WO2005125082A1 - 通信システムおよび通信装置 - Google Patents

通信システムおよび通信装置 Download PDF

Info

Publication number
WO2005125082A1
WO2005125082A1 PCT/JP2005/010262 JP2005010262W WO2005125082A1 WO 2005125082 A1 WO2005125082 A1 WO 2005125082A1 JP 2005010262 W JP2005010262 W JP 2005010262W WO 2005125082 A1 WO2005125082 A1 WO 2005125082A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
communication device
unit
communication
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2005/010262
Other languages
English (en)
French (fr)
Japanese (ja)
Inventor
Tomoharu Kaneko
Tatsuya Inagaki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Holdings Corp
Original Assignee
Matsushita Electric Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Industrial Co Ltd filed Critical Matsushita Electric Industrial Co Ltd
Priority to US11/630,143 priority Critical patent/US7954154B2/en
Priority to EP05750802A priority patent/EP1758291A4/en
Publication of WO2005125082A1 publication Critical patent/WO2005125082A1/ja
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner

Definitions

  • the present invention relates to a communication system and a communication device, and more particularly to a communication system and a communication device that improve communication stability and security.
  • IPSec IP Security
  • IKE Internet Key Exchange
  • an expiration date is defined for the key in order to ensure communication security. Then, when the expiration date approaches, the communication device in communication acquires the key by requesting the device distributing the key to distribute the new key, and updates the key.
  • Patent Document 1 Japanese Patent Application Laid-Open No. 2001-292135
  • An object of the present invention is to provide a communication system and a communication device which can prevent a situation where a key becomes invalid in only one communication device! /, And improve the stability and security of communication. It is.
  • a communication system is a communication system for performing communication using a key between a first communication device and a second communication device, wherein the first communication device is a communication system of the key Storing means for storing key information including an expiration date; and transmission means for transmitting the key information at predetermined intervals, and the second communication device is another key information including the expiration date of the key.
  • the information stored in the communication device and the information stored in the other communication device are shared, and the information stored in the communication device and the other communication device is stored.
  • FIG. 1 is an overall configuration diagram of a communication system according to the present embodiment.
  • FIG. 3 A block diagram showing the configuration of the communication apparatus of FIG.
  • FIG. 4 A diagram showing an example of the configuration of a key information database unit
  • FIG. 5 A block diagram showing the configuration of another communication device of FIG.
  • the communication system 100 includes a communication device 101, a communication device 102, an internet system 103, and a key distribution server device 104.
  • IPSec IP Security
  • IP Security IP Security
  • each of the communication device 101 and the communication device 102 uses the key with an expiration date used for encryption and authentication in communication performed between the communication device 101 and the communication device 102. It is obtained from the device 104. Thus, the communication device 101 and the communication device 102 share a key used for communication between them.
  • Communication device 101 and communication device 102 each manage the expiration date of the key. Specifically, the communication apparatus 101 determines, at predetermined intervals, whether or not the key has expired. As a result of the determination, if it is determined that the expiration date has expired, the communication apparatus 101 acquires, from the key distribution server apparatus 104, a new key instead of the key determined to have the expiration date. The same operation is performed in the communication apparatus 102.
  • the communication apparatus 101 operates as a chatter on the side of initiating a procedure, and the communication apparatus 102 operates as a response to an initiator.
  • Communication device 101 generates a keepalive message at predetermined intervals, and transmits this keepalive message to communication device 102 via Internet system 103.
  • This keep alive message contains information such as key identification information, expiration date of the key, and usage status.
  • Communication device 102 receives the keepalive message from communication device 101, and determines whether or not the own device holds key information corresponding to the key identification information included in the keepalive message. Search for. As a result of the search, when the own apparatus does not hold key information corresponding to the key identification information included in the keepalive message, the communication apparatus 102 acquires the key of the key information from the key distribution server apparatus 104. Run.
  • the communication device 102 recognizes the keepalive message.
  • the information contained in the page is used to update various information related to the key information held by the device itself. Thereby, for example, the expiration date of the key of the communication apparatus 101 and the expiration date of the key of the communication apparatus 102 can be synchronized.
  • the communication device 102 generates a keep-alive reply message, and transmits the keep-alive message to the communication device 101 via the Internet system 103.
  • This keepalive reply message contains information such as key identification information, expiration date of the key, and usage status.
  • the communication apparatus 101 receives the keepalive reply message from the communication apparatus 102, and determines whether or not the own apparatus holds key information corresponding to the key identification information included in the keepalive reply message. Search for. As a result of the search, if the own device holds the key information corresponding to the key identification information included in the keep-alive reply message and / or the own device holds the key information, the communication apparatus 101 uses the key information key as the key. Execute the procedure to acquire from the distribution server device 104.
  • the communication device 101 does not perform any special operation.
  • FIG. 2 is a diagram showing an example of the configuration of the keepalive message and the keepalive reply message.
  • the message includes the message type (indicating a keepalive message or keepalive reply message), message length, key identification information, expiration date, and status (usage status). .
  • the numbers in parentheses indicate the number of bits of each information.
  • FIG. 3 is a block diagram showing the configuration of the communication apparatus 101.
  • the communication apparatus 101 includes a timer management unit 111, a message generation unit 112, a key information database unit 113, a transmission unit 114, a reception unit 115, and an information extraction unit 116.
  • a key management control unit 117, a key information search unit 118, a key update unit 119, a key information update unit 120, and a lifetime determination unit 121 are provided.
