Method of generating key

A technology of key generation and key generation device, applied in key distribution

Inactive Publication Date: 2013-09-04
NEC CORP +1
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Usually, the user of the device is not specified in the design process. If the unspecified user applies vibration as the premise, considering that there are individual differences in the amplitude and speed of the applied vibration, it is necessary to have a certain degree of vibration resistance. This has also become a constraint in the design of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of generating key
  • Method of generating key
  • Method of generating key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] like Figure 11 As shown, the first device 20A (device A) of this embodiment is the same as the first device 1 in the key generation system 100 described above except that the first vibrator 21A and the first vibrator control unit 22A are incorporated. Structure. The first vibrator 21A and the first vibrator control unit 22A correspond to the vibrator 4 and the vibrator control unit 5 in the key generation system 100 described above, respectively.

[0080] Similarly, if Figure 12 As shown, the second device 20B (device B) of this embodiment is the same as the second device 2 in the key generation system 100 described above except that the second vibrator 21B and the second vibrator control unit 22B are incorporated. Structure. The second vibrator 21B and the second vibrator control unit 22B correspond to the vibrator 4 and the vibrator control unit 5 in the key generation system 100 described above, respectively.

[0081] like Figure 11 as well as Figure 12 As ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of generating a key according to the present invention wherein one vibrator generates vibration with a first device and a second device having contact with the vibrator and a first acceleration sensor included in the first device and a second acceleration sensor included in the second device detect the vibration. Subsequently, the first device informs the second device of a first feature value based on the detection results of the first acceleration sensor and the second device informs the first device of a second feature value based on the detection results of the second acceleration sensor. Then, the first device compares the informed second feature value with the first feature value and generates a key on the basis of the comparison results and the second device compares the informed first feature value with the second feature value and generates a key on the basis of the comparison results.

Description

technical field [0001] The invention relates to the generation of keys for controlling the steps of a cryptographic algorithm. Background technique [0002] In order to transmit and receive data limited to that time between devices having a wireless interface, a secure and usable mutual authentication system is required. As examples of techniques associated with such a mutual authentication system, there are the following examples. [0003] As mutual authentication between devices having a wireless interface, for example, a technology using a PIN (Personal Identification Number) is known (hereinafter, this technology will be referred to as "related technology 1"). [0004] In addition, as shown in Patent Document 1, there is known a technique that detects that a button provided on a device is pressed, generates a unique group connection ID, and uses it as a common key (authentication key) for mutual authentication. Authentication (hereinafter, this technology is referred t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04M1/00H04M1/72412
CPCH04M2250/12H04M2250/64H04L9/0861H04M1/72412
Inventor 野田润关浩之中村嘉隆
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products