The present application claims priority from Japanese application JP2003-410397 filed on Dec. 9, 2003, the content of which is hereby incorporated by reference into this application.
The present invention relates to both an authentication control system and an authentication control method. More specifically, the present invention is directed to such an authentication control system and an authentication control method, capable of authenticating users in a proper level, who are trying to enter into an area within the authentication control system even under such an environment that security and reliability of this system are changed as structural elements provided in the area are varied.
Very recently, since mobility of labors is advanced, there are many opportunities that many persons other than staff members of offices go into the offices and also come out from the offices, and these persons may access information processing appliances and also network appliances installed in these offices. Also, while an unspecified number of users can utilize network services without any restriction as to temporal elements and locations, these users can remote-access outside the offices via public service networks to internal systems of these offices under such a circumstance, the following problem may occur. That is to say, while these users do not always pay their specific attentions to security, they utilize the internal systems of the offices. Therefore, there is a great possibility that unfair uses of the internal systems by persons who own bad willings are permitted due to careless operations of these users.
To more firmly execute user authenticating operations, several authenticating technical ideas with employment of physical features have been proposed. As one of these technical ideas, JP-A-2001-052181 has described such an authentication system that results of plural authenticating methods by employing plural sorts of physical features have been previously stored in a table, and then, authenticating operations are carried out, while these plural authenticating methods are switched in the preset order until a user may be authenticated.
However, since a total number of terminals which use networks is rapidly increased as well as a total number of used services is considerably increased, it is desirable to previously set the authentication of the users. Furthermore, it is preferable to realize a mode of so-called “single sign-on”, namely a plurality of services may be utilized after a user is once authenticated.
Therefore, an object of the present invention is to provide both an authentication control system and an authentication control method, which are capable of authenticating a user in a proper level, who is trying to enter an area defined in the authentication control system, even under such an environment that security and reliability of this authentication control system are changed as a structural element provided in this area is varied.
Referring now to drawings, various embodiments of the present invention will now be described.
The room area 10 contains both an authentication control apparatus 60 and a structural element 70, which are connected to each other via a network. In this embodiment, the room area 101 contains an authentication control apparatus 601 and structural or system elements 701; the room area 102 contains an authentication control apparatus 602 and structural elements 702; and the room area 103 contains an authentication control apparatus 603 and structural elements 703.
The authentication control apparatus 60 is directly communicated to a hardware token (HT) 90 which is owned by a user who is trying to enter the room area 10, or is communicated via a user terminal 80 into which the HT 90 has been inserted to the HT 90 so as to authenticate the user (a room entering person: for example, a maintenance engineer who investigates/maintains electronic appliance within each of room areas) in conjunction with the authentication apparatus 50. As will be explained later, an authenticating method executed at this time is determined by considering both a security level of a room area into which a room entering person is trying to enter, and a trust level of a person existing in the room area. The present invention is featured by that the security level of this room area is changed in response to both a security level which has been set with respect to each of electronic appliances installed within the room area, and a security level which has been set to a person (namely, a room existing person) who is present within the room area. In this case, it should be understood that the person (for example, reference numeral 705 of
Only in such a case that authentication of a room entering person can succeed, for instance, the authentication control apparatus 60 opens a gate (door) 62 installed at an entrance of the relevant room area 10, or performs an authentication control operation in order to allow the room entering person to enter this room area 10. Even in a case that a room entering person is allowed to enter a room area, a check is made as to whether or not an access operation by the user terminal 80 owned by the room entering person to each of electronic appliances within this room area 10 is permitted. In this case, as the electronic appliances which constitute the structural elements 70, a network appliance such as a wireless access point (AP) 701, a printer 702, a scanner, and a network terminal (information appliance) such as a file server 704 are provided.
A network IF unit 601 is employed so as to be communicated to the respective electronic appliances (network appliance, information appliance) and the WAN 40, which constitute the internal network system of the building. This network IF unit 601 is connected via a network cable to the SWHUB 20.
A wireless communication unit 602 is communicated to both a room entering person's terminal 80 and/or the HT 90 by way of a short distance wireless communication manner such as an infrared communication manner.
An instruction accepting unit 603 is to display information with respect to user, and also to accept an input of the information. The instruction accepting unit 603 may be alternatively constructed of an input/output apparatus such as a touch panel, or may be alternatively constructed of an accepting terminal connected via the network IF unit 601.
An open/close control unit 604 controls opening/closing operations of either a door or a gate, which is provided at, for example, an entrance of the related room area 10. It should be understood that instead of providing of the open/close control unit 604, while an open/close control apparatus connected via the network IF unit 601 to the authentication control apparatus 60 is separately prepared, opening/closing operations of either the door or the gate may be alternatively controlled by this open/close control apparatus.
An area information acquiring unit 605 acquires attribute information indicative of a security level of each of electronic appliances via the network IF unit 601. These electronic appliances are the structural elements 70 which presently belongs to the related room area 10. Then, the area information acquiring unit 605 registers the acquired attribute information to an area information management table (TBL) storage unit 611. Also, the area information acquiring unit 605 adds, or deletes attribute information of a person (room existing person) who presently exists in the related room area 10 into, or from the area information management TBL storage unit 611. As described above, since an electronic appliance and/or a person, which are present in a room area, is added, or deleted, data which is registered in the area information management TBL storage unit 611 is changed. Furthermore, the area information acquiring unit 605 reads information which has been registered in the area information management TBL storage unit 611, and then, transmits the read information to a security level determining unit 607.
