USRE48381E1 - Data processing device, encryption communication method, key generation method, and computer program - Google Patents
Data processing device, encryption communication method, key generation method, and computer program Download PDFInfo
- Publication number
- USRE48381E1 USRE48381E1 US14/020,130 US201314020130A USRE48381E US RE48381 E1 USRE48381 E1 US RE48381E1 US 201314020130 A US201314020130 A US 201314020130A US RE48381 E USRE48381 E US RE48381E
- Authority
- US
- United States
- Prior art keywords
- key
- public key
- information
- new
- external device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Definitions
- the present invention relates to technique concerning a data processing device, an encryption communication method, a key generation method and computer program for executing these methods.
- the data processing device as disclosed in Japanese Patent Application Laid-Open No. 2002-259108 has and holds a public key certificate and a private key (here, a secret key which corresponds to a public key is called “a private key”) corresponding thereto, and executes authentication based on the public key certificate in accordance with a request from a document server or a client computer.
- a public key certificate and a private key here, a secret key which corresponds to a public key is called “a private key”
- an encryption public key i.e., public key for encryption
- a decryption private key i.e., private key for decryption
- the pair of the encryption public key and the decryption private key is called “encryption key/private key pair” or “private key/encryption key pair” hereinafter.
- the data processing device in a factory shipment status does not have own public key/private key pair.
- the cryptographic communication for installing the private key/public key pair and the certificate thereof might not be able to be executed.
- An object of the present invention is to provide a data processing device which is characterized in that, by comprising a storage unit adapted to store an initial value of a pair of a public key and a private key and a communication unit adapted to execute communication with an external device with use of the initial value of the pair of the public key and the private key stored in the storage unit, it enables encryption communication without generating the pair of the public key and the private key.
- another object of the present invention is to provide a data processing device which is characterized in that, by comprising a storage unit adapted to store an initial value of a public key certificate, and a communication unit adapted to execute communication with an external device by using the initial value of the public key certificate stored in the storage unit, it enables encryption communication without generating the public key certificate.
- Still another object of the present invention is to provide a data processing device which is characterized by comprising a judgment unit adapted to judge whether or not it is necessary to generate a pair of a public key and a private key for executing encryption communication with an external device, a key generation unit adapted to automatically generate the pair of the public key and the private key in a case where the judgment unit judges that it is necessary to generate the pair of the public key and the private key and a key storage unit adapted to store in a storage medium the pair of the public key and the private key generated by the key generation unit.
- Still another object of the present invention is to provide a data processing device which is characterized by comprising a judgment unit adapted to judge whether or not a pair of a public key and a private key stored in a storage medium is damaged, a key generation unit adapted to automatically generate the pair of the public key and the private key in a case where the judgment unit judges that the pair of the public key and the private key is damaged, and a key storage unit adapted to store in the storage medium the pair of the public key and the private key generated by the key generation unit.
- FIG. 1 is a diagram showing the configuration of a print system according to the first embodiment of the present invention
- FIG. 2 is a block diagram showing the internal constitution of a commonly used personal computer
- FIG. 3 is a block diagram showing the internal constitution of a commonly used image forming device
- FIG. 4 is a diagram showing a model of a terminal and the image forming device
- FIG. 5 is a diagram showing one example of the sequence to be executed between the terminal and the image forming device
- FIG. 6 is a diagram showing one example of the sequence to be executed between the terminal and the image forming device
- FIG. 7 is a diagram showing one example of the sequence to be executed between the terminal and the image forming device
- FIG. 8 is a diagram showing one example of the sequence to be executed between the terminal and the image forming device
- FIG. 9 is a diagram showing one example of a UI (user interface) screen of the image forming device.
- FIG. 10 is a diagram showing, in a storage medium, a memory map of the program for executing the procedure according to the present embodiment
- FIG. 11 is a diagram showing one example of the configuration of a network print system (or print communication system) according to the second embodiment of the present invention.
- FIG. 12 is a block diagram showing one example of the internal constitution (i.e., hardware constitution) of a user terminal device;
- FIG. 13 is a block diagram showing one example of the internal constitution (i.e., hardware constitution) of a print device:
- FIG. 14 is a block diagram showing one example of the software constitutions of an external controller terminal device and the user terminal device;
- FIG. 15 is a block diagram showing one example of the software constitution of the print device.
- FIG. 16 is a flow chart for explaining one example of the operation to be executed by the print device in case of automatically generating and storing key pair data
- FIG. 17 is a flow chart for explaining one example of the operation to be executed by the print device in case of executing a key pair generation/storage process.
- FIG. 18 is a flow chart for explaining one example of the operation to be executed by the print device in case of regenerating and updating a key pair according to user setting.
- the present invention is premised on a network print system in which a terminal and an image forming device are connected on a network.
- the embodiment of the present invention enables to achieve both a method of easily installing a public key/private key pair and a public key certificate from the terminal to the image forming device for a user who does not demand high-level security and a method of safely installing the key pair and the certificate through the network without any leakage and alteration (or interpolation).
- FIG. 1 is a diagram showing the configuration by which the print system according to the first embodiment of the present invention can operate.
- each of numerals 110 and 111 denotes a terminal (that is, a PC (personal computer)), each of numerals 120 and 121 denotes a multifunctional image forming device (hereinafter called an MFP (multifunctional peripheral)), and each of numerals 130 and 131 denotes a single functional image forming device (hereinafter called an SFP (single functional peripheral)).
- MFP multifunctional image forming device
- SFP single functional peripheral
- Numeral 140 denotes a fire wall through which the LAN 100 is connected to the external Internet 150 . Moreover, the LAN 100 is further connected to another network 160 through the fire wall 140 and the Internet 150 .
- a user creates a print job at the terminal 110 and transfers the created print job to the MFP 120 . Then, if an error which cannot be recovered does not still occur, the MFP 120 accepts the print job as storing a current processing situation, receives the data of the print job, and executes a print process to the received data.
- the error which cannot be recovered includes, for example, an error for which turning off and on of a power supply are necessary to recover, an error for which a service person's operation is necessary to recover, and the like.
- FIG. 2 is a block diagram showing the internal constitution of a commonly used personal computer, and this internal constitution is equivalent to the internal constitution of each of the terminals 110 and 111 .
- a PC personal computer
- a CPU central processing unit
- ROM read only memory
- HD hard disk
- FD floppyTM disk or flexible disk
- Numeral 203 denotes a RAM (random access memory) which functions as the main memory, the working area and the like for the CPU 201
- numeral 205 denotes a KBC (keyboard controller) which controls instructions (or indications) transferred from a KB (keyboard) 209 , a not shown pointing device and the like
- numeral 206 denotes a CRTC (cathode ray tube controller) which controls the displaying status of a CRT (or CRT display) 210 .
- Numeral 207 denotes a DKC (disk controller) which controls accessing to the HD 211 and the FD 212 which store a boot program, various applications, edited files, user files and the like.
- Numeral 208 denotes an NIC (network interface card) which bi-directionally exchanges data with a network printer, other network devices, and other PC's through a LAN 220 .
- the LAN 220 is equivalent to the LAN 100 shown in FIG. 1 .
- a device 300 shows an example of the internal constitution of the MFP or the SFP on which the program according to the present embodiment operates, and this constitution is equivalent to the internal constitution of each of the MFP's 120 and 121 and the SFP's 130 and 131 shown in FIG. 1 .
- the device 300 contains a CPU 301 which executes various programs stored in a ROM 302 or an HD 311 or supplied from an FD 312 , whereby the CPU 301 totally controls the devices connected to a system bus 304 .
- Numeral 303 denotes a RAM which functions as the main memory, the working area and the like for the CPU 301
- numeral 305 denotes a UIC (user interface controller) which controls display on a UI 309 and input of indications from the UI 309 .
- An FUNCC (function controller) 306 controls an FUNC (function) 310 which is the function peculiar to each device.
- a black-and-white print engine controller corresponds to the FUNCC 306
- a black-and-white print engine corresponds to the FUNC 310 .
- the device 300 is a color printer, a color print engine controller corresponds to the FUNCC 306 , and a color print engine corresponds to the FUNC 310 .
- the device is the MFP, the device 300 has the plural FUNCC's 306 and the plural FUNC's 310 .
- Numeral 307 denotes a DKC (disk controller) which controls accessing to the HD 311 and the FD 312 which store a boot program, programs for executing the operation according to the present embodiment, various applications, and data files.
- Numeral 308 denotes an NIC which bi-directionally exchanges data with a network printer, other network devices, and other PC's through a LAN 320 .
- the LAN 320 is equivalent to the LAN 100 shown in FIG. 1 .
- FIG. 4 is a diagram showing a model of the print system according to the present embodiment.
- numeral 410 denotes an image forming device which is equivalent to each of the MFP's 120 and 121 and the SFP's 130 and 131 shown in FIG. 1
- numeral 420 denotes a client terminal (PC) which is equivalent to each of the terminals 110 and 111 shown in FIG. 1 .
- the image forming device 410 and the client terminal 420 are connected to each other through a LAN 430 .
- Numeral 411 denotes a network I/F (interface) function which is used to connect the image forming device 410 to the LAN 430
- numeral 412 denotes a secure communication function which is used to execute data communication with security assured between the image forming device 410 and the client terminal 420 through the LAN 430
- numeral 413 denotes an application which is supplied and provided in the image forming device 410
- numeral 414 denotes a key management function which is used to manage or administrate the key held in the image forming device 410 .
- the key management function 414 is a kind of application 413 .
- Numeral 415 denotes a key pair, that is, a pair of a public key and a private key of an asymmetric key system.
- Numeral 421 denotes a network I/F function which is used to connect the client terminal 420 to the LAN 430
- numeral 422 denotes a secure communication function which is used to execute data communication with security assured between the client terminal 420 and the image forming device 410 through the LAN 430
- numeral 423 denotes an application which is supplied and provided in the client terminal 420 .
- Numeral 424 denotes a key installation function which is used to install a key pair of the asymmetric key system in the image forming device.
- the key installation function 424 is a kind of application 423 .
- Numeral 425 denotes a key pair, that is, a pair of a public key and a private key of the asymmetric key system.
- the key pair 425 is installed in the image forming device 410 by the key installation function 424 .
- the LAN 430 is equivalent to the LAN 100 shown in FIG. 1 .
- FIG. 5 is a diagram showing one example of the sequence to be executed between the terminal and the image forming device, according to the present embodiment. More specifically, FIG. 5 shows, on the premise that the public key and the private key have been already prepared, the sequence to be executed between the terminal and the image forming device when a new public key and a new private key are installed from the terminal to the image forming device.
- a public key 520 and a private key 521 are prepared will be later described with reference to FIGS. 6 to 8 .
- numeral 501 denotes a terminal (PC) which is equivalent to the client terminal 420 of FIG. 4
- numeral 502 denotes an image forming device which is equivalent to the image forming device 410 of FIG. 4 .
- a start of encryption communication is first requested from the terminal 501 .
- the request issued in the step S 501 is acknowledged by the image forming device 502
- the public key 520 or a public key certificate containing the public key 520 is transmitted from the image forming device 502 to the terminal 501 .
- a session key of a common key system to be used in the encryption communication for key installation is generated in a step S 503 , and the generated-session key is encrypted by using the public key in a step S 504 .
- the session key encrypted in the step S 504 is transmitted from the terminal 501 to the image forming device 502 .
- the encrypted session key received in the step S 505 is decrypted in a step S 506 .
- the image forming device 502 can secretly acquire the session key generated by the terminal 501 in the step S 503 .
- numerals 514 and 515 respectively denote a new private key and a new public key which are both installed in the image forming device.
- the new private key 514 and the new public key 515 constitute together a new key pair which is equivalent to the key pair 425 of FIG. 4 .
- the terminal 501 starts the encryption communication by using the session key, and, if necessary, the new key pair of the new private key 514 and the new public key 515 is transmitted to the image forming device 502 in a step S 507 .
- the image forming device 502 can secretly and safely acquire the new key pair of the new private key 514 and the new public key 515 .
- FIG. 6 is a diagram showing, as well as FIG. 5 , one example of the sequence to be executed between the terminal and the image forming device, according to the present embodiment.
- numeral 601 denotes a terminal (PC) which is equivalent to the client terminal 420 of FIG. 4
- numeral 602 denotes an image forming device which is equivalent to the image forming device 410 of FIG. 4 .
- this sequence is characterized in that the image forming device 602 is in a factory shipment status, a public key 620 and a private key 621 are provided as factory shipment values beforehand, and it is thus possible for the image forming device to start secure communication without newly generating the public key 620 and the private key 621 .
- a message is transmitted from the terminal 601 to the image forming device 602 , so as to login by administrator authority.
- a message “OK” is returned from the image forming device 602 to the terminal 601 in a step S 602 .
- a start of encryption transmission is requested from the terminal 601 to the image forming device 602 .
- a step S 604 the public key 620 or a public key certificate containing the public key 620 is transmitted from the image forming device 602 to the terminal 601 as a response to the request of the start of encryption transmission.
- a session key is generated in a step S 605 .
- the generated session key is encrypted by using the public key acquired in the step S 604 .
- the encrypted session key is transmitted from the terminal 601 to the image forming device 602 , and, in a step S 608 , the transmitted session key is decrypted by the image forming device 602 . Consequently, the image forming device 602 can secretly acquire the session key.
- the terminal 601 After the session key was transmitted, the terminal 601 starts the encryption communication by using the session key, and, if necessary, a new key pair of a private key 615 and a public key 616 is transmitted from the terminal 601 to the image forming device 602 in a step S 609 .
- the image forming device 602 receives the new pair of the new private key 615 and the new public key 616 in the step S 609 , whereby the image forming device 602 can secretly and safely acquire the new private key 615 and the new public key 616 .
- the default value of the pair of the public key and the private key (also called the public key/private key pair) or the public key certificate thereof to be used to execute the encryption communication is stored in the storage device, it is possible to execute the encryption communication without executing complicated setting such as the generation of the public key/private key pair or the public key certificate. As the result of this, it is possible to execute the secure communication, which can achieve certain level of secret leakage prevention, without executing the complicated setting.
- the public key/private key pair can be installed from the terminal through the encryption communication using the default public key/private key pair and the default public key certificate, it is possible to eliminate the danger that the private key leaks to people outside when the key is exchanged.
- FIG. 7 is a diagram showing, as well as FIG. 5 , one example of the sequence to be executed between the forming device and the PC, according to the present embodiment.
- numeral 701 denotes a terminal (PC) which is equivalent to the client terminal 420 of FIG. 4
- numeral 702 denotes an image forming device which is equivalent to the image forming device 410 of FIG. 4 .
- this sequence is characterized in that the image forming device has a pair of a public key 720 and a private key 721 both generated by the image forming device itself and thus called self-generated keys, and, therefore, there is no possibility that the session key leaks to people outside when the session key is exchanged.
- the image forming device self-generates the pair of the public key 720 and the private key 721 according to an instruction (or an indication) input through an operation panel attached to the device or according to an instruction (or an indication) sent from the terminal.
- a message is transmitted from the terminal 701 to the image forming device 702 , so as to login by administrator authority.
- a message “OK” is returned from the image forming device 702 to the terminal 701 in a step S 702 .
- a start of encryption transmission is requested from the terminal 701 to the image forming device 702 .
- a step S 704 the public key 720 or a public key certificate containing the public key 720 is transmitted from the image forming device 702 to the terminal 701 as a response to the request of the start of encryption transmission.