  • the timer management unit 111 sets a key management timer that periodically expires in order to manage the expiration date of key information. This key management timer expires Each time, the timer management unit 111 outputs, to the message generation unit 112, timer expiration information indicating that the key management timer has expired.
  • Message generation section 112 generates a keep alive message based on various information related to key information stored in key information database section 113, and outputs this keep alive message to transmission section 114.
  • the key information database unit 113 associates key identification information, identification information of a device at the communication destination, expiration date (remaining time until expiration), and key usage state. I remember.
  • the transmitting unit 114 transmits the keepalive message from the message generating unit 112 to the communication device 1.
  • the receiving unit 115 receives the keepalive reply message from the communication apparatus 102 and outputs the message to the information extracting unit 116.
  • the information extracting unit 116 receives the keepalive reply message from the receiving unit 115, extracts various information included in the keepalive reply message, and outputs the information to the key management control unit 117.
  • the key management control unit 117 receives the key identification information received from the information extraction unit 116, and a search command signal instructing to search whether the key identification database is stored in the key information database unit 113 or not. Are output to the key information search unit 118.
  • the key information search unit 118 receives the key identification information and the search command signal from the key management control unit 117, and searches the key information database unit 113 using the key identification information as a key. Then, when the search is completed, the key information search unit 118 outputs the search result information to the key management control unit 117.
  • the key management control unit 117 When the key management control unit 117 receives the search result information from the key information search unit 118 and the search result information indicates that the key information database unit 113 has no key identification information, The key identification information and an acquisition command signal instructing acquisition of the key specified by the key identification information from the key distribution server device 104 are output to the update unit 119.
  • the key update unit 119 receives the key identification information and the acquisition command signal from the key management control unit 117, and acquires the key specified by the key identification information from the key distribution server device 104. Then, the key updating unit 119 outputs the acquired key to a key storage unit (not shown) and The various information on the key is output to the key information update unit 120.
  • the key information update unit 120 receives various information from the key update unit 119 as a key information database unit 11.
  • the key management control unit 117 does not perform any special operation.
  • timer management unit 111 transmits a validity period confirmation command signal instructing command confirmation of the validity period at every predetermined interval for checking the key validity period to the lifetime determination unit 121.
  • the lifetime determination unit 121 determines, for each key identification information, whether the validity of the key information stored in the key information database unit 113 has expired or not. Then, the lifetime determination unit 121 acquires key identification information of the key determined to have expired, and outputs the key identification information to the key management control unit 117.
  • the key management control unit 117 When the key management control unit 117 receives the key identification information from the lifetime determination unit 121, the key management control unit 117 sends the key identification information to the key update unit 119 and the key specified by the key identification information as the key distribution server. And an acquisition command signal for instructing acquisition from the device 104.
  • the key update unit 119 receives the key identification information and the acquisition command signal from the key management control unit 117, and acquires the key specified by the key identification information from the key distribution server device 104. Then, the key updating unit 119 outputs the acquired key to a key storage unit (not shown), and outputs various information on the key to the key information updating unit 120.
  • FIG. 5 is a block diagram showing the configuration of the communication apparatus 102.
  • the communication apparatus 102 includes a receiving unit 151, an information extracting unit 152, a key management control unit 153, a key information database unit 154, a key information searching unit 155, and a key updating unit.
  • a key information update unit 157, a timer management unit 158, a lifetime determination unit 159, a message generation unit 160, and a transmission unit 161 are provided.
  • the receiving unit 151 receives the keepalive message from the communication apparatus 101, and outputs the keepalive message to the information extracting unit 152.
  • Information retrieval unit 152 receives the keepalive message from reception unit 151 and The various information contained in the keepalive message of is extracted and output to the key management control unit 153.
  • the key management control unit 153 receives the key identification information received from the information extraction unit 152, and a search command signal instructing to search whether the key identification information is stored in the key information database unit 154 or not. Output to key information search unit 155.
  • the key information search unit 155 receives the key identification information and the search command signal from the key management control unit 153, and searches the key information database unit 154 using the key identification information as a key. Then, when the search is completed, the key information search unit 155 outputs the search result information to the key management control unit 153.
  • the key management control unit 153 receives the search result information from the key information search unit 155, and when the search result information indicates that the key information database unit 154 has no key identification information, the key management control unit 153 The key identification information and an acquisition command signal instructing acquisition of the key specified by the key identification information from the key distribution server device 104 are output to the update unit 156.
  • the key update unit 156 receives the key identification information and the acquisition command signal from the key management control unit 153, and acquires the key specified by the key identification information from the key distribution server device 104. Then, the key updating unit 156 outputs the acquired key to a key storage unit (not shown), and also outputs various information related to the key to the key information updating unit 157.
