Communications system and packet structure
First Claim
1. A communications system where a transmitter transmits, to a receiver, message data as a plurality of packets, wherein each of the packets includes a data region comprising:
- transmission object data that is one of division portions into which the message data is divided so that each of the division portions is contained within each of the packets;
authentication information that is used for executing substitution detection to the transmission object data; and
control information that at least indicates what kind of a constituent of the message data the transmission object data is, wherein, when the receiver receives each of the packets, the receiver executes, using the authentication information received, a substitution detection of whether the transmission object data received is normal data that is really sent from the transmitter, and restructures the message data from the transmission object data received based on the control information received.
1 Assignment
0 Petitions
Accused Products
Abstract
In a communications system, a transmitter transmits message data included in communications packets to a receiver. A data region of the communications packet includes an original data region D[n], an authentication data region P[n], and a control region C. The original data region D[n] includes data as a transmission object that is the message data itself or one of the data portions into which the message data is divided so that each of the data portions can be contained in a single packet. The authentication data region P[n] includes authentication information used for substitution detection of the data included in the original data region D[n]. The control region C includes control information. This structure enables the substitution detection to be performed with respect to the respective communications packets into which the message data is divided, resulting in decrease in the substitution detection period.
-
Citations
14 Claims
-
1. A communications system where a transmitter transmits, to a receiver, message data as a plurality of packets, wherein each of the packets includes a data region comprising:
-
transmission object data that is one of division portions into which the message data is divided so that each of the division portions is contained within each of the packets;
authentication information that is used for executing substitution detection to the transmission object data; and
control information that at least indicates what kind of a constituent of the message data the transmission object data is, wherein, when the receiver receives each of the packets, the receiver executes, using the authentication information received, a substitution detection of whether the transmission object data received is normal data that is really sent from the transmitter, and restructures the message data from the transmission object data received based on the control information received. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A packet structure used in a communications system where a transmitter transmits, to a receiver, message data as a plurality of packets, wherein each of the packets has the packet structure including a data region comprising:
-
transmission object data that is one of division portions into which the message data is divided so that each of the division portions is contained within each of the packets;
authentication information that is used for executing substitution detection to the transmission object data; and
control information that at least indicates what kind of a constituent of the message data the transmission object data is. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An authentication method used in a communications system where a transmitter transmits, to a receiver, message data as at least one packet, wherein the transmitter includes a transmitter-end storage for storing an encryption key and first information that is fixed data independent of the message data and that is used for designating authentication information while the receiver includes a receiver-end storage for storing a decryption key and second information that is the same as the first information stored in the transmitter-end storage, the method comprising steps of:
-
forming, in the transmitter, a data region of a packet by encrypting using the encryption key stored in the transmitter-end storage a data row including, in a predetermined order, the message data and the authentication information designated from the first information stored in the transmitter-end storage, transmitting, from the transmitter, the packet from the transmitter to the receiver, decrypting, in the receiver, the data region of the packet received from the transmitter using the decryption key stored in the receiver-end storage, extracting, in the receiver, the message data and the authentication information from the data region decrypted, verifying, in the receiver, the authentication information extracted using the second information stored in the receiver-end storage, and determining, in the receiver, that the message data is normal data that is really sent from the transmitter when the authentication information extracted is successfully verified, and that the message data is abnormal data that is really not sent from the transmitter when the authentication information extracted is not successfully verified.
-
-
14. A communications system where a transmitter transmits, to a receiver, message data as at least one packet,
the transmitter comprising: -
a transmitter-end storage for storing an encryption key and first information that is fixed data independent of message data and used for designating authentication information;
generating means for generating a data region of a packet by encrypting using the encryption key stored in the transmitter-end storage a data row including, in a predetermined order, the message data and the authentication information designated from the first information; and
transmitting means for transmitting the packet to the receiver, and the receiver comprising;
a receiver-end storage for storing a decryption key and second information that is the same as the first information stored in the transmitter-end storage;
receiving means for receiving the packet sent from the transmitter;
decrypting means for decrypting the data region of the packet received from the transmitter using the decryption key stored in the receiver-end storage;
extracting means for extracting the message data and the authentication information from the data region decrypted;
verifying means for verifying the authentication information extracted using the second information stored in the receiver-end storage; and
determining means for determining that the message data is normal data that is really sent from the transmitter when the authentication information extracted is successfully verified, and that the message data is abnormal data that is really not sent from the transmitter when the authentication information extracted is not successfully verified.
-
Specification