Abstract:
PROBLEM TO BE SOLVED: To provide a radio communication system in which tapping of a private key can be suppressed. SOLUTION: A radio device 10 and an antenna 11 are built in the mouse 60 of a personal computer and in this state, (n) radio waves are sent and received between radio devices 10 and 30 while the directivity of an array antenna 20 is switched to (n) directivities. The radio device 10 detects (n) first radio wave intensities corresponding to the (n) first radio waves received from the radio device 30 and generates a private key Ks1 composed of a bit series on the basis of the (n) detected first radio wave intensities. Further, the radio device 30 detects (n) second radio wave intensities corresponding to the (n) second radio waves received from the radio device 10 and generates a private key Ks2 composed of the same bit series with the private key Ks1 on the basis of the (n) detected second radio wave intensities. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a communication system in which tapping is prevented and the same private key is shared among a plurality of terminals. SOLUTION: An access point 10 performs radio communication with a terminal 30, generates a private key α and shares the generated private key α with the terminal 30. In addition, the access point 10 performs radio communication with a terminal 40, generates a private key β and shares the generated private key β with the terminal 40. The access point 10 calculates exclusive OR of the private keys α, β, generates a private key γ, encrypts the private key γ by each of the private keys α, β and generates encryption data E(α, γ), E(β, γ). Then, the access point 10 transmits the encryption data E(α, γ), E(β, γ) to each of the terminals 30, 40, the terminals 30, 40 decode the encryption data E(α, γ), E(β, γ) by each of the private keys α, β and acquire the private key γ. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a wireless communication system capable of suppressing tapping of a private key. SOLUTION: A wireless device 30 transmits/receives a predetermined radio wave to/from a wireless device 10 while switching the directivity of an array antenna 20 among a plurality of types. The wireless devices 10 and 30 detect the strength of a plurality of radio waves when the directivity of the array antenna 20 is switched among a plurality of types, and form private keys Ks1 and Ks2, respectively, based on the plurality of strengths thus detected. In this regard, the wireless device 30 switches the directivity of the array antenna 20 among a plurality of types such that private keys Ks1 and Ks2 different from a private key Ks3 formed in a tapping device 50 are formed. The wireless devices 10 and 30 perform wireless communication mutually by encrypting/decrypting data using the private keys Ks1 and Ks2 thus formed. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a system constituted so that a normal transmitter/receiver individually creates a secret key in secret based on irregular fluctuation of radiowave propagation path characteristics of radio communication and the radio communication with high security is performed by using the created secret key. SOLUTION: In the case of performing the radio communication by using the secret key, a signal for measurement is first transmitted from the respective radio stations 1, 2 to the other radio stations 2, 1, the signal for measurement which is transmitted from the other party and changed by the radio wave propagation path characteristics between the radio stations is received and time series of a delay profile is measured. Then, the secret keys are uniquely crated in the respective radio stations 1, 2 based on the delay profile and the communication is performed by using the shared secret keys. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a radio communications system capable of suppressing wiretapping of secret key. SOLUTION: While switching the directivity of an array antenna 20 to n pieces of directivity, n radio waves are transmitted/received between radio devices 10, 30. The radio device 10 detects n first radio wave intensity levels, corresponding to n first radio waves received from the radio device 30, applies rearrangement, based on an interleaving method to n detected first radio wave intensity levels and generates a secret key Ks1 consisting of a bit string, on the basis of n first rearranged radio wave intensity levels. The radio device 30, however, detects n second radio wave intensity levels, corresponding to n second radio waves received from the radio device 10, applies rearrangement, based on the interleaving method to n detected second radio wave intensity levels and generates a secret key Ks2 consisting of the same bit string as the secret key Ks1, on the basis of n second rearranged radio wave intensity levels. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a wireless device which can create a secret key to be used by a communication device which is connected or can be connected to a network. SOLUTION: When the directivity of an array antenna 40 whose directivity can be electrically switched is switched to j pieces of directivities; a wireless device 10 receives j pieces of electric waves from a wireless device 30 via an antenna 20, and then creates a first secret key based on the intensities of the j pieces of electric waves it received. Meanwhile, the wireless device 30 receives j pieces of electric waves from the wireless device 10 via the array antenna 40, and then creates a second secret key which is the same as the first one based on the intensities of the j pieces of electric waves it received. The wireless devices 10 and 30 supply the first and second secret keys to a personal computer 50 and an access point 60 via cables 1 and 2. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a radio communication system which can suppress the eavesdropping of a secret key. SOLUTION: While the directivity of an array antenna 20 is switched to the directivity of n pieces, n pieces of electric waves are transmitted and received between radio devices 10 and 30. Further, the radio device 10 detects the n pieces of first electric wave intensity corresponding to the first n pieces of electric waves received from the radio device 30. By carrying out a predetermined operation to the first detected electric wave intensity of n pieces, a secret key Ks1 composed of a bit stream is created on the basis of the first permutated electric wave intensity of n pieces which are performed by the predetermined operation. Further, the radio device 30 detects the n pieces of second electric wave intensity corresponding to the second n pieces of electric waves received from the radio device 10. By carrying out a predetermined operation to the second detected electric wave intensity of n pieces, a secret key Ks2 composed of the same bit stream with that of the first secret key Ks1 is created on the basis of the second permutated electric wave intensity of n pieces which are performed by the predetermined operation. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide MC-CDMA transmitters and receivers using a new orthogonal diffusion code in which the influence of delay waves appears only in a specific user. SOLUTION: An MC-CDMA system using a multi-carrier CDMA system comprises: the transmitter for multiplying the real-axis and imaginary-axis components of a transmission signal in a frequency region by sinusoidal signals that orthogonally cross since the amplitude is 1 and the period differs among users for diffusion and dividing into a plurality of orthogonal subcarriers for multiplexing and transmitting; and the receiver for multiplying the real-axis and imaginary-axis components of a transmission signal from the transmitter by sinusoidal signals that orthogonally cross since the amplitude is 1 and the period differs among users for inverse diffusion and for receiving the transmission signal. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To eliminate the need to provide an authentication server or authentication station for mutual authentication between a station and an access point, and to improve the security level. SOLUTION: The access station and access point store identification information on connection destinations and themselves, and also uniquely generate and store secret keys based upon radio wave propagation characteristics between radio stations. Then the access point encrypts its identification information with its secret key and transmits the identification information to the station, which deencrypts the received signal with the secret key and authenticates whether the deencrypted signal matches the identification information on the access point stored in its storage section. The station also encrypts its identification information with its secret key and transmits the encrypted information to the access point, which deencrypts the received signal with its secret key and authenticates whether the deencrypted signal matches the identification information stored in its storage section. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To make repair of a communication system itself, etc. unnecessary even when the number of devices is increased or decreased in the communication system which transmits information from devices distributed and arranged to a master unit by radio. SOLUTION: The master unit P transmits information indicating that a transmitting origin is the master unit and a routing setting signal r by broadcast. On receiving the routing setting signal r, each slave unit S attached to each device recognizes that hierarchy of self-unit is lower hierarchy by one from the transmitting origin and stores the fact and transmits the stored hierarchy and ID of the self-unit by broadcast in addition to the routing setting signal r. While the routing setting signal r is transmitted to a slave unit S at the end, each slave unit S recognizes the hierarchy of the self-unit and a high order slave unit S. Each slave unit S transmits information and IDs of each hierarchy to the master unit P by repeating operations for adding the hierarchy and the ID of the self-unit to the hierarchy and the ID transmitted from a lower hierarchy to be transmitted to a slave unit in upper hierarchy. The master unit P creates a routing tree on the basis of hierarchy and IDs of each slave unit S. COPYRIGHT: (C)2008,JPO&INPIT