发明名称 AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND PROGRAM
摘要 <p><P>PROBLEM TO BE SOLVED: To provide an authentication method capable of limiting an influence range when an authentication key for device authentication is leaked for use even in a device having a limited memory capacity. <P>SOLUTION: A master device (1) generates a slave key of each slave device (2) from identification information and a master key set in each slave device (2), and distributes the generated slave key to each slave device (2). The slave device (2) transmits a connection request including the identification information to the master device (1), and the master device (1) generates a slave key which the slave device (2) of the connection request transmission source should retain from the identification information and the master key in the connection request, generating a HASH value to a challenge code and the slave key, and transmits the challenge code to the slave device (2) of the connection request transmission source. Comparing the HASH value included in a response from the slave device (2) with the generated HASH value permits the connection between the connection request transmission source and the slave device (2) if the both HASH values mutually coincide. <P>COPYRIGHT: (C)2011,JPO&INPIT</p>
申请公布号 JP2011176649(A) 申请公布日期 2011.09.08
申请号 JP20100039517 申请日期 2010.02.25
申请人 MITSUBISHI ELECTRIC CORP 发明人 ITO TERUAKI
分类号 H04L9/32;G06F21/20;H04L9/08 主分类号 H04L9/32
代理机构 代理人
主权项
地址
您可能感兴趣的专利