摘要 |
The method involves connecting a host processor (HP2) to a controller by a connection unit (C1), and transmitting a secret data i.e. public encryption key, to controller, where the data is stored by the controller. Verification is made that a predefined relation exists between a secret data i.e. private encryption key, stored by the processor and the secret data stored by the controller. The host processor is authenticated by the controller by verifying the relation between the secret data. The controller is authenticated by the processor by verifying the relation between the secret data. Independent claims are also included for the following: (1) a near field communication system comprising a controller connected to a data reception/emission interface circuit (2) a smart card comprising an integrated circuit card detachable from the smart card. |