WO2010024287A1 - Terminal authenticating system, wireless terminal, authenticating apparatus and terminal authenticating method - Google Patents

Terminal authenticating system, wireless terminal, authenticating apparatus and terminal authenticating method Download PDF

Info

Publication number
WO2010024287A1
WO2010024287A1 PCT/JP2009/064854 JP2009064854W WO2010024287A1 WO 2010024287 A1 WO2010024287 A1 WO 2010024287A1 JP 2009064854 W JP2009064854 W JP 2009064854W WO 2010024287 A1 WO2010024287 A1 WO 2010024287A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic certificate
wireless terminal
authentication
expiration date
terminal
Prior art date
Application number
PCT/JP2009/064854
Other languages
French (fr)
Japanese (ja)
Inventor
一敬 飯室
Original Assignee
京セラ株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京セラ株式会社 filed Critical 京セラ株式会社
Publication of WO2010024287A1 publication Critical patent/WO2010024287A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to a terminal authentication system, a wireless terminal, an authentication device, and a terminal authentication method for authenticating access to a wireless communication network according to an electronic certificate.
  • terminal authentication which is authentication for access by the wireless terminal, is performed by an authentication device (for example, a wireless base station) provided in the wireless communication network. Yes.
  • terminal authentication it is confirmed whether or not the wireless terminal has the authority to access the wireless communication network, and access is permitted if the authority is authorized.
  • the wireless terminal holds an electronic certificate in advance, and transmits the electronic certificate to the wireless communication network when executing access to the wireless communication network.
  • the authentication device performs terminal authentication according to the electronic certificate received from the wireless terminal.
  • An expiration date is usually set for an electronic certificate to determine the expiration date for the electronic certificate. If the expiration date has expired, the electronic certificate becomes invalid and access to the wireless communication network is denied by the authentication device. For this reason, before the expiration date expires, the wireless terminal needs to acquire a new electronic certificate with an updated expiration date and update the electronic certificate.
  • the wireless terminal cannot always automatically acquire a new electronic certificate before the electronic certificate expires. For example, when the wireless terminal has been powered off for a long period of time, the expiration date expires and the electronic certificate becomes invalid.
  • Patent Document 1 has a problem that, when the validity period of an electronic certificate expires, the wireless terminal cannot acquire a new electronic certificate and cannot update the electronic certificate.
  • the electronic certificate held by the wireless terminal can be safely updated by a method such as a user of the wireless terminal going to a service store. In this method, there is a problem that takes time and effort to the user.
  • the present invention provides a terminal authentication system, a wireless terminal, an authentication device, and a terminal authentication method that can safely update an electronic certificate while omitting the user's trouble when the electronic certificate expires. For the purpose.
  • the present invention has the following features.
  • the first feature of the present invention is that an electronic certificate with an expiration date is held, and the electronic certificate is used when accessing a wireless communication network (wireless communication network NW).
  • a wireless terminal wireless terminal MS that transmits to the wireless communication network, authenticates the access according to the electronic certificate received from the wireless terminal, and sets the valid certificate set in the electronic certificate
  • An authentication device for example, a wireless base station BS
  • the wireless terminal is valid until the electronic certificate and the expiration date
  • the wireless terminal A holding unit (storage unit 130) that holds in advance authentication information (authentication information S) indicating that the terminal has the access authority, and the electronic certificate Proof execution for executing, with the authentication device, a zero-knowledge proof protocol for proving that the authentication information is retained by transmitting / receiving information other than the authentication information to / from the authentication device a plurality of times when the expiration date has expired (The zero-knowledge proof executing
  • the authentication device when it is proved by the zero knowledge proof protocol that the wireless terminal holds the authentication information, the authentication device can generate a new electronic certificate with an updated expiration date. To the wireless terminal. Thereby, it is possible to update the electronic certificate held in the wireless terminal while omitting the user's trouble.
  • the authentication information is valid before the electronic certificate, and it is not preferable in terms of security to send the authentication information to a communication path (especially a wireless communication path) where a third party can obtain the authentication information.
  • a communication path especially a wireless communication path
  • a third party can obtain the authentication information.
  • the authentication information is held by sending and receiving information other than the authentication information multiple times, and the authentication information is not sent to the transmission path, so security can be ensured, and the electronic certificate Can be updated safely.
  • the terminal authentication system when the expiration date of the electronic certificate expires, it is possible to safely update the electronic certificate while omitting the user's trouble.
  • a second feature of the present invention relates to the first feature of the present invention, and when the wireless terminal receives the new electronic certificate from the authentication device, the holding unit receives the new electronic certificate.
  • the gist is to hold it.
  • a third feature of the present invention relates to the first feature of the present invention, wherein the authentication device expires within a predetermined time after the expiration date set in the electronic certificate has expired and the expiration date has expired.
  • the access is permitted, and the proof executing unit, when the expiration date set in the electronic certificate has expired and the predetermined time has passed since the expiration date, the zero knowledge proof protocol Is executed with the authentication device.
  • a fourth feature of the present invention is according to the first feature of the present invention, wherein the holding unit holds in advance a plurality of electronic certificates having different expiration dates, and the certification execution unit includes the plurality of electronic certificates.
  • the gist is to execute the zero-knowledge proof protocol with the authentication device when all the expiration dates set in the above are expired.
  • a fifth feature of the present invention is that an electronic certificate with an expiration date is held, and the electronic certificate is provided in the wireless communication network when executing access to the wireless communication network (wireless communication network NW).
  • a wireless terminal wireless terminal MS that transmits to a given authentication device (for example, wireless base station BS), which is valid before the electronic certificate and the expiration date, and the wireless terminal is authorized to access
  • a storage unit storage unit 130 that holds in advance authentication information (authentication information S) indicating that the electronic certificate is included, and when the expiration date set in the electronic certificate has expired, other than the authentication information
  • a proof execution unit zero knowledge that executes a zero knowledge proof protocol that certifies that the authentication information is held by transmitting and receiving the information of the authentication device with the authentication device multiple times. And when the new electronic certificate whose validity period has been updated according to the result of the zero knowledge proof protocol is received from the authentication device, the holding unit receives the new electronic certificate. It is a gist to hold.
  • a sixth feature of the present invention is provided in a wireless communication network (wireless communication network NW), authenticates access from the wireless terminal according to an electronic certificate received from a wireless terminal (wireless terminal MS),
  • An authentication device for example, a radio base station BS
  • An authentication device for example, a radio base station BS
  • a confirmation execution unit zero) that executes a zero knowledge proof protocol with the wireless terminal to confirm that the authentication information is held by transmitting / receiving information other than authentication information (authentication information S) to / from the wireless terminal a plurality of times. If the knowledge proof execution unit 223) and the zero knowledge proof protocol confirm that the wireless terminal holds the authentication information, the expiration date is updated.
  • a transmission unit wireless communication unit 210) for transmitting the new electronic certificate to the wireless terminal, the authentication information is valid before the expiration date, and the wireless terminal is authorized to access It is a gist to show that it has.
  • a wireless terminal that holds an electronic certificate in which an expiration date is set and transmits the electronic certificate to the wireless communication network when executing access to the wireless communication network; Authentication provided in a wireless communication network, authenticating the access according to the electronic certificate received from the wireless terminal, and rejecting the access when the expiration date set in the electronic certificate has expired A terminal authentication method performed by a device, wherein the wireless terminal is valid before the electronic certificate and the expiration date, and indicates that the wireless terminal has the access authority A step of preliminarily holding authentication information (authentication information S), and when the expiration date set in the electronic certificate has expired, the wireless terminal is not the authentication information Executing a zero-knowledge proof protocol with the authentication device to prove that the authentication information is held by transmitting and receiving information to and from the authentication device multiple times; and And a step of transmitting a new electronic certificate with an updated expiration date from the authentication device to the wireless terminal when it is proved that the information is held.
  • authentication information S authentication information
  • the wireless terminal is not the authentication information Executing a zero-
  • a terminal authentication system capable of safely updating an electronic certificate while omitting a user's trouble when the expiration date of the electronic certificate has passed.
  • FIG. 1 is a schematic configuration diagram of a terminal authentication system according to an embodiment of the present invention.
  • FIG. 2 is a functional block diagram showing the configuration of the wireless terminal according to the embodiment of the present invention.
  • FIG. 3 is a functional block diagram showing the configuration of the radio base station according to the embodiment of the present invention.
  • FIG. 4 is a sequence diagram showing an operation pattern 1 of the terminal authentication system according to the embodiment of the present invention.
  • FIG. 5 is a sequence diagram showing an operation pattern 2 of the terminal authentication system according to the embodiment of the present invention.
  • FIG. 6 is a sequence diagram showing a specific example of the zero knowledge proof protocol according to the embodiment of the present invention.
  • FIG. 1 is a schematic configuration diagram of a terminal authentication system 100 according to the present embodiment.
  • the terminal authentication system 100 includes a wireless terminal MS and a wireless communication network NW.
  • the radio communication network NW has a radio base station BS and a certification authority CA.
  • the radio terminal MS holds an electronic certificate with an expiration date set, and transmits the electronic certificate to the radio base station BS when accessing the radio base station BS.
  • the electronic certificate is issued in advance by a telecommunications carrier operating the wireless communication network NW or a certification authority CA provided by a third party, and held in the wireless terminal MS.
  • terminal authentication is performed based on a public key infrastructure (PKI) using an electronic certificate.
  • the electronic certificate is a standard format such as ITU-T X. A format conforming to the 509 standard is applied. The format includes X. 509 version number, electronic certificate serial number, electronic signature algorithm, issuer name, expiration date, owner (user) name, owner public key information, and the like.
  • the radio base station BS performs terminal authentication according to the electronic certificate received from the radio terminal MS. That is, in this embodiment, the radio base station BS corresponds to an authentication device that performs terminal authentication for the radio terminal MS.
  • the radio base station BS rejects access from the radio terminal MS when the expiration date set in the electronic certificate received from the radio terminal MS has expired. Therefore, when the expiration date set in the electronic certificate has expired, the wireless terminal MS cannot continue to use the wireless communication network NW.
  • the certification authority CA is assumed to have a function of issuing authentication information indicating that the wireless terminal MS has the authority to access the wireless base station BS (wireless communication network NW).
  • the authentication information is held in advance in the wireless terminal MS.
  • the authentication information is valid before the expiration date of the electronic certificate, for example, it is valid substantially permanently.
  • the authentication information is information unique to each wireless terminal MS, and is used only when updating the electronic certificate held in the wireless terminal MS.
  • FIG. 2 is a functional block diagram showing the configuration of the radio terminal MS.
  • the radio terminal MS includes a radio communication unit 110, a control unit 120, a storage unit 130, a speaker 141, a microphone 142, a display unit 143, and an operation unit 144.
  • the wireless communication unit 110 includes an LNA (Low Noise Amplifier), a power amplifier, an up converter, a down converter, and the like, and transmits and receives wireless signals.
  • the control unit 120 is configured by a CPU, for example, and controls various functions provided in the wireless terminal MS.
