WO2010055924A1 - 秘密情報伝送方法、秘密情報伝送システム及び秘密情報送信装置 - Google Patents
秘密情報伝送方法、秘密情報伝送システム及び秘密情報送信装置 Download PDFInfo
- Publication number
- WO2010055924A1 WO2010055924A1 PCT/JP2009/069395 JP2009069395W WO2010055924A1 WO 2010055924 A1 WO2010055924 A1 WO 2010055924A1 JP 2009069395 W JP2009069395 W JP 2009069395W WO 2010055924 A1 WO2010055924 A1 WO 2010055924A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- shared information
- bit
- shared
- secret
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/4104—Peripherals receiving signals from specially adapted client devices
- H04N21/4126—The peripheral being portable, e.g. PDAs or mobile phones
- H04N21/41265—The peripheral being portable, e.g. PDAs or mobile phones having a remote control device for bidirectional communication between the remote control device and client device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/422—Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
- H04N21/42204—User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4367—Establishing a secure communication between the client and a peripheral device or smart card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/162—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing
- H04N7/163—Authorising the user terminal, e.g. by paying; Registering the use of a subscription channel, e.g. billing by receiver means only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to a secret information transmission method in which information to be kept secret (that is, secret information) including a master key which is a secret key used for encryption or the like is divided into a plurality of shared information and transmitted from the transmission side to the reception side.
- the present invention relates to a secret information transmission system and a secret information transmission device.
- secret information such as an encryption key is divided into a plurality of distributed information, and then transmitted from the transmission side to the reception side.
- the technique of the secret sharing method to transmit to is proposed.
- the secret sharing method is a method in which secret information is divided into a plurality of pieces of shared information, and the original information cannot be restored unless a certain number of these pieces are collected. Therefore, it is possible to speed up the arithmetic processing.
- the first apparatus transmits the first to n-th (n: arbitrary integer) shared information including i-bit (i; arbitrary integer) master key information. Generating, transmitting the first to n-th shared information to the second device by wireless communication, receiving the first to n-th shared information by the second device, and generating the i-bit master key This is a secret information transmission method to be restored.
- the second apparatus receives the first to n-th shared information r1 to rn, and sequentially matches or does not match the bit values with respect to the received first to n-th shared information r1 to rn.
- the secret information is restored by performing a logical operation based on the information, and the second device divides the restored secret information into i bits to obtain m pieces of first to m-th information rs1 to rsm.
- the i-bit master key is restored by performing a logical operation on the divided first to m-th information rs1 to rsm based on the match / mismatch of bit values.
- the first device In another secret information transmission method according to an aspect of the present invention, the first device generates shared information including i-bit (i; arbitrary integer) master key information, and the shared information is transmitted by wireless communication.
- the second device transmits a reception confirmation signal to the first device when the shared information is successfully received, and the master key is obtained from the shared information that has been normally received. This is a secret information transmission method to be restored.
- the first device transmits first to (n ⁇ 1) -th shared information r1 to r (n ⁇ 1) each consisting of a different j-bit random number to the second device, and the first device
- the reception confirmation signal corresponding to the 1st to (n-1) th distributed information is received, m-1 pieces of information f1 to f (m-1) each consisting of a different i-bit random number are generated, Bit values of the first to (n ⁇ 1) -th shared information corresponding to the reception confirmation signal are divided into i-bit information, the information f1 to f (m ⁇ 1), and the master key in order.
- a logical operation based on match / mismatch is performed to obtain m-th information fm, and information obtained by sequentially concatenating the information f1 to fm is transmitted to the second device as n-th shared information rn.
- the second apparatus receives the first to n-th shared information r1 to rn, and sequentially matches or does not match the bit values with respect to the received first to n-th shared information r1 to rn. And the second device divides the restored secret information into i bits to obtain m pieces of first to m-th information rs1 to rsm; The i-bit master key is restored by performing a logical operation on the divided first to m-th information rs1 to rsm in order based on match / mismatch of bit values.
- the first device generates shared information including master key information of i bits (i; any integer), and the shared information is transmitted by wireless communication.
- the second device transmits a reception confirmation signal to the first device when the shared information is successfully received, and the master key is obtained from the shared information that has been normally received. Is a method for transmitting secret information.
- the first device transmits the first to n-th shared information r1 to rn consisting of different j-bit random numbers to the second device, and corresponds to the first to n-th shared information.
- the reception confirmation signal is received, the logical operation based on the match / mismatch of the bit values in order with respect to the information obtained by dividing the first to n-th shared information corresponding to the reception confirmation signal for every i bits To generate the master key.
- the second apparatus receives the first to n-th shared information r1 to rn, and sequentially matches or does not match the bit values with respect to the received first to n-th shared information r1 to rn.
- the secret information is restored by performing a logical operation based on the information, the restored secret information is divided into i bits, m pieces of first to m-th information rs1 to rsm are obtained, and the divided first to m-th information is obtained.
- a logical operation is performed on the m-th information rs1 to rsm based on the match / mismatch of the bit values to restore the i-bit master key.
- the first device generates first to nth (n: arbitrary integer) shared information including an i-bit (i; arbitrary integer) master key.
- the first to n-th shared information is transmitted to a second device by wireless communication, and the second device receives the first to n-th shared information and restores the i-bit master key. It is a secret information transmission system.
- the second device performs an EXOR operation on the first to n-th shared information r1 to rn in order, and a transmission / reception means for receiving the first to n-th shared information r1 to rn.
- Secret information restoration means for restoring the j-bit secret information, and dividing the restored j-bit secret information into the m pieces to obtain the first to m-th information rs1 to rsm.
- Master key restoring means for restoring the i-bit master key by performing an EXOR operation on the first to mth information rs1 to rsm.
- the secret information transmitting apparatus generates m (m; a positive integer of 2 or more) random number information including random numbers of i (i; any positive integer) bits, and generates m A shared information generating unit that generates shared information including the random number information of the packet and the sequence number indicating the transmission order of the packets, and transmitting the shared information to the secret information receiving device via a wireless communication path, and the secret A transmission / reception unit that receives a reception confirmation signal for the shared information transmitted from the information reception device.
- the shared information generation unit does not receive the reception confirmation signal corresponding to the transmitted shared information within a certain time after the shared information is transmitted by the transmitting / receiving unit, the sequence number of the transmitted shared information and New shared information is generated from the same sequence number and m random number information that is newly generated, and the distributed information is transmitted within a certain time after the shared information is transmitted by the transceiver.
- new shared information is generated from the sequence number obtained by incrementing the sequence number of the transmitted shared information by 1 and m random number information newly generated,
- reception confirmation signals are received in the transmission / reception unit, (m-1) random number information newly generated and i Bit And (n ⁇ 1) * m random number information included in the first to (n ⁇ 1) th shared information corresponding to each of the first to (n ⁇ 1) th reception confirmation signals, And the sequence number obtained by incrementing the sequence number of the (n ⁇ 1) th shared information by 1 and generating the nth shared information, and the transmitting / receiving unit generates the nth shared information.
