WO2007025952A1 - Communication method using intermediate unit and communication system thereof - Google Patents

Communication method using intermediate unit and communication system thereof Download PDF

Info

Publication number
WO2007025952A1
WO2007025952A1 PCT/EP2006/065737 EP2006065737W WO2007025952A1 WO 2007025952 A1 WO2007025952 A1 WO 2007025952A1 EP 2006065737 W EP2006065737 W EP 2006065737W WO 2007025952 A1 WO2007025952 A1 WO 2007025952A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
network
intermediate unit
terminal
unit
Prior art date
Application number
PCT/EP2006/065737
Other languages
French (fr)
Inventor
Christian Haendel
Original Assignee
Nokia Siemens Networks Gmbh & Co. Kg
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Siemens Networks Gmbh & Co. Kg filed Critical Nokia Siemens Networks Gmbh & Co. Kg
Publication of WO2007025952A1 publication Critical patent/WO2007025952A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0212Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
    • H04W52/0219Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave where the power saving management affects multiple terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention relates to a communication method, and, more particularly, it relates to a communication method using an intermediate unit and to a communication system in which this method is used.
  • a challenge-response scheme is used for authentication, and one-time authentication or two-times authentication may be needed in the process of establishing a connection.
  • Authentication makes it possible to prevent unauthorized use and mistaken use.
  • Encryption technology rules increase the system security, the length of a key secret code may be 0, 40 or 64 bits, and the secret code is generally managed by higher layer software. If users require a still higher level of secrecy assurance, they can use special security mechanisms on a transport layer and an application layer.
  • An example is shown in Fig. 1 in order to describe the above situation when a terminal user A and a computer C conduct communications.
  • A is a mobile terminal (MT)
  • C is a personal computer (PC) .
  • C If A intends to connect to C and then conduct communication with C, it is first necessary that C implement authentication in respect of A and thereby recongnize A's identity. C further needs to encrypt the data that are transmitted to A and unclassify the data that are transmitted to A. Similarly, A must implement authentication in respect of C, encrypt the data that are transmitted to C, and unclassify the data that are transmitted to C.
  • the terminal user wishes to communicate with the personal computer at any time this communication may be required, the personal computer must be constantly connected to a network. If the personal computer is not connected to the network at a particular instant, then it is impossible for it to communicate with the terminal user at that instant.
  • a terminal user effects one-time mistaken accessing of the personal computer, such as in the case in which a user miskeys a connection number or access address
  • the personal computer must first implement authentication in respect of this terminal user, and the process of this authentication has to continue for a period of time.
  • the mistakenly accessing terminal user it is necessary to wait a period of time before being informed that the authentication has failed; as far as the personal computer is concerned, there is wasteful use of its capacity, since there is mistaken accessing by a terminal user and implementation of one-time authentication.
  • the present invention provides a communication method in which an intermediate unit is used in a communication network, this communication network comprises at least two terminal units and an intermediate unit, the intermediate unit and one of the terminal units constitute one network and the abovenoted method comprises the following steps:
  • the intermediate unit implements authentication in respect of the terminal unit which has issued this communication request
  • step (3) the intermediate unit, after having implemented authentication in respect of the terminal unit which has made the communication request, wakes the terminal unit which is in the abovenoted network.
  • the wake-up scheme can use a wired system such as that of network wake-up technology (Wake on Lan; WoL) ; the wake-up scheme can also use a wireless system such as that of Bluetooth technology.
  • the two terminal units conduct communication in an ordinarily employed encryption scheme.
  • encryption can be effected using a secure sockets layer (SSL) protocol, or encryption can be effected using a protocol succeeding SSL protocol, specifically, transport layer security (TLS) protocol.
  • SSL secure sockets layer
  • TLS transport layer security
  • the invention further provides a communication system in which the abovedescribed communication method is applied.
  • This system comprises at least two terminal units.
  • the communication system further comprises an intermediate unit, and this intermediate unit and one of the terminal units constitute a network.
  • the intermediate unit here possesses a receiver, and this receiver receives signals of the other of the abovenoted terminal units; the intermediate unit possesses an authentication device which, after reception of a signal of the abovenoted terminal unit, implements authentication in respect of this terminal unit; the intermediate unit has an emitter which, if the terminal unit is successfully authenticated, follows this authentication by emitting signals to the terminal unit which is in the abovenoted network.
  • these emitted signals contain a wake-up frame, so making it possible for the terminal unit which is in the network to be activated after reception of the wake-up frame.
  • the communication method which is provided by the invention and uses an intermediate unit in a communication network has the following advantages and special features.
  • the intermediate unit is simultaneously connected to two networks, and this makes things such that a unit in the intermediate unit wake-up network does not need to be constantly connected to the network, and so energy is economized.
