US20170013461A1 - Communication apparatus, communication method, and program - Google Patents

Communication apparatus, communication method, and program Download PDF

Info

Publication number
US20170013461A1
US20170013461A1 US15/200,690 US201615200690A US2017013461A1 US 20170013461 A1 US20170013461 A1 US 20170013461A1 US 201615200690 A US201615200690 A US 201615200690A US 2017013461 A1 US2017013461 A1 US 2017013461A1
Authority
US
United States
Prior art keywords
identification information
communication apparatus
communication
different communication
wireless network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/200,690
Other languages
English (en)
Inventor
Tomokazu Yamaki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Canon Inc
Original Assignee
Canon Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Canon Inc filed Critical Canon Inc
Assigned to CANON KABUSHIKI KAISHA reassignment CANON KABUSHIKI KAISHA ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YAMAKI, TOMOKAZU
Publication of US20170013461A1 publication Critical patent/US20170013461A1/en
Priority to US16/414,277 priority Critical patent/US10952060B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1439Methods for optical code recognition including a method step for retrieval of the optical code
    • G06K7/1447Methods for optical code recognition including a method step for retrieval of the optical code extracting optical codes from image or text carrying said optical code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W76/02
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Definitions

  • aspects of the present invention generally relate to a communication apparatus providing a communication parameter.
  • Communication parameters such as a network identifier, an encryption key, and an encryption method need to be set to a communication apparatus to connect the communication apparatus to a wireless network.
  • a base station provides an external apparatus to be connected to a wireless network with a communication parameter in order to simplify the setting of the communication parameter (U.S. Patent Application Publication No. 2011/0255398).
  • the base station provides the external apparatus with the communication parameter in response to a starting instruction from a different communication apparatus.
  • an administrator of the wireless network may unintentionally provide an external apparatus with the communication parameter.
  • the communication parameter is unintentionally provided to an external apparatus, there is a possibility that the unexpected external apparatus may be connected to the wireless network, and accordingly, security of the wireless network is lowered.
  • a different communication apparatus that is allowed to request the base station to provide the communication parameter to the external apparatus can be limited.
  • a communication apparatus includes an acquisition unit configured to acquire identification information from a first different communication apparatus, a determination unit configured to determine whether the identification information acquired by the acquisition unit is first identification information, a reception unit configured to receive, from the first different communication apparatus, a predetermined request to connect a second different communication apparatus to a wireless network generated by the communication apparatus, and a providing unit configured to, in a case where the identification information is the first identification information, provide the second different communication apparatus with a communication parameter for connecting to the wireless network in response to receipt of the predetermined request, wherein in a case where the identification information is not the first identification information, the second different communication apparatus is not provided with the communication parameter even upon receipt of the predetermined request.
  • FIG. 1 illustrates a configuration of a communication system.
  • FIG. 2 illustrates a hardware configuration of a communication apparatus.
  • FIG. 3 is a functional block diagram of the communication apparatus.
  • FIG. 4 is a flowchart realized by the communication apparatus.
  • FIG. 5 is a flowchart realized by the communication apparatus.
  • FIG. 6 is a sequence chart between communication apparatuses.
  • FIG. 7 is a sequence chart between communication apparatuses.
  • FIG. 1 A configuration of a communication system is illustrated in FIG. 1 .
  • This communication system includes an access point (hereinafter, an AP) 101 , and communication apparatuses such as a smartphone 102 , a smartphone 103 , a printer 105 , and a printer 106 .
  • a wireless network 104 is a wireless LAN generated by the AP 101 conforming to the IEEE 802.11 series standard.
  • Wired communication methods such as wired LAN, are also applicable.
  • the AP 101 operates as an access point in an infrastructure mode defined by the IEEE 802.11 standard.
  • the AP 101 may operate as a group owner defined by the Wi-Fi Direct® standard.
  • Such access points are collectively called base stations.
  • a base station determines a communication channel for generating a wireless network, generates the wireless network by the determined communication channel, and periodically transmits a beacon.
  • a different communication apparatus operates as a station (hereinafter, STA) in the infrastructure mode defined by the IEEE 802.11 standard.
  • STA station
  • Different communication apparatuses may operate as clients defined by the Wi-Fi Direct® standard.
  • terminals are collectively called terminals.
  • a terminal is connected to the wireless network generated by the base station to perform wireless communication with the base station.
  • the terminal is also able to communicate with other terminals joining the wireless network through the base station.
  • the communication apparatus is an AP, a smartphone, or a printer.
  • any other type of device such as a camera, a cellular phone, a PC, a video camera, a smart watch, a PDA, etc., may be considered as the communication apparatus.
  • FIG. 2 illustrates a hardware configuration of a communication apparatus.
  • a storage unit 201 includes a ROM or a RAM, and stores therein various kinds of information such as programs to perform various operations described below and communication parameters for wireless communication.
  • storage media such as a flexible disk, a hard disk, an optical disk, a magneto-optical disk, a CD-ROM, a CD-R, a magnetic tape, a non-volatile memory card, or a DVD may be used as the storage unit 201 in addition to memories such as a ROM and a RAM.
  • a control unit 202 includes a CPU or an MPU, and controls the communication apparatus by executing a program stored in the storage unit 201 .
  • the communication apparatus may be controlled in cooperation with an OS (Operating System) executed by the control unit 202 .
  • OS Operating System
  • the control unit 202 controls a functional unit 203 to execute predetermined processing, such as photography, printing, or projection.
  • the functional unit 203 is hardware for executing predetermined processing by the communication apparatus.