- n-th reception confirmation signal corresponding to the n-th shared information is not received within a certain time after the shared information is transmitted, (m ⁇ 1) pieces of random number information that is newly generated and A value obtained by performing a logical operation on the master key and (n-1) * m random number information included in the first to (n-1) th shared information, and a sequence of the nth shared information New n-th shared information is generated from the same sequence number as the number.
- the shared information generation unit receives a reception confirmation signal corresponding to the transmitted shared information within a predetermined time after the shared information is transmitted by the transmission / reception unit. If not, shared information is newly generated from the same sequence number as the sequence number of the shared information and m pieces of random number information that are newly generated, and after the shared information is transmitted by the transmission / reception unit, it is constant. When a reception confirmation signal corresponding to the transmitted shared information is received within the time, a new sequence number is added from the sequence number obtained by incrementing the sequence number of the shared information by 1 and the m random number information newly generated.
- the first to nth reception confirmation signals When the first to nth (n: positive integer greater than or equal to 2) reception confirmation signals are received by the transmitting / receiving unit, the first to nth reception confirmation signals are generated. It performs a logical operation of the n * m sets of random number information included from the first corresponding to, respectively the dispersion information of the n, to generate a master key for i bits, comprising.
- the secret information and a plurality of shared information using the secret information are configured by a long bit string, and the shared information is the first information. Since the master device can be restored when all of a plurality of shared information can be received on the second device side, transmission from the device to the second device (for example, transmission with low transmission power) It is possible to establish a communication situation in which a master key is not easily intercepted by a third party. Moreover, since it is possible to easily generate secret information of a long bit string and distributed information using the same by performing a logical operation based on simple bit value match / mismatch without using a complicated operation such as a hash function. The calculation processing time can be shortened and high-speed communication can be easily realized.
- FIG. 7 is a functional block diagram showing a secret key restoration unit 23A in FIG. 6. It is a flowchart which shows operation
- FIG. 2 is a configuration diagram illustrating an outline of the secret information transmission system according to the first embodiment of the present invention.
- This secret information transmission system is a digital home appliance (for example, a television receiver, hereinafter simply referred to as “TV”) using a digital-related technology in a home electric machine (hereinafter referred to as “home appliance”). ) 10 and a remote controller (hereinafter referred to as “remote controller”) 20 for remotely controlling the same, and a wireless communication system.
- TV television receiver
- home appliance home electric machine
- remote controller remote controller
- the TV 10 is connected to a communication network 11 such as the Internet, and has a configuration capable of transmitting and receiving information to and from other information terminals such as a personal computer (hereinafter referred to as “PC”).
- the TV 10 has a TV main body 12 such as a receiver, and a communication unit 13 is connected to the TV main body 12.
- the communication unit 13 transmits and receives information between the communication network 11 and the TV main body 12.
- the TV 10 is further provided with a shared information generation unit 14 and a transmission confirmation unit 15.
- a transmission / reception unit 16 is connected to the communication unit 13, the distributed information generation unit 14, and the transmission confirmation unit 15.
- the shared information generation unit 14 generates shared information r1, r2,..., Rn of a scheme different from the secret sharing method, and gives it to the first transmission / reception means (for example, transmission / reception unit) 16.
- a transmission confirmation unit 15 is connected to the shared information generation unit 14.
- the transmission / reception confirmation unit 15 confirms the transmission status and notifies the shared information generation unit 14 of the transmission status.
- the transmission / reception unit 16 performs short-range wireless communication with the remote controller 20 (for example, the used frequency is several GHz and the communication distance is about several meters).
- the remote controller 20 has a remote control main body 21 for remote control, and a second communication unit 22 is connected to the remote control main body 21.
- the remote controller 20 further includes a secret key restoration unit 23 and a reception confirmation unit 24.
- the communication unit 22, the secret key restoration unit 23, and the reception confirmation unit 24 are provided with a second transmission / reception unit (for example, a transmission / reception unit). ) 25 is connected.
- the communication unit 22 transmits and receives information between the remote control main body 21 and the transmission / reception unit 25.
- the shared key recovery unit 23 receives the shared information r1, r2,..., Rn sent from the TV 10 via the transmission / reception unit 25, the secret key restoration unit 23 obtains a secret key from the shared information r1, r2,.
- the reception confirmation unit 24 is connected to this.
- the reception confirmation unit 24 receives the shared information r1, r2,..., Rn sent from the TV 10 via the transmission / reception unit 25 and the secret key restoration unit 23, the reception confirmation unit 24 confirms the reception status and receives the reception confirmation notification signal ACK1. , ACK2,... ACKn are given to the transmitting / receiving unit 25.
- the transmission / reception unit 25 performs near field communication with the TV 10.
- FIG. 1 is a schematic configuration diagram showing details of the secret information transmission system according to the first embodiment of the present invention.
- the shared information generating unit 14 on the TV 10 side includes a shared information generating unit 30 and a secret information generating unit 40.
- the shared information generating means 30 generates first to nth shared information r1 to rn composed of random numbers of j bits (for example, 640 bits).
- the shared information generating means 30 includes a random generator 31 for generating first to (n-1) th shared information r1 to r (n-1) composed of random numbers of j bits, and first to (n-th)
- the exclusive OR (hereinafter referred to as “EXOR”) operation is sequentially performed on the shared information r1 to r (n ⁇ 1) of 1) and the secret information rs of j bits to obtain the n-th shared information rn of j bits.
- calculating means 32 to be obtained.
- the secret key restoring unit 23 on the remote controller 20 side is composed of secret information restoring means 50 and master key restoring means 60.
- the secret information restoring means 50 performs an EXOR operation on the received first to n-th shared information r1 to rn in order to restore the j-bit secret information rs.
- the secret information restoring means 50 is composed of n EXOR gates 51-1 to 51-n connected in cascade.
- the master key restoration means 60 divides the restored j-bit secret information rs into m pieces to obtain first to m-th information rs1 to rsm, and EXORs the divided first to m-th information rs1 to rsm. An i-bit master key rsm is restored by performing an operation.
- FIG. 3 is a functional block diagram showing the secret information generating means 40 in FIG.
- FIG. 4 is a functional block diagram showing the master key restoring means 60 in FIG.
- the master key restoration means 60 has a function of dividing the 640-bit secret information rs held in the data holding circuit 43 into five pieces and taking out the first to fifth information rs1 to rs5, and the taken out first to fifth pieces of information.
- the four pieces of EXOR gates 61-1 to 61-4 connected in cascade to restore the 120-bit master key rsm by performing an EXOR operation on the information rs1 to rs5.
- the random generator 41 In the shared information generation unit 14 on the TV 10 side, in the secret information generation unit 40 of FIG. 3, the random generator 41 generates the first to fourth information rs1 to rs4 composed of 128-bit random numbers, and the calculation unit 42 Thus, the EXOR operation of the following equation (1) is performed to obtain 128-bit fifth information rs5.
