JP2006311319A - Radio terminal authentication system, own station radio terminal, other station radio terminal and method for authenticating radio terminal - Google Patents

Radio terminal authentication system, own station radio terminal, other station radio terminal and method for authenticating radio terminal Download PDF

Info

Publication number
JP2006311319A
JP2006311319A JP2005132739A JP2005132739A JP2006311319A JP 2006311319 A JP2006311319 A JP 2006311319A JP 2005132739 A JP2005132739 A JP 2005132739A JP 2005132739 A JP2005132739 A JP 2005132739A JP 2006311319 A JP2006311319 A JP 2006311319A
Authority
JP
Japan
Prior art keywords
station
wireless terminal
information
encrypted data
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2005132739A
Other languages
Japanese (ja)
Other versions
JP4482643B2 (en
Inventor
Takanari Shirasaka
貴成 白坂
Yutaka Kidawara
豊 木俵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kobe Steel Ltd
National Institute of Information and Communications Technology
Original Assignee
Kobe Steel Ltd
National Institute of Information and Communications Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kobe Steel Ltd, National Institute of Information and Communications Technology filed Critical Kobe Steel Ltd
Priority to JP2005132739A priority Critical patent/JP4482643B2/en
Publication of JP2006311319A publication Critical patent/JP2006311319A/en
Application granted granted Critical
Publication of JP4482643B2 publication Critical patent/JP4482643B2/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Near-Field Transmission Systems (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

<P>PROBLEM TO BE SOLVED: To construct a network high in safety and security by securely and surely performing an authentication between radio terminals to be performed when constructing an automonous distributed network, thereby preventing the leakage of inherent information or the like of a radio terminal. <P>SOLUTION: This radio terminal authentication system preliminarily moves authentication information of the other station radio terminal P2 to a self-station terminal device P1 through an RFID tag 1, subsequently uses key information included in the authentication information to transmit/receive encrypted inherent information, address information or the like between the self-station radio terminal P1 and the other station radio terminal P2 before constructing an adhoc network, decrypts the transmitted/received data and authenticates the radio terminals by collating the decrypted data. Thus, it is possible to transmit/receive the authentication information under environment in which security is sufficiently secured, for example, when constructing a network, so that a safe network high in security can be constructed. <P>COPYRIGHT: (C)2007,JPO&INPIT

Description

本発明は,二以上の無線端末が相互に無線通信可能に無線接続されることにより構築される自立分散型の無線ネットワークを構成する無線端末間の認証処理に関するものであって,特に,上記無線ネットワークが構築される際に不特定の無線端末間で行われる認証処理に関するものである。   The present invention relates to an authentication process between wireless terminals constituting an autonomous distributed wireless network constructed by wirelessly connecting two or more wireless terminals so that they can wirelessly communicate with each other. The present invention relates to an authentication process performed between unspecified wireless terminals when a network is constructed.

無線通信技術の発展に伴い,ネットワークのワイヤレス化が進んでいる。無線LANネットワーク等のワイヤレスネットワークの利点は,アクセスポイントとパソコン等の端末装置との間にケーブルを敷設する必要がなく,また,ネットワークの新設や通信機器のレイアウト変更等が容易であるという点にある。昨今においては,通信インフラの整備が進み,オフィスや家庭内といった狭域スペースに限られず,駅構内や空港,ホテル,喫茶店又はファーストフード店あるいは街角等に無線LAN通信のためのアクセスポイントが設置され(例えばホットスポット(NTTコミュニケーションズ(株)の登録商標)),街中においても無線LANネットワークを介してインターネット等の無線LAN通信を行うことができるようになった。
ところで,上記無線LANネットワークに接続するためには,通常,管理サーバ等からネットワークに接続する無線端末に対してアクセス許可を発行してもらう必要がある。即ち,アクセス許可された無線端末のみが上記無線LANネットワークに無線接続することができる。上記ネットワークに接続する際には,無線端末がアクセス許可されたものであるかどうかの認証処理が行われる。この認証処理は,例えば,特許文献1に記載の認証方法,即ち,予め無線端末の個別情報等が記憶された接触型のICカード等を通信基地局に読み取らせた後に,予め所在が特定された上記無線端末と上記通信基地局との間で無線通信を行うことにより上記個別情報の照合を行う認証方法によって行われる。なお,上記認証方法では,管理サーバと無線端末との間で行われる無線通信中に上記無線端末の個別情報等が盗聴,傍受されることを防止し,安全且つ確実に無線通信を行うべく通信される個別情報等を暗号化している。
With the development of wireless communication technology, the network is becoming wireless. The advantage of a wireless network such as a wireless LAN network is that it is not necessary to lay a cable between the access point and a terminal device such as a personal computer, and it is easy to newly establish a network or change the layout of communication equipment. is there. In recent years, the development of communication infrastructure has progressed, and access points for wireless LAN communication have been installed not only in narrow spaces such as offices and homes, but also in stations, airports, hotels, coffee shops, fast food stores, street corners, etc. (For example, hotspots (registered trademark of NTT Communications Corporation)), wireless LAN communication such as the Internet can be performed through a wireless LAN network even in town.
Incidentally, in order to connect to the wireless LAN network, it is usually necessary to have an access permission issued from a management server or the like to a wireless terminal connected to the network. In other words, only wireless terminals that are permitted to access can wirelessly connect to the wireless LAN network. When connecting to the network, authentication processing is performed to determine whether the wireless terminal is permitted to access. This authentication process is performed, for example, by the authentication method described in Patent Document 1, that is, after the communication base station reads a contact type IC card or the like in which individual information of the wireless terminal is stored in advance, the location is specified in advance. Further, it is performed by an authentication method in which the individual information is collated by performing wireless communication between the wireless terminal and the communication base station. In the authentication method, communication is performed so that individual information of the wireless terminal is not eavesdropped or intercepted during wireless communication performed between the management server and the wireless terminal, and wireless communication is performed safely and reliably. Individual information to be encrypted is encrypted.

一方,近年,ノート型パソコンや携帯電話等の携帯端末(モバイル端末)の普及により,上記した無線LANネットワークに必須のアクセスポイントや通信基地局を要することなく,無線接続可能なパソコン,PDA,携帯電話等の複数の無線端末のみで構築することができるアドホックネットワーク(自立分散型の無線ネットワーク)が注目されている。このアドホックネットワークは,上記アクセスポイントや通信基地局,或いは有線ネットワークにおける通信回線等の固定された通信インフラを利用することができない地域(例えば災害地等)や上記通信インフラが十分整備されていない地域(例えば僻地等)でネットワークを必要とする場合,或いは限定された範囲の小ネットワークを即座に必要とする場合に,安価で簡便に,しかも即席にネットワークを構築することができるという利点があり,近年高い注目を浴びている。
特開2001−189722号公報
On the other hand, in recent years, with the spread of portable terminals (mobile terminals) such as notebook computers and mobile phones, personal computers, PDAs, and mobile phones that can be wirelessly connected without requiring the access points and communication base stations required for the wireless LAN network described above. Ad hoc networks (independent and distributed wireless networks) that can be constructed with only a plurality of wireless terminals such as telephones have attracted attention. This ad hoc network is an area where a fixed communication infrastructure such as the access point, communication base station, or communication line in a wired network cannot be used (for example, a disaster area) or an area where the communication infrastructure is not sufficiently developed. When a network is required (for example, in remote areas), or when a small network in a limited range is required immediately, there is an advantage that a network can be constructed inexpensively, easily and instantly. In recent years, it has attracted a lot of attention.
JP 2001-189722 A

上述したアドホックネットワークにおいても,ネットワークを構成する無線端末間において認証処理を行う必要がある。例えば,許可された無線端末間でデータの転送,データの共有等を行う場合は,第三者によるネットワークへの無断介入を防止し,ネットワークのセキュリティ性を向上させるために認証処理を行う必要性は極めて高い。しかしながら,上記アドホックネットワークは特定された無線端末で構成される前記の無線LANネットワークとは異なり,不特定の複数の無線端末のみで構成されるネットワークである。そのため,ネットワークが構築される前においては,ネットワークを構成する無線端末を特定(識別)するための固有情報(IPアドレス等)が不明であるため,認証するべき無線端末を特定することができない。従って,無線端末が予め特定されていることを前提とする上記特許文献1の認証方法を上記アドホックネットワーク構築前の無線端末の認証に適用することはできない。
また,上記アドホックネットワークは常に同じ無線端末で構成されるとは限られず,ネットワークを構築する用途や場所等によって異なることの方が多い。そのため,ネットワークを構成するすべての無線端末が常に統一された共通の暗号化手段を備えているとは限らない。このため,無線端末の認証処理に用いられる無線端末の固有情報等を暗号化したとしても,他の無線端末で暗号化されたデータを復号化することができないという問題が生じる。一方,認証のために上記固有情報等を暗号化せずに無線通信すると,上記固有情報が第三者に盗聴,傍受されるおそれがあり,問題である。
そこで,本発明は上記事情に鑑みてなされたものであり,その目的とするところは,アドホックネットワーク等の自立分散型のネットワークが構築される際に行われる無線端末間の認証を安全且つ確実に行うことにより,ネットワークを構成する無線端末の固有情報等の漏洩を防止し,安全性,セキュリティ性の高いネットワークを構築することが可能な無線ネットワーク通信システム,無線端末並びに該無線端末の認証方法を提供することにある。
Even in the above-described ad hoc network, it is necessary to perform authentication processing between wireless terminals constituting the network. For example, when transferring data or sharing data between authorized wireless terminals, it is necessary to perform authentication processing to prevent unauthorized third-party intervention on the network and improve network security. Is extremely expensive. However, the above-described ad hoc network is a network composed of only a plurality of unspecified wireless terminals, unlike the wireless LAN network composed of specified wireless terminals. Therefore, before the network is constructed, the specific information (IP address or the like) for specifying (identifying) the wireless terminals constituting the network is unknown, and thus the wireless terminal to be authenticated cannot be specified. Therefore, the authentication method of Patent Document 1 on the assumption that the wireless terminal is specified in advance cannot be applied to authentication of the wireless terminal before the ad hoc network is constructed.
In addition, the ad hoc network is not always composed of the same wireless terminal, and is often different depending on the use and location of the network. For this reason, not all wireless terminals constituting the network are always equipped with a common encryption means. Therefore, there is a problem that even if the unique information of the wireless terminal used for the authentication process of the wireless terminal is encrypted, the data encrypted by the other wireless terminal cannot be decrypted. On the other hand, if wireless communication is performed without encrypting the unique information for authentication, the unique information may be intercepted and intercepted by a third party, which is a problem.
Therefore, the present invention has been made in view of the above circumstances, and the object of the present invention is to securely and reliably perform authentication between wireless terminals when an autonomous distributed network such as an ad hoc network is constructed. A wireless network communication system, a wireless terminal, and an authentication method for the wireless terminal capable of preventing leakage of specific information of wireless terminals constituting the network and constructing a network with high safety and security by performing It is to provide.