- a session key is generated by the terminal 701 in a step S 705 . Moreover, in a step S 706 , the generated session key is encrypted by using the public key acquired in the step S 704 .
- the encrypted session key is transmitted from the terminal 701 to the image forming device 702 , and, in a step S 708 , the transmitted session key is decrypted by the image forming device 702 . Consequently, the image forming device 702 can secretly acquire the session key.
- the terminal 701 starts the encryption communication by using the session key, and, if necessary, a new key pair of a private key 715 and a public key 716 is transmitted from the terminal 701 to the image forming device 702 in a step S 709 .
- the image forming device 702 receives the new pair of the new private key 715 and the new public key 716 as a message on the encryption communication, whereby the image forming device 702 can secretly and safely acquire the new private key 715 and the new public key 716 .
- the public key or the public key certificate transmitted in the step S 704 is the self-generated thing which is not certified by a reliable CA (certificate authority) or the like.
- a reliable CA certificate authority
- security improves moreover.
- FIG. 8 is a diagram showing, as well as FIG. 5 , one example of the sequence to be executed between the forming device and the terminal, according to the present embodiment.
- numeral 801 denotes a terminal (PC) which is equivalent to the client terminal 420 of FIG. 4
- numeral 802 denotes an image forming device which is equivalent to the image forming device 410 of FIG. 4 .
- this sequence is characterized in that the image forming device has a pair of a public key 820 and a private key 821 both generated by the image forming device itself and thus called self-generated keys, and, therefore, there is no possibility that the session key leaks to people outside when the session key is exchanged.
- a message is transmitted from the terminal 801 to the image forming device 802 , so as to login by administrator authority.
- a message “OK” is returned from the image forming device 802 to the terminal 801 in a step S 802 .
- a start of encryption transmission is requested from the terminal 801 to the image forming device 802 .
- a step S 804 the public key 820 or a public key certificate containing the public key 820 is transmitted from the image forming device 802 to the terminal 801 as a response to the request of the start of encryption transmission.
- the user (or installer) of the terminal 801 confirms the public key received and acquired from the image forming device 802 in the step S 804 .
- the user of the terminal 801 visually confirms the value of the public key displayed on the UI screen of the image forming device 802 .
- a administrator of the device confirms the public key through its UI and then notifies the user of the terminal 801 of the confirmed public key through post, mail, telephone, publication on newspapers, publication on magazines, and the like.
- a session key is generated by the terminal 801 in a step S 806 .
- the generated session key is encrypted by using the public key acquired in the step S 802 .
- the encrypted session key is transmitted from the terminal 801 to the image forming device 802 .
- a step S 809 the transmitted session key is decrypted by the image forming device 802 . Consequently, the image forming device 802 can secretly acquire the session key.
- the terminal 801 After the session key was transmitted, the terminal 801 starts the encryption communication by using the session key, and, if necessary, a new key pair of a private key 816 and a public key 817 is transmitted from the terminal 801 to the image forming device 802 in a step S 810 .
- the image forming device 802 receives the new pair of the private key 816 and the public key 817 as a message on the encryption communication, whereby the image forming device 802 can secretly and safely acquire the new private key 816 and the new public key 817 .
- the public key or the public key certificate transmitted in the step S 804 is the self-generated thing.
- the user of the terminal 801 confirms in the step S 805 that the transmitted public key is the thing owned by the image forming device 802 , this sequence is quite safe also against a dummy of the image forming device 802 .
- FIG. 9 is a diagram showing one example of a UI screen 900 on which the administrator of the device confirms the public key information as shown in FIG. 8 .
- a pane 910 displays, as a list, the keys held by the image forming device 802 , a column 911 shows key names, and a column 912 shows algorithms used by the respective keys.
- a row 913 shows that the key name is “KEY OF GINJI” and the used algorithm is RSA (Rivest Shamir Adleman), and a row 914 shows that the key name is “KEY OF BUNTARO” and the used algorithm is RSA.
- a button 915 is used to indicate display of the detailed information of the key selected in the pane 910
- a button 916 is used to indicate the operation to close the screen of the key information.
- the row 913 is selected, and the details of the key information corresponding to the row 913 are displayed in a pane 920 .
- numeral 921 denotes a location where the detailed information of the selected key is displayed.
- the key name is “KEY OF GINJI”
- the date of installation is Dec. 18, 2003
- the used algorithm is RSA
- the key length is 1024 bits.
- the value of the public key is also displayed.
- a button 932 is used to indicate to print the details of the key information
- a button 923 is used to send an E-mail concerning the details of the key information displayed in the display location 921
- a button 924 is used to indicate to close the pane 920 .
- the content of FIG. 9 is absolutely one example. Therefore, for example, the information of the public key certificate may be added to the pane 920 .
- FIG. 11 is a diagram showing one example of the configuration of the network print system according to the second embodiment.
- a print device 1110 according to the present embodiment is connected to an external controller terminal device 1120 of the print device 1110 and a user terminal device 1130 through a network 1100 , whereby the print device 1110 can mutually execute data communication with the external controller terminal device 1120 and the user terminal device 1130 .
- FIG. 11 shows the single print device, the single external controller terminal device and the single user terminal device. However, it is possible to provide the plural print devices, the plural external controller terminal devices and the plural user terminal devices.
- the print device 1110 in the present embodiment is the MFP (multifunctional peripheral) which can be used as a copying device and can also be used as a network printer.
- MFP multifunctional peripheral
- the external controller terminal device 1120 of the print device 1110 enables to remotely control the print device 1110 by transmitting and receiving the control command or the control data of the print device 1110 through the network 1100 .
- the user terminal device 1130 is the device which enables a user to use various functions such as a print function and the like held in the print device 1110 .
- the user terminal device 1130 has a print application and/or a print driver which can be used with respect to the print device 1110 , whereby the user terminal device 1130 transmits the print data to the print device 1110 or the external controller terminal device 1120 by using the print application and/or the print driver. Then, the print device 1110 executes printing based on the transmitted print data.
- the external controller terminal device 1120 in the present embodiment is the terminal device in which the platform for a general-purpose personal computer (PC) is used, whereby the hardware constitution of the external controller terminal device 1120 is the same as that of the user terminal device 1130 .
- PC personal computer
- all the devices shown in FIG. 11 are the network-corresponding devices capable of executing communication through the network 1100 .
- a LAN is used as the network 1100 .
- the network 1100 is not limited to the LAN, that is, a WAN (wide area network), the Internet and the like can also be used as the network 1100 .
- the communication between the print device 1110 and the external controller terminal device 1120 and the communication between the print device 1110 and the user terminal device 1130 can be achieved according to a given encryption communication protocol.
- the encryption communication protocol is the protocol for certificating the device being a communication partner by using a key pair generated by a later-described key pair generation function of the print device 1110 , and for generating a common key to be used in communication data encryption and then actually encrypting communication data.
- FIG. 12 is a block diagram showing one example of the internal constitution (i.e., hardware constitution) of the user terminal device 1130 .
- a CPU 1201 executes control software stored in a ROM 1202 or an HD 1211 or supplied from an FD 1212 , whereby the CPU 1201 totally controls the devices connected to a system bus 1204 .
- the encryption communication between the user terminal device 1130 and the print device 1110 is executed by the CPU 1201 based on the program stored in the ROM 1202 or the HD 1211 .
- Numeral 1203 denotes a RAM which functions as the main memory, the working area and the like for the CPU 1201
- numeral 1205 denotes a KBC (keyboard controller) which controls instructions (or indications) transferred from a KB (keyboard) 1209 , a not shown pointing device and the like.
- KBC keyboard controller
- Numeral 1206 denotes a CRTC (cathode ray-tube controller) which controls the displaying status of a CRT (or CRT display) 1210
- numeral 1207 denotes a DKC (disk controller) which controls accessing to the HD 1211 and the FD 1212 .
- the HD 1211 stores a boot program (that is, a starting program which is used to start executing (or operating) various hardware and software), plural applications, edited files, user files, a network management program and the like.
- a boot program that is, a starting program which is used to start executing (or operating) various hardware and software
- plural applications edited files, user files, a network management program and the like.
- Numeral 1208 denotes a network I/F control device which bi-directionally exchanges data with the print device 1110 , other network devices, and other PC's through the network (LAN) 1100 .
- the internal constitution (hardware constitution) of the external controller terminal device 1120 is the same as that of the user terminal device 1130 shown in FIG. 12 , whereby the detailed explanation thereof will be omitted.
- FIG. 13 is a block diagram showing one example of the internal constitution (i.e., hardware constitution) of the print device 1110 .
- the print device 1110 is the network device on which the program of each unit according to the present embodiment runs.
- the print device 1110 contains a CPU 1301 .
- the CPU 1301 executes the program stored in a ROM 1302 or an HD 1309 so as to totally control the devices connected to a system bus 1304 .
- a RAM 1303 functions as the main memory, the working area and the like for the CPU 1301 , an NVRAM (nonvolatile RAM) 1305 stores various setting values of the print device 1110 , and a DVC (device controller) 1306 controls a device 1307 .
- NVRAM nonvolatile RAM
- DVC device controller
- a DKC (disk controller) 1308 controls accessing to the HD 1309 which stores therein the programs for controlling the device and various data.
- a network I/F control device 1310 bi-directionally exchanges data with a network printer, other network devices and other PC's through the network (LAN) 1100 .
- a UI (user interface) 1311 in the present embodiment has a display screen of a touch panel type. Therefore, a user can execute various setting operations for the print device 1110 by handling or operating the touch-panel display screen.
- FIG. 14 is a block diagram showing one example of the software constitutions of the external controller terminal device 1120 and the user terminal device 1130 according to the present embodiment.
- a network driver 1401 which is connected to the network 1100 controls the network I/F control device 1208 shown in FIG. 12 to transmit/receive the data to/from the external through the network 1100 .
- a network communication control unit 1402 controls a network communication protocol such as TCP/IP (Transmission Control Protocol/Internet Protocol) or the like to transmit/receive the data to/from the external.
- a network communication protocol such as TCP/IP (Transmission Control Protocol/Internet Protocol) or the like to transmit/receive the data to/from the external.
- an encryption communication unit 1403 is the module for executing encryption communication according to the above-described given encryption communication protocol.
- the encryption communication is the communication that data is transmitted/received in the encrypted form.
- an encryption processing unit 1406 executes various encryption processes such as a process of encrypting the communication data to be transmitted, a process of decrypting the received communication data, and the like.
- An application 1404 includes the various applications which use and/or execute the functions of the print device 1110 such as the print function and the like.
- a device control unit 1405 is the module which is held by the external controller terminal device 1120 .
- the device control unit 1405 executes a process for remotely controlling the print device 1110 by generating a control command and control data for the print device 1110 and then transmitting the generated control command and the control data to the print device 1110 through the network 1100 .
- FIG. 15 is a block diagram showing one example of the software constitution of the print device 1110 in the present embodiment.
- a network driver 1501 which is connected to the network 1100 controls the network I/F control device 1310 shown in FIG. 13 to transmit/receive the data to/from the external through the network 1100 .
- a network communication control unit 1502 controls a network communication protocol such as TCP/IP or the like to transmit/receive the data to/from the external.
- An encryption communication unit 1503 is the module for executing encryption communication according to the above-described given encryption communication protocol, and an encryption processing unit 1506 executes various encryption processes such as a process of encrypting the communication data to be transmitted, a process of decrypting the received communication data, and the like.
- An application 1504 is the application which executes the functions of the print device 1110 such as the print function and the like.
- a device control unit 1505 is the module which totally controls the print device 1110 by generating a control command and control data for the print device 1110 .
- a key pair generation processing unit 1507 is the module for executing a process of automatically generating data of the key pair (hereinafter called key pair data).
- a key pair storage processing unit 1508 is the module for storing the key pair data generated through the process of the key pair generation processing unit 1507 in the HD 1309 or the NVRAM 1305 shown in FIG. 13 . Besides, in response to a request from another module, the key pair storage processing unit 1508 reads the key pair data from the HD 1309 or the NVRAM 1305 and sends the read key pair data to the relevant module.
- the key pair data of the print device 1110 is previously stored as a file in the HD 1309 of FIG. 13 , and the file in which the key pair data is previously stored is called the key pair file.
- a step S 1601 when the power supply of the print device 1110 is turned on, the encryption processing unit 1506 access the HD 1309 to judge whether or not the key pair file in which the key pair data is previously stored exists in the HD 1309 .
- step S 1601 When it is judged in the step S 1601 that the key pair file exists in the HD 1309 , the flow advances to a step S 1602 .
- the encryption processing unit 1506 opens the key pair file in the HD 1309 and acquires the data of the open key and the data of the private key both included in the key pair data.
- the private key included in the key pair held by the print device 1110 is stored in the key pair file in the form encrypted by a common key encryption system.
- the data of the common key to be used to encrypt the private key is stored in the NVRAM 1305 of the print device 1110 .
- the data of the common key is stored in the NVRAM 1305 shown in FIG. 13 so that it is impossible to access the data of the common key from outside.
- only the private key is encrypted by the common key encryption system.
- both the private key and the public key may be encrypted and stored in the file, and that the private key and the public key may be encrypted by a public key encryption system.
- the encryption processing unit 1506 accesses the NVRAM 1305 to acquire the data of the common key used in case of encrypting the private key. Then, in a step S 1604 , the encryption processing unit 1506 decrypts the data of the private key acquired in the step S 1602 by using the acquired common key.
- the flow advances to a step S 1605 .
- the key pair generation processing unit 1507 calculates and generates the digest value of the private key according to an algorithm of one-way hash function.
- SHA-1 Secure Hash Algorithm-1
- MD5 Message Digest Algorithm 5
- the digest value of the private key is generated, and the generated digest value of the private key is stored in the NVRAM 1305 as well as the common key to be used in case of encrypting the private key.
- the key pair generation processing unit 1507 acquires from the NVRAM 1305 the digest value of the private key calculated when the key is generated.
- the key pair generation processing unit 1507 compares the digest value acquired in the step S 1606 with the digest value of the private key calculated in the step S 1605 , thereby detecting whether or not the held data of the private key is damaged.
- a step S 1608 the key pair generation processing unit 1507 judges whether or not the digest value acquired in the step S 1606 conforms to the digest value of the private key calculated in the step S 1605 .
- the flow advances to a next step S 1609 to execute a later-described generation/storage process of the key pair (hereinafter called key pair generation/storage process).
- key pair generation/storage process a later-described generation/storage process of the key pair
- the process ends as a whole.
- the digest value acquired in the step S 1606 conforms to the digest value of the private key calculated in the step S 1605
- the process immediately ends without executing the key pair generation/storage process.
- the flow skips the steps S 1602 to S 1608 and directly advances to the step S 1609 to execute the key pair generation/storage process.
- the number of key pairs held by the print device 1110 is one.
- the key pair generation/storage process shown in FIG. 17 is the key pair generation/storage process in the step S 1609 of FIG. 16 .
- the key pair generation processing unit 1507 acquires a setting parameter value for generating the key pair.
- the setting parameter value in the present embodiment includes the public key encryption algorithm of the key pair to be generated and the bit length of the data of the key.
- the key pair of the public key encryption algorithm such as RSA (Rivest Shamir Adleman), DSA (Digital Signature Algorithm) or the like can be generated, as the public key encryption algorithm for the key pair to be generated.