- Each 128-bit first to fifth information rs1 to rs5 is sequentially held in the data holding circuit 43, and 640-bit secret information rs is generated to be sent to the calculation means 32 in the shared information generation means 30 in FIG. give.
- first to fourth shared information r 1 to r 4 composed of random numbers of 640 bits are generated from the random generator 41 and given to the calculating means 32.
- the arithmetic means 32 performs an EXOR operation of the following expression (2) to obtain 640-bit fifth shared information r5.
- Each of the 640-bit first to fifth shared information r1 to r5 has sequence numbers (1), (2), (3), (4), (5) at the head, as shown in FIG. Is added to the transmission / reception unit 16 to be converted into a high-frequency radio wave and transmitted to the remote controller 20 in the order of sequence numbers.
- the remote controller 20 side when the first to fifth shared information r1 to r5 sent in the order of sequence numbers (1), (2), (3), (4), (5) are received in order by the transmitting / receiving unit 25.
- the received signal is sent to the reception confirmation unit 24 via the secret key restoration unit 23.
- the reception confirmation unit 24 returns the reception confirmation notification signals ACK1 to ACK5 to the TV 10 via the transmission / reception unit 25, respectively.
- the transmission / reception unit 16 on the TV 10 side receives the reception confirmation notification signals ACK 1 to ACK 5, it transmits them to the transmission confirmation unit 15.
- the transmission confirmation unit 15 receives the reception confirmation notification signals ACK1 to ACK5
- the transmission confirmation unit 15 determines that the transmission is successful, and sequentially transmits the next shared information r2 to r5 via the shared information generation unit 14 and the transmission / reception unit 16. That is, the second shared information r2 is transmitted when the transmission of the first shared information r1 is successful, the third shared information r3 is transmitted when the transmission of the second shared information r2 is successful, and so on. It transmits up to the fifth shared information r5.
- the transmission confirmation unit 15 fails to receive the reception confirmation notification signal ACK2 corresponding thereto, that is, the reception confirmation notification signal ACK2 has failed to be received.
- the shared information generating unit 14 and the transmitting / receiving unit 16 transmit the same shared information r2.
- the transmission confirmation unit 15 determines that the transmission is successful, and obtains the next third shared information r3 and the shared information generation unit 14 and Transmission is performed via the transmission / reception unit 16. Thereafter, the same shared information and reception confirmation notification signal are transmitted and received.
- the secret key restoration unit 23 on the remote controller 20 side stores the secret information restoration unit 50 in FIG.
- the EXOR gates 51-1 to 51-5 perform the EXOR operation of the following equation (3) on the received first to fifth shared information r1 to rn to restore the 640-bit secret information rs, and the master key It sends to the restoring means 60
- the restored 640-bit secret information rs is divided into five to obtain first to fifth information rs1 to rs5, and divided by the EXOR gates 61-1 to 61-4.
- the EXOR operation of the following equation (4) is performed on the first to fifth information rs1 to rs5, and the 128-bit master key rsm is restored.
- the TV 10 and the remote controller 20 perform transmission / reception by encrypting information using the master key rsm as a common key, and card settlement by the TV 10 is performed by remote control of the remote controller 20.
- the secret information rs and the first to fifth shared information r1 to r5 using the secret information rs are composed of a long bit string (eg, 640 bits), and the first to fifth shared information r1 to r5 are set as the TV 10
- the remote controller 20 is configured so that the master key rsm can be restored when the first to fifth shared information r1 to r5 are all received. Therefore, it is possible to establish a communication state in which the master key rsm is not easily intercepted by a malicious third party.
- the secret information rs of the long bit string and the fifth shared information r5 using the same can be easily generated by a simple EXOR operation without using a complicated operation such as a hash function. Therefore, the calculation processing time can be shortened and high-speed communication can be easily realized.
- the interference information r1 to r5 from the TV 10 to the remote controller 20 is received from the remote controller 20-1, the transceiver 20-2, etc. near the communication area 30.
- the TV 10 may fail to receive the reception confirmation notification signal ACK for notifying the TV 10 from the remote controller 20 that the transmission has been completed. Even in such a case, the same shared information is transmitted again. Therefore, the shared information r1 to r5 can be reliably received on the remote controller 20 side, and the reliability of secret information transmission can be improved.
- Example 2 Example 2
- FIG. 5 is a block diagram showing an outline of the secret information transmission system according to the second embodiment of the present invention. Elements common to those in FIG. 2 showing the first embodiment are denoted by common reference numerals.
- the reception confirmation unit 15 on the TV 10 side fails to receive a reception confirmation notification signal (for example, ACK2) from the remote controller 20, the same distribution is performed again as in the first embodiment.
- Information for example, r2
- different shared information r2 ' is transmitted depending on random number generation.
- the same serial number (2) is added to the first serial number, so that the remote controller 20 can easily recognize that the distributed signals r2 and r2 'have been retransmitted.
- Other configurations are the same as those of the first embodiment.
- FIG. 6 is a block diagram showing an outline of a secret information transmission system according to the third embodiment of the present invention. Elements common to those in FIG. 2 showing the first embodiment are denoted by common reference numerals.
- a TV 10A and a remote controller 20A having different configurations are provided.
- the TV 10A includes a TV main body 12 similar to that of the first embodiment, and a communication unit 13A, a distributed information generation unit 14A, and a transmission / reception unit 16A having different configurations from those of the first embodiment.
- the remote controller 20A includes a remote controller main body 21 similar to that of the first embodiment, and a transmission / reception unit 25A, a communication unit 22A, and a secret key restoration unit 23A having different configurations from those of the first embodiment.
- the communication unit 13A generates a secret key and outputs it to the shared information generation unit 14A.
- the communication unit 13A performs encrypted communication using a secret key when communicating with the remote controller 20A.
- Other functions of the communication unit 13A are the same as those of the communication unit 13 of the first embodiment.
- the shared information generation unit 14A receives the secret key from the communication unit 13A, generates the shared information including the secret key information, assembles it into a shared information packet, and requests transmission to the transmission / reception unit 16A.
- the transmission / reception unit 16A transmits the requested shared information packet with a transmission power lower than the transmission power of the normal packet, and further transmits a shared information packet when receiving a reception confirmation signal from the remote controller 20A. If the reception confirmation notification signal is not received within a certain time, the communication failure is output to the shared information generating unit 14A.
- Other functions of the transmission / reception unit 16A are the same as those of the transmission / reception unit 16 of the first embodiment.
- the transmission / reception unit 25A transmits the shared information packet to the secret key restoration unit 23A if it is a valid packet, and transmits a reception confirmation notification signal to the TV 10A.
- Other functions of the transmitting / receiving unit 25A are the same as those of the transmitting / receiving unit 20 of the first embodiment.
- the secret key restoration unit 23A restores the secret key from the received shared information packet and outputs it to the communication unit 22A.
