This application is based on and claims priority under 35 USC 119 from Japanese Patent Application No. 2012-251286 filed Nov. 15, 2012.
The present invention relates to a communication apparatus, a communication method, and a computer readable medium.
According to an aspect of the invention, there is provided a communication apparatus including plural communication interfaces, an associating section, and a transmitting section. The associating section associates issued certificate information with one of the plural communication interfaces. The transmitting section transmits the certificate information from the communication interface with which the certificate information is associated. The associating section includes an identification information acquiring unit and a determining unit. The identification information acquiring unit acquires identification information in a network of each of the plural communication interfaces. The determining unit determines a communication interface to be associated, in accordance with the identification information acquired by the identification information acquiring unit.
Exemplary embodiment of the present invention will be described in detail based on the following figures, wherein:
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the drawings.
The image forming apparatus 2 also includes a hard disk 2c. Various data are stored in the hard disk 2c. Three (public-key) certificates issued by a certificate authority, that is, a certificate A, a certificate B, and a certificate C, are stored in the hard disk 2c. These certificates are imported and stored in the hard disk 2c.
Other information stored in the hard disk 2c will be described later.
The image forming apparatus 2 also includes a paper feeding unit 2d and an image forming unit 2e. The paper feeding unit 2d feeds printing paper stored in a paper storing unit, which is not illustrated, to the image forming unit 2e, in accordance with an instruction by the controller 2a. The image forming unit 2e is, for example, a laser printer. The image forming unit 2e prints images on printing paper fed by the paper feeding unit 2d, in accordance with an instruction from the controller 2a. The image forming apparatus 2 also includes a display that outputs information supplied from the controller 2a, an operation input unit (for example, a touch panel and various buttons) that supplies an operation signal representing the details of an operation performed by a user to the controller 2a, and the like.
Furthermore, as illustrated in
The second network IF 2g is a communication interface for connecting the image forming apparatus 2 to a second network, which is connected to the Internet via firewall, which is not illustrated, and is represented by an IP address “192.168.1.1/24”. A user terminal 4 of a user is also connected to the second network.
The third network IF 2i is a communication interface for peer-to-peer connecting the image forming apparatus 2 to a user terminal 4 of a user using wireless communication, such as Bluetooth (registered trademark) communication, WiFi-Direct communication, or the like.
In this exemplary embodiment, an IF management table illustrated in
In the IF management table, history information relating to history of communication performed by the individual network interfaces is also stored. The history information will be described later.
With the use of the user terminal 4 owned by a user, the user transmits a request for execution of printing or a request for execution of scanning to the image forming apparatus 2 and uses a web service provided by the image forming apparatus 2. The user sets the value of an operation setting parameter for the image forming apparatus 2, for example, using the web service.
Here, at the time of communication, in terms of security, such as prevention of information leakage, detection of spoofing, and the like, a certificate is exchanged between the image forming apparatus 2 and each of the user terminals 4. That is, at the time of transmission of data from the user terminal 4 to the image forming apparatus 2, a certificate is transmitted. In addition, at the time of transmission of data from the image forming apparatus 2 to the user terminal 4, a certificate is transmitted. For example, upon request for execution of printing or execution of scanning, a certificate is transmitted from the user terminal 4. Authentication for the user is performed on the basis of the certificate, and a determination of permission or prohibition of connection, acquisition of authority information from the above-mentioned account management server, and the like are performed. Furthermore, for example, at the time of using a web service, a certificate is transmitted from the user terminal 4, and certification or encryption communication based on the certificate is performed. In order to perform detection of spoofing and data encryption, IPsec communication using a certificate is performed between the user terminal 4 and the image forming apparatus 2 that are connected to the second network. Furthermore, communication using a certificate is performed between the user terminal 4 and the image forming apparatus 2 that are peer-to-peer connected to each other.
As described above, the image forming apparatus 2 transmits and receives certificates. Since the image forming apparatus 2 includes plural communication interfaces (here, three communication interfaces, that is, the first network IF 2f, the second network IF 2g, and the third network IF 2i), certificates to be used (to be transmitted) by the individual communication interfaces need to be properly set.
The image forming apparatus 2 performs a process exemplified by a flowchart of
First, the controller 2a identifies, from among the first network IF 2f, the second network IF 2g, and the third network IF 2i, a communication interface for which no certificate is set (S101). In this exemplary embodiment, a certificate management table illustrated in
Then, the controller 2a (an identification information acquiring unit, a comparing part) reads the IP address (identification information) of the communication interface identified in S101, and determines whether or not the IP address is the same as the IP address of an owner described in a target certificate. Accordingly, the controller 2a determines whether or not a communication interface having the same IP address as the owner's IP address exists (S102). In the case where the owner's IP address is not described in the target certificate, the processing of S102 is skipped.
In the case where a communication interface having the same IP address as the owner's IP address exists (YES in S102), the controller 2a (an associating section, a determining unit) sets the target certificate for the communication interface having the same IP address as the owner's IP address (S107). More specifically, in the certificate management table (see
In the case where no communication interface having the same IP address as the owner's IP address exists (NO in S102), the controller 2a (the identification information acquiring unit) reads the DNS name (identification information) of the communication interface identified in S101 from the IF management table. Then, the controller 2a (the comparing part) determines whether or not the DNS name is the same as the DNS name of the owner described in the target certificate. Accordingly, it is determined whether or not a communication interface having the same DNS name as the owner's DNS name exists (S103). In the case where no owner's DNS name is described in the target certificate, the processing of S103 is skipped.
In the case where a communication interface having the same DNS name as the owner's DNS name exists (YES in S103), the controller 2a performs processing of S107, in which the target certificate is set for the communication interface having the same DNS name as the owner's DNS name. In the case where no communication interface having the same DNS name as the owner's DNS name exists (NO in S103), the controller 2a (the comparing part) determines whether or not the domain name of an issuer described in the target certificate is the same as the address band of the IP address of the communication interface identified in S101. Accordingly, the controller 2a determines whether or not a communication interface having the same address band as the issuer's domain name exists (S104). In the case where no issuer's DNS name is described in the target certificate, the processing of S104 is skipped.
In the case where a communication interface having the same address band as the issuer's domain name exists (YES in S104), the controller 2a performs the processing of S107, in which the target certificate is set for the communication interface having the same address band as the issuer's domain name. In the case where no communication interface having the same address band as the issuer's domain name exists (NO in S104), the controller 2a (an acquiring unit) acquires, from the IF management table, history information on the history of communication performed by the communication interface identified in S101. In this exemplary embodiment, a certificate that a communication interface has received from the user terminal 4 is stored as history information in the IF management table. The controller 2a (a comparing part) determines whether or not a root certificate authority represented by certification path information in the history information is the same as a root certificate authority represented by certification path information in the target certificate. Accordingly, the controller 2a determines whether or not a communication interface that has received a certificate in which the same root certificate authority as the root certificate authority described in the target certificate is described exists (S105). Here, the controller 2a may determine in S105 whether or not a communication interface that has received a certificate in which the same intermediate certificate authority as the intermediate certificate authority described in the target certificate is described exists.
In the case where a communication interface that has never received a certificate from the user terminal 4 (hereinafter, noted as a non-reception interface) exists, that is, in the case where history information on a communication interface is not stored in the IF management table, the processing of S105 is skipped.
In the case where a communication interface that has received a certificate in which the same root certificate authority as the root certificate authority described in the target certificate is described exists (YES in S105), the controller 2a performs the processing of S107, in which the target certificate is set for the communication interface that has received the certificate in which the same root certificate authority as the root certificate authority described in the target certificate is described. In the case where no communication interface that has received a certificate in which the same root certificate authority as the root certificate authority described in the target certificate is described exists (NO in S105), the controller 2a performs specific processing for determining whether or not a communication interface to be suggested as a communication interface for which the target certificate is to be set (hereinafter, noted as a suggestion target interface) is capable of being guessed (S106). Then, the controller 2a performs outputting in accordance with a determination result.
That is, in the case where a suggestion target interface is capable of being guessed (YES in S106), the controller 2a displays on the display a suggestion screen for suggesting that the target certificate should be set for the suggestion target interface, by being triggered by execution of a so-called Push-system operation (an operation for causing the image forming apparatus 2 to transmit data) (S106a). In this case, an administrator of the image forming apparatus 2 manually sets the target certificate for the suggestion target interface.
In the case where a suggestion target interface is not capable of being guessed (NO in S106), the controller 2a displays on the display an inquiry screen for allowing the administrator of the image forming apparatus 2 to make an inquiry on a communication interface for which the target certificate is to be set, by being triggered by execution of a Push-system operation (S106b). In this case, the administrator of the image forming apparatus 2 sets the target certificate for a designated communication interface.
Accordingly, a certificate to be used by each communication interface is set.
The invention is not limited to the exemplary embodiment described above.
For example, in the case where the above-mentioned non-reception interface exists and the processing of S105 is skipped, when a suggestion target interface is not capable of being guessed (NO in S106), the processing of S105 and S106 may be performed again after a specific period of time has passed. This is because the non-reception interface may receive a certificate from the user terminal 4 in the near future. However, in the case where the above-mentioned Push-system operation is performed before the specific period of time has passed, the processing of S105 and S106 is not performed again. Instead, the inquiry screen is displayed.
Furthermore, the present invention is applicable to any computer including plural communication interfaces as well as to an image forming apparatus.
The foregoing description of the exemplary embodiments of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations will be apparent to practitioners skilled in the art. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, thereby enabling others skilled in the art to understand the invention for various embodiments and with the various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the following claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2012-251286 | Nov 2012 | JP | national |