Ad-hoc radio communication verification system
First Claim
1. An ad-hoc radio communication verification system, comprising:
- a section sending data for verification data generation from a first data send/receive device to a second send/receive device, wherein the two send/receive devices are mutually connected by an ad-hoc radio connection;
in the first data send/receive device, a section generating verification data from the sent data for verification data generation produced using a first generation algorithm, for outputting the generated first verification data to a first verification data output section and for communicating said first verification data to said second data send/receive device;
in the second data send/receive device, a section generating verification data from the received data for verification data generation produced using the first generation algorithm, for outputting the generated second verification data to a second verification data output section and for communicating said second verification data to said first send/receive device; and
a section at each of said first and second send/receive devices for determining whether the verification data at the first and second verification data output sections matches mutually,wherein the first generation algorithm generates a plurality of verification data, wherein for each verification data, it is determined whether the verification data at the first and second verification data output sections match mutually;
a section establishing a serial sequence of operators that are composed of two or more of operators arranged in series, wherein the operators relate to the same or different one-way functions; and
a section letting an input to the serial sequence of operators be the data for verification data generation and outputs of two or more of operators selected from all operators composing the serial sequence of operators or corresponding values be the verification data respectively;
andwherein said section determining for each verification data whether the verification data match mutually at the first and second verification data output sections comprises a section for comparing sequences of verification data.
3 Assignments
0 Petitions
Accused Products
Abstract
An aspect of the present invention is to easily verify data integrity in data transmission and reception by means of an ad-hoc radio connection. A requester and requested end of an establishment of a cipher communication path are defined as source A and destination B, respectively. A predetermined verification data generation algorithm ID1 is arranged in advance between source A and destination B. Source A sends its own public key Kp to destination B, and at the same time generates verification data Xp based on Kp using ID1 and outputs Xp to its own verification image display section. On the other hand, destination B receives data Kx that is transmitted from source A as Kp, then generates verification data Xx based on Kx using ID1 and outputs Xx to its own verification image display section. A verifier determines that data integrity is secured if Xp and Xx displayed in the verification image display sections of source A and destination B match.
58 Citations
17 Claims
-
1. An ad-hoc radio communication verification system, comprising:
-
a section sending data for verification data generation from a first data send/receive device to a second send/receive device, wherein the two send/receive devices are mutually connected by an ad-hoc radio connection; in the first data send/receive device, a section generating verification data from the sent data for verification data generation produced using a first generation algorithm, for outputting the generated first verification data to a first verification data output section and for communicating said first verification data to said second data send/receive device; in the second data send/receive device, a section generating verification data from the received data for verification data generation produced using the first generation algorithm, for outputting the generated second verification data to a second verification data output section and for communicating said second verification data to said first send/receive device; and a section at each of said first and second send/receive devices for determining whether the verification data at the first and second verification data output sections matches mutually, wherein the first generation algorithm generates a plurality of verification data, wherein for each verification data, it is determined whether the verification data at the first and second verification data output sections match mutually; a section establishing a serial sequence of operators that are composed of two or more of operators arranged in series, wherein the operators relate to the same or different one-way functions; and a section letting an input to the serial sequence of operators be the data for verification data generation and outputs of two or more of operators selected from all operators composing the serial sequence of operators or corresponding values be the verification data respectively; and wherein said section determining for each verification data whether the verification data match mutually at the first and second verification data output sections comprises a section for comparing sequences of verification data. - View Dependent Claims (2, 3)
-
-
4. An ad-hoc radio communication data send/receive system, comprising, for each user, a location comprising a portable terminal having a radio communication function and a personal computer having a radio communication function that are owned by each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
- when it is verified that a public key Kp of a first user at a first location is transmitted from the portable terminal of the first user to a portable terminal of the second user at a second location without being tampered with by each of the locations verifying that first generated verification data generated at said first location matches second generated verification data generated at said second location, the public key Kp is transmitted from the portable terminal to the personal computer of each user, and wherein each personal computer comprises a section to generate a symmetric key Kc such that the personal computer of the second user generates a symmetric key Kc produced using a second generation algorithm, while the personal computer of the first user generates the symmetric key Kc produced using the second generation algorithm from information including a random number and an identifier for the second generation algorithm transmitted from the personal computer of the second user in cipher according to the public key and deciphered by the personal computer of the first user; and
thereafter both the personal computers send and receive data in cipher using the symmetric key Kc.
