Abstract: s1s3S1S3S1S3s1s3S1S3In a setting phase a master apparatus (M) allocates addresses (A to A) to slave devices (S1 to S3) respectively and uses the allocated addresses to transmit random numbers (R1 to R3) to the slave devices (S1 to S3). When having received the random numbers the slave devices (S1 to S3) use a secret key (MK) to encrypt unique IDs (ID to ID) thereby generating encrypted data (C1 to C3). The master apparatus (M) acquires the encrypted data (C1 to C3) from the slave devices (S1 to S3) uses the secret key (MK) which the master apparatus (M) has to decrypt the acquired encrypted data (C1 to C3) and generates a correspondence table that indicates the correspondences between the decrypted unique IDs (ID to ID) and the addresses (A to A) used in the acquisition of the decrypted unique IDs (ID to ID).
SOFT COPY ATTACHED IN PDF