WO2006001420A1 - 通信システム及び通信装置 - Google Patents
通信システム及び通信装置 Download PDFInfo
- Publication number
- WO2006001420A1 WO2006001420A1 PCT/JP2005/011735 JP2005011735W WO2006001420A1 WO 2006001420 A1 WO2006001420 A1 WO 2006001420A1 JP 2005011735 W JP2005011735 W JP 2005011735W WO 2006001420 A1 WO2006001420 A1 WO 2006001420A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication
- key
- proximity
- communication means
- communication device
- Prior art date
Links
- 230000006854 communication Effects 0.000 title claims abstract description 659
- 238000004891 communication Methods 0.000 title claims abstract description 657
- 230000004044 response Effects 0.000 claims abstract description 24
- 238000012545 processing Methods 0.000 abstract description 30
- 230000006870 function Effects 0.000 description 73
- 238000000034 method Methods 0.000 description 24
- 230000008569 process Effects 0.000 description 18
- 239000003999 initiator Substances 0.000 description 17
- 238000010586 diagram Methods 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 2
- 230000005674 electromagnetic induction Effects 0.000 description 2
- 238000010521 absorption reaction Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004907 flux Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000010355 oscillation Effects 0.000 description 1
- 230000010363 phase shift Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/24—Radio transmission systems, i.e. using radiation field for communication between two or more posts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
Definitions
- the present invention relates to a communication system and a secure communication device capable of transmitting and receiving data by wireless communication.
- the session key is communicated.
- the key may be eavesdropped and decrypted by a device with a wide-area communication function used by a third party, so the session key strength is increased by increasing the key length.
- devices with wide-area communication function High processing power is needed!
- the present invention has been made in view of the above problems, and an object of the present invention is to easily identify a communication partner even if the processing capability of the communication device is not high, and to securely share a session key between the two. It is to provide a new and improved communication system and communication apparatus that can be used.
- the first communication device transmits electromagnetic waves to adjacent external communication devices.
- Proximity active communication means that sends inquiry signals and waits for a response to the inquiry signal;
- Wide area communication means that can communicate via electromagnetic waves in a wider range than the communication range of the proximity active communication means;
- Proximity active communication Switching means to switch to one of the means or wide-area communication means; and a pair of asymmetric encryption key and decryption key, corresponding to a pair of encryption key and the encryption key
- Communication means proximity passive communication Wide area communication means that is wider than the communicable area of the stage, and can communicate via electromagnetic waves in a range; switching means for switching to either one of the proximity passive communication means or the wide area communication means; and generating a random number , A session key generating means for generating a session key using the random number; and an encryption means for encrypting the session key; and the second communication device also transmits the first communication device power.
- the encryption key is used to encrypt the session key into an encrypted session key and the encrypted communication key is transmitted to the first communication device; the first communication device uses the decryption key to A communication system is provided that decrypts the encrypted session key into a session key and transmits a communication switching request signal requesting the second communication device to switch to the wide area communication means for communication. It is.
- the proximity active communication means transmits the identification information assigned to the proximity active communication means together with the encryption key to the proximity passive communication means; the proximity passive communication means sends the identification information assigned to the proximity active communication means to the proximity passive communication means.
- the wide area communication device provided in the first communication device and the second communication device.
- the stage may get the identification information of the communication partner.
- a communication device an inquiry signal is transmitted to an adjacent external communication device via an electromagnetic wave, and the inquiry signal is transmitted.
- Proximity active communication means that waits for the response of the communication;
- Wide communication means wider than the communicable area of the proximity active communication means!
- Switching means for switching to one of the communication means;
- asymmetric key generation for generating a pair of encryption key and a decryption key corresponding to the encryption key, with a pair of asymmetric encryption key and decryption key Means to use the decryption key to decrypt the encrypted session key transmitted by the external communication device and to request the external communication device to switch to the wide area communication means for communication.
- Communication switching request A communication device is provided that is characterized by transmitting a signal.
- the proximity active communication means may be configured to transmit the identification information assigned to the proximity active communication means together with the encryption key to the external communication device.
- the proximity active communication means transmits the identification information assigned to the proximity active communication means together with the encryption key to the external communication device; the identification information assigned to the external communication device is the encryption key key At the same time, when the proximity active communication means receives from the external communication apparatus, the wide area communication means provided in the communication apparatus and the external communication apparatus may be configured to acquire identification information as a communication partner! / ,.
- the second communication device receives an inquiry signal from a nearby external communication device, and the inquiry signal
- a proximity passive communication means for transmitting a response signal that responds to
- a wide area communication means capable of communicating via electromagnetic waves in a wider range than the communication range of the proximity passive communication means
- a proximity passive communication means or a wide area communication means A switching means for switching to one of the communication means;
- a session key generating means for generating a random number and generating a session key using the random number; and an encryption key means for encrypting the session key; And encrypts the session key into the encryption session key using the encryption key transmitted from the external communication device, and transmits the encrypted session key to the first communication device;
- Communication equipment From to and receives the communication switching request signal for requesting to communicate by switching to the wide area communication means
- a communication device is provided.
- the proximity passive communication means may receive the identification information assigned to the external communication device together with the encryption key.
- the proximity passive communication means receives the identification information assigned to the external communication device together with the encryption key; the proximity passive communication means receives the identification information assigned to the proximity passive communication means in the encryption session.
- the communication device and the wide area communication means provided in the external communication device should be configured to acquire the identification information that is the communication partner.
- FIG. 1 is an explanatory diagram showing a schematic configuration of a communication system according to the present embodiment.
- FIG. 2 is a block diagram showing a schematic configuration of a secure communication apparatus that works on the present embodiment.
- FIG. 3 is a block diagram showing a schematic configuration of a secure communication apparatus that works on the present embodiment.
- FIG. 4 is a block diagram showing a schematic configuration of an active communication unit that works on the present embodiment.
- FIG. 5 is a sequence diagram showing an outline of a series of communication processes in the communication system according to the present embodiment.
- FIG. 6 is an explanatory diagram showing an outline of proximity communication between devices equipped with a secure communication function according to the present embodiment.
- FIG. 7 is an explanatory diagram showing an outline of secure communication establishment processing by proximity communication between devices equipped with a secure communication function according to the present embodiment.
- FIG. 8 shows proximity communication between devices equipped with a secure communication function, which is similar to the present embodiment. It is explanatory drawing which shows the outline of the secure communication establishment process by.
- FIG. 1 is an explanatory diagram showing a schematic configuration of a communication system according to the present embodiment.
- the communication system includes at least a plurality of devices 10 (10a, 10b,..., 10j) equipped with a secure communication function.
- secure communication prevents the eavesdropping or falsification by third-party secure communication function-equipped devices 10 when information is transmitted and received between the different secure communication function-equipped devices 10, and the confidentiality and integrity of information. This means that information is exchanged in a protected state without harming.
- one or more of the secure communication function-equipped device 10a to the secure communication function-equipped device 10f may be a reader / writer. is necessary.
- NFC communication technology Near Field Communication technology
- IC card integrated circuit card
- reader / writer using electromagnetic waves of the reader / writer power.
- the NFC communication technology described above is based on a third-party device 10 with a secure communication function because the distance between devices is as narrow as approximately 10cm compared to wireless communication such as Bluetooth and wireless LAN. If the physical security such as eavesdropping is difficult, security is excellent In addition, it has a different property from the conventional communication technology in which devices equipped with a secure communication function capable of NFC communication are automatically updated when they approach each other.
- the communication system according to the present embodiment will be described by taking as an example a case where a wireless communication function using NFC or Bluetooth is provided.
- the present invention is not limited to such an example, and any other Even when a wireless communication protocol is employed, the present invention can be implemented.
- NFC uses a carrier wave of a single frequency with another device 10 with secure communication function, and is a communication protocol for proximity communication using electromagnetic induction.
- ISM International Scientific Medical
- near field communication means communication that allows devices that communicate with each other to communicate within a distance of approximately 10 cm, and is performed by devices that communicate with each other (or the housing of the device, etc.). Communication is also included.
- Wide-area communication means communication that enables a distance longer than the communicable distance (approximately 10 cm) of the above-mentioned proximity communication. For example, in Bluetooth, the distance between communicating devices is within 10 m. Is possible.
- NFC communication in two communication modes. There are two modes of communication, passive mode and active mode. Here, the above two communication modes are described. First, among the secure communication function-equipped devices 10a to 10f shown in FIG. 1, for example, between the secure communication function-equipped devices 10a and 10b. Focus on communications.
- one of the secure communication function-equipped devices 10a and 10b (for example, the secure communication function-equipped device 10a) is an electromagnetic wave generated by itself (corresponding carrier wave). Modulate.
- the secure communication function-equipped device 10a transmits data to the secure communication function-equipped device (for example, the secure communication function-equipped device 10b) that is the other secure communication function-equipped device.
- the onboard device 10b can send data and respond to the device 10a with the secure communication function by load-modulating the electromagnetic wave (corresponding to the carrier wave) generated by the device 10a with the secure communication function.
- any of the devices 10a and 10b equipped with the secure communication function is used. It also transmits data by modulating the electromagnetic wave it generates (corresponding to the corresponding carrier wave).
- an apparatus that first outputs an electromagnetic wave to start communication and takes control of the communication is generally called an initiator.
- the initiator transmits a command (request) to the communication partner, and the communication partner returns a response (response) to the command, and the near field communication is performed.
- the initiator communicates with the communication partner that returns a response to the command from the initiator.
- targets are collectively called targets.
- the secure communication function-equipped device 10e shown in Fig. 1 starts outputting electromagnetic waves and starts communication with the secure communication function-equipped device 10a
- the secure communication function-equipped device 10e is the initiator
- the target is the device with secure communication function 10a.
- the secure communication function-equipped device 10j shown in FIG. 1 is a shaker and the secure communication function-equipped device 10g is a target
- the secure communication function-equipped device 10j which is an initiator, emits electromagnetic waves.
- the device 10j with secure communication function outputs data continuously and modulates the electromagnetic wave output by itself to transmit data to the target device 10g with secure communication function.
- the device 10g with secure communication function transmits data to the device 10j with secure communication function by load-modulating the electromagnetic wave output from the device 10j with secure communication function as an initiator.
- the device 10j with the secure communication function as an initiator transmits data
- the device starts outputting the electromagnetic wave itself and modulates the electromagnetic wave, thereby mounting the secure communication function as the target.
- the device 10j with secure communication function stops the output of electromagnetic waves after the data transmission is completed.
- the target device with secure communication function 10g also transmits data
- the device starts outputting the electromagnetic wave itself, and modulates the electromagnetic wave to transmit the data to the target device with secure communication function 10j.
- the device with secure communication function 10g stops the output of electromagnetic waves after data transmission is completed.
- Secure communication establishment processing that is powerful in the present embodiment is executed using the proximity communication by NFC described above.
- the secure communication establishment process is a communication start session in which a predetermined process is performed at the start of communication when starting secure data communication between devices. Yong.
- the secure communication establishment process which is important for this embodiment, uses the characteristic that the NFC communicable area is narrow and limited, and provides more security than the conventional secure communication establishment process. It is a communication start session that can be improved.
- the device 10 with a secure communication function can transmit data to another device 10 with a secure communication function that is about 10m away. it can. Therefore, when the secure communication function-equipped device 10 tries to execute the secure communication establishment process by wide area communication, there is a risk of eavesdropping by a third party existing in the communicable area.
- FIG. 2 is a block diagram showing an outline of a secure communication device that works on this embodiment.
- the secure communication device 20 includes an active communication unit 101 capable of NFC communication, an asymmetric key generation unit 102, a decoder 103, a wide area communication unit 104, , A communication device including an encryption / decryption Z decoder 105 and a switching unit 111.
- the secure communication device 20 is a device provided inside or outside the secure communication function-equipped device 10. With the communication function of the secure communication device 20, the device 10 with the secure communication function can perform data communication with the outside.
- the active communication unit 101 is an initiator having the above-described NFC communication function, and generates an electromagnetic wave to a passive communication unit that is a target described later. Furthermore, the active communication unit 1 In 01, an ID used for near field communication or wide area communication is pre-assigned and stored. As shown in FIG. 2, the active communication unit 101 is assigned an ID (IDA) “A”. The ID is not limited to the active communication unit 101, and may be stored in any unit as long as it has storage means. The ID assigned to the active communication unit 101 is not necessarily limited to IDA, and An ID may be given.
- the asymmetric key generation unit 102 generates an asymmetric key having a pair of an encryption key and a decryption key.
- the plaintext (data) encrypted with the above encryption key (hereinafter sometimes referred to as a public key) is one decryption key (hereinafter referred to as a private key) generated as a set. ) Unless it can be decrypted! / ,.
- the encryption key is transmitted to the passive communication unit 106 of the target secure communication device, and the encryption key used when the session key is transmitted. Used for keys.
- the passive communication unit 106 and session key will be described later.
- the encryption key and the decryption key generated by the asymmetric key generation unit 102 are based on a public key encryption method such as RSA, elliptic curve encryption, or El Gamal encryption.
- a public key encryption method such as RSA, elliptic curve encryption, or El Gamal encryption.
- an electronic certificate conforming to an international standard such as X.509 is sent together with the encryption key by PKI (Public Key Infrastructure). Even if it is good.
- the asymmetric key generation unit 102 that works according to the present embodiment has been described by taking as an example the case of generating an asymmetric encryption key and decryption key.
- the present invention is not limited to this example. This is also possible when generating a symmetric encryption key and decryption key (the encryption key and decryption key may be collectively described as a common key).
- the decryptor 103 decrypts encrypted data such as an encrypted session key received by the active communication unit 101 with the decryption key generated by the asymmetric key generation unit 102. If the received encrypted data is an encrypted session key, it becomes a session key when it is decrypted, and the session key is a common key for decrypting encryption key Z when communicating in the wide area communication unit 104 described later. It becomes.
