WO2005111826A1 - 通信システム - Google Patents
通信システム Download PDFInfo
- Publication number
- WO2005111826A1 WO2005111826A1 PCT/JP2005/008772 JP2005008772W WO2005111826A1 WO 2005111826 A1 WO2005111826 A1 WO 2005111826A1 JP 2005008772 W JP2005008772 W JP 2005008772W WO 2005111826 A1 WO2005111826 A1 WO 2005111826A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- authentication
- network
- information
- secondary terminal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Definitions
- the present invention relates to a communication system, and more particularly, to a communication system in which a communication line for the Internet or the like is mutually used by communication users to increase the use efficiency of the communication line.
- Patent Document 1 Japanese Patent Application Laid-Open No. 2004-23312
- An object of the present invention is to limit the use of communication by a second user, and The purpose is to provide a communication system that can use the Internet and other communications universally without requiring capital investment.
- a first network capable of communicating with an authentication server and a network use terminal installed in each home or the like are connected by a line, and a secondary terminal is connected. Communication with the network using terminal becomes possible using the second network, and when the secondary terminal attempts to use the first network via the network using terminal, the authentication server communicates with the network using terminal. Authenticate both with the secondary terminal.
- the authentication of the service providing server is performed in addition to the authentication of the network use terminal and the secondary terminal. You may also do.
- the secondary terminal connects to the server managed by the malicious administrator, and the administrator is informed of the existence of the network-using terminal, resulting in a denial of service (DoS) attack.
- DoS denial of service
- the secondary terminal can further communicate with the tertiary terminal, and when the tertiary terminal intends to use the first network, the network use terminal, the secondary terminal, and the tertiary terminal are connected to the authentication server. The authentication may be performed by using.
- the tertiary terminal can communicate with the quaternary terminal, and the network use terminal, the secondary terminal, the tertiary terminal, and the quaternary terminal can be authenticated. [0011] This makes it possible to further expand the area where the terminal can use the first network.
- FIG. 1 Schematic diagram of the present invention
- FIG. 2 is a sequence diagram showing an outline of the present invention.
- FIG. 3 A diagram illustrating an example of management processing such as billing.
- FIG. 5 is an overall configuration diagram of a communication system according to Embodiment 1 of the present invention.
- FIG. 12 is a sequence diagram of overall processing of the communication system.
- FIG. 13 A diagram exemplifying a process for obtaining agreement on use conditions.
- FIG. 14 is an overall configuration diagram of a communication system according to Embodiment 2 of the present invention.
- FIG. 16 is an overall configuration diagram of a communication system according to Embodiment 3 of the present invention.
- FIG. 20 is a configuration diagram of a form obtained by developing Embodiment 3 of the present invention.
- FIG. 1 illustrates an overview of the present invention.
- a network user terminal 101 is installed at the home of user A, and is connected to the Internet 103 via a line 102.
- the network use terminal 101 is preferably, for example, a router, particularly a router having a wireless LAN function. Also, the network use terminal 101 does not need to be directly connected to the line 102, but is connected to the line 102 via a media converter, a splitter, or another network device (for example, a router / hub). It may be a wireless access point.
- the line 102 is physically a telephone line metal line or an optical line using an optical fiber. In the case of a telephone line, for example, it is preferable that broadband communication such as ADSL is always possible.
- the network using terminal 101 has a wireless LAN function. For example, assuming that the communication conforms to the IEEE802.11 standard, communication over several tens of meters is possible. Therefore, the terminal 104 having a wireless function of the user B near the house of the user A and the network using terminal 101 May be able to communicate. Normally, a password (for example, called a “WEP key”) is set in the network using terminal 101, and only a specific terminal can communicate with the network using terminal 101. If 104 exists in an area where communication with the network using terminal 101 is possible, a link is established between the terminal 104 and the network using terminal 101 so that communication is possible. However, in this state, at least the network using terminal 101 performs control so that the terminal 104 cannot use the Internet 103 via the line 102.
- a password for example, called a “WEP key”
- the terminal 104 needs to use the Internet 103, first, (1) the terminal 104 transmits the authentication information of the user B (or the terminal 104) to the network using terminal 101. Next, (2) the network using terminal 101 sends the authentication information of the user A (or the network using terminal) and the authentication information of the user B (or the terminal 104) to the authentication server 105 via the line 102 and the Internet 103. Send both. Then, (3) the authentication server 105 authenticates the user A and the user B, and returns a result of the authentication to the network using terminal 101. If the authentication is OK, (4) the Internet terminal 101 permits the terminal 104 to use the Internet 103 via the line 102. In the following, as described in parentheses, the authentication information of user B will be replaced with the authentication information of terminal 104. The authentication information of the user A is used in the sense of the authentication information of the network user terminal 101.
- FIG. 2 is a sequence diagram showing the above-described event.
- step S201 a connection is established between user A's network user terminal 101 and user A's ISP, and at least the network user terminal 101 can use the Internet 103 via the line 102. .
- step S202 when the terminal 104 of the user B enters an area where communication with the network using terminal 101 is possible, a wireless link is established between the terminal 104 and the network using terminal 101. However, it is assumed that the terminal 104 cannot use the Internet 103 via the network using terminal 101 only by establishing the wireless link. If the terminal 104 needs to use the Internet 103, the authentication information of the user B is transmitted from the terminal 104 to the network using terminal 101 in step S203. When the network using terminal 101 receives the authentication information of the user B, in step S204, the authentication information of the user A and the received authentication information of the user B are transmitted from the network using terminal 101 to the authentication server 105. . When the user A and the user B are authenticated in the authentication server 105, management such as charging is performed in step S205.
