The present application claims priority from Japanese application JP2003-308755 filed on Sep. 1, 2003, the content of which is hereby incorporated by reference into this application.
1. Field of the Invention
This invention relates to a method for distributing a cipher code and a wireless network system. More particularly, the invention relates to a method for distributing a cipher code and a wireless network system that are employed for safely transmitting the cipher code that is first used for communication between a fixed base station and a wireless terminal and automatically update the cipher code used for subsequent normal communication.
2. Description of the Related Art
When communication is made from a wireless terminal in wireless network systems in general, physical connection such as plug-in of a cable into a port of the terminal is not necessary and the possibility is high in that a third party unnoticeably establishes connection with a fixed base station. Therefore, ordinary wireless networks generally set a cipher code for each fixed base station and inhibits connection with the fixed base station unless the wireless terminal uses the same cipher code as the cipher code so set. However, because the fixed base station wireless transmits the cipher code when the wireless terminal first connects to the fixed base station, wireless terminals in the proximity of the fixed base station may intercept and acquire the cipher code.
A communication method based on the standard called “IEEE802.1x” is known as a technology capable of solving the problem described above. This technology can execute both authentication of users and automatic updating of cipher codes.
The wireless network system shown in
Next, a cipher code distribution procedure in the IEEE802.1x standard will be explained. In the system shown in
The technology that utilizes the IEEE802.1x described above has the merit that the cipher code cannot be intercepted easily. The operation can be made in a user environment fixed to a certain extent where the user information is unitarily managed by the authentication server 704 and distribution of security information such as the cipher code is made separately. Preferably, however, the system can be utilized in a use environment in which an indefinite and large number of users can instantly make registration and can start utilization.
To automatically update the cipher code, the technology described above needs a server for authenticating the users besides the wireless apparatus as the fixed base station, and the cost of the overall system is preferably reduced. The server needs maintenance management and labor for this purpose is preferably eliminated. When a public wireless connection service is made for an indefinite number of users, it is preferred that the users can instantly start connection and utilize the network. Furthermore, the technology described above needs an initial cipher code for the first connection after the user is registered. The user must receive the report of this cipher code from the manager of the network and must separately sets the cipher code to the wireless terminal. This trouble is preferably eliminated, too.
It is a first object of the invention to provide a method for distributing cipher codes and a wireless network system that can solve the problems of the prior technology described above, can generate the cipher codes by using only a wireless apparatus as a fixed base station, can automatically update the cipher codes, can immediately register the users upon users' request and can wireless generate the initial cipher codes.
The objects described above can be accomplished by a method for distributing a cipher code in a wireless network system including one or a plurality of fixed base stations, for executing communication between the fixed base stations and wireless terminals by using the cipher code, wherein the fixed base station receiving an initial registration request generated by the wireless terminal lowers a wireless output of its own fixed base station to such an intensity that communication can be made in only an area extremely close to the own fixed base station, registers the wireless terminal making the initial registration request and distributes the cipher code to the wireless terminal.
The objects described above can be accomplished by a method for distributing a cipher code in a wireless network system including one or a plurality of fixed base stations, for executing communication between the fixed base stations and wireless terminals by using the cipher code, wherein a fixed base station for initial registration the intensity of which is lowered to such an intensity that communication can be made in only an area extremely close to the own fixed base station is disposed inside the wireless network system, receives an initial registration request generated by the wireless terminal, registers the wireless terminal making the initial registration request and distributes the cipher code to the wireless terminal.
The objects described above can be accomplished by a wireless network system having one or a plurality of fixed base stations, for executing wireless communication between a fixed base station and a wireless terminal by using a cipher code, wherein the wireless network system includes means for lowering a wireless output of its own fixed base station to such a level that communication can be made in only an area extremely close to the own fixed base station when at least one of the fixed base stations receives an initial registration request generated by the wireless terminal and means for registering the wiring terminal making the initial registration request under the state where the wireless output is lowered, and distributes the cipher code to the wire terminal.
A cipher code distribution system and a wireless network system according to the invention will be explained hereinafter in detail with reference to the accompanying drawings.
The wireless network system shown in
The output variable fixed base station 101 has a function of lowering a wireless output at the time of registration of the wireless terminal to such an extent that communication can be made within only the communication area 102 for initial registration. The output variable fixed base station may be a terminal adaptor, an access point of wireless LAN, and so forth, for example. The output variable fixed base station is connected to other base station through the wire network 106, is also connected to other network such as the Internet to communicate with the wireless terminals and provides various kinds of information services to the wireless terminals through the Internet, or the like. The wireless terminals 103, 104 and 109 may be a personal computer equipped with a wireless LAN interface, peripheral devices, and so forth, for example. The fixed base station 107 may have the same construction as that of the output variable fixed base station 101. Generally, however, the fixed base station 107 executes only the communication services to the wireless terminals inside the communication area 108 but need not have the function of executing initial registration of the wireless terminals. The output variable fixed base station 101 can switch the communication area 102 for initial registration and the normal communication area 105.
In the system according to the first embodiment of the invention described above, the output variable fixed base station 101 is a fixed base station that is used for initial registration. The system according to this embodiment of the invention may be constituted by using a later-appearing fixed base station for initial registration in place of the output variable fixed base station 101. In the embodiment shown in
The user acquires registration permission of the wireless terminal 103 from a system manager and receives information necessary for registration such as an address of a base station used for initial registration and a password. The user establishes connection with the fixed base station used for initial registration by using the address and the password and makes an initial registration request. After receiving the registration request, the fixed base station used for initial registration creates a communication area for initial registration having a reduced communicable area by lowering the wireless output and makes it possible to execute communication only inside this communication area 102 for initial registration. Consequently, the user can make initial registration by carrying the wireless terminal 103 into the communication area 102 for initial registration.
In contrast, those wireless terminals which do not acquire the permission of initial registration cannot generate the registration request. In addition, initial registration can be made only inside the communication area 102 for initial registration. Therefore, initial registration information cannot be intercepted unless the wireless terminal is taken into the communication area 102 for initial registration. In other words, the radius of the communication area 102 for initial registration may well be limited to about 50 cm so that the users who do not acquire the initial registration permission can be inhibited from entering the communication area 102 for initial registration. When the communication area 102 for initial registration is limited to the near distance in this way, the cipher codes can be distributed safely and reliably to the wireless terminals acquiring the permission of registration. After initial registration is complete, the user making the initial registration can start encryption communication by receiving the cipher code from the fixed base station used for initial registration.
In the system described above, the user or the manager can decide at the time of registration the term in which the registration information of the user is stored in the fixed base station. The user can connect to the fixed base station during this term on the basis of the registration information already available without making re-registration. After this predetermined period passes, registration becomes invalid and the user must register once again. Therefore, the registration status of the user can be managed.
When an indefinite number of users are handled, the aforementioned system for authentication using the authentication server involves the problems that user management by the manager is extremely complicated and difficult and convenience to the users is low, too. In contrast, the system according to this embodiment can reduce the burden of the manager and can improve convenience for the users. The system of this embodiment is effective particularly in an environment in which an indefinite and large number of users use the system such as the case where the wireless network is opened for a day for purchasers of coffee in a coffee shop, for example.
The output variable fixed base station 101 includes an antenna portion 201 for outputting a wireless signal, a wireless communication portion 202 for inputting and outputting the wireless signals and executing modulation and demodulation of the wireless signals, a wire communication portion 204 for communicating with the wire network 106, a controller 203 for making control between wire and wireless communication and a storage device 205 for storing information of the wireless terminals, and so forth, as shown in
A wireless terminal information storage portion 206 is provided inside the storage device 205. The content of the information stored in this wireless terminal information storage portion 206 includes an MAC address of the wireless terminal registered and a cipher code used for encryption corresponding to the wireless terminal. These information is taken from the wireless terminal to the own fixed base station through wireless communication. The output variable fixed base station 101 is so constituted as to be capable of controlling the wireless output and its control is executed inside the radio wave control portion 208 of the controller 23. The output variable fixed base station 101 executes wireless transmission output control and makes it possible to execute communication only inside the communication area 102 for initial registration. When the maximum distance from the base station 101 of the normal communicable area 105 is 100 m and the communication area 102 for initial registration is 50 cm or below, for example, the wireless output may well be lowered to {fraction (1/200)}. In other words, the wireless output may be lowered by about 25 dB.
The circuit shown in
When ordinary communication is made, the switch SW is so controlled as to connect the resistor R2 between the input/output terminals of the amplifier AMP. In consequence, the amplification ratio of this amplifier AMP is given by (1+R2/R1) and the wireless signal inputted to the input terminal of the amplifier AMP on the positive side is amplified by (1+R2/R1) times and outputted. When the registration request is made, the switch SW is so controlled by the output control signal as to connect the resistor R3 between the input/output terminals of the amplifier AMP. As a result, the amplification ratio of the amplifier AMP is (1+R3/R1) and the wireless signal inputted to the input terminal on the positive side of the amplifier AMP is amplified by (1+R3/R1) times and outputted. The wireless output can be changed over through the control of the switch SW by setting the values of the resistors R1, R2 and R3 to suitable values.
(1) When the initial registration request of the user from the wireless terminal 103 occurs, the output variable fixed base station 101 receives this request and lowers the wireless output of its own base station by means of the radio wave control portion 208 so that the communicable area of the channel used by the wireless terminal 103 becomes a narrow area extremely adjacent to the own base station as the initial registration communication area 102 explained with reference to
(2) After the wireless output of the own base station is lowered, the output variable fixed base station 101 requires the wireless terminal 103 to respond in reply to the initial registration request from the wireless terminal 103. When the response from the wireless terminal 103 is not acquired, the output variable fixed base station 101 judges that the wireless terminal 103 does not exist sufficiently close the own base station 101, returns the wireless output to the normal output and does not execute the subsequent processing (sequence 303).
(3) When the output variable fixed base station 101 can receive the response from the wireless terminal 103 in reply to the response request in the sequence 303, the output variable fixed base station 101 requires the wireless terminal 103 to input registration information such as the MAC address (sequences 304 and 305).
(4) The wireless terminal 103 transmits the registration information in response to the input request in the sequence 305. The output variable fixed base station 101 receives the response from the wireless terminal 103 and then distributes the cipher code to the wireless terminal 103 (sequences 306 and 307).
(5) The output variable fixed base station 101 then returns the wireless output of the own base station to the normal output and makes it possible to conduct encryption communication by using the wireless terminal 103 and the initial cipher code (sequences 308 and 309).
In the procedure explained above with reference to
In this case, communication can be continued by assigning a higher priority of normal communication to initial registration and rejecting the registration request from other terminals for a predetermined period even when a registration request successively occurs immediately after registration of one terminal is complete. In other words, communication can be recovered soon after the lapse of a relatively short time in which one terminal executes initial registration.
As another method, it is possible to employ a method that transmits only a beacon at the normal output even when initial registration of one wireless terminal is made so as to prevent the output variable fixed base station 101 from disappearing.
(1) As explained above, the user who has made initial registration receives the cipher code used for communication. Therefore, encryption communication is thereafter made by using the cipher code received between the fixed base station and the wireless terminal of the user (sequence 601).
(2) The fixed base station distributes the cipher code 1 ciphered by the cipher code used at present to the wireless terminals after the passage of a predetermined time or a random time (sequence 602).
(3) Receiving the updated cipher code 1, the wireless terminal reports the reception of the cipher code 1 to the fixed base station (603) and thereafter makes encryption communication by using the updated cipher code 1 (sequences 603 and 604).
(4) A new cipher key is distributed in the same way as described above after the passage of a predetermined updating time or a random time and the processing described above is repeated. The manager can arbitrarily set the updating time of the cipher code.
The explanation of the first embodiment of the invention given above is based on the assumption that one fixed base station executes both initial registration of the user and normal communication. However, the invention may include a fixed base station dedicated to initial registration of the user.
In the wireless network system shown in
The fixed base station 401 for initial registration includes an antenna portion 201 for outputting wireless signals, a wireless communication portion 202 for modulating and demodulating the wireless signals, a wire communication portion 204 for exchanging the signals with the wire network, a controller 203 for controlling wire and wireless communication and a storage device 205 for building up identification information of the own fixed base station and information of frequency bands or for storing information of the wireless terminals. The fixed base station 401 for initial registration is connected to the wire network 106.
A wireless terminal information storage portion 206 is provided inside the storage device 205. The content of the information stored in the wireless terminal information storage portion 206 includes the MAC addresses of the wireless terminals registered, the cipher code used for encryption, and so forth. These information include those which are fetched from the wireless terminal to the own fixed base station through wireless communication and those which are fetched from other fixed base stations to the own fixed base station through the wire network 106. Therefore, even when a plurality of fixed base stations exists, the wireless terminal can make communication on the basis of the registration information that has already been registered.
The fixed base station 401 for initial registration controls the wireless output by steadily setting the output of the radio wave inside the radio wave control portion 208 of the controller 203 to lower the radio wave output or by interposing the attenuator 209, or the like, between the antenna 201 and the wireless communication portion 202. In other words, the wireless output is controlled so that communication can be made only with the wireless terminal extremely close to the fixed base station 401 for initial registration.
When the initial registration request from the wireless terminal 403 occurs in the second embodiment of the invention having the construction described above, only the fixed base station 401 for initial registration accepts the request and the fixed base station 107 does not accept the request even when the wireless terminal 403 exists inside the normal communication area of the fixed base station 107. The fixed base station 401 for initial registration registers the wireless terminal 403 to the own base station in accordance with the initial registration request from the wireless terminal 403 and transmits the cipher code to the wireless terminal 403. The initial registration request from the wireless terminal 403 is made by means that inputs a specific address by using a Web browser, for example.
After registration of the wireless terminal 403 is complete, the fixed base station 401 for initial registration transmits the registration information of the wireless terminal 403 and the cipher code to the fixed base station disposed inside this system inclusive of the fixed base station 107 through the wire network 106. Consequently, the wireless terminal 403 thereafter moves as the wireless terminal 407 inside the normal communication area 108 and can make communication by utilizing the fixed base station 107. Subsequent updating of the cipher code is made in accordance with the sequence shown in
The fixed base station 107 representing the system construction of the first and second embodiments of the invention explained above and shown in
The fixed base station 107 includes an antenna portion 201 for outputting wireless signals, a wireless communication portion 202 for modulating and demodulating the wireless signals, a wire communication portion 204 for exchanging the signals with the wire network, a controller 203 for controlling wire and wireless communication and a storage device 205 for building up identification information of the own fixed base station and information of frequency bands or for storing information of the wireless terminals. The fixed base station 107 is connected to the wire network 106. A wireless terminal information storage portion 206 is provided inside the storage device 205. The content of the information stored in the wireless terminal information storage portion 206 includes the MAC addresses of the wireless terminals registered, the cipher code used for encryption, and so forth. These information are fetched to the own fixed base station through the wire network 106.
(1) When the connection request occurs from the wireless terminal, the fixed base station 107 first refers to the wireless terminal information storage portion 206 inside the storage device 205 of its own fixed based station and judges whether or not the wireless terminal making the connection request is registered. When the connection request is from the wireless terminal registered to the wireless terminal information storage portion 206, the fixed base station 107 permits the connection of the wireless terminal (steps 901 to 903).
(2) When the connection request is found from the wireless terminal not registered to the wireless terminal information storage portion 206 in the judgment of step 902, whether or not the registration information of the wireless terminal making the registration request to other fixed base station exists is confirmed. When the output variable fixed base station 101 or the fixed base station 401 for initial registration exists inside the network, the output variable fixed base station 101 or the fixed base station 401 for initial registration is first looked up and whether or not the registration of the wireless terminal making the registration request exists is judged (step 904).
(3) When the registration information of the wireless terminal making the registration request is found existing in the output variable fixed station 101 or in the fixed base station 401 for initial registration in the judgment of step 904, the wireless terminal information is received from the fixed base station and is registered to the wireless terminal information storage portion 206 of the own base station. Connection of that wireless terminal is then permitted (steps 905 and 903).
(4) When the registration information of the wireless terminal making the registration request is not found existing in the output variable fixed base station 101 or in the fixed base station 401 for initial registration in the judgment of step 904, other fixed base station 107 is searched and whether or not the fixed base station 107 to be looked up exists is judged. The absence of other base stations is judged by time-out for the request (steps 906 and 907).
(5) When the fixed base station 107 to be looked up does not exist in the judgment of step 907, the registration information of the wireless terminal is not found and the connection request from that wireless terminal is rejected (step 909).
(6) When the fixed base station 107 to be looked up is found existing in the judgment of step 907, whether or not the registration information of the wireless terminal making the registration request is registered to the fixed base station is judged. When it is not registered, the flow returns from the step 906 and the processing is repeated by searching whether or not other fixed base station exists (step 908).
(7) When the registration information of the wireless terminal making the registration request is registered to the fixed base station 107 looked up in the judgment of the step 908, the wireless terminal information is received from that fixed base station and is registered to the wireless terminal information storage portion 206 of the own base station. The connection of that wireless terminal is thereafter permitted (steps 905 and 903).
The processing in the embodiment described above can be constituted as a processing program. This processing program can be stored in a recording medium such as HD, DAT, FD, MO, DVD-ROM, CD-ROM, etc, and can be offered.
According to the embodiments of the invention described above, the cipher code used for communication can be distribute by safely executing the initial registration of the user by using only the wireless apparatus as the fixed base station without using the authentication server for the user, can limit the cost of the entire system and can reduce the burden to the manager because management of the authentication server is not necessary.
Subsequent updating of the cipher code can be made in normal communication and decryption of the cipher code by the third party becomes therefore difficult.
The invention can distribute the cipher code used for communication by safely making the initial registration of the user by using only the wireless apparatus as the fixed base station, can limit the cost of the entire system and can reduce the burden to the manager.
Because subsequent updating of the cipher code can be made in normal communication, decryption of the cipher code by the third party becomes difficult.
It should be further understood by those skilled in the art that although the foregoing description has been made on embodiments of the invention, the invention is not limited thereto and various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2003-308755 | Sep 2003 | JP | national |