摘要 |
<P>PROBLEM TO BE SOLVED: To effectively prevent IC card fraudulent access and secret key leakage even when a settlement terminal is stolen, and to suppress the delay and dispersion of settlement terminal activation time. <P>SOLUTION: Each settlement terminal 5 requires a secret key for communication processing with an IC card, and the secret key is managed by a center server 1. Of division keys A and B for which the secret key is divided, the division key A is stored in each settlement terminal 5 and the division key B is stored in the nonvolatile memory of a temporary authentication terminal 6. After being activated, each settlement terminal 5 performs authentication processing with the temporary authentication terminal 6, and when authentication is a success, acquires the division key B, generates the secret key by connecting it with the division key A, and starts a temporary operation using the generated secret key. Thereafter, the secret key is acquired from the center server 1 and the operation is performed using the secret key. The secret key is stored in a volatile memory and is erased by turning OFF the power source of the terminal 5. <P>COPYRIGHT: (C)2008,JPO&INPIT |