- FIG. 3 illustrates management such as billing.
- the authentication server 105 there are columns of “user identifier”, “use point”, and “provide point”, and information for identifying the user, a point indicating that the line bandwidth is used, Stores a point indicating that others have used the line bandwidth.
- Fig. 1 and Fig. 2 since user B uses the band of user A's line, for example, user A is added 5 points as a provision point, and user B , 6 points will be added as usage points. The difference between 6 points and 5 points indicates, for example, the profit of the management company such as an authentication server.
- step S206 as a result of the authentication of user A and user B, the fact that the authentication is OK is reported to the network using terminal.
- step S207 network using terminal 101 The communication by 104 is relayed to the Internet 103 via the line 102.
- communication between the terminal 104 and the ISP of the user B becomes possible.
- a VPN Virtual Private Network
- terminal 104 and the ISP server of user B Communication with other users is possible (for example, a communication path is established by VPN with User B's ISP mail server or proxy server).
- step S208 the communication of the user B to the ISP is disconnected in step S209.
- step S210 the usage status of the line 102 of the terminal 104, for example, the time of using the line 102, the number of communication packets via the line 102, the width of the used bandwidth, and the like are transmitted to the authentication server. Billing management is performed in step S211.
- FIG. 4 exemplifies a sequence diagram for explaining the authentication steps between the user B and the user A in more detail.
- public key cryptography is used.
- User B and user A have a private key and a public key, and their public keys (or public key certificates) are, for example, Is registered in the directory server.
- the directory server may be the same as the authentication server 105 or may be different.
- step S401 the terminal 104 of the user B transmits a request for communication via the line 102 to the network using terminal 101 in the house of the user A. Then, in step S402, the network using terminal 101 transmits information requesting the start of authentication to the authentication server. In step S403, the authentication server generates a random number or the like and transmits it to the network using terminal 101 as a challenge. I do. In step S404, the network using terminal 101 transmits a challenge to the terminal 104. The terminal 104 signs the challenge with the secret key of the user B (this will be referred to as sB), and transmits it to the network IJ terminal 101 in step S405.
- sB secret key of the user B
- the network use terminal 101 that has received sB signs the challenge with the secret key of user A (this is referred to as sA), and transmits sA and sB to the authentication server 105 in step S406.
- the authentication server 105 requests the public keys of the users A and B to the directory server in step S407, and receives the replies of the users A and B in step S408.
- step S409 sA and sB are verified, that is, sA and sB are decrypted with the public key, and it is verified whether the challenge transmitted in step S403 is obtained.
- step S410 the result of the verification is transmitted to the network using terminal 101.
- network user terminal 101 is Although described as being connected to one net, it may be a general communication network other than the Internet.
- the network use terminal 101 and the terminal 104 communicate with each other using a wireless LAN. It may be.
- the network using terminal may authenticate the authentication server using a public key certificate or the like of the authentication server.
- FIG. 5 illustrates the overall configuration of the communication system according to Embodiment 1 of the present invention.
- the communication system according to the present embodiment includes a line 501, a network use terminal 502, a secondary terminal 503, and an authentication server 504.
- the network using terminal 502 uses the first network.
- the secondary terminal 503 can communicate with the network using terminal 502 using the second network.
- An example of the first network is a wide area communication network represented by the Internet or the like, but is not limited thereto.
- a communication network constructed by a wireless LAN is not limited to a certain power. Note that the first network and the second network may be the same.
- the authentication server 504 is illustrated as connected to the first network, the authentication server 504 need not have such a configuration. For example, the authentication server 504 can directly communicate with the network use terminal 502. It may be.
- FIG. 5 shows only one secondary terminal, a plurality of secondary terminals may exist.
- the line 501 connects the network using terminal 502 to the first network.
- An example of a line is an optical line using an optical fiber.
- FIG. 6 illustrates a functional block diagram of the secondary terminal.
- the secondary terminal 503 has a secondary terminal authentication information transmitting unit 601.
- Secondary terminal authentication information transmitting unit 601 transmits secondary terminal authentication information to network using terminal 502 using the second network.
- the “secondary terminal authentication information” is information including information for authenticating itself.
- Shelf means a secondary terminal. Therefore, the secondary terminal authentication information includes, for example, an identifier for identifying the secondary terminal and a password. Alternatively, it may be a result of signing an identifier for recognizing the secondary terminal and predetermined data with the secret key of the secondary terminal.
- secondary terminal authentication information transmitting section 601 of the secondary terminal is configured by any of hardware, software, and both hardware and software (program). Is possible. For example, in the case of using a computer, hardware that also configures the CPU, memory, bus, interface, peripheral devices, etc., and software that can be executed on these hardware, as an example of realizing these, I can do it. Therefore, although not shown, the secondary terminal is provided with a network interface and the like for communicating with the second network. If the secondary terminal is a terminal operated by the holder, a user interface is provided.
- FIG. 7 illustrates a flowchart of the processing of the secondary terminal.
- the secondary terminal performs the processing of this flowchart when performing communication using the first network, for example.
- step S 701 it is determined whether the secondary terminal authentication information has been transmitted. This determination can be made, for example, by providing a flag inside the secondary terminal and checking the value of the flag. If it has already been sent, it does nothing and performs communication using the first network. If it has not been transmitted, the process proceeds to step S702, and the secondary terminal authentication information is transmitted. If the above-mentioned flag is provided, the value of the flag indicates “transmitted”.
- FIG. 8 illustrates a functional block diagram of the network using terminal.
- the network using terminal 502 includes a secondary terminal authentication information receiving unit 801, a composite authentication information transmitting unit 802, and authentication result information. It has an information receiving unit 803 and a relay unit 804.