  • the key information update unit 157 performs processing of storing various information from the key update unit 156 in the key information database unit 154.
  • the key management control unit 153 determines various information from the information extraction unit 152.
  • the key information update unit 157 outputs an update command signal instructing to update the key information.
  • the key information updating unit 157 overwrites and updates various information stored in association with the key identification information from the key management control unit 153 with various information from the key management control unit 153. Do.
  • the key management control unit 153 When the key information control unit 157 completes the process of storing the key information database unit 154 or the process of overwriting and updating the key information update unit 157, the key management control unit 153 sends a message to the message generation unit 160. In response, it outputs a signal instructing generation of a message.
  • message generation unit 160 When receiving an instruction signal from key management control unit 153, message generation unit 160 generates a keep alive reply message based on various information related to key information stored in key information database unit 154. , This keepalive reply message is output to the transmitter section 61.
  • the key information database unit 154 stores the key identification information, the identification information of the device at the communication destination, the expiration date (the remaining time until the expiration date), and the state of the key, as shown in FIG. It is.
  • timer management unit 158 has a lifetime confirmation command signal instructing command confirmation of the expiration date at predetermined intervals for checking the expiration date of the key.
  • the lifetime determination unit 159 determines, for each key identification information, whether the validity period of the key information stored in the key information database unit 154 has expired or not. Then, the lifetime determination unit 159 acquires key identification information of the key determined to have expired, and outputs the key identification information to the key management control unit 153.
  • the key management control unit 153 When the key management control unit 153 receives the key identification information from the lifetime determination unit 159, the key management control unit 153 instructs the key updating unit 156 to identify the key identification information and the key identified by the key identification information as a key distribution server. And an acquisition command signal for instructing acquisition from the device 104.
  • the key update unit 156 receives the key identification information and the acquisition command signal from the key management control unit 153, and acquires the key specified by the key identification information from the key distribution server device 104. Then, the key updating unit 156 outputs the acquired key to a key storage unit (not shown), and also outputs various information related to the key to the key information updating unit 157.
  • the keep alive message and the keep alive reply message can also include the current time that is managed by the timer management unit 111 and the timer management unit 158. In this way, it is possible to adjust the deviation of the current time managed by the timer management unit between the communication apparatus 101 and the communication apparatus 102.
  • the message generation unit 112 of the communication apparatus 101 acquires the current time from the timer management unit 111, and includes the current time information and the keepalive message It is generated and output to the transmission unit 114.
  • the information extraction unit 152 of the communication apparatus 102 extracts current time information from the keepalive message from the communication apparatus 101, and outputs the current time information to the timer management unit 158.
  • the timer management unit 158 manages and adjusts the current time based on the current time information from the information extraction unit 152.
  • the message generation unit 160 acquires the current time from the timer management unit 158, generates a keep-alive reply message including the current time information, and transmits the transmission unit 161. Output to
  • the message generation unit 112 generates the keepalive message using the information stored in the key information database unit 113 as it is, but the expiration date is If it is less than the threshold, it may generate a keep-alive message with its expiration date as zero.
  • the communication apparatus 102 receives this keepalive message, and overwrites the information of the key information database unit 154 with various information included in the keepalive message, and then the lifetime determination unit 159 is effective.
  • the key whose expiration date is zero is always the target of acquisition (key update) from the key distribution server device 104 by the key updating unit 156.
  • the key acquisition (key update) is performed substantially simultaneously with the key acquisition from the key distribution server apparatus 104 in the communication apparatus 102. Therefore, the key expiration date of the communication device 101 and the key expiration date of the communication device 102 can be synchronized.
  • the message generation unit 112 of the communication device 101 instead of generating the keepalive message with the expiration date being zero, the message generation unit 112 of the communication device 101 generates a command signal for updating the key in the communication device 102 together with the keepalive message, It may be configured to output to the transmitter 114. This also synchronizes the expiration date of the key of the communication device 101 with the expiration date of the key of the communication device 102.
  • Communication between the devices that are components of the communication system 100 may be performed wirelessly or may be performed wired.
  • communication device 101 generates a keepalive message based on key information stored in key information database unit 113 at predetermined intervals, and communication is performed.
  • the communication device 102 is connected from the communication device 101
  • the Eve message is received, and the key information update unit 157 stores the data (such as correction) stored in the key information database unit 154 based on the keepalive message.
  • the information stored in the communication device and the information stored in the other communication device are shared, whereby the information stored in the communication device and the other communication device is stored.
  • Inconsistencies in information It is possible to eliminate problems such as communication disconnection that occur, so the stability and security of communication performed between both devices can be improved.
  • the present invention is useful as a communication system and communication apparatus that improve communication stability and security.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
PCT/JP2005/010262 2004-06-22 2005-06-03 通信システムおよび通信装置 Ceased WO2005125082A1 (ja)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/630,143 US7954154B2 (en) 2004-06-22 2005-06-03 Communication system and communication apparatus
EP05750802A EP1758291A4 (en) 2004-06-22 2005-06-03 COMMUNICATION SYSTEM AND COMMUNICATION DEVICE