- the communication unit 22A receives the secret key from the secret key restoration unit 23A, and performs encrypted communication when communicating with the TV 10A. Other functions of the communication unit 22A are the same as those of the communication unit 22 of the first embodiment.
- FIG. 7 is a functional block diagram showing the shared information generation unit 14A in FIG.
- the shared information generation unit 14A includes a random number generation unit 71, a shared information packet assembly unit 72, and a key buffer 73.
- the random number generation unit 71 generates a random number and outputs it to the shared information packet assembly unit 72.
- the key buffer 73 is a buffer capable of storing j-bit information.
- FIG. 8 is a functional block diagram showing the secret key restoration unit 23A in FIG.
- the secret key restoration unit 23A includes a secret key assembly unit 81, a temporary buffer 82, and a key buffer 83.
- the temporary buffer 82 is a buffer for storing received distributed information packets
- the key buffer 83 is a buffer for storing j-bit information.
- FIG. 9 is a flowchart showing the operation of the shared information packet assembling unit 72 in the shared information generating unit 14A of FIG.
- the shared information packet assembly unit 72 When the shared information packet assembly unit 72 receives the secret key from the communication unit 13A (step S1), it sets the sequence number to 1 and clears the key buffer 73 (step S2). Further, a j-bit random number is taken out from the random number generator 71 and used as distributed information (step S3), and a sequence number is added to the assembly and transmission unit 16A for transmission to a shared information packet (step S4). Then, the transmission / reception unit 16A waits for a transmission success or transmission failure signal (step S5). When the transmission success is received, information obtained by performing an EXOR operation on the distributed information successfully transmitted and the information in the key buffer 73 is stored in the key buffer 73.
- step S7 the process returns to step S3 to repeatedly generate and transmit the distributed information packet. If a transmission failure is received from the transmission / reception unit 16A in step S5, the process returns to step S3 to repeatedly generate and transmit a distributed information packet. In this case, the sequence number is maintained. If the sequence number is n in step S7, the last distributed packet transmission process is performed (steps S8 to S13).
- the distributed information packet assembling unit 72 takes out (m ⁇ 1) i-bit random numbers from the random number generating unit 71 and sets them as information f1 to f (m ⁇ 1), respectively (step S8). Further, the stored information is taken out from the key buffer 73 and divided into information of g1 to gm for every i bits from the top (step S9). Further, f1 to f (m ⁇ 1), g1 to gm, and the secret key are sequentially EXORed to generate i-bit information fm (step S10). Then, f1 to fm are sequentially connected (EXOR operation) to create the last shared information (step S11).
- the sequence number n is assigned to the last shared information to form a shared information packet, and the transmission / reception unit 16A is requested to transmit (step S12). Then, the transmission / reception unit 16A waits for a transmission success or transmission failure signal (step S13). When the transmission / reception unit 16A notifies the transmission success to this shared information packet, the process is terminated. When the transmission failure is notified, the process returns to step S8 to create and transmit the last shared information again.
- FIG. 10 is a flowchart showing the operation of private key assembly unit 81 in private key restoration unit 23A of FIG.
- the secret key assembly unit 81 waits for reception of the shared information packet (step S21).
- the sequence number is checked (step S22). If the sequence number is 1, the received shared information packet is stored in the temporary buffer 82 (step S23). Further, the key buffer 83 is cleared (step S24). Then, the process returns to step S21, that is, waiting to receive the shared information packet.
- the sequence number of the distributed information packet stored in the key buffer 83 is compared with the sequence number of the received shared information packet (step S25). If they do not match, the shared information of the shared information packet stored in the temporary buffer 82 and the information stored in the key buffer 83 are EXORed and stored in the key buffer 83 (step S26). Then, the received shared information packet is stored in the temporary buffer 82 (step S27).
- step S25 if they match, step S27 is executed.
- step S27 the sequence number is checked again (step S28). If the sequence number is other than n, the process returns to step S21 to wait for reception of the shared information packet. If the sequence number is n in step S28, the information stored in the key buffer 83 is divided into m pieces of information h1 to hm every i bits from the top (step S29). Further, the information h1 to hm is sequentially subjected to an EXOR operation to obtain an i-bit secret key (step S30). The secret key is output to the communication unit 22A, and the process ends (step S31).
- step S28 when the sequence number is n, step S29 and subsequent steps were performed. However, if the sequence number is n in step S28, the reception of the shared information packet is further waited for the time assumed for retransmission of the shared information packet, and if the shared information packet is received during that time, step S22 and subsequent steps are performed. If the shared information packet is not received during that time, step S29 and the subsequent steps may be performed. Thereby, it is possible to perform retransmission processing of the distributed information packet having the sequence number n.
- FIG. 11 is a block diagram showing an outline of a secret information transmission system according to the fourth embodiment of the present invention. Elements common to those in FIG. 6 showing the third embodiment are denoted by common reference numerals.
- a TV 10B and a remote controller 20B having different configurations are provided.
- the TV 10B includes a TV main body 12 similar to that of the third embodiment, and a communication unit 13B, a distributed information generation unit 14B, and a transmission / reception unit 16B having different configurations from those of the third embodiment.
- the remote controller 20B includes a remote control body 21 similar to that of the third embodiment, and a transmission / reception unit 25B, a communication unit 22B, and a secret key restoration unit 23B having different configurations from those of the third embodiment.
- the communication unit 13B obtains a secret key from the shared information generation unit 14B, and performs encrypted communication using the secret key when communicating with the remote controller 20B.
- Other functions of the communication unit 13B are the same as those of the communication unit 13 of the first embodiment.
- the shared information generation unit 14B When the shared information generation unit 14B is requested to acquire a secret key from the communication unit 13B, the shared information generation unit 14B generates shared information including random numbers. Then, the shared information generation unit 14B assembles this into a shared information packet, requests the transmission / reception unit 16B to transmit to the remote controller 20B, generates a secret key from the generated shared information, and outputs it to the communication unit 13B.
- FIG. 12 is a functional block diagram showing the shared information generation unit 14B in FIG.
- the shared information generation unit 14B includes a random number generation unit 71 and a key buffer 73 that are the same as those in the third embodiment, and a shared information packet assembly unit 72B that is different from the third embodiment. Other configurations are the same as those of the third embodiment.
- FIG. 13 is a flowchart showing the operation of the shared information packet assembling unit 72B in the shared information generating unit 14B shown in FIG. 12. Elements common to those shown in FIG. Yes.
- the shared information packet assembling unit 72B When the shared information packet assembling unit 72B requests a secret key from the communication unit 13B (step S41), it sets the sequence number to 1 and clears the key buffer 73 (step S2). Further, a j-bit random number is taken out from the random number generation unit 71 and used as shared information (step S3), a sequence number is added, and an assembly transmission / reception unit 16B is requested to transmit the shared information packet (step S4). Then, the transmission / reception unit 16B waits for a transmission success or transmission failure signal (step S5).