- “Secondary terminal authentication information receiving section” 801 receives the secondary terminal authentication information transmitted from secondary terminal 503. That is, secondary terminal authentication information is received via the second network.
- the “multiple authentication information transmitting unit” 802 transmits the composite authentication information by the secondary terminal authentication information receiving unit 801.
- “Composite authentication information” is information including the secondary terminal authentication information received by the secondary terminal authentication information receiving unit 801 and the use terminal authentication information.
- “Use terminal authentication information” is information for authenticating itself, and “self” means the network use terminal 502. Examples of the terminal authentication information include an identifier for identifying the network terminal 502 and a password. Alternatively, it may include an identifier for identifying the network using terminal 502 and a result of signing predetermined data with the private key of the owner of the network using terminal 502.
- the composite authentication information is information transmitted to the authentication server 504. Therefore, the composite authentication information is transmitted to the network to which the authentication server 504 is connected.
- “Authentication result information receiving unit” 803 receives the authentication result information.
- “Authentication result information” is information returned in response to the transmission of the composite authentication information, and is information indicating a result of authentication based on the composite authentication information. That is, the information includes the result of the authentication based on the secondary terminal authentication information and the result of the authentication based on the used terminal authentication information. As will be explained later, the authentication result information is transmitted to the authentication server 504. Therefore, the authentication result information is received from the network to which the authentication server 504 is connected.
- the “relay unit” 804 relays the communication of the secondary terminal 503 to the first network based on the authentication result information received by the authentication result information receiving unit 803, so that the first network Is permitted to the secondary terminal 503.
- “Based on the authentication result information” means that there is some causal relationship between the contents indicated by the authentication result information and the permission. For example, if the authentication result information indicates that the secondary terminal 503 has been authenticated by the secondary terminal authentication information and that the network use terminal 502 has been authenticated by the use terminal authentication information, permission is given. "Permit" means that if a packet transmitted from the secondary terminal 503 is destined for the first network, the packet is transmitted to the first network via the line 501. If the packet received by the first network is destined for the secondary terminal 503, when the packet is transmitted to the secondary terminal 503 via the second network, the packet is relayed.
- Each unit of the network using terminal according to the present embodiment can be configured by any of hardware, software, and both hardware and software (program).
- program for example, when using a computer as an example of realizing these, hardware composed of CPU, memory, bus, interface, peripheral devices, etc., and software executable on these hardware Can be. Therefore, although not shown, the network using terminal 502 is provided with a network interface for communicating with the first network and the second network.
- FIG. 9 illustrates a flowchart of a process performed by the network using terminal.
- the terminal using the network performs the processing of this flowchart each time secondary terminal authentication information is received from the secondary terminal, for example.
- the secondary terminal authentication information is received by the secondary terminal authentication information receiving unit 801.
- use terminal authentication information is obtained. If the terminal authentication information is an identifier and a password, the password stored in the memory or the like is read. When performing a signature or the like, the secret key is read and a signature is generated. In this sense, in the present specification, the concept of acquisition includes the concept of generation.
- Step S902 is performed, for example, by the composite authentication information transmitting unit 802.
- step S903 the composite authentication information is transmitted by the composite authentication information transmitting unit 802.
- step S904 the authentication result information is received by the authentication result information receiving unit 803.
- step S905 it is determined whether the authentication is OK, that is, whether the secondary terminal 503 and the network using terminal 502 have been authenticated. This determination is made, for example, by the relay unit 804. If the authentication is OK, the relay unit 804 relays the communication of the secondary terminal to the first network. That is, the exchange of the bucket between the first network and the secondary terminal is enabled.
- FIG. 10 illustrates a functional block diagram of the authentication server.
- the authentication server 504 uses compound authentication It has an information receiving unit 1001, an authentication unit 1002, and an authentication result return unit 1003.
- Compound authentication information receiving unit 1001 receives compound authentication information transmitted from network using terminal 502.
- the “authentication unit” 1002 authenticates the secondary terminal 503 and the network using terminal 502 based on the composite authentication information received by the composite authentication information receiving unit 1001. For example, a table holding terminal identifiers and passwords is provided in the authentication server, and the identifiers and passwords of the secondary terminals and the identifiers and passwords of the network users included in the composite authentication information receiving unit are stored in the table. Judge whether it matches the retained identifier and password. Alternatively, if the composite authentication information includes a signature for predetermined data, it is determined whether the signature is correct.
- the authentication by the authentication unit may separately authenticate the secondary terminal and the network using terminal.
- the authentication may be performed on condition that the secondary terminal and the network using terminal are in a specific combination.
- Authentication result reply unit 1003 returns the result of authentication by authentication unit 1002 as authentication result information.
- Each unit of the authentication server according to the present embodiment can be configured by any of hardware, software, and both hardware and software (program).
- hardware consisting of CPU, memory, bus, interface, peripheral devices, etc., and software executable on these hardware be able to. Therefore, although not shown, the authentication server is provided with a network interface for communicating with a network use terminal and, if necessary, a directory server for obtaining a public key and the like.
- FIG. 11 exemplifies a flowchart for explaining the processing of the authentication server.
- the authentication server executes the processing of the flowchart in FIG.
- the composite authentication information is received by the composite authentication information receiving unit.
- the authentication unit authenticates the secondary terminal and the network using terminal.
- Step S 1003 In this case, the authentication result returning unit returns the authentication result information.
- FIG. 12 shows an example of a sequence diagram of the entire processing of the communication system according to the present embodiment.
- step S1201 secondary terminal authentication information is transmitted from the secondary terminal to the network using terminal.