上記目的を達成するため,本発明の無線端末認証システム及び無線端末の認証方法は,相互に無線接続されることにより構築される自立分散型の無線ネットワークを構成する自局無線端末と他局無線端末との間で,上記無線ネットワークが構築される際に行われる無線端末の認証処理に適用されるものであって,まず,ある無線端末(以下,他局無線端末という)から事前にメモや電子媒体等によって上記他局無線端末の認証情報を得ておく。この認証情報には,上記他局無線端末から送られてくる暗号データ(暗号情報)を解読(復号)するための鍵情報(キー情報)が含まれており,他の無線端末(以下,自局無線端末という)に予め取得させておき,上記他局無線端末から送られてきた上記暗号情報を他の無線端末(以下,自局無線端末という)で復号化できるということが前提となっている。そして,上記自局無線端末は,予め取得された上記他局無線端末の認証情報に含まれる上記他局無線端末の固有情報を上記鍵情報で暗号化し,該暗号化により得られた第1の暗号データと上記自局無線端末のアドレス情報とを不特定多数の無線端末に一斉同報通信する。一方,上記他局無線端末は,上記自局無線端末によって一斉同報通信された上記第1の暗号データと上記自局無線端末のアドレス情報とを受信した後に,上記事前に自局無線端末に取得させたものと同じ上記鍵情報を用いて上記第1の暗号データを復号化し,該復号化により得られた第1の復号データと上記他局無線端末が保持(記憶)する上記他局無線端末自身の固有情報とを照合して上記自局無線端末から送信されたデータであることを確認する。その後,上記照合の結果に基づいて上記他局無線端末の固有情報を暗号化し,該暗号化により得られた第2の暗号データと上記他局無線端末のアドレス情報とを上記自局無線端末のアドレス情報に基づいて上記自局無線端末に送信する。また,上記自局無線端末は更に,上記他局無線端末から送信された上記第2の暗号データと上記他局無線端末のアドレス情報とを受信した後に上記第2の暗号データを復号化し,該復号化により得られた第2の復号データと予め取得された上記他局無線端末の固有情報とを照合し,他局無線端末から送信されたデータであることを確認する。
このように本発明が構成されることにより,例えば不特定の無線端末が集まってネットワークを構築する場合でも,セキュリティが十分確保された環境下で認証情報を送受信することが可能となる。これにより,上記認証情報に含まれる無線端末の固有情報や該無線端末の利用者の個人情報(プライバシー情報)等の漏洩を防止し,セキュリティ性の高い安全なネットワークを構築すること可能となる。また,既に構築されたネットワークへの第三者の不正侵入を排除して,ネットワーク上で送受信されるデータや共有化されたディレクトリやフォルダ内のデータ(情報)の第三者による盗聴,傍受或いは改ざんを効果的に防止することが可能となる。
In order to achieve the above object, a wireless terminal authentication system and a wireless terminal authentication method according to the present invention include a self-station wireless terminal and a remote-station wireless that constitute an autonomous distributed wireless network constructed by being wirelessly connected to each other. This is applied to wireless terminal authentication processing that is performed when a wireless network is constructed with a terminal. First, a memo or pre- The authentication information of the other station wireless terminal is obtained by an electronic medium or the like. This authentication information includes key information (key information) for decrypting (decrypting) encrypted data (encrypted information) sent from the other station wireless terminal. It is assumed that the encryption information transmitted from the other station wireless terminal can be decrypted by another wireless terminal (hereinafter referred to as the own station wireless terminal). Yes. Then, the local station wireless terminal encrypts the unique information of the other station wireless terminal included in the previously acquired authentication information of the other station wireless terminal with the key information, and obtains the first information obtained by the encryption. The encrypted data and the address information of the local wireless terminal are broadcast to an unspecified number of wireless terminals. On the other hand, the other-station wireless terminal receives the first encrypted data broadcasted by the own-station wireless terminal and the address information of the own-station wireless terminal, and then sends it to the own-station wireless terminal in advance. The first encrypted data is decrypted using the same key information as that obtained, and the first decrypted data obtained by the decryption and the other station wireless held by (stored in) the other station wireless terminal It collates with the unique information of the terminal itself and confirms that the data is transmitted from the local station wireless terminal. Thereafter, the unique information of the other station wireless terminal is encrypted based on the result of the collation, and the second encrypted data obtained by the encryption and the address information of the other station wireless terminal are stored in the own station wireless terminal. Based on the address information, the data is transmitted to the local station wireless terminal. Further, the local station wireless terminal further decrypts the second encrypted data after receiving the second encrypted data transmitted from the other station wireless terminal and the address information of the other station wireless terminal, The second decoded data obtained by decoding is collated with the unique information of the other station radio terminal acquired in advance, and it is confirmed that the data is transmitted from the other station radio terminal.
By configuring the present invention as described above, for example, even when unspecified wireless terminals gather to construct a network, authentication information can be transmitted and received in an environment where security is sufficiently ensured. As a result, it is possible to prevent leakage of specific information of the wireless terminal included in the authentication information and personal information (privacy information) of the user of the wireless terminal, and to construct a secure network with high security. In addition, by eliminating third-party unauthorized intrusion into the already established network, the third-party eavesdropping, intercepting or intercepting data (information) in the network and data (information) in shared directories and folders Tampering can be effectively prevented.

ここで,上記無線ネットワークが構築される前は,無線端末相互間で相手側の端末を特定することができない。従って,前記したように上記自局無線端末は上記他局無線端末の認証情報を予め取得しておく必要がある。予め上記自局無線端末に認証情報を取得させる手法としては,少なくとも他局無線端末の固有情報を含む認証情報が予め記憶された所定の記憶媒体を用いることが考えられる。例えば,上記所定の記憶媒体が接触型のメモリカードであればカードスロット等の接触型リーダライタ等の認証情報取得手段を上記自局無線端末に設け,上記所定の記憶媒体がRFIDタグ等の無線式非接触型のICメモリであれば無線通信により上記ICメモリから送信された認証情報を受信するアンテナや通信制御プロセッサ等の認証情報取得手段を上記自局無線端末に設けることが考えられる。もちろん,上記自局無線端末に設けられたキーボード等の入力手段から利用者により入力された上記認証情報を取得するよう構成されたものであってもかまわない。
また,上述したように,上記所定の記憶媒体が無線式非接触型のICメモリであれば,カードスロット等のハード構成を設ける必要がなく,更に,既設の無線アンテナ等を利用することができるため,上記無線端末の省スペース化を図り,携帯性を向上させることが可能となる。
なお,上記事前に予め取得された上記他局無線端末の認証情報は,上記自局無線端末に備えられたメモリ,HDD等の自局側認証情報記憶手段に一時的に格納されるものであるが,上記自局無線端末における上記固有情報の照合が終了したときは,自局側認証情報記憶手段に記憶された上記他局無線端末の認証情報を消去することが好ましい。これは,多数の無線端末と認証処理を行うたびに上記認証情報が蓄積されることによる上記自局側認証情報記憶手段のオーバーフローを回避するためであり,また,他局無線端末の固有情報を含む認証情報をいつまでも保持することはセキュリティ上好ましくないからである。
Here, before the wireless network is constructed, the partner terminal cannot be specified between the wireless terminals. Therefore, as described above, the local station wireless terminal needs to acquire authentication information of the other station wireless terminal in advance. As a technique for acquiring authentication information from the local station wireless terminal in advance, it is conceivable to use a predetermined storage medium in which authentication information including at least the unique information of the other station wireless terminal is stored in advance. For example, if the predetermined storage medium is a contact type memory card, authentication information acquisition means such as a contact reader / writer such as a card slot is provided in the local station, and the predetermined storage medium is a wireless device such as an RFID tag. In the case of a non-contact type IC memory, it is conceivable to provide authentication information acquisition means such as an antenna or a communication control processor for receiving authentication information transmitted from the IC memory by wireless communication in the local station. Of course, the authentication information input by the user may be acquired from an input means such as a keyboard provided in the local station wireless terminal.
In addition, as described above, if the predetermined storage medium is a wireless non-contact type IC memory, it is not necessary to provide a hardware configuration such as a card slot, and an existing wireless antenna can be used. Therefore, it is possible to save the space of the wireless terminal and improve portability.
The authentication information of the other station wireless terminal acquired in advance is temporarily stored in the own station side authentication information storage means such as a memory or HDD provided in the own station wireless terminal. However, when the verification of the unique information in the local station wireless terminal is completed, it is preferable to delete the authentication information of the other station wireless terminal stored in the local station authentication information storage means. This is to avoid overflow of the authentication information storage means of the local station due to accumulation of the authentication information every time authentication processing is performed with a large number of wireless terminals. This is because it is not preferable in terms of security to keep the included authentication information indefinitely.

ここで,上記認証情報は,上記他局無線端末の固有情報だけでなく,上記自局無線端末側の暗号化及び復号化に共通して用いられる共通の鍵情報(いわゆる暗号鍵,復号鍵)を含んでなることが考えられる。このように共通の鍵情報が含まれておれば,例えば,上記他局無線端末側で任意に定められた共通の鍵情報或いは定期的に変更された共通の鍵情報で暗号化,復号化を行うことが可能となる。その結果,暗号化された固有情報の機密性を高めることができる。   Here, the authentication information is not only unique information of the other-station wireless terminal, but also common key information (so-called encryption key, decryption key) that is used in common for encryption and decryption on the own-station wireless terminal side. It is conceivable to comprise. If common key information is included in this way, for example, encryption and decryption can be performed with the common key information arbitrarily determined on the other-station wireless terminal side or the common key information changed periodically. Can be done. As a result, the confidentiality of the encrypted unique information can be improved.

ところで,複数の他局無線端末とネットワークを構築するべく上記自局無線端末と複数の他局無線端末との間で認証処理が行われる場合も想定される。上記複数の他局無線端末夫々は機能,性能等が異なるため,暗号化に用いられる鍵情報や暗号化手法が異なる場合があり得る。この場合,上記自局無線端末が複数の無線端末に対して認証を行うことにより,上記認証情報記憶手段に複数の鍵情報が格納されることになる。これでは,上記複数の他局無線端末から送信された各暗号データを復号化するための鍵情報を特定することができず,暗号データを容易に復号化することができない。このような問題を解消するべく本発明は,上記自局無線端末において暗号化された第1の暗号データをメモリ等の自局側暗号データ記憶手段に記憶し,上記他局無線端末から送信された上記第2の暗号データと上記記憶された上記第1の暗号データとを照合し,該照合の結果に基づいて,上記自局無線端末における暗号化の際に用いた共通の鍵情報を抽出するよう構成されている。なお,上記自局側暗号データ記憶手段のオーバーフローを回避するべく上記照合が終了した際に上記自局側暗号データ記憶手段に記憶された上記第1の暗号データを消去することが望ましい。   By the way, it is assumed that authentication processing is performed between the local station wireless terminal and the plurality of other station wireless terminals in order to construct a network with the plurality of other station wireless terminals. Since each of the plurality of other-station wireless terminals has different functions, performances, etc., the key information and encryption method used for encryption may be different. In this case, a plurality of pieces of key information are stored in the authentication information storage means by the local station wireless terminal authenticating a plurality of wireless terminals. This makes it impossible to specify key information for decrypting each encrypted data transmitted from the plurality of other-station wireless terminals, and the encrypted data cannot be easily decrypted. In order to solve such a problem, the present invention stores the first encrypted data encrypted in the local station wireless terminal in the local station side encrypted data storage means such as a memory, and is transmitted from the other station wireless terminal. The second encrypted data and the stored first encrypted data are collated, and based on the result of the collation, common key information used for the encryption at the local station is extracted. It is configured to It should be noted that it is desirable to erase the first encrypted data stored in the local-station-side encrypted data storage means when the collation is completed in order to avoid overflow of the own-station-side encrypted data storage means.

また,上記認証情報が,上記他局無線端末の固有情報以外に,上記自局無線端末における暗号化に用いられる鍵情報Aと,上記自局無線端末における復号化に用いられる上記鍵情報Aとは異なる鍵情報Bとを含んでなるものであってもよい。これにより,上記自局無線端末側で行われる暗号化,復号化が異なる鍵情報で行われるため,暗号化された固有情報の高度な機密保護を実現することが可能となる。
また,この場合も,上記自局無線端末と複数の他局無線端末との間で認証処理が行われることにより,上記複数の他局無線端末から送信された各暗号データを復号化するための鍵情報を特定することができないという問題が生じる。そのため,本発明は,上記自局側認証情報記憶手段に記憶された上記他局無線端末の固有情報を上記鍵情報Bを用いて暗号化し,該暗号化により得られた鍵情報Bの暗号データを記憶し,上記他局無線端末から送信された上記第2の暗号データと上記記憶された上記鍵情報Bの暗号データとを照合し,該照合の結果に基づいて,上記暗号化の際に用いた鍵情報Bを抽出するよう構成されている。なお,上記鍵情報Bの暗号データが記憶される自局側鍵情報B暗号データ記憶手段のオーバーフローを回避するべく,上記照合が終了した際に上記自局側鍵情報B暗号データ記憶手段に記憶された上記鍵情報Bの暗号データを消去することが望ましい。
In addition to the unique information of the other station radio terminal, the authentication information includes key information A used for encryption in the own station radio terminal, and key information A used for decryption in the own station radio terminal. May include different key information B. Thereby, since encryption and decryption performed on the local radio terminal side are performed with different key information, it is possible to realize a high level of security protection of the encrypted unique information.
Also in this case, an authentication process is performed between the local station radio terminal and a plurality of other station radio terminals, thereby decrypting each encrypted data transmitted from the plurality of other station radio terminals. There arises a problem that the key information cannot be specified. Therefore, the present invention encrypts the unique information of the other station wireless terminal stored in the local station authentication information storage means using the key information B, and the encrypted data of the key information B obtained by the encryption And the second encrypted data transmitted from the other-station wireless terminal and the stored encrypted data of the key information B are collated, and the encryption is performed based on the result of the collation. The key information B used is configured to be extracted. In order to avoid overflow of the local station key information B encryption data storage means in which the encryption data of the key information B is stored, it is stored in the local station key information B encryption data storage means when the verification is completed. It is desirable to erase the encrypted data of the key information B.

以上説明したように,本発明は,相互に無線接続されることにより構築される自立分散型の無線ネットワークを構成する自局無線端末と他局無線端末との間で,上記無線ネットワークが構築される際に行われる無線端末の認証処理に適用されるものであって,上記自局無線端末は,予め取得された上記他局無線端末の認証情報に含まれる上記他局無線端末の固有情報を暗号化し,該暗号化により得られた第1の暗号データと上記自局無線端末のアドレス情報とを不特定多数の無線端末に一斉同報通信し,一方,上記他局無線端末は,上記自局無線端末によって一斉同報通信された上記第1の暗号データと上記自局無線端末のアドレス情報とを受信した後に上記第1の暗号データを復号化し,該復号化により得られた第1の復号データと上記他局無線端末が保持(記憶)する上記他局無線端末の固有情報とを照合し,該照合の結果に基づいて上記他局無線端末の固有情報を暗号化し,その後,該暗号化により得られた第2の暗号データと上記他局無線端末のアドレス情報とを上記自局無線端末のアドレス情報に基づいて上記自局無線端末に送信し,上記自局無線端末は更に,上記他局無線端末から送信された上記第2の暗号データと上記他局無線端末のアドレス情報とを受信した後に上記第2の暗号データを復号化し,該復号化により得られた第2の復号データと予め取得された上記他局無線端末の固有情報とを照合するよう構成されている。そのため,例えば不特定の無線端末が集まってネットワークを構築する場合でも,セキュリティが十分確保された環境下で認証情報を送受信することが可能となる。これにより,上記認証情報に含まれる無線端末の固有情報や該無線端末の利用者の個人情報等の漏洩を防止し,セキュリティ性の高い安全なネットワークを構築すること可能となる。また,既に構築されたネットワークへの第三者の不正侵入を排除して,ネットワーク上で送受信されるデータや共有化されたディレクトリやフォルダ内の情報の第三者による盗聴,傍受或いは改ざんを効果的に防止することが可能となる。   As described above, according to the present invention, the wireless network is constructed between the local station wireless terminal and the other station wireless terminal that constitute the autonomous distributed wireless network constructed by being wirelessly connected to each other. The self-station radio terminal uses unique information of the other-station radio terminal included in the previously acquired authentication information of the other-station radio terminal. The first encrypted data obtained by the encryption and the address information of the local station wireless terminal are broadcast simultaneously to an unspecified number of wireless terminals, while the other station wireless terminal After receiving the first cipher data broadcasted by the station radio terminal and the address information of the local radio terminal, the first cipher data is decrypted, and the first cipher data obtained by the decryption is obtained. Decrypted data and other above It collates with the unique information of the other station wireless terminal held (stored) by the wireless terminal, encrypts the unique information of the other station wireless terminal based on the result of the collation, and then obtains the first information obtained by the encryption. 2 and the address information of the other station radio terminal are transmitted to the own station radio terminal based on the address information of the own station radio terminal, and the own station radio terminal further transmits from the other station radio terminal. After receiving the second encrypted data and the address information of the other station wireless terminal, the second encrypted data is decrypted, the second decrypted data obtained by the decryption and the previously obtained It is configured to collate with the unique information of the other station wireless terminal. Therefore, for example, even when unspecified wireless terminals gather to construct a network, authentication information can be transmitted and received in an environment where security is sufficiently ensured. As a result, it is possible to prevent leakage of specific information of the wireless terminal included in the authentication information, personal information of the user of the wireless terminal, and the like, and to build a safe network with high security. In addition, it eliminates unauthorized third party intrusion into an already established network, and is effective in eavesdropping, eavesdropping, or tampering with data transmitted / received over the network and information in shared directories and folders. Can be prevented.

以下添付図面を参照しながら,本発明の実施の形態及び実施例について説明し,本発明の理解に供する。なお,以下の実施の形態及び実施例は,本発明を具体化した一例であって,本発明の技術的範囲を限定する性格のものではない。
ここに,図1は本発明の第1の実施の形態に係る無線端末認証システムXを構成する無線端末P1及びP2の概略構成を示すブロック図,図2は無線端末P2の認証情報の一例を示す模式図,図3は無線端末間の無線通信エリアを示す模式図,図4は無線端末P1及びP2において実行される認証処理の手順の一例を説明するフローチャート,図5は本発明の第2の実施の形態に係る無線端末認証システムX′を構成する無線端末P1′及びP2の概略構成を示すブロック図,図6は無線端末P1′及びP2において実行される認証処理の手順の一例を説明するフローチャートである。
Hereinafter, embodiments and examples of the present invention will be described with reference to the accompanying drawings so that the present invention can be understood. It should be noted that the following embodiments and examples are examples embodying the present invention, and are not of a nature that limits the technical scope of the present invention.
FIG. 1 is a block diagram showing a schematic configuration of radio terminals P1 and P2 constituting the radio terminal authentication system X according to the first embodiment of the present invention, and FIG. 2 shows an example of authentication information of the radio terminal P2. FIG. 3 is a schematic diagram showing a wireless communication area between wireless terminals, FIG. 4 is a flowchart for explaining an example of a procedure of authentication processing executed in the wireless terminals P1 and P2, and FIG. FIG. 6 is a block diagram showing a schematic configuration of the wireless terminals P1 ′ and P2 constituting the wireless terminal authentication system X ′ according to the embodiment, and FIG. 6 illustrates an example of a procedure of authentication processing executed in the wireless terminals P1 ′ and P2. It is a flowchart to do.

(第1の実施の形態)
まず,図1のブロック図を用いて,本発明の第1の実施の形態に係る無線端末認証システムX(以下,システムXと略す)の概略構成について説明する。
本システムXは,相互に無線接続されることにより構築されるアドホックネットワーク(自立分散型の無線ネットワークに相当)が構築される際に,任意の2つの無線端末,例えば無線端末P1(自局無線端末に相当)と無線端末P2(他局無線端末に相当)との間で行われる無線端末の認証処理に用いられるシステムであって,図1に示すように,少なくとも無線端末P1とP2とにより構成される。なお,本第1の実施の形態では説明を簡単にするために無線端末P1及びP2の二つの無線端末により構成されたシステムXについて説明するが,本システムXを二以上の無線端末間の認証処理に適用し得ることはいうまでもない。
(First embodiment)
First, a schematic configuration of a wireless terminal authentication system X (hereinafter abbreviated as system X) according to the first embodiment of the present invention will be described using the block diagram of FIG.
When the ad hoc network (corresponding to an autonomous distributed wireless network) constructed by wireless connection between the systems X is constructed, any two wireless terminals such as a wireless terminal P1 (local radio) 1 corresponds to a terminal) and a wireless terminal P2 (corresponding to another station wireless terminal), and is a system used for authentication processing of a wireless terminal performed by at least wireless terminals P1 and P2, as shown in FIG. Composed. In the first embodiment, for simplicity of explanation, a system X configured by two wireless terminals P1 and P2 will be described. However, the system X is authenticated between two or more wireless terminals. It goes without saying that it can be applied to processing.

ここで,上記無線端末P1及びP2の概要について説明する。上記無線端末P1,P2は上記システムXを構成する無線端末の一例であって,例えば,無線通信可能なノートパソコン,PDA,携帯電話等のモバイル端末である。もちろん,携帯して移動可能なモバイル端末に限らず,デスクトップ型パソコン等の据え置き型の無線端末であってもよい。以下に,上記無線端末が具備する各構成要素について説明する。なお,以下に述べる構成要素以外の構成要素については従来周知であるためここでは詳細な説明を省略する。   Here, an outline of the wireless terminals P1 and P2 will be described. The wireless terminals P1 and P2 are examples of wireless terminals constituting the system X, and are mobile terminals such as a notebook personal computer, a PDA, and a mobile phone that can perform wireless communication. Needless to say, the mobile terminal is not limited to a portable mobile terminal, and may be a stationary wireless terminal such as a desktop personal computer. Hereinafter, each component included in the wireless terminal will be described. Since constituent elements other than the constituent elements described below are well known in the art, a detailed description thereof will be omitted here.

上記無線端末P1は,図1に示すように,少なくとも無線通信部10,認証情報記憶部11,暗号部12,復号部16,固有情報照合部17等を備えて構成される。一方,上記無線端末P2は,少なくとも無線通信部20,復号部21,固有情報照合部22,暗号部23,認証情報保持部24等を備えて構成される。なお,上記暗号部12,23,復号部16,21,固有情報照合部17,22の実体はソフトウェアによる情報処理により具現化されるものであっても,暗号化回路,復号化回路等のハードウェアにより実現されるものであってもよい。
また,上記無線端末P1,P2は,該無線端末の各構成要素を統括的に制御するCPU,後述する認証処理を実行するための認証プログラム等を格納するROM,上記認証プログラムや所定のデータの展開領域として機能するRAM等を有する図示しない周知の制御部を具備する。なお,上記無線端末P1とP2とを明確に区別する必要はなく,上記無線端末P1側で上記無線端末P2を認証する場合に上述のように構成されていれば十分である。また,双方の無線端末相互間で他方の無線端末の認証処理を実現するべく,上記無線端末P1及びP2が有する各構成要素すべてが一の無線端末に設けられて構成されたものであってもよい。
As shown in FIG. 1, the wireless terminal P1 includes at least a wireless communication unit 10, an authentication information storage unit 11, an encryption unit 12, a decryption unit 16, a unique information collation unit 17, and the like. On the other hand, the wireless terminal P2 includes at least a wireless communication unit 20, a decryption unit 21, a unique information collation unit 22, an encryption unit 23, an authentication information holding unit 24, and the like. Even if the entities of the encryption units 12 and 23, the decryption units 16 and 21, and the unique information collation units 17 and 22 are embodied by information processing by software, hardware such as an encryption circuit and a decryption circuit is used. It may be realized by hardware.
The wireless terminals P1 and P2 include a CPU that comprehensively controls each component of the wireless terminal, a ROM that stores an authentication program for executing an authentication process to be described later, the authentication program and predetermined data A well-known control unit (not shown) having a RAM or the like functioning as a development area is provided. The wireless terminals P1 and P2 do not need to be clearly distinguished, and it is sufficient if the wireless terminal P2 is configured as described above when authenticating the wireless terminal P2 on the wireless terminal P1 side. Further, in order to realize the authentication process of the other wireless terminal between the two wireless terminals, all the constituent elements of the wireless terminals P1 and P2 may be provided in one wireless terminal. Good.

上記無線通信部10,20は通信制御プロセッサ(CCP)や無線アンテナ10a,20b等を有する周知の無線通信装置であり,例えば,2.45GHz帯の無線通信規格であるブルートゥースや,ITUが提唱するIEEE802.11規格等に準拠する無線LANカードや,赤外線データ通信規格IrDAに準拠する赤外線通信機器(赤外線通信ポート等)等が該当する。この無線通信部10,20は,無線アンテナ10a,20aを用いて電波や赤外線等の所定のバンド幅の搬送波を介して上記無線端末P1とP2との間でデータの送受信を行う。
また,上記無線通信部20は,RFIDタグ1(所定の記憶媒体の一例)に上記無線アンテナ20aを介して少なくとも上記無線端末P2の固有情報を含む認証情報を記憶させる。更に,上記無線通信部10は,上記RFID1から送信されたデータを上記無線アンテナ10aを介して受信することにより,上記RFIDタグ1から上記認証情報を読み取る(取得する)。即ち,上記RFID1へデータを記憶させ,或いは上記RFID1からデータを読み取る処理を行う上記無線通信部10,20は,いわゆるリーダライタとして機能する。
The wireless communication units 10 and 20 are well-known wireless communication devices having a communication control processor (CCP), wireless antennas 10a and 20b, etc., for example, Bluetooth, which is a wireless communication standard of 2.45 GHz band, and ITU advocates. This corresponds to a wireless LAN card compliant with the IEEE 802.11 standard, an infrared communication device (such as an infrared communication port) compliant with the infrared data communication standard IrDA, and the like. The wireless communication units 10 and 20 transmit and receive data between the wireless terminals P1 and P2 through a carrier wave having a predetermined bandwidth such as radio waves and infrared rays using the wireless antennas 10a and 20a.
The wireless communication unit 20 stores authentication information including at least the unique information of the wireless terminal P2 in the RFID tag 1 (an example of a predetermined storage medium) via the wireless antenna 20a. Further, the wireless communication unit 10 reads (acquires) the authentication information from the RFID tag 1 by receiving the data transmitted from the RFID 1 via the wireless antenna 10a. That is, the wireless communication units 10 and 20 that store data in the RFID 1 or read data from the RFID 1 function as a so-called reader / writer.

本実施の形態例では,上記無線端末P2からP1へ認証情報を取得させるために用いる所定の記憶媒体の一例として,上述の如く,接触型のメモリーカードではなく無線方式の非接触型メモリであるRFIDタグ1を用いる。これにより,上記無線端末P1に接触型メモリカードを読み取るカードスロット等を設けることなく,更に,無線通信部10を利用して上記RFIDタグ1内のデータを読み取ることができるため,上記無線端末P1の省スペース化を図ることができる。もちろん,上記所定の記憶媒体としてSDカード等の接触型のメモリカードを用いてもよい。また,電子記憶媒体等を用いずに,メモ等に記載された認証情報をキーボード等から無線端末P1に入力させて上記認証情報を取得させる構成であってもかまわない。なお,上記固有情報とは,上記ノードn2を識別するための識別情報(ID情報)等である。   In the present embodiment, as an example of a predetermined storage medium used for acquiring authentication information from the wireless terminals P2 to P1, as described above, a wireless non-contact type memory is used instead of a contact type memory card. An RFID tag 1 is used. As a result, the wireless terminal P1 can read data in the RFID tag 1 using the wireless communication unit 10 without providing a card slot or the like for reading the contact-type memory card in the wireless terminal P1. Can be saved. Of course, a contact-type memory card such as an SD card may be used as the predetermined storage medium. Further, without using an electronic storage medium or the like, the authentication information described in a memo or the like may be input to the wireless terminal P1 from a keyboard or the like to acquire the authentication information. The unique information is identification information (ID information) for identifying the node n2.