  • the storage unit 130 is configured by a memory, for example, and stores various information used for control and the like in the radio terminal MS.
  • the microphone 142 collects sound and inputs sound data based on the collected sound to the control unit 120 via a sound codec (not shown).
  • the speaker 141 outputs audio based on audio data acquired from the control unit 120 via an audio codec (not shown).
  • the display unit 143 displays an image received via the control unit 120 and displays operation details (such as an input telephone number and an address).
  • the operation unit 144 is configured by a numeric keypad, function keys, and the like, and is used for inputting user operation details.
  • the control unit 120 includes a communication control unit 121, an electronic certificate management unit 122, and a zero knowledge proof execution unit 123.
  • the storage unit 130 includes an electronic certificate holding unit 131 that holds an electronic certificate, and an authentication information holding unit 132 that holds authentication information. In the present embodiment, the storage unit 130 corresponds to a holding unit that holds an electronic certificate and authentication information in advance.
  • the communication control unit 121 controls a communication function (particularly, wireless communication with the wireless base station BS) provided in the wireless terminal MS.
  • the electronic certificate management unit 122 manages the electronic certificate held by the electronic certificate holding unit 131.
  • the number of electronic certificates is not limited to one, and a plurality of electronic certificates with different expiration dates may be held in the electronic certificate holding unit 131. It means that the longer the validity period of the electronic certificate is, the stronger the security function corresponding to the electronic certificate is (for example, the longer the bit length of the encryption key).
  • the electronic certificate management unit 122 When notified from the communication control unit 121 of the start of access to the radio base station BS, the electronic certificate management unit 122 acquires the electronic certificate held by the electronic certificate holding unit 131 and passes through the radio communication unit 110. Transmit to the radio base station BS. When the validity period of the electronic certificate has expired, the electronic certificate management unit 122 requests the zero knowledge proof execution unit 123 to execute the zero knowledge proof protocol.
  • the electronic certificate management unit 122 itself detects the expiration (see FIG. 4). 5).
  • the zero knowledge proof execution unit 123 corresponds to a proof execution unit that executes the zero knowledge proof protocol with the radio base station BS when the electronic certificate management unit 122 requests execution of the zero knowledge proof protocol. Specifically, the zero knowledge proof execution unit 123 proves that the authentication information is held by transmitting / receiving information other than the authentication information to / from the radio base station BS a plurality of times using the zero knowledge proof protocol.
  • the zero-knowledge proof protocol (also called zero-knowledge dialogue proof protocol) is a method in which the authenticated person does not know the authentication information held by the authenticated person to third parties including the authenticator (radio base station BS in this embodiment). It is a protocol that allows an authenticator to confirm that it has authentication information, and is characterized by extremely high confidentiality with respect to authentication information. A specific example of the zero knowledge proof protocol will be described later.
  • the electronic certificate management unit 122 transmits a new electronic certificate whose validity period is updated via the wireless communication unit 110. To get.
  • the electronic certificate management unit 122 updates the electronic certificate held by the electronic certificate holding unit 131 using the acquired new electronic certificate. For example, the electronic certificate management unit 122 discards the old electronic certificate previously held in the electronic certificate holding unit 131 and causes the electronic certificate holding unit 131 to hold a new electronic certificate.
  • FIG. 3 is a functional block diagram showing the configuration of the radio base station BS.
  • the radio base station BS includes a radio communication unit 210, a control unit 220, a storage unit 230, and a wired communication unit 240.
  • the wireless communication unit 210 includes an LNA, a power amplifier, an up converter, a down converter, and the like, and transmits and receives wireless signals.
  • the control unit 220 is constituted by a CPU, for example, and controls various functions provided in the radio base station BS.
  • the storage unit 230 is configured by a memory, for example, and stores various information used for control in the radio base station BS.
  • the wired communication unit 240 is wired to a router or the like that constitutes the wireless communication network NW, and performs wired communication with the certification authority CA.
  • the control unit 220 includes a communication control unit 221, a terminal authentication unit 222, and a zero knowledge proof execution unit 223.
  • the communication control unit 221 controls a communication function provided in the radio base station BS, particularly radio communication with the radio terminal MS.
  • the terminal authentication unit 222 performs terminal authentication using an electronic certificate received from the wireless terminal MS when the wireless terminal MS accesses the wireless base station BS.
  • Existing technology can be used for terminal authentication using electronic certificates.
  • the terminal authentication unit 222 basically rejects access from the wireless terminal MS when the expiration date set in the electronic certificate has expired.
  • the wireless terminal MS holds a plurality of electronic certificates with different expiration dates, if all the expiration dates set in these electronic certificates have expired, the terminal authentication unit 222 Access from the wireless terminal MS is denied.
  • the validity of the wireless terminal MS is proved by the zero knowledge proof protocol, it is preferable to continue the access without denying the access.
  • the zero knowledge proof execution unit 223 executes the zero knowledge proof protocol with the wireless terminal MS when the terminal authentication unit 222 detects that the expiration date has expired or when a zero knowledge proof start request is received from the wireless terminal MS.
  • the zero knowledge proof execution unit 223 corresponds to a confirmation execution unit that confirms that authentication information is held by transmitting and receiving information other than authentication information to and from the wireless terminal MS a plurality of times.
  • the communication control unit 221 sends a new electronic certificate with an updated expiration date via the wired communication unit 240 to the certification authority.
  • the wireless communication unit 210 transmits the new electronic certificate acquired by the communication control unit 221 to the wireless terminal MS. That is, in the present embodiment, the wireless communication unit 210 corresponds to a transmission unit that transmits a new electronic certificate to the wireless terminal MS.
  • the terminal authentication unit 222 may permit access from the wireless terminal MS when the expiration date set in the electronic certificate expires and within a predetermined time after the expiration date.
  • the zero knowledge proof execution unit 123 and the zero knowledge proof execution unit 223 execute the zero knowledge proof protocol when the expiration date set in the electronic certificate has expired and a predetermined time has passed since the expiration date. Execute.
  • FIG. 4 is a sequence diagram showing an operation pattern 1 of the terminal authentication system 100.
  • step S101 the communication control unit 121 of the wireless terminal MS transmits an authentication request including an electronic certificate to the wireless base station BS when starting access to the wireless base station BS (wireless communication network NW).
  • step S102 the terminal authentication unit 222 of the radio base station BS detects that the electronic certificate has expired.
  • step S103 the zero knowledge proof executing unit 223 of the wireless base station BS transmits a zero knowledge proof start request for requesting the start of the zero knowledge proof protocol to the wireless terminal MS.
  • step S104 the zero knowledge proof executing unit 123 of the wireless terminal MS and the zero knowledge proof executing unit 223 of the wireless base station BS execute the zero knowledge proof protocol. Details of step S104 will be described later.
  • step S105 and step S106 the communication control unit 121 of the radio terminal MS and the communication control unit 221 of the radio base station BS perform key exchange, set a secret key, and form a secret communication channel.
  • step S107 the communication control unit 221 of the radio base station BS acquires a new electronic certificate from the certification authority CA, and transmits the new electronic certificate to the radio terminal MS via the secret communication path.
  • step S108 the electronic certificate management unit 122 of the wireless terminal MS updates the electronic certificate held by the electronic certificate holding unit 131 using the new electronic certificate.
  • FIG. 5 is a sequence diagram showing an operation pattern 2 of the terminal authentication system 100. Here, only operations different from the operation pattern 1 will be described.
  • step S202 the electronic certificate management unit 122 of the wireless terminal MS detects the expiration of the electronic certificate when starting access to the wireless base station BS (wireless communication network NW).
  • step S203 the zero knowledge proof executing unit 123 of the wireless terminal MS transmits a zero knowledge proof start request for requesting the start of the zero knowledge proof protocol to the wireless base station BS.
  • the subsequent operations are the same as steps S104 to S108 of operation pattern 1.
  • FIG. 6 is a sequence diagram showing a specific example of the zero knowledge proof protocol.
  • the wireless terminal MS holds the authentication information S issued from the certification authority CA.
  • the certification authority CA obtains the authentication information S using the following calculation.
  • ID0 S 2 modN ID0 and N are made public.
  • ID0 is an identifier (may include additional information) for identifying the radio terminal MS.
  • Procedure 2 The zero knowledge proof executing unit 223 of the radio base station BS randomly selects 0 or 1 and sends it to the radio terminal MS as Ei.
  • the radio base station BS can confirm that the radio terminal MS has the authentication information S.
  • a third party including the radio base station BS can impersonate the radio terminal MS when all Ei can be predicted. No matter how the third party including the radio base station BS skillfully selects ⁇ Ei ⁇ , no knowledge about the authentication information S can be obtained.
  • the authentication information S is effectively valid forever, so it must never be obtained by a third party for security purposes (specifically, prevention of impersonation).
  • the wireless terminal MS holds the authentication information S by transmitting and receiving information other than the authentication information S a plurality of times using the zero knowledge proof protocol, and the authentication information S is transmitted. Since it does not flow on the road, security can be ensured.
  • the zero knowledge proof protocol requires a considerable number of communications when the number of repetitions n is large. Therefore, it is not always desirable to use the zero knowledge proof protocol in wireless communication. Absent. For example, when the zero knowledge proof protocol is used at the time of handover or the like, the instantaneous interruption time of communication becomes long. Therefore, it is desirable to use it only when updating the electronic certificate as in this embodiment.
  • the radio base station BS may permit access from the radio terminal MS when the expiration date set in the electronic certificate expires and within a predetermined time after the expiration date.
  • the zero knowledge proof execution unit 123 and the zero knowledge proof execution unit 223 execute the zero knowledge proof protocol when the expiration date set in the electronic certificate has expired and a predetermined time has passed since the expiration date. Execute.
  • the electronic certificate holding unit 131 holds in advance a plurality of electronic certificates with different expiration dates, and the zero knowledge proof executing unit 123 and the zero knowledge proof executing unit 223 are set to a plurality of electronic certificates. If all expired expiration dates have expired, a zero knowledge proof protocol may be executed. As a result, the electronic certificate can be preferentially used without using the zero knowledge proof protocol as much as possible.
  • the radio base station BS authenticates access from the radio terminal MS.
  • the present invention is not limited to this, and devices other than the radio base station BS (for example, authentication provided in the radio communication network NW) A server or the like) may authenticate access from the wireless terminal MS.
  • the certification authority CA issued the electronic certificate
  • the radio base station BS may issue it.
  • the Fiat-Shamir method is used as the zero knowledge proof protocol, but a zero knowledge proof protocol other than the Fiat-Shamir method may be used.
  • the portable wireless terminal is illustrated.
  • a fixed wireless terminal a card wireless terminal, or the like may be used.
  • the terminal authentication system, the wireless terminal, the authentication device, and the terminal authentication method according to the present invention secure the electronic certificate while omitting the user's trouble when the electronic certificate expires. Since it can be updated, it is useful in wireless communication such as mobile communication.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A wireless terminal (MS) comprises a storing unit (130) that holds, in advance, an electronic certificate and authenticating information, said authenticating information being valid even beyond its validity term and indicating that the wireless terminal (MS) has an access right; and a zero knowledge interactive proof executing unit (123) that, when a validity term established for the electronic certificate has expired, executes, together with a wireless base station (BS), a zero knowledge interactive proof protocol, which proves that the authenticating information is held, by transmitting and receiving information other than the authenticating information to and from the wireless base station (BS) a plurality of times.  When it has been proved by the zero knowledge interactive proof protocol that the wireless terminal (MS) holds the authenticating information, the wireless base station (BS) transmits a new electronic certificate, the validity term of which has been updated, to the wireless terminal (MS).

Description

端末認証システム、無線端末、認証装置および端末認証方法Terminal authentication system, wireless terminal, authentication apparatus, and terminal authentication method
 本発明は、無線通信ネットワークへのアクセスを電子証明書に応じて認証する端末認証システム、無線端末、認証装置および端末認証方法に関する。 The present invention relates to a terminal authentication system, a wireless terminal, an authentication device, and a terminal authentication method for authenticating access to a wireless communication network according to an electronic certificate.
 従来より、無線端末が無線通信ネットワークへのアクセスを実行する際、無線通信ネットワークに設けられた認証装置(例えば、無線基地局)によって、無線端末によるアクセスについての認証である端末認証が行われている。このような端末認証では、無線端末が無線通信ネットワークへアクセスする権限を有しているか否かが確認され、権限を有している場合にアクセスが許可される。 Conventionally, when a wireless terminal performs access to a wireless communication network, terminal authentication, which is authentication for access by the wireless terminal, is performed by an authentication device (for example, a wireless base station) provided in the wireless communication network. Yes. In such terminal authentication, it is confirmed whether or not the wireless terminal has the authority to access the wireless communication network, and access is permitted if the authority is authorized.
 近年では、セキュリティ向上のために、証明機関が発行する電子的な証明書である電子証明書を用いた端末認証が一般的になりつつある。無線端末は電子証明書を予め保持し、無線通信ネットワークへのアクセスを実行する際に当該電子証明書を無線通信ネットワークに送信する。認証装置は、無線端末から受信した電子証明書に応じて端末認証を行う。 In recent years, in order to improve security, terminal authentication using an electronic certificate, which is an electronic certificate issued by a certification authority, is becoming common. The wireless terminal holds an electronic certificate in advance, and transmits the electronic certificate to the wireless communication network when executing access to the wireless communication network. The authentication device performs terminal authentication according to the electronic certificate received from the wireless terminal.
 電子証明書には、通常、当該電子証明書が有効である期限を定める有効期限が設定される。有効期限が切れている場合には電子証明書が無効になり、無線通信ネットワークへのアクセスが認証装置により拒否される。このため、無線端末は、有効期限が切れる前に、有効期限が更新された新たな電子証明書を取得し、電子証明書の更新を行う必要がある。 An expiration date is usually set for an electronic certificate to determine the expiration date for the electronic certificate. If the expiration date has expired, the electronic certificate becomes invalid and access to the wireless communication network is denied by the authentication device. For this reason, before the expiration date expires, the wireless terminal needs to acquire a new electronic certificate with an updated expiration date and update the electronic certificate.
 このような状況に鑑みて、電子証明書に設定された有効期限が切れる前に、当該電子証明書を用いた認証の結果に応じて、有効期限が更新された新たな電子証明書を無線端末が自動的に取得する方法が提案されている(特許文献1参照)。 In view of such circumstances, before the expiration date set in the electronic certificate expires, a new electronic certificate with an updated expiration date is sent to the wireless terminal according to the result of authentication using the electronic certificate. Has been proposed (see Patent Document 1).
特開2008-160384号公報([要約]など)JP 2008-160384 A ([Summary] etc.)
 しかしながら、無線端末は、必ずしも電子証明書の有効期限が切れる前に新たな電子証明書を自動的に取得できるとは限らない。例えば無線端末が長期間に渡って電源オフとなっていたような場合には、有効期限が切れて電子証明書が無効になる。 However, the wireless terminal cannot always automatically acquire a new electronic certificate before the electronic certificate expires. For example, when the wireless terminal has been powered off for a long period of time, the expiration date expires and the electronic certificate becomes invalid.
 特許文献1に記載の方法では、電子証明書の有効期限が切れた場合において、無線端末が新たな電子証明書を取得できず、電子証明書の更新を行うことができない問題があった。 The method described in Patent Document 1 has a problem that, when the validity period of an electronic certificate expires, the wireless terminal cannot acquire a new electronic certificate and cannot update the electronic certificate.
 一方で、有効期限が切れて電子証明書が無効になった場合、無線端末のユーザがサービス店舗に出向くなどの方法により、無線端末に保持される電子証明書を安全に更新できるが、このような方法ではユーザに手間をかける問題があった。 On the other hand, if the electronic certificate becomes invalid after the expiration date, the electronic certificate held by the wireless terminal can be safely updated by a method such as a user of the wireless terminal going to a service store. In this method, there is a problem that takes time and effort to the user.
 そこで、本発明は、電子証明書の有効期限が切れた場合において、ユーザの手間を省略しつつ、電子証明書を安全に更新できる端末認証システム、無線端末、認証装置および端末認証方法を提供することを目的とする。 Therefore, the present invention provides a terminal authentication system, a wireless terminal, an authentication device, and a terminal authentication method that can safely update an electronic certificate while omitting the user's trouble when the electronic certificate expires. For the purpose.
 上述した課題を解決するために、本発明は以下のような特徴を有している。まず、本発明の第1の特徴は、有効期限が設定された電子証明書を保持し、無線通信ネットワーク(無線通信ネットワークNW)へのアクセスを実行する際に前記電子証明書を前記無線通信ネットワークに送信する無線端末(無線端末MS)と、前記無線通信ネットワークに設けられ、前記無線端末から受信した前記電子証明書に応じて前記アクセスの認証を行い、前記電子証明書に設定された前記有効期限が切れている場合に前記アクセスを拒否する認証装置(例えば無線基地局BS)とを有し、前記無線端末は、前記電子証明書と、前記有効期限よりも先まで有効であり、前記無線端末が前記アクセスの権限を有していることを示す認証情報(認証情報S)とを予め保持する保持部(記憶部130)と、前記電子証明書に設定された前記有効期限が切れている場合、前記認証情報以外の情報を前記認証装置と複数回送受信することによって前記認証情報を保持していることを証明するゼロ知識証明プロトコルを前記認証装置と実行する証明実行部(ゼロ知識証明実行部123)とを備え、前記認証装置は、前記ゼロ知識証明プロトコルによって前記無線端末が前記認証情報を保持していることが証明された場合、有効期限が更新された新たな電子証明書を前記無線端末に送信することを要旨とする。 In order to solve the above-described problems, the present invention has the following features. First, the first feature of the present invention is that an electronic certificate with an expiration date is held, and the electronic certificate is used when accessing a wireless communication network (wireless communication network NW). A wireless terminal (wireless terminal MS) that transmits to the wireless communication network, authenticates the access according to the electronic certificate received from the wireless terminal, and sets the valid certificate set in the electronic certificate An authentication device (for example, a wireless base station BS) that rejects the access when the time limit has expired, the wireless terminal is valid until the electronic certificate and the expiration date, and the wireless terminal A holding unit (storage unit 130) that holds in advance authentication information (authentication information S) indicating that the terminal has the access authority, and the electronic certificate Proof execution for executing, with the authentication device, a zero-knowledge proof protocol for proving that the authentication information is retained by transmitting / receiving information other than the authentication information to / from the authentication device a plurality of times when the expiration date has expired (The zero-knowledge proof executing unit 123), and the authentication device is updated with an expiration date when it is proved by the zero-knowledge proof protocol that the wireless terminal holds the authentication information. The gist of the invention is to transmit a simple electronic certificate to the wireless terminal.
 第1の特徴に係る端末認証システムによれば、ゼロ知識証明プロトコルによって無線端末が認証情報を保持していることが証明された場合、認証装置は、有効期限が更新された新たな電子証明書を無線端末に送信する。これにより、ユーザの手間を省略しつつ、無線端末に保持される電子証明書を更新できる。 According to the terminal authentication system according to the first feature, when it is proved by the zero knowledge proof protocol that the wireless terminal holds the authentication information, the authentication device can generate a new electronic certificate with an updated expiration date. To the wireless terminal. Thereby, it is possible to update the electronic certificate held in the wireless terminal while omitting the user's trouble.
 認証情報は、電子証明書よりも先まで有効であり、認証情報を第三者が取得し得る通信路(特に、無線通信路)に流すことは、セキュリティの面で好ましくない。ゼロ知識証明プロトコルでは、認証情報以外の情報を複数回送受信することによって認証情報を保持していることが証明され、認証情報を伝送路に流すことがないため、セキュリティを確保でき、電子証明書を安全に更新できる。 The authentication information is valid before the electronic certificate, and it is not preferable in terms of security to send the authentication information to a communication path (especially a wireless communication path) where a third party can obtain the authentication information. In the zero knowledge proof protocol, it is proved that the authentication information is held by sending and receiving information other than the authentication information multiple times, and the authentication information is not sent to the transmission path, so security can be ensured, and the electronic certificate Can be updated safely.
 したがって、第1の特徴に係る端末認証システムによれば、電子証明書の有効期限が切れた場合において、ユーザの手間を省略しつつ、電子証明書を安全に更新できる。 Therefore, according to the terminal authentication system according to the first feature, when the expiration date of the electronic certificate expires, it is possible to safely update the electronic certificate while omitting the user's trouble.
 本発明の第2の特徴は、本発明の第1の特徴に係り、前記新たな電子証明書を前記認証装置から前記無線端末が受信した場合、前記保持部は、前記新たな電子証明書を保持することを要旨とする。 A second feature of the present invention relates to the first feature of the present invention, and when the wireless terminal receives the new electronic certificate from the authentication device, the holding unit receives the new electronic certificate. The gist is to hold it.
 本発明の第3の特徴は、本発明の第1の特徴に係り、前記認証装置は、前記電子証明書に設定された前記有効期限が切れ、かつ前記有効期限が切れてから所定時間以内である場合、前記アクセスを許可し、前記証明実行部は、前記電子証明書に設定された前記有効期限が切れ、かつ前記有効期限が切れてから前記所定時間が経過した場合、前記ゼロ知識証明プロトコルを前記認証装置と実行することを要旨とする。 A third feature of the present invention relates to the first feature of the present invention, wherein the authentication device expires within a predetermined time after the expiration date set in the electronic certificate has expired and the expiration date has expired. In some cases, the access is permitted, and the proof executing unit, when the expiration date set in the electronic certificate has expired and the predetermined time has passed since the expiration date, the zero knowledge proof protocol Is executed with the authentication device.
 本発明の第4の特徴は、本発明の第1の特徴に係り、前記保持部は、有効期限が異なる複数の電子証明書を予め保持し、前記証明実行部は、前記複数の電子証明書に設定された有効期限が全て切れている場合、前記ゼロ知識証明プロトコルを前記認証装置と実行することを要旨とする。 A fourth feature of the present invention is according to the first feature of the present invention, wherein the holding unit holds in advance a plurality of electronic certificates having different expiration dates, and the certification execution unit includes the plurality of electronic certificates. The gist is to execute the zero-knowledge proof protocol with the authentication device when all the expiration dates set in the above are expired.
 本発明の第5の特徴は、有効期限が設定された電子証明書を保持し、無線通信ネットワーク(無線通信ネットワークNW)へのアクセスを実行する際に前記電子証明書を前記無線通信ネットワークに設けられた認証装置(例えば無線基地局BS)に送信する無線端末(無線端末MS)であって、前記電子証明書と、前記有効期限よりも先まで有効であり、前記無線端末が前記アクセスの権限を有していることを示す認証情報(認証情報S)とを予め保持する保持部(記憶部130)と、前記電子証明書に設定された前記有効期限が切れている場合、前記認証情報以外の情報を前記認証装置と複数回送受信することによって前記認証情報を保持していることを証明するゼロ知識証明プロトコルを前記認証装置と実行する証明実行部(ゼロ知識証明実行部123)とを備え、前記ゼロ知識証明プロトコルの結果に応じて前記認証装置から有効期限が更新された新たな電子証明書を受信した場合、前記保持部は、前記新たな電子証明書を保持することを要旨とする。 A fifth feature of the present invention is that an electronic certificate with an expiration date is held, and the electronic certificate is provided in the wireless communication network when executing access to the wireless communication network (wireless communication network NW). A wireless terminal (wireless terminal MS) that transmits to a given authentication device (for example, wireless base station BS), which is valid before the electronic certificate and the expiration date, and the wireless terminal is authorized to access A storage unit (storage unit 130) that holds in advance authentication information (authentication information S) indicating that the electronic certificate is included, and when the expiration date set in the electronic certificate has expired, other than the authentication information A proof execution unit (zero knowledge) that executes a zero knowledge proof protocol that certifies that the authentication information is held by transmitting and receiving the information of the authentication device with the authentication device multiple times. And when the new electronic certificate whose validity period has been updated according to the result of the zero knowledge proof protocol is received from the authentication device, the holding unit receives the new electronic certificate. It is a gist to hold.
