摘要:
An encrypted ID takes as its initial value a tag ID that constitutes an original ID of a wireless tag, and is encrypted using an encryption key each time an ID inquiry is received from a reader/writer. Another encrypted ID also takes the tag ID as its initial value, and is encrypted using an encryption key each time an ID inquiry is received. The wireless tag gives confidential variability to the ID by transmitting a combination of the encrypted ID and the another encrypted ID in reply. The reader/writer can obtain the original ID merely by decoding the two encrypted values until they match, and the decoding load does not increase even if the number of wireless tags that are reading targets increases.
摘要:
An encrypted ID takes as its initial value a tag ID that constitutes an original ID of a wireless tag, and is encrypted using an encryption key each time an ID inquiry is received from a reader/writer. Another encrypted ID also takes the tag ID as its initial value, and is encrypted using an encryption key each time an ID inquiry is received. The wireless tag gives confidential variability to the ID by transmitting a combination of the encrypted ID and the another encrypted ID in reply. The reader/writer can obtain the original ID merely by decoding the two encrypted values until they match, and the decoding load does not increase even if the number of wireless tags that are reading targets increases.
摘要:
An information access system comprises a reader/writer for continually transmitting an ID request signal at a first frequency and being continuously ready to receive an RF signal at a second frequency, and an active contactless information storage device having a receiver for sensing a carrier of an RF signal at the first frequency, and a transmitter for transmitting a response signal at the second frequency when the ID request signal is received. When the receiver senses a carrier of an RF signal at the first frequency in a particular predetermined period, the receiver receives further the ID request signal, and, in response to the ID request signal, the transmitter transmits a response signal at the second frequency carrying an ID of the storage device stored. In the carrier sensing, the controller causes the receiver to be in an active state and the transmitter to be in an inactive state in the predetermined periods. When the receiver attempts to sense a carrier of the RF signal at the first frequency in a particular predetermined period but detects no carrier, the controller controls the receiver and the transmitter to maintain the inactive state during a sleep period between the particular predetermined period and the subsequent predetermined period.
摘要:
An information access system comprises a reader/writer for continually transmitting an ID request signal at a first frequency and being continuously ready to receive an RF signal at a second frequency, and an active contactless information storage device having a receiver for sensing a carrier of an RF signal at the first frequency, and a transmitter for transmitting a response signal at the second frequency when the ID request signal is received. When the receiver senses a carrier of an RF signal at the first frequency in a particular predetermined period, the receiver receives further the ID request signal, and, in response to the ID request signal, the transmitter transmits a response signal at the second frequency carrying an ID of the storage device stored. In the carrier sensing, the controller causes the receiver to be in an active state and the transmitter to be in an inactive state in the predetermined periods. When the receiver attempts to sense a carrier of the RF signal at the first frequency in a particular predetermined period but detects no carrier, the controller controls the receiver and the transmitter to maintain the inactive state during a sleep period between the particular predetermined period and the subsequent predetermined period.
摘要:
A signature generating device includes a receiving unit that receives a sequence of data; a summary data generating unit that generates summary data of the data upon reception of each of the data by the receiving unit; an obtaining unit that obtains, when the number of data included in a sequence of the generated summary data reaches a given number, the sequence of the summary data as a block; a setting unit that sets, as a signature subject, a current block constituted by the sequence of the summary data, and the summary data selected from at least one block contiguous to the current block; a digital signature generating unit that generates a digital signature concerning data summarized for the current block; and a sending unit that sends the generated digital signature, the signature subject associated with the digital signature, and the data summarized for the current block.
摘要:
401 stores, in 302, key d′ obtained by subtracting random number 2r held in 201 from key d held in 105. When an operation starts, the values “−C” and “−C2” are calculated respectively, and the resultant values are stored in a multiplication table memory 205 together with value “C”. In a first operation cycle, 107 selects and outputs an intermediate value 108 held in an in-operation data register 103, and thereby makes a modular-multiplication operation circuit 104 perform squaring. In the second operation cycle, 107 selects and outputs one of three values held in 205 in accordance with the combination of key bit value d′i and random number bit value ri, and thereby makes the modular-multiplication operation circuit 104 perform multiplication. Thereby, a cryptographic processing device that requires a short operation time period, small circuit scale, and has sufficient security can be realized.
摘要:
A common key block encryption apparatus for performing a nonlinear transformation with a multiplication executed in a binary field or a composite field includes a computing unit to execute a computation other than the nonlinear transformation with fixed value masked input data obtained by XORing input data with a fixed mask value, an XOR operation circuit to transform all input data into fixed value masked input data by XORing the input data with a fixed mask value and to transform the data into random value masked input data by XORing the input data with a random mask value in the multiplication, a multiplier to execute a multiplication based on the random value masked input data output from the XOR operation circuit, and a random value mask-to-fixed mask value transformation circuit to again transform the random value masked output data into fixed value masked output data and to output the data.
摘要:
A saddle-ride type electric vehicle includes an electric motor for generates power for rotationally driving a rear wheel. Foot rests are provided for an occupant seated on an occupant seat. A battery is disposed in a space S surrounded by a down frame which is coupled to a head pipe or to a front end of a main frame and which extends downwardly, pivot frames, and the main frame. Steps disposed to both sides of the battery in planar view are provided to front ends of a pair of left and right step frames coupled to lower portion of the pivot frames, the step frames extending forward and overlapping a rear portion of the battery in planar view. The battery is wider in an area adjacent to the head pipe as compared to the width of the battery in an area adjacent to the steps.
摘要:
Disclosed is a digital document management program capable of achieving a third-party certification of document information with reduced amount of meta data.At the registration time of new document information, the digital document management program manages a digital signature created in association with document information. At the correction time of the document information, the program acquires partial identification information related to a corrected part of the document information before correction, creates a digital signature to be appended to the corrected document information, and manages the digital signature and partial identification information related to the corrected part of the document information in association with the corrected document information. At the verification time, the program uses partial identification information, the partial identification information corresponding to a corrected part of the document information before correction, and digital signature to perform verification.
摘要:
A cryptographic processing device, comprising: a storage unit; initial setting unit for setting a value to be stored in the storage unit; Montgomery modular multiplication operation unit for performing a Montgomery modular multiplication operation plural times for a value set by the initial setting unit; and fault attack detection unit for determining whether or not a fault attack occurred for each of at least some parts of the Montgomery modular multiplication operations performed plural times.