This application is based upon and claims the benefit of the priority of Japanese patent application No. 2011-115104, filed on May 23, 2011, the disclosure of which is incorporated herein in its entirety by reference thereto. This invention relates to a communication system, a communication device, a quarantine method, and a computer program, and in particular to a communication system, a control device, a communication method, and a computer program for performing access control by controlling a forwarding node.
Recently, many companies have been introducing quarantine systems for in-company networks. A quarantine system is a mechanism by which a computer that is trying to connect to an in-company network is temporarily connected to a test network, a check for infection by computer viruses or a security check of software installed in the computer is performed, and confirmation is made that there is no problem, before allowing connection to the in-company network. In establishing the quarantine system, in general a method is used where a combination is made with a user authentication device or terminal authentication device, and a computer is connected to the in-company network and test network in accordance with the outcome of the authentication. Furthermore, a VLAN (Virtual Local Area Network) is often used for distinguishing between an in-company network and a test network. A VLAN relates to technology for building a logical network that does not depend on the physical structure of the network.
Cited Publication 1 discloses a network connection control system in which, when a computer tries to connect to a network, resource information of the computer is collected and a check is made as to whether or not a policy for connecting to the network is satisfied, before allowing only a computer that satisfies the policy to connect to the network.
Furthermore, Cited Publication 2 discloses a system inside a private network that includes a plurality of registered company networks, and is provided with processing nodes configured so that only allowed inbound messages (inbound messages transmitted by one or more authenticated message forwarding nodes) are transmitted to a registered company network, and a control node configured so as to maintain registration of a plurality of message forwarding nodes related to a company network.
In recent years, technology known as OpenFlow has been proposed (refer to PLT 3, and NPLs 1 and 2). In OpenFlow, communication is treated as end-to-end flow, and path control, recovery from failure, load balancing, and optimization are performed in flow units. An OpenFlow switch as specified in NPL 2 is provided with a secure channel for communication with an OpenFlow controller positioned as a control device, and operates according to a flow table in which appropriate addition or rewriting is instructed by the OpenFlow controller. In the flow table are definitions of sets of matching rules (Header fields) for collation with packet headers, flow statistical information (Counters), and actions (Actions) defining processing content, for each flow (refer to
For example, when an OpenFlow switch receives a packet, an entry is searched for that has a matching rule (refer to header field in
The entire disclosures of the abovementioned PLTs 1, 2 and 3 and NPLs 1 and 2 are incorporated herein by reference thereto. In a network connection control system of PLT1, however, there is a problem in that a user who is using a computer cannot connect at all to a network until checking of resource information of the computer is completed, or, in a case where it is once judged that a network connection condition is not satisfied, there is a problem in that a cut-off state is maintained. Furthermore, the system of PLT2 also merely performs filtering or similar with regard to messages such as electronic mail based on a filtering policy defined in a policy for each user, and does not disclose a mechanism for performing access restriction based on a quarantine result or the like.
PLT3 and NPLs 1 and 2 also do not describe performing quarantine processing, or, based on a result thereof, performing control to isolate a certain flow.
It is an object thereof to provide a communication system, a control device, a quarantine method, and a program, for performing stepwise access control using isolation levels indicating a user accessible range or a user non-accessible range.
According to a first aspect of the present invention there is provided a communication system, comprising: an information acquisition unit that acquires information for determining an isolation level to which a user terminal belongs, from the user terminal; an isolation level determination unit that determines an isolation level to which the user terminal belongs, based on the acquired information; an isolation level information storage unit that defines whether or not access is possible to respective access destinations for each isolation level; an access control unit that causes a forwarding node(s) to implement forwarding or dropping of a packet, in accordance with whether or not access is possible to the respective access destinations; and a forwarding node(s) that forwards a packet in accordance with control of the access control unit.
According to a second aspect of the present invention there is provided a control device, adapted to be disposed in a communication system including an information acquisition unit that acquires information for determining an isolation level to which a user terminal belongs, from the user terminal, and a forwarding node that forwards a packet in accordance with control of the control device, the control device comprising: an isolation level determination unit that determines an isolation level to which the user terminal belongs, based on information acquired in the information acquisition unit; an isolation level information storage unit that defines whether or not access is possible to respective access destinations for each of the isolation levels; and an access control unit that causes a forwarding node(s) to implement forwarding or dropping of a packet, in accordance with whether or not access is possible to the respective access destinations.