  • the intermediate unit can immediately implement authentication and notify the user that the authentication has failed, and so the user does not have to wait too long.
  • terminal users on the network there is no need for successive waste of energy because of one-time mistaken accessing and activation.
  • Fig. 1 is a conceptual representation of the procedure of a communication method in existing technology.
  • Fig. 2 is a conceptual representation of the communication method of the invention and its communication system.
  • Fig. 3 is a conceptual representation of an example of implementation of the invention.
  • Fig. 2 is a conceptual representation of the communication method and the communication system of the invention.
  • the units in Fig. 2 comprise a terminal user A, an intermediate unit B, and a terminal user C.
  • a and B are simultaneously located in a communication network 1
  • B and C are simultaneously located in a communication network 2.
  • the intermediate unit possesses a function for authentication in respect of signals which come from A.
  • A asks the intermediate unit B whether communication with C is possible. After that, the intermediate unit B implements authentication in respect of A, ie it verifies A's legal identity. Further, after that, if B passes the authentication in respect of A, then B wakes C and causes C to make proper preparation for communication with A. Finally A and C conduct communication via an encryption system.
  • Fig. 3 shows an example of implementation of the invention.
  • one of the terminal users is a handset mobile terminal (MT)
  • the other of the terminal users is a personal computer (PC)
  • the intermediate unit can be a server for home-use equipment (EasyHome Server) .
  • the home server has a receiver and can receive signals of the handset.
  • the home server also has an authentication device, and it can implement authentication in respect of the handset after receiving a signal of the handset.
  • the home server has an emitter, and, if the handset is successfully authenticated, this emitter issues wake-up frame signals to the personal computer.
  • the home server supports internet protocol, and communications between it and the handset are conducted on the basis of internet protocol, as indicated by the elliptical frame in Fig. 3.
  • the home server also supports a wireless local area network (WLAN) protocol based on IEEE Standard 802.11b (also called Wi-Fi); it constitutes a local area network (LAN) together with the personal computer, and conducts communications by means of the WLAN protocol, as indicated by the square frame in Fig. 3.
  • WLAN wireless local area network
  • IEEE Standard 802.11b also called Wi-Fi
  • LAN local area network
  • the home server can communicate with the handset as and when required, and the personal computer does not need to be constantly connected to the local area network. If the handset wishes to access data held by the personal computer in the home, the procedure is that the handset must first submit a communication request to the home server, and, after the receiver of the home server receives this signal, the home server issues an enquiry command to the handset. On receiving this enquiry command, the handset sends a string of information to the home server to prove its own identity. After receiving this information, the home server can verify the identity of the handset.
  • the home server emits a wake-up frame and wakes the personal computer via a network wake-up (Wake on LAN; WoL) system.
  • the home server is provided with remote network management software, and the personal computer possesses a network card which supports a network wake-up master right.
  • the network card which supports network wake-up constantly monitors the entire network. There are many judgement schemes for discerning whether a wake-up frame is present in the network. For example, it is possible to effect 16 times uninterrupted repetition of a media access control (MAC) address which is set in a wake-up frame.
  • the network card possesses a continuously uninterrupted power supply and can activate the computer.
  • the personal computer's master board also includes a special-purpose CMOS which is used for network wake-up technology.
  • the computer When the network card on the personal computer receives a wake-up frame, the computer can be opened, and communication between the handset and the personal computer can be started.
  • SSL/TLS Secure Sockets Layer Security
  • protocol succeeding SSL protocol specifically, transport layer security TLS protocol.
  • SSL/TLS is an industry standard secure protocol, and the use of SSL/TLS produces a numeric secret code which is shared by transmission and reception, and compilation and decoding of messages by means of this secret code can only be effected in message-carrying transmission and reception. No other parties, even if they are servers which transfer these messages, can decipher SSL/TLS transmissions.
  • the personal computer When communication between the handset and the personal computer is completed, the personal computer sends a message notifying the home server, and the home server acts through the remote network management software to tell the computer to switch off or to enter a sleep state.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a communication method which uses an intermediate unit in a communication network. This communication network comprises at least two terminal units and at least one intermediate unit, and the intermediate unit and one of the terminal units constitute one network. The procedure in this communication method is that the other terminal unit sends a communication request to the intermediate unit, and the intermediate unit implements authentication in respect of the terminal unit which has sent this request. The intermediate unit wakes the terminal unit which is in the abovenoted network, and the two terminal units conduct communication. The invention further provides a communication system in which the abovedescribed communication method is employed. When the method of the invention is used, network units in a local area network do not need to be constantly connected to the local area network, and so energy is economized, there is further assurance of the security of data, and the risk of terminal users in the local area network being subjected to network attack is reduced.