 本発明の第6の特徴は、無線通信ネットワーク(無線通信ネットワークNW)に設けられ、無線端末(無線端末MS)から受信した電子証明書に応じて、前記無線端末からのアクセスの認証を行い、前記電子証明書に設定された有効期限が切れている場合に前記アクセスを拒否する認証装置(例えば無線基地局BS)であって、前記電子証明書に設定された前記有効期限が切れている場合、認証情報(認証情報S)以外の情報を前記無線端末と複数回送受信することによって前記認証情報を保持していることを確認するゼロ知識証明プロトコルを前記無線端末と実行する確認実行部(ゼロ知識証明実行部223)と、前記ゼロ知識証明プロトコルによって前記無線端末が前記認証情報を保持していることが確認された場合、有効期限が更新された新たな電子証明書を前記無線端末に送信する送信部(無線通信部210)とを備え、前記認証情報は、前記有効期限よりも先まで有効であり、前記無線端末が前記アクセスの権限を有していることを示すことを要旨とする。 A sixth feature of the present invention is provided in a wireless communication network (wireless communication network NW), authenticates access from the wireless terminal according to an electronic certificate received from a wireless terminal (wireless terminal MS), An authentication device (for example, a radio base station BS) that denies access when the expiration date set in the electronic certificate has expired, and the expiration date set in the electronic certificate has expired A confirmation execution unit (zero) that executes a zero knowledge proof protocol with the wireless terminal to confirm that the authentication information is held by transmitting / receiving information other than authentication information (authentication information S) to / from the wireless terminal a plurality of times. If the knowledge proof execution unit 223) and the zero knowledge proof protocol confirm that the wireless terminal holds the authentication information, the expiration date is updated. A transmission unit (wireless communication unit 210) for transmitting the new electronic certificate to the wireless terminal, the authentication information is valid before the expiration date, and the wireless terminal is authorized to access It is a gist to show that it has.
 本発明の第7の特徴は、有効期限が設定された電子証明書を保持し、無線通信ネットワークへのアクセスを実行する際に前記電子証明書を前記無線通信ネットワークに送信する無線端末と、前記無線通信ネットワークに設けられ、前記無線端末から受信した前記電子証明書に応じて前記アクセスの認証を行い、前記電子証明書に設定された前記有効期限が切れている場合に前記アクセスを拒否する認証装置とにより行われる端末認証方法であって、前記無線端末が、前記電子証明書と、前記有効期限よりも先まで有効であり、前記無線端末が前記アクセスの権限を有していることを示す認証情報(認証情報S)とを予め保持するステップと、前記電子証明書に設定された前記有効期限が切れている場合、前記無線端末が、前記認証情報以外の情報を前記認証装置と複数回送受信することによって前記認証情報を保持していることを証明するゼロ知識証明プロトコルを前記認証装置と実行するステップと、前記ゼロ知識証明プロトコルによって前記無線端末が前記認証情報を保持していることが証明された場合、有効期限が更新された新たな電子証明書を前記認証装置から前記無線端末に送信するステップとを備えることを要旨とする。 According to a seventh aspect of the present invention, there is provided a wireless terminal that holds an electronic certificate in which an expiration date is set and transmits the electronic certificate to the wireless communication network when executing access to the wireless communication network; Authentication provided in a wireless communication network, authenticating the access according to the electronic certificate received from the wireless terminal, and rejecting the access when the expiration date set in the electronic certificate has expired A terminal authentication method performed by a device, wherein the wireless terminal is valid before the electronic certificate and the expiration date, and indicates that the wireless terminal has the access authority A step of preliminarily holding authentication information (authentication information S), and when the expiration date set in the electronic certificate has expired, the wireless terminal is not the authentication information Executing a zero-knowledge proof protocol with the authentication device to prove that the authentication information is held by transmitting and receiving information to and from the authentication device multiple times; and And a step of transmitting a new electronic certificate with an updated expiration date from the authentication device to the wireless terminal when it is proved that the information is held.
 本発明によれば、電子証明書の有効期限を過ぎた場合において、ユーザの手間を省略しつつ、電子証明書を安全に更新できる端末認証システム、無線端末、認証装置および端末認証方法を提供できる。 According to the present invention, it is possible to provide a terminal authentication system, a wireless terminal, an authentication device, and a terminal authentication method capable of safely updating an electronic certificate while omitting a user's trouble when the expiration date of the electronic certificate has passed. .
図1は、本発明の実施形態に係る端末認証システムの概略構成図である。FIG. 1 is a schematic configuration diagram of a terminal authentication system according to an embodiment of the present invention. 図2は、本発明の実施形態に係る無線端末の構成を示す機能ブロック図である。FIG. 2 is a functional block diagram showing the configuration of the wireless terminal according to the embodiment of the present invention. 図3は、本発明の実施形態に係る無線基地局の構成を示す機能ブロック図である。FIG. 3 is a functional block diagram showing the configuration of the radio base station according to the embodiment of the present invention. 図4は、本発明の実施形態に係る端末認証システムの動作パターン1を示すシーケンス図である。FIG. 4 is a sequence diagram showing an operation pattern 1 of the terminal authentication system according to the embodiment of the present invention. 図5は、本発明の実施形態に係る端末認証システムの動作パターン2を示すシーケンス図である。FIG. 5 is a sequence diagram showing an operation pattern 2 of the terminal authentication system according to the embodiment of the present invention. 図6は、本発明の実施形態に係るゼロ知識証明プロトコルの具体例を示すシーケンス図である。FIG. 6 is a sequence diagram showing a specific example of the zero knowledge proof protocol according to the embodiment of the present invention.
 次に、図面を参照して、本発明の実施形態に係る端末認証システムについて説明する。具体的には、(1)端末認証システムの概略構成、(2)端末認証システムの詳細構成、(3)端末認証システムの動作、(4)作用・効果、(5)その他の実施形態について説明する。以下の実施形態における図面の記載において、同一又は類似の部分には同一又は類似の符号を付している。 Next, a terminal authentication system according to an embodiment of the present invention will be described with reference to the drawings. Specifically, (1) schematic configuration of terminal authentication system, (2) detailed configuration of terminal authentication system, (3) operation of terminal authentication system, (4) action and effect, (5) other embodiments will be described. To do. In the description of the drawings in the following embodiments, the same or similar parts are denoted by the same or similar reference numerals.
 (1)端末認証システムの概略構成
 図1は、本実施形態に係る端末認証システム100の概略構成図である。
(1) Schematic Configuration of Terminal Authentication System FIG. 1 is a schematic configuration diagram of a terminal authentication system 100 according to the present embodiment.
 図1に示すように、端末認証システム100は、無線端末MSおよび無線通信ネットワークNWを有する。無線通信ネットワークNWは、無線基地局BSおよび証明機関CAを有する。 As shown in FIG. 1, the terminal authentication system 100 includes a wireless terminal MS and a wireless communication network NW. The radio communication network NW has a radio base station BS and a certification authority CA.
 無線端末MSは、有効期限が設定された電子証明書を保持し、無線基地局BSへのアクセスを実行する際に電子証明書を無線基地局BSに送信する。電子証明書は、無線通信ネットワークNWを運営する通信事業者、あるいは第三者によって提供される証明機関CAによりあらかじめ発行され、無線端末MSに保持されている。 The radio terminal MS holds an electronic certificate with an expiration date set, and transmits the electronic certificate to the radio base station BS when accessing the radio base station BS. The electronic certificate is issued in advance by a telecommunications carrier operating the wireless communication network NW or a certification authority CA provided by a third party, and held in the wireless terminal MS.
 本実施形態では、電子証明書を利用して、公開鍵基盤(PKI)に基づき端末認証が行われる。なお、電子証明書は、標準フォーマット、例えばITU-T X.509の規格に準拠したフォーマットが適用される。当該フォーマットには、X.509のバージョン番号、電子証明書シリアル番号、電子署名アルゴリズム、発行者名、有効期限、所有者(ユーザー)名、所有者の公開鍵情報などが含まれる。 In this embodiment, terminal authentication is performed based on a public key infrastructure (PKI) using an electronic certificate. The electronic certificate is a standard format such as ITU-T X. A format conforming to the 509 standard is applied. The format includes X. 509 version number, electronic certificate serial number, electronic signature algorithm, issuer name, expiration date, owner (user) name, owner public key information, and the like.
 無線基地局BSは、無線端末MSから受信した電子証明書に応じて端末認証を行う。すなわち、本実施形態において無線基地局BSは、無線端末MSに対する端末認証を行う認証装置に相当する。無線基地局BSは、無線端末MSから受信した電子証明書に設定された有効期限が切れている場合に、無線端末MSからのアクセスを拒否する。したがって、電子証明書に設定された有効期限が切れている場合には、無線端末MSは、無線通信ネットワークNWの利用を継続できないことになる。 The radio base station BS performs terminal authentication according to the electronic certificate received from the radio terminal MS. That is, in this embodiment, the radio base station BS corresponds to an authentication device that performs terminal authentication for the radio terminal MS. The radio base station BS rejects access from the radio terminal MS when the expiration date set in the electronic certificate received from the radio terminal MS has expired. Therefore, when the expiration date set in the electronic certificate has expired, the wireless terminal MS cannot continue to use the wireless communication network NW.
 なお、本実施形態において証明機関CAは、無線端末MSが無線基地局BS(無線通信ネットワークNW)へのアクセスの権限を有していることを示す認証情報を発行する機能も有するものとする。認証情報は、無線端末MSに予め保持されている。認証情報は、電子証明書の有効期限よりも先まで有効であり、例えば実質的に永久に有効である。認証情報は、無線端末MS毎に固有の情報であり、無線端末MSに保持される電子証明書の更新時にのみ使用される。 In the present embodiment, the certification authority CA is assumed to have a function of issuing authentication information indicating that the wireless terminal MS has the authority to access the wireless base station BS (wireless communication network NW). The authentication information is held in advance in the wireless terminal MS. The authentication information is valid before the expiration date of the electronic certificate, for example, it is valid substantially permanently. The authentication information is information unique to each wireless terminal MS, and is used only when updating the electronic certificate held in the wireless terminal MS.
 (2)端末認証システムの詳細構成
 次に、端末認証システム100の詳細構成について、(2.1)無線端末の構成、(2.2)無線基地局の構成の順で説明する。
(2) Detailed Configuration of Terminal Authentication System Next, the detailed configuration of the terminal authentication system 100 will be described in the order of (2.1) configuration of the radio terminal and (2.2) configuration of the radio base station.
 (2.1)無線端末の構成
 図2は、無線端末MSの構成を示す機能ブロック図である。
(2.1) Configuration of Radio Terminal FIG. 2 is a functional block diagram showing the configuration of the radio terminal MS.
 図2に示すように、無線端末MSは、無線通信部110、制御部120、記憶部130、スピーカ141、マイクロフォン142、表示部143、および操作部144を有する。無線通信部110は、LNA(Low Noise Amplifier)、パワーアンプ、アップコンバータおよびダウンコンバータなどを含み、無線信号の送受信を行う。制御部120は、例えばCPUによって構成され、無線端末MSが具備する各種機能を制御する。記憶部130は、例えばメモリによって構成され、無線端末MSにおける制御などに用いられる各種情報を記憶する。マイクロフォン142は、音声を集音し、集音された音声に基づく音声データを音声コーデック(不図示)経由で制御部120に入力する。スピーカ141は、音声コーデック(不図示)経由で制御部120から取得した音声データに基づいて音声を出力する。表示部143は、制御部120を介して受信した画像を表示したり、操作内容(入力電話番号やアドレスなど)を表示したりする。操作部144は、テンキーやファンクションキーなどによって構成され、ユーザの操作内容を入力するために用いられる。 As shown in FIG. 2, the radio terminal MS includes a radio communication unit 110, a control unit 120, a storage unit 130, a speaker 141, a microphone 142, a display unit 143, and an operation unit 144. The wireless communication unit 110 includes an LNA (Low Noise Amplifier), a power amplifier, an up converter, a down converter, and the like, and transmits and receives wireless signals. The control unit 120 is configured by a CPU, for example, and controls various functions provided in the wireless terminal MS. The storage unit 130 is configured by a memory, for example, and stores various information used for control and the like in the radio terminal MS. The microphone 142 collects sound and inputs sound data based on the collected sound to the control unit 120 via a sound codec (not shown). The speaker 141 outputs audio based on audio data acquired from the control unit 120 via an audio codec (not shown). The display unit 143 displays an image received via the control unit 120 and displays operation details (such as an input telephone number and an address). The operation unit 144 is configured by a numeric keypad, function keys, and the like, and is used for inputting user operation details.
