摘要 |
<p>PROBLEM TO BE SOLVED: To prevent illegal acquisition of software by spoofing to imitate a normal on-vehicle terminal and unauthorized use of software such as duplication and distribution of software using unlawful means.SOLUTION: An on-vehicle terminal has stored specific terminal identification information and a terminal specific key, and a server has stored server side terminal identification information and a server side terminal specific key that are the same information as the terminal identification information and the terminal specific key. The on-vehicle terminal transmits the terminal identification information to the server via a communication terminal, and the server performs terminal authentication on the basis of the server side terminal identification information, and if the authentication succeeds, transmits encrypted software for an authentication-succeeded on-vehicle terminal to the communication terminal. The communication terminal transmits the encrypted software to the on-vehicle terminal, and the on-vehicle terminal obtains a software specific key encrypted by the server side terminal specific key at the server via the communication terminal, decrypts the encrypted software by means of the software specific key and installs the software.</p> |