上記無線端末P1の暗号部12(自局側暗号化手段の一例)及び無線端末P2の暗号部23(他局側暗号化手段の一例)は,所定の鍵情報を用いてデータを暗号化するものである。この暗号化は,例えば,DES(Data Encryption Standard),3DES(トリプルDES)或いはAES(Advanced Encryption Standard)等のアルゴリズム(暗号規則)に従ってデータを暗号化する暗号化回路,或いは暗号化プログラム等のソフトウェアによる暗号化処理が具現化されたハードウェア等により実現される。
また,上記無線端末P1の復号部16(自局側復号化手段の一例)及び無線端末P2の復号部21(他局側復号化手段の一例)は,暗号データを該暗号データを暗号化した際に用いられた鍵情報を用いて復号化するものである。この復号化は,上記暗号部12,23と同様に,上記アルゴリズムに従ってデータを復号化する復号化回路,或いは復号化プログラム等のソフトウェアによる復号化処理が具現化されたハードウェア等により実現される。
また,上記無線端末P1の固有情報照合部17(自局側固有情報照合手段の一例)及び無線端末P2の固有情報照合部22(他局側固有情報照合手段の一例)は,無線端末P2の固有情報(ID2)を復号化された固有情報(IDa,IDb)と照合するものであり,この照合は,照合対象のデータを比較する比較器(コンパレータ)等を有する照合回路等のハードウェアや,照合プログラム等のソフトウェアによる照合処理が具現化されたハードウェア等により実現される。
なお,上記暗号化,復号化,照合の詳細な処理手順については,後段において図4のフローチャートを用いて説明する。
The encryption unit 12 (an example of the local station side encryption means) of the wireless terminal P1 and the encryption unit 23 (an example of the other station side encryption means) of the wireless terminal P2 encrypt data using predetermined key information. Is. This encryption is performed by, for example, an encryption circuit that encrypts data according to an algorithm (encryption rule) such as DES (Data Encryption Standard), 3DES (Triple DES), or AES (Advanced Encryption Standard), or software such as an encryption program. This is realized by hardware or the like that implements the encryption processing according to.
In addition, the decryption unit 16 (an example of the local station side decryption unit) of the wireless terminal P1 and the decryption unit 21 (an example of the other station side decryption unit) of the wireless terminal P2 encrypt the encrypted data. Decryption is performed using the key information used at the time. Similar to the encryption units 12 and 23, this decryption is realized by a decryption circuit that decrypts data in accordance with the above algorithm, or hardware that implements decryption processing by software such as a decryption program. .
Further, the unique information matching unit 17 (an example of the local station side unique information matching unit) of the wireless terminal P1 and the unique information matching unit 22 (an example of the other station side unique information matching unit) of the wireless terminal P2 The unique information (ID2) is collated with the decrypted unique information (IDa, IDb). This collation is performed by hardware such as a collation circuit having a comparator (comparator) for comparing data to be collated. This is realized by hardware or the like that implements verification processing by software such as a verification program.
The detailed processing procedure of the encryption, decryption, and verification will be described later with reference to the flowchart of FIG.

上記無線端末P1の認証情報記憶部11は,上記RFIDタグ1から予め取得された上記無線端末P2の認証情報を記憶する不揮発性メモリやHDD等の自局側認証情報記憶手段の一例である。
また,上記無線端末P2の認証情報保持部24は,上記RFIDタグ1から上記無線端末P1に予め記憶させた無線端末P2の固有情報を含む認証情報を記憶する不揮発性メモリやHDD等の他局側認証情報記憶手段の一例である。即ち,認証情報保持部24に記憶された認証情報が上記RFIDタグ1に記憶され,このRFIDタグ1に記憶された認証情報が上記認証情報記憶部11に記憶される。
上記認証情報は,例えば図2(a)に示す認証情報30aのように,上記無線端末P2の固有情報31と,上記暗号部12による暗号化及び上記復号部16による復号化に共通して用いられる共通の鍵情報32とを含んで構成されている。また,図2(b)に示す認証情報30bのように,上記無線端末P2の固有情報31と,上記暗号部12による暗号化に用いられる鍵情報A33と,上記復号部16による復号化に用いられる上記鍵情報Aとは異なる鍵情報B34とを含んで構成されていてもかまわない。上記認証情報30aを用いて後述する認証処理を行う場合は,上記共通の鍵情報32を用いて無線端末P1,P2における暗号化,復号化が実行されることになる。また,上記認証情報30bを用いて後述する認証処理を行う場合は,上記鍵情報A33を用いて無線端末P1の暗号部12における暗号化及び無線端末P2の復号部21における復号化が実行され,上記鍵情報B34を用いて無線端末P2の暗号部23における暗号化及び無線端末P1の復号部16における復号化が実行されることになる。
The authentication information storage unit 11 of the wireless terminal P1 is an example of a local authentication information storage unit such as a nonvolatile memory or HDD that stores the authentication information of the wireless terminal P2 acquired in advance from the RFID tag 1.
Further, the authentication information holding unit 24 of the wireless terminal P2 is a non-volatile memory that stores authentication information including the unique information of the wireless terminal P2 stored in advance in the wireless terminal P1 from the RFID tag 1 or another station such as an HDD. It is an example of a side authentication information storage means. That is, the authentication information stored in the authentication information holding unit 24 is stored in the RFID tag 1, and the authentication information stored in the RFID tag 1 is stored in the authentication information storage unit 11.
The authentication information is used in common for the unique information 31 of the wireless terminal P2, the encryption by the encryption unit 12, and the decryption by the decryption unit 16, as in the authentication information 30a shown in FIG. And common key information 32. Also, as the authentication information 30b shown in FIG. 2B, the unique information 31 of the wireless terminal P2, the key information A33 used for encryption by the encryption unit 12, and the decryption by the decryption unit 16 are used. The key information B may be different from the key information A. When performing an authentication process to be described later using the authentication information 30a, the wireless terminals P1 and P2 are encrypted and decrypted using the common key information 32. Further, when performing an authentication process to be described later using the authentication information 30b, encryption in the encryption unit 12 of the wireless terminal P1 and decryption in the decryption unit 21 of the wireless terminal P2 are executed using the key information A33. Using the key information B34, encryption in the encryption unit 23 of the wireless terminal P2 and decryption in the decryption unit 16 of the wireless terminal P1 are executed.

ここで,図4のフローチャートを用いて,自局無線端末である無線端末P1及び他局端末である無線端末P2において所定の認証プログラムに従ってCPU等により実行される認証処理の手順の一例について説明する。なお,前記RFIDタグ1には,上記無線端末P2の無線通信部20により図2に示す認証情報30bが予め記憶されており,本認証処理は上記認証情報30bを用いて行われる。また,図3に示すように,無線端末P1の無線通信エリアZ1内にアドホックネットワークへの加入が認められる無線端末P2と,上記アドホックネットワークへの加入が認められない無線端末Pnとが存在し,更に,上記無線端末P2,Pn夫々の無線通信エリアZ2,Zn内に無線端末P1のみが存在するものとし,このような無線通信環境の下で行われる認証処理について説明する。また,以下の説明では,上記認証情報30bに含まれ鍵情報A,鍵情報B,無線端末P2の固有情報夫々をkeyA,keyB,ID2と称す。図中のS10,S20,…は処理手順(ステップ)番号を示し,処理はS10より開始される。   Here, an example of a procedure of authentication processing executed by the CPU or the like in accordance with a predetermined authentication program in the wireless terminal P1 that is the local station terminal and the wireless terminal P2 that is the other station terminal will be described using the flowchart of FIG. . In the RFID tag 1, the authentication information 30b shown in FIG. 2 is stored in advance by the wireless communication unit 20 of the wireless terminal P2, and this authentication processing is performed using the authentication information 30b. Also, as shown in FIG. 3, there are a wireless terminal P2 that is allowed to join an ad hoc network and a wireless terminal Pn that is not allowed to join the ad hoc network in the wireless communication area Z1 of the wireless terminal P1, Further, assuming that only the wireless terminal P1 exists in the wireless communication areas Z2 and Zn of the wireless terminals P2 and Pn, an authentication process performed under such a wireless communication environment will be described. In the following description, the key information A, the key information B, and the unique information of the wireless terminal P2 included in the authentication information 30b are referred to as keyA, keyB, and ID2, respectively. In the figure, S10, S20,... Indicate processing procedure (step) numbers, and the processing starts from S10.

(S10〜S20)
まず,無線端末P1側では,無線端末P1の近傍に移動されることにより上記RFIDタグ1から送信された無線端末P2の認証情報30b(図2(b))が無線端末P1の無線アンテナ10aを介して無線通信部10で読み取られ(取得され),その後,読み取られた認証情報30bが上記無線端末P1の認証情報記憶部11に記憶される(S10)。続いて,上記認証情報記憶部11に記憶された上記認証情報30bに含まれるkeyAを用いて,上記認証情報30bに含まれる無線端末P2のID2が上記暗号部12で暗号化される(S20)。ここで,上記暗号部12においてkeyAを用いて暗号化された暗号データを[ID2/keyA]とする。なお,この暗号データ[ID2/keyA]が第1の暗号データに相当する。
(S10 to S20)
First, on the wireless terminal P1 side, the authentication information 30b (FIG. 2 (b)) of the wireless terminal P2 transmitted from the RFID tag 1 by moving to the vicinity of the wireless terminal P1 is transmitted to the wireless antenna 10a of the wireless terminal P1. The authentication information 30b is then read (obtained) by the wireless communication unit 10 and stored in the authentication information storage unit 11 of the wireless terminal P1 (S10). Subsequently, the ID 2 of the wireless terminal P2 included in the authentication information 30b is encrypted by the encryption unit 12 using the keyA included in the authentication information 30b stored in the authentication information storage unit 11 (S20). . Here, it is assumed that the encrypted data encrypted by using the key A in the encryption unit 12 is [ID2 / key A]. The encrypted data [ID2 / keyA] corresponds to the first encrypted data.

(S30)
上記ステップS20で暗号化されて得られた暗号データ[ID2/keyA]は,上記無線通信部10に転送され,その後,該無線通信部10から無線端末P1の所在を示すアドレス情報(例えばIPアドレス等)と共に不特定多数の無線端末に一斉同報通信される(S30)。この一斉同報通信は,例えば,無線端末P1の無線通信エリアZ1全域に上記暗号データ[ID2/keyA]と無線端末P1のアドレス情報とが乗せられた所定の無線電波(以下,同報電波と称す)を送信することにより行われる。上記同報電波は,例えば,放送通信に用いられる電波の如く予め定められたバンド幅(周波数帯域)の無線電波や,認証処理に用いられるデータを含むことを示す識別情報が乗せられた無線電波等であることが考えられる。このような同報電波が無線通信エリアZ1全域に伝播されたときは,すべての無線端末で同報電波を受信するよう予め通信ルール(通信プロトコル)を定めておくことにより,ネットワークが構築される前であっても上記一斉同報通信を実現することが可能である。なお,予め定められたバンド幅の無線電波を同報電波に用いる場合は,該同報電波のバンド幅での他のデータ(認証処理に用いられるデータ以外のデータ)の送受信が制限されるようにしておく必要がある。認証処理に用いられるデータとその他のデータとが錯綜することを防止するためのである。
なお,上述のステップS20において,無線端末P2のID2と共に上記無線端末P1のアドレス情報を暗号化してもかまわない。このようにアドレス情報をも暗号化することにより,アドホックネットワークへの加入が認められない無線端末Pnへの上記アドレス情報の漏洩を抑制することができ,また,上記無線端末Pnや第三者による無線端末P1に対する不正通信を防止することができる。
(S30)
The encrypted data [ID2 / keyA] obtained by the encryption in step S20 is transferred to the wireless communication unit 10 and then address information (for example, an IP address) indicating the location of the wireless terminal P1 from the wireless communication unit 10 Etc.) and broadcast to an unspecified number of wireless terminals (S30). This simultaneous broadcast communication is, for example, a predetermined radio wave (hereinafter referred to as a broadcast radio wave) in which the encrypted data [ID2 / keyA] and the address information of the radio terminal P1 are placed over the entire radio communication area Z1 of the radio terminal P1. This is done by sending The broadcast radio wave is, for example, a radio wave with a predetermined bandwidth (frequency band) such as a radio wave used for broadcast communication, or a radio wave carrying identification information indicating that it includes data used for authentication processing. And so on. When such broadcast waves are propagated throughout the wireless communication area Z1, a network is constructed by setting communication rules (communication protocols) in advance so that all wireless terminals receive the broadcast waves. Even before the above, it is possible to realize the simultaneous broadcast communication. When radio waves with a predetermined bandwidth are used for broadcast waves, transmission / reception of other data (data other than data used for authentication processing) with the bandwidth of the broadcast waves is restricted. It is necessary to keep it. This is to prevent the data used for the authentication process from being confused with other data.
In step S20 described above, the address information of the wireless terminal P1 may be encrypted together with the ID2 of the wireless terminal P2. By encrypting the address information in this way, leakage of the address information to the wireless terminal Pn that is not allowed to join the ad hoc network can be suppressed, and the wireless terminal Pn or a third party can prevent the address information from being leaked. Unauthorized communication with the wireless terminal P1 can be prevented.