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004-184165 2004-06-22
JP2004184165A JP4365733B2 (ja) 2004-06-22 2004-06-22 通信システムおよび通信装置

Publications (1)

Publication Number Publication Date
WO2005125082A1 true WO2005125082A1 (ja) 2005-12-29

Family

ID=35510090

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/010262 Ceased WO2005125082A1 (ja) 2004-06-22 2005-06-03 通信システムおよび通信装置

Country Status (5)

Country Link
US (1) US7954154B2 (https=)
EP (1) EP1758291A4 (https=)
JP (1) JP4365733B2 (https=)
TW (1) TW200618573A (https=)
WO (1) WO2005125082A1 (https=)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008043283A1 (en) * 2006-10-10 2008-04-17 Huawei Technologies Co., Ltd. A method, system and device for keeping session tables alive in a network address translation device
WO2020166132A1 (ja) * 2019-02-15 2020-08-20 三菱日立パワーシステムズ株式会社 制御装置、産業用制御システムおよび暗号鍵寿命延長方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2147518B1 (en) * 2007-05-08 2014-11-19 Thomson Licensing Method and apparatus for adjusting decryption keys
US9998287B2 (en) * 2015-03-06 2018-06-12 Comcast Cable Communications, Llc Secure authentication of remote equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11212926A (ja) * 1998-01-27 1999-08-06 Nec Commun Syst Ltd Unixシステムにおけるシステム時刻補正方法
JP2003101533A (ja) * 2001-09-25 2003-04-04 Toshiba Corp 機器認証管理システム及び機器認証管理方法
JP2004166153A (ja) * 2002-11-15 2004-06-10 Nec Corp マルチキャスト配信システムにおける鍵交換方式

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0683202B2 (ja) 1985-06-25 1994-10-19 日本電気株式会社 デ−タ符号化/復号化装置
JPH10276186A (ja) 1997-03-31 1998-10-13 Nippon Telegr & Teleph Corp <Ntt> 認証システムにおける公開鍵証明証の有効期限通知方法
JP4434465B2 (ja) * 1999-11-16 2010-03-17 キヤノン株式会社 通信装置及び方法並びに記憶媒体
JP2001292135A (ja) 2000-04-07 2001-10-19 Matsushita Electric Ind Co Ltd 鍵交換システム
JP2002217896A (ja) * 2001-01-23 2002-08-02 Matsushita Electric Ind Co Ltd 暗号通信方法およびゲートウエイ装置
WO2003024136A1 (en) * 2001-09-12 2003-03-20 Aircross Co., Ltd. Push advertisement in mobile communications network and mobile terminal suitable for the same
JP3961309B2 (ja) 2002-02-13 2007-08-22 三菱電機株式会社 公開鍵サーバ
JP2004096583A (ja) 2002-09-03 2004-03-25 Toshiba Corp 通信方法及び通信端末
US7702904B2 (en) * 2002-11-15 2010-04-20 Nec Corporation Key management system and multicast delivery system using the same
KR100456162B1 (ko) * 2002-12-14 2004-11-09 한국전자통신연구원 디지털 케이블 티비 제한수신시스템에서 키 업데이트 방법
JP2004363724A (ja) * 2003-06-02 2004-12-24 Toshiba Corp 受信管理装置、放送受信装置、情報配信装置、情報配信方法およびプログラム