- the public key encryption algorithm and the bit length of the data of the key are set beforehand as default setting values. These setting values are stored in the NVRAM 1305 of the print device 1110 . Incidentally, it is possible for the user to change the public key encryption algorithm of the key pair to be generated and the bit length of the data of the key to be generated, through the operation on the UI 1311 being the touch-panel display screen shown in FIG. 13 .
- the key pair generation processing unit 1507 generates the key pair based on the setting values acquired in the step S 1701 and stored in the NVRAM 1305 .
- the key pair generation processing unit 1507 After the generation of the key pair normally ends, in a step S 1703 , the key pair generation processing unit 1507 generates pseudorandom numbers as the common key for encrypting by the common key encryption system the data of the private key of the key pair generated in the step S 1702 .
- the key pair generation processing unit 1507 calculates and generates the digest value of the private key, generated in the step S 1702 , according to the algorithm of one-way hash function.
- the digest value of the private key is used in the step S 1607 of FIG. 16 to detect whether or not the data of the private key is damaged.
- the key pair generation processing unit 1507 encrypts the data of the private key by using the common key for encrypting the private key generated in the step S 1703 .
- step S 1705 When the encryption of the data of the private key in the step S 1705 succeeds, the flow advances to a step S 1706 .
- the key pair storage processing unit 1508 outputs the data of the public key and the encrypted data of the private key as the file and stores them in the HD 1309 .
- the key pair storage processing unit 1508 stores in the NVRAM 1503 the data of the common key used in case of encrypting the data of the private key. Likewise, in a step S 1708 , the key pair storage processing unit 1508 stores in the NVRAM 1503 the data of the digest value of the private key. Then, the key pair generation/storage process based on the flow chart shown in FIG. 17 ends.
- the print device 1110 automatically generates and stores the key pair.
- the print device 1110 it is possible for the print device 1110 to regenerate and update the key pair.
- the print device 1110 in the present embodiment can designate the regeneration and update of the key pair.
- the user it is possible for the user to set the setting value of the regeneration and update of the key pair, through the operation on the UI 1311 being the touch-panel display screen shown in FIG. 13 . Then, the acquired setting value is stored in the NV RAM 1305 .
- a step S 1801 when the power supply of the print device 1110 is turned on, the key pair generation processing unit 1507 acquires the setting value of the regeneration and update of the key pair. Then, in a step S 1802 , the key pair generation processing unit 1507 judges whether the setting is “ON” or “OFF” based on the setting value acquired in the step S 1801 . Then, when judged that the setting is “ON” based on the setting value acquired in the step S 1801 , the flow advances to a step S 1811 to execute a regeneration/update process of the key pair.
- step S 1811 is the same as the process in the step S 1609 shown in FIG. 16 (that is, the process in the steps S 1701 to S 1708 shown in FIG. 17 ).
- steps S 1803 to S 1810 is the same as the process in the steps S 1601 to S 1608 shown in FIG. 16 . Therefore, the detailed explanation of these processes will be omitted.
- the case where the key pair is regenerated and updated when the print device 1110 is activated is explained by way of example.
- the key pair data when the power supply of the print device 1110 is turned on, it is judged whether or not the key pair data exists in the HD 1309 of the print device 1110 . Then, when it is judged that the key pair data does not exist in the HD 1309 , the key pair is generated and stored. Thus, even when the key pair stored in the print device 1110 is deleted for some reason, the key pair data can be acquired without any complicated operation by the user. Consequently, it is possible to easily and certainly prevent the inconvenient situation that the encryption communication of the data between the print device 1110 and the user terminal device 1130 becomes impossible.
- the private key included in the key pair data is decrypted, and the digest value of the relevant private key is generated.
- the digest value of the private key calculated when the key pair data is generated is acquired.
- the generated digest value does not conform to the acquired digest value, it is judged that the data of the private key is damaged, and the key pair data is thus regenerated and updated. Therefore, even if the key pair stored in the print device 1110 is damaged for some reason, the adequate key pair data can be acquired without any complicated operation by the user. On this account, it is possible to easily and certainly prevent the inconvenient situation that the encryption communication of the data between the print device 1110 and the user terminal device 1130 becomes impossible.
- the key pair data is regenerated and updated based on the user operation on the UI 1311 of the print device 1110 in some cases.
- the key pair data is updated in accordance with the intention of the user.
- the secrecy of the data to be transmitted and received between the print device 1110 and the user terminal device 1130 can be certainly held or maintained as much as possible.
- FIG. 10 is a diagram showing a memory map of a CD-ROM being one example of a storage medium.
- numeral 9999 denotes an area in which directory information is stored
- numeral 9998 denotes an area in which a later install program is stored
- numeral 9997 denotes an area in which the program for achieving the embodiments of the present invention is stored. More specifically, the area 9998 is the area in which the program for installing the program to achieve the embodiments of the present invention is stored.
- the area 9997 is the area in which the program for achieving the embodiments of the present invention is stored. That is, in a case where the program for achieving the embodiments of the present invention is installed in, e.g., the device 300 , the install program stored in the area 9998 is first loaded to the system, and the loaded program is executed by the CPU 301 .
- the install program executed by the CPU 301 allows to read the program for achieving the embodiments of the present invention from the area 9997 and then store the read program in the HD 311 .
- the present invention can be applied to a system or an integrated device which consists of plural devices such as a host computer, an interface equipment, a reader and the like, or to an apparatus which comprises a single device.
- the object of the present invention can be achieved in a case where a storage medium storing therein the program codes of software to realize the functions of the above embodiments is supplied to a system or an apparatus, and thus a computer (or CPU or MPU) in the system or the apparatus reads and executes the program codes stored in the storage medium.
- a computer or CPU or MPU
- the program codes themselves read out of the storage medium realize the novel functions of the present invention. Therefore, the storage medium which stores these program codes constitutes the present invention.
- a floppyTM disk for example, a hard disk, an optical disk, a magnetooptical disk, a CD-ROM, a CD-R, a magnetic tape, a nonvolatile memory card, a ROM or the like can be used.
- the present invention includes not only a case where the functions of the above embodiments are realized by executing the program codes read by the computer, but also a case where an OS (operating system) or the like running on the computer executes a part or all of the actual process on the basis of the instructions of the program codes and thus the functions of the above embodiments are realized by the relevant process.
- an OS operating system
- the present invention includes not only a case where the functions of the above embodiments are realized by executing the program codes read by the computer, but also a case where an OS (operating system) or the like running on the computer executes a part or all of the actual process on the basis of the instructions of the program codes and thus the functions of the above embodiments are realized by the relevant process.
- the present invention also includes a case where, after the program codes read out of the storage medium are written into a function expansion board inserted in the computer or the memory provided in a function expansion unit connected to the computer, the CPU or the like provided in the function expansion board or the function expansion unit executes a part or all of the actual process on the basis of the instructions of the program codes, and thus the functions of the above embodiments are realized by the relevant process.
- the present invention can be also applied to a case where the program codes of software to realize the functions of the above embodiments are delivered from the storage medium to the requesters through a communication line in personal computer communication or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
- Storage Device Security (AREA)
Abstract
A data processing device comprises a storage unit adapted to store an initial value of a pair of a public key and a private key and a communication unit adapted to execute communication with an external device with use of the initial value of the pair of the public key and the private key stored in the storage unit, thereby enabling encryption communication without generating the pair of the public key and the private key.
Description
This application is a reissue of U.S. Pat. No. 8,015,393, issued on Sep. 6, 2011, which is hereby incorporated by reference, as if fully set forth herein. U.S. Pat. No. 8,015,393 matured from U.S. patent application Ser. No. 11/101,493, filed on Apr. 8, 2005, which claims the benefit of Japanese Patent Application No. 2004-117117, filed on Apr. 12, 2004, and Japanese Patent Application No. 2004-191542, filed on Jun. 29, 2004. Those applications are also incorporated by reference herein in their entireties.
1. Field of the Invention
The present invention relates to technique concerning a data processing device, an encryption communication method, a key generation method and computer program for executing these methods.
2. Related Background Art
Recently, a network security function has come to be requested to a data processing device. To comply with such a request, for example, the data processing device as disclosed in Japanese Patent Application Laid-Open No. 2002-259108 has and holds a public key certificate and a private key (here, a secret key which corresponds to a public key is called “a private key”) corresponding thereto, and executes authentication based on the public key certificate in accordance with a request from a document server or a client computer.
Incidentally, it is assumed that a pair of an encryption public key (i.e., public key for encryption) and a decryption private key (i.e., private key for decryption) is created outside the data processing device, a certificate of the created pair is issued from a reliable organization, and the issued certificate is installed in the data processing device. Here, the pair of the encryption public key and the decryption private key is called “encryption key/private key pair” or “private key/encryption key pair” hereinafter. In such a circumstance, with respect to the data processing device which does not have an input unit such as an FD (floppy™ disk or flexible disk), a CD (compact disk) or the like, it is necessary to install through a network the private key/public key pair and the certificate from a terminal located on the relevant network to the data processing device.
Moreover, to safely install the private key/public key pair and the certificate thereof from the terminal to the data processing device through the network, it is desirable to execute cryptographic communication (or cipher communication) between the terminal and the data processing device. In this connection, a private key/public key pair is necessary to execute the cryptographic communication.
However, there is a possibility that the data processing device in a factory shipment status does not have own public key/private key pair. In such a case, the cryptographic communication for installing the private key/public key pair and the certificate thereof might not be able to be executed.
Moreover, for example, in an environment that takes not much interest in security or in an environment that does not necessarily need perfect security, all users do not necessarily indicate generation of the public key and the private key before executing the cryptographic communication.
For this reason, even if the user does not execute a complicated operation to generate the public key and the private key, it is desirable to appropriately prepare and provide the public key/private key pair.
Moreover, even after the public key/private key pair was once prepared, if the public key/private key pair is damaged, it is desirable to newly prepare and provide the public key/private key pair without any complicated operation by the user.
An object of the present invention is to provide a data processing device which is characterized in that, by comprising a storage unit adapted to store an initial value of a pair of a public key and a private key and a communication unit adapted to execute communication with an external device with use of the initial value of the pair of the public key and the private key stored in the storage unit, it enables encryption communication without generating the pair of the public key and the private key.
Moreover, another object of the present invention is to provide a data processing device which is characterized in that, by comprising a storage unit adapted to store an initial value of a public key certificate, and a communication unit adapted to execute communication with an external device by using the initial value of the public key certificate stored in the storage unit, it enables encryption communication without generating the public key certificate.
Furthermore, still another object of the present invention is to provide a data processing device which is characterized by comprising a judgment unit adapted to judge whether or not it is necessary to generate a pair of a public key and a private key for executing encryption communication with an external device, a key generation unit adapted to automatically generate the pair of the public key and the private key in a case where the judgment unit judges that it is necessary to generate the pair of the public key and the private key and a key storage unit adapted to store in a storage medium the pair of the public key and the private key generated by the key generation unit.
In addition, still another object of the present invention is to provide a data processing device which is characterized by comprising a judgment unit adapted to judge whether or not a pair of a public key and a private key stored in a storage medium is damaged, a key generation unit adapted to automatically generate the pair of the public key and the private key in a case where the judgment unit judges that the pair of the public key and the private key is damaged, and a key storage unit adapted to store in the storage medium the pair of the public key and the private key generated by the key generation unit.
(Network Print System According To First Embodiment)
As substantially explained in the following, the present invention is premised on a network print system in which a terminal and an image forming device are connected on a network. In this system, the embodiment of the present invention enables to achieve both a method of easily installing a public key/private key pair and a public key certificate from the terminal to the image forming device for a user who does not demand high-level security and a method of safely installing the key pair and the certificate through the network without any leakage and alteration (or interpolation).
In FIG. 1 , each of numerals 110 and 111 denotes a terminal (that is, a PC (personal computer)), each of numerals 120 and 121 denotes a multifunctional image forming device (hereinafter called an MFP (multifunctional peripheral)), and each of numerals 130 and 131 denotes a single functional image forming device (hereinafter called an SFP (single functional peripheral)). Here, all of the terminals 110 and 111, the MFP's 120 and 121, and the SFP's 130 and 131 are connected to a LAN (local area network) 100. Incidentally, it should be noted that, in the following explanation, the MFP's 120 and 121 and the SFP's 130 and 131 are generically called the image forming device.
Numeral 140 denotes a fire wall through which the LAN 100 is connected to the external Internet 150. Moreover, the LAN 100 is further connected to another network 160 through the fire wall 140 and the Internet 150.
Incidentally, for example, a user creates a print job at the terminal 110 and transfers the created print job to the MFP 120. Then, if an error which cannot be recovered does not still occur, the MFP 120 accepts the print job as storing a current processing situation, receives the data of the print job, and executes a print process to the received data. Here, the error which cannot be recovered includes, for example, an error for which turning off and on of a power supply are necessary to recover, an error for which a service person's operation is necessary to recover, and the like.
In a status such as paper jam, paper empty of the like that the current processing situation can be stored when recovering this status to a steady status, the data reception operation is executed as usual, and then the print process is executed after recovering this status to the steady status. In addition, even when the error which cannot be recovered occurs, if a process other than the print job is requested, the data of the requested process is received as usual, and the received data is then processed.
In FIG. 3 , a device 300 shows an example of the internal constitution of the MFP or the SFP on which the program according to the present embodiment operates, and this constitution is equivalent to the internal constitution of each of the MFP's 120 and 121 and the SFP's 130 and 131 shown in FIG. 1 . Moreover, the device 300 contains a CPU 301 which executes various programs stored in a ROM 302 or an HD 311 or supplied from an FD 312, whereby the CPU 301 totally controls the devices connected to a system bus 304.
An FUNCC (function controller) 306 controls an FUNC (function) 310 which is the function peculiar to each device. Here, if the device 300 is a black-and-white printer, a black-and-white print engine controller corresponds to the FUNCC 306, and a black-and-white print engine corresponds to the FUNC 310. In the meantime, if the device 300 is a color printer, a color print engine controller corresponds to the FUNCC 306, and a color print engine corresponds to the FUNC 310. Furthermore, if the device is the MFP, the device 300 has the plural FUNCC's 306 and the plural FUNC's 310.
When installing the keys, in a step S501, a start of encryption communication is first requested from the terminal 501. When the request issued in the step S501 is acknowledged by the image forming device 502, in a step S502, the public key 520 or a public key certificate containing the public key 520 is transmitted from the image forming device 502 to the terminal 501.
Then, in the terminal 501 which received the public key 520 or the public key certificate containing the public key 520 in the step S502, a session key of a common key system to be used in the encryption communication for key installation is generated in a step S503, and the generated-session key is encrypted by using the public key in a step S504. After then, in a step S505, the session key encrypted in the step S504 is transmitted from the terminal 501 to the image forming device 502.
Subsequently, in the image forming device 502, the encrypted session key received in the step S505 is decrypted in a step S506. Thus, the image forming device 502 can secretly acquire the session key generated by the terminal 501 in the step S503. Here, numerals 514 and 515 respectively denote a new private key and a new public key which are both installed in the image forming device. Incidentally, the new private key 514 and the new public key 515 constitute together a new key pair which is equivalent to the key pair 425 of FIG. 4 .
Then, the terminal 501 starts the encryption communication by using the session key, and, if necessary, the new key pair of the new private key 514 and the new public key 515 is transmitted to the image forming device 502 in a step S507. Thus, the image forming device 502 can secretly and safely acquire the new key pair of the new private key 514 and the new public key 515.
