H04L9/10

COMMUNICATIONS SYSTEM, COMMUNICATIONS DEVICE USED IN SAME, MANAGEMENT DEVICE, AND INFORMATION TERMINAL
20190273733 · 2019-09-05 · ·

A communications system includes a device connected to information terminals to enable a plurality of information terminals, mutually exchange data via a global network and enable highly confidential mutual communications between the information terminals included. The communications device includes a unit storing user authentication information for performing user authentication via the connected information terminal and pre-storing a device authentication listing pieces of device information in authentication of each communications device with regard to all the communications devices in the same group, the device authentication list being pre-stored in a state where the device authentication list is inaccessible from the user. When exchange of data is performed between the information terminals via the global network, the communications device configured to carry out user authentication process with the information terminal using the user authentication information and device-to-device authentication process with another communications device by referring to the device authentication list.

Method for controlling error rate of device-specific information and program for controlling error rate of device-specific information

A method and a program capable of controlling an error rate of device-specific information are provided. Provided is the method for controlling an error rate of device-specific information, including a step S1 of: inputting each of i (i is an arbitrary natural number) challenges, j times (j is an arbitrary natural number), into a PUF mounted chip; leaving j responses intact (j=j) or processing j responses into j pieces (0<j<j); and registering them in the database beforehand in association with each piece of the input data, a step S2 of inputting i challenges into the database, a step S3 of: reading j responses corresponding to the respective i challenges from the database; concatenating the j responses for each piece of the input data; further concatenating the concatenated data by k repetitions (0<kk, and k is an arbitrary natural number, but is a natural number of 2 or more if the i and the j are both 1); obtaining the concatenated (jk) responses for each piece of the input data; and further concatenating them also for different input data to obtain concatenated (ijk) responses and thereby generate reference data, a step S4 of: inputting i challenges, k times, for each challenge into the PUF mounted chip; leaving obtained k responses intact as k=k or processing the obtained k responses into k pieces (0<k<k); concatenating obtained k responses by j repetitions for each response; further concatenating them for all of the k responses; further concatenating concatenated (jk) responses also for different input data; and obtaining concatenated (ijk) responses to generate synthesized output data, and a step S5 of deciding whether or not the synthesized output data matches the reference data (specifically, whether a Hamming distance between both data is a threshold value or less), and the method determines whether or not the error rate of the synthesized output data is within a preset range based on the decision result in step S5, and changes at least one of i, j, j, k, and k to repeat steps S1 to S5 until the error rate falls within the preset range if the error rate is determined not to be within the preset range.

Method for controlling error rate of device-specific information and program for controlling error rate of device-specific information

A method and a program capable of controlling an error rate of device-specific information are provided. Provided is the method for controlling an error rate of device-specific information, including a step S1 of: inputting each of i (i is an arbitrary natural number) challenges, j times (j is an arbitrary natural number), into a PUF mounted chip; leaving j responses intact (j=j) or processing j responses into j pieces (0<j<j); and registering them in the database beforehand in association with each piece of the input data, a step S2 of inputting i challenges into the database, a step S3 of: reading j responses corresponding to the respective i challenges from the database; concatenating the j responses for each piece of the input data; further concatenating the concatenated data by k repetitions (0<kk, and k is an arbitrary natural number, but is a natural number of 2 or more if the i and the j are both 1); obtaining the concatenated (jk) responses for each piece of the input data; and further concatenating them also for different input data to obtain concatenated (ijk) responses and thereby generate reference data, a step S4 of: inputting i challenges, k times, for each challenge into the PUF mounted chip; leaving obtained k responses intact as k=k or processing the obtained k responses into k pieces (0<k<k); concatenating obtained k responses by j repetitions for each response; further concatenating them for all of the k responses; further concatenating concatenated (jk) responses also for different input data; and obtaining concatenated (ijk) responses to generate synthesized output data, and a step S5 of deciding whether or not the synthesized output data matches the reference data (specifically, whether a Hamming distance between both data is a threshold value or less), and the method determines whether or not the error rate of the synthesized output data is within a preset range based on the decision result in step S5, and changes at least one of i, j, j, k, and k to repeat steps S1 to S5 until the error rate falls within the preset range if the error rate is determined not to be within the preset range.

Integration of verification tokens with mobile communication devices

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.

Integration of verification tokens with mobile communication devices

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.

Electrically self-powered surgical instrument with cryptographic identification of interchangeable part

A surgical instrument that comprises a surgical end effector, a handle that is connected to the surgical end effector and has a controller, and an interchangeable part removably connected to the surgical end effector and having an encryption device in electrical communication with the controller. The encryption device is programmed to authenticate the interchangeable part when the interchangeable part is at the surgical end effector.

Electrically self-powered surgical instrument with cryptographic identification of interchangeable part

A surgical instrument that comprises a surgical end effector, a handle that is connected to the surgical end effector and has a controller, and an interchangeable part removably connected to the surgical end effector and having an encryption device in electrical communication with the controller. The encryption device is programmed to authenticate the interchangeable part when the interchangeable part is at the surgical end effector.

Electrically Self-Powered Surgical Instrument with Manual Release

A method for manufacturing a surgical instrument to have a manual release, which comprises mechanically coupling a manual release to a transmission of a surgical instrument having a self-contained power source disposed within a handle thereof, the transmission mechanically connecting an electrically-powered motor inside the handle to a movable part of a surgical end effector connected to the handle such that the transmission is operable to displace the movable part to a starting position, an actuated position, and at least one point between the starting position and the actuated position when the motor is operated; and wherein the manual release is operable to interrupt the transmission from operation of the motor and, during interruption, displace the movable part towards the starting position irrespective of the position of the movable part and independent of operation of the motor.

SYSTEM AND METHOD FOR PROVIDING SECURITY FOR ROBOTS

The present disclosure discloses a security system for robots. The security system comprises a lock located on a platform, configured to restrict power supply to a plurality of actuators of a robotic arm, a key configured to release the lock for providing power supply to the plurality of actuators and a processing unit. The processing unit is configured to restrict power supply to the robotic arm by initiating the lock, relocate the lock to a random location on the platform, generate an encrypted code based on the random location of the lock and a time-stamp and provide the encrypted code to the control unit for decryption. Upon decryption, the control unit configures the lock to supply power to the plurality of actuators. The plurality of actuators operates the robotic arm to pick the key and release the lock for supplying power to the plurality of actuators.

SYSTEM AND METHOD FOR PROVIDING SECURITY FOR ROBOTS

The present disclosure discloses a security system for robots. The security system comprises a lock located on a platform, configured to restrict power supply to a plurality of actuators of a robotic arm, a key configured to release the lock for providing power supply to the plurality of actuators and a processing unit. The processing unit is configured to restrict power supply to the robotic arm by initiating the lock, relocate the lock to a random location on the platform, generate an encrypted code based on the random location of the lock and a time-stamp and provide the encrypted code to the control unit for decryption. Upon decryption, the control unit configures the lock to supply power to the plurality of actuators. The plurality of actuators operates the robotic arm to pick the key and release the lock for supplying power to the plurality of actuators.