Description

DESCRIPTION
Communication method using intermediate unit and communication system thereof
(I) Technical field
The present invention relates to a communication method, and, more particularly, it relates to a communication method using an intermediate unit and to a communication system in which this method is used.
(II) Background technology
Along with the rapid development of computer network (net) and mobile telephone technology, the exchange of business data between computer networks and terminal users is becoming ever more frequent. In order to ensure the security of communication between a computer network and a terminal user and to prevent penetration and eavesdropping of data by an illegal user, it is necessary, in the execution of such data exchanges, to give consideration to questions of identity verification, access control and the secrecy of messages in the performance of such data exchanges, and it is commonly necessary to resolve these questions through authentication and encryption.
Usually, a challenge-response scheme is used for authentication, and one-time authentication or two-times authentication may be needed in the process of establishing a connection. Authentication makes it possible to prevent unauthorized use and mistaken use. Encryption technology rules increase the system security, the length of a key secret code may be 0, 40 or 64 bits, and the secret code is generally managed by higher layer software. If users require a still higher level of secrecy assurance, they can use special security mechanisms on a transport layer and an application layer. An example is shown in Fig. 1 in order to describe the above situation when a terminal user A and a computer C conduct communications. In Fig. 1, A is a mobile terminal (MT) and C is a personal computer (PC) . If A intends to connect to C and then conduct communication with C, it is first necessary that C implement authentication in respect of A and thereby recongnize A's identity. C further needs to encrypt the data that are transmitted to A and unclassify the data that are transmitted to A. Similarly, A must implement authentication in respect of C, encrypt the data that are transmitted to C, and unclassify the data that are transmitted to C.
Although the abovedescribed communication system permits normal communications to be conducted, it is still associated with the following problems.
First, if the terminal user wishes to communicate with the personal computer at any time this communication may be required, the personal computer must be constantly connected to a network. If the personal computer is not connected to the network at a particular instant, then it is impossible for it to communicate with the terminal user at that instant.
Second, since the network between the terminal user and the personal computer is not completely secure, there is an increased risk of an unauthenticated user managing to obtain personal computer data when the personal computer, having implemented authentication in respect of the terminal user, transmits data to the terminal user.
Third, if a terminal user effects one-time mistaken accessing of the personal computer, such as in the case in which a user miskeys a connection number or access address, the personal computer must first implement authentication in respect of this terminal user, and the process of this authentication has to continue for a period of time. As far as the mistakenly accessing terminal user is concerned, it is necessary to wait a period of time before being informed that the authentication has failed; as far as the personal computer is concerned, there is wasteful use of its capacity, since there is mistaken accessing by a terminal user and implementation of one-time authentication.
(Ill) Content of the invention
It is accordingly a main object of the present invention to provide a communication method which makes it possible for a terminal user to communicate with other terminal users without constant connection to a network being necessary, and with which the possibility of this terminal user being subjected to network attack can be reduced, and the security of the communication network can be increased.
In order to achieve the above object, the present invention provides a communication method in which an intermediate unit is used in a communication network, this communication network comprises at least two terminal units and an intermediate unit, the intermediate unit and one of the terminal units constitute one network and the abovenoted method comprises the following steps:
(1) the other of the abovenoted terminal units issues a communication request to the intermediate unit;
(2) the intermediate unit implements authentication in respect of the terminal unit which has issued this communication request;
(3) the intermediate unit wakes the terminal unit which is in the abovenoted network;
(4) the abovenoted two terminal units conduct communication .
In step (3) , the intermediate unit, after having implemented authentication in respect of the terminal unit which has made the communication request, wakes the terminal unit which is in the abovenoted network. The wake-up scheme can use a wired system such as that of network wake-up technology (Wake on Lan; WoL) ; the wake-up scheme can also use a wireless system such as that of Bluetooth technology.
Further, in step (4), the two terminal units conduct communication in an ordinarily employed encryption scheme. For example, encryption can be effected using a secure sockets layer (SSL) protocol, or encryption can be effected using a protocol succeeding SSL protocol, specifically, transport layer security (TLS) protocol.
The invention further provides a communication system in which the abovedescribed communication method is applied. This system comprises at least two terminal units. The communication system further comprises an intermediate unit, and this intermediate unit and one of the terminal units constitute a network.
The intermediate unit here possesses a receiver, and this receiver receives signals of the other of the abovenoted terminal units; the intermediate unit possesses an authentication device which, after reception of a signal of the abovenoted terminal unit, implements authentication in respect of this terminal unit; the intermediate unit has an emitter which, if the terminal unit is successfully authenticated, follows this authentication by emitting signals to the terminal unit which is in the abovenoted network. Usually, these emitted signals contain a wake-up frame, so making it possible for the terminal unit which is in the network to be activated after reception of the wake-up frame.
It can be seen that the communication method which is provided by the invention and uses an intermediate unit in a communication network has the following advantages and special features.
