Patent application number | Description | Published |
20090044017 | SIGNATURE AND VERIFYING METHOD, AND SIGNATURE AND VERIFYING DEVICE - An RSA signature method is provided in which the length of a signature does not depend on the number of signature devices when multiple signature devices are related to the creation of the signature. A signature device i_{m} includes first conversion means SS | 02-12-2009 |
20090150670 | Communication node authentication system and method, and communication node authentication program - [Problems] When two communication nodes communicate with each other they more reliably confirm that the communication party is a correct one. | 06-11-2009 |
20100042493 | ADVERTISING DISTRIBUTION SYSTEM, ADVERTISING EFFECTIVENESS VALIDATION SERVER, ADVERTISING DISTRIBUTION METHOD, AND ADVERTISING EFFECTIVENESS VALIDATION PROGRAM - It is ensured that advertising information can be distributed and advertising effectiveness can be validated without increasing any burden on the store side. A distribution server | 02-18-2010 |
20100085969 | COMMUNICATION NETWORK, INFORMATION PROCESSOR AND ADDRESS ASSIGNING METHOD - A communication network of the present invention includes: a plurality of superordinate nodes | 04-08-2010 |
20100246809 | Information Processing System, Information Processing Method, and Information Processing Program - To provide an architecture information processing system having a small circuit size capable of reducing power consumption and cost, on which system a circuit simultaneously executing encryption processing and message authentication (falsification detection processing) can be mounted. An information processing system includes at least: a parameter storage section that retains an initialization vector used as a starting block of concatenation and an encryption key used for encryption; a one-way hash calculation section that executes a one-way hash calculation as a technique for realizing message authentication and functioning in place of the conventional common key block encryption (DES encryption) operation as an encryption operation section of a block encryption mode use section performing encryption processing and/or decryption processing as a CFB mode and/or an OFB mode; and a key overlay operation section that performs calculation for overlaying an encryption key retained in the parameter storage unit on data input to the encryption operation section. | 09-30-2010 |
20110010547 | SERVER AUTHENTICATION SYSTEM, SERVER AUTHENTICATION METHOD, AND PROGRAM FOR SERVER AUTHENTICATION - In order to complete an authentication process in shorter time in a case where there is a large number of clients which concurrently authenticate a server, the server in a server authentication system includes an address key allocation means for generating an identifier to identify each of the clients by a combination of addresses on a plurality of address spaces and allocating address keys to the respective addresses configuring the generated identifier, and a message authentication code generation means for generating message authentication codes corresponding to a message by using the address keys allocated by the address key allocation means. Each of the clients includes a server authentication means for authenticating the server based on the message authentication codes generated by the message authentication code generation means. | 01-13-2011 |
20130223627 | KEY DISTRIBUTION SYSTEM, KEY DISTRIBUTION METHOD, AND RECORDING MEDIUM - A key distribution system includes a server and terminal devices constructing an ad-hoc network and communicating with each other with information being encrypted by a key distributed from the server. The server obtains a predetermined attribute value desired as a communication counterparty by the terminal device from the terminal device, and obtains a plurality of keys corresponding to the obtained attribute values from a key managing information. The server obtains, among the plurality of obtained keys, m number of keys that maximize the posterior probability that the keys are stored in the terminal device having the same attribute value as the attribute value obtained from the terminal device and having the number of communications larger than a predetermined value, and transmits the m number of keys to the terminal device. | 08-29-2013 |
20130272520 | METHOD OF GENERATING KEY - According to a method of generating a key of the present invention, a first device and a second device are first brought into contact with one vibrator. In this state, the vibrator generates vibration. A first acceleration sensor provided in the first device and a second acceleration sensor provided in the second device detect the vibration. Subsequently, the first device notifies the second device of a first feature value based upon the detection result of the first acceleration sensor. The second device notifies the first device of a second feature value based upon the detection result of the second acceleration sensor. Then the first device compares the notified second feature value with the first feature value and generates a key based upon the comparison result. The second device compares the notified first feature value with the second feature value and generates a key based upon the comparison result. | 10-17-2013 |
20150030158 | SENSOR NETWORK, SENSOR MANAGEMENT SERVER, KEY UPDATING METHOD AND KEY UPDATING PROGRAM - A sensor network includes a sensor management server which is mutually connected with many sensor terminals. The sensor management server includes: a key delivery module for transmitting a key update message to the respective sensor terminals; a communication volume detection module for detecting a communication volume used for transmitting the key update message; and a multiplicity determination module for specifying a numerical value as a multiplicity, which represents the lower limit number of key update messages transmitted to the respective sensor terminals, according to the detected communication volume. The multiplicity determination module specifies the multiplicity such that the communication volume for transmitting or retransmitting the key update message takes the minimum value, and the key delivery module transmits the key update message by using the minimum communication volume that corresponds to the specified multiplicity. | 01-29-2015 |