摘要 |
<p><P>PROBLEM TO BE SOLVED: To provide an authentication method capable of limiting an influence range when an authentication key for device authentication is leaked for use even in a device having a limited memory capacity. <P>SOLUTION: A master device (1) generates a slave key of each slave device (2) from identification information and a master key set in each slave device (2), and distributes the generated slave key to each slave device (2). The slave device (2) transmits a connection request including the identification information to the master device (1), and the master device (1) generates a slave key which the slave device (2) of the connection request transmission source should retain from the identification information and the master key in the connection request, generating a HASH value to a challenge code and the slave key, and transmits the challenge code to the slave device (2) of the connection request transmission source. Comparing the HASH value included in a response from the slave device (2) with the generated HASH value permits the connection between the connection request transmission source and the slave device (2) if the both HASH values mutually coincide. <P>COPYRIGHT: (C)2011,JPO&INPIT</p> |