(1) When communications are conducted using the method of the invention, the intermediate unit is simultaneously connected to two networks, and this makes things such that a unit in the intermediate unit wake-up network does not need to be constantly connected to the network, and so energy is economized.
(2) The work of authentication which was originally performed by a terminal unit is performed by the intermediate unit instead, and authentication work and work data are dealt with separately by different units. This further ensures the security of data and reduces the possibility of the relevant terminal user being subjected to network attack.
(3) In a situation in which mistaken accessing is made by a terminal user, the intermediate unit can immediately implement authentication and notify the user that the authentication has failed, and so the user does not have to wait too long. As far as terminal users on the network are concerned, there is no need for successive waste of energy because of one-time mistaken accessing and activation.
(IV) Description of attached drawings
Fig. 1 is a conceptual representation of the procedure of a communication method in existing technology. Fig. 2 is a conceptual representation of the communication method of the invention and its communication system.
Fig. 3 is a conceptual representation of an example of implementation of the invention.
(V) Specific form of implementation
Below, a detailed description of the invention will be given by means of a specific example of implementation, together with the attached drawings. This example of implementation is illustrative, and is non-limiting. Fig. 2 is a conceptual representation of the communication method and the communication system of the invention. The units in Fig. 2 comprise a terminal user A, an intermediate unit B, and a terminal user C. A and B are simultaneously located in a communication network 1, and B and C are simultaneously located in a communication network 2. The intermediate unit possesses a function for authentication in respect of signals which come from A.
If A wishes to communicate with C, the communication procedure which is performed is as follows. First, A asks the intermediate unit B whether communication with C is possible. After that, the intermediate unit B implements authentication in respect of A, ie it verifies A's legal identity. Further, after that, if B passes the authentication in respect of A, then B wakes C and causes C to make proper preparation for communication with A. Finally A and C conduct communication via an encryption system.
Fig. 3 shows an example of implementation of the invention. In the communication network shown in Fig. 3 there are two terminal users and one intermediate unit, one of the terminal users is a handset mobile terminal (MT) , the other of the terminal users is a personal computer (PC) , and the intermediate unit can be a server for home-use equipment (EasyHome Server) . The home server has a receiver and can receive signals of the handset. The home server also has an authentication device, and it can implement authentication in respect of the handset after receiving a signal of the handset. Further, the home server has an emitter, and, if the handset is successfully authenticated, this emitter issues wake-up frame signals to the personal computer.
Further, the home server supports internet protocol, and communications between it and the handset are conducted on the basis of internet protocol, as indicated by the elliptical frame in Fig. 3. The home server also supports a wireless local area network (WLAN) protocol based on IEEE Standard 802.11b (also called Wi-Fi); it constitutes a local area network (LAN) together with the personal computer, and conducts communications by means of the WLAN protocol, as indicated by the square frame in Fig. 3.
The home server can communicate with the handset as and when required, and the personal computer does not need to be constantly connected to the local area network. If the handset wishes to access data held by the personal computer in the home, the procedure is that the handset must first submit a communication request to the home server, and, after the receiver of the home server receives this signal, the home server issues an enquiry command to the handset. On receiving this enquiry command, the handset sends a string of information to the home server to prove its own identity. After receiving this information, the home server can verify the identity of the handset.
If the above authentication is passed, the home server emits a wake-up frame and wakes the personal computer via a network wake-up (Wake on LAN; WoL) system. The home server is provided with remote network management software, and the personal computer possesses a network card which supports a network wake-up master right. The network card which supports network wake-up constantly monitors the entire network. There are many judgement schemes for discerning whether a wake-up frame is present in the network. For example, it is possible to effect 16 times uninterrupted repetition of a media access control (MAC) address which is set in a wake-up frame. The network card possesses a continuously uninterrupted power supply and can activate the computer. Generally, the personal computer's master board also includes a special-purpose CMOS which is used for network wake-up technology.
When the network card on the personal computer receives a wake-up frame, the computer can be opened, and communication between the handset and the personal computer can be started.
Generally, encrypted communication is used between the handset and the personal computer. For example, encryption can be effected using secure sockets layer SSL protocol, or encryption can be effected using protocol succeeding SSL protocol, specifically, transport layer security TLS protocol. SSL/TLS is an industry standard secure protocol, and the use of SSL/TLS produces a numeric secret code which is shared by transmission and reception, and compilation and decoding of messages by means of this secret code can only be effected in message-carrying transmission and reception. No other parties, even if they are servers which transfer these messages, can decipher SSL/TLS transmissions.
When communication between the handset and the personal computer is completed, the personal computer sends a message notifying the home server, and the home server acts through the remote network management software to tell the computer to switch off or to enter a sleep state.
It can be seen from the example of implementation described above that, when the method of the invention is used, a network unit awaiting wake-up does not need to be constantly connected to a network, and so energy is economized. In addition, since an independent intermediate unit is used to realize an authentication function, the security of data is further ensured, and the possibility of terminal users on the network being subjected to network attack is reduced.