In FIG. 6 , numeral 601 denotes a terminal (PC) which is equivalent to the client terminal 420 of FIG. 4 , and numeral 602 denotes an image forming device which is equivalent to the image forming device 410 of FIG. 4 . Here, this sequence is characterized in that the image forming device 602 is in a factory shipment status, a public key 620 and a private key 621 are provided as factory shipment values beforehand, and it is thus possible for the image forming device to start secure communication without newly generating the public key 620 and the private key 621.
First, in a step S601, a message is transmitted from the terminal 601 to the image forming device 602, so as to login by administrator authority. When the login by the administrator authority is acknowledged by the image forming device 602, a message “OK” is returned from the image forming device 602 to the terminal 601 in a step S602. After the login succeeded, in a step S603, a start of encryption transmission is requested from the terminal 601 to the image forming device 602.
Then, in a step S604, the public key 620 or a public key certificate containing the public key 620 is transmitted from the image forming device 602 to the terminal 601 as a response to the request of the start of encryption transmission. In the terminal 601 which received the public key 620 or the public key certificate containing the public key 620, a session key is generated in a step S605. Moreover, in a step S606, the generated session key is encrypted by using the public key acquired in the step S604.
Subsequently, in a step S607, the encrypted session key is transmitted from the terminal 601 to the image forming device 602, and, in a step S608, the transmitted session key is decrypted by the image forming device 602. Consequently, the image forming device 602 can secretly acquire the session key.
After the session key was transmitted, the terminal 601 starts the encryption communication by using the session key, and, if necessary, a new key pair of a private key 615 and a public key 616 is transmitted from the terminal 601 to the image forming device 602 in a step S609. Thus, the image forming device 602 receives the new pair of the new private key 615 and the new public key 616 in the step S609, whereby the image forming device 602 can secretly and safely acquire the new private key 615 and the new public key 616.
In this sequence, since the pair of the public key 620 and the private key 621 to be used in the steps S606 and S608 is the factory shipment value, there is a fear that the session key to be transmitted in the step S607 leaks to people outside. Nevertheless, a user can execute the encryption communication without executing complicated and time-consuming security setting, although the level of security in the communication is low.
As above, since the default value of the pair of the public key and the private key (also called the public key/private key pair) or the public key certificate thereof to be used to execute the encryption communication is stored in the storage device, it is possible to execute the encryption communication without executing complicated setting such as the generation of the public key/private key pair or the public key certificate. As the result of this, it is possible to execute the secure communication, which can achieve certain level of secret leakage prevention, without executing the complicated setting. Moreover, since the public key/private key pair can be installed from the terminal through the encryption communication using the default public key/private key pair and the default public key certificate, it is possible to eliminate the danger that the private key leaks to people outside when the key is exchanged.
First, in a step S701, a message is transmitted from the terminal 701 to the image forming device 702, so as to login by administrator authority. When the login by the administrator authority is acknowledged by the image forming device 702, a message “OK” is returned from the image forming device 702 to the terminal 701 in a step S702. After the login succeeded, in a step S703, a start of encryption transmission is requested from the terminal 701 to the image forming device 702.
Then, in a step S704, the public key 720 or a public key certificate containing the public key 720 is transmitted from the image forming device 702 to the terminal 701 as a response to the request of the start of encryption transmission.
After the public key 720 or the public key certificate containing the public key 720 was received, a session key is generated by the terminal 701 in a step S705. Moreover, in a step S706, the generated session key is encrypted by using the public key acquired in the step S704.
Subsequently, in a step S707, the encrypted session key is transmitted from the terminal 701 to the image forming device 702, and, in a step S708, the transmitted session key is decrypted by the image forming device 702. Consequently, the image forming device 702 can secretly acquire the session key. After the session key was transmitted, the terminal 701 starts the encryption communication by using the session key, and, if necessary, a new key pair of a private key 715 and a public key 716 is transmitted from the terminal 701 to the image forming device 702 in a step S709. Thus, the image forming device 702 receives the new pair of the new private key 715 and the new public key 716 as a message on the encryption communication, whereby the image forming device 702 can secretly and safely acquire the new private key 715 and the new public key 716.
In this sequence, since the pair of the public key 720 and the private key 721 to be used in the steps S706 and S708 is self-generated, there is no possibility that the session key transmitted in the step S707 leaks to the people outside.
For this reason, this sequence is quite safe against leakage and alteration in the encryption communication. Here, the public key or the public key certificate transmitted in the step S704 is the self-generated thing which is not certified by a reliable CA (certificate authority) or the like. However, if the public key or the public key certificate newly installed is the thing which is certified by the reliable CA, security improves moreover.
First, in a step S801, a message is transmitted from the terminal 801 to the image forming device 802, so as to login by administrator authority. When the login by the administrator authority is acknowledged by the image forming device 802, a message “OK” is returned from the image forming device 802 to the terminal 801 in a step S802. After the login succeeded, in a step S803, a start of encryption transmission is requested from the terminal 801 to the image forming device 802.
Then, in a step S804, the public key 820 or a public key certificate containing the public key 820 is transmitted from the image forming device 802 to the terminal 801 as a response to the request of the start of encryption transmission. Subsequently, in a step S805, the user (or installer) of the terminal 801 confirms the public key received and acquired from the image forming device 802 in the step S804.
Incidentally, the user of the terminal 801 visually confirms the value of the public key displayed on the UI screen of the image forming device 802. Besides, if the image forming device is located away from the user, a administrator of the device confirms the public key through its UI and then notifies the user of the terminal 801 of the confirmed public key through post, mail, telephone, publication on newspapers, publication on magazines, and the like.
After then, a session key is generated by the terminal 801 in a step S806. Moreover, in a step S807, the generated session key is encrypted by using the public key acquired in the step S802. Subsequently, in a step S808, the encrypted session key is transmitted from the terminal 801 to the image forming device 802.
In a step S809, the transmitted session key is decrypted by the image forming device 802. Consequently, the image forming device 802 can secretly acquire the session key. After the session key was transmitted, the terminal 801 starts the encryption communication by using the session key, and, if necessary, a new key pair of a private key 816 and a public key 817 is transmitted from the terminal 801 to the image forming device 802 in a step S810.
Thus, the image forming device 802 receives the new pair of the private key 816 and the public key 817 as a message on the encryption communication, whereby the image forming device 802 can secretly and safely acquire the new private key 816 and the new public key 817.
In this sequence, since the pair of the public key 820 and the private key 821 to be used in the steps S807 and S809 is self-generated, there is no possibility that the session key transmitted in the step S808 leaks to the people outside.
For this reason, this sequence is quite safe against leakage and alteration in the encryption communication. Here, the public key or the public key certificate transmitted in the step S804 is the self-generated thing. However, since the user of the terminal 801 confirms in the step S805 that the transmitted public key is the thing owned by the image forming device 802, this sequence is quite safe also against a dummy of the image forming device 802.
A row 913 shows that the key name is “KEY OF GINJI” and the used algorithm is RSA (Rivest Shamir Adleman), and a row 914 shows that the key name is “KEY OF BUNTARO” and the used algorithm is RSA. A button 915 is used to indicate display of the detailed information of the key selected in the pane 910, and a button 916 is used to indicate the operation to close the screen of the key information.
In the example of FIG. 9 , the row 913 is selected, and the details of the key information corresponding to the row 913 are displayed in a pane 920. Here, numeral 921 denotes a location where the detailed information of the selected key is displayed. In the example of FIG. 9 , it is displayed that the key name is “KEY OF GINJI”, the date of installation is Dec. 18, 2003, the used algorithm is RSA, and the key length is 1024 bits. In addition, the value of the public key is also displayed.
A button 932 is used to indicate to print the details of the key information, a button 923 is used to send an E-mail concerning the details of the key information displayed in the display location 921, and a button 924 is used to indicate to close the pane 920. Here, it should be noted that the content of FIG. 9 is absolutely one example. Therefore, for example, the information of the public key certificate may be added to the pane 920.
(Network Print System According To Second Embodiment)
Subsequently, the network print system according to the second embodiment of the present invention will be explained with reference to the attached drawings.
A print device 1110 according to the present embodiment is connected to an external controller terminal device 1120 of the print device 1110 and a user terminal device 1130 through a network 1100, whereby the print device 1110 can mutually execute data communication with the external controller terminal device 1120 and the user terminal device 1130. Here, it should be noted that FIG. 11 shows the single print device, the single external controller terminal device and the single user terminal device. However, it is possible to provide the plural print devices, the plural external controller terminal devices and the plural user terminal devices.
The print device 1110 in the present embodiment is the MFP (multifunctional peripheral) which can be used as a copying device and can also be used as a network printer.
The external controller terminal device 1120 of the print device 1110 enables to remotely control the print device 1110 by transmitting and receiving the control command or the control data of the print device 1110 through the network 1100.
The user terminal device 1130 is the device which enables a user to use various functions such as a print function and the like held in the print device 1110. For example, the user terminal device 1130 has a print application and/or a print driver which can be used with respect to the print device 1110, whereby the user terminal device 1130 transmits the print data to the print device 1110 or the external controller terminal device 1120 by using the print application and/or the print driver. Then, the print device 1110 executes printing based on the transmitted print data.
The external controller terminal device 1120 in the present embodiment is the terminal device in which the platform for a general-purpose personal computer (PC) is used, whereby the hardware constitution of the external controller terminal device 1120 is the same as that of the user terminal device 1130.
Incidentally, all the devices shown in FIG. 11 (the print device 1110, the external controller terminal device 1120 and the user terminal device 1130) are the network-corresponding devices capable of executing communication through the network 1100. Moreover, in the present embodiment, a LAN is used as the network 1100. However, it is needless to say that the network 1100 is not limited to the LAN, that is, a WAN (wide area network), the Internet and the like can also be used as the network 1100.
Besides, the communication between the print device 1110 and the external controller terminal device 1120 and the communication between the print device 1110 and the user terminal device 1130 can be achieved according to a given encryption communication protocol. Here, it should be noted that the encryption communication protocol is the protocol for certificating the device being a communication partner by using a key pair generated by a later-described key pair generation function of the print device 1110, and for generating a common key to be used in communication data encryption and then actually encrypting communication data.
In FIG. 12 , a CPU 1201 executes control software stored in a ROM 1202 or an HD 1211 or supplied from an FD 1212, whereby the CPU 1201 totally controls the devices connected to a system bus 1204.
Here, it should be noted that, in the present embodiment, the encryption communication between the user terminal device 1130 and the print device 1110 is executed by the CPU 1201 based on the program stored in the ROM 1202 or the HD 1211.
Here, the HD 1211 stores a boot program (that is, a starting program which is used to start executing (or operating) various hardware and software), plural applications, edited files, user files, a network management program and the like.
Here, it should be noted that, in the present embodiment, the internal constitution (hardware constitution) of the external controller terminal device 1120 is the same as that of the user terminal device 1130 shown in FIG. 12 , whereby the detailed explanation thereof will be omitted.
The print device 1110 contains a CPU 1301. The CPU 1301 executes the program stored in a ROM 1302 or an HD 1309 so as to totally control the devices connected to a system bus 1304.
A RAM 1303 functions as the main memory, the working area and the like for the CPU 1301, an NVRAM (nonvolatile RAM) 1305 stores various setting values of the print device 1110, and a DVC (device controller) 1306 controls a device 1307.
Moreover, a DKC (disk controller) 1308 controls accessing to the HD 1309 which stores therein the programs for controlling the device and various data.
A network I/F control device 1310 bi-directionally exchanges data with a network printer, other network devices and other PC's through the network (LAN) 1100.
Incidentally, a UI (user interface) 1311 in the present embodiment has a display screen of a touch panel type. Therefore, a user can execute various setting operations for the print device 1110 by handling or operating the touch-panel display screen.
In FIG. 14 , a network driver 1401 which is connected to the network 1100 controls the network I/F control device 1208 shown in FIG. 12 to transmit/receive the data to/from the external through the network 1100.
A network communication control unit 1402 controls a network communication protocol such as TCP/IP (Transmission Control Protocol/Internet Protocol) or the like to transmit/receive the data to/from the external.
Moreover, an encryption communication unit 1403 is the module for executing encryption communication according to the above-described given encryption communication protocol. Here, it should be noted that the encryption communication is the communication that data is transmitted/received in the encrypted form. Then, an encryption processing unit 1406 executes various encryption processes such as a process of encrypting the communication data to be transmitted, a process of decrypting the received communication data, and the like.
An application 1404 includes the various applications which use and/or execute the functions of the print device 1110 such as the print function and the like.
A device control unit 1405 is the module which is held by the external controller terminal device 1120. The device control unit 1405 executes a process for remotely controlling the print device 1110 by generating a control command and control data for the print device 1110 and then transmitting the generated control command and the control data to the print device 1110 through the network 1100.
In FIG. 15 , a network driver 1501 which is connected to the network 1100 controls the network I/F control device 1310 shown in FIG. 13 to transmit/receive the data to/from the external through the network 1100.
A network communication control unit 1502 controls a network communication protocol such as TCP/IP or the like to transmit/receive the data to/from the external.
An encryption communication unit 1503 is the module for executing encryption communication according to the above-described given encryption communication protocol, and an encryption processing unit 1506 executes various encryption processes such as a process of encrypting the communication data to be transmitted, a process of decrypting the received communication data, and the like.
An application 1504 is the application which executes the functions of the print device 1110 such as the print function and the like.
A device control unit 1505 is the module which totally controls the print device 1110 by generating a control command and control data for the print device 1110.
A key pair generation processing unit 1507 is the module for executing a process of automatically generating data of the key pair (hereinafter called key pair data).
A key pair storage processing unit 1508 is the module for storing the key pair data generated through the process of the key pair generation processing unit 1507 in the HD 1309 or the NVRAM 1305 shown in FIG. 13 . Besides, in response to a request from another module, the key pair storage processing unit 1508 reads the key pair data from the HD 1309 or the NVRAM 1305 and sends the read key pair data to the relevant module.
Subsequently, one example of the operation to be executed by the print device in case of automatically generating and storing the key pair data will be explained hereinafter with reference to a flow chart shown in FIG. 16 .
In the following explanation, it is assumed that the key pair data of the print device 1110 is previously stored as a file in the HD 1309 of FIG. 13 , and the file in which the key pair data is previously stored is called the key pair file.
Initially, in a step S1601, when the power supply of the print device 1110 is turned on, the encryption processing unit 1506 access the HD 1309 to judge whether or not the key pair file in which the key pair data is previously stored exists in the HD 1309.
When it is judged in the step S1601 that the key pair file exists in the HD 1309, the flow advances to a step S1602.
In the step S1602, the encryption processing unit 1506 opens the key pair file in the HD 1309 and acquires the data of the open key and the data of the private key both included in the key pair data.
In the present embodiment, it should be noted that the private key included in the key pair held by the print device 1110 is stored in the key pair file in the form encrypted by a common key encryption system.
Moreover, the data of the common key to be used to encrypt the private key is stored in the NVRAM 1305 of the print device 1110.
Incidentally, in the present embodiment, the data of the common key is stored in the NVRAM 1305 shown in FIG. 13 so that it is impossible to access the data of the common key from outside. Besides, in the present embodiment, only the private key is encrypted by the common key encryption system. However, it is needless to say that both the private key and the public key may be encrypted and stored in the file, and that the private key and the public key may be encrypted by a public key encryption system.
