Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method between proximity terminals, and method and terminal for delivering secret information

一种认证方法、终端间的技术,应用在接近的终端间的认证、隐匿信息的配送以及终端领域,能够解决加密处理大负担等问题

Inactive Publication Date: 2010-02-17
NEC CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, when one of the devices is a portable device, encryption processing requiring a large number of calculation steps may cause an excessive burden

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method between proximity terminals, and method and terminal for delivering secret information
  • Authentication method between proximity terminals, and method and terminal for delivering secret information
  • Authentication method between proximity terminals, and method and terminal for delivering secret information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Next, the best mode for carrying out the present invention will be described. In this embodiment, when devices equipped with short-range wireless communication technologies such as Bluetooth (registered trademark) and wireless LAN are connected to each other by short-range wireless communication, information related to security such as an authentication key and a secret key is converted into a barcode, and By exchanging information through this barcode (visible symbol), object authentication is performed, and at the same time, the encryption key used in the future short-range wireless communication is transmitted as confidential information.

[0039] Next, start the side machine for the program ( figure 1 10) and the response side machine ( figure 1 30) The case where a short-range wireless communication connection is performed will be described. First, the program starts the side machine ( figure 1 10) Use the authentication key generation part (key generator; figu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To easily and simply perform authentication and delivery of secret information between devices which perform a short-range wireless communication. When a device including a short-range wireless communication unit (20), a barcode creating unit(16), a barcode reading unit (17), and a barcode analyzing unit (18) is connected to a device including a short-range wireless communication unit (40), a barcode creating unit (36), a barcode reading unit (37), and a barcode analyzing unit (38) for performing the short-range wireless communication, interaction is performed in such a manner that security information such as an authentication key and an encryption key is converted into a barcode, for recognition by other party. Authentication of the other party is performed through the interaction usingthis barcode, and the encryption key to be used for the subsequent short-range wireless communication is also delivered.

Description

technical field [0001] The present invention relates to an authentication method between close terminals, a distribution method of concealed information, a device, a system, and a program, and particularly relates to a characteristic technology in a communication path / communication method for authentication and distribution of concealed information. Background technique [0002] Near-field communication technologies such as Bluetooth (registered trademark), UWB (Ultra Wideband Wireless), and wireless LAN (Local Area Network: Local Area Network) are rapidly spreading. In recent years, in mobile phones and PDAs (Personal Digital Assistants: Personal Digital Assistants), communication functions using these technologies have been widely used. By connecting devices equipped with these short-range wireless communication technologies, and implementing dial-up connections, facsimile connections, and personal ad hoc connections, various data communications can be implemented wireless...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06K19/00
CPCH04L2209/80H04L9/3226H04L9/3273
Inventor 轻泽喜代子
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products