In this example, three sorts of records 6110 are registered in the area information management TBL storage unit 611, namely a record 6110a in which a subject corresponds to a room area; a record 6110b in which a subject corresponds to an electronic appliance which is one of the presently existing structural elements 70; and a record 6110c in which a subject corresponds to a room existing person who presently exists in the room area 10. The record 6110a corresponds to such a record that has been previously registered by the operator of the authentication control apparatus 60. The record 6110b corresponds to such a record that is registered/deleted by the area information acquiring unit 605 based upon the attribute information acquired from the respective structural appliances of the structural element 70. Then, the record 6110c corresponds to such a record that is registered/deleted by the area information acquiring unit 605 in accordance with an instruction of the authentication control unit 609.
In the field 6111 of the record 6110a, for example, a unique number selected by the operator of the authentication control apparatus 60 is registered as identification information. In the field 6111 of the record 6110b, an address (for example, IP address) of an electronic appliance equal to the structural element 70 is registered. Then, in the field 6111 of the record 6110c, a provisional ID used for an authentication ticket (will be explained later) is registered.
The attribute information which is registered in a field 6112 corresponds to such information (environment information) that constitutes an influence factor with respect to security of a room area. The attribute information contains information indicative of a rough sort (sort (large)) of a subject, and another information indicative of a detailed sort (sort (small)) in this rough sort. In the record 6110a, “room area” is registered as the information indicative of the sort (large), and a sort (attribute) of such an area as “acceptance”, “experimental room”, “reception room”, and “conference room.” In the record 6110b, “electronic appliance” is registered as the information indicative of the sort (large), and a sort (attribute) of the electronic appliance such as “wireless AP”, “file server”, “printer”, “scanner”, and “PC” is registered as the information indicative of the sort (small). Then, in the record 6110c, “room existing person” is registered as the information indicative of the sort (large), and status/belonging section (attribute) of the room existing person is registered as the information indicative of the sort (small). The status/belonging section of the room existing person is defined as “department manager, or higher status”, “section manager, or higher status”, “general staff member”, and “important client.”
A room-entering-person information acquiring unit 606 acquires attribute information (environment information) of this room entering person from either the user terminal 80 or the HT 90 via the wireless communication unit 602 in response to an instruction issued from the authentication control unit 609, while the attribute information constitutes an influence factor given to the reliability of the room entering person. Then, the room-entering-person information acquiring unit 606 transmits the acquired attribute information of the room entering person to a trust level determining unit 608. As attribute information of a room entering person, the following information is given, namely, a user ID corresponding to identification information of a room entering person; a status (general staff member, division manager, section manager, department manager, temporary staff member, person other than company or the like) of a room entering person; a belonging section (belonging department/section or the like) of a room entering person; a use frequency (everyday, 4 to 6 days per week, 1 to 3 days per week, or less than 1 day per week) of an internal network system of a building; and a place where a room entering person accesses (entrance, place inside a company, public network (portable telephone network), public network (wireless LAN) or the like).
The security level determining unit 607 determines a security level of the relevant room area 10 by employing both information which has been registered in the security level management TBL storage unit 610 and information which has been read from the area information management TBL storage unit 611 via the area information acquiring unit 605. Then, the security level determining unit 607 transmits the determined security level to the authentication control unit 609.
The security level determining unit 607 specifies such an evaluation value corresponding to the information of the sort (small) of the record 6110a read out from the area information management TBL storage unit 611 by employing the table 6101a shown in
A trust level determining unit 608 determines a trust level of this room entering person by employing both the information stored in the trust level management TBL storage unit 612 and the attribute information of the user received from the room-entering-person information acquiring unit 606. Then, the trust level determining unit 608 transmits the determined trust level to the authentication control unit 609.
The trust level determining unit 608 specifies such an evaluation value corresponding to the user attribute received from the room-entering-person information acquiring unit 606 by employing the table 6121a shown in
The authentication control unit 609 performs a process operation for issuing an authentication ticket and another process operation for issuing an access ticket. The authentication ticket certificates such a room entering person who is authenticated to the room area 10. The access ticket certificates an access right with respect to an electronic appliance corresponding to the structural element 70. Both the process operations for issuing the authentication ticket and the process operation for issuing the access ticket will be described later.
As indicated in
As indicated in
Both the authentication ticket and the access ticket, which have been issued by the authentication control unit 609, are registered in the ticket management TBL storage unit 614.
The authentication control apparatus 60 having the above-described construction may be realized as follows: That is, for example, as indicated in
When the authentication control unit 609 accepts an authentication request form the room entering person via the instruction accepting unit 603 (Step S1101), the authentication control unit 609 requests the area information acquiring unit 605 to detect whether or not the present structural elements 70 belonging to the relevant room area 10 are different from such structural elements that have already been registered. Upon receipt of this request, the area information acquiring unit 605 sequentially transmits PING (Packet Internet Groper) with respect to, for instance, an IP address having a sub-network of the relevant room area 10, and detects an IP address of the present electronic appliance belonging to the relevant room area 10 by confirming responses thereof. Then, the authentication control unit 609 compares the detected IP address of each of the electronic appliances with the identification information (IP address) of the electronics appliance within the same room area that has been registered in the field 6111 of the record 6110b registered in the area information management TBL storage unit 611. As a result of this comparing operation, the authentication control unit 609 detects whether or not the structural elements 70 are changed (Step S1102).