- the network using terminal transmits the combined authentication information to the authentication server, that is, information including the secondary terminal authentication information and the using terminal authentication information.
- step S1203 the authentication result information is transmitted from the authentication server to the network using terminal. Then, based on the authentication result information, the secondary terminal is permitted to use the first network.
- the authentication server may perform management such as charging.
- the accounting management may be performed by a server other than the authentication server.
- the network using terminal transmits information indicating the amount of use of the first network by the secondary terminal to the authentication server or the like. , Billing, etc. are being managed.
- the network use terminal makes a false application to the authentication server or the like regarding the amount of use of the first network.
- a network-using terminal periodically sends a secondary terminal a communication volume indicating the amount of use of the first network (for example, usage time, used bandwidth, packet amount, etc.). It may have a traffic report section for reporting information. By doing so, there is a solution that allows to compare the traffic information recorded on the authentication server etc. from the secondary terminal with the traffic information reported by the communication fee reporting section of the network using terminal at a later date. .
- the secondary terminal obtains the measurement information from the secondary terminal to an authentication server or the like, or obtains the information by transmitting it from the network-using terminal.
- the transmitted communication amount information may be transmitted.
- the authentication server, etc. compares the traffic information transmitted from the secondary terminal with the traffic information transmitted by the If the difference in the communication amount information is unacceptable, information to be audited for the network use terminal or the secondary terminal may be displayed to the administrator.
- the usage conditions of the network 501 or the like may be presented to the secondary terminal that uses the network, and the usage conditions may be negotiated with the secondary terminal.
- the use condition is, for example, a band of the line 501 used by the secondary terminal, a length of time of use of the line 501, and the like.
- FIG. 13 illustrates a process of negotiating a use condition.
- the authentication server authenticates the network-using terminal and the secondary terminal.
- the usage conditions are presented to the network-using terminal power secondary terminal.
- the usage conditions are examined by the secondary terminal. For example, it determines whether the usage conditions are suitable for the purpose of using the secondary terminal. If the result of the examination is SOK, the result is sent to the network user terminal, and (4) an application such as charging is made to the network user terminal authentication server or charging server. Assuming that the authentication server also performs accounting processing, (5) execution of accounting and the like is performed.
- the secondary terminal can use the first network. (6)
- the secondary terminal establishes a secure communication path between the VPN and a specific host for communication.
- the use condition is presented after the authentication by the authentication server. However, the use condition is presented at the time of transmitting the secondary terminal authentication information! /.
- the line 501 used by the secondary terminal is required.
- a negotiation is performed between the network terminal and the secondary terminal as to whether the bandwidth of the secondary terminal can be limited, and if the negotiation is successful, the network using terminal limits the bandwidth of the line 501 used by the secondary terminal.
- negotiation may be performed when there are multiple secondary terminals, the number of secondary terminals increases, and it becomes impossible for network users to guarantee the bandwidth to be provided to each secondary terminal. You may be able to do so.
- an application for changing a billing rate or the like may be made from the network using terminal according to the result of the negotiation.
- the secondary terminal may also negotiate with the network using terminal.
- the ratio of the available bandwidth of the network using terminal with respect to the bandwidth or the ratio within the remaining amount after subtracting the amount used by the owner of the network using terminal may be the target of the negotiation. By doing so, it is possible to reduce the number of times that negotiation needs to be performed again when the communication situation changes, and it is possible to reduce the overhead generated by performing negotiation.
- charging and quality conditions may be negotiated for each communication content (for example, in the case of TCP / IP communication, a service determined based on a port number used for communication). obtain. For example, a large bandwidth may be allocated to moving image data with priority, and a high charging rate may be imposed accordingly.
- a secondary terminal may be able to communicate with a plurality of network-using terminals at the same time, but the secondary terminal is a network-using terminal that presents the most advantageous use conditions. You may select a network user terminal to use.
- the use of the surplus bandwidth of line 501 can be promoted, and the authentication based on the composite authentication information is performed, so that the charge management for the person who provided and used the band of line 501 can be managed. Can be performed smoothly.
- the composite authentication information it is not necessary for the ISP used by the network terminal to be the same as or affiliated with the ISP contracted by the secondary terminal holder. It suffices if it is registered in an authentication server that can be installed independently.
- FIG. 14 illustrates an overall configuration of a communication system according to Embodiment 2 of the present invention.
- the communication system according to the present embodiment includes a line 501, a network using terminal 502, a secondary terminal 503, an authentication server 504, and a service providing server 1401. Therefore,
- the communication system according to the present embodiment has a configuration in which a service providing server 1401 is added to the communication system according to the first embodiment.
- the service providing server 1401 is a server that provides a service via the first network.
- the secondary terminal authentication information transmitted by secondary terminal authentication information transmitting section 601 of secondary terminal 503 includes service providing server identification information.
- the “service providing server” is information for identifying the service providing server that performs communication using the first network. For example, the IP address or FQDN (Full Qualified Domain Name) of the service providing server.
- FIG. 15 illustrates that the secondary terminal authentication information transmitted by the secondary terminal includes service providing server identification information.
- the relay unit of the network using terminal transmits the communication of the secondary terminal to the service providing server via the first network based on the authentication result received by the authentication result information receiving unit.
- the use of the first network is permitted for the secondary terminal. For example, if the packet of the secondary terminal is destined for the service providing server, the packet is transmitted to the line 501; otherwise, the packet is discarded.
- a packet received from the first network is destined for a secondary terminal, such a packet is discarded unless the source is a service providing server.
- the authentication unit of the authentication server authenticates the service providing server based on the composite authentication information received by the composite authentication information receiving unit.
