US20130182847A1 - Communication system, information processing apparatus, method and computer program - Google Patents

Communication system, information processing apparatus, method and computer program Download PDF

Info

Publication number
US20130182847A1
US20130182847A1 US13/730,546 US201213730546A US2013182847A1 US 20130182847 A1 US20130182847 A1 US 20130182847A1 US 201213730546 A US201213730546 A US 201213730546A US 2013182847 A1 US2013182847 A1 US 2013182847A1
Authority
US
United States
Prior art keywords
key
pda
information
connection request
information processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/730,546
Inventor
Junichi Rekimoto
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sony Corp
Original Assignee
Sony Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Corp filed Critical Sony Corp
Priority to US13/730,546 priority Critical patent/US20130182847A1/en
Publication of US20130182847A1 publication Critical patent/US20130182847A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/18Interfaces between hierarchically similar devices between terminal devices

Definitions

  • the present invention relates to a communication system, information processing apparatus and method, and a computer program, and particularly to a communication system, information processing apparatus and method, and a computer program capable of easily and promptly starting wireless communications in which security is ensured without additional hardware.
  • Information which needs to be kept confidential is also transmitted and received between apparatuses having the above-mentioned wireless communication function, so that there is a need for security countermeasures to prevent a third party from intercepting, falsifying such information and carrying out unauthorized network access.
  • a user registers beforehand a secret key called a WEP (Wired Equivalent Privacy) key with a device for communicating, and performs encrypted communications by using the WEP key, to thereby secure safety of the communications.
  • WEP Wired Equivalent Privacy
  • a digital certificate is issued beforehand so as to authenticate a device of a communication counterpart by using the certificate at the time of starting communications, to thereby determine whether it is a right communication counterpart or not, and secure safety.
  • Japanese Laid-Open Patent Application No 2002-204239 discloses that a portable phone having a built-in RF tag is brought into proximity with a personal computer having a built-in reader/writer, so that identification information data of both devices are transmitted and received between the RF tag and the reader/writer. Then, the Bluetooth communications are established between the portable phone and the personal computer, based on the transmitted and received identification information data.
  • a secret key is shared between two devices in short distance wireless communications by means of the RF tag and the reader/writer or in short distance wireless communications by means of infrared modules provided in both the devices. Therefore, for example, the Bluetooth communications established in such a way as to be disclosed in Patent Document 1 are encrypted by using the secret key which is transmitted and received in the short distance wireless communications, so that the user may only bring both the devices into proximity with each other so as to promptly start the Bluetooth communications in which the security is ensured.
  • both the devices in order to transmit and receive the identification information data and the secret key between both the devices, it is necessary for both the devices to be provided with short distance wireless communication modules, such as the RF tag, the reader/writer, or the infrared module, in addition to the wireless communication module, such as the Bluetooth communications etc., which can perform communications even in a relatively distant position.
  • short distance wireless communication modules such as the RF tag, the reader/writer, or the infrared module
  • the RF tag, the infrared module, etc. are only for establishing the Bluetooth communications etc. by means of the wireless communication module provided in addition to them, it is necessary to prepare them for causing the Bluetooth communication etc. to start promptly only by bringing the devices into proximity to each other, which increases the cost accordingly.
  • the present invention has been conceived in view of a situation as described above, and aims to granting easy and prompt start of the wireless communications in which security is ensured without additional hardware, such as the RF tag and the infrared module.
  • a first information processing apparatus of a communication system in accordance with the present invention includes: a first transmission means or transmitter for wirelessly broadcasting a connection request containing a public key; a first reception means or receptor for receiving a key information which is transmitted wirelessly from a second information processing apparatus for judging a reception intensity of an electromagnetic wave which conveys the connection request broadcast by the first transmission means is higher than a preset threshold value, the key information being generated by the second information processing apparatus and encrypted by the public key; and a first establishment means for decrypting the key information received by the first reception means by using a secret key corresponding to the public key and so that wireless communications encrypted by the key information may be established with the second information processing apparatus.
  • a second information processing apparatus of the communication system in accordance with the present invention includes: a second reception means or receptor for receiving a connection request transmitted from the first information processing apparatus; a generation means or generator for generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a second transmission means for encrypting by means of a public key and transmitting to the first information processing apparatus the key information generated by the generation means; and a second establishment means for establishing wireless communication, encrypted by the key information, with the first information processing apparatus.
  • the first information processing apparatus of the present invention further includes: a transmission means or transmitter for wirelessly broadcasting a connection request containing a public key; a reception means or receptor for receiving a key information wirelessly transmitted from another information processing apparatus which judges a reception intensity of an electromagnetic wave for conveying the connection request broadcast by the transmission means is higher than a preset threshold value, the key information being generated by the other information apparatus and encrypted by the public key; and an establishing means for decrypting the key information received by the reception means by using a secret key corresponding to the public key so as to establish wireless communications encrypted by the key information with the other information processing apparatus, wherein the establishing means establishes the wireless communications with the other information processing apparatus when the reception intensity of the electromagnetic wave which conveys the key information transmitted from the other information processing apparatus is higher than the preset threshold value.
  • a first information processing method in accordance with the present invention includes: a transmission step of wirelessly broadcasting a connection request containing a public key; a reception step of receiving a key information wirelessly transmitted from another information processing apparatus which judges a reception intensity of an electromagnetic wave for conveying the connection request broadcast by processing the transmission step is higher than a preset threshold value, the key information being generated by the other information processing apparatus and encrypted by means of the public key; and an establishment step of decrypting the key information received by processing the reception step by using a secret key corresponding to the public key so as to establish wireless communication, encrypted by the key information, with the other information processing apparatus, wherein by processing the establishment step, the wireless communications are established with the other information processing apparatus when the reception intensity of the electromagnetic wave which conveys the key information transmitted from the other information processing apparatus is higher than the preset threshold value.
  • a first computer program of the present invention includes: a transmission step of wirelessly broadcasting a connection request containing a public key; a reception step of receiving a key information transmitted wirelessly from another information processing apparatus which judges a reception intensity of an electromagnetic wave for conveying a connection request broadcast by processing the transmission step is higher than a preset threshold value, the key information being generated by the other information processing apparatus and encrypted by means of the public key; and an establishment step of decrypting the key information, received by processing the reception step, by using the secret key corresponding to the public key so as to establish wireless communications encrypted by means of the key information with the other information processing apparatus, wherein by processing the establishment step, the wireless communications are established with the other information processing apparatus when the reception intensity of the electromagnetic wave which conveys the key information transmitted from the other information processing apparatus is higher than the preset threshold value.
  • a second information processing apparatus of the present invention includes: a reception means for receiving a connection request containing a public key transmitted from another information processing apparatus; a generation means for generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a transmission means for encrypting the key information, generated by the generation means, by means of the public key so as to transmit it to the other information processing apparatus; and an establishment means for establishing wireless communications encrypted by means of the key information with the other information processing apparatus.
  • the generation means can generate different key information each time an electromagnetic wave which conveys the connection request is received at reception intensity higher than the preset threshold value.
  • a second information processing method of the present invention includes: a reception step of receiving a connection request containing a public key transmitted from another information processing apparatus; a generation step of generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a transmission step of encrypting the key information, generated by processing the generation step, by means of the public key so as to transmit it to another information processing apparatus; and an establishment step of establishing wireless communication, encrypted by means of the key information, with the other information processing apparatus.
  • a second computer program of the present invention includes: a reception step of receiving a connection request containing a public key transmitted from another information processing apparatus; a generation step of generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a transmission step for encrypting by means of a public key and transmitting to the information processing apparatus the key information generated by the generation step; and an establishment step of establishing wireless communications encrypted by the key information with the other information processing apparatus.
  • a third information processing apparatus of the present invention includes: a reception means for receiving a connection request containing a public key transmitted from another information processing apparatus; a generation means for generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a first transmission means for encrypting the key information, generated by the generation means, by means the public key so as to transmit the encrypted key information to the other information processing apparatus together with an information data for connecting to a communication management device which manages wireless communication; and a second transmission means for transmitting the key information generated by the generation means to the communication management device by wire.
  • a third information processing method of the present invention includes: a reception step of receiving a connection request containing a public key transmitted from another information processing apparatus; a generation step of generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a first transmission step of encrypting the key information, generated by processing the generation step, by means of the public key so as to transmit the encrypted key information to the other information processing apparatus together with an information data for connecting to a communication management device which manages wireless communication; and a second transmission step of transmitting the key information generated by processing the generation step to the communication management device by wire.
  • a third computer program of the present invention includes: a reception step of receiving a connection request containing a public key transmitted from another information processing apparatus; a generation step of generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a first transmission step of encrypting the key information, generated by processing the generation step, by means of the public key so as to transmit the encrypted key information to the other information processing apparatus together with an information data for connecting to a communication management device which manages wireless communication; and a second transmission step of transmitting the key information generated by processing the generation step to the communication management device by wire.
  • the connection request containing the public key is broadcast wirelessly means
  • the key information is received which is transmitted wirelessly from the second information processing apparatus for judging the reception intensity of the electromagnetic wave for conveying the broadcast connection request is higher than the preset threshold value, the key information being generated by the second information processing apparatus and encrypted by means of the public key. Further, the received key information is decrypted by using the secret key corresponding to the public key.
  • the wireless communications encrypted by the key information is established with the second information processing apparatus. Further, when the connection request transmitted from the first information processing apparatus is received and the reception intensity of the electromagnetic wave which conveys the connection request is higher than the preset threshold value, then the key information is generated.
  • the generated key information is encrypted by means of the public key so as to be transmitted to the first information processing apparatus, whereby the wireless communications encrypted by means of the key information is established with the first information processing apparatus.
  • the connection request containing the public key is broadcast wirelessly means, and the key information is received which is wirelessly transmitted from another information processing apparatus for judging the reception intensity of the electromagnetic wave for conveying the broadcast connection request is higher than the preset threshold value, the key information being generated by the other information processing apparatus and encrypted by means of the public key. Further, the received key information is decrypted by using the secret key corresponding to the public key, and the wireless communications encrypted by the key information is established with the other information processing apparatus.
  • Establishment of the wireless communications is realized with the other information processing apparatus, when the reception intensity of the electromagnetic wave which conveys the key information transmitted from the other information processing apparatus is higher than the preset threshold value.
  • the connection request when the connection request is received which contains the public key transmitted from another information processing apparatus, and when the reception intensity of the electromagnetic wave which conveys the connection request is higher than the preset threshold value, then the key information is generated. Further, the generated key information is encrypted by means of the public key so as to be transmitted to another information processing apparatus, whereby the wireless communications encrypted by means of the key information is established with another information processing apparatus.
  • the connection request when the connection request is received which contains the public key transmitted from another information processing apparatus, and when the reception intensity of the electromagnetic wave which conveys the connection request is higher than the preset threshold value, then the key information is generated. Further, the generated key information is encrypted by means of the public key, and the encrypted key information is transmitted to another information processing apparatus together with the information data for connecting to the communication management device which manages the wireless communications. The generated key information is transmitted to the communication management device by wire.
  • FIG. 1A and FIG. 1B are views showing a procedure of establishing ad hoc communications
  • FIG. 2 is a block diagram showing an example of a structure of a PDA
  • FIG. 3 is a block diagram showing an example of a functional structure of the PDA
  • FIG. 4 is a flow chart for explaining a wireless communication establishment process performed by the PDA and a portable phone of FIG. 1 ;
  • FIG. 5 is a flow chart for explaining an example of a process in FIG. 4 ;
  • FIG. 6 is a flow chart for explaining another wireless communication establishment process performed by the PDA and the portable phone of FIG. 1 ;
  • FIGS. 7A and 7B are views showing a procedure of establishing infrastructure communications
  • FIG. 8 is a block diagram showing an example of a structure of an access point
  • FIG. 9 is a flow chart for explaining a process performed by the PDA and the access point.
  • FIGS. 10A and 10B are views showing a procedure of establishing the infrastructure communications by bringing a device into proximity to a dummy point;
  • FIG. 11 is a block diagram showing an example of a structure of the access point and the dummy point
  • FIG. 12 is a flow chart for explaining a communication establishment process performed by the PDA, the access point, and the dummy point;
  • FIG. 13 is a view showing an example of a structure of a communication system to which the present invention is applied.
  • FIGS. 14A and 14B are views showing an example of a spatial relationship between the dummy point and the PDA
  • FIG. 15 is a flow chart for explaining a process at the access point.
  • FIG. 16 is a view showing a situation where a portable dummy point and a personal computer are in proximity to each other.
  • a communication system is provided.
  • the communication system is a communication system which includes a first information processing apparatus (for example, a PDA 1 of FIG. 1A ) and a second information processing apparatus (for example, a portable phone 2 of FIG. 1A , an access point 51 of FIG. 7A ).
  • the first information processing apparatus includes: a first transmission means (for example, a connection request transmission unit 41 of FIG. 3 ) for wirelessly broadcasting a connection request containing a public key (for example, the public key Pk generated in step S 2 of FIG. 4 ); a first reception means (for example, a wireless communication control unit 31 of FIG. 3 for performing a process of step S 4 of FIG.
  • a session key S for example, a session key S transmitted wirelessly from the above-mentioned second information processing apparatus (for example, a portable phone 2 of FIG. 1A ) which judges a reception intensity of an electromagnetic wave for conveying the above-mentioned connection request broadcast by the above-mentioned first transmission means is higher than a preset threshold value, a key information being generated by the above-mentioned second information processing apparatus and encrypted by the above-mentioned public key; and a first establishment means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 6 of FIG.
  • key information for example, a session key S
  • the above-mentioned second information processing apparatus for example, a portable phone 2 of FIG. 1A
  • a first establishment means for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 6 of FIG.
  • a secret key for example, a secret key Sk generated in step S 2 of FIG. 4
  • wireless communications for example, wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard
  • the second information processing apparatus includes: a second reception means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 21 of FIG. 4 ) for receiving the above-mentioned connection request transmitted from the above-mentioned first information processing apparatus; a generation means for generating the above-mentioned key information (for example, key information management unit 34 of FIG. 3 ) when the reception intensity of an electromagnetic wave for conveying the above-mentioned connection request is higher than a preset threshold value; a second transmission means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 26 of FIG.
  • a second reception means for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 21 of FIG. 4
  • a second transmission means for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 26 of FIG.
  • a second establishment means for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 27 of FIG. 4 ) for establishing wireless communications, encrypted by means of the above-mentioned key information (for example, a wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard), with the above-mentioned first information processing apparatus.
  • a first information processing apparatus includes: a transmission means (for example, the connection request transmission unit 41 of FIG. 3 ) for wirelessly broadcasting a connection request containing a public key (for example, the public key Pk generated in step S 2 of FIG. 4 ); a reception means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 4 of FIG. 4 ) for receiving key information (for example, the session key S) transmitted wirelessly from another information processing apparatus (for example, the portable phone 2 of FIG.
  • a transmission means for example, the connection request transmission unit 41 of FIG. 3
  • a reception means for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S 4 of FIG. 4
  • key information for example, the session key S
  • the above-mentioned public key so as to establish wireless communications, encrypted by the above-mentioned key information (for example, the wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard), with the above-mentioned other information processing apparatus, wherein the above-mentioned establishment means establishes the above-mentioned wireless communications with the above-mentioned other information processing apparatus when the reception intensity of an electromagnetic wave which conveys the above-mentioned key information transmitted from the above-mentioned other information processing apparatus is higher than a preset threshold value (for example, the PDA 1 of FIG. 1A for performing the process in FIG. 6 ).
  • a preset threshold value for example, the PDA 1 of FIG. 1A for performing the process in FIG. 6 .
  • a first information processing method includes: a transmission step (for example, step S 3 of FIG. 4 ) of broadcasting a connection request containing a public key (for example, the public key Pk generated in step S 2 of FIG. 4 ) wirelessly means; a reception step (for example, step S 4 of FIG. 4 ) of receiving key information (for example, the session key S) generated by the above-mentioned other information processing apparatus (for example, the portable phone 2 of FIG.
  • a first computer program is provided. Also in the first computer program, the preferred embodiment to which each step corresponds (however, an example) is similar to the first information processing method of the present invention.
  • a second information processing apparatus includes: a reception means (for example, the wireless communication control unit 31 of FIG. 3 for performing the process in step S 21 of FIG. 4 ) for receiving a connection request containing a public key (for example, the public key Pk generated in step S 2 of FIG. 4 ) transmitted from another information processing apparatus (for example, the PDA 1 of FIG. 1A ); a generation means for generating key information (for example, the key information management unit 34 of FIG.
  • a transmission means for encrypting the above-mentioned key information, generated by the above-mentioned generation means, with the above-mentioned public key so as to be transmitted to the above-mentioned other information processing apparatus (for example, the wireless communication control unit 31 of FIG. 3 for performing the process in step S 26 of FIG. 4 ); and an establishment means (for example, the wireless communication control unit 31 of FIG. 3 for performing the process in step S 27 of FIG. 4 ) for establishing wireless communications with the above-mentioned other information processing apparatus, the wireless communications being encrypted by the above-mentioned key information (for example, the wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard).
  • the above-mentioned generation means can generate different key information each time an electromagnetic wave which conveys the above-mentioned connection request is received at a reception intensity higher than the preset threshold value.