- the encryption Z decryption process using a common key is based on the private key encryption method, and is several hundred to several thousand times faster than the encryption key Z decryption process using a public key or private key. fast. But Therefore, the processing load on the device is smaller in the encryption Z decryption process using the common key.
- the wide area communication unit 104 has a function of transmitting and receiving data by wide area communication such as Bluetooth. When transmitting data by wide area communication, it is necessary to specify the ID of the other party assigned in advance (for example, IDB) and transmit it.
- IDB the ID of the other party assigned in advance
- the encryption Z decryptor 105 decrypts the data received by the wide area communication unit 104 using the session key decrypted by the decryptor 103.
- the encryption Z decoder 105 encrypts data for transmission from the device 10 with secure communication function to another device 10 with secure communication function.
- the encrypted data is transmitted to the outside via the wide area communication unit 104.
- the switching unit 111 controls the operation of the active communication unit 101 and the wide area communication unit 104, and switches the communication means according to a response from the outside. For example, when there is a response from the decryptor 103 that the encrypted session key has been decrypted, the switching unit 111 controls the communication functions of the active communication unit 101 and the wide area communication unit 104, and the near field communication power is also wide. Switch to communication (handover). Note that switching between proximity communication and wide-area communication, which is useful in this embodiment, will be described later.
- FIG. 3 is a block diagram showing a schematic configuration of a secure communication apparatus that works on the present embodiment.
- the secure communication device 22 includes a passive communication unit 106 capable of NFC communication, an encryptor 107, a random number generator 108, and a wide area communication unit 109.
- the communication device includes an encryption Z decoder 110 and a switching unit 112.
- the secure communication device 22 is a device provided inside or outside the secure communication function-equipped device 10 as in the description of the secure communication device 20.
- the passive communication unit 106 shown in FIG. 3 is a target having the above-described NFC communication function, and can receive and respond to the electromagnetic wave having the initiator power described above. Alternatively, the passive communication unit 106 can receive an electromagnetic wave from the initiator, generate its own electromagnetic wave, and respond.
- the passive communication unit 106 is pre-assigned and stored with an ID used in near field communication or wide area communication. As shown in Fig. 3, the passive communication unit 106 has an ID "B" (IDB) is assigned. Note that the ID is not limited to the passive communication unit 106, and may be stored in any part as long as it has a storage means. The ID assigned to the passive communication unit 106 is not necessarily limited to the IDB, but any ID. May be given.
- the encryptor 107 encrypts the generated data such as a session key using the encryption key transmitted from the active communication unit 101 of the initiator and received by the target passive communication unit 106. Data is transmitted to the passive communication unit 106.
- the random number generator 108 randomly generates a random number having a predetermined digit power.
- the generated random number is used as the bit pattern of the session key (hereinafter sometimes referred to as random number). Because random numbers are always generated randomly, it is difficult for a third party to guess the session key bit pattern.
- the random number generator 108 is, for example, a circuit that also has a hardware capability for generating a true random number by sampling a high-frequency oscillation circuit, but is limited to this example.
- the present invention can be implemented even in the case of a computer program in which one or more module isotropic forces that generate pseudorandom numbers based on a seed that is an input bit pattern are configured.
- the wide area communication unit 109 the encryption Z decryptor 110, and the switching unit 112 that are relevant to the present embodiment
- the secure communication device 20 and the secure communication device 22 that are useful in the present embodiment have been described by way of example. However, the secure communication device 20 and the secure communication device 22 are not limited to such examples.
- the communication device 22 (initiator and target) may be configured as a single unit.
- FIG. 4 is a block diagram showing a schematic configuration of an active communication unit that works on the present embodiment.
- the passive communication unit 106 shown in FIG. 3 is configured in substantially the same manner as the active communication unit 101, and thus detailed description thereof is omitted.
- the active communication unit 101 which is useful in the present embodiment includes an antenna 301, a receiving unit 303, a demodulating unit 305, a decoding unit 307, a data processing unit 309, an encoding unit.
- Part 311, a selection unit 313, an electromagnetic wave output unit 315, a modulation unit 317, a load modulation unit 319, a control unit 321, and a power supply unit 323 are provided.
- the antenna 301 constitutes a closed loop coil, and outputs an electromagnetic wave when the current flowing through the coil changes.
- a current flows through the antenna 301 as the magnetic flux passing through the coil as the antenna 301 changes.
- the receiving unit 303 receives the current flowing through the antenna 301, performs at least tuning and detection, and outputs it to the demodulation unit 305.
- the demodulator 305 demodulates the signal supplied from the receiver 303 and supplies it to the decoder 307.
- the decoding unit 307 decodes, for example, a Manchester code as a signal supplied from the demodulation unit 305 and supplies data obtained as a result of the decoding to the data processing unit 309.
- the data processing unit 309 performs predetermined processing based on the data supplied from the decoding unit 307.
- the data processing unit 309 transmits data to be transmitted to another device to the encoding unit 3.
- the encoding unit 311 encodes the data supplied from the data processing unit 309 into, for example, a Manchester code, and supplies the encoded data to the selection unit 313.
- the selection unit 313 selects either the modulation unit 317 or the load modulation unit 319, and outputs the signal supplied from the encoding unit 311 to the selected one.
- the selection unit 313 selects the modulation unit 317 or the load modulation unit 319 according to the control of the control unit 321.
- the control unit 321 causes the selection unit 313 to select the modulation unit 317 when the communication mode is the active mode or when the communication mode is the passive mode and the active communication unit 101 is the initiator.
- the selection unit 313 selects the load modulation unit 319.
- the signal output from the encoding unit 311 is supplied to the load modulation unit 319 via the selection unit 313 when the communication mode is the passive mode and the active communication unit 101 is the target.
- the signal is supplied to the modulation unit 317 via the selection unit 313.
- the electromagnetic wave output unit 315 receives a carrier wave (electromagnetic wave) of a predetermined single frequency from the antenna 301.
- a current for radiating is supplied to the antenna 301.
- the modulation unit 317 modulates the carrier wave as the current that the electromagnetic wave output unit 315 flows to the antenna 301 according to the signal supplied from the selection unit 313.
- an electromagnetic wave whose carrier wave is modulated in accordance with the data output from the data processing unit 309 to the encoding unit 311 is radiated from the antenna 301.
- the load modulation unit 319 changes the impedance when the coil is viewed as the antenna 301 from the outside according to the signal supplied from the selection unit 313.
- another device outputs an electromagnetic wave as a carrier wave and an RF field (magnetic field) is formed around the antenna 301
- the impedance when the coil is viewed as the antenna 301 is changed.
- the surrounding RF field also changes.
- the carrier wave as an electromagnetic wave output from another device is modulated according to the signal supplied from the selection unit 313, and the data output from the data processing unit 309 to the encoding unit 311 outputs the electromagnetic wave. Sent to other devices.
- amplitude modulation (ASK (Amplitude Shift Keying)) can be adopted as a modulation method in modulation section 317 and load modulation section 319.
- the modulation method in the modulation unit 317 and the load modulation unit 319 is not limited to ASK, and PSK (Phase Shift Keying), QAM (Quadrature Amplitude Modulation), etc. can be adopted.
- the amplitude modulation degree is not limited to numerical values such as 8% to 30%, 50%, 100%, and a suitable one may be selected.
- the control unit 321 controls each block constituting the active communication unit 101.
- the power supply unit 323 supplies necessary power to each block constituting the active communication unit 101.
- FIG. 4 the line indicating that the control unit 321 controls each block constituting the active communication unit 101 and the power supply unit 323 supplies power to each block constituting the secure communication function-equipped device 1 are shown. The illustration of the line indicating this is omitted because the figure becomes complicated.
- the decoding unit 307 and the encoding unit 311 process the Mantilester code.
- the present invention is not limited to this example, and the decoding unit 307 and the encoding unit 311 In addition to Manchester codes, it is possible to select and process one of several types of codes such as modified mirrors and NRZ.
- the active communication unit 101 can be configured without providing the selection unit 313, the electromagnetic wave output unit 315, and the modulation unit 317.
- the power supply unit 322 obtains power from, for example, an external electromagnetic wave received by the antenna 301.
- the device 10 with a secure communication function that is useful in the present embodiment has a configuration that enables communication using one or more communication protocols as described above. ing. Therefore, NFC communication is one of multiple communication protocols.
- NFC for example, ISO / IEC (International Organization for Standardization) that regulates the communication of IC cards.
- FIG. 5 is a sequence diagram showing an outline of a series of communication processes in the communication system according to the present embodiment.
- the secure communication function-equipped device 10a and the secure communication function-equipped device 1 Ob perform communication processing, it is necessary to first establish secure communication by proximity communication. Therefore, in order to perform near field communication, the secure communication function-equipped device 10a and the secure communication function-equipped device 10b are moved in advance to a range in which near field communication is possible.
- FIG. 6 is an explanatory diagram showing an outline of proximity communication between the secure communication function-equipped device 10a and the secure communication function-equipped device 10b, which are useful in the present embodiment.
- the secure communication function-equipped device 10a and the secure communication function-equipped device 1 Ob approach each other within a distance of about 10 cm, for example, both devices can perform near field communication. Within the range, secure communication is established between the device with secure communication function 10a and the device with secure communication function 10b, and data communication can be performed over a wide area.
- the secure communication function-equipped device 10a shown in Fig. 6 is a mobile phone.
- the functional device 10b is a headset for a mobile phone, but is not limited to a powerful example.
- the above headset is a device that has a speaker and a microphone, and can communicate directly with the mobile phone by transmitting and receiving voice data without directly placing the mobile phone on the ear.
- FIGS. 7 and FIG. 8 are explanatory diagrams showing the outline of the secure communication establishment process by the proximity communication between the devices 10 with the secure communication function according to the present embodiment.
- FIG. 7 there are a secure communication function-equipped device 10a that is an initiator, and a secure communication function-equipped device 10b and a secure communication function-equipped device 10a that are targets.
- the device 10a with secure communication function emits electromagnetic waves to the outside world.
- the secure communication function-equipped device 10a can detect, for example, a change in the magnetic field generated by itself if it is 1% or more. In other words, the secure communication function-equipped device 10a determines that the change is a response by the secure communication function-equipped device 10 if the change in the magnetic field by the secure communication function-equipped device 10 from the outside is 1% or more. Can do.
- the secure communication function-equipped device 10b can absorb 4% of the magnetic field (or electromagnetic wave) generated by the secure communication function-equipped device 10a.
- the device 10b with secure communication function can respond to the device 10a with secure communication function by reflecting the absorbed magnetic field so that the generated magnetic field is changed by 1% or more.
- the secure communication function-equipped device 10b shown in FIG. 7 exists within a range in which close communication is possible, for example, about 10 cm away from the secure communication function-equipped device 10a.
- the secure communication function-equipped device 10c can absorb only 0.5% of the magnetic field generated by the secure communication function-equipped device 10a, and even if all of the absorption is reflected, the secure communication function is equipped. Since device 10a cannot detect a change in magnetic field, device 10c with secure communication function cannot respond to device 10a with secure communication function.
- the secure communication function-equipped device 10c exists in a range in which close communication with the secure communication function-equipped device 10a is not possible.
- the proximity communication that works in the present embodiment can only communicate within a limited narrow range, so that the communication range has a radius of 10m, etc. The risk of eavesdropping is low.
- the device 10a equipped with the secure communication function has an encryption key and its encryption key.
- a decryption key corresponding to the key is generated.
- the encryption key is transmitted from the device 10a with the secure communication function to the outside through a magnetic field. Therefore, as shown in Fig. 8 (a), both the secure communication function-equipped device 10b and the secure communication function-equipped device 10c can receive data both within and outside the range where proximity communication is possible.
- the secure communication function-equipped device 10c responds to the secure communication function-equipped device 10a even if it receives the encryption key as described in Fig. 7. I can't. Therefore, only the device with secure communication function 10b can encrypt and return the session key generated by itself to the device with secure communication function 10a.
- the session key that works with the present embodiment is a disposable key used when data communication is performed using wide area communication. Therefore, a new session key is generated like a one-time password every predetermined time, every communication session, and so on.
- the session key first generated with a random number only needs to be concealed until a subsequent session key is newly generated. Therefore, the key length of the encryption key generated by the asymmetric key generation unit 102 is not decrypted in a short time of, for example, 1 second until the session key is generated and shared by both devices 10 with secure communication function. If length It is enough. In other words, the secure communication establishment process must be completed in a short time in order not to give time for the first session key, which is confidential information, to be decrypted by a third party. Even if the first session key is eavesdropped, a session key with higher security strength is generated at the next timing, and the first session key is thrown away, so there is a risk that the first session key will be misused. What! /
- step S501 the active communication unit 101 of the device with secure communication function 10a performs polling (inquiry processing), and the passive communication unit of the device with secure communication function 10b. 106 receives the polling, and transmits a response to the polling to the active communication unit 101 in step S502.
- the active communication unit 101 receives the response and generates an encryption key and a decryption key, of which the encryption key and the active communication are generated.
- the ID (for example, NFCID) assigned to the unit 101 is transmitted (S503). Note that the N FCID corresponds to, for example, IDA or IDB described in FIGS.
- a random number is randomly generated by the random number generator 108 (S504).
- the generated random number is used as the session key as described above.
- the encryptor 107 encrypts the generated session key with the encryption key already received (S505).
- the encrypted session key (encrypted session key) is transmitted to the active communication unit 101 together with an ID (eg, NFCID) assigned to the passive communication unit 106 (S506).
- the decryptor 103 decrypts the encrypted session key with the already generated decryption key (S507), and obtains the session key. obtain.
- the passive communication unit 106 When the active communication unit 101 receives the ID from the passive communication unit 106, the passive communication unit 106 (secure communication function-equipped device 10b) that is the communication partner can be specified. In addition, the passive communication unit 106 uses the ID received together with the encryption key as the active communication unit 10 that is the communication partner. 1 (Secure communication function-equipped device 10a) can be identified.
- the decrypted session key is transmitted to the encryption key Z decoder 105, and the ID of the passive communication unit 106 received by the active communication unit 101 is transmitted to the wide area communication unit 104.
- the ID of the active communication unit 101 received by the passive communication unit 106 is transmitted to the wide area communication unit 109, and the session key generated by the random number generator 108 is transmitted to the encryption key decryptor 110. Therefore, it is possible to specify the communication partner between the wide area communication unit 104 and the wide area communication unit 109.
- the switching unit 111 communicates with the passive communication unit 106 via the active communication unit 101.
- a switching request to switch to (for example, a communication switching request signal or a media handover request) is transmitted (S508).
- Bluetooth communication has a higher transmission rate, and large-capacity data can be transmitted more quickly and efficiently than NFC communication. Since the possible range is wide, it is beneficial to switch to the near-field communication capability wide-area communication, such as when a mobile phone is used as a handset with a headset.
- communication information necessary for wide area communication is exchanged between the two devices 10 equipped with the secure communication function.
- communication information necessary for wide area communication for example, a Bluetooth Device address for identifying a communication partner in wide area communication can be exemplified.
- the passive communication unit 106 transmits a response to the switching request from the active communication unit 101 (for example, a media handover response) to the active communication unit 101 ( S509), the active communication unit 101 receives the response.
- the active communication unit 101 for example, a media handover response
- the secure communication function-equipped device 10a switches (handover) from proximity communication by the active communication unit 101 to wide-area communication such as Bluetooth by the wide-area communication unit 104 (S511). Furthermore, the secure communication function-equipped device 10b also switches from the proximity communication performed by the passive communication unit 106 to the wide-area communication (node over) by the wide-area communication unit 109 (S510).
- both the secure communication function-equipped device 10a and the secure communication function-equipped device 10b Since the session key can be shared, secure communication is established, and the near field communication ends between the active communication unit 101 and the passive communication unit 106 (S512).
- the wide area communication unit 104 and the wide area communication unit 109 can identify each other and perform data communication without specifying the communication partner from the user. .
- the wide area communication unit 104 and the wide area communication unit 109 can identify the communication partner by using the identification information (for example, NFCID) of the communication partner already acquired in the proximity communication. Data communication is not performed with a communication partner other than the identification information. Therefore, it is possible to prevent erroneous communication in which data communication is erroneously performed with the communication partner.
- the identification information for example, NFCID
- the proximity communication is first performed without complicated settings for secure communication. Only one device 10 with secure communication function in the possible area can be identified and the session key can be exchanged safely. In addition, switching from near field communication to wide area communication is possible, and using the session key, the communicable area is wider than near field communication and safe communication can be performed in wide area communication with a higher communication speed.
- the communication partner equipment 10 with secure communication function
- the communication partner that communicates over a wide area
- session keys for near field communication data communication is performed with an unspecified secure communication function equipped device 10. This makes it possible to easily identify the communication partner and perform data communication.
- the key length of the encryption key that conceals the session key exchanged between devices 10 with the secure communication function is the encryption key after the encryption key is transmitted.
- An establishment process can be executed.
- the key pair of the encryption key and the decryption key which is useful for the present embodiment, may be generated as necessary, and digital certification of the key pair is not necessarily required, so it is troublesome registration. It is possible to omit the setting procedure.
- the series of processes described above can be executed by dedicated hardware or software.
- the programs that make up the software are installed on a general-purpose computer or microphone computer.
- the program can be recorded in advance on a storage device such as a hard disk drive (HDD) or ROM built in the computer.
- the program can be a flexible disk, a CD-ROM.
- V Compact Disc Read Only Memory
- MO Magnetic Optical
- DVD Digital Versatile Disc
- removable storage media such as semiconductor memory should be stored (recorded) temporarily or permanently. Can do.
- removable recording media can be provided as V, so-called packaged software.
- the program can be transferred to the computer wirelessly from a download site via an artificial satellite for digital satellite broadcasting, or LAN (Local Area Network) and the Internet can be transferred to a computer via a network, and the computer can receive the program transferred in this way and install it in the storage device.
- LAN Local Area Network
- the processing steps for describing a program for causing a computer to perform various processes are not necessarily processed in time series according to the sequence described in the sequence diagram shown in FIG. It does not need to be done, and includes processing that is executed in parallel or individually (for example, parallel processing or object processing).
- wireless communication is targeted.
- the present invention is not limited to a powerful example.
- the present invention can be applied to wired communication or communication in which wireless and wired are mixed.
- the asymmetric key generation unit 102, the decryption unit 103, the encryption Z decryption unit 105, the switching unit 111, and the like included in the secure communication device 20 are exemplified by the case where each unit also has hardware power.
- the present invention is not limited to a powerful example.
- at least one of the above parts may be a program composed of one or more modules or components.
- each part such as the encryptor 107, the random number generator 108, the encryption Z decryptor 110, and the switching unit 111 provided in the secure communication device 22 is composed of hardware.
- the present invention is not limited to a powerful example.
- at least one of the above parts may be a program composed of one or more modules or components.
- the secure communication device 20 and the secure communication device 22 have been described by way of examples in which different device forces are also configured.
- the present invention is not limited to such an example.
- the secure communication device 20 and the secure communication device 22 may be provided in the device 10 with the secure communication function.
- the present invention is applicable to communication systems and secure communication devices that can transmit and receive data by wireless communication.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Near-Field Transmission Systems (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020067027382A KR101128634B1 (ko) | 2004-06-28 | 2005-06-27 | 통신 시스템 및 통신 장치 |
EP05765153.1A EP1770900B1 (en) | 2004-06-28 | 2005-06-27 | Communication system and communication device |
US11/597,821 US8068784B2 (en) | 2004-06-28 | 2005-06-27 | Communication system and communication device |
HK07108204.8A HK1103939A1 (en) | 2004-06-28 | 2007-07-27 | Communication system and communication device |
US13/287,622 US8577293B2 (en) | 2004-06-28 | 2011-11-02 | Communication system and communication device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004190192A JP4670270B2 (ja) | 2004-06-28 | 2004-06-28 | 通信システム及び通信装置 |
JP2004-190192 | 2004-06-28 |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/597,821 A-371-Of-International US20070165852A1 (en) | 2004-02-14 | 2005-02-08 | Watermark detection |
US11/597,821 A-371-Of-International US8068784B2 (en) | 2004-06-28 | 2005-06-27 | Communication system and communication device |
US13/287,622 Continuation US8577293B2 (en) | 2004-06-28 | 2011-11-02 | Communication system and communication device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006001420A1 true WO2006001420A1 (ja) | 2006-01-05 |
Family
ID=35780737
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/011735 WO2006001420A1 (ja) | 2004-06-28 | 2005-06-27 | 通信システム及び通信装置 |
Country Status (7)
Country | Link |
---|---|
US (2) | US8068784B2 (ja) |
EP (1) | EP1770900B1 (ja) |
JP (1) | JP4670270B2 (ja) |
KR (1) | KR101128634B1 (ja) |
CN (1) | CN100586061C (ja) |
HK (1) | HK1103939A1 (ja) |
WO (1) | WO2006001420A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1855430A3 (en) * | 2006-05-12 | 2015-05-06 | Sony Corporation | System, device, method, computer program and recording medium for communication apparatus and for processing information |
US20150189463A1 (en) * | 2007-12-20 | 2015-07-02 | Koninklijke Philips N.V. | Switching between multiple coupling modes |
Families Citing this family (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4670270B2 (ja) * | 2004-06-28 | 2011-04-13 | ソニー株式会社 | 通信システム及び通信装置 |
KR100689504B1 (ko) * | 2005-03-29 | 2007-03-02 | 삼성전자주식회사 | 컨텐츠 전송 보호 장치 |
US8718554B2 (en) * | 2006-02-15 | 2014-05-06 | Microsoft Corporation | Means for provisioning and managing mobile device configuration over a near-field communication link |
US20070218837A1 (en) * | 2006-03-14 | 2007-09-20 | Sony Ericsson Mobile Communications Ab | Data communication in an electronic device |
JP4805739B2 (ja) * | 2006-07-07 | 2011-11-02 | 株式会社エヌ・ティ・ティ・ドコモ | 近距離無線通信端末及びセキュリティレベル設定方法 |
JP4983165B2 (ja) | 2006-09-05 | 2012-07-25 | ソニー株式会社 | 通信システムおよび通信方法、情報処理装置および方法、デバイス、プログラム、並びに記録媒体 |
US8335493B2 (en) * | 2006-11-10 | 2012-12-18 | Sony Ericsson Mobile Communications Ab | System and method for service selection in a portable device |
JP2008193265A (ja) * | 2007-02-01 | 2008-08-21 | Canon Inc | 画像処理システム、情報処理装置、画像処理装置及びそれらの制御方法、コンピュータプログラム |
DE102007023728A1 (de) * | 2007-05-22 | 2008-11-27 | Ford Global Technologies, LLC, Dearborn | Verfahren und Vorrichtung zur elektronischen Kommunikation zwischen wenigstens zwei Kommunikationsgeräten |
JP4952433B2 (ja) * | 2007-08-08 | 2012-06-13 | ソニー株式会社 | 情報処理装置および方法、並びに、情報処理システム |
US8929805B2 (en) | 2007-10-30 | 2015-01-06 | Nationz Technologies Inc. | System, method, and device for radio frequency communication |
CN101309142B (zh) * | 2008-05-20 | 2011-08-10 | 郝志勤 | 同时支持近距离和远距离通信的系统及方法 |
US8160498B2 (en) * | 2007-12-12 | 2012-04-17 | Broadcom Corporation | Method and system for portable data storage with integrated 60 GHz radio |
US8233841B2 (en) * | 2008-01-30 | 2012-07-31 | Ebay Inc. | Near field communication initialization |
GB2458635B (en) * | 2008-03-25 | 2012-06-13 | Selex Comm Ltd | A cryptographic communication terminal |
JP2009239573A (ja) * | 2008-03-27 | 2009-10-15 | Sharp Corp | 無線通信仲介装置,無線通信仲介プログラム,avシステム |
JP4877283B2 (ja) * | 2008-06-17 | 2012-02-15 | ソニー株式会社 | 通信装置、通信システム、通信方法、プログラム |
JP4894826B2 (ja) | 2008-07-14 | 2012-03-14 | ソニー株式会社 | 通信装置、通信システム、報知方法、及びプログラム |
FR2935572B1 (fr) * | 2008-08-28 | 2013-01-11 | Eric Andre Fouchard | Procedes securises de transmission et de reception de donnees entre terminaux comprenant des moyens de communication en champ proche, et terminaux correspondants |
JP5491015B2 (ja) * | 2008-09-25 | 2014-05-14 | Kddi株式会社 | 無線通信チャネルの設定のための仲介装置及びプログラム |
EP2175580A1 (en) * | 2008-10-13 | 2010-04-14 | Adeya SA | Encryption method for a wireless headset, and wireless headset |
JP2010130311A (ja) * | 2008-11-27 | 2010-06-10 | Sony Corp | 通信装置、通信方法、プログラム、および通信システム |
JP5332600B2 (ja) * | 2008-12-25 | 2013-11-06 | ソニー株式会社 | 情報処理装置、通信制御方法、プログラム、および情報処理システム |
US8831228B1 (en) * | 2009-08-28 | 2014-09-09 | Adobe Systems Incorporated | System and method for decentralized management of keys and policies |
US20110059692A1 (en) * | 2009-09-08 | 2011-03-10 | Electronics And Telecommunications Research Institute | Communications device using near field |
DK2319477T3 (da) | 2009-11-06 | 2012-04-23 | Hoffmann La Roche | Indretning til fyldning af en fleksibel forrådsbeholder i et undertryk-kammer |
EP2320621B1 (en) | 2009-11-06 | 2016-10-05 | F.Hoffmann-La Roche Ag | Method for establishing cryptographic communications between a remote device and a medical device and system for carrying out the method |
CN105282866B (zh) | 2010-02-26 | 2019-07-16 | Lg电子株式会社 | 电子设备及其操作方法 |
US8995965B1 (en) | 2010-03-25 | 2015-03-31 | Whatsapp Inc. | Synthetic communication network method and system |
US9628831B2 (en) | 2010-03-25 | 2017-04-18 | Whatsapp, Inc. | Multimedia transcoding method and system for mobile devices |
