摘要:
The present invention provides a technology of effectively avoiding tracing on a terminal performed with an identification number being a target and DoS attack without making any significant changes to a communication system.In the wireless communication system of the present invention, under a control of a control communication processing portion 113 of an access point, a hash function arithmetic operation processing portion 112 generates a third identification number to be updated using a current identification number, hash key and random number for any wireless communication terminal, a control communication processing portion 113 sends an update instruction signal containing the random number to the wireless communication terminal and updates the current identification number stored in the identification number storage portion 121 to a second identification number. When the wireless communication terminal receives an update instruction signal, the current identification number is updated to the second identification number and the hash function arithmetic operation processing portion generates a third identification number using the current identification number, hash key and random number stored in the self number storage portion.
摘要:
The present invention provides a technology of effectively avoiding tracing on a terminal performed with an identification number being a target and DoS attack without making any significant changes to a communication system.In the wireless communication system of the present invention, under a control of a control communication processing portion 113 of an access point, a hash function arithmetic operation processing portion 112 generates a third identification number to be updated using a current identification number, hash key and random number for any wireless communication terminal, a control communication processing portion 113 sends an update instruction signal containing the random number to the wireless communication terminal and updates the current identification number stored in the identification number storage portion 121 to a second identification number. When the wireless communication terminal receives an update instruction signal, the current identification number is updated to the second identification number and the hash function arithmetic operation processing portion generates a third identification number using the current identification number, hash key and random number stored in the self number storage portion.
摘要:
A decentralized key management scheme that implements key management of a tree structure comprised of only group members without using a key management server is proposed, and communication method and system that can contribute to secure group communications is provided. Each member constituting a group updates tree structure data of the entire group when a new member joins, respectively 70, and selects a captain in each subtree 71. Rather than the key management server, the captain generates a new key and shares it with other captains or the joining member 72, and distributes the new key to the members of the subtree 73, thereby enabling all the group members to update to the new key. A captain is also selected when a member leaves, and sharing and distribution of a new key by the captain is performed.
摘要:
A decentralized key management scheme that implements key management of a tree structure comprised of only group members without using a key management server is proposed, and communication method and system that can contribute to secure group communications is provided. Each member constituting a group updates tree structure data of the entire group when a new member joins, respectively 70, and selects a captain in each subtree 71. Rather than the key management server, the captain generates a new key and shares it with other captains or the joining member 72, and distributes the new key to the members of the subtree 73, thereby enabling all the group members to update to the new key. A captain is also selected when a member leaves, and sharing and distribution of a new key by the captain is performed.
摘要:
In particular, even if sensors have their respective different timer precisions, the number of occasions when the sensors wait for data can be minimized, thereby reducing the output consumptions on the sensor sides. A coordinator (3) allocates, based on information previously received from sensors (2), the sensors to respective slots, which constitute a super-frame, in a time sequence order and then notifies, to the sensors (2), the respective slots to which the sensors are allocated. When each of the sensors (2) transmits data to the coordinator (3), the sensor makes a synchronization request at the timing of the notified slot without receiving any beacons from the coordinator.
摘要:
In a random error signal generator, an M-sequence generation circuit outputs, in parallel, pieces of bit data stored in each register, a first generation circuit sequentially outputs first reference values C which are changed by a predetermined value in response to clocks, a second generation circuit outputs a second reference value D which is shifted from the first reference value C by a range value E which is determined depending on an error rate p. A comparison and determination unit outputs random error signals to be error bits when a numeric value A of the bit data output exists between the first and second reference values C, D. The random error signal has the error rate p, the number of times of error occurrences follows Poisson distribution, and a distribution of adjacent error occurrence intervals follows a geometric distribution.
摘要:
An identification-information extracting unit extracts first identification information of a location registration area of a wireless communication system. A storage unit stores correspondence information concerning a relationship between the first identification information and second identification information of a location registration area managed by a communication network system. A location-registration requesting unit transmits location-registration request information for requesting a location registering device to perform a new location registration when the second identification information is updated by a movement of a mobile terminal.
摘要:
According to some embodiments, systems for improved blower fans are provided. In some embodiments, systems may include a casing comprising an inlet to accept a fluid and an outlet to evacuate the fluid. The systems may further comprise an impeller disposed within the casing, comprising a hub and one or more impeller blades coupled to the hub. In some embodiments, the inlet of the casing may be shaped to reduce the amount of fluid that evacuates the casing via the inlet due to pressure within the casing.
摘要:
A low molecular weight vegetable composition comprising a seed of Milk Thistle which are heated with far infrared rays, for example, using a vessel comprising ceramics and then brewed with brewing bacteria such as "Koji" fungus, digestive enzyme, protein hydrolase or a precursor giving said enzyme or said protein hydrolase.
摘要:
A layer 2 switch network system includes a terminal, an edge switch, and a Radius server that notifies the edge switch of a temporary MAC address allocated to the terminal. The edge switch stores therein swap data for associating the temporary MAC address with a real MAC address. When receiving a MAC frame from the terminal, the edge switch replaces the real MAC address of a source set in the MAC frame with the temporary MAC address of the source. When transmitting a MAC frame to the terminal, the edge switch replaces the temporary MAC address of a destination set in the MAC frame with the real MAC address of the destination.