- when it is verified that a public key Kp of a first user at a first location is transmitted from the portable terminal of the first user to a portable terminal of the second user at a second location without being tampered with by each of the locations verifying that first generated verification data generated at said first location matches second generated verification data generated at said second location, the public key Kp is transmitted from the portable terminal to the personal computer of each user, and wherein each personal computer comprises a section to generate a symmetric key Kc such that the personal computer of the second user generates a symmetric key Kc produced using a second generation algorithm, while the personal computer of the first user generates the symmetric key Kc produced using the second generation algorithm from information including a random number and an identifier for the second generation algorithm transmitted from the personal computer of the second user in cipher according to the public key and deciphered by the personal computer of the first user; and
-
5. An ad-hoc radio communication data send/receive system, comprising, for each user, a location comprising a portable terminal having a radio communication function and a personal computer having a radio communication function that are owned by each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
- when it is verified that a public key Kp of a first user at a first location is transmitted from the portable terminal of the first user to the portable terminal of a second user at a second location without being tampered with by each of the locations verifying that first generated verification data generated at said first location matches second generated verification data generated at said second location, and wherein each personal computer comprises means to generate a symmetric key Kc such that the portable terminal of the second user generates a symmetric key Kc produced using a second generation algorithm, while the portable terminal of the first user generates the symmetric key Kc produced using the second generation algorithm from information transmitted from the portable terminal of the second user in cipher according to the public key and deciphered by the portable terminal of the first user, and transmits the symmetric key Kc from the portable terminal to the personal computer of each user;
thereafter both the personal computers send and receive data in cipher using the symmetric key Kc.
- when it is verified that a public key Kp of a first user at a first location is transmitted from the portable terminal of the first user to the portable terminal of a second user at a second location without being tampered with by each of the locations verifying that first generated verification data generated at said first location matches second generated verification data generated at said second location, and wherein each personal computer comprises means to generate a symmetric key Kc such that the portable terminal of the second user generates a symmetric key Kc produced using a second generation algorithm, while the portable terminal of the first user generates the symmetric key Kc produced using the second generation algorithm from information transmitted from the portable terminal of the second user in cipher according to the public key and deciphered by the portable terminal of the first user, and transmits the symmetric key Kc from the portable terminal to the personal computer of each user;
-
6. A method for verifying an ad-hoc radio communication, comprising the steps of:
-
sending data for verification data generation from a first data send/receive device to a second send/receive device, wherein the two send/receive devices are mutually connected by an ad-hoc radio connection; in the first data send/receive device, generating verification data from the sent data for verification data generation produced using a first generation algorithm and outputting the generated first verification data to a first verification data output section and communicating said first verification data to said second data send/receive device; in the second data send/receive device, generating verification data from the received data for verification data generation produced using the first generation algorithm and outputting the generated second verification data to a second verification data output section and communicating said second verification data to said first send/receive device; determining at each of said first and second send/receive devices whether the verification data at the first and second verification data output sections match mutually; establishing a serial sequence of operators that are composed of more than one operators arranged in series, wherein the operators relate to the same or different one-way functions; and letting an input to the serial sequence of operators be the data for verification data generation and an output from the serial sequence of operators or a corresponding value be the verification data. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. The method for sending and receiving ad-hoc radio communication data, wherein each user has a location comprising a portable terminal having a radio communication function for each user and a personal computer having a radio communication function for each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
- and wherein said method further comprises, when it is verified that a public key Kp of the first user at a first location is transmitted from the portable terminal of the first user to the portable terminal of the second user at a second location without being tampered with by each of the locations verifying that first generated verification data generated at said first location matches second generated verification data generated at said second location, transmitting the public key Kp from the portable terminal to the personal computer of each user;
the personal computer of the second user generating a symmetric key Kc produced using a second generation algorithm;
the personal computer of the first user generating the symmetric key Kc produced using the second generation algorithm from information including a random number and an identifier for the second generation algorithm transmitted from the personal computer of the second user in cipher according to the public key and deciphered by the personal computer of the first user; and
thereafter both the personal computers sending and receiving data, in cipher using the symmetric key Kc. - View Dependent Claims (15)
- and wherein said method further comprises, when it is verified that a public key Kp of the first user at a first location is transmitted from the portable terminal of the first user to the portable terminal of the second user at a second location without being tampered with by each of the locations verifying that first generated verification data generated at said first location matches second generated verification data generated at said second location, transmitting the public key Kp from the portable terminal to the personal computer of each user;
-
16. The method for sending and receiving ad-hoc radio communication data, wherein each user has a location comprising a portable terminal having a radio communication function for each user and a personal computer having a radio communication function for each user, wherein the portable terminal and personal computer of each user are connected by a secure communication path;
- and wherein said method further comprises, when it is verified that a public key Kp of the first user at a first location is transmitted from the portable terminal of the first user to the portable terminal of the second user at a second location without being tampered with by each of the locations verifying that first generated verification data generated at said first location matches second generated verification data generated at said second location, the portable terminal of the second user generating a symmetric key Kc produced using a second generation algorithm;
the portable terminal of the first generating the symmetric key Kc produced using the second generation algorithm from information transmitted from the portable terminal of the second user in cipher according to the public key and deciphered by the portable terminal of the first user;
transmitting the symmetric key Kc from the portable terminal to the personal computer of each user; and
, thereafter both the personal computers sending and receiving data in cipher using the symmetric key Kc. - View Dependent Claims (17)
- and wherein said method further comprises, when it is verified that a public key Kp of the first user at a first location is transmitted from the portable terminal of the first user to the portable terminal of the second user at a second location without being tampered with by each of the locations verifying that first generated verification data generated at said first location matches second generated verification data generated at said second location, the portable terminal of the second user generating a symmetric key Kc produced using a second generation algorithm;
Specification