EP2561640A1 (en) * | 2010-04-21 | 2013-02-27 | ETH Zurich | Authenticated key exchange using distance bounding protocol |
JP5087666B2 (ja) * | 2010-09-30 | 2012-12-05 | 株式会社東芝 | 情報処理装置及び通信制御方法 |
US8744803B2 (en) * | 2010-09-30 | 2014-06-03 | Fitbit, Inc. | Methods, systems and devices for activity tracking device data synchronization with computing devices |
US8831817B2 (en) | 2011-03-07 | 2014-09-09 | Ford Global Technologies, Llc | Methods and apparatus for lost connection handling |
KR101760424B1 (ko) * | 2011-05-20 | 2017-07-31 | 엘지전자 주식회사 | 이동 단말기 및 그 제어방법 |
US9203609B2 (en) * | 2011-12-12 | 2015-12-01 | Nokia Technologies Oy | Method and apparatus for implementing key stream hierarchy |
ES2703610T3 (es) | 2011-12-15 | 2019-03-11 | Becton Dickinson Co | Enlace de telemetría de campo cercano para pasar un secreto compartido para establecer un enlace de comunicación de radio frecuencia seguro en un sistema de monitorización de la condición fisiológica |
CN103187993B (zh) * | 2011-12-31 | 2015-11-18 | 国民技术股份有限公司 | 一种通信方法及终端 |
JP5991733B2 (ja) * | 2012-03-05 | 2016-09-14 | キヤノン株式会社 | ネットワークシステム、情報処理装置、及び通信方法 |
JP5941300B2 (ja) * | 2012-03-05 | 2016-06-29 | キヤノン株式会社 | 情報処理装置、情報処理装置の制御方法、およびプログラム |
US10984415B2 (en) * | 2012-06-25 | 2021-04-20 | Li Tan | System and methods for using limit-use encrypted code to transfer values securely among users |
US20140011446A1 (en) * | 2012-07-03 | 2014-01-09 | Nokia Corporation | Communications Connection |
ES2837801T3 (es) | 2012-08-07 | 2021-07-01 | Nokia Technologies Oy | Control de acceso para memoria inalámbrica |
US10356640B2 (en) | 2012-11-01 | 2019-07-16 | Intel Corporation | Apparatus, system and method of cellular network communications corresponding to a non-cellular network |
US9414392B2 (en) | 2012-12-03 | 2016-08-09 | Intel Corporation | Apparatus, system and method of user-equipment (UE) centric access network selection |
ES2693337T3 (es) * | 2013-01-17 | 2018-12-11 | Intel IP Corporation | Aparato, sistema y método para comunicar información de red de acceso no celular sobre una red celular |
TW201432459A (en) * | 2013-02-01 | 2014-08-16 | Primax Electronics Ltd | Method of wireless communication between electrical device and computer host and computer system using the method |
EP2982216B1 (en) | 2013-04-04 | 2025-02-26 | Apple Inc. | Apparatus, system and method of user-equipment (ue) centric traffic routing |
DE102014101526A1 (de) | 2014-02-07 | 2015-08-13 | Aesculap Ag | Datenkommunikationsvorrichtung und Verfahren zur Datenkommunikation |
US9603014B2 (en) | 2014-04-29 | 2017-03-21 | Lsis Co., Ltd. | Power system |
KR102125562B1 (ko) * | 2014-06-18 | 2020-06-22 | 삼성전자주식회사 | 키 공유 방법 및 장치 |
JP6699550B2 (ja) * | 2014-07-15 | 2020-05-27 | ソニー株式会社 | 情報処理装置、情報処理方法、およびプログラム |
US12028705B2 (en) | 2014-11-20 | 2024-07-02 | Widex A/S | Secure connection between internet server and hearing aid |
US9503437B2 (en) * | 2014-12-12 | 2016-11-22 | Gn Resound A/S | Apparatus for secure hearing device communication and related method |
US9608807B2 (en) * | 2014-12-12 | 2017-03-28 | Gn Hearing A/S | Hearing device with communication protection and related method |
EP3032858B1 (en) * | 2014-12-12 | 2020-03-04 | GN Hearing A/S | Apparatus for secure hearing device communication and related method |
DK3032857T3 (da) * | 2014-12-12 | 2019-12-16 | Gn Hearing As | Høreapparat med kommunikationsbeskyttelse og relateret fremgangsmåde |
CN105049089A (zh) * | 2015-06-15 | 2015-11-11 | 成都中微电微波技术有限公司 | 带蓝牙模块的电子通信装置 |
US10104522B2 (en) * | 2015-07-02 | 2018-10-16 | Gn Hearing A/S | Hearing device and method of hearing device communication |
US9929779B2 (en) * | 2015-12-01 | 2018-03-27 | Maxim Integrated Products, Inc. | Power adaptive dual mode card emulation system for NFC and RFID application |
US10033760B2 (en) * | 2016-05-27 | 2018-07-24 | Apple Inc. | Secure wireless ranging |
DK3334190T3 (da) * | 2016-12-08 | 2021-11-15 | Gn Hearing As | Høreindretninger, brugertilbehørsindretninger og fremgangsmåde til opdatering af en høreindretningskonfiguration |
EP3334185B1 (en) | 2016-12-08 | 2021-06-02 | GN Hearing A/S | Hearing system, devices and method of securing communication for a user application |
US9883383B1 (en) * | 2017-01-27 | 2018-01-30 | Microsoft Technology Licensing, Llc | Secure near field communications |
JP6784198B2 (ja) * | 2017-03-09 | 2020-11-11 | トヨタ自動車株式会社 | 施解錠システム、キーユニット |
US10862543B2 (en) * | 2019-01-17 | 2020-12-08 | Capital One Services, Llc | Apparatus and method for wireless communication with improved reliability |
CN114697058B (zh) * | 2020-12-28 | 2023-08-04 | 华为技术有限公司 | 一种身份认证方法、电子设备及计算机可读存储介质 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000224156A (ja) * | 1999-01-27 | 2000-08-11 | Internatl Business Mach Corp <Ibm> | ネットワ―ク化普及環境における情報交換のための方法、装置及び通信システム |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04156118A (ja) * | 1990-10-19 | 1992-05-28 | Fujitsu Ltd | 移動通信秘話方式 |
EP0756397B1 (en) * | 1995-07-28 | 2003-06-25 | Hewlett-Packard Company, A Delaware Corporation | System and method for key distribution and authentication between a host and a portable device |
US7353396B2 (en) * | 1995-10-02 | 2008-04-01 | Corestreet, Ltd. | Physical access control |
FI108827B (fi) * | 1998-01-08 | 2002-03-28 | Nokia Corp | Menetelmä yhteyden suojauksen toteuttamiseksi langattomassa verkossa |
SE517204C2 (sv) * | 1998-01-30 | 2002-05-07 | Ericsson Telefon Ab L M | Förfarande och anordning för att etablera en krypterad förbindelse i ett mobiltelefonsystem |
JP4156118B2 (ja) | 1999-01-06 | 2008-09-24 | 臼井国際産業株式会社 | 空調装置 |
MY123388A (en) * | 1999-03-15 | 2006-05-31 | Sony Corp | Processing method and apparatus for encrypted data transfer |
US6871063B1 (en) * | 2000-06-30 | 2005-03-22 | Intel Corporation | Method and apparatus for controlling access to a computer system |
US7596223B1 (en) * | 2000-09-12 | 2009-09-29 | Apple Inc. | User control of a secure wireless computer network |
