System of authenticating an individual memory device via reading data including prohibited data and readable data

作者: Yuji Nagai , Toshihiro Suzuki , Taku Kato , Tatsuyuki Matsushita , Noboru Shibata

DOI:

关键词:

摘要: According to one embodiment, an authentication method includes generating, by the memory, first information calculating secret identification with a memory session key in one-way function operation, transmitting encrypted information, family block, and host, second generated decrypting host operation. The further comparing, information.

参考文章(93)
Hiroshi Yoshiura, Hiroo Okamoto, Shinji Itoh, Tamper-resistant computer system ,(2001)
Raluca Ada Popa, David Molnar, Jiahe Helen Wang, Li Zhuang, Jacob Lorch, Security service level agreements with publicly verifiable proofs of compliance ,(2010)
Hiroshi Suu, Akira Miura, Shigeru Ishida, Kazunori Nakano, Akihiro Kasahara, Storage medium conversion method, program and device ,(2006)
Haruhiko Toyama, Hideki Matsumoto, Toru Kambayashi, Kentaro Umesawa, Ryuiti Koike, Taku Kato, Tatsuyuki Matsushita, Hideaki Sato, Satoshi Ito, Communication apparatus, key server, and management server ,(2009)
Toru Akishita, Taizo Shirai, Yoshihito Ishibashi, Tomoyuki Asano, Masaharu Yoshimori, Data processing system, recording device, data processing method and program providing medium ,(2000)