- the purpose of this service providing server authentication is to authenticate communication between the service providing server and the secondary terminal. That is, assuming that communication between the service providing server and the secondary terminal becomes possible, in the present embodiment, the service providing server must be authenticated.
- the secondary terminal authentication information included in the composite authentication information is acquired, and based on the service providing server identification information included in the secondary terminal authentication information. Then, there is a method of authenticating the service providing server.
- the authentication server sends a challenge as a random number to the service providing server based on the service providing server identification information, and the service providing server encrypts the received challenge with its own private key and returns the challenge. (Response).
- the authentication server obtains the public key of the service providing server, decrypts the reply, and determines whether the original challenge can be obtained. Note that after or before such challenge response authentication, whether the service providing server identification information exists in a list of harmful server identifiers, or a list of good server identifiers, etc. You may confirm that it exists in
- the secondary terminal After the authentication of the service providing server, it may be determined whether or not the combination of the secondary terminal and the service providing server is appropriate. For example, an identifier of the secondary terminal and service providing server identification information for identifying a service providing server that can be used by the secondary terminal may be stored in a table in association with each other. By performing authentication using such a table, the secondary terminal can use only a predetermined service providing server. For example, a holder of a secondary terminal who goes out during work can be connected only to the server at work.
- the identifier of a network using terminal and service providing server identification information for identifying a service providing server that can be used by the secondary terminal may be stored in a table in association with each other. By performing authentication using such a table, it is possible to provide services that can be used only when the user is in the vicinity of a predetermined network user terminal. For example, it is useful for crowds in shopping streets and resorts.
- a service providing server with which a secondary terminal can communicate can be designated, and a service providing fee can be collected.
- FIG. 16 illustrates an overall configuration of a communication system according to Embodiment 3 of the present invention.
- the communication system according to the present embodiment includes a line 501, a network using terminal 502, a secondary terminal 503, an authentication server 504, and a tertiary terminal 1601. Also, a service providing server may be present. Therefore, the communication system according to the present embodiment has a configuration in which the communication system according to Embodiment 1 or 2 includes tertiary terminal 1601.
- the tertiary terminal 1601 is a terminal that can communicate with the secondary terminal 503 using the third network.
- "Third network” is a communication network composed of, for example, wireless LAN.
- FIG. 17 illustrates a functional block diagram of a tertiary terminal.
- the tertiary terminal 1601 has a tertiary terminal authentication information transmitting unit 1701.
- “Tertiary terminal authentication information transmitting section” 1701 transmits tertiary terminal authentication information to secondary terminal 503 using the third network.
- the “tertiary terminal authentication information” is information for authenticating itself, and “self” means a tertiary terminal. Therefore, the tertiary terminal authentication information may have, for example, the same structure as the secondary terminal authentication information in the first embodiment.
- the part of the tertiary terminal according to the present embodiment can be configured by hardware, software, or both hardware and software (program).
- hardware consisting of CPU, memory, bus, interface, peripheral devices, etc., and software executable on these hardware are used. Can be mentioned. Therefore, although not shown, it is a network interface for communicating with the third network. Are provided in the tertiary terminal. Also, if the tertiary terminal is operated by its owner, a user interface is provided.
- FIG. 18 shows an example of a functional block diagram of a secondary terminal of the communication system according to the present embodiment.
- the secondary terminal 503 includes a tertiary terminal authentication information receiving unit 1801, a secondary terminal authentication information transmitting unit 601, a secondary terminal authentication result information receiving unit 1802, and a secondary terminal relay unit 1803.
- Tertiary terminal authentication information receiving unit 1801 receives tertiary terminal authentication information transmitted from tertiary terminal 1601. Therefore, the secondary terminal according to the present embodiment has a network interface for the secondary terminal according to the first or second embodiment to communicate with the third network.
- “Secondary terminal authentication information transmitting unit" 601 is the same as that in Embodiment 1 or 2, but in the present embodiment, the tertiary terminal authentication information receiving unit is added to the secondary terminal authentication information. And transmits the tertiary terminal authentication information received by the terminal.
- "Secondary terminal authentication result information receiving unit" 1802 receives the authentication result information returned in response to the transmission of the secondary terminal authentication information.
- the authentication result information is received via the network using terminal 502 as described later.
- the "secondary terminal relay unit" 1803 relays the communication of the tertiary terminal 1601 to the second network based on the authentication result information received by the secondary terminal authentication result information receiving unit 1802, The tertiary terminal 1601 is permitted to use the first network. If the authentication result information indicates that the authentication is OK, the communication of the secondary terminal 503 is relayed to the first network, and the secondary terminal transmits the communication of the tertiary terminal to the second network. By relaying, the tertiary terminal can perform communication on the first network.
- network using terminal 502 further includes an authentication result transmitting unit.
- the “authentication result transmitting unit” transmits the authentication result information received by the authentication result information receiving unit 803 to the secondary terminal 503. [0086] (Embodiment 3: Configuration of authentication server)
- the authentication unit 1002 of the authentication server 504 further authenticates the tertiary terminal 1601 based on the composite authentication information received by the composite authentication information receiving unit 1001.
- the authentication method may be the same as the authentication method for the secondary terminal or the network terminal! /,. Alternatively, a different method may be used.
- FIG. 19 illustrates a flowchart of the processing of the secondary terminal in the present embodiment.
- the secondary terminal receives the tertiary terminal authentication information, it executes the processing of the flowchart in FIG.
- step S1901 tertiary terminal authentication information is received by the tertiary terminal authentication information receiving unit 1801.
- step S1902 secondary terminal authentication information is obtained. This acquisition is performed, for example, by the secondary terminal authentication information transmitting unit 601.
