The present invention relates to an encryption method implemented in an End-to-End (End2End) connection on a wireless network (a mobile communication network) such as a wireless private branch exchange network (wireless LAN: IEEE802.11) and a cellular network (e.g., 3GPP (3rd Generation Partnership Project).
A typical wireless network system is exemplified by a network system (a wireless LAN system) using wireless LAN (IEEE 802.11) and the cellular network system (3GPP).
The wireless LAN system is, for example, configured by, as illustrated in
Normally, the communication data is encrypted in away that takes security of the communication into consideration in the wireless network. In the wireless LAN system as illustrated in
Further, for instance, IPsec-based encryption process is executed between the terminal and the GW. Moreover, the encryption at an application level (e.g., SRTP (Secure Real-time Transport Protocol: RFC3771)) is performed between the media server (server) and the terminal.
The cellular network system (the mobile telephone network system) includes, for instance, as illustrated in
In the case of the cellular network (3GPP) as illustrated in
The encryption method in a status quo, which is applied to the wireless network, is uniquely determined when configuring the wireless zone but is not changed on a per-communication basis.
Execution of streaming distribution having immediacy (real time), which makes the use of the wireless network, generally involves using RTP (Real-Time Transfer Protocol) as a communication protocol. In the case of using RTP, an initial negotiation based on RTSP (Real-Time Transfer Streaming Protocol) is carried out. In addition, the RTCP (RTP control protocol) is used for feeding back the in-communication information on a receiving side. Further, data (multimedia data: RTP packet), which is streaming-distributed, undergoes the encryption process based on a protocol such as SRTP/SRTCP (Secure RTP/Secure Real-time Transport Protocol).
Moreover, when distributing the streaming data to the terminal device within a private exchange network such as a corporate LAN via the wireless network, a VPN (Virtual Private Network) setting is done for providing a secure connection between the terminal device and the GW, and the communication based on IPsec (Security Architecture for Internet Protocol) is concealed as the case may be.
Patent document 1: Japanese Patent Laid-Open Publication No. 2005-347789
As illustrated in
The one of aspects of the present invention adopts the following means for accomplishing the object described above.
A first aspect of the aspects of the present invention is an encryption execution control system including:
a first encrypting unit to execute encryption of a communication in a first zone between a terminal device and a first relay device;
a second encrypting unit to execute encryption of a communication in a second zone embracing the first zone, the second zone extending from the terminal device via the first relay device to a second relay device; and
a control unit to control the first encrypting unit so that the encryption in the first zone is not executed when executing the encryption in the second zone.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
An embodiment of the present invention will hereinafter be described with reference to the drawings. A configuration in the following embodiment is an exemplification, and the present invention is not limited to the configuration in the embodiment.
<Outline>
As described above, a wireless network system in a status quo involves conducting the redundant encryption. In view of circumstances such as this, by way of the embodiment of the present invention, for instance, each of an access point (AP) and a wireless network gateway (GW) in a wireless LAN (Local Area Network) system as illustrated in
This encryption process is, however, executed independently of other sessions which occur simultaneously with the RTP session and of communications related to other media. For example, such a case exists that a mobile terminal (a terminal device) performs a Web access in parallel with streaming distribution. At this time, if the encryption process in the wireless zone is requested with respect to the session related to this Web access, the encryption process executed in the wireless zone.
Further, the embodiment involves monitoring whether or not IPsec-based encryption process of the communications related to the RTP session is executed and, if executed, avoiding the encryption process in the wireless zone.
The terminal device 40 has a data transmitting/receiving function, and the data transmitted and received between the terminal device 40 and the transmitting/receiving device 10 passes through a predetermined communication route. One end point of this communication route is the terminal device 40, and the other end point is the transmitting/receiving device 10. The communication device 20 and the communication device 30 are disposed on the communication route, and function as the relay devices of the data transmitted and received between the transmitting/receiving device 10 and the terminal device 40.
On this communication route, a zone between the terminal device 40 and the communication device 30 is defined as a first encryption zone (corresponding to a first zone) in which to encrypt the data transmitted and received in this zone. On the other hand, a zone between the terminal device 40 and the communication device 20 is defined as a second encryption zone (corresponding to a second zone) in which to encrypt the data transmitted and received in this zone.