  • a second information processing method includes: a reception step (for example, step S 21 of FIG. 4 ) of receiving a connection request containing a public key (for example, the public key Pk generated in step S 2 of FIG. 4 ) transmitted from another information processing apparatus (for example, the PDA 1 of FIG. 1A ); a generation step (for example, step S 24 of FIG. 4 ) of generating key information when the reception intensity of an electromagnetic wave which conveys the above-mentioned connection request is higher than a preset threshold value; a transmission step (for example, step S 26 of FIG.
  • a establishment step for example, step S 27 of FIG. 4 ) of establishing wireless communications with the above-mentioned other information processing apparatus, the wireless communications being encrypted by means of the above-mentioned key information (for example, the wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard).
  • a second computer program is provided. Also in the second computer program, the preferred embodiment (however, one example) to which each step corresponds is similar to the second information processing method of the present invention.
  • a third information processing apparatus includes: a reception means (for example, a wireless communication control unit 121 of FIG. 11 for performing a process in step S 161 of FIG. 12 ) for receiving a connection request containing a public key (for example, the public key Pk generated in step S 182 of FIG. 12 ) transmitted from another information processing apparatus (for example, the PDA 1 of FIG. 1A ); a generation means (for example, key information management unit 124 of FIG.
  • a first transmission means for example, the wireless communication control unit 121 of FIG. 11 for performing a process in step S 166 of FIG. 12 ) for encrypting the above-mentioned key information, generated by the above-mentioned generation means, by means of the above-mentioned public key so as to transmit the above-mentioned encrypted key information to the above-mentioned other information processing apparatus together with information for connecting to a communication management device (for example, an access point 51 of FIG.
  • a communication management device for example, an access point 51 of FIG.
  • a second transmission means for example, a cable communication control unit 125 of FIG. 11 for performing a process in step S 167 of FIG. 12 ) for transmitting the above-mentioned key information generated by the above-mentioned generation means to the above-mentioned communication management device by wire.
  • a third information processing method includes: a reception step (for example, step S 161 of FIG. 12 ) of receiving a connection request containing a public key (for example, the public key Pk generated in step S 182 of FIG. 12 ) transmitted from another information processing apparatus (for example, the PDA 1 of FIG. 1A ); a generation step (for example, step S 164 ) of generating key information when the reception intensity of an electromagnetic wave which conveys the above-mentioned connection request is higher than a preset threshold value; a first transmission step (for example, step S 166 of FIG.
  • a third computer program is provided. Also in the third computer program, the preferred embodiment (however, one example) to which each step corresponds is similar to the third information processing method of the present invention.
  • FIG. 1A and FIG. 1B are views showing a procedure of establishing ad hoc communications between devices.
  • modules are included respectively which are capable of performing the wireless communications by means of the electromagnetic wave and which are complying with the IEEE (Institute of Electrical and Electronics Engineers) 802.11 communications standard (IEEE 802.11a/b/g etc.) or the Bluetooth (Bluetooth) communications standard.
  • the connection request containing an address of the PDA 1 etc. is broadcast from the PDA 1 .
  • the FDA 1 and the portable phone 2 are in proximity with each other, and when it is determined that the reception intensity of the electromagnetic wave (electromagnetic wave which conveys the connection request) from the PDA 1 is equal to or higher than a preset threshold value, the portable phone 2 grants the request from the PDA 1 and communicates with the PDA 1 .
  • the portable phone 2 newly generates an encryption key used for the communications with the PDA 1 , and transmits the generated encryption key and a communication parameter, such as the address of the portable phone 2 to the PDA 1 .
  • the public key generated by the PDA 1 is also contained, the encryption key (encryption key generated by means of the portable phone 2 ) encrypted by means of the public key and the communication parameter are transmitted from the portable phone 2 to the PDA 1 .
  • the encryption key and the communication parameter which are transmitted from the portable phone 2 are acquired by using the secret key.
  • the wireless communications complying with the IEEE 802.11 communications standard or the Bluetooth communications standard is established with the portable phones 2 .
  • encrypted communications by using the encryption key generated by the portable phone 2 are performed with the PDA 1 and the portable phones 2 .
  • the encrypted communications are carried out by means of the encryption key generated by the portable phone 2 which is a device having received the connection request, even when there is another device within an electromagnetic wave covering area, the apparatus cannot intercept the information transmitted and received between the PDA 1 and the portable phone 2 . In other words, the user can promptly establish the wireless communications in which safety is also secured.
  • the processing before the communications are established between the PDA 1 and the portable phone 2 will be described later referring to a flow chart.
  • FIG. 2 is a block diagram showing an example a structure of the PDA 1 .
  • a CPU (Central Processing Unit) 11 performs various types of processes according to a computer program loaded from a ROM (Read Only Memory) 12 or a storage unit 18 into a RAM (Random Access Memory) 13 .
  • ROM Read Only Memory
  • RAM Random Access Memory
  • data etc. are suitably stored which are necessary for the CPU 11 to perform various types of processes.
  • the CPU 11 , the ROM 12 , and the RAM 13 are mutually connected through a bus 14 , and an input/output interface 15 is also connected with the bus 14 .
  • buttons and jog dials Connected to the input/output interface 15 are various types of buttons and jog dials; an input unit 16 which is a touch panel etc. and superposed on, for example an LCD (Liquid Crystal Display) constituting an output unit 17 ; a display unit which is an LCD etc.; the output unit 17 which is a speaker, etc; and the storage unit 18 which is a flash memory etc.
  • LCD Liquid Crystal Display
  • a wireless communication unit 19 which is a wireless communication module complying with the IEEE 802.11 communications standard or the Bluetooth communications standard is also connected to the input/output interface 15 .
  • the wireless communication unit 19 performs the wireless communications, complying with the IEEE 802.11 communications standard, for example, with the portable phones 2 , under control of the CPU 11 through the bus 14 and the input/output interface 15 .
  • a drive 20 is also connected to the input/output interface 15 as needed.
  • a magnetic disk 21 , an optical disc 22 , an optical magnetic disc 23 , a semiconductor memory 24 , etc. are suitably installed in the drive 20 .
  • FIG. 3 is a block diagram showing an example of a functional structure of the PDA 1 . Each function in FIG. 3 is realized by executing a control program by means of the CPU 11 of FIG. 2 .
  • the wireless communication control unit 31 establishes the wireless communications with another device at the wireless communication unit 19 of FIG. 2 and controls the established wireless communications. Further, the wireless communication control unit 31 has a connection request transmission unit 41 and an intensity judgment unit 42 .
  • the connection request transmission unit 41 broadcasts the connection request containing the public key and an address of the PDA 1 etc., according to instructions from the user.
  • the public key broadcast by the connection request transmission unit 41 is generated and supplied by the key information management unit 34 .
  • the intensity judgment unit 42 measures the reception intensity of the electromagnetic wave emitted, for example, by an external device in the wireless communication unit 19 , and determines whether or not the reception intensity is equal to or higher than the threshold value.
  • an encryption/decryption processing unit 32 encrypts an information data to be transmitted to another device, and decrypts the information data when the information data received from another device is encrypted.
  • a communication parameter management unit 33 manages various types of parameters required for performing communications, for example, an ESSID (Extended Service Set ID) in the IEEE 802.11 communications, or a Bluetooth address, a Bluetooth clock, etc. in the Bluetooth communications.
  • ESSID Extended Service Set ID
  • Bluetooth address a Bluetooth clock, etc. in the Bluetooth communications.
  • the key information management unit 34 manages the encryption key provided by the device of a communication counterpart, generates the public key and the secret key corresponding to the public key as needed, and manages their key information.
  • the key information managed by the key information management unit 34 is suitably provided for the encryption/decryption processing unit 32 .
  • the portable phone 2 of FIG. 1 fundamentally has the same structure as the structures of FIG. 2 and FIG. 3 , except that a processing unit for a sound signal which is inputted when the user speaks and a communication unit for performing communications with a base station are added further. Therefore, hereafter, FIG. 2 and FIG. 3 are suitably referred to the structure of the portable phone 2 .
  • the input unit 16 of the PDA 1 receives an input (operation of the connection button) from the user in step S 1 .
  • step S 2 the key information management unit 34 generates and manages a pair of the public key Pk and the secret key Sk (secret key Sk which can decrypt the information data encrypted by means of the public key Pk) corresponding to the public key Pk.
  • the key information management unit 34 supplies the generated public key Pk to the wireless communication control unit 31 .
  • the communication parameter containing the address of the PDA 1 etc. is also supplied from the communication parameter management unit 33 to the wireless communication control unit 31 .
  • step S 3 the connection request transmission unit 41 controls the wireless communication unit 19 and broadcasts the connection request containing the public key Pk and the communication parameter. Since the connection request is not encrypted, a device which exists within a coverage area of the electromagnetic wave emitted from the wireless communication unit 19 of a PDA 11 can receive the connection request and acquire the public key Pk, etc.
  • step S 21 the wireless communication control unit 31 of the portable phone 2 receives the connection request transmitted from the PDA 1 , and outputs the public key Pk contained in the connection request to the encryption/decryption processing unit 32 .
  • step S 22 the intensity judgment unit 42 of the portable phone 2 measures the reception intensity (reception intensity of the electromagnetic wave which conveys the connection request) of the connection request, moves the process to step S 23 , and determines whether or not the reception intensity is equal to or higher than the threshold value.
  • step S 23 when it is determined that the reception intensity of the connection request is lower than or equal to the threshold value, then the intensity judgment unit 42 terminates the process. Therefore, when a distance between the PDA 1 and the portable phone 2 is comparatively large, even if the portable phone 2 has received the connection request, subsequent communications are not performed between the PDA 1 and the portable phone 2 .
  • step S 23 when it is determined that the reception intensity of the connection request is equal to or higher than the threshold value, the intensity judgment unit 42 grants the request from the PDA 1 , and specifies the PDA 1 as a device of the communication counterpart. Therefore, as shown in FIG. 1A , when the connection request is broadcast from the PDA 1 in proximity with the portable phone 2 , the PDA 1 is specified as the device of the communication counterpart of the portable phone 2 .
  • a field intensity of the electromagnetic wave decreases inversely proportionally to the square of a distance from a transmission source, therefore, a device having received the connection request can determine whether the device broadcasting the connection request is the one in proximity or the one located in a comparatively distant position, based on the field intensity of the received electromagnetic wave.
  • the device which receives the connection request can substantially reliably determine whether or not the device which transmits it is the one in proximity, even if there are somewhat irregularities in the output.
  • the key information management unit 34 of the portable phone 2 in step S 24 , generates the session key S which is a common key.
  • the session key S is used for encrypting the transmitted and received information data and for decrypting the encrypted information data.
  • the session key S is generated at random for connection at this event. A different key is generated for each set of the processes of FIG. 4 .
  • the session key S generated by the key information management unit 34 , and the communication parameters, such as the address of the portable phone 2 , managed by the communication parameter management unit 33 are outputted to the encryption/decryption processing unit 32 .
  • step S 26 the wireless communication control unit 31 returns the session key S encrypted by means of the public key Pk and the communication parameter to the PDA 1 as an ack (Z) (acknowledge (Z)).
  • the session key S generated by the portable phone 2 is encrypted by means of the public key Pk and returned to the PDA 1 , so that only the PDA 1 having the secret key Sk can decrypt and acquire the session key S.
  • the wireless communication control unit 31 of the PDA 1 receives the ack (Z) returned from the portable phone 2 , and outputs the received ack (Z) to the encryption/decryption processing unit 32 .
  • step S 5 the encryption/decryption processing unit 32 of the PDA 1 decrypts the ack (Z) returned from the portable phone 2 by using the secret key Sk managed by the key information management unit 34 , and acquires the communication parameter and the session key S generated by the portable phone 2 .
  • step S 6 by using the communication parameter acquired by the encryption/decryption processing unit 32 , the wireless communication control unit 31 establishes the wireless communications with the portable phones 2 , complying with the IEEE 802.11 communications standard or the Bluetooth communications standard.
  • step S 27 based on the communication parameter contained in the connection request from the PDA 1 , the portable phone 2 establishes the wireless communications with the PDA 1 , complying with the IEEE 802.11 communications standard or the Bluetooth communications standard.
  • a MAC (Media Access Control) address, an IP address, the ESSID, etc. of both the devices are set up between the PDA 1 and the portable phones 2 , and a setup by using the session key S as a WEP (Wired Equivalent Privacy) key etc. are performed.
  • a setup based on the Bluetooth address or a Bluetooth clock, a setting by using the session key S as an encryption key etc. are performed.
  • the wireless communications encrypted by means of the session key S are started between the PDA 1 and the portable phone 2 .
  • the wireless communications started here do not necessarily require both the devices to be in proximity to each other, but are effective within the coverage area of the electromagnetic wave.
  • the reception intensity of the electromagnetic wave it is arranged to determine whether or not a device is a communication counterpart, so that the user can start the wireless communications only by bringing the devices into proximity.
  • the wireless communication module (the wireless communication unit 19 of FIG. 2 ) in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard, it is arranged to determine whether or not the device is in proximity and to transmit and receive the communication parameter, so that it is not necessary to provide the device with a dedicated module, such as the RF tag, the reader/writer, the infrared module, etc. only for detecting a neighboring device and for transmitting and receiving an information data required for establishing communications. Therefore, as compared with the case of preparing such a dedicated module, production costs of the device can be reduced.
  • a dedicated module such as the RF tag, the reader/writer, the infrared module, etc. only for detecting a neighboring device and for transmitting and receiving an information data required for establishing communications. Therefore, as compared with the case of preparing such a dedicated module, production costs of the device can be reduced.
  • FIG. 5 is a flow chart for explaining a process before the wireless communications complying with the IEEE 802.11 communications standard between the PDA 1 and a portable phone 2 of FIG. 1 are established.
  • a process in FIG. 5 is basically similar to the process in FIG. 4 , and its detailed description will be properly omitted.
  • step S 41 when the operation, by the user, of the connection button is received by the input unit 16 , then in step S 42 the key information management unit 34 of the PDA 1 generates the pair of the public key Pk and the secret key Sk.
  • step S 43 the connection request transmission unit 41 broadcasts the connection request containing the public key Pk generated by the key information management unit 34 and the communication parameter managed by the communication parameter management unit 33 .
  • step S 61 the wireless communication control unit 31 of the portable phone 2 which exists within the coverage area of the electromagnetic wave from the PDA 1 receives the connection request.
  • step S 62 the intensity judgment unit 42 measures the reception intensity of the connection request, moves the process to step S 63 , and determines whether or not the reception intensity is equal to or higher than a threshold value.
  • step S 63 when it is determined that the reception intensity of the connection request is lower than the threshold value, the intensity judgment unit 42 terminates the process.
  • the PDA 1 is specified as the device of the communication counterpart.
  • the key information management unit 34 of the portable phone 2 newly generates a WEP key to be used for the wireless communications with the PDA 1 in accordance with the IEEE 802.11 communications standard, and the communication parameter management unit 33 newly generates an ESSID which identifies the communications.
  • the thus generated ESSID and the WEP key are outputted to the encryption/decryption processing unit 32 .
  • step S 66 the wireless communication control unit 31 returns the ack (Z) containing the encrypted ESSID and WEP key to the PDA 1 .
  • the newly generated ESSID and WEP key are encrypted by means of the public key Pk provided by the PDA 1 and returned to the PDA 1 , so that only the PDA 1 having the secret key Sk can decrypt and acquire the ESSID and the WEP key.
  • step S 44 the wireless communication control unit 31 of the PDA 1 receives the ack (Z) returned from the portable phone 2 .
  • step S 45 the encryption/decryption processing unit 32 decrypts the ack (Z) by using the secret key Sk managed by the key information management unit 34 , and acquires the ESSID and the WEP key generated by the portable phone 2 .
  • step S 46 based on the acquired ESSID and the WEP key, the wireless communication control unit 31 establishes the wireless communications with the portable phones 2 , complying with the IEEE802.11 communications standard.
  • step S 67 similar to the wireless communication control unit 31 of the PDA 1 , based on the information included in the connection request, the wireless communication control unit 31 of the portable phone 2 establishes the wireless communications with the PDA 1 , complying with the IEEE 802.11 communications standard.
  • the user can establish the wireless communications between the devices, complying with the IEEE 802.11 communications standard in which security is ensured. Further, in order to establish the wireless communication, it is not necessary to provide both the devices with modules for short distance communications other than the communication modules in accordance with the IEEE 802.11 communications standard.
  • the process in FIG. 6 is similar to the process as described above with reference to FIG. 4 , except that the PDA 1 determines whether or not the reception intensity of the ack (Z) returned from the portable phone 2 to the PDA 1 is equal to or higher than the threshold value.
  • the PDA 1 determines whether or not the reception intensity of the ack (Z) returned from the portable phone 2 to the PDA 1 is equal to or higher than the threshold value.
  • step S 84 when the ack (Z) containing the session key S and the communication parameter which are encrypted by the public key Pk are received by the wireless communication control unit 31 of the PDA 1 , then in step S 85 the intensity judgment unit 42 of the PDA 1 determines whether or not the reception intensity of the electromagnetic wave which conveys the ack (Z) is equal to or higher than the threshold value. In step S 85 when it is determined that the reception intensity is lower than or equal to the threshold value, the intensity judgment unit 42 notifies the portable phone 2 , for example, that communications cannot be carried out, and terminates the process.
  • connection request at the time of carrying out the process in step S 83 .
  • the wireless communications are not performed between the PDA 1 and the portable phone 2 .
  • step S 85 when it is determined that the reception intensity of a reply from the portable phone 2 is equal to or higher than the threshold value, i.e., when it is determined that a status is continuing where the PDA 1 and the portable phone 2 are in proximity to each other, it moves the process to step S 86 .
  • the encryption/decryption processing unit 32 of the PDA 1 decrypts the ack (Z) by using the secret key Sk, and acquires the session key S and communication parameter which are generated by the portable phone 2 . Then, by using the session key S and the communication parameter which are acquired by the encryption/decryption processing unit 32 , the wireless communication control unit 31 establishes the wireless communications with portable phones 2 .
  • the PDA 1 is caused to determine the reception intensity of the reply to the connection request, to thereby reliably specify the device which establishes the wireless communications and prevent the wireless communications from being established with the devices which are not intended by the user.
  • the communication is not performed even with a device which is not actually in proximity but broadcasts the connection request at a high output level from a distant position.
  • the PDA 1 broadcasts the connection request at a high output level from the position distant from the portable phone 2 , so that the portable phone 2 determines that the PDA 1 is in proximity (the process in step S 103 determines that the reception intensity is equal to or higher than the threshold value).
  • the wireless communications are established between the PDA 1 and the portable phone 2 .
  • the PDA 1 may also be caused to determine the reception intensity of the electromagnetic wave, to thereby prevent the wireless communications as described above from being established. That is to say, the communications are established only between the devices which are actually in proximity to each other.
  • the communications are established between the devices even when they are not in proximity to each other, so that the broadcast connection request and the reply corresponding thereto may include an information data indicating an output level of the electromagnetic wave.
  • the PDA 1 having transmitted the connection request may not measure the reception intensity of the reply from the portable phone 2 so as to determine whether or not to carry out communications, but the output of the reply from the portable phone 2 may be restricted in order for the electromagnetic wave which conveys ack (Z) to cover only a small area. This may prevent the communications from being established between the device which broadcasts the connection request from the distant position at a high output level and the device which receives it.
  • FIGS. 7 A and 7 B are views for explaining a procedure of establishing the infrastructure communications in the communication system to which the present invention is applied.
  • the access point 51 includes therein the wireless communication module complying with the IEEE 802.11 communications standard or the Bluetooth communications standard, for example.
  • the connection request is broadcast from the PDA 1 .
  • the communication parameter such as the ESSID, and the WEP keys
  • the communication parameter and the WEP key are encrypted by the public key which is included in the connection request and supplied from the PDA 1 to the access point 51 , then returned to the PDA 1 .
  • the PDA 1 connects to the access point 51 .
  • the PDA 1 connects to the access point 51 , when the network to which another device belongs to is already managed by the access point 51 , the device is notified of the newly generated ESSID and the WEP key, the setup is changed in each device. In this way, the network is formed containing the device already connected to the access point 51 and the PDA 1 newly connected to the access point 51 .