- the secondary terminal authentication information is transmitted by the secondary terminal authentication information transmitting unit 601.
- the returned authentication result information is received by the secondary terminal authentication result information receiving unit 1802.
- a tertiary terminal capable of communicating with a secondary terminal can use the first network, and can extend a communication area of the communication system according to the present invention. If this idea is pushed forward, as illustrated in Fig. 20, the tertiary terminal can communicate with the quaternary terminal and the quaternary terminal can use the first network. And the quaternary terminal can communicate with the tertiary terminal. This makes it possible to use a network from a moving object, for example, by mounting the terminal on a continuously arranged moving object such as a car running on a road.
- Embodiment 4 of the present invention corresponds to a network using terminal of the communication system according to Embodiment 1.
- the network use terminal is positioned in the entire communication system.
- the network use terminal alone is used. Is explained.
- the network terminal according to the present embodiment is a network using terminal that is connected to the first network by a line and can communicate with the secondary terminal using the second network.
- the network using terminal includes a secondary terminal authentication information receiving unit, a composite authentication information transmitting unit, an authentication result information receiving unit, and a relay unit.
- the "secondary terminal authentication information receiving unit” receives the secondary terminal authentication information transmitted from the secondary terminal, which is information for authenticating the secondary terminal.
- the "composite authentication information transmitting unit" is information including the secondary terminal authentication information received by the secondary terminal authentication information receiving unit, and the use terminal authentication information that is information for authenticating itself. Send some composite authentication information.
- the "authentication result information receiving unit” receives authentication result information that is information returned in response to the transmission of the composite authentication information and that is information indicating a result of authentication based on the composite authentication information.
- the "relay unit” relays the communication of the secondary terminal to the first network based on the authentication result information received by the authentication result information receiving unit. The use of the network is permitted to the secondary terminal.
- Embodiment 5 of the present invention corresponds to the authentication server of the communication system according to Embodiment 1.
- the authentication server according to the present embodiment is an authentication server that communicates with a network using terminal that can communicate with the secondary terminal.
- the secondary terminal is a terminal device as described above.
- the authentication server includes a composite authentication information reception unit, an authentication unit, and an authentication result return unit.
- the “combined authentication information receiving unit” includes secondary terminal authentication information that is information for authenticating the secondary terminal and user terminal authentication information that is information for authenticating the network using terminal. Receiving the composite authentication information, which is the information including the authentication information, from the network using terminal.
- the "authentication unit” authenticates the secondary terminal and the network using terminal based on the composite authentication information received by the composite authentication information receiving unit.
- the "authentication result reply unit” returns the result of the authentication by the authentication unit as authentication result information.
- Embodiment 6 of the present invention corresponds to a secondary terminal of the communication system according to Embodiment 2.
- the secondary terminal includes a network use terminal connected via a line to a first network capable of communicating with a service providing server that provides a service, and a second terminal. It is a terminal that can communicate using a network.
- the secondary terminal has a secondary terminal authentication information transmission unit.
- the "secondary terminal authentication information transmission unit” identifies the service providing server that performs communication using the first network in the secondary terminal authentication information that is information for authenticating itself. And transmitting the service providing server identification information to the network using terminal using the second network.
- “self” means a secondary terminal.
- Embodiment 7 of the present invention corresponds to a network using terminal of the communication system according to Embodiment 2. Therefore, the network use terminal according to the present embodiment is the same as the network use terminal according to Embodiment 4, wherein the first network can communicate with a service providing server that provides a service, and the secondary terminal
- the authentication information includes service providing server identification information, which is information for identifying the service providing server with which the secondary terminal communicates using the first network
- the relay unit includes: Based on the result of the authentication received by the authentication result information receiving unit, the first terminal is relayed to the service providing server via the first network. The use of the network is permitted to the secondary terminal.
- Embodiment 8 of the present invention corresponds to the authentication server of the communication system according to Embodiment 2. Therefore, in the authentication server according to the present embodiment, in the authentication server according to the fifth embodiment, the network using terminal communicates with a service providing server that provides a service using the first network.
- the secondary terminal authentication information includes service providing server identification information that is information for identifying the service providing server with which the secondary terminal communicates using the first network.
- the authentication unit authenticates the service providing server based on the composite authentication information received by the composite authentication information receiving unit.
- Embodiment 9 of the present invention corresponds to a network using terminal of the communication system according to Embodiment 3. Therefore, the network using terminal according to the present embodiment has an authentication result in which the network using terminal according to Embodiment 4 or 7 transmits the authentication result information received by the authentication result information receiving unit to the secondary terminal. It has a configuration having an information transmitting unit.
- Embodiment 10 of the present invention corresponds to the authentication server of the communication system according to Embodiment 3. Therefore, in the authentication server according to the present embodiment, in the authentication server according to Embodiment 5 or 8, the secondary terminal is information for authenticating itself using the third network.
- the secondary terminal can communicate with a tertiary terminal transmitting tertiary terminal authentication information, the secondary terminal transmits the secondary terminal authentication information including the tertiary terminal authentication information, and the authentication unit transmits the composite authentication information.
- the tertiary terminal is further authenticated based on the composite authentication information received by the receiving unit.
- the eleventh embodiment according to the present invention is, for example, a method for causing a network using terminal, a secondary terminal, and an authentication server to communicate with each other so that the communication system of the first embodiment operates. That is, the method according to the present embodiment comprises a network using terminal connected to the first network by a line, a secondary terminal capable of communicating with the network using terminal using the second network, A secondary terminal authentication information transmitting step, a secondary terminal authentication information receiving step, a composite authentication information transmitting step, an authentication result information receiving step, a relay step, and a composite authentication information. It includes a receiving step, an authentication step, and an authentication result returning step.