  • the functional unit 203 is a print unit that performs print processing.
  • the functional unit 203 is a Long Term Evolution (LTE) communication unit and is able to communicate with an external apparatus through an LTE line.
  • LTE Long Term Evolution
  • Other communication units, such as 3G 5G, or the like may be used instead of LTE.
  • the functional unit 203 is a projection unit that performs projection processing.
  • Data processed by the functional unit 203 may be data stored in the storage unit 201 or data communicated with a different communication apparatus through a communication unit 206 described below.
  • An input unit 204 receives various operations from a user.
  • An output unit 205 performs various outputs, such as display on a screen, to the user.
  • the outputs are not limited to displaying on a screen, and may include a voice output by a speaker, a vibration output, and the like.
  • Both the input unit 204 and the output unit 205 may be realized by a single entity, such as a touch panel.
  • the communication unit 206 performs control of wireless communication conforming to the IEEE 802.11 series and control of IP communication. In addition, the communication unit 206 controls an antenna 207 to perform transmission and reception of a wireless signal for wireless communication.
  • An image capturing unit 208 includes an image capturing device, a lens, and the like, and captures still and moving images. In the present embodiment, the image capturing unit 208 captures an image of a QR code®. The image capturing unit 208 can also capture a bar code image, a two-dimensional code, or the like.
  • a plurality of hardware blocks may be realized as one hardware block or one hardware block may be realized as a plurality of hardware blocks.
  • FIG. 3 illustrates a configuration of functional blocks of software of the communication apparatus. All the functional blocks can be implemented as software or hardware. Specifically, the control unit 202 realizes each function by reading and executing a program stored in the storage unit 201 . A plurality of functional blocks may constitute one functional block or one functional block may be constituted as a plurality of functional blocks.
  • a part or all of the functional blocks may be implemented as hardware.
  • a dedicated circuit may be generated automatically on a Field Programmable Gate Array (FPGA) from a program for realizing each step by using a predetermined compiler.
  • the functional blocks may be realized as hardware by generating a gate array circuit similar to the FPGA.
  • the functional blocks may be implemented by an ASIC (Application Specific Integrated Circuit).
  • a share unit 301 performs communication parameter share processing for sharing communication parameters between communication apparatuses.
  • the communication parameter share processing is performed using WPS (Wi-Fi Protected Setup®) defined by the Wi-Fi® Alliance.
  • the parameter share processing may be performed by using other share and setting methods such as AOSS, without limitation to the WPS.
  • a providing apparatus provides a receiving apparatus with communication parameters for performing wireless communication.
  • a base station operates as the providing apparatus and a terminal operates as the receiving apparatus.
  • the communication parameters include SSID (Service Set Identifier) as a network identifier, an encryption method, an encryption key, an authentication method, and an authentication key.
  • SSID Service Set Identifier
  • a MAC address as an identifier of a communication apparatus and an IP address for performing communication in an IP layer may be included as the communication parameters.
  • information indicating whether to use DHCP or Auto IP as an allocation method of an IP address may be included in the communication parameters.
  • information indicating which apparatus is a DHCP server or a client may be added.
  • identification information and authentication information of Bluetooth® which is another wireless method different from the IEEE 802.11 series, may be included.
  • Information of functions of the communication apparatus may be included.
  • a reading unit 302 analyzes the QR code®, the image of which is captured by the image capturing unit 208 , and acquires information included in the code.
  • a generation unit 303 generates a QR code® and performs control for displaying the QR code® on the output unit 205 .
  • a bar code or a two-dimensional code may be analyzed or generated instead of the QR code®.
  • a service unit 304 provides service in an application layer by using wireless communication by the communication unit 206 .
  • the application layer is a layer of a fifth layer or higher in an OSI reference model.
  • the service unit 304 provides service such as print processing, image streaming processing, or file transfer processing.
  • a reception unit 305 and a transmission unit 306 control the communication unit 206 to perform reception and transmission of packets conforming to the IEEE 802.11 series standard from and to another external apparatus.
  • the reception unit 305 and the transmission unit 306 also perform communication control of packets in an IP layer.
  • An STA functional unit 307 causes the communication apparatus to operate as a terminal and performs authentication processing, encryption processing, and the like with respect to the base station.
  • An AP functional unit 308 generates a wireless network and manages a terminal in the wireless network. The AP functional unit 308 also performs authentication processing and encryption processing with respect to the terminal.
  • a management unit 309 registers and manages a communication apparatus that requests the communication apparatus to connect an external apparatus to the wireless network generated by the base station (hereinafter, referred to as a management apparatus).
  • All the aforementioned functional blocks do not need to be included.
  • the reading unit 302 or the STA functional unit 307 do not need to be included.
  • the smartphone 102 the smartphone 103 , the printer 105 , and the printer 106 , the generation unit 303 or the AP functional unit 308 do not need to be included.
  • FIG. 4 illustrates a flowchart realized by the AP 101 when the AP 101 provides the smartphone 102 with a communication parameter. This flowchart is realized when the control unit 202 reads and executes a program stored in the storage unit 201 of the AP 101 .
  • the AP 101 enables a user to select whether to provide the communication parameter by registering a partner apparatus as a management apparatus or provide the communication parameter without registering the partner apparatus as the management apparatus (S 401 ).
  • a password may be requested to the user for selecting the option of providing the communication parameter by registering the partner apparatus as the management apparatus.
  • This communication parameter is a communication parameter for connection to the wireless network 104 .
  • the AP 101 When the user selects to provide the communication parameter by registering the partner apparatus as the management apparatus, the AP 101 generates a first QR code® including first identification information indicating that the partner apparatus is to be registered as the management apparatus (S 402 ).