- step S42 the sequence number is checked (step S42). If the sequence number is n or less, the process returns to step S3 to further create and transmit a shared information packet. If the sequence number is larger than n in step S42, the stored information is taken out from the key buffer 73 and divided into information of g1 to gm for every i bits from the top (step S43). Then, g1 to gm are sequentially EXORed to generate an i-bit secret key (step S44). Finally, the secret key is transmitted to the communication unit 13B, and the process ends.
- the fourth embodiment has substantially the same effect as the first embodiment.
- the information rs1 to rsm such as the master key rsm may be changed to a bit number other than 128 bits, or the distributed information r1 to rn may be changed to a bit number other than 640 bits.
- the secret information rs, the fifth shared information r5, etc. are obtained by the EXOR operation, but it is almost the same even if an exclusive negative OR (EXNOR) operation is used instead of the EXOR operation. Can be expected.
- EXNOR exclusive negative OR
- the card settlement function using the TV 10, 10A, 10B has been described.
- the present invention can also be applied to other functions.
- the TVs 10, 10A, and 10B are used as the transmitting side
- the microcomputers 20, 20A, and 20B are used as the receiving side.
- the present invention can also be applied to other digital home appliances and other devices other than the TVs 10, 10A, and 10B on the transmission side, and can also be applied to terminal devices other than the microcomputers 20, 20A, and 20B on the corresponding reception side.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
(実施例1)
図2は、本発明の実施例1における秘密情報伝送システムの概略を示す構成図である。
秘密情報生成手段40は、各iビット(例えば、128ビット)の乱数からなる第1~第(m-1)の情報rs1~rs(m-1)(例えば、m=5、rs1~rs4)を発生するランダム発生器41と、第1~第4の情報rs1~rs4と128ビットのマスタキーrsmとに対し順にEXOR演算を行って第5の情報r5を求める演算手段42と、第1~第5の情報rs1~rs5を配列して128ビット×5ビット=640ビットの秘密情報rsを保持するデータ保持回路43とにより構成されている。
マスタキー復元手段60は、データ保持回路43に保持された640ビットの秘密情報rsを5個に分割して第1~第5の情報rs1~rs5を取り出す機能と、取り出された第1~第5の情報rs1~rs5に対しEXOR演算を行って120ビットのマスタキーrsmを復元するための縦続接続された4個のEXORゲート61-1~61-4とにより構成されている。
例えば、TV10から通信ネットワーク11を介して商品の購入等を可能にするために、TV10にカード決済機能を設け、このTV10からリモコン20へ暗号鍵であるマスタキーrsmを送信する場合について説明する。
本実施例1によれば、次の(a)、(b)のような効果がある。
(実施例2)
(実施例3)
図6は、本発明の実施例3における秘密情報伝送システムの概略を示す構成図であり、実施例1を示す図2中の要素と共通の要素には共通の符号が付されている。
て、これとは構成の異なるTV10A及びリモコン20Aが設けられている。
この分散情報生成部14Aは、乱数発生部71、分散情報パケット組立部72、及びキーバッファ73を有している。乱数発生部71は、乱数を発生して分散情報パケット組立部72へ出力する。キーバッファ73は、jビットの情報を蓄積できるバッファである。
この秘密キー復元部23Aは、秘密キー組立部81、一時バッファ82、及びキーバッファ83を有している。一時バッファ82は、受信した分散情報パケットを蓄積するバッファ、及び、キーバッファ83は、jビットの情報を蓄積するバッファである。
本実施例3の秘密情報伝送方法において、以下、図7の分散情報生成部14A中の分散情報パケット組立部72の動作(1)、及び、図8の秘密キー復元部23A中の秘密キー組立部81の動作(2)を説明する。
図9は、図7の分散情報生成部14Aにおける分散情報パケット組立部72の動作を示すフローチャートである。
図10は、図8の秘密キー復元部23Aにおける秘密キー組立部81の動作を示すフローチャートである。
本実施例3では、実施例1とほぼ同様の効果がある。
(実施例4)
図11は、本発明の実施例4における秘密情報伝送システムの概略を示す構成図であり、実施例3を示す図6中の要素と共通の要素には共通の符号が付されている。
この分散情報生成部14Bは、実施例3と同様の乱数発生部71及びキーバッファ73と、実施例3とは異なる分散情報パケット組立部72Bとを有している。その他の構成は、実施例3と同様である。
図13は、図12の分散情報生成部14Bにおける分散情報パケット組立部72Bの動作を示すフローチャートであり、実施例3を示す図9中の要素と共通の要素には共通の符号が付されている。
本実施例4では、実施例1とほぼ同様の効果がある。
本発明は、上記実施例に限定されず、種々の利用形態や変形が可能である。この利用形態や変形例としては、例えば、次の(a)~(c)のようなものがある。
Claims (14)
- 第1の装置により、iビット(i;任意の整数)のマスタキーの情報を含む第1~第n(n;任意の整数)の分散情報を生成し、前記第1~第nの分散情報を無線通信により第2の装置へ送信し、
前記第2の装置により、前記第1~第nの分散情報を受信し、前記iビットのマスタキーを復元する秘密情報伝送方法であって、
前記第1の装置が、iビットの乱数からなる第1~第(m-1)(m;任意の整数)の情報rs1~rs(m-1)と、前記第1~第(m-1)の情報rs1~rs(m-1)と前記マスタキーとに対して順にビット値の一致/不一致に基づいた論理演算を行うことにより求めた第mの情報rmと、を配列してiビット×mビット=jビットの秘密情報を生成し、
前記第1の装置が、jビットの乱数からなる第1~第(n-1)の分散情報r1~r(n-1)と、前記第1~第(n-1)の分散情報と前記秘密情報とに対して順にビット値の一致/不一致に基づいた論理演算を行うことによりjビットの第nの分散情報rnと、を生成し、
前記第1の装置が、前記第1~第nの分散情報r1~rnを前記第2の装置へ送信し、
前記第2の装置が、前記第1~第nの分散情報r1~rnを受信し、
前記第2の装置が、受信された前記第1~第nの分散情報r1~rnに対して順にビット値の一致/不一致に基づいた論理演算を行って前記秘密情報を復元し、
前記第2の装置が、復元された秘密情報をiビット毎に分割し、m個の第1~第mの情報rs1~rsmを求め、
前記第2の装置が、分割された前記第1~第mの情報rs1~rsmに対してビット値の一致/不一致に基づいた論理演算を行ってiビットの前記マスタキーを復元する、
秘密情報伝送方法。 - 前記第2の装置は、
前記第1~第nの分散情報r1~rnをそれぞれ受信したときには受信確認通知信号をそれぞれ前記第1の装置へ送信し、
前記第1の装置は、
前記受信確認通知信号を受信する際に、受信失敗となってしまった場合には、再度同じ前記分散情報を前記第2の装置へ送信する請求項1記載の秘密情報伝送方法。 - 前記第2の装置は、
前記第1~第nの分散情報r1~rnをそれぞれ受信したときには受信確認通知信号をそれぞれ前記第1の装置へ送信し、
前記第1の装置は、
