Ad-hoc radio communication verification system
First Claim
1. An ad-hoc radio communication verification system, comprising:
- means for sending data for verification data generation from one data send/receive device to the other send/receive device, wherein the two send/receive devices are mutually connected by an ad-hoc radio connection;
in the one data send/receive device, means for generating verification data from the sent data for verification data generation based on a first generation algorithm and outputting the generated verification data to its own verification data output section;
in the other data send/receive device, means for generating verification data from the received data for verification data generation based on the first generation algorithm and outputting the generated verification data to its own verification data output section; and
means for determining whether the verification data at the verification data output sections of both the data send/receive devices matches mutually.
3 Assignments
0 Petitions
Accused Products
Abstract
An aspect of the present invention is to easily verify data integrity in data transmission and reception by means of an ad-hoc radio connection. A requester and requested end of an establishment of a cipher communication path are defined as source A and destination B, respectively. A predetermined verification data generation algorithm ID1 is arranged in advance between source A and destination B. Source A sends its own public key Kp to destination B, and at the same time generates verification data Xp based on Kp using ID1 and outputs Xp to its own verification image display section. On the other hand, destination B receives data Kx that is transmitted from source A as Kp, then generates verification data Xx based on Kx using ID1 and outputs Xx to its own verification image display section. A verifier determines that data integrity is secured if Xp and Xx displayed in the verification image display sections of source A and destination B match.
40 Citations
43 Claims
-
1. An ad-hoc radio communication verification system, comprising:
-
means for sending data for verification data generation from one data send/receive device to the other send/receive device, wherein the two send/receive devices are mutually connected by an ad-hoc radio connection;
in the one data send/receive device, means for generating verification data from the sent data for verification data generation based on a first generation algorithm and outputting the generated verification data to its own verification data output section;
in the other data send/receive device, means for generating verification data from the received data for verification data generation based on the first generation algorithm and outputting the generated verification data to its own verification data output section; and
means for determining whether the verification data at the verification data output sections of both the data send/receive devices matches mutually. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 31, 32, 33, 34)
-
-
11. An ad-hoc radio communication data send/receive system, comprising a portable terminal having a radio communication function and a personal computer having a radio communication function that are owned by each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
- when it is verified that a public key Kp of one user is transmitted from the portable terminal of the one user to the portable terminal of the other user without being tampered with, the public key Kp is transmitted from the portable terminal to the personal computer of each user, then the personal computer of the other user generates a symmetric key Kc based on a second generation algorithm, while the personal computer of the one user generates the symmetric key Kc based on the second generation algorithm from information transmitted from the personal computer of the other user in cipher according to the public key; and
thereafter both the personal computers send and receive data in cipher according to the symmetric key Kc. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 26, 27, 28, 29, 35, 37, 38, 39, 40, 41, 42)
- when it is verified that a public key Kp of one user is transmitted from the portable terminal of the one user to the portable terminal of the other user without being tampered with, the public key Kp is transmitted from the portable terminal to the personal computer of each user, then the personal computer of the other user generates a symmetric key Kc based on a second generation algorithm, while the personal computer of the one user generates the symmetric key Kc based on the second generation algorithm from information transmitted from the personal computer of the other user in cipher according to the public key; and
-
12. An ad-hoc radio communication data send/receive system, comprising a portable terminal having a radio communication function and a personal computer having a radio communication function that are owned by each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
- when it is verified that a public key Kp of one user is transmitted from the portable terminal of the one user to the portable terminal of the other user without being tampered with, the portable terminal of the other user generates a symmetric key Kc based on a second generation algorithm, while the portable terminal of the one user generates the symmetric key Kc based on the second generation algorithm from information transmitted from the portable terminal of the other user in cipher according to the public key, then the symmetric key Kc is transmitted from the portable terminal to the personal computer of each user;
thereafter both the personal computers send and receive data in cipher according to the symmetric key Kc.
