Abstract:
An authentication method for a group of devices connected to a network includes selecting the first controller as a coordinator, the coordinator being configured to manage a group key to be used in common in the group. The method includes generating the group key, and performing first mutual authentication and second mutual authentication. The method also includes sharing the group key with each device for which the first mutual authentication has been successful, and sharing the group key with each second controller for which the second mutual authentication has been successful. The method further includes encrypting transmission data by using the group key to generate encrypted data, generating, authentication data by using the group key, and simultaneously broadcasting a message to each device for which the first mutual authentication has been successful and each second controller for which the second mutual authentication has been successful.
Abstract:
A smart meter includes: a power supply control unit which causes stoppage of a supply of power passing through the smart meter to an television and so on, when an RD command to stop the supply is received; a first communication unit which performs a first communication through which the RD command is received; a second communication unit which performs a second communication; and a communication control unit which: causes the performance of the first communication before the RD command is received; and prohibit the performance of the first communication and cause only the performance of the second communication, after the RD command is received.
Abstract:
A smart meter includes: a power supply control unit which causes stoppage of a supply of power passing through the smart meter to an television and so on, when an RD command to stop the supply is received; a first communication unit which performs a first communication through which the RD command is received; a second communication unit which performs a second communication; and a communication control unit which: causes the performance of the first communication before the RD command is received; and prohibit the performance of the first communication and cause only the performance of the second communication, after the RD command is received.
Abstract:
A first controller generates a first group key, executes first mutual authentication with devices within a group, and shares the first group key with the devices that have succeeded in first mutual authentication. When a second controller joins the group, the first controller decides a coordinator that manages a group key used in common in the group. The first controller executes second mutual authentication with the coordinator, and shares the first group key with the coordinator when the second mutual authentication is successful. The coordinator performs encrypted communication within the group using the first group key, generates a second group key when valid time of the first group key is equal to or smaller than a predetermined value, executes third mutual authentication with the devices and a third controller, and updates the first group key of the devices and the third controller that have succeeded in the third authentication.
Abstract:
A content reproduction system includes an information processing terminal (102) and a secure device (103). The information processing terminal (102) receives a copyright protection application program (315) from an application distribution server (113). The copyright protection application program includes a first program having a first execution format executable in the information processing terminal (102) and a second program having a second execution format different from the first execution format and executable in the secure device (103). The second program is encrypted with a program key (515) held in the secure device (103). By extracting and executing the first program, the information processing terminal (102) extracts the second program and transmits the second program to the secure device (103). The secure device (103) receives the second program from the information processing terminal (102), decrypts the second program using a program key stored in a key storing unit (520), and executes the second program.
Abstract:
A new controller (supporting device authentication) is a controller which performs encrypted communication with a device which has succeeded in mutual authentication using an electronic certificate, and the controller includes: a determining unit that determines whether or not a communication target device with which communication is to be performed is an authentication support device that supports the mutual authentication; a functional restriction unit that, when the communication target device is determined not to be the authentication support device by the determining unit, imposes a functional restriction on one or more functions of the communication target device which are operable by the new controller (supporting device authentication); and a communication unit which performs communication in plain text with the communication target device with the functional restriction imposed by the functional restriction unit.