  • the first QR code® further includes an identifier for identifying the AP 101 .
  • An example of the identifier includes a MAC address of the AP 101 .
  • UUID Universally Unique Identifier
  • the AP 101 when the user selects to provide the communication parameter without registering the partner apparatus as the management apparatus, the AP 101 generates a second QR code® including second identification information indicating that the partner apparatus is not to be registered as the management apparatus (S 403 ).
  • the second QR code® further includes an identifier for identifying the AP 101 .
  • the AP 101 displays the generated QR code® on the output unit 205 (S 404 ).
  • the identification information is a public key (one kind of encryption key) of the AP 101 . That is, the AP 101 generates the QR codes® including information of different public keys between steps S 402 and S 403 . However, without limitation thereto, the AP 101 may generate the QR codes® including information of different certificates of the AP 101 or different fixed values (numerical values, character strings) between steps S 402 and S 403 .
  • each of the QR codes® may not be displayed on the output unit 205 and may be provided on the AP 101 itself or on the packaging the AP 101 is sold in.
  • each of the QR codes® may be printed in an instruction manual or the like of the AP 101 . In this case, steps of S 401 to S 404 are omitted.
  • Each of the QR codes® may be printed instead of being displayed on the output unit 205 at step S 404 . In this case, steps of S 402 to S 404 are omitted.
  • the aforementioned methods may be combined, for example, so that the first QR code® is provided by being printed in the instruction manual and the second QR code® is provided by displaying on the output unit 205 .
  • the first QR code® is provided by being printed in the instruction manual
  • the second QR code® is provided by displaying on the output unit 205 .
  • step of S 402 is omitted and the user is notified to refer to the instruction manual instead of the display for the first QR code® at step S 404 .
  • the smartphone 102 When the QR code® is displayed, the smartphone 102 captures an image of the QR code® displayed on the output unit 205 .
  • the smartphone 102 transmits a request signal of the communication parameter including the first or second identification information and device identification information of the smartphone 102 to the AP 101 .
  • the device identification information includes a MAC address and a public key of the smartphone 102 . Instead of the MAC address, UUID may be used.
  • the AP 101 receives the request signal of the communication parameter from the smartphone 102 (S 405 ).
  • This request signal includes information of the public key of the smartphone 102 in addition to the identification information acquired by the smartphone 102 .
  • the AP 101 judges whether the request signal includes the first identification information or the second identification information, or does not include any of the identification information (S 406 ). That is, the AP 101 determines the identification information included in the request of the communication parameter. When neither of the identification information is included as a result of the judgment, the AP 101 notifies an error through the output unit 205 and notifies the smartphone 102 of an error (S 407 ). Then, the processing illustrated in FIG. 4 ends.
  • the AP 101 registers the smartphone 102 as the management apparatus (S 408 ). Specifically, the AP 101 adds the MAC address and the public key of the smartphone 102 in association with each other to a management apparatus list of the storage unit 201 . The AP 101 then notifies the smartphone 102 that the smartphone 102 is registered as the management apparatus (S 409 ). Note that, the user may be notified through the output unit 205 with the notification to the smartphone 102 . In addition, the user may be allowed to appropriately delete the information added to the management apparatus list.
  • the AP 101 encrypts the communication parameter by using a secret key (first secret key) corresponding to the public key included in the first identification information (S 410 ).
  • first secret key a secret key corresponding to the public key included in the first identification information
  • the AP 101 has the secret key corresponding to the public key included in the first identification information because the public key is the public key of the AP 101 as described above.
  • the communication parameter may be encrypted with the public key of the smartphone 102 included in the request signal received at step S 405 .
  • the AP 101 provides the smartphone 102 with the communication parameter encrypted with the secret key (S 411 ).
  • the AP 101 is connected to the smartphone 102 once in response to a connection request from the smartphone 102 and provides the communication parameter by wireless communication through the connection.
  • the AP 101 may provide the communication parameter with use of an action frame using a MAC layer but not using a higher layer such as an IP layer.
  • the procedure moves to step S 413 .
  • the AP 101 when determining that the second identification information is included as a result of the judgment at step S 406 , the AP 101 does not register the smartphone 102 as the management apparatus. However, the AP 101 encrypts the communication parameter by using a secret key (second key) corresponding to the public key included the second identification information (S 412 ). In this case, since the public key included in the first identification information is different from the public key included in the second identification information, the first secret key and the second secret key are different encryption keys. Note that, the communication parameter may be encrypted with the pubic key of the smartphone 102 included in the request signal received at step S 405 .
  • the AP 101 provides the smartphone 102 with the communication parameter encrypted with the secret key (S 411 ).
  • the AP 101 provides the communication parameter by using a message conforming to the WPS. That is, the AP 101 provides the communication parameter thorough wireless communication conforming to the IEEE 802.11 series. However, without limitation thereto, the AP 101 may provide the communication parameter thorough other wireless communication by the Bluetooth or the like. After that, the procedure moves to step S 413 .
  • the AP 101 waits for the connection request based on the communication parameter from the smartphone 102 .
  • the smartphone 102 transmits a probe request signal which is a probe signal specifying SSID included in the communication parameter, and detects a probe response signal as a response thereto, to thereby search for the AP 101 .
  • the smartphone 102 transmits the connection request to the AP 101 .
  • the AP 101 Upon reception of the connection request, the AP 101 performs connection processing to the smartphone 102 and connects the smartphone 102 to the wireless network 104 (S 414 ). Then, the AP 101 starts wireless communication with the smartphone 102 in the wireless network 104 (S 415 ).