前記受信確認通知信号を受信する際に、受信失敗となってしまった場合には、乱数生成によって異なる前記分散情報を前記第2の装置へ再送する請求項1記載の秘密情報伝送方法。 - 前記第1の装置が乱数生成によって異なる前記分散情報を前記第2の装置へ再送することは、前記受信失敗となってしまった場合、前記異なる分散情報を前回と同一のシーケンス番号を付けて再送することを含む、請求項3記載の秘密情報伝送方法。
- 前記第1~第nの分散情報r1~rnを送信する送信電力は、前記受信確認通知信号を送信する際の送信電力に比較して小さい請求項1~4のいずれか1項に記載の秘密情報伝送方法。
- 前記第1~第nの分散情報r1~rnを送信する送信電力は、通常データを送信する際の送信電力に比較して小さい請求項1~4のいずれか1項に記載の秘密情報伝送方法。
- 第1の装置により、iビット(i;任意の整数)のマスタキーの情報を含む分散情報を生成し、前記分散情報を無線通信により第2の装置へ送信し、
前記第2の装置は、前記分散情報が正常に受信できた場合に受信確認信号を前記第1の装置に送信し、正常に受信できた前記分散情報から前記マスタキーを復元する秘密情報伝送方法であって、
前記第1の装置が、おのおの異なるjビットの乱数からなる第1~第(n-1)の分散情報r1~r(n-1)を前記第2の装置に送信し、
前記第1の装置が、前記第1~第(n-1)の分散情報に対応する前記受信確認信号を受信できたとき、おのおの異なるiビットの乱数からなるm-1個の情報f1~f(m-1)を生成し、
前記第1の装置が、前記受信確認信号に対応する前記第1~第(n-1)の分散情報をiビット毎に分割した情報と前記情報f1~f(m-1)と前記マスタキーとに対して順にビット値の一致/不一致に基づいた論理演算を行い第mの情報fmを求め、
前記第1の装置が、前記情報f1~fmを順に連結した情報を第nの分散情報rnとして前記第2の装置に送信し、
前記第2の装置が、前記第1~第nの分散情報r1~rnを受信し、
前記第2の装置が、受信された前記第1~第nの分散情報r1~rnに対して順にビット値の一致/不一致に基づいた論理演算を行って秘密情報を復元し、
前記第2の装置が、復元された秘密情報をiビット毎に分割し、m個の第1~第mの情報rs1~rsmを求め、
前記第2の装置が、分割された前記第1~第mの情報rs1~rsmに対して順にビット値の一致/不一致に基づいた論理演算を行ってiビットの前記マスタキーを復元する、
秘密情報伝送方法。 - 第1の装置により、iビット(i;任意の整数)のマスタキーの情報を含む分散情報を生成し、前記分散情報を無線通信により第2の装置へ送信し、
前記第2の装置は、前記分散情報が正常に受信できた場合に受信確認信号を前記第1の装置に送信し、正常に受信できた前記分散情報から前記マスタキーを復元する秘密情報伝送方法であって、
前記第1の装置が、おのおの異なるjビットの乱数からなる第1~第nの分散情報r1~rnを前記第2の装置に送信し、
前記第1の装置が、前記第1~第nの分散情報に対応する前記受信確認信号を受信できたとき、前記受信確認信号に対応する前記第1~第nの分散情報をiビット毎に分割した情報に対して順にビット値の一致/不一致に基づいた論理演算を行うことで前記マスタキーを生成し、
、
前記第2の装置が、前記第1~第nの分散情報r1~rnを受信し、
前記第2の装置が、受信された前記第1~第nの分散情報r1~rnに対して順にビット値の一致/不一致に基づいた論理演算を行って秘密情報を復元し、
前記第2の装置が、復元された秘密情報をiビット毎に分割し、m個の第1~第mの情報rs1~rsmを求め、
前記第2の装置が、分割された前記第1~第mの情報rs1~rsmに対してビット値の一致/不一致に基づいた論理演算を行ってiビットの前記マスタキーを復元する、
秘密情報伝送方法。 - 前記ビット値の一致/不一致に基づいた論理演算は、排他的論理和演算又は排他的否定論理和演算である請求項1~8のいずれか1項に記載の秘密情報伝送方法。
- 前記第1の装置は、通信ネットワークに接続されたデジタル家庭電化製品であり、
前記第2の装置は、前記デジタル家庭電化製品を遠隔制御するリモートコントローラである請求項1~9のいずれか1項に記載の秘密情報伝送方法。 - 第1の装置により、iビット(i;任意の整数)のマスタキーを含む第1~第n(n;任意の整数)の分散情報を生成し、前記第1~第nの分散情報を無線通信により第2の装置へ送信し、
前記第2の装置により、前記第1~第nの分散情報を受信し、前記iビットのマスタキーを復元する秘密情報伝送システムであって、
前記第1の装置は、
iビットの乱数からなる第1~第(m-1)(m;任意の整数)の情報rs1~rs(m-1)と、前記第1~第(m-1)の情報rs1~rs(m-1)と前記iビットのマスタキーとを順に排他的論理和演算により求めた第mの情報rmと、を配列してiビット×mビット=jビットの秘密情報を生成する秘密情報生成手段と、
前記jビットの乱数からなる第1~第(n-1)の分散情報r1~r(n-1)と、前記第1~第(n-1)の分散情報と前記jビットの秘密情報とを順に排他的論理和演算により求めた前記jビットの第nの分散情報rnとから、前記第1~第nの分散情報r1~rnを生成する分散情報生成手段と、
前記第1~第nの分散情報r1~rnを前記第2の装置へ送信する第1の送受信手段とを有し、
前記第2の装置は、
前記第1~第nの分散情報r1~rnを受信する送受信手段と、
受信された前記第1~第nの分散情報r1~rnを順に排他的論理和演算を行って前記jビットの秘密情報を復元する秘密情報復元手段と、
復元された前記jビットの秘密情報を前記m個に分割して前記第1~第mの情報rs1~rsmを求め、分割された前記第1~第mの情報rs1~rsmの排他的論理和演算を行って前記iビットのマスタキーを復元するマスタキー復元手段とを有する秘密情報伝送システム。 - 前記第1の装置は、通信ネットワークに接続されたデジタル家庭電化製品であり、
前記第2の装置は、前記デジタル家庭電化製品を遠隔制御するリモートコントローラである請求項11記載の秘密情報伝送システム。 - i(i;任意の正の整数)ビットの乱数から成る乱数情報をm(m;2以上の正の整数)個生成し、生成したm個の乱数情報と、パケットの送信順番を示すシーケンス番号と、からなる分散情報を生成する分散情報生成部と、
前記分散情報を、無線通信路を介して秘密情報受信装置に送信するとともに、当該秘密情報受信装置から送信される当該分散情報に対する受信確認信号を受信する送受信部と、を備え、
前記分散情報生成部は、
前記送受信部において分散情報を送信してから一定時間内に、送信した分散情報に対応する受信確認信号を受信しない場合、当該送信した分散情報のシーケンス番号と同じシーケンス番号と、新たに生成して得られるm個の乱数情報と、から新たな分散情報を生成し、
前記送受信部において分散情報を送信してから一定時間内に、送信した分散情報に対応する受信確認信号を受信した場合、当該送信した分散情報のシーケンス番号を1増加させたシーケンス番号と、新たに生成して得られるm個の乱数情報と、から新たな分散情報を生成し、
前記送受信部において第1から第(n-1)(n;2以上の正の整数)の受信確認信号を受信した場合、
新たに生成して得られる(m-1)個の乱数情報と、iビットのマスタキーと、前記第1から第(n-1)の受信確認信号のそれぞれに対応する第1から第(n-1)の分散情報に含まれる(n-1)*m個の乱数情報とを論理演算して得られる値と、当該第(n-1)の分散情報のシーケンス番号に1増加させたシーケンス番号と、から第nの分散情報を生成し、
前記送受信部において前記第nの分散情報を送信してから一定時間内に、当該第nの分散情報に対応する第nの受信確認信号を受信しない場合、
新たに生成して得られる(m-1)個の乱数情報と、前記マスタキーと、前記第1から第(n-1)の分散情報に含まれる(n-1)*m個の乱数情報とを論理演算して得られる値と、当該第nの分散情報のシーケンス番号と同じシーケンス番号と、から新たな第nの分散情報を生成する、
ことを含む秘密情報送信装置。 - iビット(i;任意の正の整数)の乱数から成る乱数情報をm(m;2以上の正の整数)個生成し、生成したm個の乱数情報と、パケットの送信順番を示すシーケンス番号と、からなる分散情報を生成する分散情報生成部と、
前記分散情報を、無線通信路を介して秘密情報受信装置に送信するとともに、当該秘密情報受信装置から送信される当該分散情報に対する受信確認信号を受信する送受信部と、を備え、
前記分散情報生成部は、
前記送受信部において分散情報を送信してから一定時間内に、送信した分散情報に対応する受信確認信号を受信しない場合、当該分散情報のシーケンス番号と同じシーケンス番号と、新たに生成して得られるm個の乱数情報と、から新たに分散情報を生成し、
前記送受信部において分散情報を送信してから一定時間内に、送信した分散情報に対応する受信確認信号を受信した場合、当該分散情報のシーケンス番号を1増加させたシーケンス番号と、新たに生成して得られるm個の乱数情報と、から新たに分散情報を生成し、
前記送受信部において第1から第n(n;2以上の正の整数)の受信確認信号を受信した場合、
当該第1から第nの受信確認信号のそれぞれに対応する第1から第nの分散情報に含まれるn*m個の乱数情報の論理演算を行い、iビットのマスタキーを生成する、
ことを含む秘密情報送信装置。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010512430A JP4630951B2 (ja) | 2008-11-14 | 2009-11-13 | 秘密情報伝送方法、秘密情報伝送システム及び秘密情報送信装置 |
CN2009801541755A CN102273127A (zh) | 2008-11-14 | 2009-11-13 | 秘密信息传输方法、秘密信息传输系统以及秘密信息发送装置 |
US13/056,908 US20110135094A1 (en) | 2008-11-14 | 2009-11-13 | Secret data transmission method, secret data transmission system, and secret data transmission device |
EP09826170A EP2357753A1 (en) | 2008-11-14 | 2009-11-13 | Confidential information transmission method, confidential information transmission system, and confidential information transmission device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008292577 | 2008-11-14 | ||
JP2008-292577 | 2008-11-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010055924A1 true WO2010055924A1 (ja) | 2010-05-20 |
Family
ID=42170054
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2009/069395 WO2010055924A1 (ja) | 2008-11-14 | 2009-11-13 | 秘密情報伝送方法、秘密情報伝送システム及び秘密情報送信装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20110135094A1 (ja) |
EP (1) | EP2357753A1 (ja) |
JP (2) | JP4630951B2 (ja) |
CN (1) | CN102273127A (ja) |
WO (1) | WO2010055924A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010103943A (ja) * | 2008-10-27 | 2010-05-06 | Kddi Corp | 移動通信ネットワークシステム、相手ノード、移動ノード、ホームエージェントおよびアクセスゲートウェイ |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006047694A1 (en) | 2004-10-25 | 2006-05-04 | Orsini Rick L | Secure data parser method and system |
AU2006350252B2 (en) | 2005-11-18 | 2010-10-14 | Security First Corporation | Secure data parser method and system |
JP5650238B2 (ja) | 2009-11-25 | 2015-01-07 | セキュリティー ファースト コープ. | 移動中のデータをセキュア化するためのシステムおよび方法 |
WO2011150346A2 (en) | 2010-05-28 | 2011-12-01 | Laurich Lawrence A | Accelerator system for use with secure data storage |
CN102710363B (zh) * | 2012-06-13 | 2014-10-22 | 山东大学 | 一种改进的提高通信系统稳定性能的方法 |
US9430655B1 (en) * | 2012-12-28 | 2016-08-30 | Emc Corporation | Split tokenization |
CN103092745B (zh) * | 2013-01-22 | 2016-04-13 | 中兴通讯股份有限公司 | 系统日志记录的控制方法和装置 |
CN103118139B (zh) * | 2013-03-05 | 2016-03-30 | 中国科学技术大学苏州研究院 | 分布式信息隐藏传输系统及其传输方法 |
KR101657243B1 (ko) * | 2014-09-30 | 2016-09-30 | 남기원 | 온라인 시크릿 데이터 관리시스템 및 그 방법 |
JP5968484B1 (ja) * | 2015-03-18 | 2016-08-10 | 日本電信電話株式会社 | シェア復旧システム、シェア復旧方法、およびプログラム |
JP2020043464A (ja) * | 2018-09-11 | 2020-03-19 | ネクスト・イット株式会社 | 仮想通貨を用いた仮想通貨取引システム、利用者側の利用者端末、仮想通貨取引システムの支援システム及び仮想通貨取引方法 |
JP2020043465A (ja) * | 2018-09-11 | 2020-03-19 | ネクスト・イット株式会社 | 仮想通貨を用いた仮想通貨取引システムに用いられる、コンピュータを機能させるプログラムが記録させたコンピュータ読み取り可能な記録媒体 |
US10389708B1 (en) * | 2019-01-03 | 2019-08-20 | Capital One Services, Llc | Secure authentication of a user associated with communication with a service representative |
CN111541696B (zh) * | 2020-04-24 | 2021-10-01 | 清华大学 | 随机认证嵌入的快速源和路径验证方法 |
CN114598494B (zh) * | 2022-01-18 | 2023-02-28 | 电子科技大学 | 基于区块链的数据定时传输方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005079975A (ja) * | 2003-09-01 | 2005-03-24 | Hitachi Ltd | 暗号鍵の配信方法及び無線ネットワークシステム |
JP2007235516A (ja) | 2006-03-01 | 2007-09-13 | Oki Electric Ind Co Ltd | 重要情報伝送システム,重要情報送信装置,重要情報送信方法,重要情報受信装置,重要情報受信方法,中継装置,中継方法,およびそのプログラム |
JP2008098894A (ja) * | 2006-10-11 | 2008-04-24 | Kddi Corp | 情報管理システム、情報管理方法、情報管理プログラム |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5483598A (en) * | 1993-07-01 | 1996-01-09 | Digital Equipment Corp., Patent Law Group | Message encryption using a hash function |
JPH10229391A (ja) * | 1997-02-13 | 1998-08-25 | Nippon Telegr & Teleph Corp <Ntt> | 秘密鍵管理方法及びその装置 |
DE19882643T1 (de) * | 1997-08-28 | 2000-07-27 | Seagate Technology | Objektrekonstruierung bei einer objektorientierten Datenspeichervorrichtung |
JPH11298470A (ja) * | 1998-04-16 | 1999-10-29 | Hitachi Ltd | 鍵の配布方法およびシステム |
CN1818990A (zh) * | 2000-01-21 | 2006-08-16 | 索尼公司 | 数据处理设备和数据处理方法 |
CZ20031608A3 (cs) * | 2000-12-10 | 2003-09-17 | Vkr Holding A/S | Dálkové ovládací zařízení a způsob sestavení takového dálkového ovládacího zařízení |
JP2002261746A (ja) * | 2000-12-28 | 2002-09-13 | Sony Corp | 配信方法及び配信システム |
WO2002082715A1 (en) * | 2001-04-03 | 2002-10-17 | Mitsubishi Denki Kabushiki Kaisha | Encrypting device |
JP2003309544A (ja) * | 2002-04-15 | 2003-10-31 | Nec Corp | 暗号鍵配送装置 |
JP4602675B2 (ja) * | 2004-02-10 | 2010-12-22 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | 機密情報管理システム、機密情報管理方法、および機密情報管理プログラム、並びに機密情報管理システム用端末プログラム |
