摘要:
A technique is disclosed, by which it is possible to achieve the reduction of power consumption of each wireless node and to perform efficient access control in wireless communication system. According to this technique, a given period with a beacon transmitted from a gateway (GW) 100 at the foremost position is divided to an active period where each wireless node (P2P tag) transmits and receives a frame and a sleep period where transmitting and receiving of the frames are stopped. Further, the active period is divided to a plurality of timeslots each with a fixed length, and the period is partitioned to sub-periods where each type of a GW, a fixed node (P2P-S tag), and a mobile node (P2P-M tag) can transmit frames respectively. Each of the P2P tags selects a timeslot at random from the period for each type, and after waiting for a waiting period at random at the selected timeslot, it transmits a frame including information to identify the selected timeslot or the waiting period in addition to its own ID.
摘要:
A technique is disclosed, by which it is possible to achieve the reduction of power consumption of each wireless node and to perform efficient access control in wireless communication system. According to this technique, a given period with a beacon transmitted from a gateway (GW) 100 at the foremost position is divided to an active period where each wireless node (P2P tag) transmits and receives a frame and a sleep period where transmitting and receiving of the frames are stopped. Further, the active period is divided to a plurality of timeslots each with a fixed length, and the period is partitioned to sub-periods where each type of a GW, a fixed node (P2P-S tag), and a mobile node (P2P-M tag) can transmit frames respectively. Each of the P2P tags selects a timeslot at random from the period for each type, and after waiting for a waiting period at random at the selected timeslot, it transmits a frame including information to identify the selected timeslot or the waiting period in addition to its own ID.
摘要:
Disclosed is a technique to prevent a collision in a state that radio communication devices are congested. According to the technique, in the state that the radio communication devices are congested, one of the radio communication devices becomes a representative node and transmits a representative node advertisement message. When the representative node has received a data packet after transmission of the representative node advertisement message, it transmits a response confirmation message. When a radio communication device, which was not decided as the representative node, has become a normal node and received the representative node advertisement message, it transmits a data packet. Then, when receiving a confirmation message after transmission of the data packet, the radio communication device stops data packet transmission during the next active period.
摘要:
A technology for providing an access network system that can reduce the load of a connection authentication of a connection to an access network, upon dividing authentication into the connection authentication of the connection to the access network and a connection authentication of a connection to an external IP network, is disclosed. According to the technology, a first base station device 104a and a second base station device 104b are included. The first base station device is connected to a mobile node 101. The first base station device receives a first authentication request from the mobile node, transmits the first authentication request to an authentication device 102, and receives a first authentication result from the authentication device. The second base station device is newly connected to the mobile node by movement of the mobile node after the mobile node and the first base station device are connected. The second base station device receives a second authentication request including identifying information of the first base station device from the mobile node and transmits the second authentication request to the first base station device. Upon receiving the second authentication request, the first base station device transmits the first authentication result to the second base station device.
摘要:
The present invention provides a technique to freely select ISP of connection destination for each subscriber terminal while maintaining various advantages when using VLAN, such as accomplishment of inexpensive and simple arrangement and achieving of high-speed communication, and to ensure reliable communication between the subscriber terminal and ISP, and also to cope with Nomadic connection. According to this technique, an access network 3 is provided to achieve ISP connection, by which the subscriber terminal 1 can make access to a given network such as Internet. The access network comprises an ISP side terminal device 6, a subscriber station device 7, and a subscriber side terminal device 9. The transfer of a layer 2 level using VLAN tag can be accomplished between the ISP side terminal device and the subscriber station device (a first network 4), and between the subscriber station device and the subscriber side terminal device (a second network 5). To the frame to be transferred in the first network, a frame header including VLAN tag added at the transmission in the second network is added.
摘要:
Provided is a biometric authentication system capable of preventing spoofing attacks even if leakage of key information and a registration conversion template occurs. A communication terminal device (300) calculates secret key information k′ which is exclusive OR of key information k of the registration biological information and masked value c′ which is randomly selected from a predetermined error correction code group, and calculates verified information c′″ which is exclusive OR of sent information c″ and value c′. A biometric authentication device (500) calculates exclusive OR of authentication biological information, information k′, and registration conversion template w, as information c″, wherein the template w is exclusive OR of information x, information k, and authentication parameter c randomly selected from the code group; and performs biometric authentication on the basis of a degree of matching between information c′″ corresponding to information c″, and the parameter c.
摘要:
Provided is a biometric authentication system capable of preventing spoofing attacks even if leakage of key information and a registration conversion template occurs. A communication terminal device (300) calculates secret key information k′ which is exclusive OR of key information k of the registration biological information and masked value c′ which is randomly selected from a predetermined error correction code group, and calculates verified information c′″ which is exclusive OR of sent information c″ and value c′. A biometric authentication device (500) calculates exclusive OR of authentication biological information, information k′, and registration conversion template w, as information c″, wherein the template w is exclusive OR of information x, information k, and authentication parameter c randomly selected from the code group; and performs biometric authentication on the basis of a degree of matching between information c′″ corresponding to information c″, and the parameter c.