- the secondary terminal transmits secondary terminal authentication information, which is information for authenticating itself, to the network using terminal using the second network.
- This is the step of transmitting. For example, this corresponds to step S1201 in FIG.
- the "secondary terminal authentication information receiving step” is a step in which the network using terminal receives the secondary terminal authentication information transmitted in the secondary terminal authentication information transmitting step. For example, this corresponds to step S1201 in FIG.
- the "multi-authentication-information transmitting step” is a step in which the network-using terminal uses the secondary-terminal authentication information received in the secondary-terminal-authentication-information receiving step and the user-terminal-authentication-information used to authenticate itself. And transmitting composite authentication information that is information including the following. For example, it corresponds to step S1202 in FIG.
- the "authentication result information receiving step” is a step of receiving authentication result information returned in response to the transmission of the composite authentication information. For example, it corresponds to step S1202 in FIG.
- the "relay step” is to relay the communication of the secondary terminal to the first network based on the authentication result information received in the authentication result information receiving step. A step of permitting the secondary terminal to use the first network. If f rows are met, steps S905 and S906 in FIG.
- the “combined authentication information receiving step” is a step in which the authentication server receives the combined authentication information to which the network use terminal is also transmitted. For example, it corresponds to step S1202 in FIG.
- the "authentication step” is a step in which the authentication server authenticates the secondary terminal and the network using terminal based on the composite authentication information received in the composite authentication information receiving step. It is a step. For example, it corresponds to step S1102 in FIG.
- the "authentication result returning step” is a step of returning the result of the authentication in the authentication step. For example, it corresponds to step S1203 in FIG.
- the communication system according to the present invention can promote the use of the surplus bandwidth of the line, and can smoothly perform charging management and the like for the person who provided and used the line bandwidth, Industrially useful.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05739226A EP1752883A4 (en) | 2004-05-19 | 2005-05-13 | COMMUNICATION SYSTEM |
US11/596,574 US20070226490A1 (en) | 2004-05-19 | 2005-05-13 | Communication System |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004149126A JP4009273B2 (ja) | 2004-05-19 | 2004-05-19 | 通信方法 |
JP2004-149126 | 2004-05-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005111826A1 true WO2005111826A1 (ja) | 2005-11-24 |
Family
ID=35394327
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/008772 WO2005111826A1 (ja) | 2004-05-19 | 2005-05-13 | 通信システム |
Country Status (4)
Country | Link |
---|---|
US (1) | US20070226490A1 (ja) |
EP (1) | EP1752883A4 (ja) |
JP (1) | JP4009273B2 (ja) |
WO (1) | WO2005111826A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015191436A (ja) * | 2014-03-28 | 2015-11-02 | 情報セキュリティ・マネジメント株式会社 | 通信システム |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4143082B2 (ja) * | 2005-08-23 | 2008-09-03 | 株式会社東芝 | 情報処理装置および認証制御方法 |
US9692732B2 (en) | 2011-11-29 | 2017-06-27 | Amazon Technologies, Inc. | Network connection automation |
JP5650252B2 (ja) * | 2013-01-08 | 2015-01-07 | 日本電信電話株式会社 | 権限発行システム、権限発行サーバ、及び権限発行方法 |
JP2016157359A (ja) * | 2015-02-26 | 2016-09-01 | 沖電気工業株式会社 | サービス提供システム、情報処理装置、及びプログラム |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1081895A1 (en) | 1999-09-03 | 2001-03-07 | Intel Corporation | Secure wireless local area network |
JP2002111870A (ja) * | 2000-09-28 | 2002-04-12 | Toshiba Corp | 通信システム、移動端末装置、ゲートウェイ装置及び通信制御方法 |
JP2002125069A (ja) * | 2000-10-16 | 2002-04-26 | Mitsubishi Electric Corp | Ip電話システム、無線ip電話機および無線lan基地局 |
JP2003085063A (ja) * | 2001-09-10 | 2003-03-20 | Matsushita Electric Ind Co Ltd | 通信中継装置及び通信方法 |
EP1379053A1 (en) | 2002-06-20 | 2004-01-07 | TeliaSonera Finland Oyj | Method for transferring a user-ID password pair, and a wireless network |
JP2004023312A (ja) * | 2002-06-14 | 2004-01-22 | Hitachi Ltd | アクセスネットワークサービス提供方法、アクセスネットワークサービス制御装置、及びアクセスネットワークサービスにおける課金管理装置 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US65785A (en) * | 1867-06-18 | William adamson | ||
US69287A (en) * | 1867-09-24 | Improvement in eeveesible butt-hinges | ||
US6463474B1 (en) * | 1999-07-02 | 2002-10-08 | Cisco Technology, Inc. | Local authentication of a client at a network device |