US20070239615A1 (en) * | 2004-04-23 | 2007-10-11 | Natsume Matsuzaki | Personal Information Management Device, Distributed Key Storage Device, and Personal Information Management System |
JP2007274388A (ja) * | 2006-03-31 | 2007-10-18 | Brother Ind Ltd | ネットワークシステム、通信装置、及び、プログラム |
US8281169B2 (en) * | 2008-08-27 | 2012-10-02 | Wireless Silicon Group, Inc. | Method and system for power management for a handheld mobile electronic device executing-in-place an application kernel from execute-in-place non-volatile memory (XIP NVM) |
US8121294B2 (en) * | 2008-10-21 | 2012-02-21 | Apple Inc. | System and method for a derivation function for key per page |
-
2009
- 2009-11-13 WO PCT/JP2009/069395 patent/WO2010055924A1/ja active Application Filing
- 2009-11-13 US US13/056,908 patent/US20110135094A1/en not_active Abandoned
- 2009-11-13 CN CN2009801541755A patent/CN102273127A/zh active Pending
- 2009-11-13 JP JP2010512430A patent/JP4630951B2/ja not_active Expired - Fee Related
- 2009-11-13 EP EP09826170A patent/EP2357753A1/en not_active Withdrawn
-
2010
- 2010-09-21 JP JP2010211004A patent/JP5172924B2/ja not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005079975A (ja) * | 2003-09-01 | 2005-03-24 | Hitachi Ltd | 暗号鍵の配信方法及び無線ネットワークシステム |
JP2007235516A (ja) | 2006-03-01 | 2007-09-13 | Oki Electric Ind Co Ltd | 重要情報伝送システム,重要情報送信装置,重要情報送信方法,重要情報受信装置,重要情報受信方法,中継装置,中継方法,およびそのプログラム |
JP2008098894A (ja) * | 2006-10-11 | 2008-04-24 | Kddi Corp | 情報管理システム、情報管理方法、情報管理プログラム |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010103943A (ja) * | 2008-10-27 | 2010-05-06 | Kddi Corp | 移動通信ネットワークシステム、相手ノード、移動ノード、ホームエージェントおよびアクセスゲートウェイ |
Also Published As
Publication number | Publication date |
---|---|
JP4630951B2 (ja) | 2011-02-09 |
JPWO2010055924A1 (ja) | 2012-04-12 |
CN102273127A (zh) | 2011-12-07 |
US20110135094A1 (en) | 2011-06-09 |
EP2357753A1 (en) | 2011-08-17 |
JP5172924B2 (ja) | 2013-03-27 |
JP2011004428A (ja) | 2011-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4630951B2 (ja) | 秘密情報伝送方法、秘密情報伝送システム及び秘密情報送信装置 | |
US11218477B2 (en) | Encryption key updates in wireless communication systems | |
US8746363B2 (en) | System for conducting remote biometric operations | |
US9530017B2 (en) | Secure printing between printer and print client device | |
US9628278B2 (en) | Method for the secure unindirectional transmission of signals | |
US8379847B2 (en) | Data and control encryption | |
EP0651533A2 (en) | Method and apparatus for privacy and authentication in a mobile wireless network | |
US20110320359A1 (en) | secure communication method and device based on application layer for mobile financial service | |
KR20140023799A (ko) | Can에서 데이터의 기밀성과 무결성을 보장하는 방법 | |
CN102082664A (zh) | 网络数据安全传输系统及方法 | |
KR101481403B1 (ko) | 차량용 데이터의 인증 및 획득 방법 | |
KR100562981B1 (ko) | 개인용 팜 컴퓨터로부터 월드와이드웹 단말기로의 무선전송 암호화 시스템 | |
CN113922976A (zh) | 设备日志传输方法、装置、电子设备及存储介质 | |
JP5835162B2 (ja) | 暗号通信システム及び暗号通信方法 | |
US20200036690A1 (en) | Method for secure device-to-device communication using multilayered cyphers | |
US20200052891A1 (en) | Method for creating and distributing cryptographic keys | |
WO2008004174A2 (en) | Establishing a secure authenticated channel | |
US20070005966A1 (en) | Derivation of a shared keystream from a shared secret | |
US20020138732A1 (en) | Methods, systems and computer program products for providing digital signatures in a network environment | |
CN116669019B (zh) | 一种无人驾驶车辆轨道通信加密方法 | |
TW202031011A (zh) | 具有認證加密的近場通訊論壇資料交換格式(ndef)訊息 | |
CN116886208B (zh) | 信息加密传输方法、装置、终端设备以及存储介质 | |
EP2348667B1 (en) | Cga signature verification method and device thereof | |
US20200112426A1 (en) | Methods and systems for secure communications using synchronized polarized light transmissions and stream encryption | |
JP2008203581A (ja) | ネットワークシステム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980154175.5 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010512430 Country of ref document: JP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09826170 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13056908 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009826170 Country of ref document: EP |