 制御部120は、通信制御部121、電子証明書管理部122およびゼロ知識証明実行部123を有する。記憶部130は、電子証明書を保持する電子証明書保持部131と、認証情報を保持する認証情報保持部132とを有する。本実施形態において記憶部130は、電子証明書および認証情報を予め保持する保持部に相当する。 The control unit 120 includes a communication control unit 121, an electronic certificate management unit 122, and a zero knowledge proof execution unit 123. The storage unit 130 includes an electronic certificate holding unit 131 that holds an electronic certificate, and an authentication information holding unit 132 that holds authentication information. In the present embodiment, the storage unit 130 corresponds to a holding unit that holds an electronic certificate and authentication information in advance.
 通信制御部121は、無線端末MSが具備する通信機能(特に、無線基地局BSとの無線通信)を制御する。電子証明書管理部122は、電子証明書保持部131が保持する電子証明書を管理する。ここで電子証明書は、1つのみに限らず、有効期限が異なる複数の電子証明書が電子証明書保持部131に保持されていてもよい。なお、電子証明書の有効期限が長いほど、当該電子証明書に対応するセキュリティ機能が強固である(例えば暗号化鍵のビット長が長い)ことを意味する。 The communication control unit 121 controls a communication function (particularly, wireless communication with the wireless base station BS) provided in the wireless terminal MS. The electronic certificate management unit 122 manages the electronic certificate held by the electronic certificate holding unit 131. Here, the number of electronic certificates is not limited to one, and a plurality of electronic certificates with different expiration dates may be held in the electronic certificate holding unit 131. It means that the longer the validity period of the electronic certificate is, the stronger the security function corresponding to the electronic certificate is (for example, the longer the bit length of the encryption key).
 電子証明書管理部122は、無線基地局BSへのアクセス開始を通信制御部121から通知されると、電子証明書保持部131が保持する電子証明書を取得し、無線通信部110を介して無線基地局BSへ送信する。電子証明書管理部122は、電子証明書の有効期限が切れている場合、ゼロ知識証明実行部123にゼロ知識証明プロトコルの実行を要求する。ここで、電子証明書の有効期限切れを検出する方法としては、無線基地局BSが有効期限切れを検出する場合(図4参照)と、電子証明書管理部122自身が有効期限切れを検出する場合(図5参照)とがある。 When notified from the communication control unit 121 of the start of access to the radio base station BS, the electronic certificate management unit 122 acquires the electronic certificate held by the electronic certificate holding unit 131 and passes through the radio communication unit 110. Transmit to the radio base station BS. When the validity period of the electronic certificate has expired, the electronic certificate management unit 122 requests the zero knowledge proof execution unit 123 to execute the zero knowledge proof protocol. Here, as a method of detecting the expiration of the electronic certificate, when the radio base station BS detects the expiration (see FIG. 4), the electronic certificate management unit 122 itself detects the expiration (see FIG. 4). 5).
 ゼロ知識証明実行部123は、電子証明書管理部122からゼロ知識証明プロトコルの実行を要求されると、ゼロ知識証明プロトコルを無線基地局BSと実行する証明実行部に相当する。具体的には、ゼロ知識証明実行部123は、ゼロ知識証明プロトコルにより、認証情報以外の情報を無線基地局BSと複数回送受信することによって認証情報を保持していることを証明する。 The zero knowledge proof execution unit 123 corresponds to a proof execution unit that executes the zero knowledge proof protocol with the radio base station BS when the electronic certificate management unit 122 requests execution of the zero knowledge proof protocol. Specifically, the zero knowledge proof execution unit 123 proves that the authentication information is held by transmitting / receiving information other than the authentication information to / from the radio base station BS a plurality of times using the zero knowledge proof protocol.
 ゼロ知識証明プロトコル(ゼロ知識対話証明プロトコルとも呼ばれる)は、被認証者がもつ認証情報を認証者(本実施形態では無線基地局BS)を含む第三者に知られることなく、被認証者が認証情報を持っていることを認証者に確認させるプロトコルであり、認証情報に関しては非常に秘匿性が高いことを特徴としている。ゼロ知識証明プロトコルの具体例については後述する。 The zero-knowledge proof protocol (also called zero-knowledge dialogue proof protocol) is a method in which the authenticated person does not know the authentication information held by the authenticated person to third parties including the authenticator (radio base station BS in this embodiment). It is a protocol that allows an authenticator to confirm that it has authentication information, and is characterized by extremely high confidentiality with respect to authentication information. A specific example of the zero knowledge proof protocol will be described later.
 ゼロ知識証明プロトコルによって無線端末MSが認証情報を保持していることが証明された場合、電子証明書管理部122は、無線通信部110を介して、有効期限が更新された新たな電子証明書を取得する。電子証明書管理部122は、取得した新たな電子証明書を用いて、電子証明書保持部131が保持する電子証明書を更新する。例えば、電子証明書管理部122は、それまで電子証明書保持部131に保持されていた古い電子証明書を破棄し、新たな電子証明書を電子証明書保持部131に保持させる。 When it is proved that the wireless terminal MS holds the authentication information by the zero knowledge proof protocol, the electronic certificate management unit 122 transmits a new electronic certificate whose validity period is updated via the wireless communication unit 110. To get. The electronic certificate management unit 122 updates the electronic certificate held by the electronic certificate holding unit 131 using the acquired new electronic certificate. For example, the electronic certificate management unit 122 discards the old electronic certificate previously held in the electronic certificate holding unit 131 and causes the electronic certificate holding unit 131 to hold a new electronic certificate.
 (2.2)無線基地局の構成
 図3は、無線基地局BSの構成を示す機能ブロック図である。
(2.2) Configuration of Radio Base Station FIG. 3 is a functional block diagram showing the configuration of the radio base station BS.
 図3に示すように、無線基地局BSは、無線通信部210、制御部220、記憶部230および有線通信部240を有する。無線通信部210は、LNA、パワーアンプ、アップコンバータおよびダウンコンバータなどを含み、無線信号の送受信を行う。制御部220は、例えばCPUによって構成され、無線基地局BSが具備する各種機能を制御する。記憶部230は、例えばメモリによって構成され、無線基地局BSにおける制御などに用いられる各種情報を記憶する。有線通信部240は、無線通信ネットワークNWを構成するルータなどに有線接続され、証明機関CAとの有線通信を実行する。 3, the radio base station BS includes a radio communication unit 210, a control unit 220, a storage unit 230, and a wired communication unit 240. The wireless communication unit 210 includes an LNA, a power amplifier, an up converter, a down converter, and the like, and transmits and receives wireless signals. The control unit 220 is constituted by a CPU, for example, and controls various functions provided in the radio base station BS. The storage unit 230 is configured by a memory, for example, and stores various information used for control in the radio base station BS. The wired communication unit 240 is wired to a router or the like that constitutes the wireless communication network NW, and performs wired communication with the certification authority CA.
 制御部220は、通信制御部221、端末認証部222およびゼロ知識証明実行部223を有する。通信制御部221は、無線基地局BSが具備する通信機能、特に、無線端末MSとの無線通信を制御する。端末認証部222は、無線端末MSが無線基地局BSにアクセスする際、無線端末MSから受信する電子証明書を用いて端末認証を行う。電子証明書を用いた端末認証については既存の技術が使用できる。 The control unit 220 includes a communication control unit 221, a terminal authentication unit 222, and a zero knowledge proof execution unit 223. The communication control unit 221 controls a communication function provided in the radio base station BS, particularly radio communication with the radio terminal MS. The terminal authentication unit 222 performs terminal authentication using an electronic certificate received from the wireless terminal MS when the wireless terminal MS accesses the wireless base station BS. Existing technology can be used for terminal authentication using electronic certificates.
 端末認証部222は、基本的には、電子証明書に設定された有効期限が切れている場合に、無線端末MSからのアクセスを拒否する。なお、有効期限が異なる複数の電子証明書を無線端末MSが保持している場合には、これらの電子証明書に設定されている全ての有効期限が切れていると、端末認証部222は、無線端末MSからのアクセスを拒否する。ただし、ゼロ知識証明プロトコルにより無線端末MSの正当性が証明される場合には、当該アクセスを拒否せずに、アクセスを継続させることが好ましい。 The terminal authentication unit 222 basically rejects access from the wireless terminal MS when the expiration date set in the electronic certificate has expired. When the wireless terminal MS holds a plurality of electronic certificates with different expiration dates, if all the expiration dates set in these electronic certificates have expired, the terminal authentication unit 222 Access from the wireless terminal MS is denied. However, when the validity of the wireless terminal MS is proved by the zero knowledge proof protocol, it is preferable to continue the access without denying the access.
 ゼロ知識証明実行部223は、端末認証部222が有効期限切れを検出した場合、または無線端末MSからゼロ知識証明の開始要求を受けた場合、ゼロ知識証明プロトコルを無線端末MSと実行する。本実施形態においてゼロ知識証明実行部223は、認証情報以外の情報を無線端末MSと複数回送受信することによって認証情報を保持していることを確認する確認実行部に相当する。 The zero knowledge proof execution unit 223 executes the zero knowledge proof protocol with the wireless terminal MS when the terminal authentication unit 222 detects that the expiration date has expired or when a zero knowledge proof start request is received from the wireless terminal MS. In this embodiment, the zero knowledge proof execution unit 223 corresponds to a confirmation execution unit that confirms that authentication information is held by transmitting and receiving information other than authentication information to and from the wireless terminal MS a plurality of times.
 ゼロ知識証明プロトコルによって無線端末MSが認証情報を保持していることが確認された場合、通信制御部221は、有効期限が更新された新たな電子証明書を有線通信部240を介して証明機関CAから取得する。無線通信部210は、通信制御部221が取得した新たな電子証明書を無線端末MSに送信する。すなわち、本実施形態において無線通信部210は、新たな電子証明書を無線端末MSに送信する送信部に相当する。 When it is confirmed by the zero knowledge proof protocol that the wireless terminal MS holds the authentication information, the communication control unit 221 sends a new electronic certificate with an updated expiration date via the wired communication unit 240 to the certification authority. Obtain from CA. The wireless communication unit 210 transmits the new electronic certificate acquired by the communication control unit 221 to the wireless terminal MS. That is, in the present embodiment, the wireless communication unit 210 corresponds to a transmission unit that transmits a new electronic certificate to the wireless terminal MS.
 なお、端末認証部222は、電子証明書に設定された有効期限が切れ、かつ有効期限が切れてから所定時間以内である場合、無線端末MSからのアクセスを許可してもよい。この場合、ゼロ知識証明実行部123およびゼロ知識証明実行部223は、電子証明書に設定された有効期限が切れ、かつ有効期限が切れてから所定時間が経過した場合に、ゼロ知識証明プロトコルを実行する。 Note that the terminal authentication unit 222 may permit access from the wireless terminal MS when the expiration date set in the electronic certificate expires and within a predetermined time after the expiration date. In this case, the zero knowledge proof execution unit 123 and the zero knowledge proof execution unit 223 execute the zero knowledge proof protocol when the expiration date set in the electronic certificate has expired and a predetermined time has passed since the expiration date. Execute.
 (3)端末認証システムの動作
 次に、端末認証システム100の動作について、(3.1)全体動作、(3.2)ゼロ知識証明プロトコルの具体例の順で説明する。
(3) Operation of Terminal Authentication System Next, the operation of the terminal authentication system 100 will be described in the order of (3.1) overall operation and (3.2) a specific example of the zero knowledge proof protocol.
 (3.1)全体動作
 図4および図5を用いて、電子証明書の有効期限が切れている場合における端末認証システム100の動作パターン1および動作パターン2を説明する。
(3.1) Overall Operation An operation pattern 1 and an operation pattern 2 of the terminal authentication system 100 when the validity period of the electronic certificate has expired will be described with reference to FIGS. 4 and 5.
 (3.1.1)動作パターン1
 図4は、端末認証システム100の動作パターン1を示すシーケンス図である。
(3.1.1) Operation pattern 1
FIG. 4 is a sequence diagram showing an operation pattern 1 of the terminal authentication system 100.
 ステップS101において、無線端末MSの通信制御部121は、無線基地局BS(無線通信ネットワークNW)へのアクセスを開始する際、電子証明書を含む認証要求を無線基地局BSに送信する。 In step S101, the communication control unit 121 of the wireless terminal MS transmits an authentication request including an electronic certificate to the wireless base station BS when starting access to the wireless base station BS (wireless communication network NW).
 ステップS102において、無線基地局BSの端末認証部222は、電子証明書の有効期限切れを検出する。 In step S102, the terminal authentication unit 222 of the radio base station BS detects that the electronic certificate has expired.
 ステップS103において、無線基地局BSのゼロ知識証明実行部223は、ゼロ知識証明プロトコルの開始を要求するゼロ知識証明開始要求を無線端末MSに送信する。 In step S103, the zero knowledge proof executing unit 223 of the wireless base station BS transmits a zero knowledge proof start request for requesting the start of the zero knowledge proof protocol to the wireless terminal MS.
 ステップS104において、無線端末MSのゼロ知識証明実行部123および無線基地局BSのゼロ知識証明実行部223は、ゼロ知識証明プロトコルを実行する。ステップS104の詳細については後述する。 In step S104, the zero knowledge proof executing unit 123 of the wireless terminal MS and the zero knowledge proof executing unit 223 of the wireless base station BS execute the zero knowledge proof protocol. Details of step S104 will be described later.
