Abstract:
PROBLEM TO BE SOLVED: To reduce a risk that a secret key such as an authentication key is decoded when a station (STA) and an access point (AP) are authenticated. SOLUTION: A secret key common to the STA and the AP is uniquely generated beforehand, a challenge text is generated at the AP based on an access request from the STA, encrypted by the secret key and transmitted to the STA. At the STA, the encrypted challenge text is decoded by the secret key, further encrypted by a WEP key and returned to the AP. At the AP, the received encrypted challenge text is decoded by the WEP key to confirm coincidence between the decoded challenge text and and the challenge text transmitted from the STA. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a wireless communication system capable of generating private keys suited to the original characteristics of a transmission path. SOLUTION: The wireless communication system 100 is provided with wireless apparatuses 10, 30, an antenna 11, and an array antenna 20. In the case of generating the private keys on the basis of a plurality of strengths of radio waves received from an opposite party while changing the directivity of the array antenna 20 into a plurality of directivities, the wireless apparatuses 10, 30 detect the strength of each radio wave on the basis of a plurality of sampling values resulting from sampling each radio wave by a plurality of sampling timings and discarding the maximum value and the minimum value of the plurality of sampling values to detect a plurality of radio wave strengths corresponding to a plurality of radio waves, and apply multi-value processing to the plurality of radio wave strengths by discarding the maximum strength and the minimum strength among the plurality of radio wave strengths equal to or more than a threshold value. Then the wireless apparatuses 10, 30 use bit patterns multi-valued for the private keys Ks1, Ks2. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a wireless communication system capable of generating a private key through accurate multi-value coding. SOLUTION: The wireless communication system 100 is provided with wireless apparatuses 10, 30, an antenna 11, and an array antenna 20. The wireless apparatuses 10, 30 detect n radio wave strengths corresponding to n radio waves received from an opposite party and whose DC offset is eliminated while changing the directivity of the array antenna 20 into a plurality of directivities. In this case, the DC offset is eliminated for each packet and for each of real parts and imaginary parts of the radio waves. Then the wireless apparatuses 10, 30 apply multi-value processing to n sets of the radio wave strengths whose DC offset is eliminated depending on a threshold value to generate the private keys Ks1, Ks2. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a secret key generation method by which an effective secret key can be generated by reducing effect of noise existing between radio stations and by securing sufficient information. SOLUTION: When each radio station uniquely generates a secret key based on radio wave propagation line characteristics between radio stations, a known observing signal is firstly transmitted to the other station from each radio station, and the observing signal which has changed by the radio wave propagation line characteristics on the way is received on the other station side. A complex discrete Fourier transform is performed to a sample value of an analog signal observed by each radio station, each spectrum component is obtained, a numerous value number for quantizing based on an amplitude for a spectrum component larger than a threshold among spectrum components is set, and a phase reference for quantizing a phase is set. Thus, a quantized secret key indicated by the numerous value number by using the numerous value number and the phase reference is generated. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To generate a common secret key without binarizing receiving strength which is changed by radio wave propagation path characteristics with a threshold when the secret key is generated based on the radio wave propagation path characteristics between radio stations. SOLUTION: When the secret key is generated, based on the radio wave propagation path characteristics between a base station CS and a mobile station PS, the base station CS is comprised to have two antennas A and B. Signal intensity received by switching the antenna A and the antenna B is compared for each sampling time at the base station CS and the mobile station PS, respectively. The secret key is generated, based on the comparison information. When a binary series is generated, based on sizes of the signal strengths, a plurality of binary series candidates are generated while switching (0, 1) at positions in which the sizes are difficult to be compared. A key candidate with a minimum number of error bits is extracted from all the binary series candidates. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a radio communication system where a private key is generated while suppressing tapping. SOLUTION: While the directivity of an array antenna 20 is switched to n directivities and a carrier frequency is switched to m carrier frequencies, n radio waves are transmitted and received between radio equipments 10 and 30. Then, the radio equipment 10 detects n first radio wave intensities corresponding to n first radio waves received from the radio equipment 30, and generates a private key Ks1 consisting of a bit string based on the detected n first radio wave intensity. Then, the radio equipment 30 detects n second radio wave intensities corresponding to n second radio waves received from the radio equipment 10, and generates a private key Ks2 consisting of the same bit string as that of the private key Ks1 based on the detected n second radio wave intensity. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a radio communication system in which eavesdropping of a private key can be suppressed and the private key can be updated in a short time. SOLUTION: One radio device forms the private key Ks1 based on the characteristics of a transmission path between two radio devices when starting encryption communication. Another radio device updates a private key Ks2 by the same method as the updating of the private key Ks1 in the one radio device. The one radio device sequentially forms partial private keys Ks1-p1 to Ks1-pn based on the characteristics of the transmission path, sequentially replaces the partial PA1 to PAn of the private key Ks1 into partial private keys Ks1-p1 to Ks1-pn, and updates the private key Ks1. Moreover, the other radio device updates the private key Ks2 by the same method as the updating of the private key Ks1 in the one radio device. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a wireless communication system capable of accurately generating private keys by preventing mulfunction of wireless apparatuses. SOLUTION: The wireless communication system 100 is provided with wireless apparatuses 10, 30, an antenna 11, and an array antenna 20. The wireless apparatuses 10, 30 extract n-sets of radio wave strengths equal to or more than a threshold value whereby communication with the opposite party can be established and within the dynamic range of the wireless apparatuses 10, 30 from p-sets of radio wave strengths corresponding to p-sets of received radio waves by receiving p-sets of the radio waves from the opposite party while changing the beam pattern of the array antenna 20 into p sets of beam patterns after establishing communication with the opposite party. Then the wireless apparatuses 10, 30 apply multi-value processing to n-sets of the extracted radio wave strengths to generate the private keys Ks1, Ks2. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a wireless communication system in which one and the same private key can be produced between two wireless apparatuses. SOLUTION: The wireless communication system 100 is provided with wireless apparatuses 10, 30, an antenna 11, and an array antenna 20. The wireless apparatuses 10, 30 detect wave strengths of n radio waves received from an opposite party while changing the directivity of the array antenna 20 into a plurality of directivities and extract k-sets of the radio wave strengths equal to or more than a threshold value th1 among the detected n-sets of the radio wave strengths. Then the wireless apparatuses 10, 30 calculate an average of k-sets of the radio wave strengths as a threshold value th2, nullify a prescribed range of the radio wave strengths existing in the vicinity of the threshold value th2, use the threshold value th2 to apply multi-value processing to a plurality of remaining radio wave strengths thereby respectively generating the private keys Ks1, Ks2. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To collect and manage correct running information even if taking a train and getting off the train are repeated in a rolling stock running management system which is provided with a running information acquisition device, information transfer device, and operation information management device, sends running information to the operation information management device from the running information acquisition device by using the information transfer device as an intermediate, and manages the running information by the operation information management device. SOLUTION: Working start information is provided among the running information acquisition device, information transfer device, and operation information management device. The collection and transmission of the running information are controlled by the presence or absence of the working start information. Or, the repetition or dropout of the running information is prevented from being caused by addressing the running information whenever taking the train and getting off the train. COPYRIGHT: (C)2005,JPO&NCIPI