-04-28 |
CN1522517A (zh) | 2004-08-18 |
EP1387523A1 (en) | 2004-02-04 |
EP1387523B1 (en) | 2012-10-17 |
EP1387523A4 (en) | 2009-03-18 |
JP4041465B2 (ja) | 2008-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2003067811A1 (fr) | Terminal de communication mobile, procede de traitement d'informations, programme de traitement de donnees et support d'enregistrement | |
US7219227B2 (en) | Data distribution system and recording device and data provision device used therefor | |
CN100414865C (zh) | 发送内容数据的方法和装置,及记录和/或还原装置 | |
US7243242B2 (en) | Data terminal device capable of continuing to download encrypted content data and a license or reproduce encrypted content data with its casing in the form of a shell closed | |
US7685071B2 (en) | Mobile communication terminal | |
JPWO2008117556A1 (ja) | ログ取得システム、ログ収集端末、ログ取得端末、それらを用いたログ取得方法及びプログラム | |
US20020191764A1 (en) | Data distribution system and recording device for use therein | |
US20080137861A1 (en) | Security Code Production Method and Methods of Using the Same, and Programmable Device Thereof | |
JP2002353952A (ja) | データ端末装置 | |
US8112638B2 (en) | Secure backup system and method in a mobile telecommunication network | |
KR20040065466A (ko) | 근거리 통신 장치를 구비한 복합 이동 통신 단말의 보안통신 시스템 및 방법 | |
CN114172544B (zh) | 一种复制智能卡的方法、电子设备及存储介质 | |
JP4638526B2 (ja) | 通信端末、通信端末制御プログラム、通信端末制御方法、通信制御プログラムおよび認証システム | |
US8504846B2 (en) | Method and apparatus for secure storing of private data on user devices in telecommunications networks | |
CN110826097A (zh) | 一种数据处理方法及电子设备 | |
CN106533686B (zh) | 加密通信方法和系统、通信单元、客户端 | |
JP2004234291A (ja) | ファイル転送システム、携帯端末装置、情報処理装置、プログラム | |
KR100605920B1 (ko) | 휴대 단말기의 외부메모리 보안방법 | |
TW595185B (en) | Mobile phone with an encryption function | |
JP2014026383A (ja) | 携帯端末、携帯端末の認証システム、携帯端末の認証方法及びプログラム | |
KR101106695B1 (ko) | 이동통신단말기를 메시지를 이용하여 관리하기 위한 방법 | |
JP2007318583A (ja) | コンテンツ再生装置 | |
JP2004046431A (ja) | 携帯無線電話機及びそのコンテンツダウンロードデータバックアップ方法 | |
KR101289990B1 (ko) | 모바일 기기의 사용 모드 전환 방법 및 이를 적용한 모바일 기기 | |
JP2002125049A (ja) | 位置証明情報提供システム及び方法と、定置型端末、証明センタ及び証明書参照装置の動作方法並びに動作プログラムを記録した記録媒体 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003567029 Country of ref document: JP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003705055 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 038005468 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10482169 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2003705055 Country of ref document: EP |