WIRELESS COMMUNICATION DEVICE, PORTABLE TERMINAL, COMMUNICATION CONTROL PROGRAM AND COMMUNICATION SYSTEM
0 Assignments
0 Petitions
Accused Products
Abstract
A wireless communication device, comprising: a wireless communication unit which communicates with other communication device located at a prescribed range; a first identification information generator which generates first identification information including a service name of available service and inherent information; an encryption unit configured to encrypt said first identification information by using a prescribed encryption key to generate encryption data; a second identification information generator which generates second identification information including the service name, the inherent information and the encryption data; and an inherent information transmitter which transmits the second identification information for an other communication device which has requested transmission of the inherent information.
-
Citations
37 Claims
-
1-20. -20. (canceled)
-
21. A wireless communication method, comprising:
-
communicating with other communication devices located at a prescribed range; generating first identification information including a service name of available service and inherent information; encrypting the first identification information by using a prescribed encryption key to generate encryption data; generating second identification information including the service name, the inherent information and the encryption data; and transmitting the second identification information for an other communication device which has requested transmission of the inherent information. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A mobile communication method, comprising:
-
communicating with other communication devices located at a prescribed range; searching the other communication devices capable of communicating; acquiring first identification information transmitted from the searched communication device; extracting a service name, inherent information and encryption data from the acquired first identification information; decrypting the encryption data by using a prescribed decryption key; comparing the decrypted data with the extracted service name and the inherent information, and to determine whether or not the searched other communication device is reliable; and inhibiting communication with the communication device determined to be unreliable by comparing the decrypted data. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification