摘要 |
<p><P>PROBLEM TO BE SOLVED: To disable the masquerading by a pirate host, to suppress illegal use of a first communication node 10, and to disable the detection of a second communication node 20 as a correct addressee in spite of an incorrect addressee. <P>SOLUTION: The pirate host usually stands by secretly. Further, the time period of the above waiting generally lasts for a long term (=hiding), as compared to a host having correct reachability. Therefore, by disabling the hiding, malicious standing by during an addressee discovery process and an inappropriate host are eliminated. <P>COPYRIGHT: (C)2007,JPO&INPIT</p> |