US20020094778A1 (en) * | 2001-01-18 | 2002-07-18 | Cannon Joseph M. | Bluetooth connection quality indicator |
JP2002344438A (ja) * | 2001-05-14 | 2002-11-29 | Nippon Telegr & Teleph Corp <Ntt> | 鍵共有システム及び装置並びにプログラム |
FI114062B (fi) * | 2001-06-08 | 2004-07-30 | Nokia Corp | Menetelmä tiedonsiirron turvallisuuden varmistamiseksi, tiedonsiirtojärjestelmä ja tiedonsiirtolaite |
KR100576558B1 (ko) * | 2001-06-12 | 2006-05-08 | 리서치 인 모션 리미티드 | 휴대용 데이터 통신 장치와의 교환을 위한 인코딩된메시지를 처리하는 시스템 및 방법 |
JP2003018148A (ja) * | 2001-07-05 | 2003-01-17 | Toshiba Corp | 無線データ通信装置及びそのデータ通信方法 |
JP3671881B2 (ja) * | 2001-07-18 | 2005-07-13 | ソニー株式会社 | 通信システムおよび方法、情報処理装置および方法、通信端末および方法、拡張装置、並びにプログラム |
JP4655439B2 (ja) * | 2001-09-13 | 2011-03-23 | ソニー株式会社 | 情報処理装置および方法、並びにプログラム |
US20030093663A1 (en) | 2001-11-09 | 2003-05-15 | Walker Jesse R. | Technique to bootstrap cryptographic keys between devices |
JP4168714B2 (ja) | 2001-12-17 | 2008-10-22 | ソニー株式会社 | 通信装置および方法、記録媒体、並びにプログラム |
US7155607B2 (en) * | 2002-02-21 | 2006-12-26 | Matsushita Electric Industrial Co., Ltd. | Method for authentication between apparatuses using challenge and response system |
EP1540906A4 (en) * | 2002-09-05 | 2006-11-15 | South Land Comm Pty Ltd | SYSTEM FOR DISTRIBUTING INTERNET MEDIA FLOWS, DATA AND TELECOMMUNICATIONS |
JP4092692B2 (ja) * | 2003-06-06 | 2008-05-28 | ソニー株式会社 | 通信システム、通信装置および通信方法、並びにプログラム |
US7158756B2 (en) * | 2003-06-25 | 2007-01-02 | Nokia Corporation | Method and system for establishing short-range service sessions |
US20050059396A1 (en) * | 2003-09-09 | 2005-03-17 | Chuah Mooi Choo | Communications protocol between a gateway and an access point |
JP4670270B2 (ja) * | 2004-06-28 | 2011-04-13 | ソニー株式会社 | 通信システム及び通信装置 |
US7359674B2 (en) * | 2005-05-10 | 2008-04-15 | Nokia Corporation | Content distribution & communication system for enhancing service distribution in short range radio environment |
WO2007053948A1 (en) * | 2005-11-10 | 2007-05-18 | Nortel Networks Limited | Wireless relay network media access control layer control plane system and method |
-
2004
- 2004-06-28 JP JP2004190192A patent/JP4670270B2/ja not_active Expired - Fee Related
-
2005
- 2005-06-27 US US11/597,821 patent/US8068784B2/en not_active Expired - Fee Related
- 2005-06-27 EP EP05765153.1A patent/EP1770900B1/en not_active Ceased
- 2005-06-27 CN CN200580020221A patent/CN100586061C/zh not_active Expired - Fee Related
- 2005-06-27 WO PCT/JP2005/011735 patent/WO2006001420A1/ja not_active Application Discontinuation
- 2005-06-27 KR KR1020067027382A patent/KR101128634B1/ko active Active
-
2007
- 2007-07-27 HK HK07108204.8A patent/HK1103939A1/xx not_active IP Right Cessation
-
2011
- 2011-11-02 US US13/287,622 patent/US8577293B2/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000224156A (ja) * | 1999-01-27 | 2000-08-11 | Internatl Business Mach Corp <Ibm> | ネットワ―ク化普及環境における情報交換のための方法、装置及び通信システム |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1855430A3 (en) * | 2006-05-12 | 2015-05-06 | Sony Corporation | System, device, method, computer program and recording medium for communication apparatus and for processing information |
US20150189463A1 (en) * | 2007-12-20 | 2015-07-02 | Koninklijke Philips N.V. | Switching between multiple coupling modes |
US9913077B2 (en) * | 2007-12-20 | 2018-03-06 | Koninklijke Philips N.V. | Switching between multiple coupling modes |
Also Published As
Publication number | Publication date |
---|---|
CN100586061C (zh) | 2010-01-27 |
US8068784B2 (en) | 2011-11-29 |
KR20070022113A (ko) | 2007-02-23 |
JP4670270B2 (ja) | 2011-04-13 |
EP1770900B1 (en) | 2018-08-08 |
EP1770900A4 (en) | 2013-09-11 |
US8577293B2 (en) | 2013-11-05 |
EP1770900A1 (en) | 2007-04-04 |
US20120052806A1 (en) | 2012-03-01 |
CN1969499A (zh) | 2007-05-23 |
HK1103939A1 (en) | 2007-12-28 |
KR101128634B1 (ko) | 2012-03-26 |
US20080020707A1 (en) | 2008-01-24 |
JP2006014076A (ja) | 2006-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4670270B2 (ja) | 通信システム及び通信装置 | |
JP4983165B2 (ja) | 通信システムおよび通信方法、情報処理装置および方法、デバイス、プログラム、並びに記録媒体 | |
US8832441B2 (en) | Mobile terminal, data communication method, and computer program | |
JP4610225B2 (ja) | 通信システムと装置並びに通信方法 | |
JP4092692B2 (ja) | 通信システム、通信装置および通信方法、並びにプログラム | |
CN1937455B (zh) | 通信系统、通信设备和通知方法 | |
JP4706702B2 (ja) | 通信システム、通信装置および通信方法、並びにプログラム | |
JP2009044575A (ja) | 通信装置、通信装置の通信方法、プログラム、記憶媒体 | |
JP2006526933A (ja) | 無線ネットワークに通信装置を登録する管理装置、通信装置、仲介装置、通信装置登録方法、プログラム、及び集積回路 | |
KR100856408B1 (ko) | 데이터 전송 방법 및 장치 | |
JP2006155190A (ja) | データ記憶装置、データ処理方法、記録媒体、およびプログラム | |
WO2012048538A1 (zh) | Nfc移动终端及其nfc安全支付的实现方法 | |
Asaduzzaman et al. | A security-aware near field communication architecture | |
JP2005323149A (ja) | 無線通信システム | |
JP4385293B2 (ja) | 無線通信システム | |
JP2009005278A (ja) | 無線通信装置及び無線通信システム | |
Panda | Preventing Man-in-the-Middle Attacks in Near Field Communication by Out-of-Band Key Exchange | |
EP4471630A1 (en) | Method for using an ambient internet-of-things reader device in a mobile communication network in order to communicate with an ambient internet-of-things tag device, ambient internet-of-things reader device, especially user equipment, system or mobile communication network, ambient internet-of-things tag device, program and computer-readable medium | |
CN112369059B (zh) | 近场通信论坛数据交换格式(ndef)消息 | |
Bhole et al. | Security in near field communication (nfc) strengths and weaknesses | |
Bhattacherjee | Improved Near Field Communication Protocol (INFCP) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11597821 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580020221.4 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005765153 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020067027382 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 1020067027382 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2005765153 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11597821 Country of ref document: US |