According to a third aspect of the present invention there is provided a communication method, comprising: a step of acquiring information for determining an isolation level to which a user terminal belongs, from the user terminal; a step of determining an isolation level to which the user terminal belongs, based on the acquired information; and a step of referring to isolation level information defining whether or not access is possible to respective access destinations, for each of the isolation levels, and causing a forwarding node(s) to implement forwarding or dropping of a packet, in accordance with whether or not access is possible to the respective access destinations. The present method is linked with a specific apparatus, known as a control device that controls the forwarding node.
According to a fourth aspect of the present invention there is provided a computer program that executes in a computer disposed in a communication system including an information acquisition unit that acquires information for determining an isolation level to which a user terminal belongs, from the user terminal, and a forwarding node(s) that forwards a packet in accordance with control of a control device: the program executing a process of determining an isolation level to which the user terminal belongs, based on the information acquired in the information acquisition unit; and a process of referring to isolation level information defining whether or not access is possible to respective access destinations, for each of the isolation levels, and causing a forwarding node(s) to implement forwarding or dropping of a packet, in accordance with whether or not access is possible to the respective access destinations. It is to be noted that that this program can be recorded on a computer-readable storage medium which may be non-transient. That is, the present invention can be embodied as a computer program product.
According to the present invention it is possible to realize stepwise access control using isolation levels.
First a description is given of an outline of an exemplary embodiment of the present invention, making reference to the drawings. As shown in
More specifically, the user terminal 100 is provided with an information acquisition unit 110a that acquires information for determining an isolation level to which the user terminal belongs, and transmits information to the control device 400. It is to be noted that in the example in
Furthermore, the control device 400 is configured to include an isolation level determination unit 410 that determines an isolation level to which the user terminal belongs, based on information transmitted from the information acquisition unit 110a, an isolation level information storage unit 420 that defines whether or not access is possible to respective access destinations for each isolation level, and an access control unit 430 that causes a forwarding node to implement forwarding or dropping of a packet in accordance with whether or not access is possible to the respective access destinations as determined by the isolation level information storage unit 420.
The information acquisition unit 110a of the user terminal 100 executes a process of acquiring information for determining the isolation level to which the user terminal belongs, at prescribed timing such as when a connection is made to a network or the like, and notifies a result thereof to the control device 400 ((1) isolation level determination information in
The control device 400 determines the isolation level to which (a user of) the user terminal 100 belongs, based on the information. Furthermore, the control device 400 reads information (refer to
By arranging as above, it is possible to perform stepwise access control based on the isolation level. For example, at a certain point in time, in the user terminal 100 which has been denied access due to not satisfying a condition required by an access destination, uninstalling an application program (referred to below as “application”), applying the latest patch to the application, updating a virus definition file, scanning of a system by a virus definition file and the like are implemented. In this way, in a case where a condition required by the access destination becomes is by the user terminal in question, it is possible to change the isolation level and to allow access to the access destination thereafter. Conversely, for example, at a certain point in time, in a case where the user terminal 100 that is allowed access to a certain access destination no longer satisfies a condition required by the access destination, it is possible to change the isolation level in the control device 400 and to deny access to the access destination thereafter.
In addition, the isolation level determined in this way can also be used as information for determining whether or not access is possible between users, as shown in
Next, a detailed description is given concerning a first exemplary embodiment of the present invention, making reference to the drawings.
The forwarding nodes 201 to 204 are switching devices for processing a received packet in accordance with a processing rule that associates a matching rule matching the received packet and processing content to be applied to the packet that conforms to the matching rule. OpenFlow switches of NPL 2, which operate a flow entry shown in
Furthermore, network resources 500A and 500B are connected to the forwarding node 204 and a user terminal 100 can communicate with the network resources 500A and 500B via the forwarding nodes 201 to 204. In the following exemplary embodiment, the network resource 500A and the network resource 500B each belong to different resource groups, and resource_group—0001 and resource_group—0002 are assigned as respective resource group IDs.
The authentication device 330 is an authentication server or the like, for performing a user authentication procedure with the user terminal 100, using a password or biometric authentication information. The authentication device 330 transmits authentication information indicating a result of the user authentication procedure with the user terminal 100 to the policy management device 300. Furthermore, in a case of success in authentication of the user terminal in a result of the authentication procedure with the user terminal 100, the authentication device 330 instructs the user terminal 100 to execute quarantine processing of this user terminal.
It is to be noted that the authentication information is not limited to the example in
The policy management device 300 is connected to a communication policy storage unit 310 and a resource information storage unit 320, and is a device for determining a communication policy corresponding to authentication information received from the authentication device 330 to be transmitted to the control device 400.
Referring to the communication policy information and the resource information as described above, the policy management device 300 determines a communication policy for a user who has received authentication by the authentication device 330, and gives notification to the control device 400. For example, by a role ID included in authentication information received from the authentication device 330, it is possible to specify a resource group ID attached to the role ID in question and the content of access rights thereof, from the policy information in
A quarantine agent unit 110 of the user terminal 100 corresponds to the information acquisition unit 110a described above, and when an instruction to execute a quarantine process is received from the authentication device 330, the quarantine agent unit 110 executes the quarantine process for the user terminal 100 and transmits a result of the processing content to an isolation level determination unit 410 of the control device 400. The quarantine process of the quarantine agent unit 110 may be, for example, version confirmation of the operating system (OS) or of a virus definition file for anti-virus software, an installation state of an application, an application state of a patch for the OS or application, or a system scan history using a virus definition file, or the like. The quarantine process may be the same as processing content implemented by an already present quarantine system or software, or other new processing content may be added.
In the present exemplary embodiment, the quarantine agent unit 110 is assumed to be installed in the user terminal, but it is also possible to provide the quarantine agent unit 110 externally to the user terminal as a quarantine agent device or quarantine server. In this case, with respect to the authentication device 330, the quarantine agent device or the quarantine server or the user terminal 110 that receives a request from these transmits a result of the processing content to the isolation level determination unit 410 of the control device 400.
The control device 400 is a device that uses the above described type of communication policy transmitted from the policy management device 300 and a result of quarantine processing received from the quarantine agent unit 110 of the user terminal 100, to determine a network resource that can be accessed from the user terminal 100, and to control the forwarding nodes 201 to 204 so that a packet transmitted from the user terminal 100 reaches the network resource.
The control message processing unit 12 analyzes a control message received from a forwarding node and delivers control message information to a relevant processing means inside the control device 400.
The processing rule management unit 13 manages how the processing rule is set and in which forwarding node. Specifically, a processing rule created by the path-action calculation unit 16 is registered in the processing rule storage unit 14 and set in a forwarding node, and registration information of the processing rule storage unit 14 is updated in response to a case where a change has occurred in a processing rule set in the forwarding node, by a processing rule deletion notification or the like from a processing node.
The forwarding node management unit 15 manages the capability (for example, the number and type of ports, the type of actions supported, and the like) of forwarding nodes controlled by the control device 400.
The topology management unit 17 builds network topology information based on connection relationships of the forwarding nodes 201 to 204 collected via the node communication unit 11.
The terminal location management unit 18 manages information for identifying the location of a user terminal connected to a communication system, and also isolation level information of respective user terminals determined by the isolation level determination unit 410. In the present exemplary embodiment, a description is given using an IP address as information for distinguishing a user terminal, and a forwarding node identifier of a forwarding node to which the user terminal is connected and information of a port thereof, as information for identifying the location of the user terminal. Clearly, instead of this information, information provided by the authentication device 330, for example, may be used to identify a terminal and its location.
On receiving the communication policy information from the policy management device 300, the communication policy management unit 19 stores the information in the communication policy storage unit 20, and transmits the information to the isolation level determination unit 410.
On receiving the communication policy information from the communication policy management unit 19, the isolation level determination unit 410 refers to a result of the quarantine process of the user terminal received via the control message processing unit 12 and the path-action calculation unit 16, and to the isolation level information stored in the isolation level information storage unit 420, to perform a process (a communication policy correction process) of rewriting content denying access, among access destinations accessible from the user terminal 100, to access destinations for which the user terminal in question does not satisfy a condition requested by respective access destinations, and then transmits to the path-action calculation unit 16.
For example, if the logical product of the isolation level information of
The isolation level determination unit 410 transmits the corrected communication policy and the isolation level of the user terminal 100 determined in the process of correcting the communication policy, to the path-action calculation unit 16 that functions as the access control unit 430.
On receiving the corrected communication policy from the isolation level determination unit 410, the path-action calculation unit 16, in accordance with the communication policy, refers to the network topology held in the topology management unit 17, and calculates a forwarding path of a packet to an access destination that can be accessed by the user terminal 100, in addition to creating a processing rule realizing packet forwarding following the forwarding path.
Specifically, based on location information of a communication terminal managed by the terminal location management unit 18 and the network topology information build by the topology management unit 17, the path-action calculation unit 16 calculates a forwarding path of the packet to the access destination that is accessible by the user terminal 100. Next, the path-action calculation unit 16 obtains port information and the like of a forwarding node in the forwarding path from the forwarding node management unit 15, and requests an action to be executed in the forwarding node in the path for realizing the calculated forwarding path, and a matching rule for identifying flow in which the action is to be applied. It is to be noted that the matching rule can be created using a source IP address, a destination IP address, a condition (option) and the like of the communication policy in
Moreover based on the isolation level of the user terminal 100 determined by the isolation level determination unit 410, the path-action calculation unit 16 of the present exemplary embodiment allows only access to another user present in an isolation level that is more relaxed than the isolation level of the user in question, creates a processing rule denying access to other users present in isolation levels outside of this, and sets these processing rules in the forwarding nodes 201 to 204.
For example, since user A is at isolation level 5, access from user A to users B, C, D, and E (isolation levels 1 to 5) is allowed. Since user B is at isolation level 3, access from user B to users C, D, and E (isolation levels 1 to 3) is allowed. Similar determination processing is performed also for respective users C, D, and E.
In this way, the path-action calculation unit 16 creates a processing rule implementing whether or not access is possible from the user terminal 100 to other user terminals. It is to be noted that in the example in
Furthermore, either the processing rule implementing whether or not access is possible among the users as described above or the processing rule enabling or disenabling access to the network resources may be set first in a processing node, or they may be set at the same timing. Furthermore, in the abovementioned description, the processing rule implementing whether or not access is possible among the users is set, but in a case where an isolation level is also obtained for other nodes outside of the user terminals, it is possible to determine whether or not access is possible in accordance with the isolation level, and to set a processing rule implementing this.
The control device 400 as described above can also be realized by adding equivalent functions to the path-action calculation unit 16 functioning as the isolation level determination unit 410, the isolation level information storage unit 420, and the access control unit 430, as described above, based on an OpenFlow controller of NPLs 1 and 2.
Further, respective parts (processing means) of the control device 400 shown in
Further, the quarantine agent unit 110 shown in
Next, a detailed description is given concerning operations of the present exemplary embodiment, making reference to the drawings.
When a user authentication procedure for the user terminal is completed (S002 in
On receiving the request for quarantine information from the authentication device 330, the quarantine agent unit 110 of the user terminal executes quarantine processing and transmits quarantine information (a result of the quarantine processing) for the user terminal to the control device 400 (S004 in
The authentication device 330 transmits authentication information to the policy management device 300 (S005 in
The policy management device 300 that has received that authentication information refers to the communication policy storage unit 310 and the resource information storage unit 320 to determine a communication policy, based on the received authentication information (S006 in
The control device 400 obtains information indicating an isolation level corresponding to quarantine information for the user terminal and an access range recognized in the isolation level in question, from the isolation level information storage unit 420 (S008, S009 in
The control device 400 performs correction processing (quarantine determination) of the communication policy based on the communication policy of the user transmitted from the policy management device 300 and isolation level information received from the isolation level information storage unit 420 (S010 in
The control device 400 generates processing rules for the user based on the corrected communication policy (S011 in
Furthermore, the control device 400 determines whether or not access is possible to other users, based on the isolation level information of the user terminal determined by the isolation level determination unit 410, generates a corresponding processing rule (S013 in
Thereafter, when the user terminal transmits a packet to a forwarding node (S015 in
In a case where the packet transmitted from the user terminal has a destination of another user terminal, the forwarding node refers to the processing rule and similarly performs a determination for packet forwarding (S016 in
As described above, according to the present exemplary embodiment, it is possible to realize stepwise access control between a user terminal and network resources, according, not only to a pre-set communication policy, but also to an isolation level determined based on the result of quarantine processing. Furthermore, in the present exemplary embodiment, access control among users can be realized in combined fashion.
It is to be noted that when the isolation level determination unit 410 of the control device 400 performs correction processing (quarantine determination processing) of a communication policy in step S010 in
In addition, a network resource providing a required service so that a user terminal raises isolation level is preferably disposed at the isolation level in question. For example, in the example in
Furthermore, a description has been given in which the quarantine agent unit 110 of the user terminal receives a request for quarantine information from the authentication device 330 and transmits quarantine information to the control terminal 400, but it is also possible to use a configuration in which the quarantine agent unit 110 executes quarantine processing periodically and transmits the quarantine information to the control device 400. By so doing, it is possible to rapidly adjust the isolation level or the communication policy, in accordance with the state of the user terminal after setting processing rules.
Next, a detailed description is given concerning a second exemplary embodiment of the present invention, making reference to the drawings.
The terminal access control unit 600 receives a corrected communication policy or isolation level information of a plurality of user terminals including isolation level of the user terminal 100A determined by an isolation level determination unit 410 of a control device 400; creates processing rules allowing or denying transmission of a packet transmitted by the user terminal 100A; and implements access control of a user terminal by these processing rules.
Here, the terminal access control unit 600 may be realized as a function of a quarantine agent unit 110. In addition, the control device 400 may create a processing rule, and the terminal access control unit 600 may implement only access control according to a processing rule created by the control device 400.
Next, a description is given concerning operation of the second exemplary embodiment described above.
In the present exemplary embodiment, after performing correction processing (quarantine determination processing) of a communication policy, the control device 400 transmits the corrected communication policy or isolation level information of a plurality of user terminals including isolation level of the user terminal in question, to the terminal access control unit 600 of the user terminal 100A (S 111 in
The terminal access control unit 600 of the user terminal 100A creates a processing rule allowing or denying packet transmission to another node from the user terminal 100, based on the corrected communication policy or respective isolation level information received from the control device 400 (S112 in
A processing rule used by the terminal access control unit 600 of the user terminal 100A may be the same as one held in a forwarding node, or packet filtering technology as in iptables may be used instead of this type of processing rule.
Furthermore, the terminal access control unit 600 can also apply a processing rule allowing or denying forwarding of a packet, with respect to a physical NIC (Network Interface Card) inside the user terminal 100A; application is also possible with regard to virtual NICs held by respective VMs (Virtual Machines) operating inside the user terminal 100A; and application is also possible with respect to plural virtual switches operating inside the user terminal 100A. In this way, the terminal access control unit 600 can freely designate a place to execute access control inside the user terminal 100A.
As described above, according to the present exemplary embodiment, in addition to effects of the abovementioned first exemplary embodiment, it is possible to inhibit transmission of a packet to a destination that the user terminal 100A cannot access, and to reduce load on a forwarding node.
Next, a detailed description is given concerning a third exemplary embodiment of the present invention, making reference to the drawings.
The action monitoring unit 700 monitors actions of a user terminal and transmits action information that is a result thereof, to the isolation level determination unit 410 of the control device 400. The place (location) where the user terminal 100B exists, or time, or history of access to a Website or database, or history of usage of an application inside the user terminal 100B, may be cited as the action information.
In addition, in the present exemplary embodiment, an isolation level information storage unit 420 stores isolation level information, in which location information of where access is allowed (or location information of where access is denied) is set, in a condition field (refer to
In the present exemplary embodiment below, to facilitate the explanation, a description is given concerning operations in a case of using information of locations (location information) where a user terminal is present. This type of action monitoring unit 700 can be configured from a GPS (Global Positioning System) device or the like. Furthermore, quarantine information of a user terminal described in the first and second exemplary embodiments of the present invention may be included as one item of the action information of the user terminal.
After completing user authentication processing, the authentication device 330 makes a request for action information with respect to the action monitoring unit 700 of the user terminal (S203 in
On receiving authentication information from the authentication device 330 (S205 in
Next, the control device 400 obtains information indicating an isolation level corresponding to action information received from the action monitoring unit 700 of the user terminal 100B and an access range recognized in the isolation level in question, from the isolation level information storage unit 420 (S208, S209 in
Next, the isolation level determination unit 410 of the control device 400 corrects the communication policy based on action information received from the action monitoring unit 700 of the user terminal 100B and isolation level information transmitted from the isolation level information storage unit 420 (S210 in
Thereafter, the control device 400 generates processing rules for between the user terminal 100B and a network resource (S211 in
Furthermore, similar to the first exemplary embodiment described above, the control device 400 creates processing rules implementing enabling or disenabling access to user terminals (S213 in
Thereafter, a sequence of processes is performed in which the action monitoring unit 700 of the user terminal 100B periodically transmits action information of a user to the control device 400, and each time action information of the user is received, the control device 400 makes a determination of an isolation level of the user, corrects a communication policy based on the result thereof, creates a processing rule, and sets this in the forwarding node. Or, the isolation level determination unit 410 of the control device 400 may be arranged to periodically make a request for action information of a user with respect to the action monitoring unit 700 of a user terminal, and receive the action information for the user.
In addition, the action information of a user may be provided to the policy management device 300 and determination performed of the communication policy of the user based on the action information.
As described above, according to the present exemplary embodiment, it is possible to perform control so as to only allow access to an isolation level determined in advance in accordance with action information such as the location at which the user terminal exists or the time.
Descriptions have been given above of respective exemplary embodiments of the present invention, but the present invention is not limited to only configurations of the abovementioned exemplary embodiments, and further modifications, substitutions, and adjustments may be added within a scope that does not depart from a fundamental technical concept of the present invention. For example, in the abovementioned first exemplary embodiment a description was given in which the control device 400, the authentication device 330, the policy management device 300, the communication policy storage unit 310, and the resource information storage unit 320 are each provided independently, but it is also possible to use a configuration in which these are integrated or omitted as appropriate.
In addition, in the abovementioned exemplary embodiment a description was given in which access control is performed by assigning a role ID to a user as shown in
Furthermore, in the abovementioned exemplary embodiment a description was given in which the user terminal 100 performs an authentication procedure with the authentication device 330 via the forwarding node 200, but it is also possible to use a configuration in which the user terminal 100 communicates directly with the authentication device 330 to implement an authentication procedure.
Finally, preferred modes of the present invention are summarized.
(Refer to the communication system according to the abovementioned first aspect.)
With regard to the communication system of the first mode, the communication system is provided with a quarantine agent that implements quarantine processing of a user terminal at prescribed timing, in a user terminal, and notifies a quarantine result to the isolation level determination unit, unit as the information acquisition unit.
With regard to the communication system of the second mode, the communication system has a requirement to be satisfied that is determined for each of the isolation levels, and the isolation level determination unit determines an isolation level according to whether or not the quarantine result notified from the quarantine agent unit satisfies the requirement
With regard to the communication system of any one of the first to third modes, the communication system further includes a communication policy management unit that provides a communication policy to be applied to a user for whom authentication has succeeded, wherein accessibility determined by the communication policy is corrected using information defined in the isolation level information storage unit.
With regard to the communication system of any one of the first to fourth modes, in the communication system the access control unit controls whether or not access is possible between the user terminal and another node, based on the determined isolation level and an isolation level of the other node.
With regard to the communication system of any one of the first to fifth modes, in the communication system the access control unit controls the forwarding node by setting, in the forwarding node, a processing rule that determines a matching rule matching a packet and a process to be applied to the packet that conforms to the matching rule.
With regard to the communication system of the sixth mode, in the communication system the access control unit controls the forwarding node so as to delete an unnecessary processing rule, and in a case of not holding a processing rule having a matching rule that matches a received packet, causes the received packet to be dropped.
With regard to the communication system of any one of the first to seventh modes, in the communication system a terminal access control unit that controls whether or not transmission of a packet is possible is provided in the user terminal, and the isolation level determination unit or the access control unit gives an instruction to inhibit transmission of a packet, with respect to the terminal access control unit.
With regard to the communication system of the first mode, in the communication system an action monitoring unit that monitors action of a user terminal and gives notification to the isolation level determination unit is provided in the user terminal, as the information acquisition unit.
With regard to the communication system of the ninth mode, in the communication system the isolation level determination unit uses location information of a user terminal included in the action information to determine an isolation level. It is noted that any combination (including selection of elements contained in any of the modes) of the modes disclosed above can be implemented within the basic concept of the present entire disclosure.
(Refer to the control device according to the abovementioned second aspect.) Note further modes are possible in accordance with any of the preceding modes se forth herein.
(Refer to the communication method according to the abovementioned third aspect.) Note further modes are possible in accordance with any of the preceding modes se forth herein.
(Refer to the program according to the abovementioned fourth aspect.)
It is to be noted that the abovementioned eleventh to thirteenth modes can be expanded to be applicable to the second to tenth modes in any combination and/or selection thereof, similar to the abovementioned first mode.
It is to be noted that that each disclosure of the aforementioned patent literatures and non-patent literatures is incorporated herein in entirety thereof by reference thereto. Modifications and adjustments of exemplary embodiments are possible within the scope of the entire disclosure (including the scope of the claims) of the present invention, and also based on fundamental technological concepts thereof. Furthermore, a wide variety of combinations and selections of various disclosed elements is possible within the scope of the claims of the present invention. That is, the present invention clearly includes every type of transformation and modification that a person skilled in the art can realize according to the entire disclosure including the scope of the claims and to technological concepts thereof.
Number | Date | Country | Kind |
---|---|---|---|
2011-115104 | May 2011 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2012/003336 | 5/22/2012 | WO | 00 | 11/22/2013 |