Subsequently, in a step S1603, the encryption processing unit 1506 accesses the NVRAM 1305 to acquire the data of the common key used in case of encrypting the private key. Then, in a step S1604, the encryption processing unit 1506 decrypts the data of the private key acquired in the step S1602 by using the acquired common key.
When the decryption of the private key in the step S1604 succeeds, the flow advances to a step S1605. In the step S1605, the key pair generation processing unit 1507 calculates and generates the digest value of the private key according to an algorithm of one-way hash function.
Here, it should be noted that SHA-1 (Secure Hash Algorithm-1), MD5 (Message Digest Algorithm 5) or the like can be used as the algorithm of one-way hash function.
In the present embodiment, even in case of generating the key pair data, the digest value of the private key is generated, and the generated digest value of the private key is stored in the NVRAM 1305 as well as the common key to be used in case of encrypting the private key.
Subsequently, in a step S1606, the key pair generation processing unit 1507 acquires from the NVRAM 1305 the digest value of the private key calculated when the key is generated.
Next, in a step S1607, the key pair generation processing unit 1507 compares the digest value acquired in the step S1606 with the digest value of the private key calculated in the step S1605, thereby detecting whether or not the held data of the private key is damaged.
Then, in a step S1608, the key pair generation processing unit 1507 judges whether or not the digest value acquired in the step S1606 conforms to the digest value of the private key calculated in the step S1605. Thus, when judged that the digest value acquired in the step S1606 does not conform to the digest value of the private key calculated in the step S1605, the flow advances to a next step S1609 to execute a later-described generation/storage process of the key pair (hereinafter called key pair generation/storage process). After then, when the key pair generation/storage process ends, the process ends as a whole. Meanwhile, when judged that the digest value acquired in the step S1606 conforms to the digest value of the private key calculated in the step S1605, the process immediately ends without executing the key pair generation/storage process.
Incidentally, when judged in the step S1601 that the key pair file does not exist in the HD 1309, the flow skips the steps S1602 to S1608 and directly advances to the step S1609 to execute the key pair generation/storage process.
In the present embodiment, the number of key pairs held by the print device 1110 is one. However, it is possible through the process of the above flow chart shown in FIG. 16 to automatically generate and store plural key pairs respectively according to necessary purposes. For example, it is possible to generate and store the key pairs respectively with respect to the users who use the print device 1110, and it is also possible to generate and store the key pairs respectively with respect to the applications on the print device 1110.
Subsequently, one example of the operation to be executed by the print device 1110 in case of executing the key pair generation/storage process will be explained hereinafter with reference to a flow chart shown in FIG. 17 .
Incidentally, it should be noted that the key pair generation/storage process shown in FIG. 17 is the key pair generation/storage process in the step S1609 of FIG. 16 .
Initially, in a step S1701, the key pair generation processing unit 1507 acquires a setting parameter value for generating the key pair. Here, the setting parameter value in the present embodiment includes the public key encryption algorithm of the key pair to be generated and the bit length of the data of the key.
In the present embodiment, the key pair of the public key encryption algorithm such as RSA (Rivest Shamir Adleman), DSA (Digital Signature Algorithm) or the like can be generated, as the public key encryption algorithm for the key pair to be generated. In the print device 1110, the public key encryption algorithm and the bit length of the data of the key are set beforehand as default setting values. These setting values are stored in the NVRAM 1305 of the print device 1110. Incidentally, it is possible for the user to change the public key encryption algorithm of the key pair to be generated and the bit length of the data of the key to be generated, through the operation on the UI 1311 being the touch-panel display screen shown in FIG. 13 .
Next, in a step S1702, the key pair generation processing unit 1507 generates the key pair based on the setting values acquired in the step S1701 and stored in the NVRAM 1305. After the generation of the key pair normally ends, in a step S1703, the key pair generation processing unit 1507 generates pseudorandom numbers as the common key for encrypting by the common key encryption system the data of the private key of the key pair generated in the step S1702.
Then, in a step S1704, the key pair generation processing unit 1507 calculates and generates the digest value of the private key, generated in the step S1702, according to the algorithm of one-way hash function. As described above, it should be noted that the digest value of the private key is used in the step S1607 of FIG. 16 to detect whether or not the data of the private key is damaged.
After then, in a step S1705, the key pair generation processing unit 1507 encrypts the data of the private key by using the common key for encrypting the private key generated in the step S1703.
When the encryption of the data of the private key in the step S1705 succeeds, the flow advances to a step S1706. In the step S1706, the key pair storage processing unit 1508 outputs the data of the public key and the encrypted data of the private key as the file and stores them in the HD 1309.
Moreover, in a step S1707, the key pair storage processing unit 1508 stores in the NVRAM 1503 the data of the common key used in case of encrypting the data of the private key. Likewise, in a step S1708, the key pair storage processing unit 1508 stores in the NVRAM 1503 the data of the digest value of the private key. Then, the key pair generation/storage process based on the flow chart shown in FIG. 17 ends.
As described above, in the present embodiment, the print device 1110 automatically generates and stores the key pair. In addition, when the user wishes to regenerate and update the key pair, it is possible for the print device 1110 to regenerate and update the key pair.
Subsequently, one example of the operation to be executed by the print device 1110 in case of regenerating and updating the key pair based on the user setting will be explained hereinafter with reference to a flow chart shown in FIG. 18 .
Incidentally, as well as the above case where the user designates the public key encryption algorithm of the key pair to be generated and the bit length of the data of the key, the print device 1110 in the present embodiment can designate the regeneration and update of the key pair.
That is, it is possible for the user to set the setting value of the regeneration and update of the key pair, through the operation on the UI 1311 being the touch-panel display screen shown in FIG. 13 . Then, the acquired setting value is stored in the NV RAM 1305.
Initially, in a step S1801, when the power supply of the print device 1110 is turned on, the key pair generation processing unit 1507 acquires the setting value of the regeneration and update of the key pair. Then, in a step S1802, the key pair generation processing unit 1507 judges whether the setting is “ON” or “OFF” based on the setting value acquired in the step S1801. Then, when judged that the setting is “ON” based on the setting value acquired in the step S1801, the flow advances to a step S1811 to execute a regeneration/update process of the key pair.
Meanwhile, when judged in the step S1802 that the setting is “OFF”, the flow advances to steps S1803 through S1810.
Here, it should be noted that the process in the step S1811 is the same as the process in the step S1609 shown in FIG. 16 (that is, the process in the steps S1701 to S1708 shown in FIG. 17 ). Moreover, it should be noted that the process in the steps S1803 to S1810 is the same as the process in the steps S1601 to S1608 shown in FIG. 16 . Therefore, the detailed explanation of these processes will be omitted.
In the present embodiment, the case where the key pair is regenerated and updated when the print device 1110 is activated is explained by way of example. In addition, even when the print device 1110 is being operated, it is possible based on the user operation on the UI 1311 to judge whether the setting of the regeneration and update of the key pair is “ON” or “OFF”, and, when judged that the setting is “ON”, it is possible to regenerate and update the key pair in the above manner.
As described above, according to the present embodiment, when the power supply of the print device 1110 is turned on, it is judged whether or not the key pair data exists in the HD 1309 of the print device 1110. Then, when it is judged that the key pair data does not exist in the HD 1309, the key pair is generated and stored. Thus, even when the key pair stored in the print device 1110 is deleted for some reason, the key pair data can be acquired without any complicated operation by the user. Consequently, it is possible to easily and certainly prevent the inconvenient situation that the encryption communication of the data between the print device 1110 and the user terminal device 1130 becomes impossible.
Meanwhile, when it is judged that the key pair data exists in the HD 1309 of the print device 1110, the private key included in the key pair data is decrypted, and the digest value of the relevant private key is generated. In addition, the digest value of the private key calculated when the key pair data is generated is acquired. Then, when the generated digest value does not conform to the acquired digest value, it is judged that the data of the private key is damaged, and the key pair data is thus regenerated and updated. Therefore, even if the key pair stored in the print device 1110 is damaged for some reason, the adequate key pair data can be acquired without any complicated operation by the user. On this account, it is possible to easily and certainly prevent the inconvenient situation that the encryption communication of the data between the print device 1110 and the user terminal device 1130 becomes impossible.
Moreover, in addition to the case where the power supply of the print device 1110 is turned on, the key pair data is regenerated and updated based on the user operation on the UI 1311 of the print device 1110 in some cases. Thus, for example, in a case where the user judges that there is a fear that secrecy of the key pair is lost, it is possible to update the key pair data in accordance with the intention of the user. On this account, the secrecy of the data to be transmitted and received between the print device 1110 and the user terminal device 1130 can be certainly held or maintained as much as possible.
The area 9997 is the area in which the program for achieving the embodiments of the present invention is stored. That is, in a case where the program for achieving the embodiments of the present invention is installed in, e.g., the device 300, the install program stored in the area 9998 is first loaded to the system, and the loaded program is executed by the CPU 301.
Next, the install program executed by the CPU 301 allows to read the program for achieving the embodiments of the present invention from the area 9997 and then store the read program in the HD 311.
Incidentally, the present invention can be applied to a system or an integrated device which consists of plural devices such as a host computer, an interface equipment, a reader and the like, or to an apparatus which comprises a single device.
Further, it is needless to say that the object of the present invention can be achieved in a case where a storage medium storing therein the program codes of software to realize the functions of the above embodiments is supplied to a system or an apparatus, and thus a computer (or CPU or MPU) in the system or the apparatus reads and executes the program codes stored in the storage medium. In this case, the program codes themselves read out of the storage medium realize the novel functions of the present invention. Therefore, the storage medium which stores these program codes constitutes the present invention.
As the storage medium from which the program codes are supplied, for example, a floppy™ disk, a hard disk, an optical disk, a magnetooptical disk, a CD-ROM, a CD-R, a magnetic tape, a nonvolatile memory card, a ROM or the like can be used.
Further, the present invention includes not only a case where the functions of the above embodiments are realized by executing the program codes read by the computer, but also a case where an OS (operating system) or the like running on the computer executes a part or all of the actual process on the basis of the instructions of the program codes and thus the functions of the above embodiments are realized by the relevant process.
Furthermore, the present invention also includes a case where, after the program codes read out of the storage medium are written into a function expansion board inserted in the computer or the memory provided in a function expansion unit connected to the computer, the CPU or the like provided in the function expansion board or the function expansion unit executes a part or all of the actual process on the basis of the instructions of the program codes, and thus the functions of the above embodiments are realized by the relevant process.
In addition, it is needless to say that the present invention can be also applied to a case where the program codes of software to realize the functions of the above embodiments are delivered from the storage medium to the requesters through a communication line in personal computer communication or the like.
This application claims priorities from Japanese Patent Application Nos. 2004-117117 filed on Apr. 12, 2004, and 2004-191542 filed on Jun. 29, 2004, which are hereby incorporated by reference herein.
Claims (101)
1. A data processing device comprising:
a storage unit configured to store an initial value of a pair of a public key and a private key;
a communication unit configured to (i) transmit the public key stored in said storage unit to an external device, (ii) receive a session key encrypted using the transmitted public key, (iii) decrypt the received session key using the private key stored in said storage unit, and (iv) receive a new pair of a public key and a private key from the external device using the decrypted session key;
an installation unit configured to install the new pair of the public key and the private key received by said communication unit;
a determination unit configured to determine whether login by an administrator authority is acknowledged;
an installation permission unit configured to permit said installation unit to install the new pair of the public key and the private key when the login by an administrator authority is acknowledged; and
a display control unit configured to cause a display unit to display a value of the public key installed from the external device.
2. A data processing device according to claim 1 , further comprising a display control unit configured to cause a display unit to display the initial value of the pair of the public key and the private key stored in said storage unit.
3. A data processing device according to claim 1 , further comprising a default unit configured to return the value of the pair of the public key and the private key stored in said storage unit to the initial value, in response to an instruction from a user.
4. A data processing device comprising:
a storage unit configured to store an initial value of a pair of a public key and a private key;
a communication unit configured to (i) transmit the public key stored in said storage unit to an external device, (ii) receive a session key encrypted using the transmitted public key, (iii) decrypt the received session key using the private key stored in said storage unit, and (iv) receive a new pair of a public key and a private key from the external device using the decrypted session key;
an installation unit configured to install the new pair of the public key and the private key received by said communication unit;
a display control unit configured to cause a display unit to display a value of the public key generated by said key generation unit; and
a key generation unit configured to generate the initial value of the pair of the public key and the private key in said data processing device, in response to an instruction from a user,
wherein said installation unit installs the new pair of the public key and the private key obtained from the external device by executing the encryption communication by using the initial value of the pair of the public key and the private key generated by said key generation unit.
5. A control method for controlling a data processing device, comprising:
storing an initial value of a pair of a public key and a private key in a storage unit;
transmitting, using a communication unit, the public key stored in the storage unit to an external device;
receiving, using the communication unit, a session key encrypted using the transmitted public key;
decrypting the received session key using the private key stored in the storage unit;
receiving a new pair of a public key and a private key from the external device using the decrypted session key;
determining, using a determination unit, whether login by an administrator authority is acknowledged;
permitting installation of the new pair of the public key and the private key when the login by an administrator authority is acknowledged;
installing, using an installation unit, the received new pair of the public key and the private key when installation is permitted; and
displaying, using a display control unit, a value of the public key installed from the external device.
6. A data processing device which is able to communicate with an external device, comprising:
a memory configured to store an initial public key and an initial private key;
a memory device that stores a set of instructions; and
at least one processor that executes the instructions to:
perform first encryption communication by opening and using the initial public key, where, in the first encryption communication, key information encrypted by the opened initial public key is received from the external device;
decrypt the encrypted key information by using the initial private key stored in the memory;
perform second communication, which is encryption communication, by using the key information, where, in the second communication, a new public key encrypted by the key information and a new private key encrypted by the key information are received from the external device;
install the new public key and the new private key to perform third communication, which is encryption communication, by using the new public key and the new private key; and
cause a display unit to display information of the installed new public key.
7. A data processing device according to claim 6, wherein the at least one processor executes instructions in the memory device to:
receive a login request from the external device; and
install the new public key and the new private key in a case where login based on the login request received in response to the login request is permitted.
8. A data processing device according to claim 6, wherein the at least one processor executes instructions in the memory device to:
generate the initial public key and the initial private key,
wherein the memory stores the generated initial public key and the generated initial private key.
9. A data processing device according to claim 6, wherein the information of the new public key includes a date when the new public key has been installed.
10. A data processing device according to claim 9, wherein the information of the new public key includes a name of the new public key which has been installed.
11. A data processing device according to claim 9, wherein the information of the new public key includes a value of the new public key which has been installed.
12. A data processing device according to claim 9, wherein the at least one processor executes instructions in the memory device to:
instruct printing of the information of the new public key.
13. A data processing device according to claim 9, wherein the at least one processor executes instructions in the memory device to:
instruct transmitting of the information of the new public key.
14. A data processing device according to claim 6, wherein the data processing device is an image forming apparatus that executes print processing.
15. A data processing device according to claim 6, wherein the initial public key and the initial private key are stored as factory shipment values in the memory.