(S40〜S50)
続いて,上記無線端末P2側において,上記無線端末P1から送信された暗号データ[ID2/keyA]及び無線端末P1のアドレス情報が上記無線端末P2の無線アンテナ20aを介して無線通信部20で受信されると(S40),その後,受信されたデータが復号部21に転送され,転送された暗号データ[ID2/keyA]がkeyAを用いて復号部21で復号化される(S50)。
この復号化に用いられるkeyAは上記暗号部12において上記暗号データ[ID2/keyA]が暗号化されたときに用いられたものと同じ鍵情報であり,前記認証情報保持部24に記憶されたkeyAである。無線端末P1とP2とは認証を行うべくRFIDタグ1を用いて事前にkeyAや後述するkeyB等を含む認証情報の送受信が行われているため,双方の端末は同一のkeyAを所有しており,そのため,上記無線端末P2側で,無線端末P1の暗号部12において暗号化された暗号データ[ID2/keyA]を復号化することができるのである。ここで,上記復号部21で復号化された復号データをID2aとする。なお,このID2aが第1の復号データに相当する。
一方,アドホックネットワークへの加入を認めない上記無線端末Pn側においても,図示しない無線アンテナ,無線通信部を介して暗号データ[ID2/keyA]及び無線端末P1のアドレス情報が受信される。しかし,上記無線端末Pnは上記暗号データ[ID2/keyA]を復号するためのkeyAを所有していないため,上記暗号データ[ID2/keyA]を復号化することができない。また,上記暗号データ[ID2/keyA]を復号化しないまま,上記無線端末P1に対して通信許可を要求したとしても,後述する固有情報照合部17における照合の結果,当該要求は認められない。そのため,上記無線端末P1と無線端末Pnとの間では認証が行われない。従って,上記無線端末P1と無線端末Pnとの間でアドホックネットワークが構築さることはなく,上記無線端末P1と無線端末P2との間で構築されるアドホックネットワークに加入することができない。
(S40-S50)
Subsequently, on the wireless terminal P2 side, the encrypted data [ID2 / keyA] and the address information of the wireless terminal P1 transmitted from the wireless terminal P1 are received by the wireless communication unit 20 via the wireless antenna 20a of the wireless terminal P2. Then (S40), the received data is then transferred to the decryption unit 21, and the transferred encrypted data [ID2 / keyA] is decrypted by the decryption unit 21 using keyA (S50).
The keyA used for the decryption is the same key information used when the encrypted data [ID2 / keyA] is encrypted in the encryption unit 12, and the keyA stored in the authentication information holding unit 24 is used. It is. Since the wireless terminals P1 and P2 transmit and receive authentication information including keyA and keyB (to be described later) using the RFID tag 1 in advance for authentication, both terminals have the same keyA. Therefore, the encrypted data [ID2 / keyA] encrypted in the encryption unit 12 of the wireless terminal P1 can be decrypted on the wireless terminal P2 side. Here, the decrypted data decrypted by the decrypting unit 21 is ID2a. This ID 2a corresponds to the first decrypted data.
On the other hand, the encrypted data [ID2 / keyA] and the address information of the wireless terminal P1 are also received via the wireless antenna and the wireless communication unit (not shown) on the wireless terminal Pn side that does not permit ad-hoc network subscription. However, since the wireless terminal Pn does not have keyA for decrypting the encrypted data [ID2 / keyA], the wireless terminal Pn cannot decrypt the encrypted data [ID2 / keyA]. Even if communication permission is requested to the wireless terminal P1 without decrypting the encrypted data [ID2 / keyA], the request is not permitted as a result of collation in the unique information collation unit 17 described later. Therefore, authentication is not performed between the wireless terminal P1 and the wireless terminal Pn. Therefore, an ad hoc network is not constructed between the wireless terminal P1 and the wireless terminal Pn, and it is not possible to join an ad hoc network constructed between the wireless terminal P1 and the wireless terminal P2.

(S60〜S90)
続いて,上記ステップS50で復号化されて得られた復号データID2aと無線端末P2の認証情報保持部24に格納されたID2とが固有情報照合部22で照合される(S60)。この照合は,一斉同報通信により受信したデータが自身に対する認証要求であるかどうかを判断するため,そして,受信データの送信元が無線端末P1であることを確認するために行われるものであり,照合が一致した場合は,上記無線端末P1からP2に対する認証要求であると判断する。かかる照合の結果,ステップS70において,ID2aとID2とが一致すると判断されると,続いて,上記照合の結果に基づいて,上記認証情報保持部24に格納されたkeyBを用いて上記ID2が無線端末P2の暗号部23で暗号化される(S80)。ここで,上記暗号部23においてkeyBを用いて暗号化された暗号データを[ID2/keyB]とする。なお,この[ID2/keyB]が第2の暗号データに相当する。上記ステップS70の認証が一致しないと判断されると,処理はS71に進み,無線端末P2に対する認証要求ではないため,受信したデータは排除される。或いは,無線端末P1に不一致である旨のエラー信号等が送信され,又は無線端末P2に不一致である旨のエラー情報等が表示出力される(S71)。
続いて,上記ステップS80において暗号化されて得られた暗号データ[ID2/keyB]は,上記無線通信部20に転送され,その後,該無線通信部20から無線端末P2の所在を示すアドレス情報と共に上記無線端末P1に送信される(S90)。この送信は上記ステップS40で受信した無線端末P1のアドレス情報に基づいて行われる。
(S60-S90)
Subsequently, the decryption data ID2a obtained by decryption in step S50 and ID2 stored in the authentication information holding unit 24 of the wireless terminal P2 are collated by the unique information collation unit 22 (S60). This collation is performed in order to determine whether or not the data received by the broadcast communication is an authentication request for itself, and to confirm that the transmission source of the received data is the wireless terminal P1. If the verifications match, it is determined that the authentication request is for the wireless terminals P1 to P2. As a result of the collation, if it is determined in step S70 that ID2a and ID2 match, the ID2 is wirelessly transmitted using the keyB stored in the authentication information holding unit 24 based on the collation result. Encryption is performed by the encryption unit 23 of the terminal P2 (S80). Here, it is assumed that the encrypted data encrypted by using the key B in the encryption unit 23 is [ID2 / key B]. This [ID2 / keyB] corresponds to the second encrypted data. If it is determined that the authentication in step S70 does not match, the process proceeds to S71, and since it is not an authentication request for the wireless terminal P2, the received data is excluded. Alternatively, an error signal indicating mismatch is transmitted to the wireless terminal P1, or error information indicating mismatch is displayed and output to the wireless terminal P2 (S71).
Subsequently, the encrypted data [ID2 / keyB] obtained by being encrypted in step S80 is transferred to the wireless communication unit 20, and then address information indicating the location of the wireless terminal P2 is transmitted from the wireless communication unit 20 together with the address information. It is transmitted to the wireless terminal P1 (S90). This transmission is performed based on the address information of the wireless terminal P1 received in step S40.

(S100〜S130)
上記無線端末P1側で,上記無線端末P2から送信された暗号データ[ID2/keyB]及び無線端末P2のアドレス情報が受信されたと判断されると(S100),受信した暗号データ[ID2/keyB]が前記認証情報記憶部11に記憶されたkeyBを用いて復号部16で復号化される(S110)。ここで,上記復号部16で復号化された復号データをID2bとする。なお,このID2bが第2の復号データに相当する。
続いて,上記ステップS110で復号化されて得られた復号データID2bと無線端末P1の認証情報記憶部11に記憶されたID2とが固有情報照合部17で照合される(S120)。この照合は,上記一斉同報通信に応答して送信した端末が無線端末P2かどうかを確認するために行われる処理であり,照合が一致した場合は,上記無線端末P2からの送信であると判断する。かかる照合の結果,ステップS130において,ID2bとID2とが一致すると判断されると,無線端末P1と無線端末P2との間で認証が正常に行われたと判断され,その後,一連の処理が終了する。このように認証が正常に行われることにより,無線端末P1とP2との間でアドレス情報や固有情報等が機密的に送受信される。これにより,無線端末P1とP2との間でセキュリティ性の高いアドホックネットワークが構築される。
また,上記ステップS130における認証が一致しないと判断されると,処理はS131に進み,無線端末P2に認証が一致しない旨のエラー信号等が送信され,又は無線端末P1にネットワークを認めない無線端末Pn等からのデータであることを示すエラー情報等が表示出力され,その後,一連の処理が終了する。なお,上記ステップS130における認証が終了した際に,上記認証情報記憶部11に記憶された無線端末P2の認証情報は消去される。無線端末と認証処理を行うたびに上記認証情報が蓄積されることによる上記認証情報記憶部11のオーバーフローを回避するためであり,他局の無線端末の固有情報を含む認証情報をいつまでも保持することはセキュリティ上も好ましくないからである。
一方,上記無線端末Pnから無線端末P1に対する通信許可の要求がなされたとしても,上述したように固有情報照合部17における照合が一致しない結果,当該要求は認められない。このような要求は通常破棄される。即ち,上記無線端末P1と無線端末Pnとの間では認証は行われず,上記無線端末P1と無線端末Pnとの間でアドホックネットワークが構築されることはない。即ち,無線端末P1と無線端末P2との間で構築されるアドホックネットワークに上記無線端末Pnが加入することができない。
このように,アドホックネットワークが構築される際に,データ通信やデータの共有化等を望む相手方の無線端末との間で安全性の高い認証処理が行われるため,認証の際に送受信される認証情報に含まれる無線端末の固有情報や利用者の個人情報等の漏洩を防止して,セキュリティ性の高い安全なネットワークを構築すること可能となる。また,ネットワークへの第三者の不正侵入を排除して,ネットワーク上で送受信されるデータや共有化されたディレクトリやフォルダ内の情報の第三者による盗聴,傍受或いは改ざんを効果的に防止することが可能となる。
(S100-S130)
When it is determined that the encrypted data [ID2 / keyB] and the address information of the wireless terminal P2 transmitted from the wireless terminal P2 are received on the wireless terminal P1 side (S100), the received encrypted data [ID2 / keyB] Is decrypted by the decryption unit 16 using the keyB stored in the authentication information storage unit 11 (S110). Here, the decrypted data decrypted by the decrypting unit 16 is ID2b. This ID2b corresponds to the second decrypted data.
Subsequently, the decrypted data ID2b obtained by decryption in step S110 and ID2 stored in the authentication information storage unit 11 of the wireless terminal P1 are collated by the unique information collation unit 17 (S120). This collation is a process performed to confirm whether or not the terminal transmitted in response to the broadcast communication is the radio terminal P2, and if the collation matches, the transmission is from the radio terminal P2. to decide. As a result of the collation, if it is determined in step S130 that ID2b and ID2 match, it is determined that the authentication is normally performed between the wireless terminal P1 and the wireless terminal P2, and then a series of processing ends. . When authentication is normally performed in this manner, address information, unique information, and the like are transmitted and received secretly between the wireless terminals P1 and P2. Thereby, an ad hoc network with high security is constructed between the wireless terminals P1 and P2.
If it is determined that the authentications in step S130 do not match, the process proceeds to S131, an error signal indicating that the authentications do not match is transmitted to the wireless terminal P2, or the wireless terminal that does not recognize the network in the wireless terminal P1. Error information indicating that the data is from Pn or the like is displayed and output, and then a series of processing ends. When the authentication in step S130 is completed, the authentication information of the wireless terminal P2 stored in the authentication information storage unit 11 is deleted. This is to avoid overflow of the authentication information storage unit 11 due to accumulation of the authentication information every time authentication processing is performed with a wireless terminal, and to keep authentication information including unique information of the wireless terminal of another station forever. This is because it is not preferable in terms of security.
On the other hand, even if a request for communication permission from the wireless terminal Pn to the wireless terminal P1 is made, as a result of the collation in the unique information collating unit 17 not matching as described above, the request is not accepted. Such requests are usually discarded. That is, authentication is not performed between the wireless terminal P1 and the wireless terminal Pn, and an ad hoc network is not established between the wireless terminal P1 and the wireless terminal Pn. That is, the wireless terminal Pn cannot join the ad hoc network constructed between the wireless terminal P1 and the wireless terminal P2.
In this way, when an ad hoc network is constructed, authentication processing that is highly secure is performed with the wireless terminal of the other party that desires data communication or data sharing. It is possible to prevent leakage of specific information of wireless terminals and user personal information included in the information, and to build a highly secure and safe network. It also eliminates unauthorized third-party intrusion into the network and effectively prevents third-party eavesdropping, eavesdropping, or falsification of data sent and received over the network and information in shared directories and folders. It becomes possible.

(第2の実施の形態)
ここでは,図5及び図6を用いて,本発明の第2の実施の形態に係る無線端末認証システムX′(以下,システムX′と略す)について説明する。ここに,図5は本発明の第2の実施の形態に係る無線端末認証システムX′を構成する無線端末P1′及びP2の概略構成を示すブロック図を示し,図6は上記無線端末P1′及びP2において実行される認証処理の手順の一例を説明するフローチャートを示す。なお,以下の説明では,前述の第1の実施の形態における構成要素と同じ構成要素については,同符号を付すことにより上記システムX′の構成要素の説明を省略する。
(Second Embodiment)
Here, a wireless terminal authentication system X ′ (hereinafter abbreviated as “system X ′”) according to the second embodiment of the present invention will be described with reference to FIGS. 5 and 6. FIG. 5 is a block diagram showing a schematic configuration of the radio terminals P1 ′ and P2 constituting the radio terminal authentication system X ′ according to the second embodiment of the present invention. FIG. 6 shows the radio terminal P1 ′. And a flowchart for explaining an example of the procedure of the authentication process executed in P2. In the following description, the same components as those in the first embodiment described above are denoted by the same reference numerals, and the description of the components of the system X ′ is omitted.

