Mutual authentication is performed by using first and second authentication key data between a first data processing device and a second data processing device. When the mutual authentication is succeeded, the first data processing device uses encryption key data for encrypting predetermined data and outputs the data to the second data processing device. The second data processing device decrypts the encrypted data by using decryption key data and judges whether the data is adequate or not for making the data to effective.

 
Web www.patentalert.com

< Direct memory access controller with encryption and decryption for non-blocking high bandwidth I/O transactions

< Anti-piracy software protection system and method

> Property-based data authentication mechanism

> Conference session key distribution method in an ID-based cryptographic system

~ 00605