16. A data processing device according to claim 6, wherein the key information is a session key.
17. A data processing device according to claim 6, wherein the at least one processor executes instructions in the memory device to:
perform login processing according to a login message transmitted from the external apparatus; and
install the new public key and the new private key after the login by an administrator authority to the data processing apparatus is acknowledged based on the login message transmitted from the external apparatus.
18. A control method for controlling a data processing device which is able to communicate with an external device, comprising:
performing first encryption communication by opening and using an initial public key stored by a memory, where, in the first encryption communication, key information encrypted by the opened initial public key is received from the external device;
decrypting the encrypted key information by using an initial private key stored in the memory;
performing second communication, which is encryption communication, by using the key information, where, in the second encryption communication, a new public key encrypted by the key information and a new private key encrypted by the key information are received from the external device;
installing the new public key and the new private key to perform third communication, which is encryption communication, by using the new public key and the new private key; and
causing a display unit to display information of the installed new public key.
19. A non-transitory computer readable storage medium for storing a computer program for causing a data processing device which is able to communicate with an external device to execute:
performing first communication by opening and using an initial public key stored by a memory, where, in the first encryption communication, key information encrypted by the opened initial public key is received from the external device;
decrypting the encrypted key information by using an initial private key stored in the memory;
performing second communication, which is encryption communication, by using the key information, where, in the second communication, a new public key encrypted by the key information and a new private key encrypted by the key information are received from the external device;
installing the new public key and the new private key to perform third communication, which is encryption communication, by using the new public key and the new private key; and
causing a display unit to display information of the installed new public key.
20. An image forming apparatus which is able to communicate with an external device which creates a print job and transmits the created print job to the image forming apparatus, comprising
a memory configured to store an initial public key and an initial private key, the initial public key and the initial private key being stored before the image forming apparatus communicates with the external device and the initial public key and the initial private key being able to be used without executing a setting by a user for generating of a public key and a private key;
a memory device that stores a set of instructions; and
at least one processor that executes the instructions to:
perform first encryption communication by opening and using, in a case where a start of communication is requested from the external device, the initial public key, where, in the first communication, key information encrypted by the opened initial public key is received from the external device, wherein the external device generates the key information which is to be used in a communication for an installation of a pair of new public key and a new private key;
decrypt the encrypted key information by using the initial private key stored in the memory;
perform second communication, which is encryption communication, by using the key information, where, in the second communication, a new public key encrypted by the key information and a new private key encrypted by the key information are received from the external device;
install the new public key and the new private key to perform third communication, which is encryption communication, by using the new public key and the new private key; and
cause a display unit to display information of the installed new public key.
21. An image forming apparatus according to claim 20, wherein the key information is a session key.
22. An image forming apparatus according to claim 19, wherein the at least one processor executes instructions in the memory device to:
perform a login processing according to a login message transmitted from the external apparatus via a network; and
install the new public key and the new private key after the login by an administrator authority to the image forming apparatus is acknowledged based on the login message transmitted from the external apparatus via the network.
23. A data processing device which is able to communicate with an external device, comprising:
a memory configured to store an initial public key and an initial private key;
a memory device that stores a set of instructions; and
at least one processor that executes the instructions to:
perform first communication, where, in the first communication, the initial public key is transmitted to the external device and key information encrypted by the initial public key is received from the external device;
decrypt the encrypted key information by using the initial private key stored in the memory;
perform second communication, which is encryption communication, where, in the second communication, at least a new public key encrypted using the key information and a new private key encrypted using the key information are received from the external device;
install the new public key and the new private key to perform third communication, which is encryption communication, where, in the third communication, the new public key and the new private key are used; and
provide data to be used for displaying information of the installed new public key.
24. A data processing device according to claim 23, wherein the at least one processor executes instructions in the memory device to:
receive a login request from the external device; and
install the new public key and the new private key in a case where login based on the login request received in response to the login request is permitted.
25. A data processing device according to claim 23, wherein the at least one processor executes instructions in the memory device to:
generate the initial public key and the initial private key,
wherein the memory stores the generated initial public key and the generated initial private key.
26. A data processing device according to claim 23, wherein the information of the new public key includes a date when the new public key has been installed.
27. A data processing device according to claim 26, wherein the information of the new public key includes a name of the new public key which has been installed.
28. A data processing device according to claim 26, wherein the information of the new public key includes a value of the new public key which has been installed.
29. A data processing device according to claim 26, wherein the at least one processor executes instructions in the memory device to:
instruct printing of the information of the new public key.
30. A data processing device according to claim 26, wherein the at least one processor executes instructions in the memory device to:
instruct transmitting of the information of the new public key.
31. A data processing device according to claim 23, wherein the data processing device is an image forming apparatus that executes print processing.
32. A data processing device according to claim 23, wherein the initial public key and the initial private key are stored as factory shipment values in the memory.
33. The data processing device according to claim 23, wherein the data processing device provides information of the installed new public key to a display unit.
34. A data processing device according to claim 23, wherein the key information is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
35. A data processing device according to claim 23, wherein the key information is a session key, which is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
36. A control method comprising:
performing first communication, where, in the first communication, an initial public key stored in a memory is transmitted to an external device and key information encrypted by the initial public key is received from the external device;
decrypting the encrypted key information by using an initial private key stored in the memory;
performing second communication, which is encryption communication, where, in the second communication, at least a new public key encrypted using the key information and a new private key encrypted using the key information are received from the external device;
installing the new public key and the new private key to perform third communication, which is encryption communication, where, in the third communication, the new public key and the new private key are used; and
providing data to be used for displaying information of the installed public key.
37. A control method according to claim 36, further comprising:
receiving a login request from the external device; and
installing the new public key and the new private key in a case where login based on the login request received in response to the login request is permitted.
38. A control method according to claim 36, further comprising:
generating the initial public key and the initial private key,
wherein the memory stores the generated initial public key and the generated initial private key.
39. A control method according to claim 36, wherein the information of the new public key includes a date when the new public key has been installed.
40. A control method according to claim 39, wherein the information of the new public key includes a name of the new public key which has been installed.
41. A control method according to claim 39, wherein the information of the new public key includes a value of the new public key which has been installed.
42. A control method according to claim 39, further comprising:
instructing printing of the information of the new public key.
43. A control method according to claim 39, further comprising:
instructing transmitting of the information of the new public key.
44. A control method according to claim 36, wherein the data processing device is an image forming apparatus that executes print processing.
45. A control method according to claim 36, wherein the initial public key and the initial private key are stored as factory shipment values in the memory.
46. The control method according to claim 36, further comprising providing information of the installed new public key to a display unit.
47. A control method according to claim 36, wherein the key information is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
48. A control method according to claim 36, wherein the key information is a session key, which is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
49. A non-transitory computer readable storage medium for storing a computer program for causing a data processing device which is able to communicate with an external device to execute:
performing first communication, where, in the first communication, an initial public key stored in a memory is transmitted to an external device and key information encrypted by the initial public key is received from the external device;
decrypting the encrypted key information by using an initial private key stored in the memory;
performing second communication, which is encryption communication, where, in the second communication, at least a new public key encrypted using the key information and a new private key encrypted using the key information are received from the external device;
installing the new public key and the new private key to perform third communication, which is encryption communication, where, in the third communication, the new public key and the new private key are used; and
providing data to be used for displaying information of the installed new public key.
50. A non-transitory computer readable storage medium according to claim 49, wherein the computer program further causes the data processing device to execute:
receiving a login request from the external device; and
installing the new public key and the new private key in a case where login based on the login request received in response to the login request is permitted.
51. A non-transitory computer readable storage medium according to claim 49, wherein the computer program further causes the data processing device to execute:
generating the initial public key and the initial private key,
wherein the memory stores the generated initial public key and the generated initial private key.
52. A non-transitory computer readable storage medium according to claim 49, wherein the information of the new public key includes a date when the new public key has been installed.
53. A non-transitory computer readable storage medium according to claim 42, wherein the information of the new public key includes a name of the new public key which has been installed.
54. A non-transitory computer readable storage medium according to claim 42, wherein the information of the new public key includes a value of the new public key which has been installed.
55. A non-transitory computer readable storage medium according to claim 42, wherein the computer program further causes the data processing device to execute:
instructing printing of the information of the new public key.
56. A non-transitory computer readable storage medium according to claim 42, wherein the computer program further causes the data processing device to execute:
instructing transmitting of the information of the new public key.
57. A non-transitory computer readable storage medium according to claim 49, wherein the data processing device is an image forming apparatus that executes print processing.
58. A non-transitory computer readable storage medium according to claim 49, wherein the initial public key and the initial private key are stored as factory shipment values in the memory.
59. The non-transitory computer readable storage medium according to claim 39, wherein the computer program further causes the data processing device to execute:
providing information of the installed new public key to a display unit.
60. A non-transitory computer readable storage medium according to claim 49, wherein the key information is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
61. A non-transitory computer readable storage medium according to claim 49, wherein the key information is a session key, which is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
62. An image forming apparatus which is able to communicate with an external device which creates a print job and transmits the created print job to the image forming apparatus, comprising
a memory configured to store an initial public key and an initial private key, the initial public key and the initial private key being stored before the image forming apparatus communicates with the external device and the initial public key and the initial private key being able to be used without executing a setting by a user for generating of a public key and a private key;
a memory device that stores a set of instructions; and
at least one processor that executes the instructions to:
perform first communication, in a case where a start of communication is requested from the external device, where, in the first communication, the initial public key is transmitted to the external device and key information encrypted by the initial public key is received from the external device, wherein the external device generates the key information which is to be used in a communication for an installation of a pair of new public key and a new private key;
decrypt the encrypted key information by using the initial private key stored in the memory;
perform second communication, which is encryption communication, where, in the second communication, at least a new public key encrypted using the key information and a new private key encrypted using the key information are received from the external device;
install the new public key and the new private key to perform third communication, which is encryption communication, where, in the third communication, the new public key and the new private key are used; and
provide data to be used for displaying information of the installed new public key.
63. An image forming apparatus according to claim 62, wherein the at least one processor executes instructions in the memory device to:
receive a login request from the external device; and
install the new public key and the new private key in a case where login based on the login request received in response to the login request is permitted.
64. An image forming apparatus according to claim 62, wherein the at least one processor executes instructions in the memory device to:
generate the initial public key and the initial private key,
wherein the memory stores the generated initial public key and the generated initial private key.
65. An image forming apparatus according to claim 62, wherein the information of the new public key includes a date when the new public key has been installed.
66. An image forming apparatus according to claim 65, wherein the information of the new public key includes a name of the new public key which has been installed.
67. An image forming apparatus according to claim 65, wherein the information of the new public key includes a value of the new public key which has been installed.
68. An image forming apparatus according to claim 65, wherein the at least one processor executes instructions in the memory device to:
instruct printing of the information of the new public key.
69. An image forming apparatus according to claim 65, wherein the at least one processor executes instructions in the memory device to:
instruct transmitting of the information of the new public key.
70. An image forming apparatus according to claim 62, wherein the data processing device is an image forming apparatus that executes print processing.
71. An image forming apparatus according to claim 62, wherein the initial public key and the initial private key are stored as factory shipment values in the memory.
72. The image forming apparatus according to claim 62, wherein the at least one processor executes instructions in the memory device to: provide information of the installed new public key to a display unit.
73. An image forming apparatus according to claim 62, wherein the key information is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
74. An image forming apparatus according to claim 62, wherein the key information is a session key, which is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
75. A control method comprising:
performing first communication, where, in the first communication, an initial public key stored in a memory is transmitted to an external device and key information encrypted by the initial public key is received from an external device;
decrypting the encrypted key information by using an initial private key stored in the memory;
performing second communication, which is encryption communication, where, in the second communication, at least a new public key encrypted using the key information and a new private key encrypted using the key information are received from the external device;
installing the new public key and the new private key to perform third communication, which is encryption communication, where, in the third communication, the new public key and the new private key are used; and
displaying information of the installed new public key.
76. A control method according to claim 75, further comprising:
receiving a login request from the external device; and
installing the new public key and the new private key in a case where login based on the login request received in response to the login request is permitted.
77. A control method according to claim 75, further comprising:
generating the initial public key and the initial private key,
wherein the memory stores the generated initial public key and the generated initial private key.
78. A control method according to claim 75, wherein the information of the new public key includes a date when the new public key has been installed.
79. A control method according to claim 78, wherein the information of the new public key includes a name of the new public key which has been installed.
80. A control method according to claim 78, wherein the information of the new public key includes a value of the new public key which has been installed.
81. A control method according to claim 78, further comprising:
instructing printing of the information of the new public key.
82. A control method according to claim 78, further comprising:
instructing transmitting of the information of the new public key.
83. A control method according to claim 75, wherein the control method controls an image forming apparatus that executes print processing.
84. A control method according to claim 75, wherein the initial public key and the initial private key are stored as factory shipment values in the memory.
85. A control method according to claim 75, wherein the key information is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
86. A control method according to claim 75, wherein the key information is a session key, which is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
87. A system that includes an external device and a data processing device capable of communicating with the external device, the data processing device comprising:
a memory device that stores a set of instructions; and
at least one processor that executes the instructions for:
performing first communication, where, in the first communication, an initial public key stored in a memory is transmitted to the external device and key information encrypted by the initial public key is received from the external device;
decrypting the encrypted key information by using an initial private key stored in the memory;
performing second communication, which is encryption communication, where, in the second communication, at least a new public key encrypted using the key information and a new private key encrypted using the key information are received from the external device;
installing the new public key and the new private key to perform third communication, which is encryption communication, where, in the third communication, the new public key and the new private key are used; and
providing data to be used for displaying information of the installed new public key.
88. A system according to claim 87, wherein the key information is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
89. A system according to claim 87, wherein the key information is a session key, which is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
90. A system that includes an external device and a data processing device capable of communicating with the external device, the data processing device comprising:
a memory device that stores a set of instructions; and
at least one processor that executes the instructions for:
performing first communication, where, in the first communication, an initial public key stored by a memory is transmitted to the external device and key information encrypted by the initial public key is received from the external device;
decrypting the encrypted key information by using an initial private key stored in the memory;
performing second communication, which is encryption communication, where, in the second communication, at least a new public key encrypted using the key information and a new private key encrypted using the key information are received from the external device;
installing the new public key and the new private key to perform third communication, which is encryption communication, where, in the third communication, the new public key and the new private key are used; and
displaying information of the installed new public key.
91. A system according to claim 90, wherein the at least one processor executes instructions in the memory device to:
receive a login request from the external device; and
install the new public key and the new private key in a case where login based on the login request received in response to the login request is permitted.
92. A system according to claim 90, wherein the at least one processor executes instructions in the memory device to:
generate the initial public key and the initial private key,
wherein the memory stores the generated initial public key and the generated initial private key.
93. A system according to claim 90, wherein the information of the new public key includes a date when the new public key has been installed.
94. A system according to claim 93, wherein the information of the new public key includes a name of the new public key which has been installed.
95. A system according to claim 93, wherein the information of the new public key includes a value of the new public key which has been installed.
96. A system according to claim 93, wherein the at least one processor executes instructions in the memory device to:
instruct printing of the information of the new public key.
97. A system according to claim 93, wherein the at least one processor executes instructions in the memory device to:
instruct transmitting of the information of the new public key.
98. A system according to claim 90, wherein the data processing device is an image forming apparatus that executes print processing.
99. A system according to claim 90, wherein the initial public key and the initial private key are stored as factory shipment values in the memory.