 ステップS105およびステップS106において、無線端末MSの通信制御部121および無線基地局BSの通信制御部221は、鍵交換を実行し、秘匿鍵を設定するとともに、秘匿通信路を形成する。 In step S105 and step S106, the communication control unit 121 of the radio terminal MS and the communication control unit 221 of the radio base station BS perform key exchange, set a secret key, and form a secret communication channel.
 ステップS107において、無線基地局BSの通信制御部221は、証明機関CAから新たな電子証明書を取得するとともに、当該新たな電子証明書を秘匿通信路を介して無線端末MSに送信する。 In step S107, the communication control unit 221 of the radio base station BS acquires a new electronic certificate from the certification authority CA, and transmits the new electronic certificate to the radio terminal MS via the secret communication path.
 ステップS108において、無線端末MSの電子証明書管理部122は、新たな電子証明書を用いて、電子証明書保持部131が保持する電子証明書を更新する。 In step S108, the electronic certificate management unit 122 of the wireless terminal MS updates the electronic certificate held by the electronic certificate holding unit 131 using the new electronic certificate.
 (3.1.2)動作パターン2
 図5は、端末認証システム100の動作パターン2を示すシーケンス図である。ここでは、動作パターン1と異なる動作についてのみ説明する。
(3.1.2) Operation pattern 2
FIG. 5 is a sequence diagram showing an operation pattern 2 of the terminal authentication system 100. Here, only operations different from the operation pattern 1 will be described.
 ステップS202において、無線端末MSの電子証明書管理部122は、無線基地局BS(無線通信ネットワークNW)へのアクセスを開始する際、電子証明書の有効期限切れを検出する。 In step S202, the electronic certificate management unit 122 of the wireless terminal MS detects the expiration of the electronic certificate when starting access to the wireless base station BS (wireless communication network NW).
 ステップS203において、無線端末MSのゼロ知識証明実行部123は、ゼロ知識証明プロトコルの開始を要求するゼロ知識証明開始要求を無線基地局BSに送信する。以降の動作(ステップS204~ステップS208)については、動作パターン1のステップS104~ステップS108と同様である。 In step S203, the zero knowledge proof executing unit 123 of the wireless terminal MS transmits a zero knowledge proof start request for requesting the start of the zero knowledge proof protocol to the wireless base station BS. The subsequent operations (steps S204 to S208) are the same as steps S104 to S108 of operation pattern 1.
 (3.2)ゼロ知識証明プロトコルの具体例
 ここではゼロ知識証明プロトコルの一つであるFiat-Shamir法を例に、図4のステップS104(または図5のステップS204)の具体例について説明する。図6は、ゼロ知識証明プロトコルの具体例を示すシーケンス図である。
(3.2) Specific Example of Zero Knowledge Proof Protocol Here, a specific example of step S104 in FIG. 4 (or step S204 in FIG. 5) will be described using the Fiat-Shamir method, which is one of the zero knowledge proof protocols, as an example. . FIG. 6 is a sequence diagram showing a specific example of the zero knowledge proof protocol.
 無線端末MSは、証明機関CAから発行された認証情報Sを保持しているとする。証明機関CAは認証情報Sを以下の計算を用いて求める。 Suppose that the wireless terminal MS holds the authentication information S issued from the certification authority CA. The certification authority CA obtains the authentication information S using the following calculation.
 ID0=S2modN
 ID0とNは公開する。ここで、ID0は、無線端末MSを識別する識別子(付加情報を含んでいてもよい)である。Nは、証明機関CAが選んだ2つの大きな素数p、qの積(N = p・q)である。
ID0 = S 2 modN
ID0 and N are made public. Here, ID0 is an identifier (may include additional information) for identifying the radio terminal MS. N is a product of two large prime numbers p and q selected by the certification authority CA (N = p · q).
 これらの情報を元に無線端末MSの正当性、すなわち無線端末MSが認証情報Sを持つことを無線基地局BSに確認させるために、無線端末MSのゼロ知識証明実行部123および無線基地局BSのゼロ知識証明実行部223は、ゼロ知識証明プロトコルを実行する。具体的には、以下の手順1~手順4を、S401_i=1、2、3、・・・、n(nは適当に大きい整数)について繰り返す。 In order to make the radio base station BS confirm the validity of the radio terminal MS based on these pieces of information, that is, the radio terminal MS has the authentication information S, the zero knowledge proof executing unit 123 of the radio terminal MS and the radio base station BS The zero knowledge proof executing unit 223 executes the zero knowledge proof protocol. Specifically, the following steps 1 to 4 are repeated for S401_i = 1, 2, 3,..., N (n is an appropriately large integer).
 ・手順1:無線端末MSのゼロ知識証明実行部123は、乱数Riを選び、Xi=Ri2modNとなるXiを無線基地局BSに送る。 Procedure 1: The zero knowledge proof executing unit 123 of the radio terminal MS selects a random number Ri and sends Xi satisfying Xi = Ri 2 modN to the radio base station BS.
 ・手順2:無線基地局BSのゼロ知識証明実行部223は、0か1をランダムに選び、それをEiとして無線端末MSに送る。 Procedure 2: The zero knowledge proof executing unit 223 of the radio base station BS randomly selects 0 or 1 and sends it to the radio terminal MS as Ei.
 ・手順3:無線端末MSのゼロ知識証明実行部123は、
      Yi=Ri  (Ei=0 のとき)
      Yi=Ri・S mod N  (Ei=1 のとき)
 とし、Yiを無線基地局BSに送る。
Procedure 3: The zero knowledge proof executing unit 123 of the wireless terminal MS
Yi = Ri (when Ei = 0)
Yi = Ri ・ S mod N (when Ei = 1)
Yi is sent to the radio base station BS.
 ・手順4:無線基地局BSのゼロ知識証明実行部223は、
      Yi2=Xi mod N  (Ei=0 のとき)
      Yi2=(Xi・ID0) mod N  (Ei=1 のとき)
 が成り立つことをチェックする。成り立たなかったら停止し、認証NGとする。
Procedure 4: The zero knowledge proof execution unit 223 of the radio base station BS
Yi 2 = Xi mod N (when Ei = 0)
Yi 2 = (Xi • ID0) mod N (when Ei = 1)
Check that is true. If it does not hold, stop and make authentication NG.
 以上の手順を全てのnについて実行した場合、無線基地局BSは無線端末MSが認証情報Sを持つことを確認させることができる。このとき、無線基地局BSを含む第三者が無線端末MSになりすますことができるのは、全てのEiを予測できたときである。無線基地局BSを含む第三者がどのように巧妙に{Ei}を選ぼうと、認証情報Sに関して何も知識を得ることができない。 When the above procedure is executed for all n, the radio base station BS can confirm that the radio terminal MS has the authentication information S. At this time, a third party including the radio base station BS can impersonate the radio terminal MS when all Ei can be predicted. No matter how the third party including the radio base station BS skillfully selects {Ei}, no knowledge about the authentication information S can be obtained.
 (4)作用・効果
 以上説明したように、無線基地局BSは、ゼロ知識証明プロトコルによって無線端末MSが認証情報Sを保持していることが証明された場合、有効期限が更新された新たな電子証明書を無線端末MSに送信する。これにより、ユーザの手間を省略しつつ、無線端末MSに保持される電子証明書を更新できる。その結果、無線端末MSは、更新された電子証明書を用いて、無線通信ネットワークNWの利用を継続可能になる。
(4) Operation / Effect As described above, when it is proved that the radio terminal MS holds the authentication information S by the zero knowledge proof protocol, the radio base station BS is updated with a new expiration date. The electronic certificate is transmitted to the wireless terminal MS. Thereby, it is possible to update the electronic certificate held in the wireless terminal MS while omitting the user's trouble. As a result, the wireless terminal MS can continue to use the wireless communication network NW using the updated electronic certificate.
 また、認証情報Sは、電子証明書とは異なり、実質的に永久に有効であるため、セキュリティの確保(具体的には、なりすましの防止)のために決して第三者に取得されてはならない。本実施形態では、ゼロ知識証明プロトコルを利用して、認証情報S以外の情報を複数回送受信することによって、無線端末MSが認証情報Sを保持していることを証明でき、認証情報Sを伝送路に流すことがないため、セキュリティを確保できる。 In addition, unlike the electronic certificate, the authentication information S is effectively valid forever, so it must never be obtained by a third party for security purposes (specifically, prevention of impersonation). . In this embodiment, it is possible to prove that the wireless terminal MS holds the authentication information S by transmitting and receiving information other than the authentication information S a plurality of times using the zero knowledge proof protocol, and the authentication information S is transmitted. Since it does not flow on the road, security can be ensured.
 なお、ゼロ知識証明プロトコルは上記で示すとおり、繰り返し回数nが大きい場合、相当の回数の通信が必要になるため、通常からゼロ知識証明プロトコルを使用することは無線通信においてはあまり望ましいとはいえない。例えばハンドオーバ時などにゼロ知識証明プロトコルを使用すると通信の瞬断時間が長くなってしまうため、本実施形態のように電子証明書の更新時にのみ使用することが望ましい。 As shown above, the zero knowledge proof protocol requires a considerable number of communications when the number of repetitions n is large. Therefore, it is not always desirable to use the zero knowledge proof protocol in wireless communication. Absent. For example, when the zero knowledge proof protocol is used at the time of handover or the like, the instantaneous interruption time of communication becomes long. Therefore, it is desirable to use it only when updating the electronic certificate as in this embodiment.
 このため、無線基地局BSは、電子証明書に設定された有効期限が切れ、かつ有効期限が切れてから所定時間以内である場合、無線端末MSからのアクセスを許可してもよい。この場合、ゼロ知識証明実行部123およびゼロ知識証明実行部223は、電子証明書に設定された有効期限が切れ、かつ有効期限が切れてから所定時間が経過した場合に、ゼロ知識証明プロトコルを実行する。 For this reason, the radio base station BS may permit access from the radio terminal MS when the expiration date set in the electronic certificate expires and within a predetermined time after the expiration date. In this case, the zero knowledge proof execution unit 123 and the zero knowledge proof execution unit 223 execute the zero knowledge proof protocol when the expiration date set in the electronic certificate has expired and a predetermined time has passed since the expiration date. Execute.
 上記と同様の理由により、電子証明書保持部131が有効期限が異なる複数の電子証明書を予め保持し、ゼロ知識証明実行部123およびゼロ知識証明実行部223は、複数の電子証明書に設定された有効期限が全て切れている場合、ゼロ知識証明プロトコルを実行してもよい。これにより、ゼロ知識証明プロトコルを極力使用せずに、電子証明書を優先して使用させることができる。 For the same reason as described above, the electronic certificate holding unit 131 holds in advance a plurality of electronic certificates with different expiration dates, and the zero knowledge proof executing unit 123 and the zero knowledge proof executing unit 223 are set to a plurality of electronic certificates. If all expired expiration dates have expired, a zero knowledge proof protocol may be executed. As a result, the electronic certificate can be preferentially used without using the zero knowledge proof protocol as much as possible.
 (5)その他の実施形態
 上記のように、本発明は実施形態によって記載したが、この開示の一部をなす論述及び図面はこの発明を限定するものであると理解すべきではない。この開示から当業者には様々な代替実施形態、実施例及び運用技術が明らかとなる。
(5) Other Embodiments As described above, the present invention has been described according to the embodiment. However, it should not be understood that the description and drawings constituting a part of this disclosure limit the present invention. From this disclosure, various alternative embodiments, examples and operational techniques will be apparent to those skilled in the art.
 例えば、上述した実施形態では、無線基地局BSが無線端末MSからのアクセスを認証していたが、これに限らず、無線基地局BS以外の装置(例えば、無線通信ネットワークNWに設けられた認証サーバなど)が無線端末MSからのアクセスを認証してもよい。また、電子証明書を証明機関CAが発行していたが、無線基地局BSが発行してもよい。 For example, in the above-described embodiment, the radio base station BS authenticates access from the radio terminal MS. However, the present invention is not limited to this, and devices other than the radio base station BS (for example, authentication provided in the radio communication network NW) A server or the like) may authenticate access from the wireless terminal MS. Moreover, although the certification authority CA issued the electronic certificate, the radio base station BS may issue it.
 上述した実施形態では、ゼロ知識証明プロトコルとしてFiat-Shamir法を用いていたが、Fiat-Shamir法以外のゼロ知識証明プロトコルを用いてもよい。 In the above-described embodiment, the Fiat-Shamir method is used as the zero knowledge proof protocol, but a zero knowledge proof protocol other than the Fiat-Shamir method may be used.
 なお、上述した実施形態では、可搬型の無線端末を図示していたが、固定型の無線端末や、カード型の無線端末などであってもよい。 In the above-described embodiment, the portable wireless terminal is illustrated. However, a fixed wireless terminal, a card wireless terminal, or the like may be used.
 このように本発明は、ここでは記載していない様々な実施形態等を包含するということを理解すべきである。したがって、本発明はこの開示から妥当な特許請求の範囲の発明特定事項によってのみ限定されるものである。 Thus, it should be understood that the present invention includes various embodiments not described herein. Therefore, the present invention is limited only by the invention specifying matters in the scope of claims reasonable from this disclosure.
 なお、日本国特許出願第2008-220120号(2008年8月28日出願)の全内容が、参照により、本願明細書に組み込まれている。 Note that the entire content of Japanese Patent Application No. 2008-220120 (filed on August 28, 2008) is incorporated herein by reference.
 以上のように、本発明に係る端末認証システム、無線端末、認証装置および端末認証方法は、電子証明書の有効期限が切れた場合において、ユーザの手間を省略しつつ、電子証明書を安全に更新することができるため、移動体通信などの無線通信において有用である。 As described above, the terminal authentication system, the wireless terminal, the authentication device, and the terminal authentication method according to the present invention secure the electronic certificate while omitting the user's trouble when the electronic certificate expires. Since it can be updated, it is useful in wireless communication such as mobile communication.