In a case where “no change” is detected in the step S1102, in other words, in such a case that the IP address of each of the structural electronic appliances detected in the relevant room area is made coincident with the identification information of each of the structural electronic appliances registered in the area information management TBL storage unit 611 (“NO” in Step S1103), the process operation is advanced to Step S1108. On the other hand, in a case where “change” is detected in Step S1102 (“YES” in Step S1103), the area information acquiring unit 605 further checks whether or not a structural electronic appliance is added to the structural elements 70, or deleted from the structural elements 70 (Step S1104).
When the area information acquiring unit 605 judges that in Step S1104 the structural electronic appliance is deleted, namely, in a case where such an IP address that is not present in the IP addresses of the respective structural electronic appliances detected at the current time has been registered in the area information management TBL storage unit 611 as the identification information of the structural electronic appliance, the area information acquiring unit 605 deletes the record 6110b from the area information management TBL storage unit 611, in which this identification information has been registered in the field 6111 (Step S1107). Thereafter, the process operation is advanced to Step S1108. On the other hand, when the area information acquiring unit 605 judges in Step S1104 that the structural electronic appliance is added, namely, in a case where such an IP address which is not registered in the area information management TBL storage unit 611 as the identification information of the structural electronic appliance is present in the IP addresses of the respective structural appliances detected at the current time, the area information acquiring unit 605 acquires attribute information (which contains above-explained information of sort (large) and information of sort (small)) from the electronic appliance of the relevant IP address by employing, for example, SNMP (Simple Network Management Protocol) in Step S1105. Then, the area information acquiring unit 605 adds the record 6110b of the electronic appliance to the area information management TBL storage unit 611, registers this IP address to the field 6111 of this record 6110b, and also, registers the acquired attribute information to the field 6112 (Step S1106). As a consequence, the structural element within the related room area is made coincident with the structural element at this time. Thereafter, the process operation is advanced to Step S1108.
Next, in Step S1108, the area information acquiring unit 605 reads out all of the records 6110 which have been registered in the area information management TBL storage unit 611, and then, transmits all of the read records 6110 to a security level examining unit 607 so as to request a decision of a security level. Upon receipt this request, the security level determining unit 610 determines a security level of the relevant area at the present time by employing both the respective records 6110 of the area information management TBL storage unit 611 accepted from the area information storage unit 605, and also, the security level management TBL storage unit 610. Then, the security level determining unit 610 transmits the determined security level to the authentication control unit 609.
Next, the authentication control unit 609 requests the room-entering-person information acquiring unit 606 to acquire attribute information of a room entering person. Upon receipt of this request, the room-entering-person information acquiring unit 606 is communicated to the HT 90 via the wireless communication unit 602 so as to acquire the attribute information (user ID, status, belonging section, use frequency etc.) of the room entering person from this HT 90. Alternatively, the room-entering-person information acquiring unit 606 is communicated to the user terminal 80 via the wireless communication unit 602 in order to the attribute information of the room entering person from the HT 90 via the user terminal 80 (Step S1109). In this case, if an authentication ticket has already been registered in the HT 90, then the room-entering-person information acquiring unit 606 also acquires this authentication ticket in combination with the attribute information of the room entering person from the HT 90.
Next, the room-entering-person information acquiring unit 606 transmits the attribute information of the room entering person acquired from the HT 90 to the trust level examining unit 608 so as to request a decision of a trust level. In this case, if the authentication ticket has been obtained from the HT 90, then the room-entering-person information acquiring unit 606 transmits this authentication ticket to the trust level determining unit 608 in combination with the above-explained attribute information. Upon receipt of this request, the trust level determining unit 608 determines a trust level of the room entering person by employing both the attribute information of the room entering person accepted from the room-entering-person information acquiring unit 606, and also, the trust level management TBL storage unit 612 (step S1110). Then, the trust level determining unit 608 transmits the determined trust level to the authentication control unit 609. At this time, if the trust level determining unit 608 has accepted the authentication ticket which had already been acquired by the room entering person from the room-entering-person information acquiring unit 606, then this trust level determining unit 608 also transmits this authentication ticket to the authentication control unit 609 in combination with the above-explained attribute information. In this embodiment, as the information of the access place (see
Next, when the authentication control unit 609 accepts both the security level from the security level determining unit 607 and the trust level from the trust level determining unit 608, the authentication retrieves an authentication level of the room entering person authenticating operation, which corresponds to the combination of the accepted security level and the accepted trust level, from the authentication level management TBL storage unit 613 (see
Next, in such a case that the authentication control unit 609 does not accept the authentication ticket (namely, authentication ticket registered in HT 90) from the trust level determining unit 908 (“NO” in Step S1111), the process operation is advanced to Step S1113. When the authentication control unit 609 accepts the authentication ticket from the trust level determining unit 908 (“YES” in Step S1111), the authentication control unit 609 compares the authentication level 6144 (see
In Step S1113, the authentication control unit 609 retrieves such an authenticating method corresponding to the authentication level determined in the step S1110a from the authenticating method management TBL storage unit 615, and then, determines the retrieved authenticating method as such an authenticating method which is employed so as to authenticate the room entering person. Then, the authentication control unit 609 acquires from the room entering person, such an authentication information which is required to execute an authenticating operation by the determined authenticating method (Step S1113). Concretely speaking, in the case that the authenticating method is “password authentication”, for instance, a message for prompting an input of the password is displayed, and since the authentication control unit 609 accepts the input of the password via the instruction accepting unit 603 from the room entering person, the authentication information is acquired. Also, in the case that the authenticating method is “password authentication+electronic signature authentication”, the authentication control unit 609 accepts an input of a password from a room entering person in the above-described manner, and also, transmits signature subject data (for example, random number) via the wireless communication unit 602 to the HT 90. Then, since the authentication control unit 609 accepts an electronic signature with respect to this signature subject data, the authentication information is acquired. Also, in the case that the authenticating method is “biological authentication+electronic signature authentication), the authentication control unit 609 accepts an electronic signature with respect to the transmission data in the above-explained manner, and also, for instance, while such a message that biological information is acquired is displayed, the authentication control unit 609 acquires the biological information by employing a biological information acquiring apparatus (for example, fingerprint acquiring apparatus and pupil acquiring apparatus) which is not shown in the drawing, so that the authentication information is acquired.
Next, the authentication control unit 609 produces an authentication request, and then transmits this produced authentication request via the network IF unit 601 to the authentication apparatus 50. The authentication request contains the user ID included in the attribute information of the room entering person acquired in Step S1109, and the designation of the authenticating method, and also, the acquired authentication information. Upon receipt of this authentication request, the authentication apparatus 50 authenticates the authentication information by employing the designated authenticating method. Then, the authentication apparatus 50 transmits this authentication result to the authentication control apparatus 609 functioning as the authentication request source (Step S1114). In this case, as an interface used to be cooperated to the authentication apparatus 50, for example, LDAP (Lightweight Directory Access Protocol) which corresponds to the standard protocol of the directory, and Radius (Remote Authentication Dial-In User Service) which corresponds to the standard protocol of the remote user authentication may be utilized. A detailed content of this authentication apparatus 50 will be explained later.
Next, in the case that the authentication result received from the authentication apparatus 50 indicates a failure of the authentication operation (“NO” in Step S1115), the authentication control unit 609 executes an error processing operation in such a manner that, for example, an error message is displayed on a display apparatus (not shown) (Step S1117), and thereafter, the authentication control unit 609 accomplishes this flow operation. On the other hand, in such a case that the authentication result received from the authentication apparatus 50 indicates a success of the authentication operation (“YES” in Step S1115), the authentication control unit 609 produces an authentication ticket (see
In Step S1118, the authentication control unit 609 notifies either the authentication ticket which has been judged in the previous Step S1112 that this authentication ticket need not be again authenticated, or both the provisional ID and the user attribute of the authentication ticket which has been newly issued in Step S1116 to the area information acquiring unit 605, and requests the area information management TBL storage unit 611 to add a record. Upon receipt of this request, the area information acquiring unit 605 adds the record 6110c of the room entering person to the area information management TBL storage unit 611 as a room existing person (structural element) in this area, and registers the provisional ID notified from the authentication control unit 609 into the field 6111 of this record 6110c, and also, registers the user attribute notified from the authentication control unit 609 into the field 6112.
Next, the authentication control unit 609 produces a record deletion request, and then transmits this record deletion request via the network IF unit 601 to another authentication control apparatus 60 (Step S1119). This record deletion request is combined with the designation made by the authentication ticket which has been judged in Step S1112 by that this authentication ticket need not be again authenticated, or the provisional ID of the authentication ticket which has been newly issued in Step S1116. This record deletion request is used to delete that this room entering person becomes the room existing person (structural element) in another area. Upon receipt of this record deletion request, the area acquiring unit 605 of another authentication control apparatus 60 retrieves the record 6110c of the user for the area information management TBL storage unit 611, and then, deletes the retrieved record 6110c. In the record 6110c of the user, the provisional ID designated by the record deletion request has been recorded as the identification information in the field 6111.
Subsequently, the authentication control unit 609 causes the open/close control unit 604 to open and/or close the door, or the gate in order that the room entering person can enter such a floor that the sub-segment 10 of the own authentication control apparatus 60 (Step S1120). Thereafter, the authentication control unit 609 accomplishes this flow operation.
When a room existing person within the room area 10 issues an access request to an electronic appliance employed in the room area 10, this access request is transferred from this accessed electronic appliance via the network IF unit 601 to the authentication control unit 609 related to this room area 10. When this access request is transferred to the authentication control unit 609 (Step S1201), the authentication control unit 609 verifies validity of an authentication ticket which is attached to this access request (Step 1202). In the case that the present date does not exceed a validity term 6143 of the authentication ticket, and further, a signature verifying operation of an electronic signature 6146 of the authentication ticket can succeed, the authentication control apparatus 60 judges that the authentication ticket is justified. It should also be assumed that since the authentication control apparatus 60 owns signature verifying keys of authentication control apparatus 60, the authentication control apparatus 60 verifies the signature of the electronic signature 6146 of the authentication ticket by employing the signature verifying key which corresponds to the authentication control apparatus 60 of the authentication ticket issuing source 6142.
Then, in the case that the justification of the authentication ticket is not confirmed (“NO” in Step S1203), the authentication control unit 609 executes an error processing operation in such a manner that a message of this no justification is transmitted via the network IF unit 601 to the structural electronic appliance of the transfer source of the access request (Step S1208), and then, this flow operation is ended.
On the other hand, in the case that the justification of the authentication is confirmed (“YES” in Step S1203), the authentication control unit 609 produces an access ticket (see
Next, the authentication control unit 609 requests the security level determining unit 607 so as to determine a security level. Upon receipt of this request, the security level determining unit 607 reads out all of the records 6110 which have been registered in the area information management TBL storage unit 611 via the area information acquiring unit 605. Then, the security level determining unit 607 determines a security level by using each of the read records 6110 and the security level management TBL storage unit 610, and then, transmits the determined security level to the authentication control unit 609. The authentication control unit 609 transmits this security level via the network IF unit 601 to the structural electric appliance of the transfer source of the access request (Step S1205).
Next, when the authentication control apparatus 609 receives a security policy which is set to the relevant structural electronic appliance via this structural electronic appliance of the transfer source of the access request (Step S1206), the authentication control apparatus 609 applies the provisional ID of the access ticket issued in Step S1203 to this security policy, and then, resends this security policy attached with the provisional ID of the access ticket to the structural electronic appliance of the transfer source of the access request (Step S1207). Thereafter, this flow operation is ended. Upon receipt of this resent security policy, the structural electronic appliance of the transfer source of the access request applies the security policy corresponding to the provisional ID 6161 of this access ticket with respective of the access request combined with the access ticket. Thereafter, this flow operation is ended.
Returning back to
The authentication apparatus 50 having the above-described arrangements may be realized by that in such a computer system having a general-purpose arrangement (namely, for example, both wireless communication apparatus 909 and I/O apparatus 910 are omitted from arrangement shown in
When the authentication processing unit 502 receives an authentication request via the network IF unit 501 from the authentication control apparatus 60 (Step S1501), the authentication processing unit 502 extracts such a record that a user ID contained in this authentication request is registered in the field 5031 from the authentication information DB 503 (Step S1502). Thereafter, the authentication processing unit 502 specifies an authenticating method which is designated by this authentication request (Step S1503). In this embodiment, as explained above, it is so assumed that at least one of the password authentication, the biological information authentication, and the electronic signature authentication is designated.
Next, the authentication processing unit 502 checks whether or not the designated authenticating method contains the password authentication (Step S1504). When the designated authenticating method does not contain the password authentication, the process operation is advanced to Step S1506. When the designated authenticating method contains the password authentication, the authentication processing unit 502 checks whether or not the password contained in the authentication request is made coincident with such a password which has been registered in the sub-field 50321 of the record extracted in Step S1502 (Step S1505). Then, when these passwords are made coincident with each other, the process operation is advanced to Step S1506. When these passwords are not made coincident with each other, the authentication processing unit 502 judges that the authentication cannot be established, and transmits an authentication result indicative of this fact to the authentication control unit 60 of the authentication request source (Step S1512).
Next, the authentication processing unit 502 checks whether or not the designated authenticating method contains the biological information authentication in Step S1506. When the designated authenticating method does not contain the biological information authentication, the process operation is advanced to Step S1508. When the designated authenticating method contains the biological information authentication, the authentication processing unit 502 checks whether or not the biological information contained in the authentication request is made coincident with such a biological information which has been registered in the sub-field 50323 of the record extracted in Step S1502 (Step S1507). Then, when the sets of the biological information are made coincident with each other, the process operation is advanced to Step S1508. When the sets of the biological information are not made coincident with each other, the authentication processing unit 502 judges that the authentication cannot be established, and transmits an authentication result indicative of this fact to the authentication control unit 60 of the authentication request source (Step S1512).
Next, the authentication processing unit 502 checks whether or not the designated authenticating method contains the electronic signature authentication (Step S1508). When the designated authenticating method does not contain the electronic signature authentication, the process operation is advanced to Step S1511. When the designated authenticating method contains the electronic signature authentication, the authentication processing unit 502 decodes the electronic signature contained in the authentication request based upon the signature verifying key which has been registered in the sub-field 50322 of the record extracted in Step S1502. Then, the authentication processing unit 502 checks as to whether or not the decoded result is made coincident with signature subject data contained in the authentication request (Step S1509). When the decoded electronic signature is made coincident with the signature subject data, the process operation is advanced to Step S1511. When these signatures are not made coincident with each other, the authentication processing unit 502 judges that the authentication cannot be established, and transmits an authentication result indicative of this fact to the authentication control unit 60 of the authentication request source (Step S1512).
Next, in Step S1511, the authentication processing unit 502 judges that the authentication can be established, and transmits an authentication result indicative of this fact to the authentication control unit 60 of the authentication request source.
Returning back to
First of all, when the main control unit 904 receives an attribute information transmission request from the communication apparatus of the counter party via the wireless communication unit 901 (Step S1701), the main control unit 904 checks whether or not an authentication ticket has already been stored in the storage unit 903 (Step S1702). In the case that the authentication ticket has been stored in the storage unit 903, the main control unit 904 reads both the attribute information of the room entering person and the authentication ticket from the storage unit 903, and then transmits the read attribute information and the read authentication ticket to the communication apparatus of the counter party (Step S1703). On the other hand, in the case that the authentication ticket has not yet been stored in the storage unit 903, the main control unit 904 reads the attribute information of the room entering person from the storage unit 903, and then transmits the read attribute information to the communication apparatus of the counter party (Step S1704).
Also, when the main control unit 904 receives a signature request from the communication apparatus of the counter party via the wireless communication unit 901 (Step S1705), this main control unit 904 transfers signature request data (for instance, random number) which is contained in this signature request to the signature producing unit 902. Upon receipt of this signature subject data, the signature producing unit 902 produces an electronic signature with respect to the signature subject data by employing the signature key stored in the storage unit 903. The main control unit 904 transmits this produced electronic signature to the communication apparatus of the counter party (Step S1706).
Also, when the main control unit 904 receives either an authentication ticket or an access ticket from the communication apparatus via the wireless communication unit 901 (Step S1707), the main control unit 904 stores this received ticket into the storage unit 903 (Step S1708).
Also, when the main control unit 904 receives a transmission request of either an authentication ticket or an access ticket from the communication apparatus of the counter party via the wireless communication unit 901 (Step S1709), the main control unit 904 checks whether or not the relevant ticket has been stored in the storage unit 903 (Step S1710). The access ticket designates identification information 6164 of an access subject appliance. In the case that the relevant ticket has been stored in the storage unit 903, the main control unit 904 reads out the relevant ticket from the storage unit 903, and then, transmits this read ticket to the communication apparatus of the counter party (Step S1711). Thereafter, the main control unit 904 updates the use frequency of the attribute information of the user which has been stored in the storage unit 903 (Step S1712). On the other hand, when the relevant ticket has not yet been stored, the main control unit 904 transmits an error message to the communication apparatus of the counter party (Step S1713).
Returning back to
Now, description will be made of operations executed in such a case that a room existing person accesses an electronic appliance employed in the room area 10 by using the user terminal 80 owned by this room existing person.
First, when the main control unit 806 accepts an access instruction from the room existing person via the input apparatus 803 (Step S1901), the main control unit 806 transmits an access ticket transmitting request via the wireless communication unit 801 to the HT 90 (Step S1902). This access instruction is issued to such an electronic appliance corresponding to the structural element 70 which belongs to the room area 10 constituted on a floor where the room existing person is located. Then, if the main control unit 806 receives an access ticket from the HT 90 (“YES” in Step S1903), then the process operation is advanced to Step S1912. On the other hand, if the main control unit 806 receives such an error message that the access ticket has not yet been stored from the HT 90 (“NO” in Step S1903), then the main control unit 806 transmits an authentication ticket transmitting request via the wireless communication unit 801 to the HT 90 (Step S1904). Thereafter, the process operation is advanced to Step S1905.
In Step S1905, if the main control unit 806 receives such an error message that the authentication ticket has not yet been stored from the HT 90, then the main control unit 806 notifies such a fact that the room entering person is not authenticated to the room existing person by displaying an error message on the display unit 804 (Step S1915). Thereafter, this flow operation is ended. On the other hand, if the main control unit 806 receives the authentication ticket from the HT 90, then the main control unit 806 transmits an access ticket issuing request in conjunction with this authentication ticket via the wireless LANIF unit 802 to a structural electronic appliance as an access subject (Step S1906). Then, when the main control unit 806 receives an access ticket from the structural electronic appliance of the access subject (“YES” in Step S1907), the process operation is advanced to Step S1908. On the other hand, when the main control unit 806 receives an error message from the structural electronic appliance of the access subject (“NO” in Step S1907), the main control unit 806 notifies such a fact that the authentication ticket is not justified (for instance, time limit is expired) in such a manner that an error message is displayed on the display unit 804 (Step S1915). Thereafter, this flow operation is accomplished.
In Step S1908, the main control unit 806 transmits the received access ticket via the wireless communication unit 801 to the HT 90 (Step S1908). Next, the main control unit 806 receives both a security level of the room area 10 and information of a security policy item from the structural electronic appliance of the access subject via the wireless LANIF unit 802 (Step S1909). The security level of the room area 10 is constructed on the floor where a room existing person is located. The security policy item is settable to the structural electronic appliance of the access subject. Then, the main control unit 806 displays a setting accept view of the security policy which contains the above-described information on the display unit 804, and accepts setting of the security policy from the room existing person (Step S1910).
In the security policy setting/accepting view shown in
In Step S1912, the main control unit 806 transmits an access ticket via the wireless LANIF unit 802 to the structural electronic appliance of the access subject. Then, if the main control unit 806 receives an access permission from the structural electronic appliance of the access subject (“YES” in Step S1913), then the main control unit 806 commences an access operation to the structural electronic appliance of the access subject (Step S1914). On the other hand, if the main control unit 806 receives an error message from the structural electronic appliance of the access subject (“NO” in Step S1913), the main control unit 806 notifies such a fact that the access ticket is not justified (for instance, time limit is expired) in such a manner that an error message is displayed on the display unit 804 (Step S1915). Thereafter, this flow operation is accomplished.
Returning back to
First, the access limiting process operation will now be explained with employment of
The access control unit 7013 checks validity of an access ticket added to the received access request (step S2201). Concretely speaking, in such a case that the present date does not expire a validity term 6163 of the access ticket, and further, a signature verification of an electronic signature 6166 of the access ticket, the access control unit 7013 judges that the access ticket is justified. It should also be noted that while the access control unit 7013 owns signature verifying keys of the respective authentication control apparatus 60, this access control unit 7013 verifies the signature of the electronic signature 6166 of the access ticket by employing the signature verifying key which corresponds to the authentication control apparatus 60 of the issuing source 6162 of the access ticket.
Next, if the access control unit 7013 can confirm the validity of the access ticket (“YES” in Step S2202), then the access control unit 7013 transmits an access permission message to the user terminal 80 of the access request transmission source (Step S2203). Then, the access control unit 7013 permits this user terminal 80 to access the apparatus main body 7014 (Step S2204). In this case, if there is such a security policy which has been set in correspondence with a provisional ID 6161 of the access ticket whose justification has been confirmed, then this set security policy is applied to the access request issued from the user terminal 80.
On the other hand, when the access control unit 7013 cannot confirm the justification of the access ticket (“NO” in Step S2202), the access control unit 7013 transmits an error message to the user terminal 80 of the access request transmission source (Step S2205). Then, the access control unit 7013 refuses an access operation of this user terminal 80 with respect to the apparatus main body 7014 (Step S2206).
Next, description will be made of the intermediate process operation as to the access ticket issuing operation with employment of
The access control unit 7013 transfers the received access ticket issuing request to the authentication control apparatus 60 which belongs to the same room area 10 as the own structural appliance in combination with the authentication ticket added to this request (Step S2251).
Next, when the access control unit 7013 receives an access ticket from the authentication control apparatus 60 as a response to the access ticket issuing request, the access control unit 7013 transfers this received access ticket to the user terminal 80 (Step S2252).
Next, when the access control unit 7013 receives both a security level of the same room area 10 as the own structural electronic appliance and information as to an item of a security policy settable to the own structural electronic appliance from the authentication control apparatus 60, the access control unit 7013 transfers these received security level and security policy to the user terminal 80 (Step S2253).
Next, when the access control unit 7013 receives a security policy setting request which contains the information of the security policy to be set to the own structural electronic appliance from the user terminal 80, the access control unit 7013 transfers this received security policy setting request to the authentication control apparatus 60 (Step S2254). Then, when the access control unit 7013 receives a security policy setting instruction from the authentication control apparatus 60, the access control unit 7013 sets this security policy setting instruction to the own structural appliance, and further, transmits such a notification that setting of the security policy has bee accomplished to the user terminal 80. This security policy setting instruction contains both a provisional ID 6161 of the access ticket and information as to the security policy to be set. Thereafter, the access control unit 7013 applies this security policy to the access request in connection with this access ticket (Step S2255).
Next, description will be made of information process operations executed among the HT 90, the authentication control apparatus 60, and the authentication apparatus 50 when an authentication ticket is issued.
When the authentication control apparatus 601 on floor 1F accepts an authentication request from a room entering person (T2301), the authentication control apparatus 601 commences a flow operation shown in
When the HT 90 receives the room-entering-person attribute information transmitting request from the authentication control apparatus 601, the HT 90 checks as to whether or not an authentication ticket has been stored in the flowchart shown in
In such a case that the authentication control apparatus 601 does not receive the authentication ticket from the HT 90, the authentication control apparatus 601 determines an authentication level based upon both the trust level determined by employing the attribute information of the room entering person and the security level of the room area 101, and then, specifies an authenticating method corresponding to the determined authentication level. In this example, it is so assumed that “password authentication+electronic signature authentication” is specified. In this case, the authentication control apparatus 601 requires a password request to the room entering person, and then, accepts the input of the password from the room entering person (T2304). Furthermore, the authentication control apparatus 601 produces signature subject data, and then, transmits this signature subject data to the HT 90 in order to request an electronic signature (T2306).
When the HT 90 receives the electronic signature request from the authentication control apparatus 601, the HT 90 produces an electronic signature of the signature subject data which has been added to this electronic signature request, and then transmits the produced electronic signature to the authentication control apparatus 601 (T2307).
When all of such authentication information (namely, password, electronic signature, and signature subject data) required for the specific authenticating method are collected, the authentication control apparatus 601 produces an authentication request which contains all of the above-explained authentication information, the user ID contained in the room-entering-person attribute information, and the designation of the authenticating method, and then transmits the authentication request to the authentication apparatus 50 (T2308).
When the authentication apparatus 50 receives the authentication request from the authentication control apparatus 601, the authentication apparatus 50 executes an authentication process operation in accordance with the flowchart shown in
When the authentication control apparatus 601 receives the authentication result indicative of “success” from the authentication apparatus 50, this authentication control apparatus 601 produces an authentication ticket, and then, transmits the produced authentication ticket to the HT 90 (T2310). Then, the authentication control apparatus 601 permits the room entering person to enter the room area 101 (T2311).
Thereafter, when the room entering person who entered the room area 101 goes out of the room area 101, and then is going to enter the room area 102 on the floor 2F, HT90 of the room entering person transmits the authentication ticket held therein to the authentication control apparatus 602 (T2312). The authentication control apparatus 602 checks validity of the authentication ticket sent. If the authentication ticket is valid, the authentication control apparatus 602 requests the attribute information of the room entering person and the security policy to the authentication control apparatus 601 (T2313). In response to the request, the authentication control apparatus 601 sends the attribute information and the security policy to the authentication control apparatus 602 (T2314). After acquiring the attribute information and the security policy, the authentication control apparatus 602 permits the room entering person to enter the room area 102 (T2315).
Next, description will be made of information process operations executed among the HT 90, the user terminal 80, the structural electronic appliances 701 to 703 (will be referred to as “70x”), and the authentication control apparatus 60 when an access ticket is issued.
When the user terminal 80 accepts an access instruction from an owner to the structural appliance 70x (T2401), the user terminal 80 commences the flow operation shown in
When the HT 90 receives the access ticket transmitting request from the user terminal 80, the HT 90 checks whether or not an access ticket with respect to the structural electronic appliance 70x has been stored in accordance with the flow operation shown in
If the user terminal 80 receives the error message from the HT 90, then this user terminal 80 further sends an authentication ticket transmission request to the HT 90 (T2404). Upon receipt of this authentication ticket transmitting request, the HT 90 transmits the authentication ticket to the user terminal 80 (T2405).
Then, when the user terminal 80 receives the authentication ticket from the HT 90, this user terminal 80 sends an access ticket issuing request containing this authentication ticket to the structural electronic appliance 70x corresponding to the access request (T 2406). Thereafter, the structural electronic appliance 70x transfers the access ticket issuing request received by the user terminal 80 to the authentication control apparatus 60 which belongs to the same room area 10 as the own structural electronic appliance in accordance with the flow operation of
When the authentication control apparatus 60 receives the access ticket issuing request from the structural appliance 70x, the authentication control apparatus 60 commences the flowchart of
Next, the authentication control apparatus 60 transmits both a security level of the room area 10 and information of a security policy to the structural electronic appliance 70x (T2411). This security policy information is settable to the structural electronic appliance 70x which corresponds to the transfer source of the access ticket issuing request. The structural electronic appliance 70x transmits all of the above-explained information to the user terminal 80 (T2412).
When the user terminal 80 receives via the structural electronic appliance 70x both the security level of the room area 10 and the security policy information settable to this structural electronic appliance 70x, the user terminal 80 displays such a security policy setting view as shown in
Next, when the authentication control apparatus 60 receives the security policy from the structural electronic appliance 70x, the authentication control apparatus 60 sets this received security policy to the structural electronic appliance 70x in correspondence with the provisional ID of the access ticket (T2415).
Thereafter, the user terminal 80 transmits an access ticket transmitting request containing a designation of identification information of the structural electronic appliance 70x to the HT 90 (T2416). Then, when the user terminal 80 receives an access ticket with respect to the structural electronic appliance 70x from the HT 90 (T2417), the user terminal 80 transmits this access ticket to the structural electronic appliance 70x so as to issue an access with respect to the structural electronic appliance 70x (T2418). As a result, the structural electronic appliance 70x controls the access operation in accordance with the flow operation of
As previously explained, the authentication control system/method according to one embodiment of the present invention have been described.
In accordance with this embodiment, the authentication control apparatus 60 determines the authentication level based upon both the trust level of the room entering person in response to the attribute information of the room entering person, and the security level of the room area 10 which is tried to be used by this room entering person, which have been stored in the HT 90. Thus, the authenticating method corresponding to this determined authentication level is applied to the authenticating operation for the room entering person. As a consequence, the determination of the authenticating method of this room entering person can be adapted to the content of the room area.
Also, in accordance with this embodiment, as indicated by a broken line of
Also, in accordance with this embodiment, the authentication control apparatus 60 issues the access ticket for allowing the access operation with respect to the electronic appliance corresponding to the structural element 70 based upon the authentication ticket provided from the user terminal 80. Then, the user terminal 80 accesses the structural electronic appliance of the structural element 70 by employing this issued access ticket. As a consequence, in order to use the respective structural electronic appliances, there is no need to make the authentication request with respect to the authentication apparatus 50 every time each of these structural electronic appliances is utilized. Therefore, a so-called “single sign-on” can be realized by which the utilization as to a plurality of structural electronic appliances (services) can be carried out by performing the authenticating operation by the authentication apparatus 50 one time.
It should be understood that the present invention is not limited only to the above-described embodiment, but may be modified within the technical scope of the present invention.
For example, in the above-described embodiment, such a case has been explained. That is, the room floor 10 is constructed in the unit of the floor. Then, the open/close control unit 604 of the door/gate is provided with the authentication control apparatus 60, while the door/gate restrict the entry of the room entering person into the floor where the room area 10 to which this authentication control apparatus 60. However, the present invention is not limited only to the above-described case. For instance, the room area 10 may be alternatively constructed, while such a physical condition as a floor and a room area is employed as the unit, or such a virtual space as an electronic conference room is used as the unit.
Similarly, in the example shown in
Also, in the above-described embodiments, the below-mentioned case has been explained. That is, the storing operations of various sorts of information as to the attribute information of the room entering person, the authentication ticket, and the access ticket have been carried out by the HT 90, and also, the producing operation of the electronic signature has been carried out by the HT 90. Alternatively, the storing operations of the information and the producing operation of the electronic signature may be alternatively carried out by the user terminal 80. Furthermore, the function as the authentication apparatus 50 may alternatively be applied to any one of the authentication control apparatus 60.
It should be further understood by those skilled in the art that although the foregoing description has been made on embodiments of the invention, the invention is not limited thereto and various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2003-410397 | Dec 2003 | JP | national |