  • FIG. 5 illustrates a flowchart realized by the AP 101 when the smartphone 102 requests the AP 101 to connect the printer 105 as an external apparatus to the wireless network 104 .
  • This flowchart is realized when the control unit 202 reads and executes a program stored in the storage unit 201 of the AP 101 .
  • the AP 101 receives an addition request signal, requesting to connect the printer 105 to the wireless network 104 , from the smartphone 102 (S 501 ).
  • the AP 101 checks whether the smartphone 102 serving as a transmission source of the addition request signal is registered as a management apparatus (S 502 ).
  • a MAC address of the smartphone 102 is included in the addition request signal, and the AP 101 checks whether the MAC address matching the MAC address of the smartphone 102 is registered by referring to the management apparatus list stored in the storage unit 201 .
  • a public key or information of a certificate of the smartphone 102 serving as the transmission source of the addition request signal may be used.
  • the AP 101 transmits an addition permission response to the smartphone 102 (S 503 ). Then, the AP 101 provides the printer 105 with a communication parameter for connection to the wireless network 104 (S 504 ).
  • the AP 101 waits for a connection request based on the communication parameter from the printer 105 (S 505 ). Upon reception of the connection request, the AP 101 then performs connection processing to the printer 105 and connects the printer 105 serving as the external apparatus to the wireless network 104 (S 506 ). Thereafter, the AP 101 starts wireless communication with the printer 105 in the wireless network 104 (S 507 ).
  • the AP 101 transmits an addition rejection response (S 508 ) and ends the processing illustrated in FIG. 5 . That is, the AP 101 ends the processing illustrated in FIG. 5 without providing the printer 105 with the communication parameter, that is, in a state of non-providing.
  • the base station determines whether or not to register the terminal as a management apparatus.
  • the base station provides the external apparatus with the communication parameter according to whether the terminal is registered as the management apparatus.
  • FIG. 6 a sequence chart associated with the AP 101 , the smartphone 102 , and the printer 105 when a user selects to provide a communication parameter by registering a partner apparatus as a management apparatus is illustrated in FIG. 6 .
  • the AP 101 When the user selects to provide a communication parameter by registering a partner apparatus as a management apparatus in the AP 101 , the AP 101 generates and displays a first QR code® including first identification information indicating that the partner apparatus is to be registered as the management apparatus (S 601 ).
  • the smartphone 102 captures an image of the first QR code® (S 602 ). Then, the smartphone 102 transmits, to the AP 101 , a request signal of the communication parameter including the first identification information (including information of a public key) included in the first QR code® (S 603 ).
  • the smartphone 102 since the first QR code® includes an identifier of the AP 101 , the smartphone 102 is able to transmit the request signal to the AP 101 .
  • the AP 101 receives the request signal and judges that the request signal includes the first identification information (S 604 ). Then, the AP 101 encrypts the communication parameter by using a secret key corresponding to the public key included in the request signal and provides the smartphone 102 with the encrypted communication parameter (S 605 ). Further, the AP 101 registers the smartphone 102 as the management apparatus (S 606 ).
  • the AP 101 notifies the smartphone 102 that the smartphone 102 is registered as the management apparatus (S 607 ).
  • the smartphone 102 notifies the user that the smartphone 102 is registered as the management apparatus. Note that, the processing at step S 607 may be omitted. Even if step S 607 is omitted, the user is able to know whether or not the smartphone 102 is registered as the management apparatus when an addition instruction described below is given.
  • connection processing of the AP 101 and the smartphone 102 is performed and the smartphone 102 is connected to the wireless network 104 (S 608 ).
  • the user of the smartphone 102 gives an addition instruction of the printer 105 (S 611 ).
  • This instruction is given by operating the smartphone 102 by the user.
  • capturing an image of a QR code® or the like of the printer 105 by the smartphone 102 may trigger to recognize that the addition instruction is given.
  • the smartphone 102 When receiving the addition instruction, the smartphone 102 requests the AP 101 to connect the printer 105 as the external apparatus to the wireless network 104 . In this case, the smartphone 102 transmits an addition request signal to the AP 101 (S 612 ).
  • the AP 101 When receiving the addition request signal, the AP 101 checks whether the smartphone 102 is registered as the management apparatus (S 613 ). Since the smartphone 102 is registered as the management apparatus here, the AP 101 transmits an addition permission response to the smartphone 102 (S 614 ).
  • the AP 101 provides the printer 105 with the communication parameter (S 615 ).
  • the AP 101 acquires a public key from the printer 105 , encrypts the communication parameter with the public key, and provides the printer 105 with the encrypted communication parameter. This makes it possible to enhance security when providing the communication parameter.
  • the AP 101 passes a public key of the AP 101 to the printer 105 , encrypts the communication parameter with a secret key corresponding to the public key, and provides the printer 105 with the encrypted communication parameter.
  • the printer 105 is connected to the wireless network 104 by using the provided communication parameter (S 616 ). Note that, when the communication parameter encrypted with the public key of the printer 105 is provided, the printer 105 may acquire the communication parameter by decoding the communication parameter with use of a secret key corresponding to the public key.
  • FIG. 7 a sequence chart between the AP 101 and the smartphone 103 when a user selects to provide a communication parameter without registering a partner apparatus as a management apparatus is illustrated in FIG. 7 .
  • the AP 101 When the user selects to provide a communication parameter without registering a partner apparatus as a management apparatus in the AP 101 , the AP 101 generates and displays a second QR code® including second identification information indicating that the partner apparatus is not to be registered as the management apparatus (S 701 ).
  • the smartphone 103 captures an image of the second QR code® (S 702 ). Then, the smartphone 103 transmits, to the AP 101 , a request signal of the communication parameter including the second identification information (including information of a public key) included in the second QR code® (S 703 ).
  • the smartphone 103 since the second QR code® includes an identifier of the AP 101 , the smartphone 103 is able to transmit the request signal to the AP 101 .