JP3570310B2 (ja) * | 1999-10-05 | 2004-09-29 | 日本電気株式会社 | 無線lanシステムにおける認証方法と認証装置 |
US6766453B1 (en) * | 2000-04-28 | 2004-07-20 | 3Com Corporation | Authenticated diffie-hellman key agreement protocol where the communicating parties share a secret key with a third party |
JP4622070B2 (ja) * | 2000-09-13 | 2011-02-02 | 株式会社デンソー | 適応通信システム、通信端末、及び記録媒体 |
US6732270B1 (en) * | 2000-10-23 | 2004-05-04 | Motorola, Inc. | Method to authenticate a network access server to an authentication server |
US7075912B2 (en) * | 2001-03-16 | 2006-07-11 | Nippon Telegraph And Telephone Corporation | Wireless communication system using access points that can be freely set up by users |
US6858988B1 (en) * | 2001-10-31 | 2005-02-22 | Old Dominion University Research Foundation | Electrodeless excimer UV lamp |
US20030235305A1 (en) * | 2002-06-20 | 2003-12-25 | Hsu Raymond T. | Key generation in a communication system |
KR100494558B1 (ko) * | 2002-11-13 | 2005-06-13 | 주식회사 케이티 | 공중 무선랜 서비스 시스템의 사용자 인증방법 및 시스템 |
FR2851104A1 (fr) * | 2003-02-10 | 2004-08-13 | France Telecom | Procede et systeme d'authentification d'un utilisateur au niveau d'un reseau d'acces lors d'une connexion de l'utilisateur au reseau internet |
-
2004
- 2004-05-19 JP JP2004149126A patent/JP4009273B2/ja not_active Expired - Lifetime
-
2005
- 2005-05-13 US US11/596,574 patent/US20070226490A1/en not_active Abandoned
- 2005-05-13 WO PCT/JP2005/008772 patent/WO2005111826A1/ja not_active Application Discontinuation
- 2005-05-13 EP EP05739226A patent/EP1752883A4/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1081895A1 (en) | 1999-09-03 | 2001-03-07 | Intel Corporation | Secure wireless local area network |
JP2002111870A (ja) * | 2000-09-28 | 2002-04-12 | Toshiba Corp | 通信システム、移動端末装置、ゲートウェイ装置及び通信制御方法 |
JP2002125069A (ja) * | 2000-10-16 | 2002-04-26 | Mitsubishi Electric Corp | Ip電話システム、無線ip電話機および無線lan基地局 |
JP2003085063A (ja) * | 2001-09-10 | 2003-03-20 | Matsushita Electric Ind Co Ltd | 通信中継装置及び通信方法 |
JP2004023312A (ja) * | 2002-06-14 | 2004-01-22 | Hitachi Ltd | アクセスネットワークサービス提供方法、アクセスネットワークサービス制御装置、及びアクセスネットワークサービスにおける課金管理装置 |
EP1379053A1 (en) | 2002-06-20 | 2004-01-07 | TeliaSonera Finland Oyj | Method for transferring a user-ID password pair, and a wireless network |
Non-Patent Citations (1)
Title |
---|
A. INOUE ET AL.: "IP Layer Security and Mobility Support Design Policy and an Implementation", ISS 1997 WORLD TELECOMMUNICATIONS CONGRESS, 21 September 1997 (1997-09-21) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015191436A (ja) * | 2014-03-28 | 2015-11-02 | 情報セキュリティ・マネジメント株式会社 | 通信システム |
Also Published As
Publication number | Publication date |
---|---|
US20070226490A1 (en) | 2007-09-27 |
JP4009273B2 (ja) | 2007-11-14 |
JP2005333350A (ja) | 2005-12-02 |
EP1752883A1 (en) | 2007-02-14 |
EP1752883A4 (en) | 2010-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3869392B2 (ja) | 公衆無線lanサービスシステムにおけるユーザ認証方法および該方法をコンピュータで実行させるためのプログラムを記録した記録媒体 | |
TWI293844B (en) | A system and method for performing application layer service authentication and providing secure access to an application server | |
EP1554862B1 (en) | Session key management for public wireless lan supporting multiple virtual operators | |
JP4666169B2 (ja) | 信頼されないアクセス局を介した通信方法 | |
US7913080B2 (en) | Setting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program | |
CN101006682B (zh) | 快速网络附着 | |
CN101711031B (zh) | 一种本地转发中的Portal认证方法和接入控制器 | |
JP2002111870A (ja) | 通信システム、移動端末装置、ゲートウェイ装置及び通信制御方法 | |
JP5536628B2 (ja) | 無線lan接続方法、無線lanクライアント、および無線lanアクセスポイント | |
Shi et al. | IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks | |
JP2004241976A (ja) | 移動通信ネットワークシステムおよび移動端末認証方法 | |
JP2008199324A (ja) | 通信制御課金システム、通信制御課金方法、および通信制御課金プログラム | |
JP2002118562A (ja) | 認証拒否端末に対し特定条件でアクセスを許容するlan | |
CN101197721B (zh) | 对用户终端进行网络配置的方法和装置 | |
Leroy et al. | SWISH: secure WiFi sharing | |
WO2005111826A1 (ja) | 通信システム | |
EP1914960B1 (en) | Method for transmission of DHCP messages | |
JP2009217722A (ja) | 認証処理システム、認証装置、管理装置、認証処理方法、認証処理プログラムおよび管理処理プログラム | |
KR102224454B1 (ko) | 네트워크 트래픽 제어 방법, 장치, 시스템 및 컴퓨터 프로그램 | |
CN101742507B (zh) | 一种WAPI终端访问Web应用站点的系统及方法 | |
JP2010074481A (ja) | Lanシステム、端末装置、利用申請装置、ユーザアカウント取得方法 | |
JP2007329951A (ja) | 認証サーバ、ネットワーク利用端末、二次端末および通信方法 | |
JP2006121728A (ja) | 通信システム、移動端末装置、ゲートウェイ装置及び通信制御方法 | |
KR101480706B1 (ko) | 인트라넷에 보안성을 제공하는 네트워크 시스템 및 이동통신 네트워크의 보안 게이트웨이를 이용하여 인트라넷에 보안성을 제공하는 방법 | |
Panken et al. | Architecture for sharing residential access with roaming WLAN users |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005739226 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11596574 Country of ref document: US Ref document number: 2007226490 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2005739226 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11596574 Country of ref document: US |