  • the ESSID and the WEP key newly generated corresponding to receiving a connection request from the PDA 1 are notified also to the device 52 and the device 53 , thus changing the setup in each device.
  • a network 61 is newly formed by the PDA 1 , the device 52 , and the device 53 (an infrastructure connection type wireless communications are established).
  • the user can cause the PDA 1 to participate in the network promptly by just bringing the PDA 1 into proximity to the access point 51 , without performing complicated operations, such as setting the same ESSID and the same WEP key as those set in another device to, the PDA 1 .
  • a network setup is changed in each device by means of the ESSID and the WEP key having newly generated by the access point 51 , a more secure network can be formed. For example, even when the ESSID and the WEP key are known to those who are malicious, each time a new device participates in the network, the ESSID and the WEP key are updated, so that the ESSID and the WEP key known to those who are malicious cannot intercept the information data transmitted and received in the network where the setup is updated.
  • FIG. 8 is a block diagram showing an example of a functional structure of the access point 51 .
  • the access point 51 has substantially the same structure as the structure of the PDA 1 as shown in FIG. 2 . Therefore, FIG. 2 is suitably referred to as a structure for the access point 51 .
  • the wireless communication control unit 71 of FIG. 8 controls the wireless communications with another device performed in the wireless communication unit 19 of FIG. 2 .
  • the wireless communication control unit 71 has a network management unit 81 and an intensity judgment unit 82 .
  • the network management unit 81 provides a router function or a DHCP (Dynamic Host Configuration Protocol) function to the devices which participate in the network, and performs a process of notifying the devices having already participated in the network of the newly generated ESSID and the WEP key.
  • the intensity judgment unit 82 measures the reception intensity of the electromagnetic wave emitted by an external device, and determines whether or not the reception intensity is equal to or higher than the preset threshold value.
  • An encryption/decryption processing unit 72 encrypts the information data to be transmitted to another device, and decrypts the information received from another device when it is encrypted.
  • a communication parameter management unit 73 manages various types of parameters required for performing communications, for example, the ESSID in the IEEE 802.11 communications or the Bluetooth address, the Bluetooth clock etc. in the Bluetooth communications.
  • Key information management unit 74 generates encryption keys, such as the WEP key provided for the device participating in the network.
  • step S 121 the input unit 16 of the FDA 1 receives such instructions.
  • step S 122 the key information management unit 34 generates the public key Pk and the secret key Sk corresponding to the public key Pk.
  • step S 123 the connection request transmission unit 41 broadcasts the connection request containing the public key Pk and the communication parameter.
  • the wireless communication control unit 71 of the access point 51 which exists within the coverage area of the electromagnetic wave from the PDA 1 receives the connection request broadcast by the PDA 1 , in step S 141 .
  • the intensity judgment unit 82 of the access point 51 measures the reception intensity of the connection request, and moves the process to step S 143 so as to determine whether or not the measured reception intensity is equal to or higher than the threshold value.
  • step S 143 when it is determined that the reception intensity of the connection request is lower than or equal to the threshold value, the intensity judgment unit 82 terminates the process. On the other hand, when it is determined that is equal to or higher than the threshold value, it grants the request from the PDA 1 , and allows participation in the network.
  • step S 144 the communication parameter management unit 73 and the key information management unit 74 of the access point 51 newly generates an ESSID and a WEP key respectively, and outputs the generated ESSID and WEP key to the encryption/decryption processing unit 72 .
  • step S 146 the network management unit 81 returns the encrypted ESSID and the encrypted WEP key as the ack (Z) to the PDA 1 .
  • the network management unit 81 in step S 147 , provides the ESSID and the WEP key generated in step S 144 to all the devices participating in the network, and updates the setup in each device. For example, since the newly generated ESSID and WEP key are transmitted to each device by encrypting by means of the WEP key having so far used in the network, the newly generated ESSID and WEP key are not intercepted by a third party.
  • the wireless communication control unit 31 of the PDA 1 receives the ack (Z) returned from the access point 51 .
  • the encryption/decryption processing unit 32 decrypts the ack (Z) by using the secret key Sk, to thereby acquire the ESSID and the WEP key generated by the access point 51 .
  • step S 126 based on the ESSID and the WEP key acquired by the encryption/decryption processing unit 32 , the wireless communication control unit 31 connects to the access point 51 so as to participate in the network managed by the access point 51 .
  • the infrastructure connection type network is formed which is constituted by devices identified by the ESSID which is newly generated by the access point 51 , so that it becomes possible to transmit and receive the information through the access point 51 between those devices.
  • the user can establish even infrastructure communications by just bringing the device held by the user into proximity to the access point and build a network, without preparing modules, such as the RF tag, the reader/writer, etc., in addition to the modules in accordance with the IEEE 802.11 communications standard etc. Further, since the ESSID and the WEP key are newly generated so as to change the setup in each device participating in the network, the user can build a more secure network.
  • the user brings the device held by the user into proximity to the access point, so as to cause the device to participate in the network.
  • the access point is provided in a position to which the user cannot bring the device into proximity, such as the vicinity of ceiling indoors, for example. Therefore, apart from the access point provided in the vicinity of the ceiling etc., the user may provide a dummy point which does not have the function of managing the network, only by providing the newly generated ESSID and the WEP key in a position to which the user can easily bring the device into proximity. In this case, by bringing the device held by the user into proximity to the dummy point, the user can cause the device to participate in the network managed by the access point.
  • FIGS. 10A and 10B are views showing a procedure of establishing the infrastructure communications by bringing the device into proximity to the dummy point in the communication system to which the present invention is applied.
  • the dummy point 101 - 1 and the dummy point 101 - 2 of FIG. 10A are provided in positions to which the user can easily bring the PDA 1 into proximity, and respectively connected to the access point 51 by wire through a cable 111 - 1 and a cable 111 - 2 .
  • the dummy point 101 - 1 and the dummy point 101 - 2 have the wireless communication functions complying with the IEEE 802.11 communications standard or the Bluetooth communications standard, and provide the PDA 1 with the newly generated ESSID and the WEP key when it is determined that the PDA 1 is brought into proximity according to the reception intensity of the electromagnetic wave. Further, at this event, the dummy point 101 - 1 and the dummy point 101 - 2 transmit the same ESSID and the WEP key as those provided by the PDA 1 , to the access point 51 through the cable 111 - 1 and the cable 111 - 2 .
  • the access point 51 notifies the ESSID and the WEP key notified by the dummy point 101 - 1 or the dummy point 101 - 2 to all the devices having already participated in the network, causes them to update the setups, and grants the connection of the PDA 1 having acquired the ESSID and the WEP key from the dummy point 101 - 1 or the dummy point 101 - 2 , whereby the network 61 containing the PDA 1 is formed as shown in FIG. 10B .
  • the user can cause the PDA 1 to participate in the network managed by the access point 51 , by bringing the PDA 1 into proximity to the dummy point 101 - 1 or the dummy point 101 - 2 .
  • FIG. 11 is a block diagram showing an example of a functional structure of the access point 51 and the dummy point 101 - 1 .
  • the dummy point 101 - 2 has the same structure of the dummy point 101 - 1 as shown in FIG. 11 , and is connected with the access point 51 .
  • the same reference numerals are used for the same parts as in the access point 51 of FIG. 8 .
  • the dummy point 101 - 1 has the same structure as that of the access point 51 of FIG. 8 , except that a functional unit for managing the network is not provided. That is to say, the wireless communication control unit 121 controls the wireless communications complying with the IEEE 802.11 communications standard or the Bluetooth communications standard performed between the devices which are in proximity to each other; an intensity judgment unit 131 measures the reception intensity of the electromagnetic wave emitted from the external device and determines whether or not the reception intensity is equal to or higher than the preset threshold value.
  • an encryption processing unit 122 encrypts the ESSID generated by a communication parameter management unit 123 and the WEP key generated by the key information management unit 124 , so as to be provided from the wireless communication control unit 121 to the PDA 1 .
  • the communication parameter management unit 123 manages the communication parameters, such as the ESSID etc.
  • the key information management unit 124 generates the WEP key to be provided for the PDA 1 , etc., which is in proximity.
  • the ESSID managed by the communication parameter management unit 123 and the WEP key managed by the key information management unit 124 are outputted to the encryption processing unit 122 , and also to the cable communication control unit 125 .
  • the cable communication control unit 125 manages wired communications with the access points 51 , and transmits the ESSID supplied from the communication parameter management unit 123 and the WEP key supplied from the key information management unit 124 , to the access point 51 through the cable 111 - 1 .
  • a cable communication control unit 141 of the access point 51 receives the ESSID and the WEP key which are transmitted from the dummy point 101 - 1 , and outputs them to the wireless communication control unit 71 .
  • the network management unit 81 of the wireless communication control unit 71 transmits the ESSID and the WEP key which are transmitted from the dummy point 101 - 1 , to all the devices that have participated in the network wirelessly means so as to update the setup. Further, the network management unit 81 grants the connection from the PDA 1 having acquired the ESSID and the WEP key provided through the dummy point 101 - 1 , and causes the PDA 1 to participate in the network.
  • the process performed between the PDA 1 and the dummy point 101 - 1 is similar to the processing performed between the PDA 1 and the access points 51 as described with reference to the FIG. 5 , FIG. 9 , etc.
  • step S 181 the input unit 16 of the PDA 1 , for example, receives the operation of the connection button performed by the user, with the FDA 1 being in proximity to the dummy point 101 - 1 .
  • step S 182 the key information management unit 34 generates the public key Pk and the secret key Sk corresponding to the public key Pk.
  • the connection request transmission unit 41 in step S 183 , broadcasts the connection request containing the public key Pk and the communication parameter.
  • the wireless communication control unit 121 of the dummy point 101 - 1 receives the connection request broadcast from the PDA 1 .
  • the intensity judgment unit 131 measures the reception intensity of the connection request, then moves the process to step S 163 so as to determine whether or not the reception intensity is equal to or higher than the threshold value.
  • step S 163 if it is determined that the reception intensity of the connection request is lower than the threshold value, the intensity judgment unit 131 terminates the process. On the other hand, if it is determined that the intensity is equal to or higher than the threshold value, the process moves to step S 164 .
  • step S 164 the communication parameter management unit 123 of the dummy point 101 - 1 newly generates an ESSID, and outputs the generated ESSID to the encryption processing unit 122 and the cable communication control unit 125 . Further, the key information management unit 124 newly generates a WEP key, and outputs the generated WEP key to the encryption processing unit 122 and the cable communication control unit 125 .
  • step S 166 the wireless communication control unit 121 returns the encrypted ESSID and WEP key as the ack (Z) to the PDA 1 .
  • step S 167 the cable communication control unit 125 transmits the ESSID supplied from the communication parameter management unit 123 and the WEP key supplied from the key information management unit 124 , to the access point 51 by the cable through the cable 111 - 1 .
  • the information data other than the ESSID and the WEP key, such as the MAC address of the PDA 1 is also transmitted to the access point 51 and used for the access control in the access point 51 .
  • step S 184 the wireless communication control unit 31 of the PDA 1 receives the ack (Z) returned from the dummy point 101 - 1 .
  • step S 185 the encryption/decryption processing unit 32 decrypts the ack (Z) by using the secret key Sk so as to acquire the ESSID and the WEP key.
  • step S 186 based on the ESSID and the WEP key acquired by the encryption/decryption processing unit 32 , the wireless communication control unit 31 establishes the wireless communications complying with the IEEE 802.11 communications standard and connects to the access point 51 .
  • the network management unit 81 of the access point 51 moves to a process in step S 202 , transmits the ESSID and the WEP key wirelessly means to the device which has already participated in the network and updates the setup.
  • the infrastructure connection type network is constituted by a group of the devices containing the PDA 1 which is identified by the ESSID newly generated by the dummy point 101 - 1 , and the transmission and reception of the information data through the access point 51 are performed between networks.
  • the user can cause the PDA 1 to participate in the network managed by the access point 51 , by bringing the PDA 1 into proximity to the dummy point 101 - 1 etc.
  • the PDA 1 when the PDA 1 is brought into proximity to the dummy point, the PDA 1 is provided with a URL (Uniform Resource Locator) of a certain site through the dummy point, other than the information data, such as the ESSID and the WEP key.
  • a URL Uniform Resource Locator
  • the PDA 1 After the PDA 1 is connected to the access point 51 by performing the process of FIG. 12 , the PDA 1 may have access to a site specified by the URL through the access point 51 .
  • FIG. 13 is a view showing an example of a structure of the communication system in which the connection to the access point 51 is made by the PDA 1 based on URL provided through the dummy point, and then subsequently the access to the site specified by the URL is carried out.
  • presentation units 151 - 1 through 151 - 3 constituted by a display, such as an LCD, a poster, etc., are provided on a wall surface.
  • a display such as an LCD, a poster, etc.
  • an advertisement of a camera is presented by the presentation unit 151 - 1
  • a map is presented by the presentation unit 151 - 2
  • an advertisement of a personal computer is presented by the presentation unit 151 - 3 .
  • the dummy points 101 - 1 through 101 - 3 connected to the access point 51 through a cable (not shown) are respectively provided directly below the presentation units 151 - 1 through 151 - 3 .
  • the access point 51 is provided in the position, above the wall surface, to which it is difficult for the user to bring the PDA 1 into proximity.
  • the dummy point 101 - 1 provides the PDA 1 with a URL of an advertising site which provides detailed information on the camera presented by the presentation unit 151 - 1 .
  • the dummy point 101 - 2 provides the PDA 1 with a URL of a site which provides detailed information on the map presented by the presentation unit 151 - 2 .
  • the dummy point 101 - 3 provides the PDA 1 with a URL of an advertising site which provides detailed information on the personal computer presented by the presentation unit 151 - 3 .
  • the connection to the access point 51 is made by the performing the process in FIG. 12 by means of the PDA 1 .
  • the access to the advertising site of the camera presented by the presentation unit 151 - 1 is carried out.
  • the detailed information about the camera is displayed on a screen of the PDA 1 .
  • the user may only bring the PDA 1 into proximity to the advertisement (the dummy point) so as to check the detailed information about an article introduced by the advertisement on the screen of the PDA 1 .
  • the presentation units 151 - 1 through 151 - 3 and the dummy points 101 - 1 through 101 - 3 are disposed in different positions in the example of FIG. 13 .
  • the presentation units 151 - 1 through 151 - 3 are the posters of paper media
  • the dummy points 101 - 1 through 101 - 3 may be provided on the backs respectively.
  • the user can check the detail of the articles by using the PDA 1 by way of more intuitive operation, such as holding the PDA 1 over the advertisement.
  • the reception intensity of the reply to the connection request is measured on the PDA 1 side which is the device to broadcast the connection request (for example, FIG. 6 ).
  • the access point 51 may alternatively determine whether or not the PDA 1 is actually in proximity to any of the dummy points, and determine whether or not to grant the connection.
  • FIGS. 14A and 14B are views showing an example of a spatial relationship among the PDA 1 and the dummy points 101 - 1 through 101 - 3 .
  • the dummy points 101 - 1 through 101 - 3 respectively notify the reception intensity to the access point 51 through the cable 111 - 1 through 111 - 3 .
  • the access point 51 grants the request from the PDA 1 only when the PDA 1 has judged it is in sufficiently proximity to one dummy point 101 - 2 as compared with distances to the other two.
  • the access point 51 judges the PDA 1 is in proximity to the dummy point 101 - 2 , and grants the connection from the PDA 1 .
  • the PDA 1 is located in the position P 2 somewhat above the position P 1 , and the reception intensities of the connection requests at the dummy point 101 - 1 and the dummy point 101 - 2 are measured and result in substantially the same, so that the access point 51 does not allow the connection of the PDA 1 .
  • the PDA 1 broadcasting the connection request at a high output level can be prevented from connecting even when not in actual proximity to the dummy point.
  • the reception intensities of the connection requests received at the dummy points 101 - 1 though 101 - 3 are respectively measured as being of the same level. In this case, the connection of the PDA 1 to the access point 51 is not granted.
  • the PDA 1 of FIG. 14B broadcast the connection request at a high output level and the reception intensity of the connection request at each dummy point is not compared, if the reception intensity is equal to or higher than the predetermined threshold value, then the access to the access point 51 is granted. However, it can be prevented by comparing the reception intensities of the connection requests at respective dummy points. That is to say, it is possible to prevent the device which is not in proximity to any of the dummy points from gaining access to the access point 51 .
  • step S 211 the network management unit 81 ( FIG. 11 ) acquires the reception intensities of the connection requests at the dummy points 101 - 1 through 101 - 3 , via the cable communication control unit 141 .
  • step S 212 as compared with the other two dummy points, the network management unit 81 determines whether or not there is a dummy point which provides high reception intensity. For example, ratios of the reception intensities of the connection requests in the three dummy points are calculated, and for the highest ratio of them, it is determined whether or not it is higher than the preset threshold value.
  • the network management unit 81 terminates the process.
  • the connection of a device which is not in proximity to any dummy point is not granted.
  • step S 212 when it is determined in step S 212 that there is a dummy point which provides high reception intensity as compared with the other two dummy points, the network management unit 81 moves the process to step S 213 , judges the device is in sufficiently proximity to the dummy point which provides a high reception intensity, and grants the connection of the device. After that, based on the ESSID and the WEP key which are provided through the dummy point, the device granted to be connected is connected with the access point 51 .
  • the number of the dummy points is not restricted to three. That is to say, by comparing the reception intensities of the connection requests, any number of dummy points may be provided, if it is possible to determine whether or not a device is in proximity to any of the dummy points.
  • the dummy points are provided and fixed to the wall surface, etc., they may be prepared as portable device as shown in FIG. 16 , for example.
  • FIG. 16 is a view showing a situation where a portable dummy point 121 (hereinafter, referred to as the portable dummy point 121 ) and a personal computer 122 are in proximity to each other.
  • a portable dummy point 121 hereinafter, referred to as the portable dummy point 121
  • a personal computer 122 are in proximity to each other.
  • the portable dummy point 121 is brought into proximity to the personal computer 122 . As described above with reference to FIG. 12 , when it is determined that the reception intensity of the electromagnetic wave transmitted from the personal computer 122 is higher than the predetermined threshold value, it generates the ESSID and the WEP key, etc., and provides them to the personal computer 122 . Further, at this event, the portable dummy point 121 transmits those information data provided for the personal computer 122 also to an access point (not shown), and changes setup of the access point so that access from the personal computer 122 can be granted.
  • the personal computer 122 can participate in the network managed by the access point.
  • the portable dummy point 121 for example, is prepared in a space which provides wireless Internet connection services like Hotspot (a trademark).
  • Hotspot a trademark
  • an administrator of services owns the portable dummy point 121 , and the administrator brings the portable dummy point 121 into proximity to a personal computer of a user having paid service charges, then the portable dummy point 121 is utilized by granting connection to the Internet etc.
  • the portable dummy point 121 for example, is prepared for a conference room, etc.
  • each participant at the meeting brings the portable dummy point 121 into proximity to his or her personal computer, and then the portable dummy point 121 is utilized when building a network constituted by the participant's personal computer.
  • the transmission may be carried out when the portable dummy point 121 and an access point are in proximity to each other and when the judgment is performed based on the intensity of the received electromagnetic wave as described above, so that the intensity is judged to be equal to or higher than the threshold value.
  • the transmission of the information data, such as the ESSID and the WEP key, from the portable dummy point 121 to the access point may be performed by wire through the cable which is connected to the portable dummy point 121 , or wirelessly for relatively short distances using a contactless IC tag, infrared rays, etc., whereby, the information data, such as the ESSID and the WEP key, can be prevented from being known to a third party.
  • a computer program which constitutes the software is installed, over the network or from the recording medium, in a computer built in dedicated hardware or a general purpose personal computer in which various types of programs are installed so as to execute various types of functions, for example.
  • the recording medium may be not only package media including the magnetic disk 21 (including a flexible disk), the optical disks 22 (including a CD-ROM (Compact Disk-Read Only Memory), a DVD (Digital Versatile Disc)), the magneto-optical disks 23 (including an MD (a registered trademark) (Mini-Disc)), or the semiconductor memory 24 which are apart from the apparatus itself, distributed in order to provide the user with the program and have recorded therein the program, but also the ROM 12 and the storage unit 18 on which the program is recorded and which are provided for the user, being pre-installed in the apparatus itself.
  • the magnetic disk 21 including a flexible disk
  • the optical disks 22 including a CD-ROM (Compact Disk-Read Only Memory), a DVD (Digital Versatile Disc)
  • the magneto-optical disks 23 including an MD (a registered trademark) (Mini-Disc)
  • the semiconductor memory 24 which are apart from the apparatus itself, distributed in order to provide the user with the program and have recorded therein the program, but also the
  • steps which describe the computer program recorded in the recording medium include processes performed in chronological order according to the description but also processes carried out in parallel or individually, even if they are not necessarily processed in chronological order.
  • the word system can be used to mean a whole arrangement constituted by a plurality of apparatuses.

Abstract

The present invention provides easy and prompt initiation of wireless communications in which security is ensured requiring additional hardware. A connection button of a PDA or first device is operated and a connection request is broadcast. If the PDA and a portable phone are in near each other, and a reception intensity of the connection request is equal to or higher than a threshold value, a request of the PDA is granted by the portable phone. Then, an encryption key is newly generated by the portable phone, and is transmitted to the PDA. An encryption key and communication parameter transmitted from the portable phone are acquired. Encrypted communications using the encryption key generated by the portable phone are established based on the communication parameter.

Description

    CROSS REFERENCES TO RELATED APPLICATIONS
  • The subject matter of application Ser. No. 10/976,272, is incorporated herein by reference. The present application is a Continuation of U.S. Ser. No. 10/976,272, filed Oct. 28, 2004, now U.S. Pat. No. 8,345,881, issued Jan. 1, 2013, which claims priority to Japanese Patent Application No. JP2003-373312, filed in the Japanese Patent Office on Oct. 31, 2003, the entire contents of which being incorporated herein by reference to the extent granted by law.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to a communication system, information processing apparatus and method, and a computer program, and particularly to a communication system, information processing apparatus and method, and a computer program capable of easily and promptly starting wireless communications in which security is ensured without additional hardware.
  • 2. Related Art
  • In recent years, electronics devices equipped with a wireless communication function typically in accordance with the IEEE (Institute of Electrical and Electronics Engineers) 802.11 communications standard and the Bluetooth (Bluetooth (registered trademark)) communications standard have been widely used.
  • Information which needs to be kept confidential, such as information relating with privacy etc., is also transmitted and received between apparatuses having the above-mentioned wireless communication function, so that there is a need for security countermeasures to prevent a third party from intercepting, falsifying such information and carrying out unauthorized network access.
  • For example, in the IEEE 802.11 communications standard, a user registers beforehand a secret key called a WEP (Wired Equivalent Privacy) key with a device for communicating, and performs encrypted communications by using the WEP key, to thereby secure safety of the communications. Further, a digital certificate is issued beforehand so as to authenticate a device of a communication counterpart by using the certificate at the time of starting communications, to thereby determine whether it is a right communication counterpart or not, and secure safety.
  • By the way, if registration of information on such a key and issue of the certificate are always performed beforehand in order to secure safety, it is not possible to promptly respond to switching of connection parties of wireless communications. It is not possible to promptly respond to temporary connections, such as for example, connecting two portable devices temporarily by radio so as to transmit a certain file, connecting a digital camera temporarily by radio with a printer installed in a store so as to print imaged photographs, connecting a video camera with a portable phone temporarily by radio so as to remotely control the video camera by using the portable phone, etc.
  • Then, in order to specify a connection party easily, and to promptly start wireless communications with a specified device, Japanese Laid-Open Patent Application No 2002-204239, for example, discloses that a portable phone having a built-in RF tag is brought into proximity with a personal computer having a built-in reader/writer, so that identification information data of both devices are transmitted and received between the RF tag and the reader/writer. Then, the Bluetooth communications are established between the portable phone and the personal computer, based on the transmitted and received identification information data.
  • Further, it has been proposed conventionally that a secret key is shared between two devices in short distance wireless communications by means of the RF tag and the reader/writer or in short distance wireless communications by means of infrared modules provided in both the devices. Therefore, for example, the Bluetooth communications established in such a way as to be disclosed in Patent Document 1 are encrypted by using the secret key which is transmitted and received in the short distance wireless communications, so that the user may only bring both the devices into proximity with each other so as to promptly start the Bluetooth communications in which the security is ensured.
  • SUMMARY OF THE INVENTION
  • However, as described above, in order to transmit and receive the identification information data and the secret key between both the devices, it is necessary for both the devices to be provided with short distance wireless communication modules, such as the RF tag, the reader/writer, or the infrared module, in addition to the wireless communication module, such as the Bluetooth communications etc., which can perform communications even in a relatively distant position.
  • Therefore, although the RF tag, the infrared module, etc. are only for establishing the Bluetooth communications etc. by means of the wireless communication module provided in addition to them, it is necessary to prepare them for causing the Bluetooth communication etc. to start promptly only by bringing the devices into proximity to each other, which increases the cost accordingly.
  • The present invention has been conceived in view of a situation as described above, and aims to granting easy and prompt start of the wireless communications in which security is ensured without additional hardware, such as the RF tag and the infrared module.
  • A first information processing apparatus of a communication system in accordance with the present invention includes: a first transmission means or transmitter for wirelessly broadcasting a connection request containing a public key; a first reception means or receptor for receiving a key information which is transmitted wirelessly from a second information processing apparatus for judging a reception intensity of an electromagnetic wave which conveys the connection request broadcast by the first transmission means is higher than a preset threshold value, the key information being generated by the second information processing apparatus and encrypted by the public key; and a first establishment means for decrypting the key information received by the first reception means by using a secret key corresponding to the public key and so that wireless communications encrypted by the key information may be established with the second information processing apparatus.
  • Further, a second information processing apparatus of the communication system in accordance with the present invention includes: a second reception means or receptor for receiving a connection request transmitted from the first information processing apparatus; a generation means or generator for generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a second transmission means for encrypting by means of a public key and transmitting to the first information processing apparatus the key information generated by the generation means; and a second establishment means for establishing wireless communication, encrypted by the key information, with the first information processing apparatus.
  • The first information processing apparatus of the present invention further includes: a transmission means or transmitter for wirelessly broadcasting a connection request containing a public key; a reception means or receptor for receiving a key information wirelessly transmitted from another information processing apparatus which judges a reception intensity of an electromagnetic wave for conveying the connection request broadcast by the transmission means is higher than a preset threshold value, the key information being generated by the other information apparatus and encrypted by the public key; and an establishing means for decrypting the key information received by the reception means by using a secret key corresponding to the public key so as to establish wireless communications encrypted by the key information with the other information processing apparatus, wherein the establishing means establishes the wireless communications with the other information processing apparatus when the reception intensity of the electromagnetic wave which conveys the key information transmitted from the other information processing apparatus is higher than the preset threshold value.
  • A first information processing method in accordance with the present invention includes: a transmission step of wirelessly broadcasting a connection request containing a public key; a reception step of receiving a key information wirelessly transmitted from another information processing apparatus which judges a reception intensity of an electromagnetic wave for conveying the connection request broadcast by processing the transmission step is higher than a preset threshold value, the key information being generated by the other information processing apparatus and encrypted by means of the public key; and an establishment step of decrypting the key information received by processing the reception step by using a secret key corresponding to the public key so as to establish wireless communication, encrypted by the key information, with the other information processing apparatus, wherein by processing the establishment step, the wireless communications are established with the other information processing apparatus when the reception intensity of the electromagnetic wave which conveys the key information transmitted from the other information processing apparatus is higher than the preset threshold value.
  • A first computer program of the present invention includes: a transmission step of wirelessly broadcasting a connection request containing a public key; a reception step of receiving a key information transmitted wirelessly from another information processing apparatus which judges a reception intensity of an electromagnetic wave for conveying a connection request broadcast by processing the transmission step is higher than a preset threshold value, the key information being generated by the other information processing apparatus and encrypted by means of the public key; and an establishment step of decrypting the key information, received by processing the reception step, by using the secret key corresponding to the public key so as to establish wireless communications encrypted by means of the key information with the other information processing apparatus, wherein by processing the establishment step, the wireless communications are established with the other information processing apparatus when the reception intensity of the electromagnetic wave which conveys the key information transmitted from the other information processing apparatus is higher than the preset threshold value.
  • A second information processing apparatus of the present invention includes: a reception means for receiving a connection request containing a public key transmitted from another information processing apparatus; a generation means for generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a transmission means for encrypting the key information, generated by the generation means, by means of the public key so as to transmit it to the other information processing apparatus; and an establishment means for establishing wireless communications encrypted by means of the key information with the other information processing apparatus.
  • The generation means can generate different key information each time an electromagnetic wave which conveys the connection request is received at reception intensity higher than the preset threshold value.
  • A second information processing method of the present invention includes: a reception step of receiving a connection request containing a public key transmitted from another information processing apparatus; a generation step of generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a transmission step of encrypting the key information, generated by processing the generation step, by means of the public key so as to transmit it to another information processing apparatus; and an establishment step of establishing wireless communication, encrypted by means of the key information, with the other information processing apparatus.
  • A second computer program of the present invention includes: a reception step of receiving a connection request containing a public key transmitted from another information processing apparatus; a generation step of generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a transmission step for encrypting by means of a public key and transmitting to the information processing apparatus the key information generated by the generation step; and an establishment step of establishing wireless communications encrypted by the key information with the other information processing apparatus.
  • A third information processing apparatus of the present invention includes: a reception means for receiving a connection request containing a public key transmitted from another information processing apparatus; a generation means for generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a first transmission means for encrypting the key information, generated by the generation means, by means the public key so as to transmit the encrypted key information to the other information processing apparatus together with an information data for connecting to a communication management device which manages wireless communication; and a second transmission means for transmitting the key information generated by the generation means to the communication management device by wire.
  • A third information processing method of the present invention includes: a reception step of receiving a connection request containing a public key transmitted from another information processing apparatus; a generation step of generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a first transmission step of encrypting the key information, generated by processing the generation step, by means of the public key so as to transmit the encrypted key information to the other information processing apparatus together with an information data for connecting to a communication management device which manages wireless communication; and a second transmission step of transmitting the key information generated by processing the generation step to the communication management device by wire.
  • A third computer program of the present invention includes: a reception step of receiving a connection request containing a public key transmitted from another information processing apparatus; a generation step of generating a key information when a reception intensity of an electromagnetic wave which conveys the connection request is higher than a preset threshold value; a first transmission step of encrypting the key information, generated by processing the generation step, by means of the public key so as to transmit the encrypted key information to the other information processing apparatus together with an information data for connecting to a communication management device which manages wireless communication; and a second transmission step of transmitting the key information generated by processing the generation step to the communication management device by wire.
  • In the communication system of the present invention, the connection request containing the public key is broadcast wirelessly means, the key information is received which is transmitted wirelessly from the second information processing apparatus for judging the reception intensity of the electromagnetic wave for conveying the broadcast connection request is higher than the preset threshold value, the key information being generated by the second information processing apparatus and encrypted by means of the public key. Further, the received key information is decrypted by using the secret key corresponding to the public key. The wireless communications encrypted by the key information is established with the second information processing apparatus. Further, when the connection request transmitted from the first information processing apparatus is received and the reception intensity of the electromagnetic wave which conveys the connection request is higher than the preset threshold value, then the key information is generated. The generated key information is encrypted by means of the public key so as to be transmitted to the first information processing apparatus, whereby the wireless communications encrypted by means of the key information is established with the first information processing apparatus.
  • In the first information processing apparatus and the first information processing method, and the first computer program of the present invention, the connection request containing the public key is broadcast wirelessly means, and the key information is received which is wirelessly transmitted from another information processing apparatus for judging the reception intensity of the electromagnetic wave for conveying the broadcast connection request is higher than the preset threshold value, the key information being generated by the other information processing apparatus and encrypted by means of the public key. Further, the received key information is decrypted by using the secret key corresponding to the public key, and the wireless communications encrypted by the key information is established with the other information processing apparatus.
  • Establishment of the wireless communications is realized with the other information processing apparatus, when the reception intensity of the electromagnetic wave which conveys the key information transmitted from the other information processing apparatus is higher than the preset threshold value.
  • In the second information processing apparatus and the second information processing method, and the second computer program of the present invention, when the connection request is received which contains the public key transmitted from another information processing apparatus, and when the reception intensity of the electromagnetic wave which conveys the connection request is higher than the preset threshold value, then the key information is generated. Further, the generated key information is encrypted by means of the public key so as to be transmitted to another information processing apparatus, whereby the wireless communications encrypted by means of the key information is established with another information processing apparatus.
  • In the third information processing apparatus and the third information processing method, and the third computer program of the present invention, when the connection request is received which contains the public key transmitted from another information processing apparatus, and when the reception intensity of the electromagnetic wave which conveys the connection request is higher than the preset threshold value, then the key information is generated. Further, the generated key information is encrypted by means of the public key, and the encrypted key information is transmitted to another information processing apparatus together with the information data for connecting to the communication management device which manages the wireless communications. The generated key information is transmitted to the communication management device by wire.
  • Therefore, according to a preferred embodiment of the present invention, it is possible to start wireless communications easily and promptly.
  • Further, according to a preferred embodiment of the present invention, it is possible to secure wireless communications in which security is ensured, without requiring a complicated setup.
  • Furthermore, according to a preferred embodiment of the present invention, it is possible to prevent the wireless communications from being performed with a device which is not intended by a user.
  • The above and other objects, features and advantages of the present invention will become more apparent from the following description of the presently preferred exemplary embodiments of the invention taken in conjunction with the accompanying drawings, in which:
  • FIG. 1A and FIG. 1B are views showing a procedure of establishing ad hoc communications;
  • FIG. 2 is a block diagram showing an example of a structure of a PDA;
  • FIG. 3 is a block diagram showing an example of a functional structure of the PDA;
  • FIG. 4 is a flow chart for explaining a wireless communication establishment process performed by the PDA and a portable phone of FIG. 1;
  • FIG. 5 is a flow chart for explaining an example of a process in FIG. 4;
  • FIG. 6 is a flow chart for explaining another wireless communication establishment process performed by the PDA and the portable phone of FIG. 1;
  • FIGS. 7A and 7B are views showing a procedure of establishing infrastructure communications;
  • FIG. 8 is a block diagram showing an example of a structure of an access point;
  • FIG. 9 is a flow chart for explaining a process performed by the PDA and the access point;
  • FIGS. 10A and 10B are views showing a procedure of establishing the infrastructure communications by bringing a device into proximity to a dummy point;
  • FIG. 11 is a block diagram showing an example of a structure of the access point and the dummy point;
  • FIG. 12 is a flow chart for explaining a communication establishment process performed by the PDA, the access point, and the dummy point;
  • FIG. 13 is a view showing an example of a structure of a communication system to which the present invention is applied;
  • FIGS. 14A and 14B are views showing an example of a spatial relationship between the dummy point and the PDA;
  • FIG. 15 is a flow chart for explaining a process at the access point; and
  • FIG. 16 is a view showing a situation where a portable dummy point and a personal computer are in proximity to each other.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS OF THE PRESENT INVENTION
  • Hereafter, preferred embodiments of the present invention will be described. The description is for confirming that the preferred embodiments which support the invention recited in a claim is described in the present specification. Therefore, if there is an embodiment which is described in the preferred embodiments of the invention and not described herein as one corresponding to the invention, it does not mean that the embodiment does not correspond to the invention. In contrast, if the embodiment is described as one corresponding to the invention, it does not mean that the embodiment does not correspond to any invention other than the presently described invention.
  • Further, this description does not mean the entire invention as described in the present specification. In other words, this description does not deny existence of the invention which is described in the present specification but not claimed in this application, i.e. existence of the invention to be divided into a divisional application or to be added through amendments in the future.
  • According to a preferred embodiment of the present invention, a communication system is provided. The communication system is a communication system which includes a first information processing apparatus (for example, a PDA 1 of FIG. 1A) and a second information processing apparatus (for example, a portable phone 2 of FIG. 1A, an access point 51 of FIG. 7A). The first information processing apparatus includes: a first transmission means (for example, a connection request transmission unit 41 of FIG. 3) for wirelessly broadcasting a connection request containing a public key (for example, the public key Pk generated in step S2 of FIG. 4); a first reception means (for example, a wireless communication control unit 31 of FIG. 3 for performing a process of step S4 of FIG. 4) for receiving key information (for example, a session key S) transmitted wirelessly from the above-mentioned second information processing apparatus (for example, a portable phone 2 of FIG. 1A) which judges a reception intensity of an electromagnetic wave for conveying the above-mentioned connection request broadcast by the above-mentioned first transmission means is higher than a preset threshold value, a key information being generated by the above-mentioned second information processing apparatus and encrypted by the above-mentioned public key; and a first establishment means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S6 of FIG. 4) for decrypting the above-mentioned key information received by the above-mentioned first reception means by using a secret key (for example, a secret key Sk generated in step S2 of FIG. 4) corresponding to the above-mentioned public key so as to establish wireless communications (for example, wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard), encrypted by the above-mentioned key information, with the above-mentioned second information processing apparatus.
  • Further, the second information processing apparatus includes: a second reception means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S21 of FIG. 4) for receiving the above-mentioned connection request transmitted from the above-mentioned first information processing apparatus; a generation means for generating the above-mentioned key information (for example, key information management unit 34 of FIG. 3) when the reception intensity of an electromagnetic wave for conveying the above-mentioned connection request is higher than a preset threshold value; a second transmission means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S26 of FIG. 4) for encrypting the above-mentioned key information, generated by the above-mentioned generation means, by means of the above-mentioned public key so as to transmit key information to the above-mentioned first information processing apparatus; and a second establishment means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S27 of FIG. 4) for establishing wireless communications, encrypted by means of the above-mentioned key information (for example, a wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard), with the above-mentioned first information processing apparatus.
  • Also, according to a preferred embodiment of the present invention, a first information processing apparatus is provided. The information processing apparatus (for example, the PDA 1 of FIG. 1A) includes: a transmission means (for example, the connection request transmission unit 41 of FIG. 3) for wirelessly broadcasting a connection request containing a public key (for example, the public key Pk generated in step S2 of FIG. 4); a reception means (for example, the wireless communication control unit 31 of FIG. 3 for performing a process in step S4 of FIG. 4) for receiving key information (for example, the session key S) transmitted wirelessly from another information processing apparatus (for example, the portable phone 2 of FIG. 1A) which judges the reception intensity of an electromagnetic wave for conveying the above-mentioned connection request broadcast by the above-mentioned transmission means is higher than a preset threshold value, the key information being generated by the above-mentioned other information processing apparatus and encrypted with the above-mentioned public key; an establishment means (for example, the wireless communication control unit 31 of FIG. 3 for performing the process in step S6 of FIG. 4) for decrypting the above-mentioned key information, received by the above-mentioned reception means, by using a secret key (for example, the secret key Sk generated in step S2 of FIG. 4) corresponding to the above-mentioned public key so as to establish wireless communications, encrypted by the above-mentioned key information (for example, the wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard), with the above-mentioned other information processing apparatus, wherein the above-mentioned establishment means establishes the above-mentioned wireless communications with the above-mentioned other information processing apparatus when the reception intensity of an electromagnetic wave which conveys the above-mentioned key information transmitted from the above-mentioned other information processing apparatus is higher than a preset threshold value (for example, the PDA 1 of FIG. 1A for performing the process in FIG. 6).
  • According to a preferred embodiment of the present invention, a first information processing method is provided. The information processing method includes: a transmission step (for example, step S3 of FIG. 4) of broadcasting a connection request containing a public key (for example, the public key Pk generated in step S2 of FIG. 4) wirelessly means; a reception step (for example, step S4 of FIG. 4) of receiving key information (for example, the session key S) generated by the above-mentioned other information processing apparatus (for example, the portable phone 2 of FIG. 1A) which judges the reception intensity of an electromagnetic wave for conveying the above-mentioned connection request broadcast by processing the above-mentioned transmission step is higher than a preset threshold value; and an establishment step (for example, step S6 of FIG. 4) of decrypting the above-mentioned key information received by processing the above-mentioned reception step by using a secret key (for example, the secret key Sk generated in step S2 of FIG. 4) corresponding to the above-mentioned public key, so as to establish wireless communications, encrypted by the above-mentioned key information (for example, the wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard), with the other information processing apparatus, wherein the wireless communications is established with the above-mentioned other information processing apparatus, when the reception intensity of the electromagnetic wave for conveying the key information transmitted from other information processing apparatuses is higher than the preset threshold value.
  • According to a preferred embodiment of the present invention, a first computer program is provided. Also in the first computer program, the preferred embodiment to which each step corresponds (however, an example) is similar to the first information processing method of the present invention.
  • According to a preferred embodiment of the present invention, a second information processing apparatus is provided. The information processing apparatus (for example, the portable phone 2 of FIG. 1A, the access point 51 of FIG. 7A) includes: a reception means (for example, the wireless communication control unit 31 of FIG. 3 for performing the process in step S21 of FIG. 4) for receiving a connection request containing a public key (for example, the public key Pk generated in step S2 of FIG. 4) transmitted from another information processing apparatus (for example, the PDA 1 of FIG. 1A); a generation means for generating key information (for example, the key information management unit 34 of FIG. 3) when the reception intensity of an electromagnetic wave which conveys the above-mentioned connection request is higher than a preset threshold value; a transmission means for encrypting the above-mentioned key information, generated by the above-mentioned generation means, with the above-mentioned public key so as to be transmitted to the above-mentioned other information processing apparatus (for example, the wireless communication control unit 31 of FIG. 3 for performing the process in step S26 of FIG. 4); and an establishment means (for example, the wireless communication control unit 31 of FIG. 3 for performing the process in step S27 of FIG. 4) for establishing wireless communications with the above-mentioned other information processing apparatus, the wireless communications being encrypted by the above-mentioned key information (for example, the wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard).
  • The above-mentioned generation means can generate different key information each time an electromagnetic wave which conveys the above-mentioned connection request is received at a reception intensity higher than the preset threshold value.
  • According to a preferred embodiment of the present invention, a second information processing method is provided. The information processing method includes: a reception step (for example, step S21 of FIG. 4) of receiving a connection request containing a public key (for example, the public key Pk generated in step S2 of FIG. 4) transmitted from another information processing apparatus (for example, the PDA 1 of FIG. 1A); a generation step (for example, step S24 of FIG. 4) of generating key information when the reception intensity of an electromagnetic wave which conveys the above-mentioned connection request is higher than a preset threshold value; a transmission step (for example, step S26 of FIG. 4) of encrypting the above-mentioned key information, generated by processing the above-mentioned generation step, by the above-mentioned public key, so as to be transmitted to the above-mentioned other information processing apparatus; and a establishment step (for example, step S27 of FIG. 4) of establishing wireless communications with the above-mentioned other information processing apparatus, the wireless communications being encrypted by means of the above-mentioned key information (for example, the wireless communications in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard).
  • According to a preferred embodiment of the present invention, a second computer program is provided. Also in the second computer program, the preferred embodiment (however, one example) to which each step corresponds is similar to the second information processing method of the present invention.
  • According to a preferred embodiment of the present invention, a third information processing apparatus is provided. The third information processing apparatus (for example, a dummy point 101-1 of FIG. 10A) includes: a reception means (for example, a wireless communication control unit 121 of FIG. 11 for performing a process in step S161 of FIG. 12) for receiving a connection request containing a public key (for example, the public key Pk generated in step S182 of FIG. 12) transmitted from another information processing apparatus (for example, the PDA 1 of FIG. 1A); a generation means (for example, key information management unit 124 of FIG. 11) for generating key information when the reception intensity of a electromagnetic wave which conveys the above-mentioned connection request is higher than a preset threshold value; a first transmission means (for example, the wireless communication control unit 121 of FIG. 11 for performing a process in step S166 of FIG. 12) for encrypting the above-mentioned key information, generated by the above-mentioned generation means, by means of the above-mentioned public key so as to transmit the above-mentioned encrypted key information to the above-mentioned other information processing apparatus together with information for connecting to a communication management device (for example, an access point 51 of FIG. 10A) which manages wireless communication; and a second transmission means (for example, a cable communication control unit 125 of FIG. 11 for performing a process in step S167 of FIG. 12) for transmitting the above-mentioned key information generated by the above-mentioned generation means to the above-mentioned communication management device by wire.
  • According to a preferred embodiment of the present invention, a third information processing method is provided. The third information processing method includes: a reception step (for example, step S161 of FIG. 12) of receiving a connection request containing a public key (for example, the public key Pk generated in step S182 of FIG. 12) transmitted from another information processing apparatus (for example, the PDA 1 of FIG. 1A); a generation step (for example, step S164) of generating key information when the reception intensity of an electromagnetic wave which conveys the above-mentioned connection request is higher than a preset threshold value; a first transmission step (for example, step S166 of FIG. 12) of encrypting the above-mentioned key information, generated by processing the above-mentioned generation step, by means of the above-mentioned public key so as to transmits the above-mentioned encrypted key information to the above-mentioned other information processing apparatus together with information for connecting to a communication management device (for example, the access point 51 of FIG. 10A) which manages wireless communication; and a second transmission step (for example, step S167 of FIG. 12) of transmitting the above-mentioned key information generated by processing the above-mentioned generation step to the above-mentioned communication management device by wire.
  • According to a preferred embodiment of the present invention, a third computer program is provided. Also in the third computer program, the preferred embodiment (however, one example) to which each step corresponds is similar to the third information processing method of the present invention.
  • Hereinafter, the preferred embodiments of the present invention will be described with reference to the attached figures.
  • In the communication system to which the present invention is applied, FIG. 1A and FIG. 1B are views showing a procedure of establishing ad hoc communications between devices.
  • In the PDA 1 and the portable phone 2, for example, modules are included respectively which are capable of performing the wireless communications by means of the electromagnetic wave and which are complying with the IEEE (Institute of Electrical and Electronics Engineers) 802.11 communications standard (IEEE 802.11a/b/g etc.) or the Bluetooth (Bluetooth) communications standard.
  • For example, when a user operates a button provided on a surface of the PDA 1 and instructs the PDA 1 to be connected, the connection request containing an address of the PDA 1 etc. is broadcast from the PDA 1. As shown in FIG. 1A, when the FDA 1 and the portable phone 2 are in proximity with each other, and when it is determined that the reception intensity of the electromagnetic wave (electromagnetic wave which conveys the connection request) from the PDA 1 is equal to or higher than a preset threshold value, the portable phone 2 grants the request from the PDA 1 and communicates with the PDA 1.
  • At this event, the portable phone 2 newly generates an encryption key used for the communications with the PDA 1, and transmits the generated encryption key and a communication parameter, such as the address of the portable phone 2 to the PDA 1. In addition, in the connection request from the PDA 1, the public key generated by the PDA 1 is also contained, the encryption key (encryption key generated by means of the portable phone 2) encrypted by means of the public key and the communication parameter are transmitted from the portable phone 2 to the PDA 1.
  • Since the PDA 1 has a secret key (an individual key) corresponding to the public key which is broadcast and included in the connection request, the encryption key and the communication parameter which are transmitted from the portable phone 2 are acquired by using the secret key. As shown in a solid line arrow of FIG. 1B, the wireless communications complying with the IEEE 802.11 communications standard or the Bluetooth communications standard is established with the portable phones 2. Then, encrypted communications by using the encryption key generated by the portable phone 2 are performed with the PDA 1 and the portable phones 2.
  • As described above, only when the reception intensity of the connection request broadcast from one apparatus is equal to or higher than a threshold value, peer-to-peer type ad hoc communications not via the access point are started between both the devices. Therefore, without performing complicated setups, the user can establish communications promptly by means of an intuitive operation of bringing the device held by the user into proximity to a device by which the user intends to perform the wireless communications.
  • Further, since the encrypted communications are carried out by means of the encryption key generated by the portable phone 2 which is a device having received the connection request, even when there is another device within an electromagnetic wave covering area, the apparatus cannot intercept the information transmitted and received between the PDA 1 and the portable phone 2. In other words, the user can promptly establish the wireless communications in which safety is also secured. The processing before the communications are established between the PDA 1 and the portable phone 2 will be described later referring to a flow chart.
  • FIG. 2 is a block diagram showing an example a structure of the PDA 1.
  • A CPU (Central Processing Unit) 11 performs various types of processes according to a computer program loaded from a ROM (Read Only Memory) 12 or a storage unit 18 into a RAM (Random Access Memory) 13. In the RAM 13, data etc. are suitably stored which are necessary for the CPU 11 to perform various types of processes.
  • The CPU 11, the ROM 12, and the RAM 13 are mutually connected through a bus 14, and an input/output interface 15 is also connected with the bus 14.
  • Connected to the input/output interface 15 are various types of buttons and jog dials; an input unit 16 which is a touch panel etc. and superposed on, for example an LCD (Liquid Crystal Display) constituting an output unit 17; a display unit which is an LCD etc.; the output unit 17 which is a speaker, etc; and the storage unit 18 which is a flash memory etc.
  • Further, a wireless communication unit 19 which is a wireless communication module complying with the IEEE 802.11 communications standard or the Bluetooth communications standard is also connected to the input/output interface 15. The wireless communication unit 19 performs the wireless communications, complying with the IEEE 802.11 communications standard, for example, with the portable phones 2, under control of the CPU 11 through the bus 14 and the input/output interface 15.
  • A drive 20 is also connected to the input/output interface 15 as needed. A magnetic disk 21, an optical disc 22, an optical magnetic disc 23, a semiconductor memory 24, etc. are suitably installed in the drive 20.
  • FIG. 3 is a block diagram showing an example of a functional structure of the PDA 1. Each function in FIG. 3 is realized by executing a control program by means of the CPU 11 of FIG. 2.
  • The wireless communication control unit 31 establishes the wireless communications with another device at the wireless communication unit 19 of FIG. 2 and controls the established wireless communications. Further, the wireless communication control unit 31 has a connection request transmission unit 41 and an intensity judgment unit 42. The connection request transmission unit 41 broadcasts the connection request containing the public key and an address of the PDA 1 etc., according to instructions from the user. The public key broadcast by the connection request transmission unit 41 is generated and supplied by the key information management unit 34. The intensity judgment unit 42 measures the reception intensity of the electromagnetic wave emitted, for example, by an external device in the wireless communication unit 19, and determines whether or not the reception intensity is equal to or higher than the threshold value.
  • By using the key information supplied from the key information management unit 34, an encryption/decryption processing unit 32 encrypts an information data to be transmitted to another device, and decrypts the information data when the information data received from another device is encrypted.
  • A communication parameter management unit 33 manages various types of parameters required for performing communications, for example, an ESSID (Extended Service Set ID) in the IEEE 802.11 communications, or a Bluetooth address, a Bluetooth clock, etc. in the Bluetooth communications.
  • The key information management unit 34 manages the encryption key provided by the device of a communication counterpart, generates the public key and the secret key corresponding to the public key as needed, and manages their key information. The key information managed by the key information management unit 34 is suitably provided for the encryption/decryption processing unit 32.
  • In addition, also the portable phone 2 of FIG. 1 fundamentally has the same structure as the structures of FIG. 2 and FIG. 3, except that a processing unit for a sound signal which is inputted when the user speaks and a communication unit for performing communications with a base station are added further. Therefore, hereafter, FIG. 2 and FIG. 3 are suitably referred to the structure of the portable phone 2.
  • Next, referring to a flow chart of FIG. 4, a wireless communication establishment process performed by the PDA 1 and the portable phone 2 of FIG. 1 will be described.
  • For example, when a connection button provided on a surface is depressed, the input unit 16 of the PDA 1 receives an input (operation of the connection button) from the user in step S1.
  • In step S2, the key information management unit 34 generates and manages a pair of the public key Pk and the secret key Sk (secret key Sk which can decrypt the information data encrypted by means of the public key Pk) corresponding to the public key Pk. The key information management unit 34 supplies the generated public key Pk to the wireless communication control unit 31. Then, the communication parameter containing the address of the PDA 1 etc. is also supplied from the communication parameter management unit 33 to the wireless communication control unit 31.
  • In step S3, the connection request transmission unit 41 controls the wireless communication unit 19 and broadcasts the connection request containing the public key Pk and the communication parameter. Since the connection request is not encrypted, a device which exists within a coverage area of the electromagnetic wave emitted from the wireless communication unit 19 of a PDA 11 can receive the connection request and acquire the public key Pk, etc.
  • When the portable phone 2 is within the coverage area of the electromagnetic wave from the PDA 1, in step S21 the wireless communication control unit 31 of the portable phone 2 receives the connection request transmitted from the PDA 1, and outputs the public key Pk contained in the connection request to the encryption/decryption processing unit 32. In step S22 the intensity judgment unit 42 of the portable phone 2 measures the reception intensity (reception intensity of the electromagnetic wave which conveys the connection request) of the connection request, moves the process to step S23, and determines whether or not the reception intensity is equal to or higher than the threshold value.
  • In step S23, when it is determined that the reception intensity of the connection request is lower than or equal to the threshold value, then the intensity judgment unit 42 terminates the process. Therefore, when a distance between the PDA 1 and the portable phone 2 is comparatively large, even if the portable phone 2 has received the connection request, subsequent communications are not performed between the PDA 1 and the portable phone 2.
  • On the other hand, in step S23 when it is determined that the reception intensity of the connection request is equal to or higher than the threshold value, the intensity judgment unit 42 grants the request from the PDA 1, and specifies the PDA 1 as a device of the communication counterpart. Therefore, as shown in FIG. 1A, when the connection request is broadcast from the PDA 1 in proximity with the portable phone 2, the PDA 1 is specified as the device of the communication counterpart of the portable phone 2.
  • A field intensity of the electromagnetic wave (electric power density per unit area) decreases inversely proportionally to the square of a distance from a transmission source, therefore, a device having received the connection request can determine whether the device broadcasting the connection request is the one in proximity or the one located in a comparatively distant position, based on the field intensity of the received electromagnetic wave.
  • For example, on the reception intensity in the portable phone 2, there is a ten times difference between a packet transmitted from the device in a position 10 cm away from the portable phone 2 and a packet transmitted from the device in a position 1 m away from the portable phone 2 (the intensity of the packet transmitted from the device which is located in the position 10 cm away from the portable phone 2 is ten times higher), so that the device which receives the connection request can substantially reliably determine whether or not the device which transmits it is the one in proximity, even if there are somewhat irregularities in the output.
  • Turning back to FIG. 4, when the PDA 1 is specified as the device of the communication counterpart, the key information management unit 34 of the portable phone 2, in step S24, generates the session key S which is a common key. After the wireless communications are established with the PDA 1, the session key S is used for encrypting the transmitted and received information data and for decrypting the encrypted information data. In addition, the session key S is generated at random for connection at this event. A different key is generated for each set of the processes of FIG. 4. The session key S generated by the key information management unit 34, and the communication parameters, such as the address of the portable phone 2, managed by the communication parameter management unit 33 are outputted to the encryption/decryption processing unit 32.
  • In step S25, the encryption/decryption processing unit 32 encrypts the session key S and the communication parameter (Z=(the session key S, the communication parameter)) by using the public key Pk provided by the PDA 1, and supplies the encrypted information data to the wireless communication control unit 31. In step S26, the wireless communication control unit 31 returns the session key S encrypted by means of the public key Pk and the communication parameter to the PDA 1 as an ack (Z) (acknowledge (Z)). Thus, the session key S generated by the portable phone 2 is encrypted by means of the public key Pk and returned to the PDA 1, so that only the PDA 1 having the secret key Sk can decrypt and acquire the session key S.
  • The wireless communication control unit 31 of the PDA 1, in step S4, receives the ack (Z) returned from the portable phone 2, and outputs the received ack (Z) to the encryption/decryption processing unit 32.
  • In step S5, the encryption/decryption processing unit 32 of the PDA 1 decrypts the ack (Z) returned from the portable phone 2 by using the secret key Sk managed by the key information management unit 34, and acquires the communication parameter and the session key S generated by the portable phone 2.
  • In step S6, by using the communication parameter acquired by the encryption/decryption processing unit 32, the wireless communication control unit 31 establishes the wireless communications with the portable phones 2, complying with the IEEE 802.11 communications standard or the Bluetooth communications standard. On the other hand, in step S27, based on the communication parameter contained in the connection request from the PDA 1, the portable phone 2 establishes the wireless communications with the PDA 1, complying with the IEEE 802.11 communications standard or the Bluetooth communications standard.
  • At this event, in the case of the wireless communications complying with the IEEE 802.11 communications standard, a MAC (Media Access Control) address, an IP address, the ESSID, etc. of both the devices are set up between the PDA 1 and the portable phones 2, and a setup by using the session key S as a WEP (Wired Equivalent Privacy) key etc. are performed. Further, in the case of the wireless communications complying with the Bluetooth communications standard, a setup based on the Bluetooth address or a Bluetooth clock, a setting by using the session key S as an encryption key etc. are performed.
  • After various types of setups are performed, the wireless communications encrypted by means of the session key S are started between the PDA 1 and the portable phone 2. In addition, the wireless communications started here do not necessarily require both the devices to be in proximity to each other, but are effective within the coverage area of the electromagnetic wave.
  • As described above, based on the reception intensity of the electromagnetic wave, it is arranged to determine whether or not a device is a communication counterpart, so that the user can start the wireless communications only by bringing the devices into proximity.
  • Further, by using the wireless communication module (the wireless communication unit 19 of FIG. 2) in accordance with the IEEE 802.11 communications standard or the Bluetooth communications standard, it is arranged to determine whether or not the device is in proximity and to transmit and receive the communication parameter, so that it is not necessary to provide the device with a dedicated module, such as the RF tag, the reader/writer, the infrared module, etc. only for detecting a neighboring device and for transmitting and receiving an information data required for establishing communications. Therefore, as compared with the case of preparing such a dedicated module, production costs of the device can be reduced.
  • Further, since the wireless communications encrypted by means of the newly generated session key are carried out, an interception, a falsification etc. by a third party can be prevented.
  • FIG. 5 is a flow chart for explaining a process before the wireless communications complying with the IEEE 802.11 communications standard between the PDA 1 and a portable phone 2 of FIG. 1 are established. A process in FIG. 5 is basically similar to the process in FIG. 4, and its detailed description will be properly omitted.
  • In step S41 when the operation, by the user, of the connection button is received by the input unit 16, then in step S42 the key information management unit 34 of the PDA 1 generates the pair of the public key Pk and the secret key Sk. In step S43 the connection request transmission unit 41 broadcasts the connection request containing the public key Pk generated by the key information management unit 34 and the communication parameter managed by the communication parameter management unit 33.
  • In step S61 the wireless communication control unit 31 of the portable phone 2 which exists within the coverage area of the electromagnetic wave from the PDA 1 receives the connection request. In step S62 the intensity judgment unit 42 measures the reception intensity of the connection request, moves the process to step S63, and determines whether or not the reception intensity is equal to or higher than a threshold value.
  • In step S63 when it is determined that the reception intensity of the connection request is lower than the threshold value, the intensity judgment unit 42 terminates the process. On the other hand, when it is determined that it is equal to or higher than the threshold value, the PDA 1 is specified as the device of the communication counterpart. When the PDA 1 is specified as the device of the communication counterpart, in step S64 the key information management unit 34 of the portable phone 2 newly generates a WEP key to be used for the wireless communications with the PDA 1 in accordance with the IEEE 802.11 communications standard, and the communication parameter management unit 33 newly generates an ESSID which identifies the communications. The thus generated ESSID and the WEP key are outputted to the encryption/decryption processing unit 32.
  • In step S65 the encryption/decryption processing unit 32 encrypts the ESSID and the WEP key (Z=(the ESSID, the WEP key)) by using the public key Pk, the encrypted information data is supplied to the wireless communication control unit 31. In step S66 the wireless communication control unit 31 returns the ack (Z) containing the encrypted ESSID and WEP key to the PDA 1. In this way the newly generated ESSID and WEP key are encrypted by means of the public key Pk provided by the PDA 1 and returned to the PDA 1, so that only the PDA 1 having the secret key Sk can decrypt and acquire the ESSID and the WEP key.
  • In step S44 the wireless communication control unit 31 of the PDA 1 receives the ack (Z) returned from the portable phone 2. In step S45 the encryption/decryption processing unit 32 decrypts the ack (Z) by using the secret key Sk managed by the key information management unit 34, and acquires the ESSID and the WEP key generated by the portable phone 2.
  • In step S46, based on the acquired ESSID and the WEP key, the wireless communication control unit 31 establishes the wireless communications with the portable phones 2, complying with the IEEE802.11 communications standard. On the other hand, in step S67, similar to the wireless communication control unit 31 of the PDA 1, based on the information included in the connection request, the wireless communication control unit 31 of the portable phone 2 establishes the wireless communications with the PDA 1, complying with the IEEE 802.11 communications standard.
  • As described above, by bringing devices into proximity to each other, the user can establish the wireless communications between the devices, complying with the IEEE 802.11 communications standard in which security is ensured. Further, in order to establish the wireless communication, it is not necessary to provide both the devices with modules for short distance communications other than the communication modules in accordance with the IEEE 802.11 communications standard.
  • Referring now to a flow chart of FIG. 6, another wireless communication establishment process performed by the PDA 1 and the portable phone 2 of FIG. 1 will be described.
  • The process in FIG. 6 is similar to the process as described above with reference to FIG. 4, except that the PDA 1 determines whether or not the reception intensity of the ack (Z) returned from the portable phone 2 to the PDA 1 is equal to or higher than the threshold value. Thus, possible double descriptions will be suitably omitted.
  • In step S84 when the ack (Z) containing the session key S and the communication parameter which are encrypted by the public key Pk are received by the wireless communication control unit 31 of the PDA 1, then in step S85 the intensity judgment unit 42 of the PDA 1 determines whether or not the reception intensity of the electromagnetic wave which conveys the ack (Z) is equal to or higher than the threshold value. In step S85 when it is determined that the reception intensity is lower than or equal to the threshold value, the intensity judgment unit 42 notifies the portable phone 2, for example, that communications cannot be carried out, and terminates the process.
  • Thus, they are in proximity when transmitting the connection request (at the time of carrying out the process in step S83). For example, if they are separated immediately after that, the wireless communications are not performed between the PDA 1 and the portable phone 2.
  • In step S85, when it is determined that the reception intensity of a reply from the portable phone 2 is equal to or higher than the threshold value, i.e., when it is determined that a status is continuing where the PDA 1 and the portable phone 2 are in proximity to each other, it moves the process to step S86. The encryption/decryption processing unit 32 of the PDA 1 decrypts the ack (Z) by using the secret key Sk, and acquires the session key S and communication parameter which are generated by the portable phone 2. Then, by using the session key S and the communication parameter which are acquired by the encryption/decryption processing unit 32, the wireless communication control unit 31 establishes the wireless communications with portable phones 2.
  • As described above, the PDA 1 is caused to determine the reception intensity of the reply to the connection request, to thereby reliably specify the device which establishes the wireless communications and prevent the wireless communications from being established with the devices which are not intended by the user.
  • Further, the communication is not performed even with a device which is not actually in proximity but broadcasts the connection request at a high output level from a distant position. In other words, when the judgment of the reception intensity of the reply to the connection request is not carried out in the PDA 1, the PDA 1 broadcasts the connection request at a high output level from the position distant from the portable phone 2, so that the portable phone 2 determines that the PDA 1 is in proximity (the process in step S103 determines that the reception intensity is equal to or higher than the threshold value). Then, the wireless communications are established between the PDA 1 and the portable phone 2. The PDA 1 may also be caused to determine the reception intensity of the electromagnetic wave, to thereby prevent the wireless communications as described above from being established. That is to say, the communications are established only between the devices which are actually in proximity to each other.
  • In addition, when both devices transmit the connection request and the reply (ack (Z)) corresponding to it at a high output level, the communications are established between the devices even when they are not in proximity to each other, so that the broadcast connection request and the reply corresponding thereto may include an information data indicating an output level of the electromagnetic wave.
  • Further, the PDA 1 having transmitted the connection request may not measure the reception intensity of the reply from the portable phone 2 so as to determine whether or not to carry out communications, but the output of the reply from the portable phone 2 may be restricted in order for the electromagnetic wave which conveys ack (Z) to cover only a small area. This may prevent the communications from being established between the device which broadcasts the connection request from the distant position at a high output level and the device which receives it.
  • A case has been described above where the ad hoc communications are established by bringing the devices into proximity to each other. Similarly, infrastructure communications can also be established by bringing a device into proximity to an access point.
  • FIGS. 7 A and 7B are views for explaining a procedure of establishing the infrastructure communications in the communication system to which the present invention is applied.
  • Similar to the PDA 1, the access point 51 includes therein the wireless communication module complying with the IEEE 802.11 communications standard or the Bluetooth communications standard, for example.
  • For example, as shown in FIG. 7A, when the user instructs the PDA 1 held by the user to connect to the access point 51, with the FDA 1 being brought into proximity to the access point 51, the connection request is broadcast from the PDA 1. When the access point 51 determines that the reception intensity is equal to or higher than a preset threshold value, the communication parameter, such as the ESSID, and the WEP keys, are generated by the access point 51. The generated communication parameter and the WEP key are encrypted by the public key which is included in the connection request and supplied from the PDA 1 to the access point 51, then returned to the PDA 1. Based on the ESSID and WEP key, the PDA 1 connects to the access point 51.
  • Further, before the PDA 1 connects to the access point 51, when the network to which another device belongs to is already managed by the access point 51, the device is notified of the newly generated ESSID and the WEP key, the setup is changed in each device. In this way, the network is formed containing the device already connected to the access point 51 and the PDA 1 newly connected to the access point 51.
  • For example, as shown in FIG. 7B, before the PDA 1 connects to the access point 51, when the network constituted by a device 52 and a device 53 is managed by the access point 51, the ESSID and the WEP key newly generated corresponding to receiving a connection request from the PDA 1 are notified also to the device 52 and the device 53, thus changing the setup in each device. In this way, a network 61 is newly formed by the PDA 1, the device 52, and the device 53 (an infrastructure connection type wireless communications are established).
  • Therefore, the user can cause the PDA 1 to participate in the network promptly by just bringing the PDA 1 into proximity to the access point 51, without performing complicated operations, such as setting the same ESSID and the same WEP key as those set in another device to, the PDA 1.
  • Further, since a network setup is changed in each device by means of the ESSID and the WEP key having newly generated by the access point 51, a more secure network can be formed. For example, even when the ESSID and the WEP key are known to those who are malicious, each time a new device participates in the network, the ESSID and the WEP key are updated, so that the ESSID and the WEP key known to those who are malicious cannot intercept the information data transmitted and received in the network where the setup is updated.
  • FIG. 8 is a block diagram showing an example of a functional structure of the access point 51. In addition, the access point 51 has substantially the same structure as the structure of the PDA 1 as shown in FIG. 2. Therefore, FIG. 2 is suitably referred to as a structure for the access point 51.
  • The wireless communication control unit 71 of FIG. 8 controls the wireless communications with another device performed in the wireless communication unit 19 of FIG. 2. The wireless communication control unit 71 has a network management unit 81 and an intensity judgment unit 82. The network management unit 81 provides a router function or a DHCP (Dynamic Host Configuration Protocol) function to the devices which participate in the network, and performs a process of notifying the devices having already participated in the network of the newly generated ESSID and the WEP key. Similar to the intensity judgment unit 42 of the PDA 1 of FIG. 3, the intensity judgment unit 82 measures the reception intensity of the electromagnetic wave emitted by an external device, and determines whether or not the reception intensity is equal to or higher than the preset threshold value.
  • An encryption/decryption processing unit 72 encrypts the information data to be transmitted to another device, and decrypts the information received from another device when it is encrypted.
  • A communication parameter management unit 73 manages various types of parameters required for performing communications, for example, the ESSID in the IEEE 802.11 communications or the Bluetooth address, the Bluetooth clock etc. in the Bluetooth communications.
  • Key information management unit 74 generates encryption keys, such as the WEP key provided for the device participating in the network.
  • Next, referring to a flow chart of FIG. 9, the wireless communication establishment process performed between the PDA 1 and the access point 51 of FIG. 7A will be described.
  • When the operation button is depressed and the PDA 1 is instructed by the user to participate in the network, in step S121, the input unit 16 of the FDA 1 receives such instructions. In step S122, the key information management unit 34 generates the public key Pk and the secret key Sk corresponding to the public key Pk. In step S123, the connection request transmission unit 41 broadcasts the connection request containing the public key Pk and the communication parameter.
  • The wireless communication control unit 71 of the access point 51 which exists within the coverage area of the electromagnetic wave from the PDA 1 receives the connection request broadcast by the PDA 1, in step S141. In step S142, the intensity judgment unit 82 of the access point 51 measures the reception intensity of the connection request, and moves the process to step S143 so as to determine whether or not the measured reception intensity is equal to or higher than the threshold value.
  • In step S143, when it is determined that the reception intensity of the connection request is lower than or equal to the threshold value, the intensity judgment unit 82 terminates the process. On the other hand, when it is determined that is equal to or higher than the threshold value, it grants the request from the PDA 1, and allows participation in the network.
  • In step S144, the communication parameter management unit 73 and the key information management unit 74 of the access point 51 newly generates an ESSID and a WEP key respectively, and outputs the generated ESSID and WEP key to the encryption/decryption processing unit 72.
  • In step S145, the encryption/decryption processing unit 72 encrypts the ESSID and the WEP key (Z=(the ESSID. the WEP key)) by using the public key Pk provided by the PDA 1, and outputs the encrypted information data to the wireless communication control unit 71. In step S146, the network management unit 81 returns the encrypted ESSID and the encrypted WEP key as the ack (Z) to the PDA 1.
  • Further, when the network constituted by a plurality of devices is already managed, the network management unit 81, in step S147, provides the ESSID and the WEP key generated in step S144 to all the devices participating in the network, and updates the setup in each device. For example, since the newly generated ESSID and WEP key are transmitted to each device by encrypting by means of the WEP key having so far used in the network, the newly generated ESSID and WEP key are not intercepted by a third party.
  • On the other hand, the wireless communication control unit 31 of the PDA 1, in step S124, receives the ack (Z) returned from the access point 51. In step 125, the encryption/decryption processing unit 32 decrypts the ack (Z) by using the secret key Sk, to thereby acquire the ESSID and the WEP key generated by the access point 51.
  • In step S126, based on the ESSID and the WEP key acquired by the encryption/decryption processing unit 32, the wireless communication control unit 31 connects to the access point 51 so as to participate in the network managed by the access point 51.
  • In this way, the infrastructure connection type network is formed which is constituted by devices identified by the ESSID which is newly generated by the access point 51, so that it becomes possible to transmit and receive the information through the access point 51 between those devices.
  • As described above, the user can establish even infrastructure communications by just bringing the device held by the user into proximity to the access point and build a network, without preparing modules, such as the RF tag, the reader/writer, etc., in addition to the modules in accordance with the IEEE 802.11 communications standard etc. Further, since the ESSID and the WEP key are newly generated so as to change the setup in each device participating in the network, the user can build a more secure network.
  • As described above, the user brings the device held by the user into proximity to the access point, so as to cause the device to participate in the network. However, a case often occurs in which the access point is provided in a position to which the user cannot bring the device into proximity, such as the vicinity of ceiling indoors, for example. Therefore, apart from the access point provided in the vicinity of the ceiling etc., the user may provide a dummy point which does not have the function of managing the network, only by providing the newly generated ESSID and the WEP key in a position to which the user can easily bring the device into proximity. In this case, by bringing the device held by the user into proximity to the dummy point, the user can cause the device to participate in the network managed by the access point.
  • FIGS. 10A and 10B are views showing a procedure of establishing the infrastructure communications by bringing the device into proximity to the dummy point in the communication system to which the present invention is applied.
  • Unlike the access point 51, the dummy point 101-1 and the dummy point 101-2 of FIG. 10A are provided in positions to which the user can easily bring the PDA 1 into proximity, and respectively connected to the access point 51 by wire through a cable 111-1 and a cable 111-2.
  • The dummy point 101-1 and the dummy point 101-2 have the wireless communication functions complying with the IEEE 802.11 communications standard or the Bluetooth communications standard, and provide the PDA 1 with the newly generated ESSID and the WEP key when it is determined that the PDA 1 is brought into proximity according to the reception intensity of the electromagnetic wave. Further, at this event, the dummy point 101-1 and the dummy point 101-2 transmit the same ESSID and the WEP key as those provided by the PDA 1, to the access point 51 through the cable 111-1 and the cable 111-2.
  • The subsequent processes are similar to those in the case of FIGS. 7A and 7B. In other words, the access point 51 notifies the ESSID and the WEP key notified by the dummy point 101-1 or the dummy point 101-2 to all the devices having already participated in the network, causes them to update the setups, and grants the connection of the PDA 1 having acquired the ESSID and the WEP key from the dummy point 101-1 or the dummy point 101-2, whereby the network 61 containing the PDA 1 is formed as shown in FIG. 10B.
  • In this way, even when the access point 51 is provided in a position to which the PDA 1 cannot be brought into proximity, the user can cause the PDA 1 to participate in the network managed by the access point 51, by bringing the PDA 1 into proximity to the dummy point 101-1 or the dummy point 101-2.
  • FIG. 11 is a block diagram showing an example of a functional structure of the access point 51 and the dummy point 101-1. In addition, also the dummy point 101-2 has the same structure of the dummy point 101-1 as shown in FIG. 11, and is connected with the access point 51. The same reference numerals are used for the same parts as in the access point 51 of FIG. 8.
  • Also the dummy point 101-1 has the same structure as that of the access point 51 of FIG. 8, except that a functional unit for managing the network is not provided. That is to say, the wireless communication control unit 121 controls the wireless communications complying with the IEEE 802.11 communications standard or the Bluetooth communications standard performed between the devices which are in proximity to each other; an intensity judgment unit 131 measures the reception intensity of the electromagnetic wave emitted from the external device and determines whether or not the reception intensity is equal to or higher than the preset threshold value.
  • By using the public key Pk which is included in the connection request and provided by the PDA 1, an encryption processing unit 122 encrypts the ESSID generated by a communication parameter management unit 123 and the WEP key generated by the key information management unit 124, so as to be provided from the wireless communication control unit 121 to the PDA 1.
  • The communication parameter management unit 123 manages the communication parameters, such as the ESSID etc. The key information management unit 124 generates the WEP key to be provided for the PDA 1, etc., which is in proximity. The ESSID managed by the communication parameter management unit 123 and the WEP key managed by the key information management unit 124 are outputted to the encryption processing unit 122, and also to the cable communication control unit 125.
  • The cable communication control unit 125 manages wired communications with the access points 51, and transmits the ESSID supplied from the communication parameter management unit 123 and the WEP key supplied from the key information management unit 124, to the access point 51 through the cable 111-1.
  • A cable communication control unit 141 of the access point 51 receives the ESSID and the WEP key which are transmitted from the dummy point 101-1, and outputs them to the wireless communication control unit 71. The network management unit 81 of the wireless communication control unit 71 transmits the ESSID and the WEP key which are transmitted from the dummy point 101-1, to all the devices that have participated in the network wirelessly means so as to update the setup. Further, the network management unit 81 grants the connection from the PDA 1 having acquired the ESSID and the WEP key provided through the dummy point 101-1, and causes the PDA 1 to participate in the network.
  • Next, referring to a flow chart of FIG. 12, the communication establishment process performed by the PDA 1, the access point 51, and the dummy point 101-1 of FIG. 10A will be described.
  • By bringing the PDA 1 into proximity to the dummy point 101-1, the process performed between the PDA 1 and the dummy point 101-1 is similar to the processing performed between the PDA 1 and the access points 51 as described with reference to the FIG. 5, FIG. 9, etc.
  • In other words, in step S181, the input unit 16 of the PDA 1, for example, receives the operation of the connection button performed by the user, with the FDA 1 being in proximity to the dummy point 101-1. In step S182, the key information management unit 34 generates the public key Pk and the secret key Sk corresponding to the public key Pk. The connection request transmission unit 41, in step S183, broadcasts the connection request containing the public key Pk and the communication parameter.
  • The wireless communication control unit 121 of the dummy point 101-1, in step S161, receives the connection request broadcast from the PDA 1. In step S162, the intensity judgment unit 131 measures the reception intensity of the connection request, then moves the process to step S163 so as to determine whether or not the reception intensity is equal to or higher than the threshold value.
  • In step S163, if it is determined that the reception intensity of the connection request is lower than the threshold value, the intensity judgment unit 131 terminates the process. On the other hand, if it is determined that the intensity is equal to or higher than the threshold value, the process moves to step S164.
  • In step S164 the communication parameter management unit 123 of the dummy point 101-1 newly generates an ESSID, and outputs the generated ESSID to the encryption processing unit 122 and the cable communication control unit 125. Further, the key information management unit 124 newly generates a WEP key, and outputs the generated WEP key to the encryption processing unit 122 and the cable communication control unit 125.
  • In step S165, the encryption processing unit 122 encrypts the ESSID and the WEP key (Z=(the ESSID, the WEP key)) by means of the public key Pk, and outputs the encrypted information data to the wireless communication control unit 121. In step S166, the wireless communication control unit 121 returns the encrypted ESSID and WEP key as the ack (Z) to the PDA 1.
  • In step S167, the cable communication control unit 125 transmits the ESSID supplied from the communication parameter management unit 123 and the WEP key supplied from the key information management unit 124, to the access point 51 by the cable through the cable 111-1. At this event, the information data other than the ESSID and the WEP key, such as the MAC address of the PDA 1 is also transmitted to the access point 51 and used for the access control in the access point 51.
  • On the other hand, in step S184, the wireless communication control unit 31 of the PDA 1 receives the ack (Z) returned from the dummy point 101-1. In step S185, the encryption/decryption processing unit 32 decrypts the ack (Z) by using the secret key Sk so as to acquire the ESSID and the WEP key.
  • In step S186, based on the ESSID and the WEP key acquired by the encryption/decryption processing unit 32, the wireless communication control unit 31 establishes the wireless communications complying with the IEEE 802.11 communications standard and connects to the access point 51. At this event, having received the ESSID and the WEP key transmitted by wire in step S201, the network management unit 81 of the access point 51 moves to a process in step S202, transmits the ESSID and the WEP key wirelessly means to the device which has already participated in the network and updates the setup.
  • In this way, the infrastructure connection type network is constituted by a group of the devices containing the PDA 1 which is identified by the ESSID newly generated by the dummy point 101-1, and the transmission and reception of the information data through the access point 51 are performed between networks.
  • According to the above processing, even when the access point 51 is provided in a position to which the PDA 1 cannot directly be brought into proximity, the user can cause the PDA 1 to participate in the network managed by the access point 51, by bringing the PDA 1 into proximity to the dummy point 101-1 etc.
  • In addition, when the PDA 1 is brought into proximity to the dummy point, the PDA 1 is provided with a URL (Uniform Resource Locator) of a certain site through the dummy point, other than the information data, such as the ESSID and the WEP key. After the PDA 1 is connected to the access point 51 by performing the process of FIG. 12, the PDA 1 may have access to a site specified by the URL through the access point 51.
  • FIG. 13 is a view showing an example of a structure of the communication system in which the connection to the access point 51 is made by the PDA 1 based on URL provided through the dummy point, and then subsequently the access to the site specified by the URL is carried out.
  • In FIG. 13, presentation units 151-1 through 151-3 constituted by a display, such as an LCD, a poster, etc., are provided on a wall surface. For example, an advertisement of a camera is presented by the presentation unit 151-1, a map is presented by the presentation unit 151-2, and an advertisement of a personal computer is presented by the presentation unit 151-3.
  • The dummy points 101-1 through 101-3 connected to the access point 51 through a cable (not shown) are respectively provided directly below the presentation units 151-1 through 151-3. In addition, the access point 51 is provided in the position, above the wall surface, to which it is difficult for the user to bring the PDA 1 into proximity.
  • In addition to the ESSID and the WEP key for connecting to the access point 51, the dummy point 101-1 provides the PDA 1 with a URL of an advertising site which provides detailed information on the camera presented by the presentation unit 151-1. In addition to the ESSID or the WEP key, the dummy point 101-2 provides the PDA 1 with a URL of a site which provides detailed information on the map presented by the presentation unit 151-2. Further, in addition to the ESSID or the WEP key for connecting to the access point 51, the dummy point 101-3 provides the PDA 1 with a URL of an advertising site which provides detailed information on the personal computer presented by the presentation unit 151-3.
  • Therefore, for example, as shown in FIG. 13, when the user brings the PDA 1 into proximity to the dummy point 101-1, the connection to the access point 51 is made by the performing the process in FIG. 12 by means of the PDA 1. After that, based on the URL provided from the dummy point 101-1, the access to the advertising site of the camera presented by the presentation unit 151-1 is carried out. When the access to the advertising site of the camera is carried out, the detailed information about the camera is displayed on a screen of the PDA 1. Thus, the user may only bring the PDA 1 into proximity to the advertisement (the dummy point) so as to check the detailed information about an article introduced by the advertisement on the screen of the PDA 1.
  • In addition, the presentation units 151-1 through 151-3 and the dummy points 101-1 through 101-3 are disposed in different positions in the example of FIG. 13. However, when the presentation units 151-1 through 151-3 are the posters of paper media, the dummy points 101-1 through 101-3 may be provided on the backs respectively. Thus, the user can check the detail of the articles by using the PDA 1 by way of more intuitive operation, such as holding the PDA 1 over the advertisement.
  • In the above description, in order to establish the communications only between the devices which are actually in proximity to each other, the reception intensity of the reply to the connection request is measured on the PDA 1 side which is the device to broadcast the connection request (for example, FIG. 6). As shown in FIG. 13 and others, based on the reception intensity of each of the connection requests in the dummy points 101-1 through 101-3, the access point 51 may alternatively determine whether or not the PDA 1 is actually in proximity to any of the dummy points, and determine whether or not to grant the connection.
  • FIGS. 14A and 14B are views showing an example of a spatial relationship among the PDA 1 and the dummy points 101-1 through 101-3.
  • Having received the connection request broadcast by the PDA 1, the dummy points 101-1 through 101-3 respectively notify the reception intensity to the access point 51 through the cable 111-1 through 111-3.
  • For example, as shown in FIG. 14A, based on the reception intensity of the connection request received in each of the dummy points 101-1 through 101-3, the access point 51 grants the request from the PDA 1 only when the PDA 1 has judged it is in sufficiently proximity to one dummy point 101-2 as compared with distances to the other two.
  • Therefore, when the PDA 1 is located in a position P1, since the reception intensity at the dummy point 101-2 is higher than the reception intensities at the dummy point 101-1 and the dummy point 101-3, the access point 51 judges the PDA 1 is in proximity to the dummy point 101-2, and grants the connection from the PDA 1. On the other hand, for example, the PDA 1 is located in the position P2 somewhat above the position P1, and the reception intensities of the connection requests at the dummy point 101-1 and the dummy point 101-2 are measured and result in substantially the same, so that the access point 51 does not allow the connection of the PDA 1.
  • As described above, it is possible to determine more reliably whether the PDA 1 is in proximity to the dummy point by comparing the reception intensities at respective dummy points. Further, the PDA 1 broadcasting the connection request at a high output level can be prevented from connecting even when not in actual proximity to the dummy point.
  • For example, as shown in FIG. 14B, when the PDA 1 is not brought into proximity to any of the dummy points, the reception intensities of the connection requests received at the dummy points 101-1 though 101-3 are respectively measured as being of the same level. In this case, the connection of the PDA 1 to the access point 51 is not granted.
  • When the PDA 1 of FIG. 14B broadcast the connection request at a high output level and the reception intensity of the connection request at each dummy point is not compared, if the reception intensity is equal to or higher than the predetermined threshold value, then the access to the access point 51 is granted. However, it can be prevented by comparing the reception intensities of the connection requests at respective dummy points. That is to say, it is possible to prevent the device which is not in proximity to any of the dummy points from gaining access to the access point 51.
  • Referring now to a flow chart of FIG. 15, as described above, based on the reception intensity of the connection request at each dummy point, a process will be described of the access point 51 which determines whether or not to grant the connection.
  • In step S211, the network management unit 81 (FIG. 11) acquires the reception intensities of the connection requests at the dummy points 101-1 through 101-3, via the cable communication control unit 141.
  • In step S212, as compared with the other two dummy points, the network management unit 81 determines whether or not there is a dummy point which provides high reception intensity. For example, ratios of the reception intensities of the connection requests in the three dummy points are calculated, and for the highest ratio of them, it is determined whether or not it is higher than the preset threshold value.
  • When it is determined that there is not such a dummy point in step S212, the network management unit 81 terminates the process. Thus, as shown in FIG. 14B, for example, the connection of a device which is not in proximity to any dummy point is not granted.
  • On the other hand, when it is determined in step S212 that there is a dummy point which provides high reception intensity as compared with the other two dummy points, the network management unit 81 moves the process to step S213, judges the device is in sufficiently proximity to the dummy point which provides a high reception intensity, and grants the connection of the device. After that, based on the ESSID and the WEP key which are provided through the dummy point, the device granted to be connected is connected with the access point 51.
  • In the above description, although it has been assumed that the reception intensities of the connection requests at the three dummy points 101-1 through 101-3 are compared, the number of the dummy points is not restricted to three. That is to say, by comparing the reception intensities of the connection requests, any number of dummy points may be provided, if it is possible to determine whether or not a device is in proximity to any of the dummy points.
  • Further, in the above description, although it has been described that the dummy points are provided and fixed to the wall surface, etc., they may be prepared as portable device as shown in FIG. 16, for example.
  • FIG. 16 is a view showing a situation where a portable dummy point 121 (hereinafter, referred to as the portable dummy point 121) and a personal computer 122 are in proximity to each other.
  • The portable dummy point 121 is brought into proximity to the personal computer 122. As described above with reference to FIG. 12, when it is determined that the reception intensity of the electromagnetic wave transmitted from the personal computer 122 is higher than the predetermined threshold value, it generates the ESSID and the WEP key, etc., and provides them to the personal computer 122. Further, at this event, the portable dummy point 121 transmits those information data provided for the personal computer 122 also to an access point (not shown), and changes setup of the access point so that access from the personal computer 122 can be granted.
  • In this way, the personal computer 122 can participate in the network managed by the access point.
  • The portable dummy point 121, for example, is prepared in a space which provides wireless Internet connection services like Hotspot (a trademark). In this case, for example, an administrator of services owns the portable dummy point 121, and the administrator brings the portable dummy point 121 into proximity to a personal computer of a user having paid service charges, then the portable dummy point 121 is utilized by granting connection to the Internet etc.
  • Further, in the case where the portable dummy point 121, for example, is prepared for a conference room, etc., each participant at the meeting brings the portable dummy point 121 into proximity to his or her personal computer, and then the portable dummy point 121 is utilized when building a network constituted by the participant's personal computer.
  • In addition, when transmitting the information data, such as the ESSID and the WEP key, from the portable dummy point 121 to the access point, the transmission may be carried out when the portable dummy point 121 and an access point are in proximity to each other and when the judgment is performed based on the intensity of the received electromagnetic wave as described above, so that the intensity is judged to be equal to or higher than the threshold value. Naturally, the transmission of the information data, such as the ESSID and the WEP key, from the portable dummy point 121 to the access point may be performed by wire through the cable which is connected to the portable dummy point 121, or wirelessly for relatively short distances using a contactless IC tag, infrared rays, etc., whereby, the information data, such as the ESSID and the WEP key, can be prevented from being known to a third party.
  • A series of processes as described above can be performed by means of hardware and also by way of software.
  • When a series of processes are performed by way of software, a computer program which constitutes the software is installed, over the network or from the recording medium, in a computer built in dedicated hardware or a general purpose personal computer in which various types of programs are installed so as to execute various types of functions, for example.
  • As shown in FIG. 2, the recording medium may be not only package media including the magnetic disk 21 (including a flexible disk), the optical disks 22 (including a CD-ROM (Compact Disk-Read Only Memory), a DVD (Digital Versatile Disc)), the magneto-optical disks 23 (including an MD (a registered trademark) (Mini-Disc)), or the semiconductor memory 24 which are apart from the apparatus itself, distributed in order to provide the user with the program and have recorded therein the program, but also the ROM 12 and the storage unit 18 on which the program is recorded and which are provided for the user, being pre-installed in the apparatus itself.
  • In addition, in the specification, steps which describe the computer program recorded in the recording medium include processes performed in chronological order according to the description but also processes carried out in parallel or individually, even if they are not necessarily processed in chronological order.
  • Further, in this specification, the word system can be used to mean a whole arrangement constituted by a plurality of apparatuses.
  • It is therefore to be observed that the present invention is not limited to the above-mentioned examples of preferred embodiments, which are merely descriptions of the present invention in its preferred form under a certain degree of particularity. They are by no means to be construed so as to limiting the scope of the present invention and, accordingly, it is to be understood by those of ordinary skill in the art that many other changes, variations, combinations, sub-combinations and the like are possible therein without departing from the scope and spirit of the present invention.

Claims (6)

1.-14. (canceled)
15. An information providing apparatus comprising:
a providing unit configured to provide connection information and address information on network to an external device when the external device is located into proximity to the information providing apparatus, the connection information is used for a communication establishment to access a site of the address information.
16. The information providing apparatus according to the claim 15, wherein the providing unit configured to provide the connection information and address information to the external device by near field communication.
17. The information providing apparatus according to the claim 15, wherein the connection information is key information to establish a communication with an access point.
18. The information providing apparatus according to the claim 15, further comprising:
a presentation unit capable of showing an advertisement; and
wherein the address information is associated with the advertisement.
19. The information providing apparatus according to the claim 18, wherein the address information is a URL to provide a map information.
US13/730,546 2003-10-31 2012-12-28 Communication system, information processing apparatus, method and computer program Abandoned US20130182847A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/730,546 US20130182847A1 (en) 2003-10-31 2012-12-28 Communication system, information processing apparatus, method and computer program

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2003373312A JP4543657B2 (en) 2003-10-31 2003-10-31 Information processing apparatus and method, and program
JP2003-373312 2003-10-31
US10/976,272 US8345881B2 (en) 2003-10-31 2004-10-28 Communication system, information processing apparatus, method and computer program
US13/730,546 US20130182847A1 (en) 2003-10-31 2012-12-28 Communication system, information processing apparatus, method and computer program

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/976,272 Continuation US8345881B2 (en) 2003-10-31 2004-10-28 Communication system, information processing apparatus, method and computer program

Publications (1)

Publication Number Publication Date
US20130182847A1 true US20130182847A1 (en) 2013-07-18

Family

ID=34616066

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/976,272 Expired - Fee Related US8345881B2 (en) 2003-10-31 2004-10-28 Communication system, information processing apparatus, method and computer program
US13/730,546 Abandoned US20130182847A1 (en) 2003-10-31 2012-12-28 Communication system, information processing apparatus, method and computer program

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/976,272 Expired - Fee Related US8345881B2 (en) 2003-10-31 2004-10-28 Communication system, information processing apparatus, method and computer program

Country Status (2)

Country Link
US (2) US8345881B2 (en)
JP (1) JP4543657B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110087907A1 (en) * 2008-06-25 2011-04-14 Iiro Kristian Jantunen Power saving method and apparatus
CN106095512A (en) * 2016-06-21 2016-11-09 北京小米移动软件有限公司 Application program deployment method and device

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003272982A (en) * 2002-03-12 2003-09-26 Tokyo Electron Ltd Apparatus adjustable by radio communication, method and system for apparatus adjustment
US8208634B2 (en) 2004-04-16 2012-06-26 Qualcomm Incorporated Position based enhanced security of wireless communications
US20080166966A1 (en) * 2004-12-20 2008-07-10 Shogo Hamasaki Wireless Communication Apparatus and Communication Control Method
JP2007082194A (en) * 2005-08-18 2007-03-29 Sony Corp Data transfer system, wireless communication apparatus and wireless communication method, and computer program
US7706432B2 (en) 2005-08-18 2010-04-27 Sony Corporation Data transfer system, wireless communication device, wireless communication method, and computer program
JP5040087B2 (en) * 2005-09-06 2012-10-03 富士通株式会社 Wireless communication network security setting method, security setting program, and wireless communication network system
JP4667178B2 (en) * 2005-09-07 2011-04-06 株式会社エヌ・ティ・ティ・ドコモ System, method and computer program for building a secure ad hoc network
JP2007081579A (en) * 2005-09-12 2007-03-29 Canon Inc Communication device and its control method
JP4836241B2 (en) * 2005-11-10 2011-12-14 任天堂株式会社 Communication system, communication program, and communication terminal
KR100856408B1 (en) * 2006-07-19 2008-09-04 삼성전자주식회사 Apparatus and method for transmitting data
KR100739809B1 (en) * 2006-08-09 2007-07-13 삼성전자주식회사 Method and apparatus for managing stations which are associated with wpa-psk wireless network
US8112358B2 (en) 2007-06-04 2012-02-07 Qualcomm Atheros, Inc. Authorizing customer premise equipment on a sub-network
JP4506999B2 (en) * 2007-07-30 2010-07-21 Necインフロンティア株式会社 Wireless LAN system
US8477944B2 (en) * 2007-09-28 2013-07-02 Hera Wireless S.A. Communication system, base station apparatus and terminal apparatus
US20090119762A1 (en) * 2007-11-06 2009-05-07 Cisco Technology, Inc. WLAN Access Integration with Physical Access Control System
US8559637B2 (en) * 2008-09-10 2013-10-15 Verizon Patent And Licensing Inc. Securing information exchanged via a network
US8938211B2 (en) 2008-12-22 2015-01-20 Qualcomm Incorporated Providing and utilizing maps in location determination based on RSSI and RTT data
US20100157848A1 (en) * 2008-12-22 2010-06-24 Qualcomm Incorporated Method and apparatus for providing and utilizing local maps and annotations in location determination
US8938355B2 (en) 2009-03-13 2015-01-20 Qualcomm Incorporated Human assisted techniques for providing local maps and location-specific annotated data
JP5139465B2 (en) * 2010-03-31 2013-02-06 株式会社東芝 Memory chip, information storage system, readout device
JP5269844B2 (en) * 2010-07-28 2013-08-21 株式会社バッファロー Encryption key sharing method, wireless terminal, and access point
JP5671879B2 (en) 2010-08-24 2015-02-18 ソニー株式会社 Wireless communication apparatus, program, wireless communication method, and wireless communication system
JP5546418B2 (en) * 2010-10-28 2014-07-09 Kddi株式会社 Full stealth mode wireless LAN apparatus and connection method
US9080882B2 (en) 2012-03-02 2015-07-14 Qualcomm Incorporated Visual OCR for positioning
US8792936B2 (en) * 2012-10-01 2014-07-29 Xerox Corporation Establishing communication between devices using close proximity protocol
US9055440B2 (en) * 2012-10-19 2015-06-09 Saife, Inc. Geospatial cryptography
US9215075B1 (en) 2013-03-15 2015-12-15 Poltorak Technologies Llc System and method for secure relayed communications from an implantable medical device
JP6228383B2 (en) * 2013-04-26 2017-11-08 キヤノン株式会社 COMMUNICATION DEVICE, COMMUNICATION METHOD, PROGRAM
US9749134B2 (en) * 2013-06-20 2017-08-29 Qualcomm Incorporated Wireless configuration using passive near field communication
US20160374051A1 (en) * 2013-07-09 2016-12-22 Kyocera Corporation Mobile communication system and user terminal
JP6532438B2 (en) * 2016-09-07 2019-06-19 ソフトバンク株式会社 Wireless communication system, terminal and program
US10536853B2 (en) * 2017-03-03 2020-01-14 Texas Instruments Incorporated Secure network authentication at a gateway for non-internet protocol enabled devices
JP6382429B2 (en) * 2017-11-01 2018-08-29 京セラ株式会社 Base station, user terminal, processor, and method
JP6860208B2 (en) * 2017-11-30 2021-04-14 東洋ガスメーター株式会社 Data acquisition device for gas meters
US11637745B2 (en) 2019-09-11 2023-04-25 Hand Held Products, Inc. Configuring a remote electronic device by a peer electronic device in a networked environment
CN113630242A (en) * 2020-05-06 2021-11-09 瞻博网络公司 Facilitating lossless security key flipping using data plane feedback

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6307843B1 (en) * 1997-07-18 2001-10-23 Nec Corporation Ad hoc network of mobile hosts using link table for identifying wireless links and destination addresses
US6414635B1 (en) * 2000-10-23 2002-07-02 Wayport, Inc. Geographic-based communication service system with more precise determination of a user's known geographic location
US20020095333A1 (en) * 2001-01-18 2002-07-18 Nokia Corporation Real-time wireless e-coupon (promotion) definition based on available segment
US20020124169A1 (en) * 2001-03-01 2002-09-05 Agrawal Dharma P. Authentication scheme for ad hoc and sensor wireless networks
US6452498B2 (en) * 1995-06-06 2002-09-17 Wayport, Inc. System and method for providing geographic-based advertising
US20030220835A1 (en) * 2002-05-23 2003-11-27 Barnes Melvin L. System, method, and computer program product for providing location based services and mobile e-commerce
US20030228842A1 (en) * 2002-06-05 2003-12-11 Nokia Corporation Automatic determination of access point content and services for short-range wireless terminals
US20040014423A1 (en) * 2002-05-15 2004-01-22 Martin Croome Functionality and policies based on wireless device dynamic associations
US20040153676A1 (en) * 2003-01-31 2004-08-05 Microsoft Corporation Method and apparatus for managing power in network interface modules
US20040190718A1 (en) * 2003-03-25 2004-09-30 Dacosta Behram Mario Apparatus and method for location based wireless client authentication
US20040199616A1 (en) * 2002-12-30 2004-10-07 Mika Karhu Automatic and dynamic service information delivery from service providers to data terminals in an access point network
US20040203787A1 (en) * 2002-06-28 2004-10-14 Siamak Naghian System and method for reverse handover in mobile mesh Ad-Hoc networks
US20040204071A1 (en) * 2002-05-01 2004-10-14 Microsoft Corporation Method for wireless capability discovery and protocol negotiation, and wireless device including same
US6842460B1 (en) * 2001-06-27 2005-01-11 Nokia Corporation Ad hoc network discovery menu
US6845091B2 (en) * 2000-03-16 2005-01-18 Sri International Mobile ad hoc extensions for the internet
US7487112B2 (en) * 2000-06-29 2009-02-03 Barnes Jr Melvin L System, method, and computer program product for providing location based services and mobile e-commerce
US7603710B2 (en) * 2003-04-03 2009-10-13 Network Security Technologies, Inc. Method and system for detecting characteristics of a wireless network
US7668123B1 (en) * 2002-06-28 2010-02-23 Nortel Networks Limited Network access device location

Family Cites Families (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2530369B2 (en) 1989-04-21 1996-09-04 三菱電機株式会社 Non-contact type IC card
JPH03189786A (en) * 1989-12-19 1991-08-19 Sony Corp Information card device
US5580444A (en) * 1994-03-14 1996-12-03 Hydrotechnology, Inc. Water quality monitor for a water purification system
DE19503607A1 (en) * 1995-02-03 1996-08-08 Angewandte Digital Elektronik Chip cards for displaying different card information
US5850444A (en) * 1996-09-09 1998-12-15 Telefonaktienbolaget L/M Ericsson (Publ) Method and apparatus for encrypting radio traffic in a telecommunications network
JPH1093508A (en) 1996-09-18 1998-04-10 Brother Ind Ltd Data communication equipment
SE512335C2 (en) 1998-05-12 2000-02-28 Sectra Communications Ab Mobile and / or cordless telephone
US6607136B1 (en) * 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
US6792464B2 (en) * 1999-02-18 2004-09-14 Colin Hendrick System for automatic connection to a network
JP3570311B2 (en) 1999-10-07 2004-09-29 日本電気株式会社 Wireless LAN encryption key update system and update method thereof
JP3670541B2 (en) * 1999-11-26 2005-07-13 株式会社エヌ・ティ・ティ・ドコモ Wireless communication terminal and wireless communication method
JP2001189722A (en) 2000-01-04 2001-07-10 Toshiba Corp Radio communication system, radio terminal, radio base station, authentication card and authenticating method
FI120478B (en) * 2000-02-24 2009-10-30 Nokia Corp Method and apparatus for connecting to a telecommunications network
US6687735B1 (en) * 2000-05-30 2004-02-03 Tranceive Technologies, Inc. Method and apparatus for balancing distributed applications
JP2002124960A (en) 2000-10-16 2002-04-26 Link Evolution Corp Communication device, communication system, and communication method
JP4868195B2 (en) 2000-10-24 2012-02-01 ソニー株式会社 Electronic apparatus and information processing apparatus
JP4029629B2 (en) 2001-03-27 2008-01-09 セイコーエプソン株式会社 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
JP2002351766A (en) 2001-05-29 2002-12-06 Denso Corp Setting file transmission system and transmitting method for setting file
US7313819B2 (en) * 2001-07-20 2007-12-25 Intel Corporation Automated establishment of addressability of a network device for a target network environment
US7155167B1 (en) * 2001-07-24 2006-12-26 Cisco Technology, Inc. Wireless LAN monitoring device
US20030054846A1 (en) * 2001-09-14 2003-03-20 Cvsht Apparatus and methods for selectively establishing wireless communications
JP3668170B2 (en) * 2001-09-20 2005-07-06 株式会社東芝 Wireless communication device
AU2002343424A1 (en) * 2001-09-28 2003-04-14 Bluesocket, Inc. Method and system for managing data traffic in wireless networks
JP3915481B2 (en) * 2001-11-14 2007-05-16 セイコーエプソン株式会社 Wireless communication device
JP4040403B2 (en) 2001-11-27 2008-01-30 ソニー株式会社 Information processing apparatus and method, recording medium, and program
US7325246B1 (en) * 2002-01-07 2008-01-29 Cisco Technology, Inc. Enhanced trust relationship in an IEEE 802.1x network
US7702775B2 (en) * 2002-04-08 2010-04-20 Airmagnet Inc. Monitoring a local area network
US7778606B2 (en) * 2002-05-17 2010-08-17 Network Security Technologies, Inc. Method and system for wireless intrusion detection
US7042852B2 (en) * 2002-05-20 2006-05-09 Airdefense, Inc. System and method for wireless LAN dynamic channel change with honeypot trap
US7277404B2 (en) * 2002-05-20 2007-10-02 Airdefense, Inc. System and method for sensing wireless LAN activity
US7058796B2 (en) * 2002-05-20 2006-06-06 Airdefense, Inc. Method and system for actively defending a wireless LAN against attacks
JP4245311B2 (en) 2002-06-27 2009-03-25 株式会社東芝 Electronic device and communication control method
US7277548B2 (en) * 2002-10-23 2007-10-02 Ndosa Technologies, Inc. Cryptographic method and computer program product for use in wireless local area networks
US7069312B2 (en) * 2002-12-06 2006-06-27 Microsoft Corporation Network location signature for disambiguating multicast messages in dual-IP stack and/or multi-homed network environments
US7474425B2 (en) * 2003-03-05 2009-01-06 Kabushiki Kaisha Toshiba Printing system, printing apparatus, printing server and printing method utilizing wireless communication
JP2004364199A (en) 2003-06-06 2004-12-24 Sony Corp Antenna module and portable communication terminal equipped therewith
US7184756B2 (en) * 2003-06-12 2007-02-27 Motorola Inc. Wireless communication device with tamper resistant configuration settings
US7486624B2 (en) * 2003-09-19 2009-02-03 Shaw Robert E Multiple and parallel access network tap for gigabit internet LANS
US20050097595A1 (en) * 2003-11-05 2005-05-05 Matti Lipsanen Method and system for controlling access to content
JP4290529B2 (en) * 2003-11-07 2009-07-08 株式会社バッファロー Access point, terminal, encryption key setting system, encryption key setting method, and program
JP2005167946A (en) 2003-12-05 2005-06-23 Nec Corp Communication device and wireless connection method by communication device
KR100534616B1 (en) * 2004-05-03 2005-12-07 삼성전자주식회사 method of hydrophobicity treatment of nozzle plate for use in ink jet head
US7656847B2 (en) * 2004-06-29 2010-02-02 Nokia Corporation Method and apparatus for utilizing bluetooth for WLAN service authentication and discovery
US7359674B2 (en) * 2005-05-10 2008-04-15 Nokia Corporation Content distribution & communication system for enhancing service distribution in short range radio environment

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6452498B2 (en) * 1995-06-06 2002-09-17 Wayport, Inc. System and method for providing geographic-based advertising
US6307843B1 (en) * 1997-07-18 2001-10-23 Nec Corporation Ad hoc network of mobile hosts using link table for identifying wireless links and destination addresses
US6845091B2 (en) * 2000-03-16 2005-01-18 Sri International Mobile ad hoc extensions for the internet
US7487112B2 (en) * 2000-06-29 2009-02-03 Barnes Jr Melvin L System, method, and computer program product for providing location based services and mobile e-commerce
US6414635B1 (en) * 2000-10-23 2002-07-02 Wayport, Inc. Geographic-based communication service system with more precise determination of a user's known geographic location
US20020095333A1 (en) * 2001-01-18 2002-07-18 Nokia Corporation Real-time wireless e-coupon (promotion) definition based on available segment
US20020124169A1 (en) * 2001-03-01 2002-09-05 Agrawal Dharma P. Authentication scheme for ad hoc and sensor wireless networks
US6842460B1 (en) * 2001-06-27 2005-01-11 Nokia Corporation Ad hoc network discovery menu
US20040204071A1 (en) * 2002-05-01 2004-10-14 Microsoft Corporation Method for wireless capability discovery and protocol negotiation, and wireless device including same
US20040014423A1 (en) * 2002-05-15 2004-01-22 Martin Croome Functionality and policies based on wireless device dynamic associations
US20030220835A1 (en) * 2002-05-23 2003-11-27 Barnes Melvin L. System, method, and computer program product for providing location based services and mobile e-commerce
US20030228842A1 (en) * 2002-06-05 2003-12-11 Nokia Corporation Automatic determination of access point content and services for short-range wireless terminals
US7103313B2 (en) * 2002-06-05 2006-09-05 Nokia Corporation Automatic determination of access point content and services for short-range wireless terminals
US20040203787A1 (en) * 2002-06-28 2004-10-14 Siamak Naghian System and method for reverse handover in mobile mesh Ad-Hoc networks
US7668123B1 (en) * 2002-06-28 2010-02-23 Nortel Networks Limited Network access device location
US20040199616A1 (en) * 2002-12-30 2004-10-07 Mika Karhu Automatic and dynamic service information delivery from service providers to data terminals in an access point network
US20040153676A1 (en) * 2003-01-31 2004-08-05 Microsoft Corporation Method and apparatus for managing power in network interface modules
US20040190718A1 (en) * 2003-03-25 2004-09-30 Dacosta Behram Mario Apparatus and method for location based wireless client authentication
US7603710B2 (en) * 2003-04-03 2009-10-13 Network Security Technologies, Inc. Method and system for detecting characteristics of a wireless network

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"Motorola User Guide Wireless Broadband Router WR850G" ©2003 Motorola Inc. (last modified 8/6/2003) (96 pages) http://www.motorola.com/mdirect/manuals/WR850G_User_Manual_E.pdf *
Dube, R. et al. "Signal stability-based adaptive routing (SSA) for ad hoc mobile networks" IEEE Personal Communications, Volume 4, Issue #1, February 1997 (pages 36-45) *
Excerpt from Bluetooth Specification Version 1.0A: "Part A: RADIO SPECIFICATION" 24 July 1999 (pages 17-32) http://ece.wpi.edu/analog/resources/bluetooth_a.pdf *
Jim Geier. "Understanding Wireless LAN Routers" Published 2/18/2003 (2 pages) http://www.wi-fiplanet.com/tutorials/article.php/1586861 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110087907A1 (en) * 2008-06-25 2011-04-14 Iiro Kristian Jantunen Power saving method and apparatus
CN106095512A (en) * 2016-06-21 2016-11-09 北京小米移动软件有限公司 Application program deployment method and device

Also Published As

Publication number Publication date
JP4543657B2 (en) 2010-09-15
JP2005136897A (en) 2005-05-26
US8345881B2 (en) 2013-01-01
US20050117750A1 (en) 2005-06-02

Similar Documents

Publication Publication Date Title
US8345881B2 (en) Communication system, information processing apparatus, method and computer program
US8170591B2 (en) Proximity-based mobile message delivery
US10560974B2 (en) Method and apparatus for connecting device by using Bluetooth technology
US7689252B2 (en) Method and system for processing information
US9557188B2 (en) Method and system for using relationship information from a social network to enable mobile device communications in a privacy enhanced network
EP3298813B1 (en) A communications system, a station, a controller of a light source, and methods therein for authenticating the station to access a network.
EP3503465B1 (en) Method for distributing key, related devices and system
CN102111766B (en) Network accessing method, device and system
US9112676B2 (en) Communication apparatus, control method thereof, and storage medium
CN105764058B (en) Method, device and system for accessing network
EP1578155A2 (en) Integration of secure identification logic into cell phone
US9503891B2 (en) Authentication method of wireless mesh network
WO2019041802A1 (en) Discovery method and apparatus based on service-oriented architecture
KR20010114272A (en) Method and apparatus for initializing secure communications among, and for exclusively pairing wireless devices
KR102094216B1 (en) Security supporting method and system for proximity based service device to device discovery and communication in mobile telecommunication system environment
JP2014526841A (en) Wireless communication with parallel re-authentication and connection setup
CN103270723A (en) One-click connect/disconnect feature for wireless devices forming a mesh network
CN102598794A (en) Concierge registry authentication service
CN104955038A (en) Method for distributing addressing identification, and access point, site and communication system
WO2016003311A1 (en) Device bootstrap to wireless network
US20150141061A1 (en) Method for tracking a mobile device onto a remote displaying unit
CN107251534A (en) The method and apparatus set for the formation of NAN data link group and data frame address
TW200824399A (en) Mobile communication system and device, network access device and key setting method thereof
JP6576129B2 (en) COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
US9979539B2 (en) Method and system of authenticating a network device in a location based verification framework

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION