Device and authentication method therefor

作者: Yuji Nagai , Toshihiro Suzuki , Taku Kato , Tatsuyuki Matsushita , Noboru Shibata

DOI:

关键词: Data Authentication AlgorithmChallenge–response authenticationMulti-factor authenticationComputer scienceChallenge-Handshake Authentication ProtocolKey (cryptography)Computer securityAuthentication protocolSession keyAuthentication

摘要: According to one embodiment, an authentication method includes generating, by the memory, first information calculating secret identification with a memory session key in one-way function operation, transmitting encrypted information, family block, and host, second generated decrypting host operation. The further comparing, information.

参考文章(128)
Hiroshi Yoshiura, Hiroo Okamoto, Shinji Itoh, Tamper-resistant computer system ,(2001)
Shahrokh Shahidzadeh, Michael Neve de Mevergnies, Prasun Ratn, Sergiu D. Ghetie, Knut S. Grimsrud, Apparatus, system, and method for providing memory access control ,(2011)
Raluca Ada Popa, David Molnar, Jiahe Helen Wang, Li Zhuang, Jacob Lorch, Security service level agreements with publicly verifiable proofs of compliance ,(2010)
Hiroshi Suu, Akira Miura, Shigeru Ishida, Kazunori Nakano, Akihiro Kasahara, Storage medium conversion method, program and device ,(2006)
Haruhiko Toyama, Hideki Matsumoto, Toru Kambayashi, Kentaro Umesawa, Ryuiti Koike, Taku Kato, Tatsuyuki Matsushita, Hideaki Sato, Satoshi Ito, Communication apparatus, key server, and management server ,(2009)