Claims (7)

  1.  有効期限が設定された電子証明書を保持し、無線通信ネットワークへのアクセスを実行する際に前記電子証明書を前記無線通信ネットワークに送信する無線端末と、
     前記無線通信ネットワークに設けられ、前記無線端末から受信した前記電子証明書に応じて前記アクセスの認証を行い、前記電子証明書に設定された前記有効期限が切れている場合に前記アクセスを拒否する認証装置と
    を有し、
     前記無線端末は、
     前記電子証明書と、前記有効期限よりも先まで有効であり、前記無線端末が前記アクセスの権限を有していることを示す認証情報とを予め保持する保持部と、
     前記電子証明書に設定された前記有効期限が切れている場合、前記認証情報以外の情報を前記認証装置と複数回送受信することによって前記認証情報を保持していることを証明するゼロ知識証明プロトコルを前記認証装置と実行する証明実行部と
    を備え、
     前記認証装置は、前記ゼロ知識証明プロトコルによって前記無線端末が前記認証情報を保持していることが証明された場合、有効期限が更新された新たな電子証明書を前記無線端末に送信する端末認証システム。
    A wireless terminal that holds an electronic certificate with an expiration date set and transmits the electronic certificate to the wireless communication network when executing access to the wireless communication network;
    Provided in the wireless communication network, authenticates the access according to the electronic certificate received from the wireless terminal, and rejects the access when the expiration date set in the electronic certificate has expired An authentication device,
    The wireless terminal is
    A holding unit that holds in advance the electronic certificate and authentication information that is valid before the expiration date and indicates that the wireless terminal has the authority to access;
    A zero-knowledge proof protocol for proving that the authentication information is held by transmitting / receiving information other than the authentication information to / from the authentication device a plurality of times when the expiration date set in the electronic certificate has expired A certification execution unit that executes the authentication device and
    The authentication device, when it is proved by the zero knowledge proof protocol that the wireless terminal holds the authentication information, terminal authentication for transmitting a new electronic certificate with an updated expiration date to the wireless terminal system.
  2.  前記新たな電子証明書を前記認証装置から前記無線端末が受信した場合、前記保持部は、前記新たな電子証明書を保持する請求項1に記載の端末認証システム。 2. The terminal authentication system according to claim 1, wherein when the wireless terminal receives the new electronic certificate from the authentication device, the holding unit holds the new electronic certificate.
  3.  前記認証装置は、前記電子証明書に設定された前記有効期限が切れ、かつ前記有効期限が切れてから所定時間以内である場合、前記アクセスを許可し、
     前記証明実行部は、前記電子証明書に設定された前記有効期限が切れ、かつ前記有効期限が切れてから前記所定時間が経過した場合、前記ゼロ知識証明プロトコルを前記認証装置と実行する請求項1に記載の端末認証システム。
    The authentication device permits the access when the expiration date set in the electronic certificate expires and within a predetermined time after the expiration date,
    The proof execution unit executes the zero knowledge proof protocol with the authentication device when the validity period set in the electronic certificate expires and the predetermined time has elapsed since the validity period expired. The terminal authentication system according to 1.
  4.  前記保持部は、有効期限が異なる複数の電子証明書を予め保持し、
     前記証明実行部は、前記複数の電子証明書に設定された有効期限が全て切れている場合、前記ゼロ知識証明プロトコルを前記認証装置と実行する請求項1に記載の端末認証システム。
    The holding unit holds in advance a plurality of electronic certificates with different expiration dates,
    2. The terminal authentication system according to claim 1, wherein the proof execution unit executes the zero knowledge proof protocol with the authentication device when all the expiration dates set in the plurality of electronic certificates have expired.
  5.  有効期限が設定された電子証明書を保持し、無線通信ネットワークへのアクセスを実行する際に前記電子証明書を前記無線通信ネットワークに設けられた認証装置に送信する無線端末であって、
     前記電子証明書と、前記有効期限よりも先まで有効であり、前記無線端末が前記アクセスの権限を有していることを示す認証情報とを予め保持する保持部と、
     前記電子証明書に設定された前記有効期限が切れている場合、前記認証情報以外の情報を前記認証装置と複数回送受信することによって前記認証情報を保持していることを証明するゼロ知識証明プロトコルを前記認証装置と実行する証明実行部と
    を備え、
     前記ゼロ知識証明プロトコルの結果に応じて前記認証装置から有効期限が更新された新たな電子証明書を受信した場合、前記保持部は、前記新たな電子証明書を保持する無線端末。
    A wireless terminal that holds an electronic certificate in which an expiration date is set and transmits the electronic certificate to an authentication device provided in the wireless communication network when executing access to the wireless communication network,
    A holding unit that holds in advance the electronic certificate and authentication information that is valid before the expiration date and indicates that the wireless terminal has the authority to access;
    A zero-knowledge proof protocol for proving that the authentication information is held by transmitting / receiving information other than the authentication information to / from the authentication device a plurality of times when the expiration date set in the electronic certificate has expired A certification execution unit that executes the authentication device and
    When receiving a new electronic certificate whose expiration date has been updated from the authentication device according to the result of the zero knowledge proof protocol, the holding unit holds a new electronic certificate.
  6.  無線通信ネットワークに設けられ、無線端末から受信した電子証明書に応じて、前記無線端末からのアクセスの認証を行い、前記電子証明書に設定された有効期限が切れている場合に前記アクセスを拒否する認証装置であって、
     前記電子証明書に設定された前記有効期限が切れている場合、認証情報以外の情報を前記無線端末と複数回送受信することによって前記認証情報を保持していることを確認するゼロ知識証明プロトコルを前記無線端末と実行する確認実行部と、
     前記ゼロ知識証明プロトコルによって前記無線端末が前記認証情報を保持していることが確認された場合、有効期限が更新された新たな電子証明書を前記無線端末に送信する送信部と
    を備え、
     前記認証情報は、前記有効期限よりも先まで有効であり、前記無線端末が前記アクセスの権限を有していることを示す認証装置。
    Provided in a wireless communication network, authenticates access from the wireless terminal in accordance with the electronic certificate received from the wireless terminal, and rejects the access when the expiration date set in the electronic certificate has expired An authentication device for
    A zero-knowledge proof protocol for confirming that the authentication information is retained by transmitting / receiving information other than authentication information to / from the wireless terminal a plurality of times when the expiration date set in the electronic certificate has expired A confirmation execution unit that executes with the wireless terminal;
    When it is confirmed by the zero knowledge proof protocol that the wireless terminal holds the authentication information, a transmission unit that transmits a new electronic certificate with an updated expiration date to the wireless terminal,
    The authentication apparatus, wherein the authentication information is valid before the expiration date, and indicates that the wireless terminal has the access authority.
  7.  有効期限が設定された電子証明書を保持し、無線通信ネットワークへのアクセスを実行する際に前記電子証明書を前記無線通信ネットワークに送信する無線端末と、
     前記無線通信ネットワークに設けられ、前記無線端末から受信した前記電子証明書に応じて前記アクセスの認証を行い、前記電子証明書に設定された前記有効期限が切れている場合に前記アクセスを拒否する認証装置とにより行われる端末認証方法であって、
     前記無線端末が、前記電子証明書と、前記有効期限よりも先まで有効であり、前記無線端末が前記アクセスの権限を有していることを示す認証情報とを予め保持するステップと、
     前記電子証明書に設定された前記有効期限が切れている場合、前記無線端末が、前記認証情報以外の情報を前記認証装置と複数回送受信することによって前記認証情報を保持していることを証明するゼロ知識証明プロトコルを前記認証装置と実行するステップと、
     前記ゼロ知識証明プロトコルによって前記無線端末が前記認証情報を保持していることが証明された場合、有効期限が更新された新たな電子証明書を前記認証装置から前記無線端末に送信するステップと
    を備える端末認証方法。
    A wireless terminal that holds an electronic certificate with an expiration date set and transmits the electronic certificate to the wireless communication network when executing access to the wireless communication network;
    Provided in the wireless communication network, authenticates the access according to the electronic certificate received from the wireless terminal, and rejects the access when the expiration date set in the electronic certificate has expired A terminal authentication method performed by an authentication device,
    Preliminarily holding the electronic certificate and authentication information indicating that the wireless terminal is valid until the expiration date and that the wireless terminal is authorized to access;
    When the expiration date set in the electronic certificate has expired, it is proved that the wireless terminal holds the authentication information by transmitting / receiving information other than the authentication information to / from the authentication device multiple times. Executing a zero-knowledge proof protocol with the authenticator;
    When it is proved by the zero knowledge proof protocol that the wireless terminal holds the authentication information, a new electronic certificate with an updated expiration date is transmitted from the authentication device to the wireless terminal; Terminal authentication method provided.
PCT/JP2009/064854 2008-08-28 2009-08-26 Terminal authenticating system, wireless terminal, authenticating apparatus and terminal authenticating method WO2010024287A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2008-220120 2008-08-28
JP2008220120A JP2010056925A (en) 2008-08-28 2008-08-28 Terminal authenticating system, wireless terminal, authenticating apparatus and terminal authenticating method