まず,図5のブロック図を用いて,本発明の第2の実施の形態に係るシステムX′の概略構成について説明する。
本システムX′は,上述の第1の実施の形態におけるシステムXとは異なり,上記アドホックネットワークを構築する際に,無線端末P1′(自局無線端末に相当)と前記無線端末P2及び該無線端末P2と同じ構成の図示しない無線端末との間で行われる無線端末の認証処理に用いられるシステムであって,図5に示すように少なくとも無線端末P1′とP2と図示しない無線端末とにより構成される。
本システムX′は無線端末P1′と認証する複数の無線端末が存在するため,無線端末P1′の認証情報記憶部11には,認証処理を行う他の無線端末の数に応じた複数の認証情報が格納されることになる。即ち,上記認証情報記憶部11には無線端末の数に応じた複数の固有情報及び鍵情報が格納される。そのため,例えば,無線端末P2から暗号データ[ID2/keyB]を受信したとしても,それを復号化する鍵を上記認証情報記憶部11から容易に探し出すことができない事態が生じ得る。しかしながら,本システムX′によれば,いずれの無線端末から送信された暗号データであっても,該暗号データを復号化する鍵情報を容易に抽出することが可能である。
そのため,本システムX′の無線端末P1′は,上述の第1の実施の形態における無線端末P1が具備する構成要素に加え,暗号データ記憶部13と,暗号データ照合部14と,鍵情報抽出部15とを更に備えて構成されている。もちろん,複数の無線端末相互間における認証処理を可能とするべく,上記無線端末P1′,P2が有する構成要素すべてが一の無線端末に設けられて構成されたものであってもよい。
First, the schematic configuration of the system X ′ according to the second embodiment of the present invention will be described with reference to the block diagram of FIG.
The system X ′ differs from the system X in the first embodiment described above when the ad hoc network is constructed, when the radio terminal P1 ′ (corresponding to the local radio terminal), the radio terminal P2, and the radio terminal P2 A system used for authentication processing of a wireless terminal performed with a wireless terminal (not shown) having the same configuration as that of the terminal P2, and includes at least wireless terminals P1 'and P2 and a wireless terminal (not shown) as shown in FIG. Is done.
Since the system X ′ includes a plurality of wireless terminals that authenticate with the wireless terminal P1 ′, the authentication information storage unit 11 of the wireless terminal P1 ′ stores a plurality of authentications according to the number of other wireless terminals that perform authentication processing. Information will be stored. That is, the authentication information storage unit 11 stores a plurality of unique information and key information corresponding to the number of wireless terminals. Therefore, for example, even if the encrypted data [ID2 / keyB] is received from the wireless terminal P2, a situation may occur in which the key for decrypting it cannot be easily searched from the authentication information storage unit 11. However, according to the present system X ′, it is possible to easily extract key information for decrypting encrypted data transmitted from any wireless terminal.
Therefore, the wireless terminal P1 ′ of the present system X ′ includes the encrypted data storage unit 13, the encrypted data collating unit 14, the key information extraction, in addition to the components included in the wireless terminal P1 in the first embodiment described above. And a portion 15. Of course, in order to enable authentication processing between a plurality of wireless terminals, all the constituent elements of the wireless terminals P1 ′ and P2 may be provided in one wireless terminal.

上記暗号データ記憶部13は,暗号部12で暗号化された暗号データを記憶する不揮発性メモリやHDD等の自局側暗号データ記憶手段或いは自局側鍵情報B暗号データ記憶手段の一例である。
上記暗号データ照合部14(第1又は第2の自局側暗号データ照合手段の一例)は,上記無線端末P2から送信された暗号データと上記暗号データ記憶部13に記憶された暗号データとを照合するものである。この照合は,照合回路,或いは照合プログラム等のソフトウェアによる照合処理が具現化されたハードウェア等により実現される。また,上記鍵情報抽出部15(共通の鍵情報抽出手段,鍵情報B抽出手段の一例)は,上記暗号データ照合部14における照合の結果に基づいて,上記暗号部12における暗号化の際に用いられた鍵情報を上記認証情報記憶部11から抽出するものである。上記暗号データ照合部14における照合及び上記鍵情報抽出部15における抽出の詳細な処理手順については,後段において図6のフローチャートを用いて説明する。
The cipher data storage unit 13 is an example of a local station side cipher data storage unit such as a nonvolatile memory or HDD that stores cipher data encrypted by the cipher unit 12, or a local side key information B cipher data storage unit. .
The encrypted data verification unit 14 (an example of the first or second local station side encrypted data verification unit) combines the encrypted data transmitted from the wireless terminal P2 and the encrypted data stored in the encrypted data storage unit 13. It is to be verified. This verification is realized by a verification circuit or hardware that implements verification processing by software such as a verification program. The key information extraction unit 15 (an example of a common key information extraction unit and a key information B extraction unit) performs encryption in the encryption unit 12 based on the result of verification in the encryption data verification unit 14. The used key information is extracted from the authentication information storage unit 11. A detailed processing procedure of verification in the encrypted data verification unit 14 and extraction in the key information extraction unit 15 will be described later with reference to a flowchart of FIG.

ここで,図6のフローチャートを用いて,無線端末P1′及びP2において図2に示す認証情報30bを用いて実行される認証処理の手順の一例について説明する。なお,前記認証情報記憶部11には,上記無線端末P2以外の他の無線端末との認証処理に用いる(又は既に用いられた)他の認証情報が複数記憶されているものとする。また,図2の上記認証情報30bに含まれる鍵情報A,鍵情報B,無線端末P2の固有情報を夫々keyA,keyB,ID2と称する。前述の第1の実施の形態で図4を用いて説明した手順と同様の手順については同じ処理手順(ステップ)番号を付してその詳細な説明を省略する。処理はS10より開始される。   Here, an example of the procedure of authentication processing executed using the authentication information 30b shown in FIG. 2 in the wireless terminals P1 ′ and P2 will be described using the flowchart of FIG. The authentication information storage unit 11 stores a plurality of other authentication information used (or already used) for authentication processing with other wireless terminals other than the wireless terminal P2. Also, the key information A, key information B, and unique information of the wireless terminal P2 included in the authentication information 30b of FIG. 2 are referred to as keyA, keyB, and ID2, respectively. The same procedures as those described in the first embodiment with reference to FIG. 4 are denoted by the same processing procedure (step) numbers, and detailed description thereof is omitted. The process starts from S10.

(S10〜S30)
まず,無線端末P1′側において,上記RFIDタグ1から送信された認証情報30b(図2(b))が読み取られ(取得され),その後,読み取られた認証情報30bが上記無線端末P1′の認証情報記憶部11に記憶される(S10)。続いて,上記認証情報記憶部11に記憶された上記認証情報30bに含まれるkeyAを用いて,無線端末P2のID2が上記暗号部12で暗号化され(S20),更に,上記認証情報30bに含まれるkeyBを用いて,上記ID2が上記暗号部12で暗号化される(S21)。ここで,上記keyAを用いて暗号化された暗号データを[ID2/keyA],上記keyBを用いて暗号化された暗号データを[ID2/keyB(P1)]とする。なお,上記[ID2/keyB(P1)]が鍵情報B暗号データに相当する。
その後,上記暗号部12における暗号化により得られた暗号データ[ID2/keyA]及び[ID2/keyB(P1)]のうち,暗号データ[ID2/keyB(P1)]だけが暗号データ記憶部13に記憶され(S22),その後,上記暗号データ[ID2/keyA]が無線端末のアドレス情報とお供に一斉同報通信される(S30)。なお,上記ステップ13において暗号データ[ID2/keyB(P1)]が記憶される際に,暗号化に用いられたkeyB或いは該keyBを示す情報が上記暗号データ[ID2/keyB(P1)]に関連付けて記憶される。これにより,後述のステップS102で行われる鍵情報の抽出処理を容易に行うことが可能となる。
(S10 to S30)
First, on the wireless terminal P1 ′ side, the authentication information 30b (FIG. 2B) transmitted from the RFID tag 1 is read (acquired), and then the read authentication information 30b is stored in the wireless terminal P1 ′. It is stored in the authentication information storage unit 11 (S10). Subsequently, using the key A included in the authentication information 30b stored in the authentication information storage unit 11, the ID2 of the wireless terminal P2 is encrypted by the encryption unit 12 (S20), and further to the authentication information 30b. The ID2 is encrypted by the encryption unit 12 using the included keyB (S21). Here, it is assumed that the encrypted data encrypted using the keyA is [ID2 / keyA], and the encrypted data encrypted using the keyB is [ID2 / keyB (P1)]. [ID2 / keyB (P1)] corresponds to the key information B encrypted data.
Thereafter, only the encrypted data [ID2 / keyB (P1)] out of the encrypted data [ID2 / keyA] and [ID2 / keyB (P1)] obtained by the encryption in the encryption unit 12 is stored in the encrypted data storage unit 13. The encrypted data [ID2 / keyA] is then broadcasted together with the address information of the wireless terminal (S30). When the encrypted data [ID2 / keyB (P1)] is stored in the step 13, the keyB used for encryption or information indicating the keyB is associated with the encrypted data [ID2 / keyB (P1)]. Is remembered. This makes it possible to easily perform the key information extraction process performed in step S102 described later.

(S40〜S90)
次に,上記無線端末P2側では,上記無線端末P1′から送信された暗号データ[ID2/keyA]及び無線端末P1のアドレス情報が受信されると(S40),上記暗号データ[ID2/keyA]が復号化され(S50),その後,ステップS60,S70の照合が行われる。上記照合の結果に基づき,ステップS80において,上記ID2がkeyBを用いて暗号化されると(暗号化された暗号データを[ID2/keyB(P2)]とする),その後,暗号化された暗号データ[ID2/keyB(P2)]が上記無線端末P1′に送信される(S90)。
(S40-S90)
Next, when the encrypted data [ID2 / keyA] and the address information of the wireless terminal P1 transmitted from the wireless terminal P1 ′ are received on the wireless terminal P2 side (S40), the encrypted data [ID2 / keyA] Is decrypted (S50), and then collation in steps S60 and S70 is performed. Based on the result of the above collation, in step S80, when ID2 is encrypted using keyB (encrypted encrypted data is referred to as [ID2 / keyB (P2)]), the encrypted encryption is thereafter performed. Data [ID2 / keyB (P2)] is transmitted to the wireless terminal P1 '(S90).

(S100〜S130)
続いて,上記無線端末P1側で,上記無線端末P2から送信された暗号データ[ID2/keyB(P2)]及び無線端末P2のアドレス情報が受信されたと判断されると(S100),受信した暗号データ[ID2/keyB(P2)]と,ステップS22で上記暗号データ記憶部13に記憶された暗号データ[ID2/keyB(P1)]とが上記暗号データ照合部14において照合される。即ち,上記暗号データ記憶部13内に,上記[ID2/keyB(P2)]が含まれているかどうかの照合が実行される。なお,上記暗号データ記憶部13のオーバーフローを回避するべく上記照合が終了した後に,上記暗号データ記憶部13に記憶された上記暗号データ[ID2/keyB(P1)]が消去される。ここで,上記暗号データ[ID2/keyB(P2)]と[ID2/keyB(P1)]とが一致していると判断されると(S102),続いてステップS103において,上記暗号データ記憶部13内の一致する暗号データ[ID2/keyB(P1)]が暗号化されたときに用いられた鍵情報が鍵情報抽出部15で抽出される(S103)。例えば,上記ステップS22において,暗号化に用いられたkeyB或いは該keyBを示す情報が上記暗号データ[ID2/keyB(P1)]に関連付けて記憶されている場合は,関連付けられた上記keyB或いは該keyBを示す情報に基づき上記keyBが抽出される。なお,上記ステップS102において照合が一致しないと判断されると,処理はステップS131に進み,所定のエラー出力処理が行われる。
前述したように,上記認証情報記憶部11には上記無線端末P2以外の他の複数の無線端末の認証情報が格納されているが,本システムX′によれば上記ステップS101〜S103の処理が行われることにより,無線端末P2から送信された暗号データ[ID2/keyB(P2)]を復号化する鍵情報を容易に探し出すことが可能である。
上記ステップS103においてkeyBが抽出されると,抽出されたkeyBを用いて上記暗号データ[ID2/keyB(P2)]が暗号化され(S110),その後,ステップS120,S130の照合が行われた後に一連の処理が終了する。
(S100-S130)
Subsequently, when it is determined that the encrypted data [ID2 / keyB (P2)] and the address information of the wireless terminal P2 transmitted from the wireless terminal P2 are received on the wireless terminal P1 side (S100), the received encryption The data [ID2 / keyB (P2)] and the encrypted data [ID2 / keyB (P1)] stored in the encrypted data storage unit 13 in step S22 are verified in the encrypted data verification unit 14. That is, it is verified whether or not [ID2 / keyB (P2)] is included in the encrypted data storage unit 13. Note that after the collation is completed to avoid overflow of the encrypted data storage unit 13, the encrypted data [ID2 / keyB (P1)] stored in the encrypted data storage unit 13 is deleted. If it is determined that the encrypted data [ID2 / keyB (P2)] and [ID2 / keyB (P1)] match (S102), then in step S103, the encrypted data storage unit 13 The key information used when the encrypted data [ID2 / keyB (P1)] is encrypted is extracted by the key information extraction unit 15 (S103). For example, when the keyB used for encryption or the information indicating the keyB is stored in association with the encrypted data [ID2 / keyB (P1)] in the step S22, the associated keyB or the keyB is stored. The keyB is extracted based on the information indicating the above. If it is determined in step S102 that the collation does not match, the process proceeds to step S131, and a predetermined error output process is performed.
As described above, authentication information of a plurality of wireless terminals other than the wireless terminal P2 is stored in the authentication information storage unit 11, but according to the present system X ′, the processing of steps S101 to S103 is performed. By doing so, it is possible to easily find key information for decrypting the encrypted data [ID2 / keyB (P2)] transmitted from the wireless terminal P2.
When keyB is extracted in step S103, the encrypted data [ID2 / keyB (P2)] is encrypted using the extracted keyB (S110), and then collation in steps S120 and S130 is performed. A series of processing ends.