Thus, the first encryption zone is included (overlapped with) by the second encryption zone. Accordingly, in the case of performing the encrypting communications in both of the first encryption zone and the second encryption zone in parallel, the data flowing through the first encryption zone reaches such a status that encryption data encrypted by an encryption method applied to the second encryption zone is further encrypted by an encryption method applied to the first encryption zone. Namely, the redundant encryption process is executed in the first encryption zone.
Normally, different types of encryption methods are applied to the first encryption zone and the second encryption zone, respectively. It is, however, inevitable that the same type of encryption method is applied to the first and second encryption zones.
The terminal device 40 includes a first encryption processing unit 41 for performing the encryption communications in the first encryption zone and a second encryption processing unit 42 for performing the encryption communications in the second encryption zone.
The communication device 30 includes an encryption processing unit 31 for conducting the encryption communications in the first encryption zone. The encryption processing unit 31 executes a negotiation and an initial setting related to the encryption method (the first encryption method) applied to the first encryption zone with respect to the first encryption processing unit 41 of the terminal device 40, and sets the communication device 30 in a status enabling the execution of the encryption communications based on the first encryption method (in the first encryption zone) between the terminal device 40 and the self-device 30.
In the case of performing the encryption communications in the first encryption zone, one of the communication device 30 and the terminal device 40 transmits the encryption data encrypted by the first encryption method, and the other device decrypts the encryption data.
Thus, the encryption processing unit 31 and the first encryption processing unit 41 function as first encryption means for encrypting the data flowing through the first encryption zone.
The communication device 20 has an encryption processing unit 21 for performing the encryption communications in the second encryption zone. The encryption processing unit 21 executes the negotiation and the initial setting related to the second encryption method applied to the second encryption zone with respect to the second encryption processing unit 42 of the terminal device 40, and provides a status enabling the execution of the encryption communications based on the encryption method (the second encryption method in the second encryption zone.
In the case of performing the encryption communications in the second encryption zone, one of the communication device 20 and the terminal device 40 transmits the encryption data encrypted by the second encryption method, and the other device decrypts the encryption data.
Further, the encryption processing unit 21 and the second encryption processing unit 42 function as a second encryption/decryption means which executes an encryption process and a decryption process in a way that targets the second encryption zone.
The communication device 30 further includes a determining unit 32 which determines whether the encryption is carried out in the second encryption zone or not. The determining unit 32 functions as a control means which controls the execution of the encryption in the first encryption zone, corresponding to the determination of whether the encryption is carried out in the second encryption zone or not.
The determining unit 32 monitors the communication (traffic) between the communication device 20 and the terminal device 40 and thus determines (decides) whether the encryption is executed in the second encryption zone or not.
If the encryption is not executed in the second encryption zone, no particular operation is conducted for the encryption processing unit 31. In this case, the encryption processing unit 31 executes the negotiation and the initial setting related to the encryption in the first encryption zone, and executes the encryption/decryption process of the data transmitted and received through the first encryption zone.
Whereas if the encryption based on the second encryption method is carried out, the determining unit 32 can halt (stop) the encryption process (the encryption/decryption of the data) of the encryption processing unit 31.
Moreover, the determining unit 32 can, if the encryption processing unit 31 is in a status of stopping the encryption in the first encryption zone when detecting that the encryption is stopped in the second encryption zone in monitoring the second encryption zone, get the encryption processing unit 31 to start (resume) the encryption process.
Thus, the encryption in the first encryption zone is executed based on the result of the determination as to whether the encryption is carried out in the second encryption zone or not. Therefore, the determining unit 32 of the communication device 30 checks whether the encryption is conducted in the second encryption zone or not.
The encryption is not performed in the first encryption zone in the case of carrying out the encryption in the second encryption zone, but the encryption is performed in the first encryption zone in the case of not executing the encryption in the second encryption zone. Further, after stopping the encryption in the first encryption zone, in the case of detecting (finding) that the encryption is not performed in the second encryption zone, the encryption starts (resumes) in the first encryption zone.
Herein, with respect to the encryption in the first encryption zone, irrespective of whether the encryption is conducted in the second encryption zone or not, all of the settings necessary for the encryption in the first encryption zone are done, and the start of the encryption in the first encryption zone is suspended.
Moreover, if the first encryption zone includes a communication path (channel) independent of the second encryption zone, for example, in a 3GPP (Third (3rd) Generation Partnership Project) system, in such a case that there exists DCCH (Dedicated Control CHannel) defined as a control channel independent of DTCH (Dedicated Traffic CHannel) for dealing with user data, only the DTCH is set as a control target about the encryption is carried out or not, while the DCCH can be excluded from the control target (the encryption can be executed regardless of the second encryption zone).
Note that
A phase 1 involves determining the encryption method utilized in a phase 2 and generating an encryption key for the encryption between hosts (devices) performing the communications. The encryption key generated in the phase 1 is shared between the devices.
The phase 2 involves determining the encryption method and the encryption key that are employed in IPsec by use of the shared key (a procedure of which is called SA: Security Association). This procedure is conducted by employing a specified packet. For example, a packet based on ISAKMP (Internet Security Association and Key Management Protocol: RFC2408) is utilized in the phase 2.
Therefore, in the network system illustrated in
According to ISAKMP, the IANA (Internet Assigned Number Authority) allocates a port number “500” of TCP/UDP (Transfer Control Protocol/User Datagram Protocol).
The ESP bloc is attached with an IP header and thus forwarded (the ESP bloc attached with the IP header is referred to as an ESP packet). The payload of the ESP packet, i.e., the ESP bloc, is encrypted based on the IPsec. Hence, the ESP packet is forwarded in a secure environment. Note that a “Next Header field” of the IP header attached to the ESP bloc is stored with a number “50” allocated for the ESP.
IPsec provides a transport mode and a tunnel mode. The transport mode is that the transmission host encrypts a transmission target original data with an encryption key, then attaches the IP header thereto and thus transmits the encrypted data attached with the IP header. This IP packet is received by the reception host. The reception host acquires the original data by removing the IP header from the IP packet and executing a decryption process with respect to the remaining data part (payload).
Thus, in the transport mode, the IP packet containing the encrypted data (the ESP bloc) is transmitted and received between the transmission host and the reception host.
In the tunnel mode, the transmission host forwards the IP packet to a transmission-side gateway. The transmission-side gateway (an IPsec processing gateway) encapsulates the (whole) IP packet (the IP header and the IP payload) by encrypting the IP packet transmitted from the transmission host and forwards the encapsulated IP packet to the reception-side gateway (an IPsec processing gateway). The reception-side gateway acquires the original IP packet by removing the IP header from the IP packet and decrypting the remaining data part. The reception-side gateway forwards this IP packet to the reception host without encrypting the IP packet. Thus, in the tunnel mode, only the communication (traffic) between the gateways is encrypted.
The embodiment is based on the assumption of using the IPsec transport mode.
As illustrated in
In
The UE 100 corresponds to the terminal device 40 including the first encryption processing unit 41 and the second encryption processing unit 42 as illustrated in
In the first encryption zone, the encryption communication based on a KASUMI algorithm (a customized algorithm of MISTY1) F8 mode (KASUMI encryption: the first encryption method) can be executed between the RNC 80 and the UE 100. Therefore, a process of establishing the communication connection (including the wireless connection) between the RNC 80 and the UE 100 is executed in the first encryption zone. Moreover, the execution of the encryption in the first encryption zone involves executing the negotiation (an exchange of the messages) between the encryption processing unit 31 of the RNC 80 and the first encryption processing unit 41 of the UE 100, and the encryption initial setting corresponding to the result of the negotiation is done in the encryption processing unit 31 of the RNC 80 and the first encryption processing unit 41 of the UE 100, respectively. This scheme enables the encryption communication to be performed in the first encryption zone (FIG. 10(1)).
The encryption communication based on IPsec (the transport mode: the second encryption method) can be executed between the GW 60 and the UE 100 in the second encryption zone. The initial setting executed beforehand for starting the encryption communication based on the second encryption method is conducted through the negotiation (the messages exchange: IKE) executed between the encryption processing unit 21 of the GW 60 and the second encryption processing unit 42 of the UE 100.
The determining unit 32 of the RNC 80 can monitor the traffic in which to implement the negotiation related to the encryption in the second encryption zone. It can be determined based on a result of this observation whether or not the encryption is carried out in the second encryption zone.
For example, the determining unit 32 can detect the traffic related to the encryption negotiation between the GW 60 and the UE 100 from the IP address and the port number of the IP packet passing through the RNC 80. With respect to the information (the IP address etc) for identifying the traffic, the IP address of the GW 60 is previously set in the determining unit 32 of the RNC 80. Further, for instance, on the occasion of the procedure for establishing the connection with the UE 100, the IP address can be acquired from the UE 100.
As described above, according to ISAKMP, the IANA allocates the port number “500” of TCP/UDP. Therefore, the determining unit 32 can determine whether or not the IPsec negotiation is performed or not by checking whether there is the traffic (packet) between the GW 60 having the port number “500” and the UE 100 or not.
Moreover, a number “50” is allocated to a “Next Header Field” of the IP header of the packet that is encrypted based on IPsec. Hence, the determining unit 32 can check whether the packet in the middle of the communication between the GW 60 and the UE 100 is encrypted or not in away that determines whether the IP packet forwarded between the GW 60 and the UE 100 has the number “50” or not.
The determining unit 32, in the case of having checked the IPsec negotiation (FIG. 10(2)) executed between the encryption processing unit 21 of the GW 60 and the second encryption processing unit 42 of the UE 100 through the traffic observation, determines that the encryption in the first encryption zone is not required (FIG. 10(3)). The determining unit 32 executes the following processes corresponding to the state of the first encryption zone when making the determination such as this.
To be specific, in the case of determining that the encryption in the first encryption zone is not required, under such a state (an encryption start standby status) where the encryption process is not yet started though the initial setting of the encryption process has already been completed, the determining unit 32 instructs the encryption processing unit 31 to maintain the standby status. The encryption processing unit 31 maintains the standby status according to the instruction.
By contrast, the encryption processing unit 31 has already started the encryption, the determining unit 32 instructs the encryption processing unit 31 to halt the encryption. The encryption processing unit 31 halts (stops) the encryption/decryption process according to the halt instruction.
Further, if the initial setting of the encryption in the encryption processing unit 31 is not yet completed, the determining unit 32 instructs the encryption processing unit 31 to halt the start (resumption) of the encryption after completing the initial setting. In this case, the encryption processing unit 31 gets in a start-of-encryption halt status (a start instruction standby status) according to the instruction.
In all cases described above, the determining unit 32 gives the instruction (called a standby instruction) to the encryption processing unit 31 so that the encryption processing unit 31 gets in the start-of-encryption standby status. With this instruction, there occurs the status where the encryption in the first encryption zone is stopped (FIG. 10(4)). When the encryption processing unit 31 stops the encryption, the UE 100 is notified of this stop, and the encryption/decryption process is stopped also in the first encryption processing unit 41 of the UE 100.
By contrast, in the second encryption zone, after completing the initial setting related to this zone, the IPsec-based encryption communication is performed between the encryption processing unit 21 of the GW 60 and the second encryption processing unit 42 of the UE 100. For example, the streaming data (FIG. 10(5)), which is downloaded by the UE 100 from the server 50, undergoes the IPsec-based encryption process (FIG. 10(6)). The encryption (the encryption data) conducted by the encryption processing unit 21 is decrypted by the second encryption processing unit 42 of the UE 100. Therefore, the IPsec-based security is ensured also in the first encryption zone including the wireless link. Thus, the redundant encryption in the first encryption zone can be prevented from being executed.
Thereafter, the determining unit 32 monitors the encryption in the second encryption zone and, when determining that the encryption is halted (FIG. 10(7)), instructs the encryption processing unit 31 to start the encryption, thereby enabling the encryption in the first encryption zone to start (resume). At this time, the first encryption processing unit 41 of the UE 100 is notified of this start. With this scheme, the security in the first encryption zone including the wireless link can be ensured.
The encryption in the second encryption zone is halted in a way that accompanies, e.g., an end of a connection of a virtual private network (VPN) between the UE 100 and the network (GW 60). The determining unit 32 monitors the negotiation between the GW 60 and the UE 100 on the basis of the traffic therebetween, and thus can recognize cancellation of the virtual private network (VPN). Alternatively, it is also feasible to recognize a case in which a destination (address) with respect to the fixed VPN connection is changed.
A start of the process depicted in
During this negotiation and the initial setting, the encryption processing unit 31 determines whether the standby instruction is received from the determining unit 32 or not (OP02). In the case of receiving the standby instruction, the encryption processing unit 31, after finishing the negotiation and the initial setting based on a result of the negotiation, reaches the start-of-encryption standby status (OP03).
In contrast with this, in the case of receiving none of the standby instruction, the encryption processing unit 31 determines whether the negotiation and the initial setting are finished or not (OP04) and, if neither the negotiation nor the initial setting is finished, returns the processing to OP01. If the negotiation and the unillustrated are finished, the encryption processing unit 31 determines whether or not the standby instruction is received from the determining unit 32 till the encryption is started (OP05).
At this time, in the case of receiving the standby instruction from the determining unit 32, the encryption processing unit 31 becomes the start-of-encryption standby status (OP06). If the standby instruction is not given till the encryption is started, the encryption processing unit 31 starts the encryption (OP07).
After starting the encryption, the encryption process (encryption/decryption) is executed, during which if the standby instruction is given from the determining unit 32 (OP08; YES), the encryption processing unit 31 halts the encryption process and becomes the start-of-encryption standby status (OP09).
If the standby instruction is not given (OP08; NO), the encryption processing unit 31 determines whether the communication is finished or not (OP10) and, if the communication is finished, executes a predetermined finishing process, thus finishing the process in
Through the processes in OP03, OP06 and OP06, the encryption processing unit 31 becomes the start-of-encryption standby status (an execution-of-encryption suspending status) according to the standby instruction. In this case, the encryption processing unit 31 reaches a standby status for the start-of-encryption instruction (which includes the resumption) given from the determining unit 32 (OP12).
When the start instruction is given from the determining unit 32, the processing advances to OP07, in which the suspending status is canceled, and the encryption process is started. If the start instruction is not given, it is determined whether the communication is finished or not (OP12). At this time, if the communication is not finished, the processing gets back to OP11, and, whereas if the communication is finished, the predetermined finishing process is executed, thus finishing the process in
A start of the process illustrated in
In the case of executing the encryption process related to the second encryption zone, the determining unit 32 transmits the standby instruction to the encryption processing unit 31 (OP23). With this instruction, the encryption processing unit 31 becomes the standby status for starting the encryption in the first encryption zone.
Thereafter, the determining unit 32 continues to monitor the traffic (OP24), and determines whether the encryption in the second encryption zone is halted or not (OP25). In the case of halting the encryption, the determining unit 32 transmits the start-of-encryption (including the resumption) instruction in the first encryption zone to the encryption processing unit 31 (OP26). With this instruction, the encryption process in the first encryption zone is started. The first encryption processing unit 41 of the UE 100 is also notified of the encryption stop such as this.
Thereafter, it is determined whether the communication is finished or not (OP27), and, if the communication is not finished, the processing loops back to OP21. Whereas if the communication is finished, the determining unit 32 executes the finishing process as the necessity may arise, thus finishing the process in
In the examples illustrated in
The cellular network system in
In
An assumption is that the negotiation and the initial setting of the encryption process (IPsec) with respect to the second encryption zone are thereafter executed between the GW 60 and the UE 100 (FIG. 13(2)).
The initial setting such as this is done between the encryption processing unit 21 of the GW 60 and the second encryption processing unit 42 of the UE 100. Hence, the determining unit 32 receives the notification of executing the encryption initial setting with respect to the second encryption zone from, e.g., the second encryption processing unit 42, whereby the determining unit 32 can recognize (infer) that the encryption is executed in the second encryption zone (FIG. 13((3)).
Then, the UE 100 notifies the RNC 80 of the start-of-encryption standby instruction (a purport that the encryption process is unnecessary) with respect to the first encryption zone. At this time, for example, the control channel (DCCH) for establishing the connection can be used. The start of the encryption in the first encryption zone is thereby stopped (FIG. 13(4)).
Thereafter, for instance, the UE 100 downloads the data such as the streaming data from the server 50, in which case the data (FIG. 13(5)) forwarded to the UE 100 from the server 50 undergoes the IPsec-based encryption process executed by the encryption processing unit 21 of the GW 60 and is forwarded up to the UE 100. In the UE 100, the second encryption processing unit 42 decrypts the data. Such a process is the same as in the example of
Thereafter, the UE 100 terminates (disconnects), e.g., the VPN (connection) with the GW 60, thereby enabling the determining unit 32 of the UE 100 to recognize (infer) that the encryption in the second encryption zone is halted (FIG. 13(7)).
In this case, the UE 100 can notify the encryption processing unit 31 of the RNC 80 of the instruction of starting (resuming) the encryption in the first encryption zone via, e.g., the control channel. With this instruction, the encryption process in the first encryption zone is started (FIG. 13(8)).
Thus, if the terminal device determines whether or not the encryption is executed in the second encryption zone, the terminal device (which is herein the UE 100) functions as a device including a notifying means which notifies the device (which is herein the RNC 80), executing the encryption process in the first encryption zone, of the standby instruction (the stop instruction) of the start of the encryption process and the instruction of the start (resumption) of the encryption process.
The process of the encryption processing unit 31 of the RNC 80 in the example illustrated in
On the other hand, the process of the determining unit 32 in the UE 100 is the same as the process illustrated in
The determining unit 32, when determining (detecting) that the encryption is executed in the second encryption zone, transmits (notifies the RNC 80 of) the standby instruction of starting the encryption in the first encryption zone to the RNC 80 (OP23). Further, the determining unit 32, when determining (detecting) that the encryption is halted in the second encryption zone, transmits (notifies the RNC 80 of) the instruction of starting (resuming) the encryption in the first encryption zone to the RNC 80 (OP25). The notification of these instructions can be made by use of the control 1 ink which connects the UE 100 and the RNC 80 to each other.
Note that the discussion given above has exemplified the data forwarding direction (a downlink direction) from the server 50 down to the UE 100, however, the same process is executed in the data forwarding direction (an uplink direction) from the UE 100 up to the server 50.
By the way, if the communication channel (a user channel such as the DTCH) for the user data and the communication channel (a control channel such as the DCCH) for the control data exist independently by way of the communication route in the first encryption zone, the stop (the standby for the start) of the encryption with respect to the first encryption zone targets only the communication channel (DCCH) for the user data.
The encryption (e.g., the KASUMI encryption) in the first encryption zone is conducted in a way that targets both of the DTCH and the DCCH. By contrast, the IPsec-based encryption executed with respect to the second encryption zone targets only the user data. Hence, the security of the traffic on the DCCH can be ensured by preventing the encryption for the DCCH from being halted.
As illustrated in
Note that the specific example described above has exemplified the case in which the IPsec is the encryption method carried out in the second encryption zone, however, other encryption methods (e.g., the SRTP) are also available. Moreover, the encryption method executed in the first encryption zone is not limited to the KASUMI encryption.
Further, even in such a case that the wireless network control device is physically separated from the device which executes the encryption process in the first encryption zone, such a mode can be adopted that the wireless network control device monitors whether the second encryption process is executed or not. This is, for example, a case where the RNC 80 includes the determining unit 32, and the base station 90 includes the encryption processing unit 31.
In this instance, in the case of determining from monitoring the traffic in the second encryption zone that the encryption is not performed in the first encryption zone, the RNC 80 notifies the base station 90 that the encryption is not carried out. In this case, the base station 90 controls, in order not to perform the encryption, the terminal device (the UE 100) in a face-to-face relation so that the encryption is not conducted in the first encryption zone. Moreover, the encryption processing unit 31 provided in the base station 90 does not execute its own encryption process.
According to the embodiment of the present invention, the encryption in the first encryption zone overlapped with the second encryption zone can be stopped corresponding to the encryption in the second encryption zone. Further, the encryption in the first encryption zone can be started (resumed) corresponding to the halt of the encryption in the second encryption zone.
Accordingly, there is no necessity for executing the encryption process with respect to the first encryption zone. Hence, it is possible to restrain influence on a throughput of the network, which leads to improvement of a system capacity. For example, in the case of the cellular network (3GPP) system, the scheme of not executing the encryption process enables a processable connection count to increase. Furthermore, it is feasible to avoid failing to encrypt and to decrypt due to occurrence of desynchronization of the encryption in terms of the encryption process related to the wireless zone in the first encryption zone and to avoid a communication failure based on the failure in the encryption and the decryption. The scheme of not executing the encryption process further enables the power consumption of the device executing the encryption process to be reduced.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
This is a continuation of Application PCT/JP2007/074439, filed on Dec. 19, 2007, now pending, the entire contents of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP2007/074439 | Dec 2007 | US |
Child | 12818787 | US |