Claims

WHAT IS CLAIMED IS
1. A communication method which uses an intermediate unit in a communication network, said communication network comprising at least two terminal units and an intermediate unit, and one network being constituted by said intermediate unit and one of said terminal units, and which is characterized in that said method comprises the following steps : (1) the other of said terminal units issues a communication request to said intermediate unit;
(2) said intermediate unit implements authentication in respect of said terminal unit which has issued this communication request; (3) said intermediate unit wakes the terminal unit which is in said network;
(4) said two terminal units conduct communication.
2. The communication method using an intermediate unit in a communication network as claimed in claim 1 which is characterized in that, in said step (3), said intermediate unit wakes the terminal unit which is in said network through a wired system.
3. The communication method using an intermediate unit in a communication network as claimed in claim 1 which is characterized in that, in said step (3), said intermediate unit wakes the terminal unit which is in said network through a wireless system.
4. The communication method using an intermediate unit in a communication network as claimed in claim 2 which is characterized in that said wired system is a network wake-up system.
5. The communication method using an intermediate unit in a communication network as claimed in claim 3 which is characterized in that said wireless system is a Bluetooth system.
6. The communication method using an intermediate unit in a communication network as claimed in claim 1 which is characterized in that, in said step (4), said two terminal units conduct communication using an encryption system.
7. The communication method using an intermediate unit in a communication network as claimed in claim 6 which is characterized in that said encryption communication uses secure sockets layer protocol or transport layer security protocol .
8. A communication system in which the abovedescribed communication method is used, said system comprising at least two terminal units, and being characterized in that said communication system further comprises an intermediate unit, and said intermediate unit and one of said terminal units constitute one network.
9. The communication system as claimed in claim 8 which is characterized in that said intermediate unit possesses a receiver, and said receiver receives signals of the other one of said terminal units; said intermediate unit possesses an authentication device, and, after the reception of a signal of said terminal unit, said authentication device implements authentication in respect of said terminal unit; said intermediate unit possesses an emitter, and, after authentication in respect of said authentication is successful, said emitter emits signals to the terminal unit which is in said network.
10. The communication system as claimed in claim 9 which is characterized in that the signals emitted by said emitter of said intermediate unit contain a wake-up frame.
PCT/EP2006/065737 2005-08-31 2006-08-28 Communication method using intermediate unit and communication system thereof WO2007025952A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200510093608.4 2005-08-31
CNA2005100936084A CN1925391A (en) 2005-08-31 2005-08-31 Communication method using agent equipment and its communication system