上述の第1及び第2の実施の形態例では,図2(b)に示す認証情報30bを用いた認証処理について説明したが,図2(a)に示す認証情報30aを用いた認証処理であっても,無線端末間で送受信される認証情報の盗聴,傍受等を抑制して,セキュリティ性の高いアドホックネットワークを構築することができる。この場合,上記無線端末P1(P1′)における暗号化,復号化は上記認証情報30aに含まれる共通の鍵情報32を用いて行われる。
また,上記第2の実施形態のシステムX′における暗号データ記憶部13に記憶された暗号データが暗号データ照合部14における照合(S101)が完了した後に消去されるよう無線端末P1′を構成することにより,上記暗号データ照合部14のオーバーフローを回避することができる。
In the first and second embodiments described above, the authentication process using the authentication information 30b shown in FIG. 2B has been described. However, in the authentication process using the authentication information 30a shown in FIG. Even in such a case, it is possible to construct an ad hoc network with high security by suppressing eavesdropping and interception of authentication information transmitted and received between wireless terminals. In this case, encryption and decryption in the wireless terminal P1 (P1 ′) are performed using the common key information 32 included in the authentication information 30a.
In addition, the wireless terminal P1 ′ is configured such that the encrypted data stored in the encrypted data storage unit 13 in the system X ′ of the second embodiment is erased after the verification (S101) in the encrypted data verification unit 14 is completed. Thus, overflow of the encrypted data collating unit 14 can be avoided.

本発明の第1の実施の形態に係る無線端末認証システムXを構成する無線端末P1及びP2の概略構成を示すブロック図。1 is a block diagram showing a schematic configuration of wireless terminals P1 and P2 constituting a wireless terminal authentication system X according to a first embodiment of the present invention. 無線端末P2の認証情報の一例を示す模式図。The schematic diagram which shows an example of the authentication information of the radio | wireless terminal P2. 無線端末間の無線通信エリアを示す模式図。The schematic diagram which shows the radio | wireless communication area between radio | wireless terminals. 無線端末P1及びP2において実行される認証処理の手順の一例を説明するフローチャート。The flowchart explaining an example of the procedure of the authentication process performed in radio | wireless terminal P1 and P2. 本発明の第2の実施の形態に係る無線端末認証システムX′を構成する無線端末P1′及びP2の概略構成を示すブロック図。The block diagram which shows schematic structure of radio | wireless terminal P1 'and P2 which comprises the radio | wireless terminal authentication system X' which concerns on the 2nd Embodiment of this invention. 無線端末P1′及びP2において実行される認証処理の手順の一例を説明するフローチャート。The flowchart explaining an example of the procedure of the authentication process performed in radio | wireless terminal P1 'and P2.

符号の説明Explanation of symbols

1…RFIDタグ
10,20…無線通信部
10a,20a…無線アンテナ
11…認証情報記憶部
12,23…暗号部
13…暗号データ記憶部
14…暗号データ照合部
15…鍵情報抽出部
16,21…復号部
24…認証情報保持部
30a,30b…認証情報
31…固有情報(ID2)
32…共通の鍵情報
33…鍵情報A(keyA)
34…鍵情報B(keyB)
DESCRIPTION OF SYMBOLS 1 ... RFID tag 10, 20 ... Wireless communication part 10a, 20a ... Wireless antenna 11 ... Authentication information storage part 12, 23 ... Encryption part 13 ... Encryption data storage part 14 ... Encryption data collation part 15 ... Key information extraction part 16, 21 ... Decryption unit 24 ... Authentication information holding units 30a, 30b ... Authentication information 31 ... Unique information (ID2)
32 ... Common key information 33 ... Key information A (keyA)
34 ... Key information B (keyB)

Claims (13)

相互に無線接続されることにより構築される自立分散型の無線ネットワークを構成する自局無線端末と他局無線端末とを含む二以上の無線端末間で,上記無線ネットワークが構築される際に行われる上記無線端末の認証処理に用いられる無線端末認証システムであって,
上記自局無線端末は,
予め取得された上記他局無線端末の固有情報を含む認証情報を記憶する自局側認証情報記憶手段と,
上記自局側認証情報記憶手段に記憶された上記認証情報に含まれる上記他局無線端末の固有情報を暗号化する自局側暗号化手段と,
上記自局側暗号化手段により暗号化された第1の暗号データと上記自局無線端末のアドレス情報とを不特定多数の無線端末に一斉同報通信する一斉同報通信手段と,を有し,
上記他局無線端末は,
上記自局無線端末に予め取得させた上記他局無線端末の固有情報を含む認証情報を記憶する他局側認証情報記憶手段と,
上記一斉同報通信手段により一斉同報通信された上記第1の暗号データと上記自局無線端末のアドレス情報とを受信した後に上記第1の暗号データを復号化する他局側復号化手段と,
上記他局側復号化手段により復号化された第1の復号データと上記他局側認証情報記憶手段に記憶された固有情報とを照合する他局側固有情報照合手段と,
上記他局側固有情報照合手段による照合結果に基づいて,上記他局無線端末の固有情報を暗号化する他局側暗号化手段と,
上記他局側暗号化手段により暗号化された第2の暗号データと上記他局無線端末のアドレス情報とを上記自局無線端末のアドレス情報に基づいて上記自局無線端末に送信する他局側送信手段と,を有し,
上記自局無線端末は更に,
上記他局側送信手段により上記他局無線端末から送信された上記第2の暗号データと上記他局無線端末のアドレス情報とを受信した後に上記第2の暗号データを復号化する自局側復号化手段と,
上記自局側復号化手段により復号化された第2の復号データと上記自局側認証情報記憶手段に記憶された上記他局無線端末の固有情報とを照合する自局側固有情報照合手段と,を有してなることを特徴とする無線端末認証システム。
Performed when the wireless network is constructed between two or more wireless terminals including the local station wireless terminal and the other station wireless terminal that constitute an autonomous distributed wireless network constructed by mutual wireless connection. A wireless terminal authentication system used for authentication processing of the wireless terminal,
The local radio terminal is
Own station side authentication information storage means for storing authentication information including the unique information of the other station wireless terminal acquired in advance;
Own station side encryption means for encrypting unique information of the other station wireless terminal included in the authentication information stored in the own station side authentication information storage means;
Broadcast communication means for simultaneously broadcasting the first encrypted data encrypted by the local station side encryption means and the address information of the local station wireless terminal to an unspecified number of wireless terminals; ,
The other station wireless terminal
Other station side authentication information storage means for storing authentication information including unique information of the other station wireless terminal acquired in advance by the own station wireless terminal;
Other station side decrypting means for decrypting the first encrypted data after receiving the first encrypted data broadcasted by the simultaneous broadcast communication means and the address information of the local station wireless terminal; ,
Another station side unique information collating means for collating the first decoded data decoded by the other station side decoding means and the unique information stored in the other station side authentication information storage means;
Another station side encryption means for encrypting the unique information of the other station wireless terminal based on the collation result by the other station side unique information collation means;
The other station side that transmits the second encrypted data encrypted by the other station side encryption means and the address information of the other station wireless terminal to the own station wireless terminal based on the address information of the own station wireless terminal A transmission means,
The local radio terminal further
Self-station side decryption for decrypting the second encrypted data after receiving the second encrypted data transmitted from the other station wireless terminal and the address information of the other station wireless terminal by the other station side transmitting means And
Own station side unique information collating means for collating the second decoded data decoded by the own station side decoding means and the unique information of the other station wireless terminal stored in the own station side authentication information storage means; A wireless terminal authentication system, comprising:
上記自局無線端末は,
少なくとも他局無線端末の固有情報を含む認証情報が予め記憶された所定の記憶媒体から上記認証情報を取得する他局認証情報取得手段を更に有し,
上記自局側認証情報記憶手段が,他局認証情報取得手段により取得された上記認証情報を記憶するものである請求項1に記載の無線端末認証システム。
The local radio terminal is
And further comprising other station authentication information acquisition means for acquiring the authentication information from a predetermined storage medium in which authentication information including at least the unique information of the other station wireless terminal is stored in advance.
2. The wireless terminal authentication system according to claim 1, wherein the local station authentication information storage means stores the authentication information acquired by the other station authentication information acquisition means.
上記所定の記憶媒体が,無線式非接触型のICメモリである請求項2に記載の無線端末認証システム。   The wireless terminal authentication system according to claim 2, wherein the predetermined storage medium is a wireless contactless IC memory. 上記自局無線端末は,上記自局側固有情報照合手段による照合が終了した際に上記自局側認証情報記憶手段に記憶された上記他局無線端末の認証情報を消去する認証情報消去手段を更に有してなる請求項1〜3のいずれかに記載の無線端末認証システム。   The local station wireless terminal has authentication information erasure means for erasing the authentication information of the other station wireless terminal stored in the local station authentication information storage means when collation by the local station side unique information collating means is completed. The wireless terminal authentication system according to claim 1, further comprising: 上記認証情報が,上記他局無線端末の固有情報と,上記自局側暗号化手段による暗号化及び上記自局側復号化手段による復号化に共通して用いられる共通の鍵情報とを含んでなるものである請求項1〜4のいずれかに記載の無線端末認証システム。   The authentication information includes unique information of the other-station wireless terminal and common key information used in common for encryption by the local station side encryption means and decryption by the local station side decryption means. The wireless terminal authentication system according to any one of claims 1 to 4. 上記自局無線端末は,
上記自局側暗号化手段により暗号化された第1の暗号データを記憶する自局側暗号データ記憶手段と,
上記他局側送信手段により上記他局無線端末から送信された上記第2の暗号データと上記自局側暗号データ記憶手段に記憶された上記第1の暗号データとを照合する第1の自局側暗号データ照合手段と,
上記第1の自局側暗号データ照合手段による照合結果に基づいて,上記自局側暗号化手段による暗号化の際に用いた上記共通の鍵情報を抽出する共通の鍵情報抽出手段と,を更に備え,
上記自局側復号手段が,上記共通の鍵情報抽出手段により抽出された共通の鍵情報を用いて上記第2の暗号データを復号化するものである請求項5に記載の無線端末認証システム。
The local radio terminal is
Own station side encrypted data storage means for storing the first encrypted data encrypted by the own station side encryption means;
The first own station that collates the second encrypted data transmitted from the other station wireless terminal by the other station side transmitting means and the first encrypted data stored in the own station side encrypted data storage means. Side encrypted data matching means;
A common key information extracting means for extracting the common key information used in the encryption by the local station encryption means based on the collation result by the first local station side cipher data collating means; In addition,
6. The wireless terminal authentication system according to claim 5, wherein the local station decrypting means decrypts the second encrypted data using the common key information extracted by the common key information extracting means.
上記自局無線端末は,上記第1の自局側暗号データ照合手段による照合が終了した際に上記自局側暗号データ記憶手段に記憶された上記第1の暗号データを消去する第1の暗号データ消去手段を更に有してなる請求項6に記載の無線端末認証システム。   The local station wireless terminal deletes the first encrypted data stored in the local station side encrypted data storage unit when the verification by the first local station side encrypted data verification unit is completed. The wireless terminal authentication system according to claim 6, further comprising data erasing means. 上記認証情報が,上記他局無線端末の固有情報と,上記自局側暗号化手段による暗号化に用いられる鍵情報Aと,上記自局側復号化手段による復号化に用いられる上記鍵情報Aとは異なる鍵情報Bとを含んでなるものである請求項1〜4のいずれかに記載の無線端末認証システム。   The authentication information includes unique information of the other station wireless terminal, key information A used for encryption by the local station encryption means, and key information A used for decryption by the local station decryption means. The wireless terminal authentication system according to any one of claims 1 to 4, comprising key information B different from the key information B. 上記自局無線端末は,
上記自局側認証情報記憶手段に記憶された上記認証情報に含まれる上記他局無線端末の固有情報を上記鍵情報Bを用いて暗号化する鍵情報B暗号化手段と,
上記鍵情報B暗号化手段により暗号化された鍵情報B暗号データを記憶する自局側鍵情報B暗号データ記憶手段と,
上記他局側送信手段により上記他局無線端末から送信された上記第2の暗号データと上記自局側鍵情報B暗号データ記憶手段に記憶された上記鍵情報B暗号データとを照合する第2の自局側暗号データ照合手段と,
上記第2の自局側暗号データ照合手段による照合結果に基づいて,上記鍵情報B暗号化手段による暗号化の際に用いた上記鍵情報Bを抽出する鍵情報B抽出手段と,を更に備え,
上記自局側復号手段が,上記第2の暗号データを上記鍵情報B抽出手段により抽出された鍵情報Bを用いて復号化するものである請求項8に記載の無線端末認証システム。
The local radio terminal is
Key information B encrypting means for encrypting the unique information of the other station wireless terminal included in the authentication information stored in the local station authentication information storing means using the key information B;
Own-station side key information B encryption data storage means for storing the key information B encryption data encrypted by the key information B encryption means;
A second collating unit configured to collate the second encrypted data transmitted from the other station wireless terminal by the other station side transmitting unit with the key information B encrypted data stored in the local station side key information B encrypted data storing unit; Own station side encrypted data verification means,
Key information B extracting means for extracting the key information B used for encryption by the key information B encrypting means based on the collation result by the second local station side cipher data collating means; ,
9. The wireless terminal authentication system according to claim 8, wherein the local station decrypting means decrypts the second encrypted data using the key information B extracted by the key information B extracting means.
上記自局無線端末は,上記第2の自局側暗号データ照合手段による照合が終了した際に上記自局側暗号データ記憶手段に記憶された上記第2の暗号データを消去する第2の暗号データ消去手段を更に有してなる請求項9に記載の無線端末認証システム。   The local radio terminal erases the second encrypted data stored in the local encrypted data storage means when the verification by the second local encrypted data verification means is completed. The wireless terminal authentication system according to claim 9, further comprising data erasing means. 相互に無線接続されることにより構築される自立分散型の無線ネットワークを構成する自局無線端末と他局無線端末とを含む二以上の無線端末のうち,上記無線ネットワークが構築される際に行われる上記無線端末の認証処理に用いられる自局端末装置であって,
予め取得された上記他局無線端末の固有情報を含む認証情報を記憶する自局側認証情報記憶手段と,
上記自局側認証情報記憶手段に記憶された上記認証情報に含まれる上記他局無線端末の固有情報を暗号化する自局側暗号化手段と,
上記自局側暗号化手段により暗号化された第1の暗号データと上記自局無線端末のアドレス情報とを不特定多数の無線端末に一斉同報通信する一斉同報通信手段と,
上記他局無線端末で暗号化され上記他局無線端末から送信された第2の暗号データと上記他局無線端末のアドレス情報とを受信した後に上記第2の暗号データを復号化する自局側復号化手段と,
上記自局側復号化手段により復号化された第2の復号データと上記自局側認証情報記憶手段に記憶された上記他局無線端末の固有情報とを照合する自局側固有情報照合手段と,を有してなることを特徴とする自局無線端末。
Among two or more wireless terminals including a local station wireless terminal and another station wireless terminal constituting an autonomous distributed wireless network constructed by being wirelessly connected to each other, it is performed when the wireless network is constructed. A local station terminal device used for authentication processing of the wireless terminal,
Own station side authentication information storage means for storing authentication information including the unique information of the other station wireless terminal acquired in advance;
Own station side encryption means for encrypting unique information of the other station wireless terminal included in the authentication information stored in the own station side authentication information storage means;
Broadcast communication means for simultaneously broadcasting the first encrypted data encrypted by the local station encryption means and the address information of the local station wireless terminal to an unspecified number of wireless terminals;
The local station side that decrypts the second encrypted data after receiving the second encrypted data encrypted by the other station wireless terminal and transmitted from the other station wireless terminal and the address information of the other station wireless terminal Decryption means;
Own station side unique information collating means for collating the second decoded data decoded by the own station side decoding means and the unique information of the other station wireless terminal stored in the own station side authentication information storage means; A self-station radio terminal comprising:
相互に無線接続されることにより構築される自立分散型の無線ネットワークを構成する自局無線端末と他局無線端末とを含む二以上の無線端末のうち,上記無線ネットワークが構築される際に行われる上記無線端末の認証処理に用いられる他局端末装置であって,
上記自局無線端末に予め取得させた上記他局無線端末の固有情報を含む認証情報を記憶する他局側認証情報記憶手段と,
上記自局無線端末で暗号化され上記自局無線端末から一斉同報通信された第1の暗号データと上記自局無線端末のアドレス情報とを受信した後に上記第1の暗号データを復号化する他局側復号化手段と,
上記他局側復号化手段により復号化された第1の復号データと上記他局側認証情報記憶手段に記憶された固有情報とを照合する他局側固有情報照合手段と,
上記他局側固有情報照合手段による照合結果に基づいて,上記他局無線端末の固有情報を暗号化する他局側暗号化手段と,
上記他局側暗号化手段により暗号化された第2の暗号データと上記他局無線端末のアドレス情報とを上記自局無線端末のアドレス情報に基づいて上記自局無線端末に送信する他局側送信手段と,
を有してなることを特徴とする他局無線端末。
Among two or more wireless terminals including a local station wireless terminal and another station wireless terminal constituting an autonomous distributed wireless network constructed by being wirelessly connected to each other, it is performed when the wireless network is constructed. The other station terminal device used for authentication processing of the wireless terminal,
Other station side authentication information storage means for storing authentication information including unique information of the other station wireless terminal acquired in advance by the own station wireless terminal;
The first encrypted data is decrypted after receiving the first encrypted data encrypted by the local station and broadcasted simultaneously from the local station and the address information of the local station. Other station side decoding means,
Another station side unique information collating means for collating the first decoded data decoded by the other station side decoding means and the unique information stored in the other station side authentication information storage means;
Another station side encryption means for encrypting the unique information of the other station wireless terminal based on the collation result by the other station side unique information collation means;
The other station side that transmits the second encrypted data encrypted by the other station side encryption means and the address information of the other station wireless terminal to the own station wireless terminal based on the address information of the own station wireless terminal A transmission means;
The other station wireless terminal characterized by comprising.
相互に無線接続されることにより構築される自立分散型の無線ネットワークを構成する自局無線端末と他局無線端末とを含む二以上の無線端末間で,上記無線ネットワークが構築される際に行われる無線端末の認証方法であって,
上記自局無線端末は,
予め取得された上記他局無線端末の認証情報に含まれる上記他局無線端末の固有情報を暗号化した後に,該暗号化により得られた第1の暗号データと上記自局無線端末のアドレス情報とを不特定多数の無線端末に一斉同報通信し,
上記他局無線端末は,
上記自局無線端末によって一斉同報通信された上記第1の暗号データと上記自局無線端末のアドレス情報とを受信した後に上記第1の暗号データを復号化し,該復号化により得られた第1の復号データと上記他局無線端末が保持する上記他局無線端末の固有情報とを照合し,
該照合結果に基づいて上記他局無線端末の固有情報を暗号化し,その後,該暗号化により得られた第2の暗号データと上記他局無線端末のアドレス情報とを上記自局無線端末のアドレス情報に基づいて上記自局無線端末に送信し,
上記自局無線端末は更に,
上記他局無線端末から送信された上記第2の暗号データと上記他局無線端末のアドレス情報とを受信した後に上記第2の暗号データを復号化し,該復号化により得られた第2の復号データと予め取得された上記他局無線端末の固有情報とを照合することを特徴とする無線端末の認証方法。
Performed when the wireless network is constructed between two or more wireless terminals including the local station wireless terminal and the other station wireless terminal that constitute an autonomous distributed wireless network constructed by mutual wireless connection. A wireless terminal authentication method,
The local radio terminal is
After encrypting the unique information of the other station wireless terminal included in the authentication information of the other station wireless terminal acquired in advance, the first encrypted data obtained by the encryption and the address information of the own station wireless terminal To all unspecified wireless terminals,
The other station wireless terminal
After receiving the first encrypted data broadcasted by the local station and the address information of the local station, the first encrypted data is decrypted, and the first encrypted data obtained by the decryption is decrypted. 1 decryption data and the unique information of the other station wireless terminal held by the other station wireless terminal,
Based on the collation result, the unique information of the other station wireless terminal is encrypted, and then the second encrypted data obtained by the encryption and the address information of the other station wireless terminal are converted into the address of the own station wireless terminal. Based on the information transmitted to the local wireless terminal,
The local radio terminal further
After receiving the second encrypted data transmitted from the other station wireless terminal and the address information of the other station wireless terminal, the second encrypted data is decrypted, and the second decryption obtained by the decryption An authentication method for a wireless terminal, characterized in that data is collated with the unique information of the other station wireless terminal acquired in advance.
JP2005132739A 2005-04-28 2005-04-28 Wireless terminal authentication system, own station wireless terminal, other station wireless terminal, and wireless terminal authentication method Expired - Fee Related JP4482643B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2005132739A JP4482643B2 (en) 2005-04-28 2005-04-28 Wireless terminal authentication system, own station wireless terminal, other station wireless terminal, and wireless terminal authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2005132739A JP4482643B2 (en) 2005-04-28 2005-04-28 Wireless terminal authentication system, own station wireless terminal, other station wireless terminal, and wireless terminal authentication method

Publications (2)

Publication Number Publication Date
JP2006311319A true JP2006311319A (en) 2006-11-09
JP4482643B2 JP4482643B2 (en) 2010-06-16

Family

ID=37477654

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2005132739A Expired - Fee Related JP4482643B2 (en) 2005-04-28 2005-04-28 Wireless terminal authentication system, own station wireless terminal, other station wireless terminal, and wireless terminal authentication method

Country Status (1)

Country Link
JP (1) JP4482643B2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008199137A (en) * 2007-02-09 2008-08-28 Kddi Corp Network connection method in handover, mobile terminal and program
CN102457308A (en) * 2011-12-13 2012-05-16 陈涛 High-speed near field communication device
JP2015115878A (en) * 2013-12-13 2015-06-22 凸版印刷株式会社 Portable terminal setting method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533541A (en) * 2012-07-03 2014-01-22 国民技术股份有限公司 Network safe access method, network configuring method and key device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008199137A (en) * 2007-02-09 2008-08-28 Kddi Corp Network connection method in handover, mobile terminal and program
CN102457308A (en) * 2011-12-13 2012-05-16 陈涛 High-speed near field communication device
JP2015115878A (en) * 2013-12-13 2015-06-22 凸版印刷株式会社 Portable terminal setting method

Also Published As

Publication number Publication date
JP4482643B2 (en) 2010-06-16

Similar Documents

Publication Publication Date Title
US7424605B2 (en) Communication system, server device, client device and method for controlling the same
JP3961462B2 (en) Computer apparatus, wireless LAN system, profile updating method, and program
US7912224B2 (en) Wireless network system and communication method for external device to temporarily access wireless network
JP5739072B2 (en) System and method for encoding exchanges using a set of shared ephemeral key data
US8494164B2 (en) Method for connecting wireless communications, wireless communications terminal and wireless communications system
US7930556B2 (en) Fingerprint system and method for access control
EP1629634B1 (en) Secure authentication in a wireless home network
CN106412901B (en) Anti-network-rubbing wireless routing method and routing system
US20060056634A1 (en) Apparatus, system and method for setting security information on wireless network
US20150020180A1 (en) Wireless two-factor authentication, authorization and audit system with close proximity between mass storage device and communication device
JP4962237B2 (en) Program and method for managing information on location of portable device and file encryption key
JP4405309B2 (en) Access point, wireless LAN connection method, medium recording wireless LAN connection program, and wireless LAN system
US7099476B2 (en) Method for updating a network ciphering key
JP2010198349A (en) Data encryption system, communication device and data encryption method
KR100856408B1 (en) Apparatus and method for transmitting data
US20070081672A1 (en) Methods to enhance wlan security
CN104754568A (en) Identity recognition method and device based on NFC (Near Field Communication)
US20030221098A1 (en) Method for automatically updating a network ciphering key
JP2005536093A (en) Security system for devices in a wireless network
JP4482643B2 (en) Wireless terminal authentication system, own station wireless terminal, other station wireless terminal, and wireless terminal authentication method
JP2008015639A (en) Privacy-protecting authentication system and apparatus capable of searching database for id
JP2007188375A (en) Privacy protection type authentication system and device for retrieving id in database
KR101487349B1 (en) Terminal Authentication Method in Wireless Access Point and Wireless LAN System using the same
KR101940722B1 (en) Method for providing communication security for user mobile in open wifi zone
JPWO2008075626A1 (en) Communication terminal authentication system, Internet telephone system

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20071019

A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A821

Effective date: 20071019

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20100119

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20100202

A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20100218

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130402

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130402

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20140402

Year of fee payment: 4

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

S533 Written request for registration of change of name

Free format text: JAPANESE INTERMEDIATE CODE: R313533

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

LAPS Cancellation because of no payment of annual fees