  • the AP 101 receives the request signal and judges that the request signal includes the second identification information (S 704 ). Then, the AP 101 encrypts the communication parameter by using a secret key corresponding to the public key included in the request signal and provides the smartphone 103 with the encrypted communication parameter (S 705 ). Note that, the AP 101 does not register the smartphone 103 as the management apparatus (S 706 ). After that, connection processing of the AP 101 and the smartphone 103 is performed, and the smartphone 103 is connected to the wireless network 104 (S 707 ).
  • the smartphone 103 gives an addition instruction of the printer 106 (S 711 ).
  • the smartphone 103 requests the AP 101 to connect the printer 106 as the external apparatus to the wireless network 104 .
  • the smartphone 103 transmits an addition request signal to the AP 101 (S 712 ).
  • the AP 101 When receiving the addition request signal, the AP 101 checks whether the smartphone 103 is registered as the management apparatus (S 713 ). Since the smartphone 103 is not registered as the management apparatus here, the AP 101 transmits an addition rejection response to the smartphone 103 (S 714 ). When receiving the addition rejection response, the smartphone 103 notifies the user of an error. Then, the AP 101 ends the processing without providing the printer 106 with the communication parameter, that is, in a state of non-providing.
  • the smartphone 103 may be prevented from selecting the addition instruction itself of the external apparatus. This makes it possible to enhance user convenience.
  • the AP 101 may be disconnected from the smartphone 103 or may not communicate with the smartphone 103 for a predetermined time.
  • the smartphone 102 transmits the request signal of the communication parameter including first or second identification information to the AP 101 .
  • first or second identification information is not included in the request signal of the communication parameter and a signal different from the request signal is used to transmit the first or second identification information to the AP 101 .
  • the AP 101 when receiving the request signal of the communication parameter including the second identification information from the smartphone 103 , the AP 101 does not register the smartphone 103 as the management apparatus.
  • an attribute indicating that the smartphone 103 is not registered as the management apparatus may be stored in the storage unit 201 .
  • the AP 101 checks that the smartphone 103 is not registered as the management apparatus by referring to the attribute at step S 713 .
  • the setting of the network refers to setting of SSID which is a network identifier of the wireless network generated by the AP 101 , an encryption method, an encryption key, an authentication method, an authentication key, and the like.
  • the identification information of the smartphone providing the communication parameter at step S 411 of the aforementioned embodiment may be stored in association with a public key of the smartphone. Thereby, even when setting of the AP 101 is changed and the communication parameter is to be provided to the smartphone again, the communication parameter is able to be provided by encrypting the communication parameter with a public key of each smartphone, thus enhancing security.
  • the AP 101 encrypts the communication parameter by using the secret key corresponding to the pubic key included in the first or second identification information.
  • the communication parameter may be encrypted by using another key generated based on the public key or the secret key, such as hash of the public key or hash of the secret key.
  • the first or second identification information is included in the QR code® in the aforementioned embodiment.
  • the first or second identification information may be included in a one-dimensional bar code or other two-dimensional bar codes.
  • the identification information may be notified to the smartphone 102 by the AP 101 through wireless communication such as the NFC, the Bluetooth, the IEEE 802.11 ad, or the Transfer Jet.
  • the identification information in the aforementioned embodiment may be an identifier specific to a smartphone, for example, a MAC address.
  • a similar effect is able to be achieved by registering a MAC address which allows operation as a management apparatus in the AP 101 in advance.
  • aspects of the invention can also be realized by a computer of a system or apparatus to which a program for realizing one or more functions of the embodiment are supplied through a network or a storage medium and in which one or more processors thereof read and execute the program.
  • the invention can also be realized by a circuit realizing one or more functions (for example, ASIC).
  • a communication parameter for connection to a wireless network is provided to an external apparatus in response to a request from a specific apparatus, it is possible to enhance security while maintaining user convenience.
  • Embodiment(s) of the present invention can also be realized by a computer of a system or apparatus that reads out and executes computer executable instructions (e.g., one or more programs) recorded on a storage medium (which may also be referred to more fully as a ‘non-transitory computer-readable storage medium’) to perform the functions of one or more of the above-described embodiment(s) and/or that includes one or more circuits (e.g., application specific integrated circuit (ASIC)) for performing the functions of one or more of the above-described embodiment(s), and by a method performed by the computer of the system or apparatus by, for example, reading out and executing the computer executable instructions from the storage medium to perform the functions of one or more of the above-described embodiment(s) and/or controlling the one or more circuits to perform the functions of one or more of the above-described embodiment(s).
  • computer executable instructions e.g., one or more programs
  • a storage medium which may also be referred to more fully as a
  • the computer may comprise one or more processors (e.g., central processing unit (CPU), micro processing unit (MPU)) and may include a network of separate computers or separate processors to read out and execute the computer executable instructions.
  • the computer executable instructions may be provided to the computer, for example, from a network or the storage medium.
  • the storage medium may include, for example, one or more of a hard disk, a random-access memory (RAM), a read only memory (ROM), a storage of distributed computing systems, an optical disk (such as a compact disc (CD), digital versatile disc (DVD), or Blu-ray Disc (BD)TM), a flash memory device, a memory card, and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Mobile Radio Communication Systems (AREA)
US15/200,690 2015-07-06 2016-07-01 Communication apparatus, communication method, and program Abandoned US20170013461A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/414,277 US10952060B2 (en) 2015-07-06 2019-05-16 Communication apparatus, communication method, and program