Publications (1)

Publication Number Publication Date
WO2007025952A1 true WO2007025952A1 (en) 2007-03-08

Family

ID=37400828

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2006/065737 WO2007025952A1 (en) 2005-08-31 2006-08-28 Communication method using intermediate unit and communication system thereof

Country Status (2)

Country Link
CN (1) CN1925391A (en)
WO (1) WO2007025952A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040128310A1 (en) * 2002-12-30 2004-07-01 Zmudzinski Krystof C. Method and apparatus for distributing notification among cooperating devices and device channels
EP1505774A2 (en) * 2003-07-28 2005-02-09 Sony Corporation Network interconnection apparatus, network interconnection method, name sesolution apparatus and computer program
US20050044430A1 (en) * 2003-08-20 2005-02-24 Cheshire Stuart D. Method and apparatus for implementing a sleep proxy for services on a network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040128310A1 (en) * 2002-12-30 2004-07-01 Zmudzinski Krystof C. Method and apparatus for distributing notification among cooperating devices and device channels
EP1505774A2 (en) * 2003-07-28 2005-02-09 Sony Corporation Network interconnection apparatus, network interconnection method, name sesolution apparatus and computer program
US20050044430A1 (en) * 2003-08-20 2005-02-24 Cheshire Stuart D. Method and apparatus for implementing a sleep proxy for services on a network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YAP KEN: "Wake On LAN proxy (readme, wold.c, wolc.pl, wolc.py, sample.dat from wolp-0.5.tar.gz", INTERNET CITATION, 13 April 2003 (2003-04-13), XP002364611, Retrieved from the Internet <URL:http://etherboot.sourceforge.net/wolp/wolp-0.5.tar.gz> [retrieved on 20060126] *

Also Published As

Publication number Publication date
CN1925391A (en) 2007-03-07

Similar Documents

Publication Publication Date Title
RU2297037C2 (en) Method for controlling protected communication line in dynamic networks
US8156337B2 (en) Systems and methods for authenticating communications in a network medium
JP4218934B2 (en) Network construction method, wireless communication system, and access point device
KR100881938B1 (en) System and method for managing multiple smart card sessions
US7822981B2 (en) Communication apparatus and authenticating method
US20070089163A1 (en) System and method for controlling security of a remote network power device
US20060123463A1 (en) Security access device and method
US20030014646A1 (en) Scheme for authentication and dynamic key exchange
CN101102194B (en) A method for OTP device and identity authentication with this device
CN104680630A (en) Method and system for controlling door locks
CN102546329B (en) The method and system of multimedia over Coax Alliance device button configuration
WO2005101727A1 (en) Communication device, communication system, and authentication method
WO2012100677A1 (en) Identity management method and device for mobile terminal
CN101005351A (en) System and method for information processing
JP2009513089A (en) Automatic device configuration during installation in a network environment
CN103929748A (en) Internet of things wireless terminal, configuration method thereof and wireless network access point
WO2008000177A1 (en) Framework of managing network security and information processing method thereof
CN101616017A (en) Method, equipment and system that network application apparatus is configured
CN105429979A (en) Cross-platform user certificating method and intelligent router, Internet surfing system
US20160261569A1 (en) Device-to-Device Network Location Updates
CN106330456A (en) Intelligent device security access method and system
JP2004056762A (en) Wireless communication method and equipment, communication control program and controller, key management program, wireless lan system, and recording medium
JP2003338814A (en) Communication system, administrative server, control method therefor and program
CN110866999A (en) Control method and device for intelligent door lock and storage medium
JP2009277024A (en) Connection control method, communication system and terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06793028

Country of ref document: EP

Kind code of ref document: A1