Publications (1)

Publication Number Publication Date
WO2010024287A1 true WO2010024287A1 (en) 2010-03-04

Family

ID=41721454

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2009/064854 WO2010024287A1 (en) 2008-08-28 2009-08-26 Terminal authenticating system, wireless terminal, authenticating apparatus and terminal authenticating method

Country Status (2)

Country Link
JP (1) JP2010056925A (en)
WO (1) WO2010024287A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001136162A (en) * 1999-11-09 2001-05-18 Kyocera Corp Authentication method in mobile wireless communication system
JP2003196240A (en) * 2001-12-28 2003-07-11 Brother Ind Ltd Service provider, service providing system, service providing program, computer readable recording medium with its program recorded
JP2005130444A (en) * 2003-07-25 2005-05-19 Ricoh Co Ltd Communication apparatus, communication system, certificate transmission method and program
JP2007274060A (en) * 2006-03-30 2007-10-18 Brother Ind Ltd Communication apparatus and program
JP2007274192A (en) * 2006-03-30 2007-10-18 Kyocera Corp Base station device, authentication server, mobile station device, and communication control method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001136162A (en) * 1999-11-09 2001-05-18 Kyocera Corp Authentication method in mobile wireless communication system
JP2003196240A (en) * 2001-12-28 2003-07-11 Brother Ind Ltd Service provider, service providing system, service providing program, computer readable recording medium with its program recorded
JP2005130444A (en) * 2003-07-25 2005-05-19 Ricoh Co Ltd Communication apparatus, communication system, certificate transmission method and program
JP2007274060A (en) * 2006-03-30 2007-10-18 Brother Ind Ltd Communication apparatus and program
JP2007274192A (en) * 2006-03-30 2007-10-18 Kyocera Corp Base station device, authentication server, mobile station device, and communication control method

Also Published As

Publication number Publication date
JP2010056925A (en) 2010-03-11

Similar Documents

Publication Publication Date Title
JP4851767B2 (en) Method for mutual authentication between certificate authorities using portable security token and computer system
US8356179B2 (en) Entity bi-directional identificator method and system based on trustable third party
CN101090316B (en) Identify authorization method between storage card and terminal equipment at off-line state
JP5790653B2 (en) Service provision system
CN101364876B (en) Method realizing public key acquiring, certificater verification and bidirectional identification of entity
EP1881665B1 (en) System and method for provisioning device certificates
US20120216042A1 (en) System and Method for Provisioning Device Certificates
CN101364875B (en) Method realizing public key acquiring, certificater verification and bidirectional identification of entity
MXPA01011969A (en) Method and apparatus for initializing secure communications among, and for exclusively pairing wireless devices.
CN101674182B (en) Entity public key acquisition and certificate verification and authentication method and system of introducing online trusted third party
WO2004071006A1 (en) Broadcast encryption key distribution system
JP2005505991A (en) Method and system for providing client privacy when content is requested from a public server
WO2017150270A1 (en) Communication system, hardware security module, terminal device, communication method, and program
JP2013504832A (en) Method and apparatus for reliable authentication and logon
JP2005512396A (en) Use of public key pairs at terminals to authenticate and authorize telecommunications subscribers to network providers and business partners
JP2020533853A (en) Methods and equipment for managing digital certificates
CN101772024A (en) User identification method, device and system
JP2016021765A (en) Method and apparatus for authenticated user-access to kerberos-enabled application based on authentication and key agreement (aka) mechanism
CN101282215A (en) Method and apparatus for distinguishing certificate
JP4499575B2 (en) Network security method and network security system
KR20120039133A (en) Apparatus and method that generates originality verification and certifies originality verification
WO2010024287A1 (en) Terminal authenticating system, wireless terminal, authenticating apparatus and terminal authenticating method
JP2017139026A (en) Method and apparatus for reliable authentication and logon
KR101451163B1 (en) System and method for access authentication for wireless network
WO2009129683A1 (en) Access authentication method for a worldwide interoperability for microwave access system, apparatus and system using the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09809938

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09809938

Country of ref document: EP

Kind code of ref document: A1