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11212926A (ja) * 1998-01-27 1999-08-06 Nec Commun Syst Ltd Unixシステムにおけるシステム時刻補正方法
JP2003101533A (ja) * 2001-09-25 2003-04-04 Toshiba Corp 機器認証管理システム及び機器認証管理方法
JP2004166153A (ja) * 2002-11-15 2004-06-10 Nec Corp マルチキャスト配信システムにおける鍵交換方式

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008043283A1 (en) * 2006-10-10 2008-04-17 Huawei Technologies Co., Ltd. A method, system and device for keeping session tables alive in a network address translation device
US9166948B2 (en) 2006-10-10 2015-10-20 Huawei Technologies Co., Ltd. Method, system and apparatus for keeping session table alive in net address translation apparatus
US10021068B2 (en) 2006-10-10 2018-07-10 Huawei Technologies Co., Ltd. Method, system and apparatus for keeping session table alive in net address translation apparatus
WO2020166132A1 (ja) * 2019-02-15 2020-08-20 三菱日立パワーシステムズ株式会社 制御装置、産業用制御システムおよび暗号鍵寿命延長方法
JP2020136793A (ja) * 2019-02-15 2020-08-31 三菱日立パワーシステムズ株式会社 制御装置、産業用制御システムおよび暗号鍵寿命延長方法
CN113169865A (zh) * 2019-02-15 2021-07-23 三菱动力株式会社 控制装置、工业用控制系统及加密密钥寿命延长方法
JP7300845B2 (ja) 2019-02-15 2023-06-30 三菱重工業株式会社 制御装置、産業用制御システムおよび暗号鍵寿命延長方法
CN113169865B (zh) * 2019-02-15 2024-01-09 三菱重工业株式会社 控制装置、工业用控制系统及加密密钥寿命延长方法

Also Published As

Publication number Publication date
EP1758291A4 (en) 2011-10-19
TWI370659B (https=) 2012-08-11
US20080212778A1 (en) 2008-09-04
JP2006013628A (ja) 2006-01-12
JP4365733B2 (ja) 2009-11-18
US7954154B2 (en) 2011-05-31
EP1758291A1 (en) 2007-02-28
TW200618573A (en) 2006-06-01

Similar Documents

Publication Publication Date Title
JP6899378B2 (ja) ネットワークノード
JP4823717B2 (ja) 暗号通信システム、端末状態管理サーバ、暗号通信方法、および端末状態管理方法
KR101174215B1 (ko) 노드 장치, 노드 장치가 실행하는 방법 및 컴퓨터 판독가능한 기록 매체
US8699475B2 (en) Communication system, communication apparatus and method for setting communication parameters of the apparatus
US9425968B2 (en) System and method for updating an encryption key across a network
US9602276B2 (en) Method and apparatus for virtual pairing with a group of semi-connected devices
JP5975594B2 (ja) 通信端末及び通信システム
US9258284B2 (en) Server, method of group key notification and program
JP2007300312A (ja) 遠隔医療システムにおける鍵交換制御方式
IL273355B2 (en) Systems and methods for time-based one-time password management for a medical device
US20180317089A1 (en) Disjoint security in wireless networks with multiple managers or access points
JP2018182665A (ja) 通信装置、通信システム及び暗号化通信制御方法
CN108512849A (zh) 一种访问服务器的握手方法及系统
WO2014147934A1 (ja) 通信装置、通信システム及び通信方法
WO2005125082A1 (ja) 通信システムおよび通信装置
US9065692B2 (en) Information notification apparatus, method, and program product
WO2015040939A1 (ja) 送受信システム、送信装置、受信装置、これらにおける制御方法およびプログラム
WO2016151824A1 (ja) サーバ、証明書生成指示方法、及び、プログラム
CN114667694B (zh) 用于在工业设施中进行安全时间同步的方法和系统
WO2015193968A1 (ja) 通信装置、無線マルチホップネットワークシステムおよびフレームカウンタ設定方法
JP2005260788A (ja) 共通鍵更新方法、通信方法、通信装置
CN115484078B (zh) 时间同步方法、装置、电子设备及存储介质
EP2544429B1 (en) Transfer apparatus, transfer network system, and transfer method
EP4466846B1 (en) LWM2M CUSTOMER REGISTRATION
JP2007228284A (ja) 情報通信システム

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2005750802

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Country of ref document: DE

WWP Wipo information: published in national office

Ref document number: 2005750802

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 11630143

Country of ref document: US