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015-135681 2015-07-06
JP2015135681A JP6576129B2 (ja) 2015-07-06 2015-07-06 通信装置、通信方法およびプログラム

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/414,277 Continuation US10952060B2 (en) 2015-07-06 2019-05-16 Communication apparatus, communication method, and program

Publications (1)

Publication Number Publication Date
US20170013461A1 true US20170013461A1 (en) 2017-01-12

Family

ID=57731711

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/200,690 Abandoned US20170013461A1 (en) 2015-07-06 2016-07-01 Communication apparatus, communication method, and program
US16/414,277 Active 2036-07-13 US10952060B2 (en) 2015-07-06 2019-05-16 Communication apparatus, communication method, and program

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/414,277 Active 2036-07-13 US10952060B2 (en) 2015-07-06 2019-05-16 Communication apparatus, communication method, and program

Country Status (2)

Country Link
US (2) US20170013461A1 (enrdf_load_stackoverflow)
JP (1) JP6576129B2 (enrdf_load_stackoverflow)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20240121153A1 (en) * 2022-10-06 2024-04-11 Canon Kabushiki Kaisha Communication apparatus, control method, and storage medium
US12341761B2 (en) 2022-10-27 2025-06-24 Zohaib Khan Khattak Proximity-based communication systems and methods

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7024559B2 (ja) 2018-03-30 2022-02-24 ブラザー工業株式会社 端末装置のためのコンピュータプログラム、端末装置、通信装置、及び、通信装置のためのコンピュータプログラム
JP7155581B2 (ja) * 2018-03-30 2022-10-19 ブラザー工業株式会社 通信装置と通信装置のためのコンピュータプログラム
US11115811B2 (en) * 2019-04-04 2021-09-07 Qualcomm Incorporated Address management for Bluetooth devices

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080240068A1 (en) * 2007-03-30 2008-10-02 Brother Kogyo Kabushiki Kaisha Wireless Network System, And Wireless Device Included In The System
US20110090896A1 (en) * 2009-10-15 2011-04-21 Bob Bradley Methods for synchronizing data in a network
US8032397B2 (en) * 2006-01-19 2011-10-04 Oliver Charles Lawless Integrated prescription management and compliance system
US20110258443A1 (en) * 2010-04-19 2011-10-20 Vodafone Holding Gmbh User authentication in a tag-based service
WO2012131488A1 (en) * 2011-03-31 2012-10-04 France Telecom A method and device to provide automated connection to a wireless network
US20120303527A1 (en) * 2011-05-26 2012-11-29 Wincor Nixdorf International Gmbh Process and host and computer system for card-free authentication
US20130019284A1 (en) * 2011-06-10 2013-01-17 Pacyga James W Automated web based applications with a wireless communication device
US20130057908A1 (en) * 2011-09-02 2013-03-07 Samsung Electronics Co., Ltd. Image forming apparatus supporting peer-to-peer connection and method of managing address book thereof
US8478991B2 (en) * 2006-12-20 2013-07-02 Canon Kabushiki Kaisha Management apparatus for managing wireless parameter, control method for the management apparatus, and computer program for instructing computer to execute the control method
US20140059351A1 (en) * 2012-08-21 2014-02-27 General Instrument Corporation Method and device for connecting to a wireless network using a visual code
US20140075523A1 (en) * 2012-09-10 2014-03-13 Nokia Corporation Method, apparatus, and computer program product for sharing wireless network credentials
US20140162600A1 (en) * 2012-12-10 2014-06-12 Actiontec Electronics, Inc. Systems and methods for facilitating communication between mobile devices and wireless access points
US20140195654A1 (en) * 2013-01-04 2014-07-10 Nokia Corporation Method, apparatus, and computer program product for configuring a mobile wireless hotspot
US8887262B1 (en) * 2013-03-15 2014-11-11 Amplify Education, Inc. Configuring a computing device
US20150072653A1 (en) * 2013-09-11 2015-03-12 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for network access
US9071967B1 (en) * 2013-05-31 2015-06-30 Amazon Technologies, Inc. Wireless credential sharing
WO2015114215A1 (en) * 2014-01-31 2015-08-06 Idcontrol Oy Authentication system and method for authenticating a user
US20150229475A1 (en) * 2014-02-10 2015-08-13 Qualcomm Incorporated Assisted device provisioning in a network
US20150254632A1 (en) * 2014-03-10 2015-09-10 Sk Planet Co., Ltd. Mobile payment service system and device therefor
US20150312240A1 (en) * 2014-04-29 2015-10-29 Altek Corporation Wireless automatic pairing method, method of establishing connection, and wireless access point device
US20150339334A1 (en) * 2012-06-23 2015-11-26 Audi Ag Method for entering identification data of a vehicle into a user database of an internet server device

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3593974B2 (ja) * 2000-11-28 2004-11-24 日本電信電話株式会社 通信方法および通信端末
JP4812089B2 (ja) * 2006-02-24 2011-11-09 キヤノン株式会社 印刷装置及びその接続方法
US20090245133A1 (en) * 2008-03-31 2009-10-01 Intel Corporation Broadcast/multicast based network discovery
JP5389801B2 (ja) * 2008-06-30 2014-01-15 パナソニック株式会社 無線通信システム、通信端末、管理端末、通信方法、及び集積回路
ES2781754T3 (es) * 2008-11-07 2020-09-07 Adaptive Biotechnologies Corp Métodos para supervisar las condiciones por análisis de secuencia
JP5771604B2 (ja) * 2010-04-19 2015-09-02 レノボ・イノベーションズ・リミテッド(香港) 通信システム、通信端末、通信機器、通信制御方法、及び通信制御用プログラム
US20130170387A1 (en) * 2010-09-14 2013-07-04 Nokia Corporation Interference Measurement and Reporting for Device-to-Device Communications in a Communication System
JP5969778B2 (ja) * 2012-03-07 2016-08-17 住友精密工業株式会社 ネットワークシステム、ノード装置及び対応接続関係の特定方法
US9357385B2 (en) * 2012-08-20 2016-05-31 Qualcomm Incorporated Configuration of a new enrollee device for use in a communication network
JP5440727B2 (ja) * 2013-03-27 2014-03-12 株式会社ナカヨ通信機 無線端末および無線アクセスポイント
KR102022666B1 (ko) * 2013-05-16 2019-09-18 삼성전자주식회사 통신 방법 및 이를 위한 디바이스
EP3281300A4 (en) * 2015-04-10 2018-11-07 Engagement Coach Pty Ltd. Dynamic beacon streaming network and associated systems and methods
US9832639B2 (en) * 2015-07-06 2017-11-28 Aruba Networks, Inc. Infrastructure coordinated media access control address assignment
JP6766677B2 (ja) * 2017-02-17 2020-10-14 ブラザー工業株式会社 端末装置のためのコンピュータプログラム
CN107483715B (zh) * 2017-07-04 2021-03-02 上海小蚁科技有限公司 终端与设备通信的方法和系统、终端、存储介质
US10813148B2 (en) * 2017-09-16 2020-10-20 Arris Enterprises Llc Selective probe-response suppression
US10911956B2 (en) * 2017-11-10 2021-02-02 Comcast Cable Communications, Llc Methods and systems to detect rogue hotspots

