This invention relates to a communication system, a key managing/distributing server, a terminal apparatus, a data communication method used therefor, and a program thereof and, in particular, relates to a method of performing a data communication by securely obtaining a dynamically generated encryption key.
In recent years, for portable terminal apparatuses such as portable telephones, following the increasing multifunctionality thereof, a method has been proposed that directly connects between portable terminal apparatuses by short-range wireless communication or the like to perform a data communication therebetween, in addition to wireless communication through a wireless base station. Such a conventional technique is described, for example, in Unexamined Patent Publication No. 2003-087267.
In that event, in the case of connecting the portable terminals by P2P (Peer to Peer: direct communication between terminals) communication (including P2P by short-range wireless communication or the like) as described above, if the communication is performed using a secret key possessed by the portable terminal apparatus, it is necessary to publish the secret key of its own to the portable terminal apparatus of the communication partner or to use a public key cryptosystem. Note, however, that the P2P communication by the short-range wireless communication cannot be realized when the terminal apparatuses are remote from each other.
In the foregoing conventional data communication method, there is a problem that publishing one's own secret key results in that the secret key is possessed by a plurality of persons and, therefore, there is a possibility of unauthorized use thereof. Further, when the public key cryptosystem is used, complicated encryption and decryption processes are required, which is thus not suitable for processing in a small-scale terminal such as a portable terminal apparatus.
Further, having a plurality of secret keys for respective communication partners extensively uses a storage area of a memory of a portable terminal apparatus storing those secret keys and, if any of the communication partners loses one's own portable terminal apparatus, the plurality of secret keys stored in its memory leak out, which raises a big problem.
On the other hand, in the conventional data communication method, there is also a method of performing key delivery using HTTP (HTTPS) [Hyper Text Transfer Protocol (Hyper Text Transfer Protocol over transport layer security/secure sockets layer)]. However, this method lacks the real-time performance and, further, the same key should be delivered also to a communication partner with a trigger when a sender wishes to start a communication. According to the nature of HTTP (HTTPS), however, it is difficult to trigger key delivery from a key managing/delivering server side to a terminal apparatus (HTTP client).
Therefore, it is an object of this invention to solve the foregoing problems and to provide a communication system that can prevent unauthorized use of an encryption key otherwise caused by loss thereof and that can securely perform a direct communication between terminals using the encryption key, a key managing/distributing server, a terminal apparatus, a data communication method used therefor, and a program thereof.
A communication system according to this invention is a communication system enabling a peer-to-peer data communication to be performed between a first and a second terminal apparatus based on an encryption key shared by the first terminal apparatus and the second terminal apparatus,
wherein one of the first terminal apparatus and the second terminal apparatus notifies a trigger of start of the peer-to-peer data communication to the other of the first terminal apparatus and the second terminal apparatus through a communication channel by a first communication method, and
the first terminal apparatus and the second terminal apparatus, in response to transmission and reception of the trigger of start of the data communication, each form a communication channel by a second communication method between itself and a relay server that relays the encryption key and each perform switching from the communication channel by the first communication method to the communication channel by the second communication method, whereby sharing the encryption key between the first terminal apparatus and the second terminal apparatus through the relay server.
Another communication system according to this invention is a communication system enabling a peer-to-peer data communication to be performed between a first and a second terminal apparatus based on an encryption key distributed to the first terminal apparatus and the second terminal apparatus from a key managing/distributing server,
wherein one of the first terminal apparatus and the second terminal apparatus notifies a trigger of start of the peer-to-peer data communication to the other of the first terminal apparatus and the second terminal apparatus through the key managing/distributing server and through a communication channel by a first communication method, and
the first terminal apparatus and the second terminal apparatus, in response to transmission and reception of the trigger of start of the data communication, each form a communication channel by a second communication method between itself and the key managing/distributing server and each perform switching from the communication channel by the first communication method to the communication channel by the second communication method, whereby distributing the encryption key to the first terminal apparatus and the second terminal apparatus from the key managing/distributing server, respectively.
A key managing/distributing server according to this invention is a key managing/distributing server adapted to distribute an encryption key to a first and a second terminal apparatus, respectively, in a communication system enabling a peer-to-peer data communication between the first terminal apparatus and the second terminal apparatus, and comprises
means, responsive to receipt of a trigger of start of the peer-to-peer data communication, transmitted from one of the first terminal apparatus and the second terminal apparatus, through a communication channel by a first communication method, for transferring the trigger of start of the data communication to the other of the first terminal apparatus and the second terminal apparatus, and means for distributing the encryption key through communication channels by a second communication method switched and formed by the first terminal apparatus and the second terminal apparatus between themselves and the key managing/distributing server, respectively, in response to transmission and reception of the trigger of start of the peer-to-peer data communication.
A terminal apparatus according to this invention is a terminal apparatus adapted to perform a peer-to-peer data communication between itself and another terminal apparatus based on an encryption key shared by itself and the another terminal apparatus,
wherein the terminal apparatus transmits a trigger of start of the peer-to-peer data communication to the another terminal apparatus through a relay server that relays the encryption key and through a communication channel by a first communication method, forms a communication channel by a second communication method between itself and the relay server in response to either of transmission of the trigger of start of the peer-to-peer data communication from itself and reception of the trigger of start of the peer-to-peer data communication from the another terminal apparatus, and performs switching from the communication channel by the first communication method to the communication channel by the second communication method, whereby performing either of transmission and reception of the encryption key through the relay server.
Another terminal apparatus according to this invention is a terminal apparatus adapted to perform a peer-to-peer data communication between itself and another terminal apparatus based on an encryption key distributed to itself and the another terminal apparatus from a key managing/distributing server,
wherein the terminal apparatus transmits a trigger of start of the peer-to-peer data communication to the another terminal apparatus through the key managing/distributing server and through a communication channel by a first communication method, forms a communication channel by a second communication method between itself and the key managing/distributing server in response to either of transmission of the trigger of start of the peer-to-peer data communication from itself and reception of the trigger of start of the peer-to-peer data communication from the another terminal apparatus, and performs switching from the communication channel by the first communication method to the communication channel by the second communication method, whereby receiving the encryption key from the key managing/distributing server.
A data communication method according to this invention is a data communication method for use in a system enabling a peer-to-peer data communication to be performed between a terminal apparatus and another terminal apparatus based on an encryption key shared by the terminal apparatus and the another terminal apparatus,
wherein the terminal apparatus performs a step of transmitting a trigger of start of the peer-to-peer data communication to the another terminal apparatus through a relay server that relays the encryption key and through a communication channel by a first communication method, and a step of forming a communication channel by a second communication method between itself and the relay server in response to either of transmission of the trigger of start of the peer-to-peer data communication from itself and reception of the trigger of start of the peer-to-peer data communication from the another terminal apparatus, and performing switching from the communication channel by the first communication method to the communication channel by the second communication method, whereby performing either of transmission and reception of the encryption key through the relay server.
Another data communication method according to this invention is a data communication method for use in a system enabling a peer-to-peer data communication to be performed between a terminal apparatus and another terminal apparatus based on an encryption key distributed to the terminal apparatus and the another terminal apparatus from a key managing/distributing server,
wherein the terminal apparatus performs a step of transmitting a trigger of start of the peer-to-peer data communication to the another terminal apparatus through the key managing/distributing server and through a communication channel by a first communication method, and a step of forming a communication channel by a second communication method between itself and the key managing/distributing server in response to transmission/reception of the trigger of start of the peer-to-peer data communication and performing switching from the communication channel by the first communication method to the communication channel by the second communication method, whereby receiving the encryption key from the key managing/distributing server.
A program of a data communication method according to this invention is a program of a data communication method for use in a system enabling a peer-to-peer data communication to be performed between a terminal apparatus and another terminal apparatus based on an encryption key shared by the terminal apparatus and the another terminal apparatus, and causes a computer of the terminal apparatus to execute
a step of transmitting a trigger of start of the peer-to-peer data communication to the another terminal apparatus through a relay server that relays the encryption key and through a communication channel by a first communication method, and a step of forming a communication channel by a second communication method between itself and the relay server in response to either of transmission of the trigger of start of the peer-to-peer data communication from itself and reception of the trigger of start of the peer-to-peer data communication from the another terminal apparatus, and performing switching from the communication channel by the first communication method to the communication channel by the second communication method, whereby performing either of transmission and reception of the encryption key through the relay server.
Another program of a data communication method according to this invention is a program of a data communication method for use in a system enabling a peer-to-peer data communication to be performed between a terminal apparatus and another terminal apparatus based on an encryption key distributed to the terminal apparatus and the another terminal apparatus from a key managing/distributing server, and causes a computer of the terminal apparatus to execute
a step of transmitting a trigger of start of the peer-to-peer data communication to the another terminal apparatus through the key managing/distributing server and through a communication channel by a first communication method, and a step of forming a communication channel by a second communication method between itself and the key managing/distributing server in response to transmission/reception of the trigger of start of the peer-to-peer data communication and performing switching from the communication channel by the first communication method to the communication channel by the second communication method, whereby receiving the encryption key from the key managing/distributing server.
That is, in the communication system of this invention, terminal apparatuses constantly register their location information in a SIP (Session Initiation Protocol) server and, therefore, when the terminal apparatus issues a communication request, a key managing/distributing server receives it and can transmit it in real time to the terminal apparatus on the receiving side.
In the communication system of this invention, in response to a communication request as a trigger, the key managing/distributing server distributes a unique secret key to both terminal apparatuses, which will be in communication, per communication between the terminals. Accordingly, since a different secret key (encryption key) is used for each communication, security of secret keys becomes high. Further, although a different secret key is used each time, it is not necessary to store those secret keys on the terminal apparatus side. Consequently, the communication system of this invention enables a secure P2P (Peer to Peer: direct communication between terminals) data communication between terminal apparatuses, particularly between portable telephone terminals.
The terminal apparatus according to this invention is a terminal adapted to perform communication using a SIP (Session Initiation Protocol) and constantly registers its location information with respect to the SIP server. When a certain terminal apparatus requests a P2P communication with another terminal apparatus, the SIP server using their registered location information proxies a communication start request from the terminal apparatus on the sending side to the terminal apparatus on the receiving side, so that each of the terminal apparatuses performs a location information registration process for reconstructing a signaling session using an IPsec [IP (Internet Protocol) security protocol]. Through this operation, the terminal apparatuses according to this invention each can form a tunnel for secure information transmission and reception between itself and the SIP server.
The terminal apparatuses according to this invention each transmit a message, notifying completion of the tunnel formation between itself and the SIP server, to the key managing/distributing server, which performs key management and delivery, through the SIP server. In response thereto, the key managing/distributing server transmits a signal, for establishing a secure data session, to each of the terminal apparatus on the sending side and the terminal apparatus on the receiving side through the SIP server, thereby enabling establishment of data sessions to be used for key delivery.
The terminal apparatuses according to this invention receive a secret key, only applicable to that communication, from the key managing/distributing server through the secure data sessions and each transmit a message indicative of completion of the reception, so that it becomes possible to receive, from the key managing/distributing server, a request for data session switching [request for switching to a P2P session (this represents rewriting of session destination addresses and includes addition of the P2P session)] for establishing P2P connection between the terminal apparatus on the sending side and the terminal apparatus on the receiving side.
Upon receipt of the data session switching request, the terminal apparatus according to this invention can establish an encrypted data session with the partner terminal using the delivered secret key.
For establishing a secure signaling session with the SIP server or establishing an encrypted secure data session with the key managing/distributing server, the terminal apparatus according to this invention may have an encryption key exchanged in advance or both may have public keys.
Accordingly, in the communication system of this invention, with the terminal apparatuses each including a SIP module, the terminal apparatus on the sending side transmits a data communication start trigger to the terminal apparatus on the receiving side through the SIP server and the key managing/distributing server, thereby enabling the terminal apparatus on the receiving side to receive this trigger in real time.
With the trigger when the terminal apparatus on the sending side and the terminal apparatus on the receiving side both transmit and receive the data communication start trigger, the terminal apparatuses perform again the location information registration process with respect to the SIP server and, simultaneously, establish signaling sessions between them and the SIP server using the IPsec. By this operation, in the communication system of this invention, the establishing time of the IPsec sessions between the SIP server and the portable terminal apparatuses and the number of the IPsec session establishing terminal apparatuses can be reduced and thus the network load and the server load can be reduced. By performing the signaling on these IPsec sessions, encryption of user information and data necessary for the signaling is performed, thus enabling secure communication.
Exchange of a secret key for use in P2P data communication between the terminal apparatus on the sending side and the terminal apparatus on the receiving side can be performed through the foregoing signaling sessions on the IPsec. However, by establishing on the IPsec the data sessions between the key managing/distributing server and the terminal apparatus on the sending side and between the key managing/distributing server and the terminal apparatus on the receiving side and exchanging the secret key on these sessions, there is no chance of the server apparatus such as the SIP server proxying data including the secret key and hence the secret key never can be referred to, thus enabling more secure delivery and management of the secret key.
Since a secret key for use in P2P data communication is generated per communication by the key managing/distributing server and delivered to the terminal apparatus on the sending side and the terminal apparatus on the receiving side, a different secret key is used for each communication. Therefore, in the communication system of this invention, it becomes possible to prevent a once-used secret key from further continuing to be used unfairly or prevent unauthorized use of a secret key otherwise caused by loss thereof.
With the structure and operation as will be described hereinbelow, this invention achieves effects that can prevent unauthorized use of an encryption key otherwise caused by loss thereof and that can securely perform a direct communication between terminals using the encryption key.
Now, embodiments of this invention will be described with reference to the drawings.
The portable terminal apparatus 1 includes the SIP module and periodically performs a location registration process being the function of registering a destination IP (Internet Protocol) address with respect to the SIP server 2. The portable terminal apparatus 1 already shares a secret key at the time of the location registration process for performing a communication with the SIP server 2 and thus establishes a secure signaling session without newly exchanging a secret key. The portable terminal apparatus 1 establishes a data session with another portable terminal apparatus for exchanging (sending and receiving) data therebetween. When the portable terminal apparatus 1 establishes the data session with the other portable terminal apparatus, exchange of a secret key is required between the portable terminal apparatus 1 and the other portable terminal apparatus. However, since this secret key is delivered thereto from the key managing/distributing server 3 through secure data sessions, respectively, use is made of it. As a method of this key delivery, there is, for example, the DH (Diffie-Hellman) method or the like.
The SIP server 2 has the function of storing IP address information of the portable terminal apparatuses 1-1 and 1-n and transferring messages sent from the portable terminal apparatuses 1-1 and 1-n to the key managing/distributing server 3 or other portable terminals. While the portable terminal apparatuses 1-1 and 1-n are not in P2P communication, the SIP server 2 only holds the IP address information without setting up secure signaling sessions therewith. In response to receipt of re-registrations for setting up secure signaling sessions from the portable terminal apparatuses 1-1 and 1-n, the SIP server 2 establishes the secure signaling sessions with the portable terminal apparatuses 1-1 and 1-n.
Thereafter, using these sessions, the SIP server 2 sends and receives messages for establishing encrypted secure data sessions between the portable terminal apparatuses 1-1 and 1-n and between the portable terminal apparatuses 1-1 and 1-n and the key managing/distributing server 3. The SIP server 2 manages only domain information with respect to the portable terminal apparatuses 1-1 and 1-n and the key managing/distributing server 3, and personal information and the like are all exchanged through the data sessions and are never decoded by the SIP server 2.
The key managing/distributing server 3 includes the SIP module and constantly sets up a secure signaling session with the SIP server 2. In response to receipt of a communication start request from the portable terminal apparatus 1-1 and confirmation of establishment of the secure signaling sessions between the portable terminal apparatuses 1-1 and 1-n and the SIP server 2, the key managing/distributing server 3 transmits messages for establishing secure data sessions to both the portable terminal apparatuses 1-1 and 1-n.
Using these sessions, the key managing/distributing server 3 delivers a key for use in P2P communication between both portable terminals, i.e. the portable terminal apparatuses 1-1 and 1-n. Thereafter, the key managing/distributing server 3 performs signaling for establishing secure data sessions between the portable terminal apparatuses 1-1 and 1-n. That is, the key managing/distributing server 3 performs delivery control of an encryption key for switching to a P2P session (this represents rewriting of session destination addresses and includes addition of the P2P session) between the portable terminal apparatuses 1-1 and 1-n and establishing the P2P session (IPsec) per communication.
The portable terminal apparatus (#1) 1-1 performs a location registration process of its own with respect to the registration module 23 of the SIP server 2 using the SIP module 13 (see a1 in
When the portable terminal apparatus (#1) 1-1 transmits a P2P communication trigger message to the proxy server module 21 of the SIP server 2 (see a3 in
In response to the foregoing message transmission/reception as triggers, the portable terminal apparatuses (#1) 1-1 and (#n) 1-n each again perform the location registration process by the SIP module 13. In the process, each of them starts the IPsec module 12 and forms an IPsec tunnel between itself and the IPsec module 25 of the SIP server 2 (see a7 to a10 in
When the formation of the IPsec tunnels with respect to the SIP server 2 is completed, the portable terminal apparatuses (#1) 1-1 and (#n) 1-n each transmit a message addressed to the key managing/distributing server 3, thereby notifying the SIP server 2 of the completion of the IPsec tunnel formation (see a11 and a13 in
The key managing/distributing server 3 transmits a message requesting establishment of an IPsec data session to the portable terminal apparatus (#1) 1-1 through the SIP server 2 (see a15 and a16 in
Likewise, the key managing/distributing server 3 transmits a message requesting establishment of an IPsec data session to the portable terminal apparatus (#n) 1-n through the SIP server 2 (see a18 and a19 in
In response to receipt of the same secret key A from the key managing/distributing server 3 through the SIP server 2, the portable terminal apparatuses (#1) 1-1 and (#n) 1-n each transmit a key reception completion message to the key managing/distributing server 3 through the SIP server 2 (see a21 to a24 in
As described above, in this embodiment, with the configuration that the portable terminal apparatuses (#1) 1-1 and (#n) 1-n each include the SIP module, the portable terminal apparatus (#1) 1-1 on the sending side transmits the data communication start trigger to the portable terminal apparatus (#n) 1-n on the receiving side through the SIP server 2 and the key managing/distributing server 3, thereby enabling the portable terminal apparatus (#n) 1-n on the receiving side to receive this trigger in real time.
With the trigger when the portable terminal apparatus (#1) 1-1 on the sending side and the portable terminal apparatus (#n) 1-n on the receiving side both transmit and receive the data communication start trigger, the portable terminal apparatuses (#1) 1-1 and (#n) 1-n perform again the location information registration process with respect to the SIP server 2 and, simultaneously, establish the signaling sessions between them and the SIP server 2 using the IPsec. By this operation, in this embodiment, the establishing time of the IPsec sessions between the SIP server 2 and the portable terminal apparatuses (#1) 1-1 and (#n) 1-n and the number of the IPsec session establishing terminal apparatuses can be reduced and thus the network load and the server load can be reduced. By performing the signaling on these IPsec sessions, encryption of user information and data necessary for the signaling is performed, thus enabling secure communication.
Exchange of a secret key for use in P2P data communication between the portable terminal apparatus (#1) 1-1 on the sending side and the portable terminal apparatus (#n) 1-n on the receiving side can be performed through the foregoing signaling sessions on the IPsec. However, by establishing on the IPsec the data sessions between the key managing/distributing server 3 and the portable terminal apparatus (#1) 1-1 on the sending side and between the key managing/distributing server 3 and the portable terminal apparatus (#n) 1-n on the receiving side and exchanging the secret key on these sessions, there is no chance of the server apparatus such as the SIP server 2 proxying data including the secret key and hence the secret key cannot be referred to, thus enabling more secure delivery and management of the secret key.
Since a secret key for use in P2P data communication is generated per communication by the key managing/distributing server 3 and delivered to the portable terminal apparatus (#1) 1-1 on the sending side and the portable terminal apparatus (#n) 1-n on the receiving side, a different secret key is used for each communication. Therefore, in this embodiment, it is possible to prevent a once-used secret key from further continuing to be used unfairly or prevent unauthorized use of a secret key otherwise caused by loss thereof.
The gateway server 4 is a protocol conversion server that, when the SIP-unadapted terminal 5 to be used in P2P communication has no SIP module, enables a P2P communication between the SIP-unadapted terminal 5 and a terminal (portable terminal apparatus 1-n) having a SIP module. In response to receipt of a P2P communication request from the SIP-unadapted terminal 5 requested by HTTPS, the gateway server 4 performs a registration process with respect to the SIP server 2 using its own IP address as a destination IP address and transmits a P2P communication request message to the portable terminal apparatus 1-n through the SIP server 2 and the key managing/distributing server 3.
In response to receipt of a request from the key managing/distributing server 3, the gateway server 4 establishes a data session between itself and the portable terminal apparatus 1-n or the key managing/distributing server 3. When the gateway server 4 establishes the data session with the portable terminal apparatus 1-n, exchange of a secret key is required between the gateway server 4 and the portable terminal apparatus 1-n. However, since this secret key is delivered thereto from the key managing/distributing server 3, use is made of it.
The SIP-unadapted terminal 5 performs a P2P communication through the gateway server 4 based on the establishment of the data session with the portable terminal apparatus 1-n. In this event, the gateway server 4 notifies the contents of the P2P communication to the SIP-unadapted terminal 5 by HTTPS.
The SIP-unadapted terminal 5 having no SIP module forms an HTTPS tunnel with respect to the HTTP/HTTPS module 41 of the gateway server 4 and transmits a trigger for performing a location registration process with respect to the SIP server 2 (see b1 in
The SIP-unadapted terminal 5 transmits a payment request trigger message from the HTTP/HTTPS module 52 (see b4 in
In response to the foregoing message transmission/reception as triggers, the gateway server 4 and the portable terminal apparatus (#n) 1-n each again perform the location registration process by the SIP module 42 or 13 (see b9 and b11 in
The key managing/distributing server 3 transmits a message requesting establishment of an IPsec data session to the gateway server 4 through the SIP server 2 (see b17 and b18 in
In response to receipt of the same secret key A from the key managing/distributing server 3 through the SIP server 2, the gateway server 4 and the portable terminal apparatus (#n) 1-n each transmit a key reception completion message to the key managing/distributing server 3 through the SIP server 2 (see b23 to b26 in
In this case, since the HTTPS tunnel is formed between the SIP-unadapted terminal 5 and the gateway server 4, when a P2P communication is performed based on the establishment of the IPsec data session between the portable terminal apparatus (#n) 1-n and the gateway server 4, the gateway server 4 transmits information thereof to the SIP-unadapted terminal 5 through conversion to HTTPS (see b32 in
As described above, in this embodiment, by forming the IPsec tunnel between the SIP-unadapted terminal 5 having no SIP module and the portable terminal apparatus (#n) 1-n on the receiving side through the gateway server 4 having the SIP module, it is possible, like in the foregoing one embodiment of this invention, to prevent unauthorized use of an encryption key otherwise caused by loss thereof and to securely perform a direct communication between the terminals using the encryption key even in the case of the SIP-unadapted terminal 5 having no SIP module.
The SIP-unadapted terminal 5 having no SIP module forms an HTTPS tunnel with respect to the HTTP/HTTPS module 41 of the gateway server 4 and transmits a trigger for performing a location registration process with respect to the SIP server 2 (see c1 in
The SIP-unadapted terminal 5 transmits a payment request trigger message from the HTTP/HTTPS module 52 (see c5 in
The key managing/distributing server 3 transmits the payment request trigger message from the SIP-unadapted terminal 5 back to the proxy server module 21 of the SIP server 2 (see c8 in
In response to the foregoing message transmission/reception as triggers, the gateway servers 4 and 6 each again perform the location registration process by the SIP module 42 (see c11 and c13 in
The key managing/distributing server 3 transmits a message requesting establishment of an IPsec data session to the gateway server 4 through the SIP server 2 (see c19 and c20 in
In response to receipt of the same secret key A from the key managing/distributing server 3 through the SIP server 2, the gateway servers 4 and 6 each transmit a key reception completion message to the key managing/distributing server 3 through the SIP server 2 (see c25 to c28 in
In this case, since the HTTPS tunnels are formed between the SIP-unadapted terminal 5 and the gateway server 4 and between the SIP-unadapted terminal 7 and the gateway server 6, respectively, the contents of a P2P communication based on the establishment of the IPsec data session between the gateway servers 4 and 6 are converted to HTTPS in the gateway servers 4 and 6 and transmitted to the SIP-unadapted terminals 5 and 7 (see c34 and c35 in
As described above, in this embodiment, by forming the IPsec tunnel between the SIP-unadapted terminals 5 and 7 each having no SIP module through the gateway servers 4 and 6 each having the SIP module, it is possible, like in the foregoing one embodiment of this invention, to prevent unauthorized use of an encryption key otherwise caused by loss thereof and to securely perform a direct communication between the terminals using the encryption key even between the SIP-unadapted terminals 5 and 7 each having no SIP module.
In each of the embodiments, the key managing/distributing server 3 is provided and a secret key (encryption key) generated by the key managing/distributing server 3 is distributed to respective terminals that perform a P2P communication. However, it may also be arranged that one of terminals that perform a P2P communication generates a secret key and the secret key is delivered to the other terminal through a relay server that relays the secret key. Therefore, this invention is not limited to the embodiments. In this case, the relay server only relays the secret key and does not participate in encryption. Further, by periodically discarding a secret key after use, it is possible to ensure a more secure communication channel.
Further, in each of the foregoing embodiments, HTTP is described as the communication method between the terminal having no SIP module and the gateway server. However, this invention is also applicable to a communication method such as short-range wireless communication [e.g. Bluetooth (registered trademark), ZigBee (international registered trademark), or the like], UWB (Ultra WideBand), or infrared communication [IrDA (Infrared Data Association)].
Number | Date | Country | Kind |
---|---|---|---|
2005-227592 | Aug 2005 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP2006/315891 | 8/4/2006 | WO | 00 | 2/5/2008 |