The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 27, 2015

Filed:

May. 05, 2014
Applicant:

Panasonic Corporation, Osaka, JP;

Inventors:

Kaoru Yokota, Hyogo, JP;

Akihito Katsura, Osaka, JP;

Yusuke Nemoto, Hyogo, JP;

Yuishi Torisaki, Osaka, JP;

Makoto Fujiwara, Kyoto, JP;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04K 1/00 (2006.01); H04L 9/08 (2006.01); G06F 21/10 (2013.01); G06F 21/55 (2013.01); G06F 21/72 (2013.01); H04L 9/32 (2006.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
H04L 9/0866 (2013.01); G06F 21/10 (2013.01); G06F 21/556 (2013.01); G06F 21/72 (2013.01); H04L 9/0822 (2013.01); H04L 9/0897 (2013.01); H04L 9/321 (2013.01); H04L 63/0428 (2013.01); H04L 63/06 (2013.01); H04L 63/10 (2013.01); G06F 2221/0797 (2013.01); G06F 2221/2107 (2013.01); H04L 2209/605 (2013.01); H04L 2463/101 (2013.01);
Abstract

An LSI includes a first decryptor which receives first encrypted key data, and decrypts the first encrypted key data using a first cryptographic key, thereby generating first decrypted key data, a second cryptographic key generator which generates a second cryptographic key based on a second ID, a second encryptor which encrypts the first decrypted key data using the second cryptographic key, thereby generating second encrypted key data, and a second decryptor which decrypts the second encrypted key data using the second cryptographic key, thereby generating second decrypted key data. At a time of key setting, the second encryptor stores the second encrypted key data in a storage unit. At a time of key usage, the second decryptor reads the second encrypted key data from the storage unit.


Find Patent Forward Citations

Loading…