摘要 |
PROBLEM TO BE SOLVED: To prevent lowering of the security of an IC card by preventing an illegal action to the IC card such as revising information preserved in an IC chip. SOLUTION: An IC card R/W 13 generates a random number r1 by a random number generating part 15, generates a random number r2 by a random number r2 generating part 17, enciphers these random numbers by a cipher function (f) and a key Kf and transmits them to an IC card 5 as an authenticating command. The IC card 5 deciphers that command by the cipher function (f) and the key Kf and extracts the random numbers r1 and r2. A measuring instrument 23 reads authentication object information from an optical mark hologram 7. Original data 3 in a file area A are made into hush by a comparative collation algorithm 21, enciphered by a cipher function (g) and a key Kg and comparatively collated with authentication object division and when they are coincident, r1 is, when they are not coincident, r2 is enciphered by the cipher function (f) and the key Kf and transmitted to the side of the IC card R/W 13 respectively. |