- when it is verified that a public key Kp of one user is transmitted from the portable terminal of the one user to the portable terminal of the other user without being tampered with, the portable terminal of the other user generates a symmetric key Kc based on a second generation algorithm, while the portable terminal of the one user generates the symmetric key Kc based on the second generation algorithm from information transmitted from the portable terminal of the other user in cipher according to the public key, then the symmetric key Kc is transmitted from the portable terminal to the personal computer of each user;
-
13. A method for verifying an ad-hoc radio communication, comprising the steps of:
-
sending data for verification data generation from one data send/receive device to the other send/receive device, wherein the two send/receive devices are mutually connected by an ad-hoc radio connection;
in the one data send/receive device, generating verification data from the sent data for verification data generation based on a first generation algorithm and outputting the generated verification data to its own verification data output section;
in the other data send/receive device, generating verification data from the received data for verification data generation based on the first generation algorithm and outputting the generated verification data to its own verification data output section; and
determining whether the verification data at the verification data output sections of both the data send/receive devices matches mutually.
-
-
23. The method for sending and receiving ad-hoc radio communication data, comprising:
- a portable terminal having a radio communication function and a personal computer having a radio communication function that are owned by each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
when it is verified that a public key Kp of one user is transmitted from the portable terminal of the one user to the portable terminal of the other user without being tampered with, the public key Kp is transmitted from the portable terminal to the personal computer of each user, then the personal computer of the other user generates a symmetric key Kc based on a second generation algorithm, while the personal computer of the one user generates the symmetric key Kc based on the second generation algorithm from information transmitted from the personal computer of the other user in cipher according to the public key; and
thereafter both the personal computers send and receive data in cipher according to the symmetric key Kc.
- a portable terminal having a radio communication function and a personal computer having a radio communication function that are owned by each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
-
24. The method for sending and receiving ad-hoc radio communication data, comprising:
- a portable terminal having a radio communication function and a personal computer having a radio communication function that are owned by each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
when it is verified that a public key Kp of one user is transmitted from the portable terminal of the one user to the portable terminal of the other user without being tampered with, the portable terminal of the other user generates a symmetric key Kc based on a second generation algorithm, while the portable terminal of the one user generates the symmetric key Kc based on the second generation algorithm from information transmitted from the portable terminal of the other user in cipher according to the public key, then the symmetric key Kc is transmitted from the portable terminal to the personal computer of each user;
thereafter both the personal computers send and receive data in cipher according to the symmetric key Kc.
- a portable terminal having a radio communication function and a personal computer having a radio communication function that are owned by each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
-
25. A recording medium recording a program for an ad-hoc radio communication verification system, wherein the verification system comprising:
-
means for sending data for verification data generation from one data send/receive device to the other send/receive device, wherein the two send/receive devices are mutually connected by an ad-hoc radio connection;
in the one data send/receive device, means for generating verification data from the sent data for verification data generation based on a first generation algorithm and outputting the generated verification data to its own verification data output section;
in the other data send/receive device, means for generating verification data from the received data for verification data generation based on the first generation algorithm and outputting the generated verification data to its own verification data output section; and
means for determining whether the verification data at the verification data output sections of both the data send/receive devices matches mutually. - View Dependent Claims (43)
-
-
30. A delivery system for delivering a program for an ad-hoc radio communication system, the verification system comprising:
-
means for sending data for verification data generation from one data send/receive device to the other send/receive device, wherein the two send/receive devices are mutually connected by an ad-hoc radio connection;
in the one data send/receive device, means for generating verification data from the sent data for verification data generation based on a first generation algorithm and outputting the generated verification data to its own verification data output section;
in the other data send/receive device, means for generating verification data from the received data for verification data generation based on the first generation algorithm and outputting the generated verification data to its own verification data output section; and
means for determining whether the verification data at l1r the verification data output sections of both the data send/receive devices matches mutually. - View Dependent Claims (36)
-
Specification