摘要:
According to an embodiment, a communication apparatus establishes communication with an external apparatus through a higher-level device. The communication apparatus includes a main processor and a key generator. The main processor receives a data authentication request including data to be authenticated, a first key specification, and a message authentication algorithm identifier from the higher-level device. The key generator retains a key hierarchy used by an authentication protocol that is used between the higher-level device and the external apparatus, and to generate a first key by use of the key hierarchy and the first key specification. The main processor generates a message authentication code for the data to be authenticated by use of the message authentication algorithm, which is identified by the message authentication algorithm identifier, and the first key, and transmits a data authentication response including the message authentication code to the higher-level device.
摘要:
According to one embodiment, a node that is a root node of a network forming a directed acyclic graph topology, which is composed of plural nodes including the node serving as the root node and having a parent-child relationship among nodes of adjacent hierarchies, includes a generating unit, an encrypting unit, and a transmitting unit. The generating unit generates a group key, and a list indicating a first node to which a distribution of the group key is inhibited. The encrypting unit encrypts the group key so as to be capable of being decrypted by a first child node other than the first node out of the child nodes of the root node. The transmitting unit transmits a first message, including an encrypted group key, which is the group key that is encrypted with respect to the first child node, and the list.
摘要:
A media-independent handover key management architecture is disclosed that uses Kerberos for secure key distribution among a server, an authenticator, and a mobile node. In the preferred embodiments, signaling for key distribution is based on re-keying and is decoupled from re-authentication that requires EAP (Extensible Authentication Protocol) and AAA (Authentication, Authorization and Accounting) signaling similar to initial network access authentication. In this framework, the mobile node is able to obtain master session keys required for dynamically establishing the security associations with a set of authenticators without communicating with them before handover. By separating re-key operation from re-authentication, the proposed architecture is more optimized for a proactive mode of operation. It can also be optimized for reactive mode of operation by reversing the key distribution roles between the mobile node and the target access node.
摘要:
A measuring device includes a total internal reflection prism having a total reflection plane that an object to be measured contacts, a light source to emit light to make the light having a wavelength equal to or greater than 7 micrometers (μm) and equal to or less than 12 μm incident on the total reflection plane, and a sensor to detect light intensity of the light reflected by the total reflection plane. In the measuring device, an equation
摘要:
A measuring apparatus includes a light source configured to emit light in a mid-infrared region, the light including: first-wavelength light having a wave number of from 970 cm-1 or more to 1010 cm-1 or less; and second-wavelength light different from the first-wavelength light, the second-wavelength light having a wave number of from 950 cm-1 or more to 990 cm-1 or less; a photosensor configured to detect the light emitted from the light source and reflected by a measurement target; and an information processing device configured to: obtain a first absorbance of the first-wavelength light and a second absorbance of the second-wavelength light from an output of the photosensor; and determine a biomarker of the measurement target based on the first absorbance and the second absorbance.
摘要:
According to one embodiment, a wireless mesh network includes a plurality of nodes of which one is a root node and two nodes hierarchically adjacent have a parent-child relationship. In a node in the wireless mesh network, an authentication processing unit executes an authentication for network access with the root node when the node joins in the wireless mesh network. A root key setting unit generates a root key as a common key between the root node and the node. A parent-child key setting unit generates a parent-child key as a common key between a parent node and the node, encrypts the parent-child key using the root key, and sends the parent-child key encrypted to the root node. A group key acquisition unit receives a group key encrypted using the parent-child key from the parent node, and decrypts the group key using the parent-child key.
摘要:
A single burst method is used to determine the available bandwidth in a network environment. A sending node transmits test packets to a receiving node. The size of the test packets is dynamically determining based on network parameters within the network environment. The sending node then receives test receipt packets that have the same sequence numbers as the corresponding test packets. Packet clusters are formed from the test receipt packets. The available bandwidth is determined based on the packet clusters along with values set by the single burst method or inputted by a user.
摘要:
A terminal device includes multiple interfaces having links to various networks. When a trigger event occurs, the terminal device selects a target link to a network to transition from its current link. A candidate link selection function determines candidate links that are filtered to remove links not meeting connectivity criteria. A target link selection function is then executed to select a target link from the filtered candidate links. Thus, the target link selection function is not run for every possible link, but only those meeting the criteria.
摘要:
A system and method is disclosed for dynamically and securely establishing a tunnel for a mobile device. In the preferred embodiments, the system and method operate to dynamically assign one or more tunnel endpoint addresses to a client which is not on the same IP-link as an authentication agent depending on an authentication result based on using an authentication protocol source port number in order to address communications.