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8032397B2 (en) * 2006-01-19 2011-10-04 Oliver Charles Lawless Integrated prescription management and compliance system
US8478991B2 (en) * 2006-12-20 2013-07-02 Canon Kabushiki Kaisha Management apparatus for managing wireless parameter, control method for the management apparatus, and computer program for instructing computer to execute the control method
US20080240068A1 (en) * 2007-03-30 2008-10-02 Brother Kogyo Kabushiki Kaisha Wireless Network System, And Wireless Device Included In The System
US20110090896A1 (en) * 2009-10-15 2011-04-21 Bob Bradley Methods for synchronizing data in a network
US20110258443A1 (en) * 2010-04-19 2011-10-20 Vodafone Holding Gmbh User authentication in a tag-based service
WO2012131488A1 (en) * 2011-03-31 2012-10-04 France Telecom A method and device to provide automated connection to a wireless network
US20120303527A1 (en) * 2011-05-26 2012-11-29 Wincor Nixdorf International Gmbh Process and host and computer system for card-free authentication
US20130019284A1 (en) * 2011-06-10 2013-01-17 Pacyga James W Automated web based applications with a wireless communication device
US20130057908A1 (en) * 2011-09-02 2013-03-07 Samsung Electronics Co., Ltd. Image forming apparatus supporting peer-to-peer connection and method of managing address book thereof
US20150339334A1 (en) * 2012-06-23 2015-11-26 Audi Ag Method for entering identification data of a vehicle into a user database of an internet server device
US20140059351A1 (en) * 2012-08-21 2014-02-27 General Instrument Corporation Method and device for connecting to a wireless network using a visual code
US20140075523A1 (en) * 2012-09-10 2014-03-13 Nokia Corporation Method, apparatus, and computer program product for sharing wireless network credentials
US20140162600A1 (en) * 2012-12-10 2014-06-12 Actiontec Electronics, Inc. Systems and methods for facilitating communication between mobile devices and wireless access points
US20140195654A1 (en) * 2013-01-04 2014-07-10 Nokia Corporation Method, apparatus, and computer program product for configuring a mobile wireless hotspot
US8887262B1 (en) * 2013-03-15 2014-11-11 Amplify Education, Inc. Configuring a computing device
US9071967B1 (en) * 2013-05-31 2015-06-30 Amazon Technologies, Inc. Wireless credential sharing
US20150072653A1 (en) * 2013-09-11 2015-03-12 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for network access
WO2015114215A1 (en) * 2014-01-31 2015-08-06 Idcontrol Oy Authentication system and method for authenticating a user
US20150229475A1 (en) * 2014-02-10 2015-08-13 Qualcomm Incorporated Assisted device provisioning in a network
US20150254632A1 (en) * 2014-03-10 2015-09-10 Sk Planet Co., Ltd. Mobile payment service system and device therefor
US20150312240A1 (en) * 2014-04-29 2015-10-29 Altek Corporation Wireless automatic pairing method, method of establishing connection, and wireless access point device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20240121153A1 (en) * 2022-10-06 2024-04-11 Canon Kabushiki Kaisha Communication apparatus, control method, and storage medium
US12341761B2 (en) 2022-10-27 2025-06-24 Zohaib Khan Khattak Proximity-based communication systems and methods

Also Published As

Publication number Publication date
JP6576129B2 (ja) 2019-09-18
US20190274048A1 (en) 2019-09-05
US10952060B2 (en) 2021-03-16
JP2017017661A (ja) 2017-01-19

Similar Documents

Publication Publication Date Title
US12389222B2 (en) Communication apparatus, method of sharing, and program
US10547468B2 (en) Communication apparatus, communication method, and storage medium
US10952060B2 (en) Communication apparatus, communication method, and program
US12108249B2 (en) Communication device, control method for communication device, and non-transitory computer-readable storage medium
US10278118B2 (en) Communication device, communication method, and storage medium
US11729617B2 (en) Communication apparatus, communication method, and storage medium
US12408031B2 (en) Communication apparatus, communication method, and storage medium
US20230030588A1 (en) Communication apparatus, control method, and computer-readable storage medium
US10849169B2 (en) Communication apparatus for connecting to a wireless network using a simple operation
US12160732B2 (en) Communication apparatus, communication method, and non-transitory computer-readable storage medium
US10966261B2 (en) Communication apparatus, communication method, and program
US12069477B2 (en) Communication apparatus, communication method, and computer-readable storage medium
US20180213585A1 (en) Communication apparatus, communication method, and program
WO2018030296A1 (ja) 通信装置、通信方法、及びプログラム
US10117099B2 (en) Communication apparatus, method for controlling the same, and program
US11018868B2 (en) Communication apparatus, method and program for controlling the apparatus, and storage medium storing the program
JP6486228B2 (ja) 通信装置、制御方法、および、プログラム
US20250071530A1 (en) Communication device, control method therefor, and control method of communication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: CANON KABUSHIKI KAISHA, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAMAKI, TOMOKAZU;REEL/FRAME:039937/0622

Effective date: 20160621

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION