Data processing method, its program, and its device
Mutual authentication is performed by using first and second authentication key data between a first data processing device and a second data processing device. When the mutual authentication is succeeded, the first data processing device uses encryption key data for encrypting predetermined data an...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Mutual authentication is performed by using first and second authentication key data between a first data processing device and a second data processing device. When the mutual authentication is succeeded, the first data processing device uses encryption key data for encrypting predetermined data and outputs the data to the second data processing device. The second data processing device decrypts the encrypted data by using decryption key data and judges whether the data is adequate or not for making the data to effective. |
---|