WO2015092949A1 - 認証システムおよび認証方法 - Google Patents
認証システムおよび認証方法 Download PDFInfo
- Publication number
- WO2015092949A1 WO2015092949A1 PCT/JP2014/004389 JP2014004389W WO2015092949A1 WO 2015092949 A1 WO2015092949 A1 WO 2015092949A1 JP 2014004389 W JP2014004389 W JP 2014004389W WO 2015092949 A1 WO2015092949 A1 WO 2015092949A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- controller
- certificate
- crl
- revocation list
- storage capacity
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 62
- 238000003860 storage Methods 0.000 claims abstract description 129
- 210000000707 wrist Anatomy 0.000 claims 2
- 238000012545 processing Methods 0.000 description 96
- 238000010586 diagram Methods 0.000 description 57
- 238000004891 communication Methods 0.000 description 46
- 230000008569 process Effects 0.000 description 46
- 238000012795 verification Methods 0.000 description 19
- 102000036364 Cullin Ring E3 Ligases Human genes 0.000 description 17
- 108091007045 Cullin Ring E3 Ligases Proteins 0.000 description 17
- 238000004590 computer program Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 8
- 230000004048 modification Effects 0.000 description 7
- 238000012986 modification Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 239000000470 constituent Substances 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 238000009826 distribution Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 230000010354 integration Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000006872 improvement Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000010248 power generation Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/64—Self-signed certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- This disclosure relates to an authentication system that enables a device and a controller to be connected safely.
- Wi-Fi Protected Setup to facilitate connection between devices.
- Wi-Fi wireless connection only guarantees device interoperability between the appliance at the access point corresponding to the controller and the home appliance, and does not authenticate whether the connection partner is a legitimate device. .
- Non-patent Document 2 a public key authentication infrastructure (PKI: Public Key Infrastructure) in order to authenticate the validity of a device.
- PKI Public Key Infrastructure
- the authentication based on PKI guarantees the validity of a device by authenticating that an entity (home appliance or controller) has a private key and a public key certificate issued by a certificate authority. When a private key is leaked, the public key certificate needs to be revoked in order to prevent fraud using the public key certificate.
- a certificate revocation list CTL that is a certificate revocation list is represented (Non-patent Document 2).
- the CRL is a list of revoked public key certificates, and the certificate authority that issued the public key certificate adds a signature to the revoked public key certificate ID and distributes it.
- the home appliance or controller entity verifies whether the public key certificate of another entity to be connected is described in the CRL. Therefore, it is necessary to use the latest CRL as the CRL.
- Wi-Fi Alliance “Wi-Fi CERTIFIED Wi-Fi Protected Setup: Easing the User Experience for Home and Small Office Wi-FiR Network, 20 June (20th, 20th, 20th, 20th, 20th, 20th, 20th, 20th) Search], Internet ⁇ URL: http: // www. wi-fi.
- An authentication system includes a first device connected to a first controller via a first network, a second device connected to the second controller via a second network, a second controller, and a second controller A second device connected via a network,
- the first device receives a certificate revocation list from the first controller, The first device is: Detecting the second device connected to the second controller to which the first device is connected; The storage capacity of the second device is smaller than a predetermined threshold, and the certificate identifier of the public key certificate possessed by the second controller connected to the second device is described in the certificate revocation list.
- the certificate revocation list is not transmitted to the second device.
- FIG. 1 is an overall configuration diagram of an authentication system in Embodiment 1.
- FIG. 2 is a configuration diagram of a controller in Embodiment 1.
- FIG. 6 is a diagram illustrating an example of a connected device management table of a controller according to Embodiment 1.
- FIG. 6 is a diagram showing an example of a public key certificate in Embodiment 1.
- FIG. 3 is a diagram illustrating an example of a CRL in Embodiment 1.
- FIG. 1 is a configuration diagram of a device in Embodiment 1.
- FIG. 6 is a diagram illustrating an example of a connection controller management table of devices in the first embodiment.
- FIG. FIG. 3 is a configuration diagram of a manufacturer server in the first embodiment.
- FIG. 6 is a diagram illustrating an example of a device information management table of a maker server according to Embodiment 1.
- FIG. 2 is a configuration diagram of a portal server in Embodiment 1.
- FIG. 3 is a sequence diagram at the time of device registration in Embodiment 1.
- FIG. 3 is a sequence diagram at the time of device registration in Embodiment 1.
- FIG. 10 is a sequence diagram when updating the CRL of the manufacturer server in the first embodiment.
- FIG. 10 is a sequence diagram when updating the CRL of the device in the first embodiment.
- FIG. 10 is a sequence diagram when updating the CRL of the device in the first embodiment.
- FIG. 10 is a sequence diagram when updating the CRL of the device in the first embodiment.
- FIG. 10 is a sequence diagram when updating the CRL of the device in the first embodiment.
- FIG. 10 is a sequence diagram when updating the CRL of the device in the first embodiment.
- FIG. 10 is a sequence diagram at the time of device registration in the second embodiment.
- FIG. 10 is a sequence diagram at the time of device registration in the second embodiment.
- FIG. 10 is a sequence diagram at the time of device registration in the second embodiment.
- FIG. 10 is a diagram illustrating an example of a connection controller management table of devices in the second embodiment.
- 10 is a diagram illustrating an example of a connected device management table of a controller according to Embodiment 2.
- FIG. FIG. 10 is a sequence diagram at the time of device history information transmission processing in the second embodiment.
- FIG. 10 is a sequence diagram at the time of CRL update of a device in the third embodiment.
- FIG. 10 is a sequence diagram at the time of CRL update of a device in the third embodiment.
- FIG. 10 is a sequence diagram at the time of CRL update of a device in the third embodiment.
- FIG. 10 is a sequence diagram at the time of CRL update of a device in the third embodiment.
- FIG. 10 is an overall configuration diagram of an authentication system in a fourth embodiment.
- FIG. 10 is a sequence diagram at the time of CRL update of a device in the fourth embodiment.
- FIG. 10 is a sequence diagram at the time of CRL update of a device in the fourth embodiment.
- FIG. 10 is a sequence diagram at the time of CRL update of a device in the fourth embodiment.
- FIG. 10 is a sequence diagram at the time of CRL update of a device in the fourth embodiment.
- FIG. 10 is an overall configuration diagram of an authentication system in a fifth embodiment.
- FIG. 20 is a sequence diagram at the time of CRL update of a device in the fifth embodiment.
- FIG. 20 is a sequence diagram at the time of CRL update of a device in the fifth embodiment.
- FIG. 20 is a sequence diagram at the time of CRL update of a device in the fifth embodiment.
- FIG. 17 is a conceptual diagram of processing for transmitting a CRL from the device 200c to the device 200b when updating the CRL of the device in the third embodiment.
- FIG. 20 is a diagram illustrating an example of a connected device management table for each device according to the third embodiment. It is a block diagram of CRL in the case of producing CRL collectively in the modification (12). It is a block diagram of a CRL when a CRL is created collectively for each device type in Modification (13). It is a block diagram of CRL in the case of producing CRL collectively for every maker in modification (13).
- FIG. 10 is a sequence diagram of controller registration processing at the time of device registration in the third embodiment.
- FIG. 25 is a sequence diagram of controller registration processing at the time of device registration in the fifth embodiment.
- the home appliance When the home appliance is connected to only one controller, the home appliance obtains the CRL via the controller. At this time, if the controller is an unauthorized device, even if the public key certificate is described in the CRL, unless the controller distributes the CRL in which the controller's public key certificate is described to the home appliance, The controller is authenticated as a valid device.
- An authentication system includes a first device connected to a first controller via a first network, a second device connected to the second controller via a second network, a second controller, and a second controller A second device connected via a network, and an authentication system comprising: When the first device receives the certificate revocation list from the first controller, The first device is Detecting a second device connected to the second controller to which the first device is connected; When the storage capacity of the second device is smaller than a predetermined threshold value and the certificate identifier of the public key certificate of the second controller connected to the second device is described in the certificate revocation list , Sending the certificate revocation list to the second device, When the storage capacity of the second device is smaller than the predetermined threshold and the certificate identifier is not described in the certificate revocation list, the certificate revocation list is not transmitted to the second device.
- a device having a small storage capacity can receive and hold the minimum necessary CRL in which the certificate ID of the public key certificate of the connected controller is described, and can connect to an unauthorized controller. Can be prevented.
- the first device may transmit the certificate revocation list to the second device when the storage capacity of the second device is larger than a predetermined threshold value.
- the predetermined threshold may be the size of one certificate revocation list.
- a device with a large storage capacity can identify a device with a small storage capacity, and can determine whether or not to transmit a CRL to a device with a small storage capacity.
- the second device when the second device receives the certificate revocation list from the first device, the second device stops the connection with the second controller specified by the certificate identifier described in the certificate revocation list. Also good.
- the authentication system includes a first device connected to the first controller via the first network, a first controller connected to the first controller via the first network, a second controller, An authentication system including a second device connected by a network of two,
- the first device receives the certificate revocation list from the first controller, The first device is Detecting a second device connected to the first controller; If the storage capacity of the second device is smaller than the predetermined threshold, obtain the certificate identifier of the public key certificate of the second controller from the second device, If the certificate identifier is listed in the certificate revocation list, send the certificate revocation list to the second device, If the certificate identifier is not listed in the certificate revocation list, the certificate revocation list is not transmitted to the second device.
- the CRL can be transmitted to a device with a small storage capacity, and an unauthorized controller can be transmitted. Connection can be prevented.
- the second device when the second device receives the certificate revocation list from the first device, the second device stops the connection with the second controller specified by the certificate identifier described in the certificate revocation list. Also good.
- the first device may transmit the certificate revocation list to the second device when the storage capacity of the second device is larger than a predetermined threshold value.
- it further contains the 3rd apparatus connected with a 2nd controller with a 2nd network, and when a 2nd apparatus receives a certificate revocation list from a 1st apparatus, it will describe in a certificate revocation list.
- the third device connected to the second controller having the public key certificate indicated by the certificate identifier may be detected, and the certificate revocation list may be transmitted to the third device.
- the authentication system includes a first device connected to the first controller via the first network, a first controller connected to the first controller via the first network, a second controller, An authentication system including a second device connected by a network of two, The second device is When connecting to the second controller, the certificate identifier of the public key certificate of the second controller is received from the second controller, the certificate identifier is transmitted to the first device, The first device is When the certificate identifier received from the second device is described in the certificate revocation list held by the first device, the certificate revocation list is transmitted to the second device, If the certificate identifier is not described in the certificate revocation list held by the first device, the certificate revocation list is not transmitted to the second device.
- the second device when the second device receives the certificate revocation list, the second device confirms that the certificate identifier is described in the certificate revocation list and cancels the connection with the second controller. Also good.
- FIG. 1 is a diagram illustrating an overall configuration of the authentication system 10 according to the present disclosure.
- the authentication system 10 includes a controller 100, a device 200, a server 300, and a portal server 400.
- the controllers 100a and 100b are devices having a function of controlling the devices.
- the controllers 100a and 100b have functions such as connecting to a server, transmitting home appliance history information to the server, receiving a control request from the server, and controlling home appliances.
- the devices 200a to 200c are home appliances and housing equipment that collect device history information, such as televisions, recorders, air conditioners, refrigerators, and storage batteries.
- Servers 300a to 300c are a content server that distributes content, a manufacturer server that manufactures home appliances, and a service server that provides services.
- the history information of the device in the home is transmitted to the controller, and the controller transmits the history information of the device to the manufacturer server.
- the service server is an electric power company
- the electric power company connects to the controller via a home smart meter (not shown). Based on the power information from the power company, the controller controls household devices and suppresses power consumption in the home.
- FIG. 2 is a configuration diagram of the controller 100a.
- the controller 100a includes a device management unit 101, a device information holding unit 102, an authentication processing unit 103, an authentication information holding unit 104, and a communication unit 105.
- the controller 100b has the same configuration.
- the device management unit 101 manages devices connected to the controller. When there is a connection request from the device, the device management unit 101 transmits the public key certificate received from the device to the authentication processing unit 103 and requests an authentication process. The device management unit 101 receives the authentication result from the authentication processing unit 103. If the authentication is successful, the device management unit 101 registers the device ID and the certificate ID in the connected device management table held by the device information holding unit 102.
- the device information holding unit 102 manages information on devices connected to the controller.
- FIG. 3 is a diagram showing an example of a device information management table that the device information holding unit 102 has.
- the device information management table records a device ID and a certificate ID of a public key certificate possessed by the device.
- the authentication processing unit 103 performs an authentication process with the device.
- the authentication processing unit 103 receives an authentication request from the device management unit 101 together with the device public key certificate
- the authentication processing unit 103 acquires the CRL recorded in the authentication information holding unit 104 and obtains the certificate of the device public key certificate. It is verified whether the ID is described in the CRL. Further, the authentication processing unit 103 verifies the signature of the public key certificate using the public key (not shown) of the portal server that is the certificate authority. Also, the authentication processing unit 103 generates a random number and transmits the random number to the device. The authentication processing unit 103 verifies the signature of the random number received from the device. If any verification fails, the authentication processing unit 103 determines that the device is an unauthorized device.
- the authentication information holding unit 104 has a private key / public key certificate key pair and CRL.
- the private key, public key certificate, and CRL are embedded in the authentication information holding unit 104 at the time of shipment.
- FIG. 4 is a diagram illustrating an example of the configuration of a public key certificate.
- a public key certificate includes a version, an issuer, start and end of a validity period, a certificate ID, and a signature of a portal server that is a certificate authority.
- FIG. 5 is a diagram illustrating an example of the configuration of the CRL.
- the CRL includes a CRL version, an issuer, an issue date, a next issue date, a revoked certificate ID, and a signature of a portal server that is a certificate authority.
- the certificate ID is not limited to one, and there may be a plurality of certificate IDs.
- the communication unit 105 communicates with the device 200, the manufacturer server 300a, and the service server 300b.
- the communication unit 105 performs SSL (Secure Socket Layer) communication in communication with the server.
- SSL Secure Socket Layer
- a certificate necessary for SSL communication is recorded by the communication unit 105.
- FIG. 6 is a configuration diagram of the device 200.
- the device 200 includes a device management unit 201, a device history holding unit 202, a device information holding unit 203, an authentication processing unit 204, an authentication information holding unit 205, and a communication unit 206.
- the device management unit 201 transmits a connection request to the controller 100 at the time of activation.
- the communication unit 206 executes SSL communication with the content server 300c.
- the device management unit 201 Upon receiving the public key certificate from the controller, the device management unit 201 transmits an authentication request to the authentication processing unit 204.
- the device management unit 201 receives the authentication result from the authentication processing unit 204.
- the device management unit 201 registers the controller ID and the certificate ID in the connection controller management table held by the device information holding unit 203.
- the device management unit 201 transmits the device history recorded by the device history holding unit 202 to the server via the controller periodically or irregularly. When directly connected to the content server, it is transmitted to the server without going through the controller.
- the device history holding unit 202 acquires and records the device operation history.
- the device information holding unit 203 manages information on the controller 100 connected to the device.
- FIG. 7 is a diagram showing an example of a connection controller management table that the device information holding unit 203 has.
- the connected controller management table records the controller ID and the certificate ID of the public key certificate possessed by the controller.
- the authentication processing unit 204 performs authentication processing with the controller.
- the authentication processing unit 204 receives an authentication request together with the public key certificate from the device management unit 201
- the authentication processing unit 204 acquires the CRL recorded in the authentication information holding unit 205, and the certificate ID of the controller public key certificate is obtained. It is verified whether it is described in the CRL.
- the authentication processing unit 204 verifies the signature of the public key certificate using the public key (not shown) of the portal server that is the certificate authority.
- the authentication processing unit 204 generates a random number and transmits the random number to the controller.
- the authentication processing unit 204 verifies the signature of the random number received from the controller. If any verification fails, the authentication processing unit 204 determines that the controller is an unauthorized device.
- the authentication information holding unit 205 has a private key / public key certificate key pair and CRL.
- the key pair and CRL of the private key and public key certificate are embedded in the authentication information holding unit 205 when the device is shipped. Since the public key certificate and CRL have the same configuration as the public key certificate and CRL possessed by the controller, description thereof is omitted here.
- the communication unit 206 communicates with the controller 100 and the content server 300c.
- the communication unit 206 performs SSL (Secure Socket Layer) communication in communication with the content server.
- SSL Secure Socket Layer
- a certificate necessary for SSL communication is recorded by the communication unit 206.
- FIG. 8 is a configuration diagram of the manufacturer server 300a.
- the manufacturer server 300a includes a device information management unit 301, a device information holding unit 302, a CRL management unit 303, a CRL holding unit 304, and a communication unit 305.
- the service server 300b has the same configuration.
- the device information management unit 301 controls the device information holding unit 302 to manage the association between the controller and the device, the controller to be connected, the device ID, the certificate ID of the public key certificate, and the device history. In addition, when the device information management unit 301 detects a device or controller fraud, the device information management unit 301 notifies the portal server of the certificate ID of the public key certificate of the device or controller, and issues a CRL issuance request. The device information management unit 301 transmits the CRL to the CRL management unit 303 when the CRL is updated.
- the device information holding unit 302 records the controller ID, device ID, certificate ID, and device history.
- FIG. 9 is a diagram illustrating an example of a device information management table that the device information holding unit 302 has.
- the controller ID1 which is the controller ID, indicates that devices ID1 to ID3 are connected.
- the certificate ID of the controller public key certificate and the certificate ID of the device public key certificate are recorded.
- the history information of the device ID 1 indicates that it is recorded in the history information 1.
- the CRL management unit 303 controls the CRL holding unit 304 and updates the CRL of the CRL holding unit 304 when receiving the CRL from the device information management unit 301.
- the CRL holding unit 304 records the CRL.
- the communication unit 305 communicates with the controller 100a and the portal server 400. SSL communication is performed in communication with the controller 100a and the portal server 400. A certificate necessary for SSL communication is recorded by the communication unit 305.
- the configuration of the content server 300c is different from that of the manufacturer server 300a.
- SSL authentication is performed between the content server 300c and the device.
- the device information management table of the device information holding unit 302 is a device information management table without controller information.
- FIG. 10 is a configuration diagram of the portal server 400.
- the portal server 400 includes a CRL management unit 401, a CRL holding unit 402, an encryption processing unit 403, an encryption key holding unit 404, and a communication unit 405.
- the CRL management unit 401 controls the CRL holding unit 402 and manages the CRL.
- the CRL management unit 401 receives a CRL issuance request from the manufacturer server 300a or the service server 300b, the CRL management unit 401 sets data other than the CRL signature, and requests the cryptographic processing unit 403 to generate a CRL signature.
- the CRL management unit 401 receives the CRL generated by the signature from the encryption processing unit 403 and records it in the CRL holding unit 402.
- the CRL holding unit 402 records the issued CRL.
- the cryptographic processing unit 403 When the cryptographic processing unit 403 receives a signature generation request from the CRL management unit 401, the cryptographic processing unit 403 generates a CRL signature using the private key held in the encryption key holding unit 404. When the cryptographic processing unit 403 generates a CRL signature, the cryptographic processing unit 403 transmits the CRL signature to the CRL management unit 401.
- the encryption key holding unit 404 holds a secret key for CRL issuance of the portal server 400 serving as a certificate authority.
- the communication unit 405 communicates with each of the servers 300a to 300c. In communication with each of the servers 300a to 300c, SSL communication is performed. A certificate necessary for SSL communication is recorded by the communication unit 405.
- the operation of the authentication system 10 includes the following.
- FIGS. 11 to 12 show a sequence of processing in which the device 200c connects to the controller 100a and registers with the manufacturer server 300a. The same applies to the processing in which the devices 200a and 200b are connected to the controller 100a and registered in the manufacturer server 300a, and the processing in which the device 200c is connected to the controller 100b and registered in the service server 300b.
- the controller 100a verifies whether the certificate ID of the public key certificate of the device 200c that received the connection request is described in the CRL held in the authentication information holding unit. If it is described in the CRL, an error is notified to the device 200c and the process is terminated.
- the controller 100a verifies the signature of the public key certificate received from the device 200c. If the verification is not successful, an error is notified to the device 200c and the process is terminated.
- the signature at this time may be ECDSA (Elliptic Curve Digital Signature Algorithm). Since ECDSA is described in Non-Patent Document 3, it is not described here.
- the controller 100a generates a random number and transmits it to the device 200c together with the controller ID and the public key certificate.
- the device 200c verifies whether the certificate ID of the public key certificate of the controller 100a that transmitted the connection request is described in the CRL that is held. If it is described in the CRL, an error is notified to the controller 100a and the process is terminated.
- the device 200c verifies the signature of the public key certificate received from the controller 100a. If the verification fails, an error is notified to the controller 100a and the process is terminated.
- the device 200c generates a signature from the random number received from the controller 100a and the private key of the device 200c.
- the device 200c generates a random number and transmits it to the controller 100a together with the signature generated in S107.
- the controller 100a receives the signature and the random number, and verifies the signature using the public key certificate received in S101. If the signature verification is not successful, an error is notified to the device 200c and the process is terminated.
- the controller 100a generates a signature from the random number received in S109 and the private key of the controller 100a, and transmits the signature to the device 200a.
- the device 200c receives the signature, and verifies the signature using the public key certificate received in S104. If the signature verification is not successful, an error is notified to the controller 100a and the process is terminated.
- the controller 100a transmits the controller ID and the certificate ID of the public key certificate, the device ID of the device that has been successfully verified in S109, and the certificate ID of the public key certificate to the manufacturer server, and discloses the device ID and the device. Register the certificate ID of the key certificate in the connected device management table.
- FIG. 13 shows a sequence for updating the CRL of the manufacturer server 300a.
- the manufacturer server 300a detects an unauthorized device.
- an unauthorized device As a specific example, when it is detected that a plurality of controllers with the same certificate ID are connected to the maker server 300a, it is detected that a plurality of devices with the same certificate ID are registered in the maker server 300a. Such as the case. Even when it is detected that the private key has been leaked, the device or controller that holds the corresponding public key certificate is determined to be an unauthorized device.
- the manufacturer server 300a adds the certificate ID of the public key certificate of the unauthorized device or unauthorized controller detected in S121 to the certificate ID described in the CRL.
- the manufacturer server 300a transmits a CRL issuance request to the portal server 400, which is the certificate authority, together with the certificate IDs of all public key certificates of the unauthorized device and the unauthorized controller.
- the portal server 400 issues a CRL from the received certificate ID.
- the portal server 400 transmits the CRL to the manufacturer server 300a.
- the manufacturer server 300a records the received CRL in the CRL holding unit and updates it to the latest CRL.
- the manufacturer server 300a updates the CRL before the next issue date without detecting an unauthorized device in S121.
- FIG. 14 to FIG. 15 show a sequence for updating the CRL of the device 200c from the controller 100b.
- the process of updating the CRL of the device 200c from the controller 100b will be described as an example, but the process of updating the CRL of the device 200c from the controller 100a is the same process.
- the service server 300b After updating the CRL, the service server 300b requests the controller 100b to perform CRL update processing together with the CRL.
- the controller 100b updates the CRL received from the service server 300b.
- the controller 100b verifies whether the connected device is described in the CRL. If it is described, the service server 300b is notified and the registration of the described device is deleted.
- the controller 100b requests CRL update processing together with the CRL to all the devices 200 to be connected.
- CRL update processing together with the CRL to all the devices 200 to be connected.
- a description will be given based on an example in which the update process is requested to the device 200c.
- the device 200c verifies whether all the controllers to be connected are described in the CRL. When at least one controller to be connected is described, the detection of the unauthorized controller is notified to other devices and controllers. Also, the registration of the unauthorized controller in the connected controller management table is deleted.
- the device 200c compares the CRL received from the controller 100b with the CRL of the authentication information holding unit, and verifies whether there is a contradiction. Specifically, when the CRL received from the controller 100a is recorded, the CRL issue date received from the controller 100b is compared with the next CRL issue date received from the controller 100a. If the next issue date of the CRL received from the controller 100a is earlier than the issue date of the CRL received from the controller 100b, the controller 100a determines that the next issue date of the CRL received from the controller 100a has passed. If the CRL is not updated, it is detected as an unauthorized controller.
- the CRL versions received from the controller 100a and the controller 100b are compared, and if the CRL versions do not match, it is detected that the controller that transmitted the CRL with the old CRL version did not update the CRL as an unauthorized controller. .
- the device 200c notifies other devices and controllers of detection of the unauthorized controller. Also, the registration of the unauthorized controller in the connected controller management table is deleted. Further, the connection with the controller 100a is cut off.
- the device 200c records the received CRL in the authentication information holding unit.
- FIG. 16 shows a sequence for updating the CRL of the device 200c from the content server 300c.
- the content server 300c After updating the CRL, the content server 300c requests the device 200a to perform CRL update processing together with the CRL.
- the device 200c verifies whether all connected controllers are described in the CRL. When at least one controller to be connected is described, the detection of an unauthorized controller is notified to other devices, controllers, and content server 300c. Also, the registration of the unauthorized controller in the connected controller management table is deleted.
- the CRL could not be updated.
- the device receives CRLs from a plurality of controllers.
- the CRL can be acquired and updated via a plurality of networks.
- the encryption key for communication is shared, and the history information of the device is transmitted to the server by encrypted communication.
- the operation of the authentication system 11 includes the following.
- FIGS. 17 to 19 show a sequence of processing in which the device 200c connects to the controller 100a and registers with the manufacturer server. The same applies to the processing in which the devices 200a and 200b are connected to the controller 100a and registered in the manufacturer server, and the processing in which the device 200c is connected to the controller 100b and registered in the service server.
- the processing from (S201) to (S203) is the same as the processing from S101 to S103 in the first embodiment, and thus description thereof is omitted here.
- the controller 100a transmits the controller ID and the public key certificate to the device 200c.
- ECDH Elliptic Curve Diffie-Hellman
- ECDH is a key exchange method of elliptic curve cryptography. Since ECDH is described in Non-Patent Document 4, it will not be described here.
- the controller 100a generates a random number and transmits it to the device 200c.
- the device 200c receives a random number from the controller 100a and encrypts it with the shared key.
- the device 200c generates a random number and transmits it to the controller 100a together with the encrypted random number generated in S210.
- the controller 100a receives the encrypted random number and the random number, decrypts the encrypted random number with the shared key, and verifies whether it matches the random number generated in S209. If the verification is not successful, an error is notified to the device 200c and the process is terminated.
- the controller 100a encrypts the random number received in S212 with the shared key, and transmits the encrypted random number to the device 200c.
- the device 200c receives the encrypted random number, decrypts the encrypted random number with the shared key, and verifies whether it matches the random number generated in S211. If the verification is not successful, an error is notified to the controller 100a and the process is terminated.
- FIG. 20 is a connection controller management table in the second embodiment. In addition to the connection controller management table of the first embodiment, it is composed of a shared key shared with the controller.
- FIG. 21 is a connected device management table in the second embodiment. In addition to the connected device management table of the first embodiment, it is composed of a shared key shared with the device.
- FIG. 22 shows a sequence for transmitting device history information from the device to manufacturer server 300a. This upload is performed regularly or irregularly.
- the device encrypts the accumulated device history information with the shared key, and transmits it to the controller together with the device ID.
- the controller receives the device ID and the encrypted device history information, searches for the shared key from the device ID, and decrypts the device history information with the shared key.
- the controller transmits the controller ID, the device ID received from the device, and the device history information to the manufacturer server 300a.
- the manufacturer server 300a registers the received controller ID, device ID, and device history information.
- Second Embodiment key exchange is performed during device authentication, and challenge-response authentication is performed using a shared key. Since the shared key can be generated only from the public key corresponding to the private key, if the private key corresponding to the public key of the public key certificate is not provided, the shared key cannot be generated and challenge response authentication is not successful. This makes it possible to reduce authentication processing compared to authentication processing that performs signature generation using a private key and signature verification using a public key. In addition, encrypted communication of device history information using a shared key is possible, and leakage of device history information can be prevented.
- the CRL when a CRL of a device connected to an unauthorized controller is updated, the CRL is updated via a legitimate controller connected to the device to prevent connection to the unauthorized controller.
- the device that has performed the CRL update can detect other devices connected to the unauthorized controller, and can notify the detected other devices of detection of the unauthorized controller.
- a device having a small storage capacity holds only the minimum necessary CRL
- a device having a large storage capacity having a hard disk (HDD) holds all issued CRLs.
- another device connected to the controller to which a device with a large storage capacity is connected is detected, and it is determined whether or not to transmit a CRL according to the detected storage capacity of the device.
- a device having a large storage capacity has a controller-specific connected device management table and determines the storage capacity of each device. Details of the controller-specific connected device management table will be described in 3.1.
- the devices 200a and 200b are devices with a small storage capacity
- the device 200c is a device with a large storage capacity such as an HDD.
- the controller-specific connected device management table is added to the device information held by the device information holding unit 203 in the device 200c in the first embodiment.
- the controller-specific connected device management table is created by the device itself when the device connects to the controller, and is stored in the device information holding unit.
- the controller-specific connected device management table includes a controller ID, a device ID, and a storage capacity.
- the controller ID describes the controller ID of the controller to which the device holding the table is connected.
- the device ID the device ID of the device connected to each controller is described.
- the storage capacity describes the size of the storage capacity of each device.
- the size of the storage capacity is determined by the device that creates the table when detecting the device.
- a determination method for example, there is a method in which a detected device transmits a storage capacity to a device that creates a table, or transmits whether or not it has an HDD. In the former case, the determination is made based on whether or not the storage capacity is larger than a preset threshold value.
- a controller 100a and a controller 100b to which the device 200c is connected are described. It is described that the devices 200a and 200b are connected to the controller 100a, and that the devices 200a and 200b have a small storage capacity. Since no controller other than the device 200c is connected to the controller 100b, NULL is registered for both the device ID and the storage capacity.
- the operation of the authentication system 10a includes the following.
- the operation at the device registration processing in the present embodiment is the addition of the operation of registering the connected device management table for each controller to the operation of the second embodiment.
- FIG. 40 shows a sequence after the device registers the controller in the connection controller management table at the time of device registration.
- a description is given of a process in which when the device 200c performs device registration with the controller 100a, other devices connected to the controller 100a are detected, and the device ID of the detected device is registered in the row of the controller 100a. To do.
- the device 200c Upon registering the controller in the connection controller management table, the device 200c registers the controller ID registered in the connection controller management table in the controller-specific connection device management table. Here, the device 200c registers the controller ID of the controller 100a.
- the device 200c detects a device connected to the controller having the controller ID registered in S321. If not detected, the controller registration process is terminated.
- the device 200c registers the controller ID and the device ID of the device detected in S322 in the per-controller connected device management table.
- the device 200c transmits a storage capacity inquiry to the device having the device ID registered in the controller-specific connected device management table.
- the device that has received the storage capacity inquiry Upon receiving the storage capacity inquiry, the device that has received the storage capacity inquiry transmits the device ID and the storage capacity to the device 200c.
- the device 200c confirms whether the storage capacity received in S325 is smaller than a preset threshold value. If it is smaller than the threshold value, the controller ID of the controller-specific connected device management table is registered as small in the storage capacity of the row that matches the device ID received in S325. If it is greater than or equal to the threshold value, the large storage capacity is registered.
- the threshold value is, for example, “two or more CRLs”. That is, when the device can have two or more CRLs, the large is registered in the storage capacity, and the small is registered in the storage capacity otherwise.
- CRL is transmitted from device 200c to device 200b, and unauthorized controller 100a registration is deleted. An example of this process will be described.
- the processing of the device 200a connected to the controller 100a is the same as that of the device 200b.
- FIG. 35 is a conceptual diagram of processing for transmitting a CRL from the device 200c to the device 200b.
- the device 200c having a large storage capacity records all CRLs received from the controller 100b. On the other hand, since the device 200b with a small storage capacity cannot record all CRLs, only the CRL received from the device 200c is recorded.
- the device 200c Upon receiving the CRL in which the certificate ID of the public key certificate of the controller 100a is received, the device 200c detects the device 200b connected to the controller 100a and transmits the CRL.
- the device 200c receives a CRL in which the certificate ID of the public key certificate of the controller 100a is described from the controller 100b.
- the device 200c stores the CRL in which the certificate ID of the public key certificate of the controller 100a is described in the HDD.
- the device 200c detects the device 200b with a small storage capacity connected to the common controller, and transmits the CRL to the device 200b when the controller is the controller 100a.
- the device 200b stores the CRL in which the certificate ID of the public key certificate of the controller 100a is described in the memory.
- the device 200c describes the certificate IDs of the public key certificates of the controller 100x, the controller 100y, and the controller 100z in addition to the CRL that describes the certificate ID of the public key certificate of the controller 100a to be connected. Hold CRL.
- the device 200b holds only the CRL in which the certificate ID of the public key certificate of the controller 100a to be connected is described.
- the service server 300b transmits the newly issued CRL (hereinafter, new CRL) to the controller 100b.
- the CRL describes the certificate ID of the public key certificate of the controller 100a.
- the controller 100b transmits the new CRL received from the service server 300b to the device 200c.
- the controller 100b performs the same processing as in S132 to S133 of the first embodiment.
- the device 200c verifies the CRL signature received from the controller 100b. If the verification is not successful, the CRL update process is terminated.
- the device 200c verifies whether all the controllers to be connected are described in the CRL. If even one controller to be connected is described, the registration of the unauthorized controller in the connected controller management table is deleted. Here, the registration of the controller 100a is deleted.
- the device 200c compares the CRL received from the controller 100b with the CRL of the authentication information holding unit, and verifies whether there is a contradiction. If there is a conflict, if there is a conflict, the registration of the controller that is the distribution source of the CRL with the conflict is deleted from the connected controller management table. Here, the registration of the controller 100a is deleted. Further, the connection with the controller 100a is cut off.
- the device 200c records the CRL received from the controller 100b.
- the device 200c refers to the controller-specific connected device management table and confirms the storage capacity of the device from the first row of the table. If the target device is a device with a large storage capacity, the device 200c transmits a new CRL to the target device.
- the device 200c verifies whether the controller connected to the target device is described in the CRL. At this time, the device 200c first extracts the controller ID of the controller to which the target device is connected by referring to the controller-specific connected device management table. Next, the device 200c refers to the connection controller management table and extracts the certificate ID of the controller public key certificate corresponding to the extracted controller ID. The device 200c verifies whether the extracted certificate ID is described in the CRL. When the controller to be connected is described in the CRL, the device 200c transmits a new CRL to the target device. When the controller to be connected is not described in the CRL, the device 200c does not transmit a new CRL to the target device. Here, a new CRL is transmitted to the device 200b which is a device having a small storage capacity and the controller to be connected is the controller 100a described in the CRL.
- the device 200c confirms whether the target device is the last row in the table. If it is not the last row, the processing in S307 to S309 is performed with the device in the next row as the target device. If it is the last line, the CRL update process is terminated.
- the device 200b verifies the CRL signature received from the device 200c. If the verification is not successful, the CRL update process is terminated.
- the device 200b verifies whether all connected controllers are described in the CRL. If even one controller to be connected is described in the CRL, the registration of the unauthorized controller in the connected controller management table is deleted. Here, the registration of the controller 100a is deleted.
- the device 200b records the CRL received from the device 200c.
- the device 200b may transmit the CRL update completion notification to the device 200c as a CRL update completion notification, and the device 200c may display the fact on the display.
- the television for example, displays that the CRL of the device connected to the same controller has been updated when the user turns on the television.
- Embodiment 3 when a device having a large storage capacity receives a new CRL, it detects another device connected to the controller to which the device is connected, and detects the detected device. Whether or not a new CRL is to be transmitted is determined based on the storage capacity. As a result, a device having a small storage capacity can receive and hold the minimum necessary CRL in which the certificate ID of the public key certificate of the connected controller is described, and can connect to an unauthorized controller. Can be prevented.
- a device having a large storage capacity when a device having a large storage capacity receives a new CRL, it detects another device connected to the controller to which the device is connected, and determines the CRL based on the detected storage capacity of the device. Judging whether to send.
- the other device has the public key certificate with the certificate ID described in the CRL. I do not know if connected to a controller with. As a result, the device connected to the controller having the public key certificate with the certificate ID described in the CRL continues to be connected to the unauthorized controller.
- a device with a large storage capacity when a device with a large storage capacity receives a new CRL, a device with a large storage capacity is connected to a device with a small storage capacity in the public key certificate of a controller other than the controller connected in common.
- the certificate ID is confirmed, and if the certificate ID is described in the CRL, the CRL is transmitted. Further, the device having a small storage capacity that has received the CRL transmits the CRL to another device connected to the unauthorized controller.
- the storage capacity of the controller is small and a plurality of CRLs cannot be held.
- the controller holds only the minimum necessary CRL in which the certificate ID of the device public key certificate is described.
- the controller connected to the device having a large storage capacity transmits the CRL including the held CRL to the device having a large storage capacity. If the storage capacity of the controller is sufficient, the controller may also hold all CRLs and the controller may send CRLs directly to each device. However, since not all controllers have a large storage capacity, a use case having a configuration described in this embodiment will be described.
- FIG. 26 is a diagram illustrating an overall configuration of the authentication system 10b according to the present disclosure.
- the authentication system 10b includes a controller 100, a device 200, a server 300, and a portal server 400 similar to those in the first embodiment.
- the device 200c is a device having a large storage capacity
- the devices 200a and 200b are devices having a small storage capacity.
- connection configuration different from the first and third embodiments is shown.
- the devices 200a and 200b are connected to the controller 100a, and the devices 200b and 200c are connected to the controller 100b.
- the portal server 400 issues one CRL for each certificate ID.
- the operation of the authentication system 10b includes the following.
- FIGS. 27 to 30 show a sequence of the following processing.
- the device 200c When the device 200c is not connected to the controller having the public key certificate with the certificate ID described in the new CRL, the device having a small storage capacity has the public key certificate with the certificate ID described in the CRL. To determine whether or not to transmit a CRL to a device having a small storage capacity. On the other hand, the device 200c unconditionally transmits a CRL to a device with a large storage capacity.
- the device 200b receives the new CRL from the device 200c, and transmits the new CRL to the device 200a connected to the unauthorized controller 100a. Will be described.
- the service server 300b transmits a new CRL to the controller 100b.
- the CRL describes the certificate ID of the public key certificate of the controller 100a.
- the controller 100b transmits a new CRL to the device 200c.
- the device 200c verifies the received CRL signature. If the verification is not successful, the CRL update process is terminated.
- the device 200c compares the CRL received from the controller 100b with the CRL of the authentication information holding unit, and verifies whether there is a contradiction. When there is a contradiction, the registration of the controller that is the distribution source of the CRL with the contradiction is deleted from the connected controller management table.
- the device 200c records the CRL received from the controller 100b.
- the device 200c refers to the controller-specific connected device management table and confirms the storage capacity of the device from the first row of the table. If the device in the controller-specific connected device management table is a device with a large storage capacity, the device 200c transmits a new CRL to the target device.
- the device 200 in the controller-specific connected device management table is a device with a small storage capacity
- the device 200c transmits a CRL update notification to the target device.
- the device 200c transmits a CRL update notification to the device 200b.
- the device 200b Upon receiving the CRL update notification from the device 200c, the device 200b refers to the connection controller management table, and proves the public key certificate of the controller connected to other than the controller connected in common with the device 200c. The book ID is extracted. Here, the device 200b extracts the certificate ID of the public key certificate of the controller 100a.
- the device 200b transmits the certificate ID of the public key certificate of the controller 100 extracted in S409 to the device 200c.
- the device 200b transmits the certificate ID of the public key certificate of the controller 100a.
- the device 200c checks whether the certificate ID received from the device 200b is described in the CRL. When the certificate ID is described in the CRL, the device 200c transmits the CRL to the device 200b. When the certificate ID is not described in the CRL, the device 200c does not transmit the CRL to the device 200b.
- the device 200c confirms whether the target device is the last row in the table. If it is not the last row, the processing in S407 to S412 is performed with the device in the next row as the target device. If it is the last line, the CRL update process is terminated.
- the device 200b verifies the CRL signature received from the device 200c. If the verification is not successful, the CRL update process is terminated.
- the device 200b verifies whether all the controllers to be connected are described in the CRL. If even one controller to be connected is described in the CRL, the registration of the unauthorized controller in the connected controller management table is deleted. Here, the registration of the controller 100a is deleted.
- the device 200b records the CRL received from the device 200c.
- the device 200b detects all other devices connected to the controller having the public key certificate with the certificate ID described in the CRL received from the device 200c. Here, the device 200b detects the device 200a. If not detected, the CRL update process is terminated.
- the device 200b transmits the CRL received from the device 200c to the device 200a.
- the device 200a verifies the CRL signature received from the device 200b. If the verification is not successful, the CRL update process is terminated.
- the device 200a verifies whether all the controllers to be connected are described in the CRL. If even one controller to be connected is described in the CRL, the registration of the unauthorized controller in the connected controller management table is deleted. Here, the registration of the controller 100a is deleted.
- the device 200a records the CRL received from the device 200b.
- a device having a large storage capacity receives a certificate ID of a public key certificate of a controller other than the commonly connected controllers from a device having a small storage capacity. Whether the CRL is transmitted to a device having a small storage capacity is determined based on whether the certificate ID is described in the CRL. Furthermore, when a device with a small storage capacity receives a new CRL from a device with a large storage capacity, the device transmits a new CRL to another device connected to the controller having the public key certificate with the certificate ID described in the CRL. Yes.
- the CRL can be transmitted to a device with a small storage capacity, and an unauthorized controller can be transmitted. Connection can be prevented.
- a device having a large storage capacity checks the certificate ID of a public key certificate of a controller other than the controller commonly connected to the device having a small storage capacity. Depending on whether the certificate ID is described in the CRL, it is determined whether to transmit the CRL.
- Embodiment 5 when a device with a small storage capacity is newly connected to the controller, it is confirmed with the device with a large storage capacity whether the new controller is a regular controller. At the time of confirmation, a device with a small storage capacity transmits the certificate ID of the public key certificate of the new controller to a device with a large storage capacity, and a device with a large storage capacity has the certificate ID described in the CRL. The permission / prohibition of the connection to the new controller is determined depending on the circumstances.
- the storage capacity of the controller is small. If a legitimate controller connected to a device with a small storage capacity is a controller with a large storage capacity and holds all CRLs, the controller may be queried. However, since not all controllers have a large storage capacity, a use case having a configuration described in this embodiment will be described.
- FIG. 31 is a diagram illustrating an overall configuration of the authentication system 10c according to the present disclosure.
- the authentication system 10c includes the same controller 100, device 200, server 300, and portal server 400 as in the first embodiment.
- the new controller 100c is added to the configuration of the first embodiment, the configuration is the same as that of the controllers 100a and 100b of the first embodiment, and thus description thereof is omitted.
- a maker server 300d to which the controller 100c is connected is added, the configuration is the same as that of the server 300a of the first embodiment, and thus description thereof is omitted.
- the device 200c is a device having a large storage capacity
- the devices 200a and 200b are devices having a small storage capacity.
- the devices 200a and 200b are connected to the controller 100a, and the devices 200b and 200c are connected to the controller 100b.
- the device 200b is trying to connect to the controller 100c, and the controller 100c is connected to the server 300d.
- the portal server 400 issues one CRL for each certificate ID.
- the operation of the authentication system 10c includes the following.
- FIG. 41 shows a sequence after the device registers the controller in the connection controller management table at the time of device registration.
- a description is given of a process in which when the device 200c performs device registration with the controller 100a, other devices connected to the controller 100a are detected, and the device ID of the detected device is registered in the row of the controller 100a. To do.
- the device 200c transmits an inquiry destination device ID registration request to the device with a small storage capacity so that the device ID of the device 200c is registered as an inquiry destination of the CRL update inquiry. At that time, the device ID of the device 200c is transmitted together.
- the device 200b Upon receiving the inquiry device ID registration request, the device 200b registers the device ID of the received device 200c.
- the received device ID is stored in the device information holding unit 203, for example.
- FIGS. 32 to 34 store whether a new controller is a legitimate controller when a device with a small storage capacity registers the device with the new controller.
- a sequence of processing in which the device 200c having a large capacity is inquired and the device 200c determines permission / prohibition of connection to the new controller is shown.
- a process of making an inquiry to the device 200c when the device 200b registers the device in the controller 100c will be described as an example. The same applies to the process of registering the device in the new controller 100c when the device 200a is connected to the controller 100b.
- the device 200b verifies whether or not the certificate ID of the public key certificate of the controller that transmitted the connection request is described in the CRL. If it is described in the CRL, an error is notified to the controller and the process is terminated. Here, it is verified whether or not the certificate ID of the controller 100c is described in the CRL.
- the device 200b refers to the inquiry destination device ID, and transmits the certificate ID of the public key certificate of the controller 100c to the device 200c of the inquiry destination device ID.
- the device 200c verifies whether the certificate ID received from the device 200b is described in the CRL held by the authentication information holding unit. If it is described in the CRL, a connection prohibition notification is transmitted to the device 200b. The device 200b transmits an error notification to the controller 100c, and ends the device registration process.
- the device 200c transmits a connection permission notification to the device 200b.
- the device 200b verifies the signature of the public key certificate received from the controller 100c. If the verification fails, an error notification is transmitted to the controller 100c, and the device registration process is terminated.
- the device 200b generates a signature from the random number received from the controller 100c and the private key of the device 200b.
- the device 200b generates a random number and transmits it to the controller 100c together with the signature generated in S510.
- operations S512 to S517 at the time of device registration processing performed between the device 200b, the controller 100c, and the manufacturer server are the same processing as S109 to S114 of the first embodiment, and thus description thereof is omitted.
- Embodiment 5 when a device with a small storage capacity registers a device with a new controller, the device with a large storage capacity is inquired whether the new controller is a legitimate controller and stored. A device with a large capacity determines permission / prohibition of connection to the new controller. As a result, if the controller to which a device with a small storage capacity is newly connected is an unauthorized controller, connection to the unauthorized controller can be prevented at the device connection stage.
- the controller may acquire the CRL from the server during the device registration process. Further, it may be periodically acquired even during the device registration process. Further, it may be acquired in the server before the next CRL issuance date.
- the device communicates with the server via the controller, or the device communicates with the content server 300c and acquires the CRL.
- the CRL may be acquired via the terminal.
- Communication between the mobile terminal and the device may be NFC (Near Field Communication) communication or Bluetooth (registered trademark) communication.
- the device when the device determines that the controller is unauthorized, the device notifies the other device 200 or the controller, but when the device or controller that received the notification has a display function, A display screen indicating that an unauthorized controller has been detected may be output. If there is no display screen, an error code may be displayed or a lamp may be blinked.
- the key for encryption communication may be exchanged during the device registration process.
- DH Denssion-Hellman
- ECDH ECDH
- the controller may display the power consumption of the connected device, the power of the storage battery, and the amount of power generated by photovoltaic power generation.
- the controller may be a distribution board installed at home.
- the communication between the controller and the device may be Wi-Fi, specific low-power radio, power line communication, or Bluetooth (registered trademark).
- the portal server 400 issues a CRL as a certificate authority.
- the present invention is not limited to this, and the maker server 300a, the service server 300b, and the content server 300c serve as a certificate authority. May be issued.
- the CRL including all certificate IDs of the unauthorized controller public key certificate is issued.
- the present invention is not limited to this, and only the device connected to the manufacturer server 300a is issued. It is also possible to issue a CRL for only a device that can be connected to the CRL, the device associated with the service provided by the service server 300b, the CRL of the controller, or the content server 300c. Furthermore, a CRL may be issued for each type of device manufactured by the manufacturer server 300a and for each manufacturing year.
- each time a device with a large storage capacity updates a CRL it transmits the CRL to a device with a small storage capacity.
- the device may be periodically inquired, and the CRL may be transmitted as necessary.
- the CRL of each device is updated without checking the certificate ID of the public key certificate of the controller connected to the device with a small storage capacity. Thus, connection to an unauthorized controller can be prevented.
- FIG. 37 shows a configuration diagram of the CRL when the CRL is created collectively.
- the CRL includes a CRL version, an issuer, a valid period start, a valid period end, a certificate ID of one or more revoked public key certificates, and a signature.
- CRLs may be created in groups by grouping the CRLs by device type and manufacturer.
- FIG. 38 shows a configuration diagram of a CRL for each device type.
- the CRL includes a CRL version, an issuer, a valid period start, a valid period end, a device type ID, a certificate ID of one or more revoked public key certificates, and a signature.
- FIG. 39 shows a CRL configuration diagram for each manufacturer.
- the CRL includes a CRL version, an issuer, a valid period start, a valid period end, a manufacturer ID, a certificate ID of one or more revoked public key certificates, and a signature.
- the device 200b records the CRL in which the certificate ID of the public key certificate of the controller 100a received from the device 200c is recorded.
- the CRL may be deleted after cutting. Thereby, the capacity of the storage medium is reduced.
- an authentication process is performed when a new controller is connected to prevent unauthorized connection.
- the device with a large storage capacity transmits permission / prohibition of connection to a device with a small storage capacity.
- a CRL may be transmitted.
- a device with a large storage capacity transmits a CRL to a device with a small storage capacity
- the device with a small storage capacity verifies the CRL, and a controller having a public key certificate with a certificate ID described in the CRL. Do not connect.
- Each of the above devices is specifically a computer system including a microprocessor, ROM, RAM, a hard disk unit, a display unit, a keyboard, a mouse, and the like.
- a computer program is recorded in the RAM or hard disk unit.
- Each device achieves its functions by the microprocessor operating according to the computer program.
- the computer program is configured by combining a plurality of instruction codes indicating instructions for the computer in order to achieve a predetermined function.
- a part or all of the components constituting each of the above devices may be configured by one system LSI (Large Scale Integration).
- the system LSI is an ultra-multifunctional LSI manufactured by integrating a plurality of components on a single chip, and specifically, a computer system including a microprocessor, ROM, RAM, and the like. .
- a computer program is recorded in the RAM.
- the system LSI achieves its functions by the microprocessor operating according to the computer program.
- each part of the constituent elements constituting each of the above devices may be individually made into one chip, or may be made into one chip so as to include a part or all of them.
- the system LSI is used here, it may be called IC, LSI, super LSI, or ultra LSI depending on the degree of integration. Further, the method of circuit integration is not limited to LSI's, and implementation using dedicated circuitry or general purpose processors is also possible.
- An FPGA Field Programmable Gate Array
- a reconfigurable processor that can reconfigure the connection and setting of circuit cells inside the LSI may be used.
- a part or all of the constituent elements constituting each of the above devices may be constituted by an IC card or a single module that can be attached to and detached from each device.
- the IC card or module is a computer system that includes a microprocessor, ROM, RAM, and the like.
- the IC card or the module may include the super multifunctional LSI described above.
- the IC card or the module achieves its functions by the microprocessor operating according to the computer program. This IC card or this module may have tamper resistance.
- the present disclosure may be the method described above. Further, the present invention may be a computer program that realizes these methods by a computer, or may be a digital signal composed of a computer program.
- the present disclosure also relates to a computer program or a recording medium that can read a digital signal, such as a flexible disk, a hard disk, a CD-ROM, an MO, a DVD, a DVD-ROM, a DVD-RAM, a BD (Blu-ray (registered trademark)). ) Disc), or recorded in a semiconductor memory or the like. Further, it may be a digital signal recorded on these recording media.
- a digital signal such as a flexible disk, a hard disk, a CD-ROM, an MO, a DVD, a DVD-ROM, a DVD-RAM, a BD (Blu-ray (registered trademark)).
- the present disclosure may transmit a computer program or a digital signal via an electric communication line, a wireless or wired communication line, a network represented by the Internet, data broadcasting, or the like.
- the present disclosure may be a computer system including a microprocessor and a memory.
- the memory may record the computer program, and the microprocessor may operate according to the computer program.
- program or digital signal may be recorded on a recording medium and transferred, or the program or digital signal may be transferred via a network or the like, and may be implemented by another independent computer system.
- a device having a large storage capacity detects a device having a small storage capacity, and the controller to which the device is connected is a controller described in the CRL. Otherwise, by not transmitting the CRL, a device with a small storage capacity can hold the minimum necessary CRL.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
前記第1の機器が前記第1のコントローラから証明書失効リストを受信すると、
前記第1の機器は、
前記第1の機器が接続する前記第2のコントローラに接続する前記第2の機器を検出し、
前記第2の機器の記憶容量が所定のしきい値より小さく、かつ、前記第2の機器が接続する前記第2のコントローラの持つ公開鍵証明書の証明書識別子が前記証明書失効リストに記載されている場合、前記第2の機器へ前記証明書失効リストを送信し、
前記第2の機器の記憶容量が所定のしきい値より小さく、かつ、前記証明書識別子が前記証明書失効リストに記載されていない場合、前記第2の機器へ前記証明書失効リストを送信しない。
家電機器が一つのコントローラとのみ接続する場合、家電機器はCRLをコントローラ経由で取得する。このとき、コントローラが不正機器であった場合、公開鍵証明書がCRLに記載されていても、コントローラがコントローラの公開鍵証明書が記載されているCRLを家電機器に配布しない限り、家電機器はコントローラを正当な機器として認証してしまう。
第1の機器が第1のコントローラから証明書失効リストを受信すると、
第1の機器は、
第1の機器が接続する前記第2のコントローラに接続する第2の機器を検出し、
第2の機器の記憶容量が所定のしきい値より小さく、かつ、第2の機器が接続する第2のコントローラの持つ公開鍵証明書の証明書識別子が証明書失効リストに記載されている場合、第2の機器へ前記証明書失効リストを送信し、
第2の機器の記憶容量が所定のしきい値より小さく、かつ、証明書識別子が証明書失効リストに記載されていない場合、第2の機器へ証明書失効リストを送信しない。
第1の機器が第1のコントローラから証明書失効リストを受信すると、
第1の機器は、
第1のコントローラに接続する第2の機器を検出し、
第2の機器の記憶容量が所定のしきい値より小さい場合、第2の機器から第2のコントローラの持つ公開鍵証明書の証明書識別子を取得し、
証明書識別子が証明書失効リストに記載されている場合、第2の機器へ証明書失効リストを送信し、
証明書識別子が証明書失効リストに記載されていない場合、第2の機器へ証明書失効リストを送信しない。
第2の機器は、
第2のコントローラへ接続する際、第2のコントローラの公開鍵証明書の証明書識別子を第2のコントローラから受信し、第1の機器へ証明書識別子を送信し、
第1の機器は、
第2の機器から受信した証明書識別子が、第1の機器が保持する証明書失効リストに記載されている場合、第2の機器へ証明書失効リストを送信し、
証明書識別子が第1の機器が保持する証明書失効リストに記載されていない場合、第2の機器へ証明書失効リストを送信しない。
1.システムの構成
ここでは、本開示の実施の形態として、本開示に関わる認証システム10について図面を参照しながら説明する。
図1は、本開示に係る認証システム10の全体構成を示す図である。認証システム10は、コントローラ100、機器200、サーバ300、ポータルサーバ400から構成される。コントローラ100a~bは、機器を制御する機能を持った機器である。また、コントローラ100a~bは、サーバと接続し、サーバへ家電履歴の情報の送信や、サーバから制御依頼を受信し、家電機器を制御するなどの機能を持つ。機器200a~cは、テレビやレコーダー、エアコン、冷蔵庫、蓄電池など、機器履歴情報を収集する家電機器や住宅設備機器である。サーバ300a~cはコンテンツを配信するコンテンツサーバや家電機器を製造するメーカサーバ、サービスを提供するサービスプロバイダのサービスサーバである。具体的な一例として、家庭内の機器の履歴情報がコントローラに送信され、コントローラは機器の履歴情報をメーカサーバに送信する。また、サービスサーバが電力会社としたとき、電力会社から家庭のスマートメータ(図示しない)を経由してコントローラに接続する。コントローラは電力会社からの電力情報を基に、家庭内の機器を制御し、家庭内の電力消費を抑える。
図2は、コントローラ100aの構成図である。コントローラ100aは、機器管理部101、機器情報保持部102、認証処理部103、認証情報保持部104、通信部105から構成される。コントローラ100bも同様の構成である。
図6は、機器200の構成図である。機器200は、機器管理部201、機器履歴保持部202、機器情報保持部203、認証処理部204、認証情報保持部205、通信部206から構成される。
図8は、メーカサーバ300aの構成図である。メーカサーバ300aは、機器情報管理部301、機器情報保持部302、CRL管理部303、CRL保持部304、通信部305から構成される。サービスサーバ300bも同様の構成である。
図10は、ポータルサーバ400の構成図である。ポータルサーバ400は、CRL管理部401、CRL保持部402、暗号処理部403、暗号鍵保持部404、通信部405から構成される。
認証システム10の動作には、以下のものがある。
(2)メーカサーバ300aのCRLを更新する処理
(3)機器のCRLを更新する処理
以下、それぞれについて図を用いて説明する。
図11から図12は機器200cがコントローラ100aに接続し、メーカサーバ300aへ登録する処理のシーケンスを示す。機器200aや機器200bがコントローラ100aに接続し、メーカサーバ300aへ登録する処理や、機器200cがコントローラ100bに接続し、サービスサーバ300bに登録する処理も同様である。
図13に、メーカサーバ300aのCRLを更新するシーケンスを示す。
図14から図15に、機器200cのCRLをコントローラ100bから更新するシーケンスを示す。コントローラ100bから機器200cのCRLを更新する処理を一例として説明するが、コントローラ100aから機器200cのCRLを更新する処理も同様の処理である。
1つのコントローラと接続する機器は、当該コントローラが不正コントローラの場合、CRLが更新できなかった。実施の形態1では、機器が複数のコントローラからCRLを受信している。これにより、複数のネットワークを経由してCRLを取得し、更新ができる。CRLを更新可能とすることで、不正なコントローラとの接続を防止でき、正規のコントローラと機器間で安全に接続することができる。
2.システムの構成
ここでは、本開示の実施の形態として、本開示に関わる認証システム11について図面を参照しながら説明する。
実施の形態2の認証システム11の全体構成は実施の形態1と同様であるため、ここでは省略する。実施の形態1と同様の機能を有する構成要素は、同じ符号を付して説明を省略する。
認証システム11の動作には、以下のものがある。
(2)メーカサーバ300aのCRLを更新する処理
(3)機器のCRLを更新する処理
(4)機器からサーバへ機器履歴情報を送信する処理
(2)、(3)の処理は実施の形態1と同様のため、ここでの説明を省略する。
図17から図19は機器200cがコントローラ100aに接続し、メーカサーバへ登録する処理のシーケンスを示す。機器200aや機器200bがコントローラ100aに接続し、メーカサーバへ登録する処理や、機器200cがコントローラ100bに接続し、サービスサーバに登録する処理も同様である。
図22に、機器からのメーカサーバ300aへ機器履歴情報を送信するシーケンスを示す。なお、このアップロードは、定期的、あるいは不定期に行われる。
実施の形態1では、機器の認証時に鍵交換を行い、共有した鍵を用いてチャレンジレスポンス認証を行っている。共有した鍵は秘密鍵と対応する公開鍵のみから生成できるため、公開鍵証明書の公開鍵に対応する秘密鍵を持っていない場合、共有鍵が生成できず、チャレンジレスポンス認証が成功しない。これにより、秘密鍵を用いた署名生成および公開鍵を用いた署名検証を行う認証処理に比べ、認証処理を軽減することが可能となる。また機器の履歴情報を共有鍵によって暗号通信が可能になり、機器の履歴情報の漏洩を防止することができる。
3.システムの構成
ここでは、本開示の実施の形態として、本開示に関わる認証システム10aについて図面を参照しながら説明する。
実施の形態3の認証システム10aの全体構成は、実施の形態1と同様であるため、全体の説明は省略する。なお、機器200a、機器200bは、記憶容量の小さい機器であり、機器200cは、HDDを持つような記憶容量の大きい機器である。記憶容量が大きく、コントローラ100bを介してサービスサーバ300bと接続する機器200cとして、例えば、レコーダーがある。
実施の形態1同様、認証システム10aの動作には、以下のものがある。
(2)メーカサーバ300aのCRL更新する処理
(3)機器のCRLを更新する処理
(2)の処理は実施の形態1と同様のため、説明を省略する。
本実施の形態での機器登録処理時の動作は、実施の形態2の動作にコントローラ別接続機器管理テーブルの登録の動作が加わる。
機器のCRLを更新する処理の動作として、本実施の形態では、機器200cから機器200bへCRLを送信し、不正なコントローラ100aの登録を削除する処理を一例として説明する。コントローラ100aに接続している機器200aの処理に関しても機器200bと同様の処理である。
実施の形態3では、記憶容量の大きい機器が、新規CRLを受信した際、当該機器の接続するコントローラに接続している他の機器を検出し、検出した機器の記憶容量の大小によって、新規CRLを送信するかどうかを判断している。これにより、記憶容量が小さい機器は、接続しているコントローラの公開鍵証明書の証明書IDが記載された、必要最小限のCRLを受信・保持することができ、不正なコントローラへの接続を防止できる。
4.システムの構成
ここでは、本開示の実施の形態として、本開示に関わる認証システム10bについて図面を参照しながら説明する。
図26は、本開示に係る認証システム10bの全体構成を示す図である。認証システム10bは、実施の形態1と同様のコントローラ100、機器200、サーバ300、ポータルサーバ400から構成される。
実施の形態1、3同様、認証システム10bの動作には、以下のものがある。
(2)メーカサーバ300aのCRL更新する処理
(3)機器のCRLを更新する処理
(1)(2)の処理は実施の形態1、3と同様のため、説明を省略する。
図27~図30に、次の処理のシーケンスを示す。機器200cが、新規CRLに記載された証明書IDの公開鍵証明書を持つコントローラに接続していないとき、記憶容量の小さい機器がCRLに記載された証明書IDの公開鍵証明書を持つコントローラに接続していないかを確認し、記憶容量の小さい機器へCRLを送信するか否かを判断する。一方、機器200cは、記憶容量の大きい機器へは、無条件でCRLを送信する。ここでは、機器200aと機器200bが、不正なコントローラ100aに接続しており、機器200bが機器200cから新規CRLを受信し、不正なコントローラ100aに接続する機器200aへ新規CRLを送信する処理を一例として説明する。
実施の形態4では、記憶容量の大きい機器が、記憶容量の小さい機器から、共通して接続しているコントローラ以外のコントローラの公開鍵証明書の証明書IDを取得し、証明書IDがCRLに記載されているかによって、記憶容量の小さい機器へCRLを送信するかどうかを判断している。さらに、記憶容量の小さい機器は、記憶容量の大きい機器から新規CRLを受信すると、CRLに記載された証明書IDの公開鍵証明書を持つコントローラに接続する他の機器へ新規CRLを送信している。これにより、記憶容量の大きい機器が、接続していないコントローラの公開鍵証明書の証明書IDの記載されたCRLを受信しても、記憶容量の小さい機器へCRLを送信でき、不正なコントローラへの接続を防止することができる。
5.システムの構成
ここでは、本開示の実施の形態として、本開示に関わる認証システム10cについて図面を参照しながら説明する。
図31は、本開示に係る認証システム10cの全体構成を示す図である。認証システム10cは、実施の形態1と同様のコントローラ100、機器200、サーバ300、ポータルサーバ400から構成される。実施の形態1の構成に、新規コントローラ100cが加わるが、実施の形態1のコントローラ100a、100bと同様の構成であるため、説明は省略する。また、コントローラ100cが接続するメーカサーバ300dが加わるが、実施の形態1のサーバ300aと同様の構成であるため、説明は省略する。
実施の形態1、3、4同様、認証システム10cの動作には、以下のものがある。
(2)メーカサーバのCRL更新する処理
(3)機器のCRLを更新する処理
(2)の処理は実施の形態1、3、4と、(3)の処理は実施の形態4と同様のため、説明を省略する。
5.2.1.1 機器200cが行うコントローラ別接続機器管理テーブル作成処理
本実施の形態での機器登録処理時の動作における、機器200cが行うコントローラ別接続機器管理テーブル作成処理は、実施の形態3の動作に、記憶容量の小さい機器がCRL更新問合せ先として、機器200cを登録する動作が加わる。
図32~図34に、記憶容量の小さい機器が、新規コントローラに機器登録する際、新規コントローラが正規のコントローラかどうかを記憶容量の大きい機器200cに問い合わせ、機器200cが新規コントローラへの接続許可/禁止を判断する処理のシーケンスを示す。ここでは、機器200bがコントローラ100cに機器登録する際、機器200cへ問合せを行う処理を一例として説明する。機器200aがコントローラ100bに接続しているとき、新規コントローラ100cに機器登録する処理も同様である。
実施の形態5では、記憶容量の小さい機器が、新規コントローラに機器登録をする際、記憶容量の大きい機器に、新規コントローラが正規のコントローラかどうかを問い合わせ、記憶容量の大きい機器が、新規コントローラへの接続の許可/禁止を判断している。これにより、記憶容量の小さい機器が新規に接続するコントローラが不正なコントローラであった場合、機器接続の段階で、不正なコントローラへの接続を防止できる。
なお、本開示を上記各実施の形態に基づいて説明してきたが、本開示は、上記各実施の形態に限定されないのはもちろんである。以下のような場合も本開示に含まれる。
100a,100b,100c コントローラ
101 機器管理部
102 機器情報保持部
103 認証処理部
104 認証情報保持部
105 通信部
200a,200b,200c 機器
201 機器管理部
202 機器履歴保持部
203 機器情報保持部
204 認証処理部
205 認証情報保持部
206 通信部
300a,300d メーカサーバ
300b サービスサーバ
300c コンテンツサーバ
301 機器情報管理部
302 機器情報保持部
303 CRL管理部
304 CRL保持部
305 通信部
400 ポータルサーバ
401 CRL管理部
402 CRL保持部
403 暗号処理部
404 暗号鍵保持部
Claims (13)
- 第1のコントローラと第1のネットワークで接続し、第2のコントローラと第2のネットワークで接続する第1の機器と、前記第2のコントローラと前記第2のネットワークで接続する第2の機器と、を含む認証システムであって、
前記第1の機器が前記第1のコントローラから証明書失効リストを受信すると、
前記第1の機器は、
前記第1の機器が接続する前記第2のコントローラに接続する前記第2の機器を検出し、
前記第2の機器の記憶容量が所定のしきい値より小さく、かつ、前記第2の機器が接続する前記第2のコントローラの持つ公開鍵証明書の証明書識別子が前記証明書失効リストに記載されている場合、前記第2の機器へ前記証明書失効リストを送信し、
前記第2の機器の記憶容量が所定のしきい値より小さく、かつ、前記証明書識別子が前記証明書失効リストに記載されていない場合、前記第2の機器へ前記証明書失効リストを送信しない
ことを特徴とする認証システム。 - 前記第1の機器は、前記第2の機器の記憶容量が所定のしきい値より大きい場合、前記第2の機器へ前記証明書失効リストを送信する
ことを特徴とする請求項1に記載の認証システム。 - 前記所定のしきい値は、前記証明書失効リスト1つのサイズとする
ことを特徴とする請求項1または2に記載の認証システム。 - 前記第2の機器は、前記第1の機器から前記証明書失効リストを受信すると、前記証明書失効リストに記載の前記証明書識別子で特定される前記第2のコントローラとの接続を停止する
ことを特徴とする請求項1に記載の認証システム。 - 第1のコントローラと第1のネットワークで接続する第1の機器と、前記第1のコントローラと前記第1のネットワークで接続し、第2のコントローラと第2のネットワークで接続する第2の機器と、を含む認証システムであって、
前記第1の機器が前記第1のコントローラから証明書失効リストを受信すると、
前記第1の機器は、
前記第1のコントローラに接続する前記第2の機器を検出し、
前記第2の機器の記憶容量が所定のしきい値より小さい場合、前記第2の機器から前記第2のコントローラの持つ公開鍵証明書の証明書識別子を取得し、
前記証明書識別子が前記証明書失効リストに記載されている場合、前記第2の機器へ証明書失効リストを送信し、
前記証明書識別子が前記証明書失効リストに記載されていない場合、前記第2の機器へ前記証明書失効リストを送信しない
ことを特徴とする認証システム。 - 前記第2の機器は、前記第1の機器から前記証明書失効リストを受信すると、前記証明書失効リストに記載の前記証明書識別子で特定される前記第2のコントローラとの接続を停止する
ことを特徴とする請求項5に記載の認証システム。 - 前記第1の機器は、前記第2の機器の記憶容量が所定のしきい値より大きい場合、前記第2の機器へ前記証明書失効リストを送信する
ことを特徴とする請求項5に記載の認証システム。 - 前記第2のコントローラと前記第2のネットワークで接続する第3の機器をさらに含み、
前記第2の機器は、前記第1の機器から証明書失効リストを受信すると、
前記証明書失効リストに記載の証明書識別子の示す公開鍵証明書を持つ前記第2のコントローラに接続する前記第3の機器を検出し、
前記第3の機器へ前記証明書失効リストを送信する
ことを特徴とする請求項5に記載の認証システム。 - 第1のコントローラと第1のネットワークで接続する第1の機器と、前記第1のコントローラと前記第1のネットワークで接続し、第2のコントローラと第2のネットワークで接続する第2の機器と、を含む認証システムであって、
前記第2の機器は、
前記第2のコントローラへ接続する際、前記第2のコントローラの公開鍵証明書の証明書識別子を前記第2のコントローラから受信し、前記第1の機器へ前記証明書識別子を送信し、
前記第1の機器は、
前記第2の機器から受信した前記証明書識別子が、前記第1の機器が保持する証明書失効リストに記載されている場合、前記第2の機器へ前記証明書失効リストを送信し、
前記証明書識別子が前記第1の機器が保持する証明書失効リストに記載されていない場合、前記第2の機器へ前記証明書失効リストを送信しない
ことを特徴とする認証システム。 - 前記第2の機器は、
前記証明書失効リストを受信した場合、前記証明書識別子が前記証明書失効リストに記載されていることを確認し、前記第2のコントローラとの接続を中止する
ことを特徴とする請求項7に記載の認証システム。 - 第1のコントローラと第1のネットワークで接続し、第2のコントローラと第2のネットワークで接続する第1の機器と、前記第2のコントローラと前記第2のネットワークで接続する第2の機器と、を含む認証システムにおける認証方法であって、
前記第1の機器が前記第1のコントローラから証明書失効リストを受信すると、
前記第1の機器が、前記第1の機器が接続する前記第2のコントローラに接続する前記第2の機器を検出し、
前記第2の機器の記憶容量が所定のしきい値より小さく、かつ、前記第2の機器が接続する前記第2のコントローラの持つ公開鍵証明書の証明書識別子が前記証明書失効リストに記載されている場合、前記第2の機器へ前記証明書失効リストを送信し、
前記第2の機器の記憶容量が所定のしきい値より小さく、かつ、前記証明書識別子が前記証明書失効リストに記載されていない場合、前記第2の機器へ前記証明書失効リストを送信しない
ことを特徴とする認証方法。 - 第1のコントローラと第1のネットワークで接続する第1の機器と、
前記第1のコントローラと前記第1のネットワークで接続し、第2のコントローラと第2のネットワークで接続する第2の機器と、を含む認証システムにおける認証方法であって、
前記第1の機器が前記第1のコントローラから証明書失効リストを受信すると、
前記第1の機器が、前記第1のコントローラに接続する前記第2の機器を検出し、
前記第2の機器の記憶容量が所定のしきい値より小さい場合、前記第1の機器が、前記第2の機器から前記第2のコントローラの持つ公開鍵証明書の証明書識別子を取得し、
前記証明書識別子が前記証明書失効リストに記載されている場合、前記第1の機器は、前記第2の機器へ証明書失効リストを送信し、
前記証明書識別子が前記証明書失効リストに記載されていない場合、前記第1の機器は、前記第2の機器へ前記証明書失効リストを送信しない
ことを特徴とする認証方法。 - 第1のコントローラと第1のネットワークで接続する第1の機器と、
前記第1のコントローラと前記第1のネットワークで接続し、第2のコントローラと第2のネットワークで接続する第2の機器と、を含む認証システムにおける認証方法であって、
前記第2の機器が、前記第2のコントローラへ接続する際、
前記第2の機器が、前記第2のコントローラの公開鍵証明書の証明書識別子を前記第2のコントローラから受信し、前記第1の機器へ前記証明書識別子を送信し、
前記第2の機器から受信した前記証明書識別子が、前記第1の機器の保持する証明書失効リストに記載されている場合、前記第1の機器は、前記第2の機器へ前記証明書失効リストを送信し、
前記証明書識別子が前記第1の機器の保持する証明書失効リストに記載されていない場合、前記第1の機器は、前記第2の機器へ前記証明書失効リストを送信しない
ことを特徴とする認証方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2015553328A JP6410189B2 (ja) | 2013-12-16 | 2014-08-27 | 認証システムおよび認証方法 |
EP14870879.5A EP3086504B1 (en) | 2013-12-16 | 2014-08-27 | Administration of authentication certificates |
US14/934,261 US10523446B2 (en) | 2013-12-16 | 2015-11-06 | Authentication system and authentication method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361916530P | 2013-12-16 | 2013-12-16 | |
US61/916,530 | 2013-12-16 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/934,261 Continuation US10523446B2 (en) | 2013-12-16 | 2015-11-06 | Authentication system and authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015092949A1 true WO2015092949A1 (ja) | 2015-06-25 |
Family
ID=53402340
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2014/004389 WO2015092949A1 (ja) | 2013-12-16 | 2014-08-27 | 認証システムおよび認証方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US10523446B2 (ja) |
EP (1) | EP3086504B1 (ja) |
JP (1) | JP6410189B2 (ja) |
WO (1) | WO2015092949A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2017046347A (ja) * | 2015-08-28 | 2017-03-02 | パナソニックIpマネジメント株式会社 | 認証システムおよび認証方法 |
JP2018014628A (ja) * | 2016-07-21 | 2018-01-25 | Kddi株式会社 | 通信システム、通信装置、通信方法、及びプログラム |
WO2018216384A1 (ja) * | 2017-05-24 | 2018-11-29 | パナソニックIpマネジメント株式会社 | 通信機器、認証局装置およびコンピュータプログラム |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3082057B1 (en) * | 2013-12-09 | 2020-11-18 | Panasonic Intellectual Property Corporation of America | Authentication method and authentication system |
EP3086505B1 (en) * | 2013-12-16 | 2020-12-30 | Panasonic Intellectual Property Corporation of America | Authentication system, authentication method and authentication device |
KR20200089491A (ko) * | 2019-01-17 | 2020-07-27 | 삼성전자주식회사 | 공유된 디지털 키를 관리하기 위한 장치 및 방법 |
RU2720320C1 (ru) * | 2019-10-22 | 2020-04-28 | Акционерное общество "Актив-софт" (АО "Актив-софт") | Способ доверенного хранения на смарт-карте списка отозванных сертификатов (crl) |
EP3985532B1 (de) * | 2020-10-19 | 2023-02-22 | Siemens Aktiengesellschaft | Zertifikatsmanagement für technische anlagen |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008072180A (ja) * | 2006-09-12 | 2008-03-27 | Konica Minolta Holdings Inc | 情報の管理方法及び情報処理装置 |
US20100250922A1 (en) * | 2009-03-31 | 2010-09-30 | Motorola, Inc. | Method and system for propagating trust in an ad hoc wireless communication network |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7743248B2 (en) * | 1995-01-17 | 2010-06-22 | Eoriginal, Inc. | System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components |
US5687235A (en) * | 1995-10-26 | 1997-11-11 | Novell, Inc. | Certificate revocation performance optimization |
US5699431A (en) * | 1995-11-13 | 1997-12-16 | Northern Telecom Limited | Method for efficient management of certificate revocation lists and update information |
CN1182479C (zh) * | 2000-01-07 | 2004-12-29 | 国际商业机器公司 | 有效地收集、整理和访问证书吊销表的系统和方法 |
KR20040104723A (ko) * | 2002-05-09 | 2004-12-10 | 마츠시타 덴끼 산교 가부시키가이샤 | 공개 키 인증서 무효화 리스트 생성 장치, 무효화 판정장치 및 인증 시스템 |
JP2004312197A (ja) * | 2003-04-03 | 2004-11-04 | Matsushita Electric Ind Co Ltd | 通信装置、証明書発行装置及び通信システム |
WO2004097605A1 (en) * | 2003-04-28 | 2004-11-11 | Koninklijke Philips Electronics N.V. | Method of storing revocation list |
US20050138365A1 (en) * | 2003-12-19 | 2005-06-23 | Bellipady Guruprashanth A. | Mobile device and method for providing certificate based cryptography |
US20070016961A1 (en) * | 2005-07-11 | 2007-01-18 | Vogler Dean H | Application revocation using an application revocation list in a portable electronic device |
US8312264B2 (en) * | 2005-09-30 | 2012-11-13 | Blue Coat Systems, Inc. | Method and system for authentication among peer appliances within a computer network |
US9054879B2 (en) * | 2005-10-04 | 2015-06-09 | Google Technology Holdings LLC | Method and apparatus for delivering certificate revocation lists |
US8543824B2 (en) * | 2005-10-27 | 2013-09-24 | Apple Inc. | Safe distribution and use of content |
US8307414B2 (en) * | 2007-09-07 | 2012-11-06 | Deutsche Telekom Ag | Method and system for distributed, localized authentication in the framework of 802.11 |
US20090113543A1 (en) * | 2007-10-25 | 2009-04-30 | Research In Motion Limited | Authentication certificate management for access to a wireless communication device |
US8438388B2 (en) * | 2008-03-31 | 2013-05-07 | Motorola Solutions, Inc. | Method and apparatus for distributing certificate revocation lists (CRLs) to nodes in an ad hoc network |
US20100318791A1 (en) * | 2009-06-12 | 2010-12-16 | General Instrument Corporation | Certificate status information protocol (csip) proxy and responder |
US8181019B2 (en) * | 2009-06-22 | 2012-05-15 | Citrix Systems, Inc. | Systems and methods for managing CRLS for a multi-core system |
JP2013503403A (ja) * | 2009-08-31 | 2013-01-31 | テルコーディア テクノロジーズ インコーポレイテッド | 車両通信ネットワークにおいて悪質車両を検出して立ち退かせるためのシステムおよび方法 |
US8621204B2 (en) * | 2009-12-23 | 2013-12-31 | Citrix Systems, Inc. | Systems and methods for evaluating and prioritizing responses from multiple OCSP responders |
US8452958B2 (en) * | 2010-08-31 | 2013-05-28 | Cisco Technology, Inc. | Determining certificate revocation status |
EP3839720B1 (en) * | 2011-08-31 | 2023-11-29 | Assa Abloy AB | Mobile credential revocation |
EP2858211B1 (en) * | 2012-05-29 | 2017-11-22 | Panasonic Intellectual Property Management Co., Ltd. | Apparatus, system, and method for detecting unauthorized connections of a charge/discharge device |
US9237021B2 (en) * | 2013-03-15 | 2016-01-12 | Hewlett Packard Enterprise Development Lp | Certificate grant list at network device |
US9887982B2 (en) * | 2013-10-09 | 2018-02-06 | Digicert, Inc. | Accelerating OCSP responses via content delivery network collaboration |
US9742569B2 (en) * | 2014-05-05 | 2017-08-22 | Nxp B.V. | System and method for filtering digital certificates |
US9578003B2 (en) * | 2014-07-30 | 2017-02-21 | Aruba Networks, Inc. | Determining whether to use a local authentication server |
-
2014
- 2014-08-27 WO PCT/JP2014/004389 patent/WO2015092949A1/ja active Application Filing
- 2014-08-27 EP EP14870879.5A patent/EP3086504B1/en active Active
- 2014-08-27 JP JP2015553328A patent/JP6410189B2/ja active Active
-
2015
- 2015-11-06 US US14/934,261 patent/US10523446B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008072180A (ja) * | 2006-09-12 | 2008-03-27 | Konica Minolta Holdings Inc | 情報の管理方法及び情報処理装置 |
US20100250922A1 (en) * | 2009-03-31 | 2010-09-30 | Motorola, Inc. | Method and system for propagating trust in an ad hoc wireless communication network |
Non-Patent Citations (5)
Title |
---|
"Suite B Implementer's Guide to FIPS 186-3 (ECDSA", 3 February 2010, NATIONAL SECURITY AGENCY |
ATSUKO MIYAJI; HIROAKI KIKUCHI: "IT Text Information Security", October 2003, OHMSHA |
D. FORSBERG: "Protocol for Carrying Authentication for Network Access (PANA", May 2008, INTERNET ENGINEERING TASK FORCE |
ELAINE BARKER: "Recommendafion for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography", 13 May 2013, NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, article "NIST Special Publication 800-56A Revision 2" |
WI-FI CERTIFIED WI-FI PROTECTED SETUP: EASING THE USER EXPERIENCE FOR HOME AND SMALL OFFICE WI-FIR NETWORKS (2010, December 2010 (2010-12-01), Retrieved from the Internet <URL:http://www.wi-fi.org/ja/file/wi-fi-cerfified-wi-fi-protected-setup%E2%84%A2-easing-the-user-experience-for -home-and-small-offi ce-wi> |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2017046347A (ja) * | 2015-08-28 | 2017-03-02 | パナソニックIpマネジメント株式会社 | 認証システムおよび認証方法 |
JP2018014628A (ja) * | 2016-07-21 | 2018-01-25 | Kddi株式会社 | 通信システム、通信装置、通信方法、及びプログラム |
WO2018216384A1 (ja) * | 2017-05-24 | 2018-11-29 | パナソニックIpマネジメント株式会社 | 通信機器、認証局装置およびコンピュータプログラム |
US10848324B2 (en) | 2017-05-24 | 2020-11-24 | Panasonic Intellectual Property Management Co., Ltd. | Communication device, certificate authority device, and recording medium |
Also Published As
Publication number | Publication date |
---|---|
EP3086504A4 (en) | 2016-12-07 |
EP3086504A1 (en) | 2016-10-26 |
JPWO2015092949A1 (ja) | 2017-03-16 |
US10523446B2 (en) | 2019-12-31 |
EP3086504B1 (en) | 2018-12-12 |
JP6410189B2 (ja) | 2018-10-24 |
US20160065377A1 (en) | 2016-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6410189B2 (ja) | 認証システムおよび認証方法 | |
JP6372809B2 (ja) | 認証システム、認証方法および認証装置 | |
JP6146725B2 (ja) | 暗号通信装置、暗号通信方法およびそのコンピュータプログラム | |
US9973487B2 (en) | Authentication method | |
KR102520088B1 (ko) | 사물 인터넷 플랫폼, 장치, 및 방법 | |
JP6464511B2 (ja) | 認証システムおよび認証方法 | |
JP6268616B2 (ja) | 認証システムおよび認証方法 | |
JP6241764B2 (ja) | 認証方法および認証システム | |
JP2013223171A (ja) | 公開鍵認証基盤統制システム、認証局サーバ、利用者端末、公開鍵認証基盤統制方法、およびプログラム | |
JP2014042095A (ja) | 認証システム及び方法 | |
JP6765061B2 (ja) | 認証システムおよび認証方法 | |
JP2005130444A (ja) | 通信装置、通信システム、証明書送信方法及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14870879 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2015553328 Country of ref document: JP Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2014870879 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014870879 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |