摘要:
On ad hoc networks in which connection relationships among communication terminals constantly change, the processing load increases when authentication is performed each time a connection relationship changes. According to this invention, when communication terminals possess the same common key, mutual authentication is conducted with that common key, and when communication terminals do not possess the same common key, mutual authentication is conducted with a public key. Communication terminals that conducted mutual authentication exchange and retain a common key that they selected and common keys received from other communication terminals. When neither communication terminal possesses a common key at authentication, one terminal creates a common key and distributes it to the other terminal, and when one terminal has a common key it creates that common key and distributes it to the other terminal. Further, a common key possessed by a communication terminal corresponding to a relay node is broadcast periodically.
摘要:
The present invention relates to a common key sharing method in an ad hoc network constituted by wireless communication terminals implemented with relay functions thereon, comprising a common key generating step in which a first wireless communication terminal responsible for relaying generates a common key, a common key distributing step in which the first wireless communication terminal responsible for relaying distributes the common key to a second wireless communication terminal within a wireless communication area, and a transferring step in which the second wireless communication terminal which received the common key holds the common key, and the second wireless communication terminal transfers the common key to a third wireless communication terminal within a wireless communication area, when the second wireless communication terminal is responsible for relaying. Accordingly, it is possible to share a common encryption key within the ad hoc network.
摘要:
The present invention relates to a common key sharing method in an ad hoc network constituted by wireless communication terminals implemented with relay functions thereon, comprising a common key generating step in which a first wireless communication terminal responsible for relaying generates a common key, a common key distributing step in which the first wireless communication terminal responsible for relaying distributes the common key to a second wireless communication terminal within a wireless communication area, and a transferring step in which the second wireless communication terminal which received the common key holds the common key, and the second wireless communication terminal transfers the common key to a third wireless communication terminal within a wireless communication area, when the second wireless communication terminal is responsible for relaying. Accordingly, it is possible to share a common encryption key within the ad hoc network.
摘要:
On ad hoc networks in which connection relationships among communication terminals constantly change, the processing load increases when authentication is performed each time a connection relationship changes. According to this invention, when communication terminals possess the same common key, mutual authentication is conducted with that common key, and when communication terminals do not possess the same common key, mutual authentication is conducted with a public key. Communication terminals that conducted mutual authentication exchange and retain a common key that they selected and common keys received from other communication terminals. When neither communication terminal possesses a common key at authentication, one terminal creates a common key and distributes it to the other terminal, and when one terminal has a common key it creates that common key and distributes it to the other terminal. Further, a common key possessed by a communication terminal corresponding to a relay node is broadcast periodically.
摘要:
A terminal to be connected to a network has: a data acquisition unit for acquiring first data from the network; an extraction unit for extracting second data regarding a physical quantity in accordance with the first data; a random number generation unit for generating a random number in accordance with the second data; and an enciphering unit for enciphering the first data in accordance with the random number. The terminal has further a counter unit for counting the number of the first data, wherein the random number generation unit generates a random number in accordance with the second data or a value counted by the counter unit.
摘要:
A terminal to be connected to a network has: a data acquisition unit for acquiring first data from the network; an extraction unit for extracting second data regarding a physical quantity in accordance with the first data; a random number generation unit for generating a random number in accordance with the second data; and an enciphering unit for enciphering the first data in accordance with the random number. The terminal has further a counter unit for counting the number of the first data, wherein the random number generation unit generates a random number in accordance with the second data or a value counted by the counter unit.
摘要:
A hash value generation device has a control part (120) that divides an inputted message into N message blocks of a predetermined data length (N being a natural number), repeats transformation processing a predetermined number R of rounds (R being a natural number larger than or equal to 2) for each of the message blocks, and repeats, N times, block cipher processing in which a value calculated in the transformation processing of R rounds for the n-th message block (n being a natural number) is used as key information for the (n+1)-th message block, to generate a hash value of the inputted message. In shift processing performed in the transformation processing of the control part (120), at least one odd number and at least one even number are included among numbers of bits by which a shift is performed.
摘要:
A system for storing data including first and second storage systems, each having a disk controller and plural disks under control of the disk controller. The first disk controller receives plural first I/O requests each including a different first disk ID from the other first I/O requests, and determines if the first disk ID indicates one of the second disks. If the first disk ID indicates one of the second disks, the first disk controller obtains an address of the second disk controller and a second disk ID of the second disks, and sends a second I/O request to the second disk controller based on the obtained address and disk ID. Plural second I/O requests, whose target second disk is different from each other based on the different first disk ID, are sent from the first storage system to the second storage system.
摘要:
An identification code management method and management system includes that the issue and distribution of an ID code having a message authentication code are managed thereby to efficiently and reliably manage a material object using the ID code. An electronic circuit chip with an ID code having a message authentication code stored in a read-only area is used as an identification tag. The information at an ID code order receiving terminal and an identification tag production factory terminal are consolidated and collectively managed at an ID code management terminal. Thereby, the ID code management terminal is inquired of highly confidential information or requested to process the information as required so that an ID code utilization terminal is not required to store the same information.
摘要:
The technology includes the steps of: associating material-object identification code identifying each individual material object with material-object information representing information about material object identified by identification code and storing identification code and material-object information in material-object information database in each of business categories; sending code and information stored in database in each business category; integrating items of information having same code with each other among codes and items of information received from database in each business category to generate integrated material-object information, associating identification code with integrated material-object information identified by code and storing identification code and integrated material-object information in integrated database; requesting to send integrated material-object information associated with given identification code; reading requested integrated material-object information from integrated database and sending integrated information to requester of integrated material-object information; and receiving and outputting sent integrated material-object information.