摘要:
It is ensured that advertising information can be distributed and advertising effectiveness can be validated without increasing any burden on the store side. A distribution server 1 gives an advertisement ID and advertisement position information to the advertising information to distribute it to a user portable terminal 3. The user portable terminal 3 automatically judges whether or not a user visits the store on the basis of terminal position information detected by a sensor 32 and the advertisement position information given to the advertising information. When judging that the user has visited the store, the user portable terminal 3 extracts the user ID and the advertisement ID given to the advertising information and transmits them to an effectiveness validation server 2. The effectiveness validation server 2 executes a processing for validating the advertising effectiveness on the basis of the received user ID and advertisement ID and computes a point given to the user and an advertising fee charged to the advertiser according to the result of the validation of the advertising effectiveness.
摘要:
[Problems] When two communication nodes communicate with each other they more reliably confirm that the communication party is a correct one.[Means for Solving Problems] Computation is performed on the basis of a first communication identifier created by a second communication node and contained in a first authentication message replied to the first communication node in response to a connection request message transmitted from the first to the second communication node, authenticator data held in the first communication node, and a second communication identifier created by the first communication node so as to create a message different from the other messages each time, creatable easily from the authenticator data, identifiable as a message created in response to the first authentication message, and not easy to derive or deduce authenticator data from this message. The second authentication message is checked.
摘要:
A key distribution system includes a server and terminal devices constructing an ad-hoc network and communicating with each other with information being encrypted by a key distributed from the server. The server obtains a predetermined attribute value desired as a communication counterparty by the terminal device from the terminal device, and obtains a plurality of keys corresponding to the obtained attribute values from a key managing information. The server obtains, among the plurality of obtained keys, m number of keys that maximize the posterior probability that the keys are stored in the terminal device having the same attribute value as the attribute value obtained from the terminal device and having the number of communications larger than a predetermined value, and transmits the m number of keys to the terminal device.
摘要:
An RSA signature method is provided in which the length of a signature does not depend on the number of signature devices when multiple signature devices are related to the creation of the signature. A signature device i_{m} includes first conversion means SS1B105 that performs no operation if a received signed text u_{i_{m−1}} exceeds a modulus n_{i_{m}} and, if not, adds an RSA-method-based signature; bijective conversion means S1B106 that multiplies the result by a function that maps the result to a value larger by the modulus n_{i_{m}}; second conversion means S1B107 that performs no operation if the operation result exceeds the modulus n_{i_{m}} and, if not, adds an RSA-method-based signature; and output means S1B109 that outputs the operation result as the signed text u_{i_{m}}.
摘要:
A server (1) generates delivery data obtained by adding distribution control information which designates the possibility/impossibility of data transfer, the necessity/unnecessity of encryption, the possibility/impossibility of server inquiry, and the like to contents data such as digital contents, an electronic ticket, or the like and delivers the delivery data to a mobile information terminal (2). The delivery data is stored in the mobile information terminal (2), and freely used by a service user. Although the delivery data can be backed up in another user information terminal, restoration and transfer of the delivery data are restricted according to the added distribution control information.
摘要:
There is provided a wireless communication terminal that autonomously determines whether the wireless communication terminal is in a state in which flooding should be performed or a state in which the flooding should not be performed in a wireless ad-hoc network. At each predetermined time, the wireless communication terminal that performs the flooding autonomously infers whether the wireless communication terminal is in a state in which the flooding should be performed or a state in which the flooding should not be performed from the number of flooding packets that are of a packet flooded from surrounding wireless communication terminals based on a hidden Markov model.
摘要:
There is provided a wireless communication terminal that autonomously determines whether the wireless communication terminal is in a state in which flooding should be performed or a state in which the flooding should not be performed in a wireless ad-hoc network. At each predetermined time, the wireless communication terminal that performs the flooding autonomously infers whether the wireless communication terminal is in a state in which the flooding should be performed or a state in which the flooding should not be performed from the number of flooding packets that are of a packet flooded from surrounding wireless communication terminals based on a hidden Markov model.
摘要:
To provide an architecture information processing system having a small circuit size capable of reducing power consumption and cost, on which system a circuit simultaneously executing encryption processing and message authentication (falsification detection processing) can be mounted. An information processing system includes at least: a parameter storage section that retains an initialization vector used as a starting block of concatenation and an encryption key used for encryption; a one-way hash calculation section that executes a one-way hash calculation as a technique for realizing message authentication and functioning in place of the conventional common key block encryption (DES encryption) operation as an encryption operation section of a block encryption mode use section performing encryption processing and/or decryption processing as a CFB mode and/or an OFB mode; and a key overlay operation section that performs calculation for overlaying an encryption key retained in the parameter storage unit on data input to the encryption operation section.
摘要:
A communication network of the present invention includes: a plurality of superordinate nodes 110 to 1m0 forming a cascade type topology; and a plurality of terminal nodes 111 to 11n, connected to at least one superordinate node from among said plurality of superordinate nodes and forming a star type topology with the superordinate node connected.