100. A system according to claim 90, wherein the key information is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
101. A system according to claim 90, wherein the key information is a session key, which is used to establish encryption communication between the external device and the data processing device, and the external device and the data processing device have the key information in common after receiving the key information from the external device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/020,130 USRE48381E1 (en) | 2004-04-12 | 2013-09-06 | Data processing device, encryption communication method, key generation method, and computer program |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-117117 | 2004-04-12 | ||
JP2004117117A JP2005303676A (en) | 2004-04-12 | 2004-04-12 | Image forming device, paired key generating method, and computer program |
JP2004191542A JP4789432B2 (en) | 2004-06-29 | 2004-06-29 | Data processing apparatus, data processing apparatus control method, computer program, and storage medium |
JP2004-191542 | 2004-06-29 | ||
US11/101,493 US8015393B2 (en) | 2004-04-12 | 2005-04-08 | Data processing device, encryption communication method, key generation method, and computer program |
US14/020,130 USRE48381E1 (en) | 2004-04-12 | 2013-09-06 | Data processing device, encryption communication method, key generation method, and computer program |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/101,493 Reissue US8015393B2 (en) | 2004-04-12 | 2005-04-08 | Data processing device, encryption communication method, key generation method, and computer program |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE48381E1 true USRE48381E1 (en) | 2021-01-05 |
Family
ID=35061904
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/101,493 Ceased US8015393B2 (en) | 2004-04-12 | 2005-04-08 | Data processing device, encryption communication method, key generation method, and computer program |
US14/020,130 Active 2028-06-17 USRE48381E1 (en) | 2004-04-12 | 2013-09-06 | Data processing device, encryption communication method, key generation method, and computer program |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/101,493 Ceased US8015393B2 (en) | 2004-04-12 | 2005-04-08 | Data processing device, encryption communication method, key generation method, and computer program |
Country Status (1)
Country | Link |
---|---|
US (2) | US8015393B2 (en) |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7740168B2 (en) | 2003-08-18 | 2010-06-22 | Visa U.S.A. Inc. | Method and system for generating a dynamic verification value |
US7761374B2 (en) | 2003-08-18 | 2010-07-20 | Visa International Service Association | Method and system for generating a dynamic verification value |
US8015393B2 (en) * | 2004-04-12 | 2011-09-06 | Canon Kabushiki Kaisha | Data processing device, encryption communication method, key generation method, and computer program |
JP4684901B2 (en) * | 2006-01-23 | 2011-05-18 | キヤノン株式会社 | Printing system, printing apparatus, printing apparatus control method and program |
US9065643B2 (en) | 2006-04-05 | 2015-06-23 | Visa U.S.A. Inc. | System and method for account identifier obfuscation |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
US7987375B2 (en) * | 2006-11-20 | 2011-07-26 | Canon Kabushiki Kaisha | Communication apparatus, control method thereof and computer readable medium |
JP4342595B1 (en) * | 2008-05-09 | 2009-10-14 | 株式会社東芝 | Information processing apparatus, information processing system, and encrypted information management method |
US20100199095A1 (en) * | 2009-01-30 | 2010-08-05 | Texas Instruments Inc. | Password-Authenticated Association Based on Public Key Scrambling |
JP2010224644A (en) * | 2009-03-19 | 2010-10-07 | Toshiba Storage Device Corp | Control device, storage device, and data leakage preventing method |
DE102009052456A1 (en) * | 2009-11-09 | 2011-05-19 | Siemens Aktiengesellschaft | Method and system for accelerated decryption of cryptographically protected user data units |
KR101560416B1 (en) * | 2009-11-18 | 2015-10-14 | 삼성전자주식회사 | Secure channel establishment method and apparatus in short range communication |
JP5569440B2 (en) | 2011-03-11 | 2014-08-13 | ブラザー工業株式会社 | Communication apparatus and computer program |
JP5824977B2 (en) * | 2011-08-31 | 2015-12-02 | 株式会社リコー | Key pair management program, key pair management method, and image forming apparatus |
US9621403B1 (en) * | 2012-03-05 | 2017-04-11 | Google Inc. | Installing network certificates on a client computing device |
WO2014155363A1 (en) | 2013-03-29 | 2014-10-02 | Ologn Technologies Ag | Systems, methods and apparatuses for secure storage of data using a security-enhancing chip |
CN103490894B (en) * | 2013-09-09 | 2016-08-10 | 飞天诚信科技股份有限公司 | A kind of implementation method determining intelligent cipher key equipment life cycle and device |
JP6362076B2 (en) * | 2014-03-24 | 2018-07-25 | キヤノン株式会社 | COMMUNICATION DEVICE AND ITS CONTROL METHOD AND PROGRAM |
US10970684B1 (en) * | 2014-05-20 | 2021-04-06 | Wells Fargo Bank, N.A. | Systems and methods for maintaining deposits of math-based currency |
US10909509B1 (en) | 2014-05-20 | 2021-02-02 | Wells Fargo Bank, N.A. | Infrastructure for maintaining math-based currency accounts |
US11062278B1 (en) | 2014-05-20 | 2021-07-13 | Wells Fargo Bank, N.A. | Systems and methods for math-based currency credit transactions |
US11037110B1 (en) | 2014-05-20 | 2021-06-15 | Wells Fargo Bank, N.A. | Math based currency point of sale systems and methods |
US11176524B1 (en) | 2014-05-20 | 2021-11-16 | Wells Fargo Bank, N.A. | Math based currency credit card |
US10565645B1 (en) | 2014-05-20 | 2020-02-18 | Wells Fargo Bank, N.A. | Systems and methods for operating a math-based currency exchange |
US11170351B1 (en) | 2014-05-20 | 2021-11-09 | Wells Fargo Bank, N.A. | Systems and methods for identity verification of math-based currency account holders |
US11270274B1 (en) | 2014-05-20 | 2022-03-08 | Wells Fargo Bank, N.A. | Mobile wallet using math based currency systems and methods |
US9864864B2 (en) * | 2014-09-23 | 2018-01-09 | Accenture Global Services Limited | Industrial security agent platform |
US10904234B2 (en) | 2014-11-07 | 2021-01-26 | Privakey, Inc. | Systems and methods of device based customer authentication and authorization |
US9813400B2 (en) | 2014-11-07 | 2017-11-07 | Probaris Technologies, Inc. | Computer-implemented systems and methods of device based, internet-centric, authentication |
US10719816B1 (en) | 2015-11-19 | 2020-07-21 | Wells Fargo Bank, N.A. | Systems and methods for math-based currency escrow transactions |
US10158613B1 (en) * | 2017-06-12 | 2018-12-18 | Ironclad Encryption Corporation | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys |
US10623384B2 (en) * | 2017-06-12 | 2020-04-14 | Daniel Maurice Lerner | Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys |
US10154031B1 (en) * | 2017-06-12 | 2018-12-11 | Ironclad Encryption Corporation | User-wearable secured devices provided assuring authentication and validation of data storage and transmission |
EP3639502A4 (en) * | 2017-06-12 | 2020-11-25 | Daniel Maurice Lerner | Securitization of temporal digital communications with authentication and validation of user and access devices |
US10764282B2 (en) * | 2017-06-12 | 2020-09-01 | Daniel Maurice Lerner | Protected and secured user-wearable devices for assured authentication and validation of data storage and transmission that utilize securitized containers |
US10984115B2 (en) | 2018-12-04 | 2021-04-20 | Bank Of America Corporation | System for triple format preserving encryption |
US11997189B2 (en) * | 2021-02-26 | 2024-05-28 | International Business Machines Corporation | Encrypted communication using counter mode encryption and secret keys |
US20230245111A1 (en) * | 2022-02-02 | 2023-08-03 | Coinbase, Inc. | Systems and methods for requesting secure, encrypted communications across distributed computer networks for authorizing use of cryptography-based digital repositories in order to perform blockchain operations in decentralized applications |
Citations (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5144665A (en) * | 1990-02-21 | 1992-09-01 | Hitachi, Ltd. | Cryptographic communication method and system |
JPH09205419A (en) | 1996-01-26 | 1997-08-05 | Nri & Ncc Co Ltd | Method for storing and managing secret key |
JPH10133956A (en) | 1996-10-30 | 1998-05-22 | Nippon Telegr & Teleph Corp <Ntt> | Information processor |
US5761306A (en) * | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
US5796840A (en) * | 1994-05-31 | 1998-08-18 | Intel Corporation | Apparatus and method for providing secured communications |
JPH10240128A (en) | 1996-12-26 | 1998-09-11 | Toshiba Corp | Ciphering device, cryptographic key generation method and method of managing cryptographic key, and prime number generation device and method therefor |
US5812669A (en) * | 1995-07-19 | 1998-09-22 | Jenkins; Lew | Method and system for providing secure EDI over an open network |
US5825300A (en) * | 1993-11-08 | 1998-10-20 | Hughes Aircraft Company | Method of protected distribution of keying and certificate material |
US5883956A (en) * | 1996-03-28 | 1999-03-16 | National Semiconductor Corporation | Dynamic configuration of a secure processing unit for operations in various environments |
JPH1198133A (en) | 1997-09-19 | 1999-04-09 | Murata Mach Ltd | Communication terminal equipment and method for cipher communication |
JPH11168460A (en) | 1997-10-01 | 1999-06-22 | Pumpkin House:Kk | Cryptographic network system and method |
JPH11203128A (en) | 1998-01-09 | 1999-07-30 | Canon Inc | Digital software distribution system, terminal and recording medium |
JPH11317734A (en) | 1998-02-13 | 1999-11-16 | Hitachi Ltd | Data ciphering and deciphering method and network system using the method |
JP2001022646A (en) | 1999-07-09 | 2001-01-26 | Fujitsu Ltd | Memory device |
JP2001044988A (en) | 1999-08-04 | 2001-02-16 | Nippon Telegr & Teleph Corp <Ntt> | Method and system for accessing to different signature engines in common and storage medium stored with access program to different signature engiens in common |
JP2001111539A (en) | 1999-10-05 | 2001-04-20 | Dainippon Printing Co Ltd | Cryptographic key generator and cryptographic key transmitting method |
US6233341B1 (en) * | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
US6233577B1 (en) * | 1998-02-17 | 2001-05-15 | Phone.Com, Inc. | Centralized certificate management system for two-way interactive communication devices in data networks |
JP2001273111A (en) | 2000-03-28 | 2001-10-05 | Seiko Epson Corp | System for distributing print data and printer |
US20020007454A1 (en) * | 1998-03-04 | 2002-01-17 | Marc Tarpenning | Certificate handling for digital rights management system |
US6424718B1 (en) * | 1996-10-16 | 2002-07-23 | International Business Machines Corporation | Data communications system using public key cryptography in a web environment |
US6442688B1 (en) * | 1997-08-29 | 2002-08-27 | Entrust Technologies Limited | Method and apparatus for obtaining status of public key certificate updates |
JP2002259108A (en) | 2001-03-02 | 2002-09-13 | Canon Inc | Printing system, printer, printing method, recording medium, and program |
US20020154782A1 (en) * | 2001-03-23 | 2002-10-24 | Chow Richard T. | System and method for key distribution to maintain secure communication |
US6477254B1 (en) | 1998-02-13 | 2002-11-05 | Hitachi, Ltd. | Network system using a threshold secret sharing method |
US20020164035A1 (en) * | 2001-04-12 | 2002-11-07 | Kaoru Yokota | Reception terminal, key management apparatus, and key updating method for public key cryptosystem |
JP2002374240A (en) | 2001-04-12 | 2002-12-26 | Matsushita Electric Ind Co Ltd | Reception terminal, key apparatus, and key updating method for public key cryptosystem |
US20030016821A1 (en) * | 2000-03-29 | 2003-01-23 | Vadium Technology, Inc. | One-time-pad encryption with keyable characters |
US20030026427A1 (en) * | 2001-08-02 | 2003-02-06 | Bruno Couillard | Method and system providing improved security for the transfer of root keys |
US20030105963A1 (en) | 2001-12-05 | 2003-06-05 | Slick Royce E. | Secure printing with authenticated printer key |
US20030110376A1 (en) * | 1997-10-14 | 2003-06-12 | Michael J. Wiener | Method and system for providing updated encryption key pairs and digital signature key pairs in a public key system |
JP2003169049A (en) | 2001-11-29 | 2003-06-13 | Seiko Epson Corp | Communication mediating device |
US20030112346A1 (en) * | 2001-12-18 | 2003-06-19 | Koninklijke Philips Electronics N.V. | Digital image processing |
US20030163701A1 (en) * | 2002-02-27 | 2003-08-28 | Hitachi, Inc. | Method and apparatus for public key cryptosystem |
US20030196080A1 (en) * | 2002-04-16 | 2003-10-16 | Izecom B.V. | Secure communication via the internet |
US20030212892A1 (en) * | 2002-05-09 | 2003-11-13 | Canon Kabushiki Kaisha | Public key certification issuing apparatus |
US20040003263A1 (en) * | 2002-06-28 | 2004-01-01 | Olivier Brique | Security key for set-top-box updating method |
US20040025057A1 (en) * | 2000-06-15 | 2004-02-05 | Zix Corporation, A Texas Corporation | Secure message forwarding system detecting user's preferences including security preferences |
US6694025B1 (en) * | 1999-06-02 | 2004-02-17 | Koninklijke Philips Electronics N.V. | Method and apparatus for secure distribution of public/private key pairs |
US6711263B1 (en) * | 1999-05-07 | 2004-03-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure distribution and protection of encryption key information |
US20040068470A1 (en) * | 2000-11-01 | 2004-04-08 | Graham Klyne | Distributing public keys |
US6738907B1 (en) * | 1998-01-20 | 2004-05-18 | Novell, Inc. | Maintaining a soft-token private key store in a distributed environment |
US20040109567A1 (en) * | 2002-12-05 | 2004-06-10 | Canon Kabushiki Kaisha | Encryption key generation in embedded devices |
US20040111601A1 (en) * | 2002-12-06 | 2004-06-10 | Nokia Corporation | System and method for the exchange of cryptographic keys |
US20040109568A1 (en) * | 2002-12-05 | 2004-06-10 | Canon Kabushiki Kaisha | Automatic generation of a new encryption key |
US6757825B1 (en) * | 1999-07-13 | 2004-06-29 | Lucent Technologies Inc. | Secure mutual network authentication protocol |
US20040218207A1 (en) * | 2003-05-02 | 2004-11-04 | Marc Biundo | Printers and printer systems having cellular input/output |
US20040230990A1 (en) * | 2003-02-25 | 2004-11-18 | Kabushiki Kaisha Toshiba | System and apparatus for information display |
US6839841B1 (en) * | 1999-01-29 | 2005-01-04 | General Instrument Corporation | Self-generation of certificates using secure microprocessor in a device for transferring digital information |
US6901510B1 (en) * | 1999-12-22 | 2005-05-31 | Cisco Technology, Inc. | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure |
US20050120203A1 (en) * | 2003-12-01 | 2005-06-02 | Ryhwei Yeh | Methods, systems and computer program products for automatic rekeying in an authentication environment |
US6918038B1 (en) * | 1996-08-13 | 2005-07-12 | Angel Secure Networks, Inc. | System and method for installing an auditable secure network |
US20050228986A1 (en) * | 2004-04-12 | 2005-10-13 | Canon Kabushiki Kaisha | Data processing device, encryption communication method, key generation method, and computer program |
US6978025B1 (en) * | 2000-09-01 | 2005-12-20 | Pgp Corporation | Method and apparatus for managing public keys through a server |
US20050289346A1 (en) * | 2002-08-06 | 2005-12-29 | Canon Kabushiki Kaisha | Print data communication with data encryption and decryption |
US6986044B1 (en) * | 1998-10-14 | 2006-01-10 | Fuji Xerox Co., Ltd. | Method for group unit encryption/decryption, and method and apparatus for writing signature |
US7003667B1 (en) * | 1999-10-04 | 2006-02-21 | Canon Kabushiki Kaisha | Targeted secure printing |
US7050584B1 (en) * | 1998-08-18 | 2006-05-23 | Infineon Technologies Ag | Method and system for regenerating a private key for a predetermined asymmetric cryptographic key pair |
US7085386B2 (en) * | 2001-12-07 | 2006-08-01 | Activcard | System and method for secure replacement of high level cryptographic keys in a personal security device |
US7409061B2 (en) * | 2000-11-29 | 2008-08-05 | Noatak Software Llc | Method and system for secure distribution of subscription-based game software |
US7522732B2 (en) * | 2004-11-09 | 2009-04-21 | Lexmark International, Inc. | Method for controlling the distribution of software code updates |
US20140199461A1 (en) * | 2004-08-12 | 2014-07-17 | Sophie De Baets | Functional sugar replacement |
US8976964B2 (en) * | 2011-08-31 | 2015-03-10 | Ricoh Company, Ltd. | Key pair management method and image forming device |
-
2005
- 2005-04-08 US US11/101,493 patent/US8015393B2/en not_active Ceased
-
2013
- 2013-09-06 US US14/020,130 patent/USRE48381E1/en active Active
Patent Citations (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5144665A (en) * | 1990-02-21 | 1992-09-01 | Hitachi, Ltd. | Cryptographic communication method and system |
US5825300A (en) * | 1993-11-08 | 1998-10-20 | Hughes Aircraft Company | Method of protected distribution of keying and certificate material |
US5796840A (en) * | 1994-05-31 | 1998-08-18 | Intel Corporation | Apparatus and method for providing secured communications |
US5812669A (en) * | 1995-07-19 | 1998-09-22 | Jenkins; Lew | Method and system for providing secure EDI over an open network |
JPH09205419A (en) | 1996-01-26 | 1997-08-05 | Nri & Ncc Co Ltd | Method for storing and managing secret key |
US5761306A (en) * | 1996-02-22 | 1998-06-02 | Visa International Service Association | Key replacement in a public key cryptosystem |
US5883956A (en) * | 1996-03-28 | 1999-03-16 | National Semiconductor Corporation | Dynamic configuration of a secure processing unit for operations in various environments |
US6918038B1 (en) * | 1996-08-13 | 2005-07-12 | Angel Secure Networks, Inc. | System and method for installing an auditable secure network |
US6424718B1 (en) * | 1996-10-16 | 2002-07-23 | International Business Machines Corporation | Data communications system using public key cryptography in a web environment |
JPH10133956A (en) | 1996-10-30 | 1998-05-22 | Nippon Telegr & Teleph Corp <Ntt> | Information processor |
JPH10240128A (en) | 1996-12-26 | 1998-09-11 | Toshiba Corp | Ciphering device, cryptographic key generation method and method of managing cryptographic key, and prime number generation device and method therefor |
US20020138725A1 (en) * | 1997-08-29 | 2002-09-26 | Moses Timothy E. | Method and apparatus for obtaining status of public key certificate updates |
US6442688B1 (en) * | 1997-08-29 | 2002-08-27 | Entrust Technologies Limited | Method and apparatus for obtaining status of public key certificate updates |
JPH1198133A (en) | 1997-09-19 | 1999-04-09 | Murata Mach Ltd | Communication terminal equipment and method for cipher communication |
JPH11168460A (en) | 1997-10-01 | 1999-06-22 | Pumpkin House:Kk | Cryptographic network system and method |
US20030110376A1 (en) * | 1997-10-14 | 2003-06-12 | Michael J. Wiener | Method and system for providing updated encryption key pairs and digital signature key pairs in a public key system |
JPH11203128A (en) | 1998-01-09 | 1999-07-30 | Canon Inc | Digital software distribution system, terminal and recording medium |
US6738907B1 (en) * | 1998-01-20 | 2004-05-18 | Novell, Inc. | Maintaining a soft-token private key store in a distributed environment |
JPH11317734A (en) | 1998-02-13 | 1999-11-16 | Hitachi Ltd | Data ciphering and deciphering method and network system using the method |
US6477254B1 (en) | 1998-02-13 | 2002-11-05 | Hitachi, Ltd. | Network system using a threshold secret sharing method |
US6233577B1 (en) * | 1998-02-17 | 2001-05-15 | Phone.Com, Inc. | Centralized certificate management system for two-way interactive communication devices in data networks |
US20020007454A1 (en) * | 1998-03-04 | 2002-01-17 | Marc Tarpenning | Certificate handling for digital rights management system |
US6233341B1 (en) * | 1998-05-19 | 2001-05-15 | Visto Corporation | System and method for installing and using a temporary certificate at a remote site |
US7050584B1 (en) * | 1998-08-18 | 2006-05-23 | Infineon Technologies Ag | Method and system for regenerating a private key for a predetermined asymmetric cryptographic key pair |
US6986044B1 (en) * | 1998-10-14 | 2006-01-10 | Fuji Xerox Co., Ltd. | Method for group unit encryption/decryption, and method and apparatus for writing signature |
US6839841B1 (en) * | 1999-01-29 | 2005-01-04 | General Instrument Corporation | Self-generation of certificates using secure microprocessor in a device for transferring digital information |
US6711263B1 (en) * | 1999-05-07 | 2004-03-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure distribution and protection of encryption key information |
US6694025B1 (en) * | 1999-06-02 | 2004-02-17 | Koninklijke Philips Electronics N.V. | Method and apparatus for secure distribution of public/private key pairs |
US7076667B1 (en) | 1999-07-09 | 2006-07-11 | Fujitsu Limited | Storage device having secure test process |
JP2001022646A (en) | 1999-07-09 | 2001-01-26 | Fujitsu Ltd | Memory device |
US6757825B1 (en) * | 1999-07-13 | 2004-06-29 | Lucent Technologies Inc. | Secure mutual network authentication protocol |
JP2001044988A (en) | 1999-08-04 | 2001-02-16 | Nippon Telegr & Teleph Corp <Ntt> | Method and system for accessing to different signature engines in common and storage medium stored with access program to different signature engiens in common |
US7003667B1 (en) * | 1999-10-04 | 2006-02-21 | Canon Kabushiki Kaisha | Targeted secure printing |
JP2001111539A (en) | 1999-10-05 | 2001-04-20 | Dainippon Printing Co Ltd | Cryptographic key generator and cryptographic key transmitting method |
US6901510B1 (en) * | 1999-12-22 | 2005-05-31 | Cisco Technology, Inc. | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure |
JP2001273111A (en) | 2000-03-28 | 2001-10-05 | Seiko Epson Corp | System for distributing print data and printer |
US20030016821A1 (en) * | 2000-03-29 | 2003-01-23 | Vadium Technology, Inc. | One-time-pad encryption with keyable characters |
US20040025057A1 (en) * | 2000-06-15 | 2004-02-05 | Zix Corporation, A Texas Corporation | Secure message forwarding system detecting user's preferences including security preferences |
US6978025B1 (en) * | 2000-09-01 | 2005-12-20 | Pgp Corporation | Method and apparatus for managing public keys through a server |
US20040068470A1 (en) * | 2000-11-01 | 2004-04-08 | Graham Klyne | Distributing public keys |
US7409061B2 (en) * | 2000-11-29 | 2008-08-05 | Noatak Software Llc | Method and system for secure distribution of subscription-based game software |
JP2002259108A (en) | 2001-03-02 | 2002-09-13 | Canon Inc | Printing system, printer, printing method, recording medium, and program |
US20020154782A1 (en) * | 2001-03-23 | 2002-10-24 | Chow Richard T. | System and method for key distribution to maintain secure communication |
US7206412B2 (en) * | 2001-04-12 | 2007-04-17 | Matsushita Electric Industrial Co., Ltd. | Reception terminal, key management apparatus, and key updating method for public key cryptosystem |
US20020164035A1 (en) * | 2001-04-12 | 2002-11-07 | Kaoru Yokota | Reception terminal, key management apparatus, and key updating method for public key cryptosystem |
JP2002374240A (en) | 2001-04-12 | 2002-12-26 | Matsushita Electric Ind Co Ltd | Reception terminal, key apparatus, and key updating method for public key cryptosystem |
US20030026427A1 (en) * | 2001-08-02 | 2003-02-06 | Bruno Couillard | Method and system providing improved security for the transfer of root keys |
JP2003169049A (en) | 2001-11-29 | 2003-06-13 | Seiko Epson Corp | Communication mediating device |
US20030105963A1 (en) | 2001-12-05 | 2003-06-05 | Slick Royce E. | Secure printing with authenticated printer key |
US7305556B2 (en) | 2001-12-05 | 2007-12-04 | Canon Kabushiki Kaisha | Secure printing with authenticated printer key |
JP2003224561A (en) | 2001-12-05 | 2003-08-08 | Canon Inc | Information processor and method therefor |
EP1320009A2 (en) * | 2001-12-05 | 2003-06-18 | Canon Kabushiki Kaisha | Method and apparatus for securely storing a public key |
US7085386B2 (en) * | 2001-12-07 | 2006-08-01 | Activcard | System and method for secure replacement of high level cryptographic keys in a personal security device |
US20030112346A1 (en) * | 2001-12-18 | 2003-06-19 | Koninklijke Philips Electronics N.V. | Digital image processing |
US20030163701A1 (en) * | 2002-02-27 | 2003-08-28 | Hitachi, Inc. | Method and apparatus for public key cryptosystem |
US20030196080A1 (en) * | 2002-04-16 | 2003-10-16 | Izecom B.V. | Secure communication via the internet |
US20030212892A1 (en) * | 2002-05-09 | 2003-11-13 | Canon Kabushiki Kaisha | Public key certification issuing apparatus |
US20040003263A1 (en) * | 2002-06-28 | 2004-01-01 | Olivier Brique | Security key for set-top-box updating method |
US20050289346A1 (en) * | 2002-08-06 | 2005-12-29 | Canon Kabushiki Kaisha | Print data communication with data encryption and decryption |
US20040109567A1 (en) * | 2002-12-05 | 2004-06-10 | Canon Kabushiki Kaisha | Encryption key generation in embedded devices |
US20040109568A1 (en) * | 2002-12-05 | 2004-06-10 | Canon Kabushiki Kaisha | Automatic generation of a new encryption key |
US7111322B2 (en) * | 2002-12-05 | 2006-09-19 | Canon Kabushiki Kaisha | Automatic generation of a new encryption key |
US20040111601A1 (en) * | 2002-12-06 | 2004-06-10 | Nokia Corporation | System and method for the exchange of cryptographic keys |
US20040230990A1 (en) * | 2003-02-25 | 2004-11-18 | Kabushiki Kaisha Toshiba | System and apparatus for information display |
US20040218207A1 (en) * | 2003-05-02 | 2004-11-04 | Marc Biundo | Printers and printer systems having cellular input/output |
US20050120203A1 (en) * | 2003-12-01 | 2005-06-02 | Ryhwei Yeh | Methods, systems and computer program products for automatic rekeying in an authentication environment |
US20050228986A1 (en) * | 2004-04-12 | 2005-10-13 | Canon Kabushiki Kaisha | Data processing device, encryption communication method, key generation method, and computer program |
US20140199461A1 (en) * | 2004-08-12 | 2014-07-17 | Sophie De Baets | Functional sugar replacement |
US7522732B2 (en) * | 2004-11-09 | 2009-04-21 | Lexmark International, Inc. | Method for controlling the distribution of software code updates |
US8976964B2 (en) * | 2011-08-31 | 2015-03-10 | Ricoh Company, Ltd. | Key pair management method and image forming device |
Non-Patent Citations (7)
Title |
---|
"Key Management for SCADA", C. L. Beaver et al, Sandia National Laboratories, pp. 1-31, 2002. * |
Garfinkel, S. "PGP: Pretty Good Privacy", Beijing: O'Reilly, ISBN 1-56592-098-8, Oct. 1999, Chapter 9, pp. 171-194. * |
Iannamico, M. "Pretty Good Privacy™ PGP for Personal Privacy, Version 5.0", PGP™, Inc., May 1997. * |
Notification of Reason for Refusal dated Jun. 22, 2010, issued by Japanese Patent Office in Japanese Patent Application No. 2004-117117 (partial translation). |
Notification of Reason for Refusal, dated Oct. 4, 2010, issued by the Japanese Patent Office in Japanese Patent Application No. 2004-117117. |
Notification of Reasons for Refusal dated Apr. 7, 2010, issued in Japanese Patent Application No. 2004-191542. |
Whitten, A. and J.D. Tygar "Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0", Proceedings of the 8th USENIX Security Symposium, Aug. 23-26, 1999. * |
Also Published As
Publication number | Publication date |
---|---|
US20050228986A1 (en) | 2005-10-13 |
US8015393B2 (en) | 2011-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE48381E1 (en) | Data processing device, encryption communication method, key generation method, and computer program | |
US8005213B2 (en) | Method, apparatus, and computer program for generating session keys for encryption of image data | |
JP4748774B2 (en) | Encrypted communication system and system | |
US7681037B2 (en) | Network connection system | |
US8564804B2 (en) | Information processing apparatus that does not transmit print job data when both encryption and saving in a printing apparatus are designated, and control method and medium therefor | |
US8327133B2 (en) | Communication device and medium for the same | |
US20060269053A1 (en) | Network Communication System and Communication Device | |
EP1517507A1 (en) | Processing and printing devices, methods, program, and recording medium | |
KR20060045440A (en) | A method and system for recovering password protected private data via a communication network without exposing the private data | |
US20050120211A1 (en) | Server apparatus, client apparatus, object administration system, object administration method, computer program, and storage medium | |
JP2004289699A (en) | Information processing apparatus | |
JP2007325274A (en) | System and method for inter-process data communication | |
JP2005332093A (en) | Maintenance work system managing device, identifying device, personal digital assistance, computer program, recording medium, and maintenance work system | |
WO2008035450A1 (en) | Authentication by one-time id | |
CN111611552B (en) | License authorization method and device based on combination of software and hardware | |
JP2005284985A (en) | Network compatible device, maintenance method for maintaining network compatible device, program, medium storing program thereon, and maintenance system thereof | |
JP2002049571A (en) | Communication controller and method of communication control | |
CN109246156B (en) | Login authentication method and device, login method and device, and login authentication system | |
JP5111974B2 (en) | Communication system and communication apparatus | |
JP2005303676A (en) | Image forming device, paired key generating method, and computer program | |
JP2002064479A (en) | Network apparatus and host apparatus | |
JP4789432B2 (en) | Data processing apparatus, data processing apparatus control method, computer program, and storage medium | |
JP2005311811A (en) | Image forming apparatus or confidentiality communication apparatus | |
JP2007020065A (en) | Decryption backup method, decryption restoration method, attestation device, individual key setting machine, user terminal, backup equipment, encryption backup program, decryption restoration program | |
JP2016206861A (en) | Information processing device and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |