Next, embodiments of the present invention will be described hereinafter with reference to the accompanying drawings.
The server apparatus 1 includes at least a user name/password setting unit 11, a user name/password input interface unit 12, an SIP interface unit 13, a client authentication unit 14, a server authentication unit 15, an SIP message forming unit 16, and an SIP message analyzing unit 17. The local maintenance console 2 is connected to the SIP-protocol-coping server apparatus 1 by a serial cable or the like. The local maintenance console 2 is to be temporarily installed in a construction period or the like of the server apparatus 1, and need not be connected to the server apparatus 1 during an operation of the server apparatus 1.
In the server apparatus 1, the user name/password setting unit 11, the user name/password input interface unit 12, the SIP interface unit 13, the client authentication unit 14, the server authentication unit 15, the SIP message forming unit 16, and the SIP message analyzing unit 17 can be realized by executing a program by a CPU (Central Processing Unit) (not shown).
The client apparatus 3-1 includes at least the user name/password setting unit 31, a server name/user name/password input interface unit 32, the SIP interface unit 33, the client authentication unit 34, a server authentication unit 35, the SIP message forming unit 36, and the SIP message analyzing unit 37. The local maintenance console 4 is connected to the client apparatus 3-1 by a serial cable or the like. The local maintenance console 4 is to be temporarily installed in the construction period of the client apparatus 3-1, and need not be connected during the operation of the client apparatus 3-1.
In the client apparatus 3-1, the user name/password setting unit 31, the server name/user name/password input interface unit 32, the SIP interface unit 33, the client authentication unit 34, the server authentication unit 35, the SIP message forming unit 36, and the SIP message analyzing unit 37 can be realized by executing a program by a CPU (not shown). Furthermore, the client apparatuses 3-2 and 3-3 have the same configuration as that of the client apparatus 3-1.
In the embodiment, the configuration described above is realized, the client apparatus 3-1 is authenticated from the server apparatus 1, and the server apparatus 1 is authenticated from the client apparatus 3-1.
When a user name and a password of the client apparatus 3-1 are input from the local maintenance console 2 connected to the server apparatus 1 in advance (a11 in
When a server name of the server apparatus 1 and a user name and a password of the client apparatus 3-1 are input from the local maintenance console 4 connected to the client apparatus 3-1 in advance (a41 in
After the server name, the user name, and the password are set in the user name/password setting unit 31, when the client apparatus 3-1 is started up (a33 in
The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1 through the LAN 100 (a34 in
The SIP interface unit 13 of the server apparatus 1 which receives the REGISTER message added with the server authentication request data confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the server authentication request data, the SIP message analyzing unit 17 designates the client authentication unit 14 to start authentication of the client apparatus 3-1 and notifies the server authentication unit 15 of the server authentication request data.
The client authentication unit 14 designated to start the authentication of the client apparatus 3-1 designates the SIP message forming unit 16 to form a 401 response message added with Challenge and stores the Challenge data. In this case, the Challenge data denotes a random value generated by the authentication procedure of the Challenge-Response scheme.
At the same time, the server authentication unit 15 designates the SIP message forming unit 16 to form 401 response message (401 Unauthorized) added with authentication data for server authentication. The SIP message forming unit 16 forms the 401 response messages added with the Challenge and the server authentication data and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3-1 through the LAN 100 (a23 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 401 response messages added with the Challenge and the server authentication data recognizes the normality of a format or the like of the 401 response message. When the 401 response message is normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge and the server authentication data, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data and notifies the server authentication unit 35 of the server authentication data.
The server authentication unit 35 authentication of the received server authentication data by using the server name, user name, and the password set in the user name/password setting unit 31 (server authentication) (a35 in
The SIP message forming unit 36 forms the REGISTER message added with the Digest and transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1 through the LAN 100 (a36 in
The SIP interface unit 13 of the server apparatus 1 which receives the REGISTER message added with the Digest confirms the normality of the format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (a24 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception. The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification (a26 in
Therefore, since the client apparatus 3-1 does not complete the authentication until the server authentication of the corresponding server apparatus 1 is achieved, security in the SIP-protocol-coping client-server distributed system can be reinforced.
When a user name and a password of the client apparatus 3-1 are input from a maintenance console 5 connected to the server apparatus 1 through a LAN 100 in advance (b11 in
When a server name of the server apparatus 1 and a user name and a password of the client apparatus 3-1 are input from the maintenance console 5 connected to the client apparatus 3-1 through the LAN 100 in advance (b13 in
The setting of the user name and the password of the client apparatus 3-1 in the client apparatus 3-1, the setting of the server name of the server apparatus 1 in the client apparatus 3-1, and the setting of the user name and the password of the client apparatus 3-1 are ended. Since an operation (b23 to b26 and b33 to b36) performed after the client apparatus 3-1 is started are the same as those in the first embodiment of the present invention described above, a description thereof will be omitted.
Therefore, in the embodiment, the settings are performed by using the maintenance console 5 connected to the server apparatus 1 and the client apparatus 3-1 through the LAN 100, so that the facility of maintenance can be assured. Although the operations of the client apparatuses 3-2 and 3-3 are not described, the same effect as that obtained when the client apparatus 3-1 is used can be obtained.
In the embodiment, when the following configuration is realized, the client apparatuses 3-1 to 3-3 can be authenticated from the server apparatus 1, and the server apparatus 1 can be authenticated from the client apparatuses 3-1 to 3-3.
When a user name and a password of the client apparatus 3-1 are input from a maintenance console 2 connected to the server apparatus 1 in advance (c11 in
When a server name of the server apparatus 1 and a user name and a password of the client apparatus 3-1 are input from a maintenance console 4 connected to the client apparatus 3-1 in advance (c41 in
After the server name, the user name, and the password are set in the user name/password setting unit 31, when the client apparatus 3-1 is started up (c32 in
The SIP interface unit 13 which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates the client authentication unit 14 to start authentication of the client apparatus 3-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3-1 forms a Challenge, designates the SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge (c23 in
The SIP message forming unit 16 forms 401 response messages added with the Challenge and the inverse challenge and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3-1 through the LAN 100.
The SIP interface unit 33 of the client apparatus 3-1 which receives the 401 response messages added with the Challenge and the Inverse Digest confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge and the inverse Digest, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data and notifies the server authentication unit 35 of the inverse Digest data.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (c36 in
The SIP interface unit 13 of the server apparatus 1 which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (c26 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception. The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification (c28 in
Therefore, in the embodiment, in addition to the effects in the first and second embodiments of the present invention, since the client apparatus 3-1 does not complete the authentication until the server authentication of the corresponding server apparatus 1 is achieved, security in the SIP-protocol-coping client-server distributed system can be reinforced.
In the embodiment, server authentication performed by reversely defining client authentication is defined and used in the authentication method from the client apparatus 3-1 to the server apparatus 1. The configuration constituted by the client authentication units 14 and 34 and the configuration constituted by the server authentication units 15 and 35 can be structured with a common architecture to make it possible to promote the efficiency of apparatus development. Although the operations of the client apparatuses 3-2 and 3-3 are not described above, the same effect as that obtained when the client apparatus 3-1 is used can be obtained.
The operation of the client-server distributed system according to the fourth embodiment of the present invention will be described below with reference to
When a user name and a password of the client apparatus 3-1 are input from a local maintenance console 2 connected to the server apparatus 1 in advance (d11 in
When a server name of the server apparatus 1 and a user name and a password of the client apparatus 3-1 are input from the local maintenance console 4 connected to the client apparatus 3-1 in advance (d41 in
After the server name, the user name, and the password are set in the user name/password setting unit 31, when the client apparatus 3-1 is started up (d33 in
The SIP interface unit 13 which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates a client authentication unit 14 to start authentication of the client apparatus 3-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. At the same time, the server authentication unit 15 forms a Digest (to be referred to as an inverse Digest hereinafter) for server authentication and designates the SIP message forming unit 16 to form a 401 response message added with the inverse Digest. The SIP message forming unit 16 forms 401 response messages added with the Challenge and the inverse Digest and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3-1 through the LAN 100 (d23 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 401 response messages added with the Challenge and the inverse digest confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge and the inverse Digest, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data and notifies the server authentication unit 35 of the inverse Digest data.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (d35 in
The SIP interface unit 13 of the server apparatus 1 which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (c24 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception. The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1.
In this manner, in the embodiment, in addition to the effects in the first to third embodiments of the present invention, the operation of the SIP-protocol-coping client-server distributed system of the client apparatus 3-1 is not permitted unless the client authentication of the client apparatus 3-1 from the server apparatus 1 and the server authentication of the server apparatus 1 from the client apparatus 3-1 are achieved to prevent bidirectional spoofing between the client apparatus 3-1 and the server apparatus 1 to make it possible to reinforce the security. Although the operations of the client apparatuses 3-2 and 3-3 are not described above, the same effect as that obtained when the client apparatus 3-1 is used can be obtained.
An operation of the client-server distributed system according to the fifth embodiment of the present invention will be described below with reference to
When a user name and a password of the client apparatus 3-1 are input from a local maintenance console 2 connected to the server apparatus 1 in advance (e11 in
When a server name of the server apparatus 1 and a user name and a password of the client apparatus 3-1 are input from the local maintenance console 4 connected to the client apparatus 3-1 in advance (e41 in
After the server name, the user name, and the password are set in the user name/password setting unit 31, when the client apparatus 3-1 is started up (e33 in
The SIP interface unit 13 which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates a client authentication unit 14 to start authentication of the client apparatus 3-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. At the same time, the server authentication unit 15 forms an inverse Digest and designates the SIP message forming unit 16 to form a 401 response message added with the inverse Digest. The SIP message forming unit 16 forms 401 response messages added with the Challenge and the inverse Digest and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3-1 through the LAN 100 (e23 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 401 response messages added with the Challenge and the inverse digest confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge and the inverse Digest, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data and notifies the server authentication unit 35 of the inverse Digest data.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (e35 in
The SIP interface unit 13 of the server apparatus 1 which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (e24 in
The client authentication unit 14 designates a user name/password setting unit 11 to make the one-time password invalid. The user name/password setting unit 11 designated to make the one-time password invalid makes the stored one-time password invalid (e27 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception. The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1 (e26 in
The client authentication unit 34 designates a user name/password setting unit 31 to make the one-time password invalid. The user name/password setting unit 31 designated to make the one-time password invalid makes the stored one-time password invalid (e37 in
In this manner, in the embodiment, in addition to the effects in the first to fourth embodiments of the present invention, a password used in authentication between the client apparatus 3-1 and the server apparatus 1 is set as a one-time password, and the one-time password is made invalid upon completion of the client authentication and the server authentication. Authentication by the same password externally input by a holder is not performed two or more times to prevent a password from artificially flowing out, and security in the SIP-protocol-coping client-server distributed system can be reinforced. Although the operations of the client apparatuses 3-2 and 3-3 are not described above, the same effect as that obtained when the client apparatus 3-1 is used can be obtained.
In this embodiment, the above configuration is realized, the client apparatus 3-1 is authenticated from the server apparatus 1a to make it possible to authenticate the server apparatus 1a from the client apparatus 3-1.
When a user name and a one-time password of the client apparatus 3-1 are input from a local maintenance console 2 connected to the server apparatus 1a in advance (f11 in
When a server name of the server apparatus 1a and a user name and a one-time password of the client apparatus 3-1 are input from the local maintenance console 4 connected to the client apparatus 3-1 in advance (f41 in
After the server name, the user name, and the one-time password are set in the user name/password setting unit 31, when the client apparatus 3-1 is started up (f33 in
The SIP interface unit 13 of the server apparatus 1a which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates a client authentication unit 14 to start authentication of the client apparatus 3-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. At the same time, the server authentication unit 15 forms an inverse Digest and designates the SIP message forming unit 16 to form a 401 response message added with the inverse Digest.
The SIP message forming unit 16 forms 401 response messages added with the Challenge and the inverse Digest and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3-1 through the LAN 100 (f23 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 401 response messages added with the Challenge and the inverse Digest confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge and the inverse Digest, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data and notifies the server authentication unit 35 of the inverse Digest data.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (f35 in
The SIP interface unit 13 of the server apparatus 1a which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (f24 in
The mutual authentication password forming unit 18 forms a random mutual authentication password, and notifies the client authentication unit 14 of the formed mutual authentication password. The client authentication unit 14 notifies the user name/password setting unit 11 of the mutual authentication password and designates the user name/password setting unit 11 to set the mutual authentication password. The user name/password setting unit 11 stores the mutual authentication password (f25 in
The client authentication unit 14 designates the SIP message forming unit 16 to form a 200 response message added with a mutual authentication password (200 OK). The SIP message forming unit 16 transfers the formed 200 response message to the SIP interface unit 13. The SIP interface unit 13 transmits the 200 response message to the SIP interface unit 33 of the client apparatus 3-1 through the LAN 100 (f26 in
Furthermore, the client authentication unit 14 designates a user name/password setting unit 11 to make the one-time password invalid. The user name/password setting unit 11 designated to make the one-time password invalid makes the stored one-time password invalid (f28 in
The SIP interface unit 33 of the client apparatus 3-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception and the mutual authentication password. The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1a (f27 in
The client authentication unit 34 notifies the user name/password setting unit 31 of the mutual authentication password and designates the user name/password setting unit 31 to set the mutual authentication password. The user name/password setting unit 31 designed to set the mutual authentication password stores the mutual authentication password (f37 in
Furthermore, the client authentication unit 34 designates the user name/password setting unit 31 to make the one-time password invalid. The user name/password setting unit 31 designated to make the one-time password invalid makes the stored one-time password invalid (f38 in
In this manner, in the embodiment, in addition to the effects in the first to fifth embodiments of the present invention, a mutual authentication password used in the second and subsequent authentications between the client apparatus 3-1 and the server apparatus 1a is automatically generated by the server apparatus 1a. Authentication by the same one-time password externally input by a holder is not performed two or more times to prevent an erroneous input or a one-time password from artificially flowing out, and a password which cannot be easily presumed can be used by forming a random password. For this reason, security in an SIP-protocol-coping client-server distributed system can be reinforced. Although the operations of the client apparatuses 3-2 and 3-3 are not described above, the same effect as that obtained when the client apparatus 3-1 is used can be obtained.
In this case, a server apparatus 1b holds a user name and a mutual authentication password of the client apparatus 3a-1 stored at the first start-up state of the client apparatus 3a-1 in a user name/password setting unit 11. The client apparatus 3a-1 holds a server name of the server apparatus 1b and a user name and a mutual authentication password at the first start-up state in the user name/password setting unit 31. In this case, the user name and the mutual authentication password are values (same values) shared by the server apparatus 1b and the client apparatus 3a-1.
In the embodiment, the above configuration is realized to make it possible to authenticate the client apparatus 3a-1 from the server apparatus 1b and to authenticate the server apparatus 1b from the client apparatus 3a-1.
In a state in which a server name, a user name, and a mutual authentication password are held in the user name/password setting unit 31 of the client apparatus 3a-1 (g21 in
The SIP message forming unit 36 forms the REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to a SIP interface unit 13 of the server apparatus 1b through the LAN 100 (g23 in
The SIP interface unit 13 of the server apparatus 1 which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates the client authentication unit 14 to start authentication of the client apparatus 3-1 and notifies the server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3a-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. At the same time, the server authentication unit 15 forms an inverse Digest and designates the SIP message forming unit 16 to form a 401 response message added with the inverse Digest.
The SIP message forming unit 16 forms 401 response messages added with the Challenge and the inverse Digest and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3a-1 through the LAN 100 (g12 in
The SIP interface unit 33 of the client apparatus 3a-1 which receives the 401 response messages added with the Challenge and the inverse Digest confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge and the inverse Digest, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data and notifies the server authentication unit 35 of the inverse Digest data.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (g24 in
The SIP interface unit 13 of the server apparatus 1b which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (g13 in
The SIP interface unit 33 of the client apparatus 3a-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception. The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3a-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1b (g15 in
In this manner in the embodiment, in addition to the effect of the sixth embodiment of the present invention, a password used in mutual authentication in REGISTER state between the client apparatus 3a-1 and the server apparatus 1b is a password generated at random by the server apparatus 1b in the first start-up state. Since setting is not performed by an external input, security can be reinforced to prevent an artificial erroneous input and improve confidential property of a password. Although the operations of the client apparatuses 3a-2 and 3a-3 are not described above, the same effect as that obtained when the client apparatus 3a-1 is used can be obtained.
In the embodiment, by realizing the above configuration, the client apparatuses 3b-1 to 3b-3 are authenticated from the server apparatus 1c, and the server apparatus 1c can be authenticated from the client apparatuses 3b-1 to 3b-3.
When a user name and a one-time password of the client apparatus 3b-1 are input from a local maintenance console 2 connected to the server apparatus 1c in advance (h11 in
When a server name of the server apparatus 1c and a user name and a one-time password of the client apparatus 3b-1 are input from the local maintenance console 4 connected to the client apparatus 3b-1 in advance (h41 in
After the server name, the user name, and the one-time password are set in the user name/password setting unit 31, when the client apparatus 3b-1 is started up (h33 in
The SIP interface unit 13 of the server apparatus 1c which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates a client authentication unit 14 to start authentication of the client apparatus 3b-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3b-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. The client authentication unit 14 designates the encoding information setting unit 20 to generate a mutual authentication password delivery encoding key used when a mutual authentication password is encoded and transmitted when the mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered. The encoding information setting unit 20 generates and stores the mutual authentication password delivery encoding key (h23 in
At the same time, the server authentication unit 15 forms an inverse Digest and designates the SIP message forming unit 16 to form a 401 response message added with the inverse Digest. The SIP message forming unit 16 forms 401 response messages added with the Challenge and the inverse Digest and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (h24 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 401 response messages added with the Challenge and the inverse Digest confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge and the inverse Digest, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data and notifies the server authentication unit 35 of the inverse Digest data.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (h35 in
The client authentication unit 34 designates the encoding information setting unit 39 to generate a mutual authentication password delivery encoding key used when a mutual authentication password is encoded and transmitted when a mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered. The encoding information setting unit 39 generates and stores the mutual authentication password delivery encoding key (h36 in
The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1c through the LAN 100 (h37 in
The SIP interface unit 13 of the server apparatus 1c which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (h25 in
Furthermore, the client authentication unit 14 designates a mutual authentication password forming unit 18 to form a mutual authentication password used in second and subsequent start-up states of the client apparatus 3b-1. The mutual authentication password forming unit 18 forms a random mutual authentication password, and notifies the client authentication unit 14 of the formed mutual authentication password. The client authentication unit 14 notifies the user name/password setting unit 11 of the mutual authentication password and designates the user name/password setting unit 11 to set the mutual authentication password. The user name/password setting unit 11 stores the mutual authentication password (h26 in
The client authentication unit 14 designates the mutual authentication password encoding unit 19 to encode the formed mutual authentication password. The mutual authentication password encoding unit 19 asks the encoding information setting unit 20 about an encoding rule and a mutual authentication password delivery encoding key, encodes the formed mutual authentication password by the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 14 of the encoded mutual authentication password (h27 in
The client authentication unit 14 designates the SIP message forming unit 16 to form a 200 response message added with an encoded mutual authentication password (200 OK). The SIP message forming unit 16 transfers the formed 200 response message to the SIP interface unit 13. The SIP interface unit 13 transmits the 200 response message to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (h28 in
Furthermore, the client authentication unit 14 designates a user name/password setting unit 11 to make the one-time password invalid. The user name/password setting unit 11 designated to make the one-time password invalid makes the stored one-time password invalid (h30 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception and the encoded mutual authentication password.
The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3b-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1 (h29 in
The client authentication unit 34 designates the mutual authentication password decoding unit 38 to decode the received mutual authentication password. The mutual authentication password decoding unit 38 asks the encoding information setting unit 39 about an encoding rule and an authentication password delivery encoding key, decodes the mutual authentication password received by the SIP interface unit 33 by the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 34 of the decoded mutual authentication password (h38 in
The client authentication unit 34 notifies the user name/password setting unit 31 of the decoded mutual authentication password and designates the user name/password setting unit 31 to set the mutual authentication password. The user name/password setting unit 31 designed to set the mutual authentication password stores the mutual authentication password (h39 in
In this manner, in the embodiment, in addition to the effect in the sixth embodiment of the present invention, data is encoded when a mutual authentication password used in the second and subsequent authentications between the client apparatus 3b-1 and the server apparatus 1c is transmitted from the server apparatus 1c to make it possible to reinforce the security against leakage of data in notification of a password or intentional hacking or the like. Although the operations of client apparatuses 3b-2 and 3b-3 are not described above, the same effect as that obtained when the client apparatus 3b-1 is used can be obtained.
In the embodiment, the above configuration is realized to make it possible to authenticate a client apparatus 3b-1 from the server apparatus id and to authenticate the server apparatus 1d from the client apparatus 3b-1.
When a user name, a one-time password, and the presence/absence of encoding of a mutual authentication password of the client apparatus 3b-1 are input from a local maintenance console 2 connected to the server apparatus 1d in advance (i11 in
The encoding information input interface unit 21 receives a setting request including the presence/absence data of encoding of the mutual authentication password. When the normality of the presence/absence data of encoding of the mutual authentication password can be confirmed, the encoding information input interface unit 21 communicates the presence/absence data of encoding of the mutual authentication password to the encoding information setting unit 20. The encoding information setting unit 20 stores the presence/absence of encoding of the mutual authentication password (i22 in
When a server name of the server apparatus 1d and a user name and a one-time password of the client apparatus 3b-1 are input from the local maintenance console 4 connected to the client apparatus 3b-1 in advance (i41 in
After the server name, the user name, and the one-time password are set in the user name/password setting unit 31, when the client apparatus 3b-1 is started up, the server authentication unit 35 forms an inverse Challenge, designates the SIP message forming unit 36 to form a REGISTER message added with the inverse Challenge, and stores the inverse Challenge. The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1d through the LAN 100 (i33 in
The SIP interface unit 13 of the server apparatus 1d which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates a client authentication unit 14 to start authentication of the client apparatus 3b-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3b-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. The client authentication unit 14 asks the encoding information setting unit 20 whether a mutual authentication password is encoded and transmitted when the mutual authentication password used in mutual authentication in the second and subsequent REGISTER states. At the presence of encoding, the client authentication unit 14 designates the encoding information setting unit 20 to generate a mutual authentication password delivery encoding key. The encoding information setting unit 20 generates and stores the mutual authentication password delivery encoding key (i24 in
At the same time, the server authentication unit 15 forms an inverse Digest and designates the SIP message forming unit 16 to form 401 response messages added with the inverse Digest and the presence/absence data of encoding of the mutual authentication password. The SIP message forming unit 16 forms 401 response messages added with the Challenge, the inverse Digest, and the presence/absence data of encoding of the mutual authentication password and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (i25 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 401 response messages added with the Challenge, the inverse Digest, and the presence/absence data of encoding of the mutual authentication password confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge, the inverse Digest, and the presence/absence data of encoding of the mutual authentication password, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data, notifies the server authentication unit 35 of the inverse Digest data, and notifies the encoding information setting unit 39 of the presence/absence data of encoding of the mutual authentication password.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (i34 in
The client authentication unit 34 designates the encoding information setting unit 39 to generate a mutual authentication password delivery encoding key used when a mutual authentication password is encoded and transmitted when a mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered. The encoding information setting unit 39 which is designated to generate the mutual authentication password delivery encoding key stores the presence/absence data of encoding of the mutual authentication password (i35 in
The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1d through the LAN 100 (i37 in
The SIP interface unit 13 of the server apparatus 1d which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (i26 in
The client authentication unit 14 designates a mutual authentication password forming unit 18 to form a mutual authentication password used in second and subsequent start-up states of the client apparatus 3b-1. The mutual authentication password forming unit 18 forms a random mutual authentication password, and notifies the client authentication unit 14 of the formed mutual authentication password. The client authentication unit 14 notifies the user name/password setting unit 11 of the mutual authentication password and designates the user name/password setting unit 11 to set the mutual authentication password. The user name/password setting unit 11 stores the mutual authentication password (i27 in
Furthermore, the client authentication unit 14 designates the mutual authentication password encoding unit 19 to encode the formed mutual authentication password. The mutual authentication password encoding unit 19 asks the encoding information setting unit 20 about an encoding rule and a mutual authentication password delivery encoding key, encodes the mutual authentication password formed by the mutual authentication password forming unit 18 by using the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 14 of the encoded mutual authentication password (i28 in
The client authentication unit 14 designates the SIP message forming unit 16 to form a 200 response message added with an encoded mutual authentication password (200 OK). The SIP message forming unit 16 transfers the formed 200 response message to the SIP interface unit 13. The SIP interface unit 13 transmits the 200 response message to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (i29 in
The client authentication unit 14 designates a user name/password setting unit 11 to make the one-time password invalid. The user name/password setting unit 11 designated to make the one-time password invalid makes the stored one-time password invalid (i30 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception and the encoded mutual authentication password.
The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3b-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1d (i50 in
The client authentication unit 34 designates the mutual authentication password decoding unit 38 to decode the received mutual authentication password. The mutual authentication password decoding unit 38 asks the encoding information setting unit 39 about an encoding rule and an authentication password delivery encoding key, decodes the mutual authentication password received from the server apparatus 1d by using the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 34 of the decoded mutual authentication password (i38 in
The client authentication unit 34 notifies the user name/password setting unit 31 of the decoded mutual authentication password and designates the user name/password setting unit 31 to set the mutual authentication password. The user name/password setting unit 31 designed to set the mutual authentication password stores the mutual authentication password (i39 in
Furthermore, the client authentication unit 34 designates the user name/password setting unit 31 to make the one-time password invalid. The user name/password setting unit 31 designated to make the one-time password invalid makes the stored one-time password invalid (i40 in
In this manner, in the embodiment, in addition to the effect in the eighth embodiment of the present invention, the function of selecting the presence/absence of encoding is given to make it possible to secure compatibility with the client apparatus 3b-1 which has no encoding function. Although the operations of client apparatuses 3b-2 and 3b-3 are not described above, the same effect as that obtained when the client apparatus 3b-1 is used can be obtained.
When a user name and a one-time password of the client apparatus 3b-1 and an encoding rule of a mutual authentication password are input from a local maintenance console 2 connected to the server apparatus 1d in advance (j11 in
The encoding information input interface unit 21 receives a setting request including the encoding rule data of the mutual authentication password. When the normality of the encoding rule data of the mutual authentication password can be confirmed, the encoding information input interface unit 21 communicates the encoding rule data of the mutual authentication password to the encoding information setting unit 20. The encoding information setting unit 20 stores the encoding rule data of the mutual authentication password (j22 in
When a server name of the server apparatus 1d and a user name and a one-time password of the client apparatus 3b-1 are input from the local maintenance console 4 connected to the client apparatus 3b-1 in advance (j41 in
After the server name, the user name, and the one-time password are set in the user name/password setting unit 31, when the client apparatus 3b-1 is started up, the server authentication unit 35 forms an inverse Challenge, designates the SIP message forming unit 36 to form a REGISTER message added with the inverse Challenge, and stores the inverse Challenge. The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1d through the LAN 100 (j33 in
The SIP interface unit 13 of the server apparatus 1d which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates a client authentication unit 14 to start authentication of the client apparatus 3b-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3b-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. The client authentication unit 14 designates the encoding information setting unit 20 to generate a mutual authentication password delivery encoding key used when the mutual authentication password is encoded and transmitted when the mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered. The encoding information setting unit 20 generates and stores the mutual authentication password delivery encoding key (j24 in
At the same time, the server authentication unit 15 forms an inverse Digest and designates the SIP message forming unit 16 to form 401 response messages added with the inverse Digest and the encoding rule data of the mutual authentication password. The SIP message forming unit 16 forms 401 response messages added with the Challenge, the inverse Digest, and the encoding rule data of the mutual authentication password and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (j24 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 401 response messages added with the Challenge, the inverse Digest, and the encoding rule data of the mutual authentication password confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge, the inverse Digest, and the encoding rule data of the mutual authentication password, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data, notifies the server authentication unit 35 of the inverse Digest data, and notifies an encoding information setting unit 39 of the mutual authentication password encoding rule data.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (j34 in
The client authentication unit 34 designates the encoding information setting unit 39 to generate a mutual authentication password delivery encoding key used when a mutual authentication password is encoded and transmitted when a mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered. The designated encoding information setting unit 39 stores the encoding rule data of the transmitted mutual authentication password (j36 in
The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1d through the LAN 100 (j37 in
The SIP interface unit 13 of the server apparatus 1d which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (j26 in
The client authentication unit 14 designates a mutual authentication password forming unit 18 to form a mutual authentication password used in second and subsequent start-up states of the client apparatus 3b-1. The mutual authentication password forming unit 18 forms a random mutual authentication password, and notifies the client authentication unit 14 of the formed mutual authentication password. The client authentication unit 14 notifies the user name/password setting unit 11 of the mutual authentication password and designates the user name/password setting unit 11 to set the mutual authentication password. The user name/password setting unit 11 stores the mutual authentication password (j27 in
Furthermore, the client authentication unit 14 designates the mutual authentication password encoding unit 19 to encode the formed mutual authentication password. The mutual authentication password encoding unit 19 asks the encoding information setting unit 20 about an encoding rule and a mutual authentication password delivery encoding key, encodes the mutual authentication password formed by using the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 14 of the encoded mutual authentication password (j28 in
The client authentication unit 14 designates the SIP message forming unit 16 to form a 200 response message added with an encoded mutual authentication password (200 OK). The SIP message forming unit 16 transfers the formed 200 response message to the SIP interface unit 13. The SIP interface unit 13 transmits the 200 response message to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (j29 in
The client authentication unit 14 designates a user name/password setting unit 11 to make the one-time password invalid. The user name/password setting unit 11 designated to make the one-time password invalid makes the stored one-time password invalid (j30 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception and the encoded mutual authentication password. The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3b-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1d.
The client authentication unit 34 designates the mutual authentication password decoding unit 38 to decode the received mutual authentication password. The mutual authentication password decoding unit 38 asks the encoding information setting unit 39 about an encoding rule and an authentication password delivery encoding key, decodes the mutual authentication password received by using the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 34 of the decoded mutual authentication password (j38 in
The client authentication unit 34 notifies the user name/password setting unit 31 of the decoded mutual authentication password and designates the user name/password setting unit 31 to set the mutual authentication password. The user name/password setting unit 31 designed to set the mutual authentication password stores the mutual authentication password (j39 in
In this manner, in the embodiment, in addition to the effect in the eighth embodiment of the present invention, the function of selecting the encoding rule is given to make it possible to use the latest encoding rule without requiring additional development of an interface for selecting an encoding rule when an operable encoding rule will be added in the future. The security can be reinforced. Although the operations of client apparatuses 3b-2 and 3b-3 are not described above, the same effect as that obtained when the client apparatus 3b-1 is used can be obtained.
When a user name and a one-time password of the client apparatus 3b-1, the presence/absence of encoding of a mutual authentication password, and an encoding rule of the mutual authentication password are input from a local maintenance console 2 connected to the server apparatus 1d in advance (k11 in
The encoding information input interface unit 21 receives a setting request including the presence/absence of encoding and the encoding rule data of the mutual authentication password. When the normality of the presence/absence of encoding and the encoding rule data of the mutual authentication password can be confirmed, the encoding information input interface unit 21 communicates the presence/absence of encoding and the encoding rule data of the mutual authentication password to the encoding information setting unit 20. The encoding information setting unit 20 stores the presence/absence of encoding and the encoding rule data of the mutual authentication password (k22 in
When a server name of the server apparatus 1d and a user name and a one-time password of the client apparatus 3b-1 are input from the local maintenance console 4 connected to the client apparatus 3b-1 in advance (k41 in
After the server name, the user name, and the one-time password are set in the user name/password setting unit 31, when the client apparatus 3b-1 is started up, the server authentication unit 35 forms an inverse Challenge, designates the SIP message forming unit 36 to form a REGISTER message added with the inverse Challenge, and stores the inverse Challenge. The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1d through the LAN 100 (k33 in
The SIP interface unit 13 of the server apparatus 1d which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates a client authentication unit 14 to start authentication of the client apparatus 3b-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3b-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. The client authentication unit 14 asks the encoding information setting unit 20 whether the mutual authentication password is encoded and transmitted when the mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered, and designates the encoding information setting unit 20 to generate a mutual authentication password delivery encoding key when the encoding is present. The encoding information setting unit 20 generates and stores the mutual authentication password delivery encoding key (k24 in
At the same time, the server authentication unit 15 forms an inverse Digest and designates the SIP message forming unit 16 to form 401 response messages added with the inverse Digest and the presence/absence of encoding and the encoding rule data of the mutual authentication password. The SIP message forming unit 16 forms 401 response messages added with the Challenge, the inverse Digest, and the presence/absence of encoding and the encoding rule data of the mutual authentication password and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (k25 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 401 response messages added with the Challenge, the inverse Digest, and the presence/absence of encoding and the encoding rule data of the mutual authentication password confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge, the inverse Digest, and the presence/absence of encoding and the encoding rule data of the mutual authentication password, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data, notifies the server authentication unit 35 of the inverse Digest data, and notifies an encoding information setting unit 39 of the presence/absence of encoding and the encoding rule data of the mutual authentication password.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (k34 in
The client authentication unit 34 designates the encoding information setting unit 39 to generate a mutual authentication password delivery encoding key used when a mutual authentication password is encoded and transmitted when a mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered. The designated encoding information setting unit 39 stores the presence/absence of encoding and the encoding rule data of the transmitted mutual authentication password (k35 in
The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1d through the LAN 100 (k37 in
The SIP interface unit 13 of the server apparatus 1d which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (k26 in
The client authentication unit 14 designates a mutual authentication password forming unit 18 to form a mutual authentication password used in second and subsequent start-up states of the client apparatus 3b-1. The mutual authentication password forming unit 18 forms a random mutual authentication password, and notifies the client authentication unit 14 of the formed mutual authentication password. The client authentication unit 14 notifies the user name/password setting unit 11 of the mutual authentication password and designates the user name/password setting unit 11 to set the mutual authentication password. The user name/password setting unit 11 stores the mutual authentication password (k27 in
Furthermore, the client authentication unit 14 designates the mutual authentication password encoding unit 19 to encode the formed mutual authentication password. The mutual authentication password encoding unit 19 asks the encoding information setting unit 20 about an encoding rule and a mutual authentication password delivery encoding key, encodes the mutual authentication password formed by the mutual authentication password forming unit 18 by using the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 14 of the encoded mutual authentication password (k28 in
The client authentication unit 14 designates the SIP message forming unit 16 to form a 200 response message added with an encoded mutual authentication password (200 OK). The SIP message forming unit 16 transfers the formed 200 response message to the SIP interface unit 13. The SIP interface unit 13 transmits the 200 response message to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (k29 in
The client authentication unit 14 designates a user name/password setting unit 11 to make the one-time password invalid. The user name/password setting unit 11 designated to make the one-time password invalid makes the stored one-time password invalid (k30 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception and the encoded mutual authentication password.
The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3b-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1d (k50 in
The client authentication unit 34 designates the mutual authentication password decoding unit 38 to decode the received mutual authentication password. The mutual authentication password decoding unit 38 asks the encoding information setting unit 39 about an encoding rule and an authentication password delivery encoding key, decodes the mutual authentication password received by using the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 34 of the decoded mutual authentication password (k38 in
The client authentication unit 34 notifies the user name/password setting unit 31 of the decoded mutual authentication password and designates the user name/password setting unit 31 to set the mutual authentication password. The user name/password setting unit 31 designed to set the mutual authentication password stores the mutual authentication password (k39 in
In this manner, in the embodiment, in addition to the effect in the eighth embodiment of the present invention, the function of selecting the presence/absence of encoding to make it possible to secure compatibility with the client apparatus 3b-1 which has no encoding function, and the function of selecting the encoding rule is given to make it possible to use the latest encoding rule without requiring additional development of an interface for selecting an encoding rule when an operable encoding rule will be added in the future. The security can be reinforced. Although the operations of client apparatuses 3b-2 and 3b-3 are not described above, the same effect as that obtained when the client apparatus 3b-1 is used can be obtained.
An SIP-protocol-coping client-server distributed system according to a twelfth embodiment of the present invention has the same configuration as that of the SIP-protocol-coping client-server distributed system according to the eighth embodiment of the present invention shown in
The operation of the client-server distributed system according to the twelfth embodiment of the present invention will be described below with reference to
When a user name and a one-time password of the client apparatus 3b-1 are input from a local maintenance console 2 connected to the server apparatus 1c in advance (h11 in
When a server name of the server apparatus 1c and a user name and a one-time password of the client apparatus 3b-1 are input from the local maintenance console 4 connected to the client apparatus 3b-1 in advance (h41 in
After the server name, the user name, and the one-time password are set in the user name/password setting unit 31, when the client apparatus 3b-1 is started up (h33 in
The SIP interface unit 13 of the server apparatus 1c which receives the REGISTER message added with the inverse Challenge confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the inverse Challenge, the SIP message analyzing unit 17 designates a client authentication unit 14 to start authentication of the client apparatus 3b-1 and notifies a server authentication unit 15 of the inverse Challenge data.
The client authentication unit 14 which is designated to start the authentication of the client apparatus 3b-1 forms a Challenge, designates an SIP message forming unit 16 to form a 401 response message (401 Unauthorized) added with the Challenge, and stores the Challenge. The client authentication unit 14 designates the encoding information setting unit 20 to generate a mutual authentication password delivery encoding key used when a mutual authentication password is encoded and transmitted when the mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered. The encoding information setting unit 20 generates and stores the mutual authentication password delivery encoding key (h23 in
At the same time, the server authentication unit 15 forms an inverse Digest and designates the SIP message forming unit 16 to form a 401 response message added with the inverse Digest. The SIP message forming unit 16 forms 401 response messages added with the Challenge and the inverse Digest and transfers the formed 401 response messages to the SIP interface unit 13. The SIP interface unit 13 transmits the 401 response messages to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (h24 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 401 response messages added with the Challenge and the inverse Digest confirms the normality of formats or the like of the 401 response messages. When the 401 response messages are normal, the SIP interface unit 33 transfers the 401 response messages to the SIP message analyzing unit 37. When the received messages are the 401 response messages added with the Challenge and the inverse Digest, the SIP message analyzing unit 37 notifies the client authentication unit 34 of the Challenge data and notifies the server authentication unit 35 of the inverse Digest data.
The server authentication unit 35 authenticates the received inverse Digest (server authentication) (h35 in
The client authentication unit 34 designates the encoding information setting unit 39 to generate a mutual authentication password delivery encoding key used when a mutual authentication password is encoded and transmitted when a mutual authentication password used in mutual authentication in the second and subsequent REGISTER states is delivered. The encoding information setting unit 39 generates and stores the mutual authentication password delivery encoding key (h36 in
The SIP message forming unit 36 transfers the formed REGISTER message to the SIP interface unit 33. The SIP interface unit 33 transmits the REGISTER message to the SIP interface unit 13 of the server apparatus 1c through the LAN 100 (h37 in
The SIP interface unit 13 of the server apparatus 1c which receives the REGISTER message added with the Digest confirms the normality of a format or the like of the REGISTER message. When the REGISTER message is normal, the SIP interface unit 13 transfers the REGISTER message to the SIP message analyzing unit 17. When the received message is the REGISTER message added with the Digest, the SIP message analyzing unit 17 notifies the client authentication unit 14 of the Digest data.
The client authentication unit 14 authenticates the received Digest (client authentication) (h25 in
The client authentication unit 14 designates a mutual authentication password forming unit 18 to form a mutual authentication password used in second and subsequent start-up states of the client apparatus 3b-1. The mutual authentication password forming unit 18 forms a random mutual authentication password, and notifies the client authentication unit 14 of the formed mutual authentication password. The client authentication unit 14 notifies the user name/password setting unit 11 of the mutual authentication password and designates the user name/password setting unit 11 to set the mutual authentication password. The user name/password setting unit 11 stores the mutual authentication password (h26 in
The client authentication unit 14 designates the mutual authentication password encoding unit 19 to encode the formed mutual authentication password. The mutual authentication password encoding unit 19 asks the encoding information setting unit 20 about an encoding rule and a mutual authentication password delivery encoding key, encodes the formed mutual authentication password by the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 14 of the encoded mutual authentication password (h27 in
The client authentication unit 14 designates the SIP message forming unit 16 to form a 200 response message added with an encoded mutual authentication password (200 OK). The SIP message forming unit 16 transfers the formed 200 response message to the SIP interface unit 13. The SIP interface unit 13 transmits the 200 response message to the SIP interface unit 33 of the client apparatus 3b-1 through the LAN 100 (h28 in
The client authentication unit 14 designates a user name/password setting unit 11 to make the one-time password invalid. The user name/password setting unit 11 designated to make the one-time password invalid makes the stored one-time password invalid (h30 in
The SIP interface unit 33 of the client apparatus 3b-1 which receives the 200 response message confirms the normality of a format or the like of the 200 response message. When the 200 response message is normal, the SIP interface unit 33 transfers the 200 response message to the SIP message analyzing unit 37. When the message received by the SIP message analyzing unit 37 is the 200 response message, the SIP message analyzing unit 37 notifies the client authentication unit 34 of client authentication achievement response reception and the encoded mutual authentication password.
The client authentication unit 34 recognizes client authentication achievement in response to the client authentication achievement response reception notification and starts an operation of the client apparatus 3b-1 in the SIP-protocol-coping client-server distributed system including the server apparatus 1 (h29 in
The client authentication unit 34 designates the mutual authentication password decoding unit 38 to decode the received mutual authentication password. The mutual authentication password decoding unit 38 asks the encoding information setting unit 39 about an encoding rule and an authentication password delivery encoding key, decodes the mutual authentication password received by the SIP interface unit 33 by the read encoding rule and the read mutual authentication password delivery encoding key, and notifies the client authentication unit 34 of the decoded mutual authentication password (h38 in
The client authentication unit 34 notifies the user name/password setting unit 31 of the decoded mutual authentication password and designates the user name/password setting unit 31 to set the mutual authentication password. The user name/password setting unit 31 designed to set the mutual authentication password stores the mutual authentication password (h39 in
In this manner, in the embodiment, in addition to the effect in the sixth embodiment of the present invention, since the procedures of generating a pair of mutual authentication passwords for the client apparatus 3b-1 and the server apparatus 1d are used not to deliver the mutual authentication password delivery encoding keys through a network, encoding key security in encoding of the mutual authentication passwords can be reinforced. Although the operations of client apparatuses 3b-2, 3b-3 are not described above, the same effect as that obtained when the client apparatus 3b-1 is used can be obtained.
The sever apparatus 1e holds mutual authentication states of the client apparatuses 3c-1 to 3c-3 in a REGISTER state in a client authentication unit 14. The client apparatuses 3c-1 to 3c-3 hold a mutual authentication state of the sever apparatus 1e in a REGISTER state in a client authentication unit 34.
In the embodiment, when the above configuration is realized, communication between the sever apparatus 1e and the client apparatuses 3c-1 to 3c-3 can be monitored from the sever apparatus 1e, and mutual authentication between the client and the server in a REGISTER state can be repeated when communication between is interrupted for a predetermined period of time or longer.
When mutual authentication between the sever apparatus 1e and the client apparatus 3c-1 in a REGISTER state between the apparatuses is achieved and completed, a health check command is transmitted from the sever apparatus 1e to the client apparatus 3c-1 at predetermined time intervals. In response to this, a health check response command is transmitted from the client apparatus 3c-1 to monitor client-server communication coping with an SIP protocol.
When mutual authentication between the sever apparatus 1e and the client apparatus 3c-1 in a REGISTER state is achieved and completed (m1 in
Similarly, when the mutual authentication between the sever apparatus 1e and the client apparatus 3c-1 in the REGISTER state is achieved and completed, the client authentication unit 14 of the sever apparatus 1e designates the server-client communication monitoring unit 22 to start monitor of client-server communication. The server-client communication monitoring unit 22 designates an SIP message forming unit 16 to form a NOTIFY (method of returning present state information) message added with health check data. The SIP message forming unit 16 transfers the formed NOTIFY message to the SIP interface unit 13. The SIP interface unit 13 transmits the REGISTER message to an SIP interface unit 33 of the client apparatus 3c-1 through a LAN 100 (m11 in
The SIP interface unit 33 of the client apparatus 3c-1 which receives the NOTIFY message added with the health check data confirms normality of a format or the like of the NOTIFY message. When the NOTIFY message is normal, the SIP interface unit 33 transfers the NOTIFY message to the SIP message analyzing unit 37. The received message is a NOTIFY message added with health check data, the SIP message analyzing unit 37 notifies the server-client communication monitoring unit 40 of the health check data.
The server-client communication monitoring unit 40 forms health check response data, and designates the SIP message forming unit 36 to form a NOTIFY message added with the health check response data. The SIP message forming unit 36 transfers the formed NOTIFY message to the SIP interface unit 33. The SIP interface unit 33 transfers the NOTIFY message to the SIP interface unit 13 of the sever apparatus 1e through the LAN 100 (m23 in
The SIP interface unit 13 of the sever apparatus 1e which receives the NOTIFY message added with the health check response data confirms the normality of a format or the like of the NOTIFY message. When the NOTIFY message is normal, the SIP interface unit 13 transfers the NOTIFY message to the SIP message analyzing unit 17. When the received message is the NOTIFY message added with the health check response data, the SIP message analyzing unit 17 notifies the server-client communication monitoring unit 22 of the health check response data.
The server-client communication monitoring unit 22 resets the timer for waiting for the health check response reception timer to start a timer for waiting for health check response reception from the client apparatus 3c-1 (m14 in
In this case, when it is recognized by the server-client communication monitoring unit 40 of the client apparatus 3c-1 that the next health check wait time runs out, the server-client communication monitoring unit 40 notifies the client authentication unit 34 of execution of reauthentication, and the client authentication unit 34 changes a mutual authentication state between the client apparatus 3c-1 and the sever apparatus 1e in a REGISTER state into incompletion of authentication. Subsequently, client-server communication including call control is made impossible until reauthentication achievement is completed. The server-client communication monitoring unit 40 requests the server authentication unit 35 to execute reauthentication, and mutual authentication between the SIP-protocol-coping client apparatus and the SIP-protocol-coping server apparatus in a REGISTER state is reexecuted (m26 in
In the thirteenth embodiment of the present invention, since a reexecuting operation of mutual authentication between an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus in a REGISTER state (m15 to m18 and m27 to m31 in
In this manner, in this embodiment, in addition to the effect in the seventh embodiment of the present invention, the following effect can be obtained. That is, when it is determined that SIP-protocol-coping client-server apparatus communication is interrupted, since communication between the client apparatus 3c-1 and the sever apparatus 1e is made impossible until mutual authentication in a REGISTER state is achieved and completed, security against spoofing or the like can be reinforced. Although the operations of client apparatuses 3c-2 and 3c-3 are not described above, the same effect as that obtained when the client apparatus 3c-1 is used can be obtained.
In the embodiment, when mutual authentication between the sever apparatus 1e and the client apparatus 3c-1 in a REGISTER state is achieved and completed, a health check command is transmitted from the sever apparatus 1e to the client apparatus 3c-1 at predetermined time intervals. In response to this, a health check response command is transmitted from the client apparatus 3c-1 to monitor client-server communication coping with an SIP protocol. Since an operation of monitoring SIP-protocol-coping client-server communication (n11 to n14 and n21 to n23 in
In this case, when it is recognized by the server-client communication monitoring unit 22 of the sever apparatus 1e that health check response wait time runs out, the server-client communication monitoring unit 22 requests the client authentication unit 14 to execute reauthentication, and the client authentication unit 14 changes a mutual authentication state between the sever apparatus 1e and the client apparatus 3c-1 in a REGISTER state into incompletion of authentication and designates the SIP message forming unit 16 to form a NOTIFY message added with a reset request. The SIP message forming unit 16 transfers the formed NOTIFY message to the SIP interface unit 13. The SIP interface unit 13 transmits the NOTIFY message to the SIP interface unit 33 of the SIP-protocol-coping client apparatus 3c-1 through a LAN 100 (n15 and n16 in
In this manner, in the embodiment, mutual authentication between an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus in a REGISTER state is reexecuted. In the embodiment, a reexecuting operation of mutual authentication between an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus in a REGISTER state (n17 to n20, n24 to n28, and n2) is the same as the operation in the seventh embodiment of the present invention, a description thereof will be omitted.
In this manner, in the embodiment, in addition to the effect in the seventh embodiment of the present invention, the following effect can be obtained. That is, when it is determined that SIP-protocol-coping client-server apparatus communication is interrupted, since communication between the client apparatus 3c-1 and the sever apparatus 1e is made impossible until mutual authentication in a REGISTER state is achieved and completed again, security against spoofing or the like can be reinforced. Although the operations of client apparatuses 3c-2 and 3c-3 are not described above, the same effect as that obtained when the client apparatus 3c-1 is used can be obtained.
The server apparatus 1f holds mutual authentication states of the client apparatuses 3d-1 to 3d-3 in a REGISTER state in a client authentication unit 14. The client apparatuses 3d-1 to 3d-3 hold a mutual authentication state between the client apparatuses 3d-1 to 3d-3 and the sever apparatus 1f in a REGISTER state in a client authentication unit 34.
In the embodiment, the above configuration is realized to make it possible to repeat mutual authentication between the server apparatus 1f and the client apparatuses 3d-1 to 3d-3 in a REGISTER state.
When mutual authentication between the sever apparatus 1f and the client apparatus 3d-1 in a REGISTER state is achieved and completed o1 in
When time of the timer for waiting for the periodical REGISTER stat mutual authentication runs out, the client authentication unit 34 gives notice of execution of reauthentication to reset the periodical authentication waiting timer, and a REGISTER state mutual authentication state with the server apparatus 1f is changed during execution of periodical authentication (o22 in
The client authentication unit 34 requests the server authentication unit 35 to execute reauthentication, and mutual authentication between the SIP-protocol-coping client apparatus and the SIP-protocol-coping server apparatus in a REGISTER state is executed (o11 to o14, o23 to o27, and 02 in
When the periodical REGISTER state mutual authentication is not achieved, the client authentication unit 34 changes the REGISTER state mutual authentication state between the client apparatus 3d-1 and the server apparatus 1f into incompletion of authentication and executes the REGISTER state mutual authentication. Subsequently, client-server communication including call control is impossible until reauthentication achievement is completed.
In this manner, in the embodiment, in addition to the effect in the seventh embodiment of the present invention, the following effect can be obtained. That is, mutual authentication between an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus is periodically reexecuted to prevent the same authentication state from being held for a long period of time, so that a spoofed client apparatus is prevented from being permitted to perform communication. In addition, in failure of periodical authentication, client-server communication is made impossible until REGISTER state mutual authentication is achieved and completed again. For this reason, security against spoofing or the like can be reinforced.
As described above, in the present invention, in an SIP-protocol-coping client-server distributed system, not only related client authentication from a server apparatus to a client apparatus but also server authentication from the client apparatus to the server apparatus are performed to realize bidirectional authentication, and completion of authentication is recognized by achievement of the bidirectional authentication. An operation of the client apparatus and communication between an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus are made possible, security against spoofing of a server apparatus can be reinforced.
In the present invention, a scheme which reversely defines client authentication is used as a server authentication scheme to make it possible to constitute a client authentication unit and a server authentication unit by a common architecture, and efficiency of apparatus development can be improved.
In the present invention, a one-time password is used as an authentication password manually input by a holder, and the one-time password is made invalid after mutual authentication in a REGISTER state is completed. For this reason, the one-time password can be prevented from artificially flowing out, and security in the SIP-protocol-coping client-server distributed system can be reinforced.
Furthermore, in the present invention, mutual authentication passwords used in second and subsequent authentications between an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus are automatically generated by the server apparatus and delivered to the client apparatus to prevent an erroneous input or a one-time password from artificially flowing out when a password is externally input by a holder, and a password which cannot be presumed can be used by forming a random password. For this reason, security in an SIP-protocol-coping client-server distributed system can be reinforced.
In this case, in the present invention, an authentication password which is manually input by a holder is used as a one-time password, and the password is made invalid after mutual authentication in a REGISTER state is completed to prevent the password from artificially flowing out. Security in the SIP-protocol-coping client-server distributed system can be reinforced.
In the present invention, when a mutual authentication password is delivered from a server apparatus to a client apparatus, encoding of the mutual authentication password is made possible, so that security against leakage of data in notification of a password, intentional hacking, or the like can be reinforced.
In the present invention, as a condition for encoding and delivering a mutual authentication password from a server apparatus to a client apparatus, the presence/absence of encoding and an encoding rule can be externally input from a maintenance console. For this reason, compatibility with the client apparatus which has no encoding function can be secured by a function of selecting the presence/absence of encoding, and the latest encoding rule can be used without additionally developing an interface for selecting an encoding rule when an operable encoding rule will be added in the future. Therefore, security can be reinforced.
Furthermore, in the present invention, a procedure of generating a pair of mutual authentication password delivery encoding keys for an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus is given when a mutual authentication password is encoded and delivered from the server apparatus to the client apparatus, so that the mutual authentication password delivery encoding key is not delivered through a network. For this reason, security of the encoding key in encoding of a mutual authentication password can be reinforced.
In the present invention, when it is determined that communication between an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus is interrupted, the client-server communication is made impossible until mutual authentication in a REGISTER state is achieved and completed again. For this reason, security against spoofing or the like can be reinforced.
In the present invention, mutual authentication between an SIP-protocol-coping client apparatus and an SIP-protocol-coping server apparatus in a REGISTER state is periodically reexecuted to prevent the same authentication state from being held for a long period of time, so that a spoofed client apparatus is prevented from being permitted to perform communication. In addition, in failure of periodical authentication, client-server communication is made impossible until REGISTER state mutual authentication is achieved and completed again. For this reason, security against spoofing or the like can be reinforced.
The client apparatus performs a REGISTER operation to the dishonest server apparatus B (false) on the basis of the server apparatus of the dishonest server apparatus B (false) (p5 to p8 in
In the present invention, a user name and a password for authentication between the server apparatus and the client apparatus are set in the server apparatus A (true) in advance (q1 in
Therefore, in the present invention, since the mutual authentication between the dishonest server apparatus B (false) and the client apparatus is not achieved, the client apparatus does not start an operation under the control of the dishonest server apparatus B (false) (q11 in
Although the exemplary embodiments of the present invention have been described in detail, it should be understood that various changes, substitutions and alternatives can be made therein without departing from the sprit and scope of the invention as defined by the appended claims. Further, it is the inventor's intent to retain all equivalents of the claimed invention even if the claims are amended during prosecution.
Number | Date | Country | Kind |
---|---|---|---|
2006-206688 | Jul 2006 | JP | national |