+

WO2017038179A1 - Device, system and method - Google Patents

Device, system and method Download PDF

Info

Publication number
WO2017038179A1
WO2017038179A1 PCT/JP2016/066292 JP2016066292W WO2017038179A1 WO 2017038179 A1 WO2017038179 A1 WO 2017038179A1 JP 2016066292 W JP2016066292 W JP 2016066292W WO 2017038179 A1 WO2017038179 A1 WO 2017038179A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
terminal
wireless
information
network
Prior art date
Application number
PCT/JP2016/066292
Other languages
French (fr)
Japanese (ja)
Inventor
大介 川上
伊東 克俊
鈴木 英之
Original Assignee
ソニー株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ソニー株式会社 filed Critical ソニー株式会社
Publication of WO2017038179A1 publication Critical patent/WO2017038179A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/67Risk-dependent, e.g. selecting a security level depending on risk profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present disclosure relates to an apparatus, a system, and a method.
  • a terminal having a WWAN (Wireless Wide Area Network) communication function such as a smartphone and a mobile phone, can access the Internet via a mobile communication network even when the user is away from home.
  • a terminal that does not have a WWAN communication function is required to access the Internet by using another communication method such as a wireless LAN (WLAN).
  • WLAN wireless LAN
  • a communication terminal that indirectly communicates with a service providing apparatus that provides a service via another communication terminal seamlessly receives a service provided by the service providing apparatus.
  • Techniques for enabling are disclosed.
  • a device that does not perform mobile communication using a mobile communication service acquires authentication information from another device that performs mobile communication using a mobile communication service.
  • a technique for connecting to a network through different wireless communication is disclosed.
  • an improvement in convenience related to network authentication is one of the demands.
  • connection destination to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations.
  • An apparatus includes a processing unit that performs an authentication process using authentication information of another apparatus according to an authentication method selected based on network information of the wireless station.
  • connection to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations
  • An apparatus includes a processing unit that provides authentication information used in the authentication process to another apparatus that performs an authentication process using an authentication method selected based on the network information of the wireless station.
  • connection to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations.
  • a method including performing an authentication process using authentication information of another device by a processor according to an authentication method selected based on network information of the wireless station.
  • connection to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations Providing the authentication information used in the authentication process to another device that performs the authentication process by the authentication method selected based on the network information of the wireless station is provided by the processor. .
  • an authentication information providing source terminal and an authentication information providing destination terminal are provided, and the authentication information providing destination terminal is operated by the radio station acquired from each of one or more radio stations. Authentication of the authentication information providing source terminal by the authentication method selected based on the network information of the wireless station of the connection destination to the wireless station of the connection destination selected based on one or more network information related to the wireless network
  • a system includes a processing unit that performs authentication processing using information, and wherein the authentication information providing source terminal includes a processing unit that provides the authentication information to the authentication information providing destination terminal.
  • the authentication information providing destination terminal is a connection destination selected based on one or more network information about the wireless network operated by the wireless station, acquired from each of the one or more wireless stations. Performing an authentication process using authentication information of an authentication information providing source terminal according to an authentication method selected based on network information of the wireless station to which the wireless station is connected to the wireless station; and Providing the authentication information to the authentication information providing destination terminal.
  • FIG. 1 is a diagram for describing an overview of a wireless communication system according to an embodiment of the present disclosure.
  • FIG. It is a figure for demonstrating the outline
  • elements having substantially the same functional configuration may be distinguished by adding different alphabets after the same reference numerals.
  • a plurality of elements having substantially the same functional configuration are distinguished as the base stations 510A, 510B, and 510C as necessary.
  • the base stations 510A, 510B, and 510C are simply referred to as the base station 510 when it is not necessary to distinguish them.
  • FIG.1 and FIG.2 is a figure for demonstrating the outline
  • the wireless communication system 1 includes a wireless communication device 100.
  • the wireless communication system 1 includes a wireless communication device 100 and a wireless communication device 200.
  • the wireless communication device 100 is a wireless terminal capable of wireless communication with other devices.
  • the wireless communication device 100 is a notebook PC.
  • the wireless communication device 100 is a WLAN terminal that can be connected to a WLAN according to a communication method such as IEEE (Institute of Electrical and Electronics Engineers) 802.11a, 11b, 11g, 11n, 11ac, or 11ad.
  • IEEE Institute of Electrical and Electronics Engineers
  • the WLAN terminal 100 can connect to a wireless network 500 via a base station 510 and use a service provided by the service network 400.
  • the WLAN terminal 100 can form a wireless connection with the wireless communication device 200.
  • This wireless connection can be formed according to an arbitrary communication method such as Bluetooth (registered trademark) or NFC (Near field communication).
  • the WLAN terminal 100 can be connected to a WLAN whose network information is known, such as a WLAN that is operated at the user's home, for example, but is difficult to connect to a WLAN whose network information such as whereabouts is unknown.
  • the wireless communication device 100 includes a PC, a tablet terminal, a PDA (Personal Digital Assistant), an HMD (Head Mounted Display), a headset, a digital camera, a digital video camera, a smartphone, a mobile phone terminal, a mobile phone, and the like. It may be realized as a music playback device, a portable video processing device, a portable game device, or the like.
  • the wireless communication device 200 is a wireless terminal capable of wireless communication with other devices.
  • the wireless communication apparatus 200 has authentication information for performing authentication to the network, and can be connected to the network independently.
  • the wireless communication device 200 is a smartphone.
  • the wireless communication apparatus 200 can form a wireless connection with the WLAN terminal 100, for example.
  • the wireless communication apparatus 200 is a WWAN terminal that has a WWAN communication function and can be connected to the WWAN.
  • the WWAN terminal 200 has subscriber identification information for connecting to a mobile communication network, performs authentication processing using the subscriber identification information, and establishes wireless connection with a wireless network 300 such as a mobile communication network. Can be formed.
  • the subscriber identification information is, for example, an IMSI (International Mobile Subscriber Identity) stored in a SIM card (Subscriber Identity Module Card).
  • the WWAN terminal 200 can use the service provided by the service network 400 by connecting to the wireless network 300 using the WWAN communication function.
  • the subscriber identification information is an example of authentication information that the WWAN terminal 200 has, and the WWAN terminal 200 may have other arbitrary information as the authentication information.
  • the wireless communication device 200 is not only a smartphone but also a notebook PC, PC, tablet terminal, PDA, HMD, headset, digital camera, digital video camera, mobile phone terminal, portable music player, portable video processing device. Alternatively, it may be realized as a portable game device or the like.
  • the wireless network 300 is a WWAN (first network) such as a mobile communication network.
  • the WWAN 300 is operated according to an arbitrary wireless communication system such as LTE (Long Term Evolution), LTE-A (LTE-Advanced), GSM (registered trademark), UMTS, W-CDMA, or CDMA2000.
  • the WWAN 300 is connected from the wireless communication device 200 located within the range of the cell operated by the base station 310.
  • the service network 400 is a public network such as the Internet.
  • the WWAN terminal 200 can access the service network 400 via the WWAN 300.
  • examples of means for realizing access to the Internet while away from home include tethering by a terminal capable of WWAN communication or use of a public WLAN.
  • Tethering is a technology for connecting other communication terminals to the WWAN 300 via a terminal having a WWAN communication function such as a smartphone.
  • the WWAN terminal 200 can be connected to the WWAN 300 and the WLAN terminal 100, the WWAN terminal 200 can function as an access point that relays communication between the WWAN 300 and the WLAN terminal 100, and can realize tethering.
  • the WLAN terminal 100 can use the service provided by the service network 400.
  • Tethering can be used wherever the WWAN terminal 200 is located in an area where WWAN communication is possible. However, since it is necessary to perform terminal setting for tethering use in both the WWAN terminal 200 and the WLAN terminal 100, the convenience of the user is impaired. Further, during tethering, the power consumption of the WWAN terminal 200 functioning as an access point is large.
  • a public WLAN is a service that provides a connection to the Internet using a WLAN.
  • a wireless network 500 shown in FIG. 2 is a public network (second network) operated by a WLAN, for example.
  • the WLAN terminal 100 can connect to the WLAN 500 to access the service network 400 or further access the service network 400 via the WWAN 300. As a result, the WLAN terminal 100 can use the service provided by the service network 400.
  • a wireless terminal having a WWAN communication function such as a smartphone is an ANDSF (Access Network Discovery and Selection Function) proposed by 3GPP (Third Generation Partnership Project), or Wi-Fi CERTIFIED proposed by Wi-Fi Alliance.
  • ANDSF Access Network Discovery and Selection Function
  • 3GPP Third Generation Partnership Project
  • Wi-Fi CERTIFIED Wi-Fi Alliance
  • the WLAN terminal 100 can be connected to the Internet by operating the WWAN terminal 200 as a tethering AP (Access Point).
  • tethering AP Access Point
  • manual settings such as connection setting to the tethering AP and tethering ON / OFF in the WWAN terminal 200 have occurred, and convenience has been impaired.
  • the WLAN terminal 100 is not compatible with Wi-Fi CERTIFIED Passpoint, it will connect without confirming the safety of the WLAN 500, which may lead to the risk of connecting to the WLAN 500 with a high security risk and damage such as eavesdropping. There was a risk of encounter.
  • the wireless communication system according to an embodiment of the present disclosure has been created with the above circumstances in mind.
  • the wireless communication system according to an embodiment of the present disclosure enables the WLAN terminal 100 to perform easy authentication to an appropriate network.
  • a wireless communication system including the wireless communication device according to an embodiment of the present disclosure will be described in detail with reference to FIGS.
  • the WWAN terminal 200 is an example of a terminal that functions as a provider of authentication information.
  • the authentication information providing source terminal 200 does not necessarily have to be capable of WWAN communication, and may have authentication information for the network.
  • the WLAN terminal 100 is an example of a terminal that functions as a provision destination of authentication information.
  • the authentication information providing destination terminal 100 may not necessarily be capable of WLAN communication, and may be connected to a network of an arbitrary communication method using the authentication information provided from the authentication information providing source terminal 200.
  • FIG. 3 is a block diagram illustrating an example of a configuration of the wireless communication system 1 according to the present embodiment.
  • the wireless communication system 1 includes a WLAN terminal 100 and a WWAN terminal 200, and provides wireless connection to the WWAN 300, the WLAN 500, and the service network 400.
  • the WWAN 300 is operated by a base station 310, a gateway 320, a subscriber information server 330, an authentication server 340, and a network information providing server 350.
  • the base station 310 is a device that serves as a contact point when a wireless terminal having a WWAN communication function is connected to the WWAN 300.
  • the base station 310 accepts a connection from the WWAN terminal 200.
  • the base station 310 corresponds to an eNB.
  • the gateway 320 is a device that relays communication between the WWAN 300 and another network.
  • the gateway 320 relays communication between the WWAN 300 and the service network 400 and communication between the WWAN 300 and the WLAN 500.
  • the gateway 320 corresponds to a P-GW (Packet Data Network Gateway).
  • the subscriber information server 330 is a device that holds subscriber information for the WWAN 300.
  • the subscriber information server 330 also holds information used for authentication processing when a wireless terminal connects to the WWAN 300.
  • the subscriber information server 330 corresponds to an HSS (Home Subscriber Server).
  • the authentication server 340 is a device that authenticates that the connection to the WWAN 300 is a connection by a WWAN 300 subscriber.
  • the authentication server 340 can perform this authentication process with reference to the subscriber information server 330.
  • the authentication server 340 corresponds to an AAA (Authentication, Authorization and Accounting) server.
  • the authentication server 340 has a function of authenticating connection to the WLAN 500.
  • an authentication protocol for the WLAN 500 an authentication protocol using a certificate such as EAP (Extensible Authentication Protocol) -TLS (Transport Layer Security) or EAP-TTLS (Tunneled Transport Layer Security) can be adopted.
  • EAP Extensible Authentication Protocol
  • TLS Transport Layer Security
  • EAP-TTLS Unneled Transport Layer Security
  • EAP-AKA EAP Method for UMTS Authentication and Key Agreement
  • EAP-SIM EAP Method for GSM Subscriber Identity Modules
  • An authentication protocol using information may be employed.
  • the authentication server 340 performs authentication processing with reference to the subscriber information server 330.
  • a terminal that has a WWAN communication function and can be connected to the WWAN 300 through authentication processing using subscriber identification information can be connected to the WLAN 500 through authentication processing using subscriber identification information.
  • IMS-AKA, Security Token, a digital certificate (Credential, Certificate), a public key, or the like may be used as an authentication protocol for the WLAN 500.
  • the network information providing server 350 is a device that provides information on a connection destination wireless network, which is necessary when the connection destination is switched from the wireless network to which the wireless terminal is currently connected to another wireless network.
  • the network information providing server 350 can provide network information for connecting to the WLAN 500 to the WWAN terminal 200.
  • the network information providing server 350 corresponds to an ANDSF server.
  • the TLS server 360 is a server that performs authentication by EAP-TTLS among TLS that is one of EAP authentication protocols. Specifically, the TLS server 360 performs authentication using a user name and password protected by key encryption. Note that the verification of the user name and password is performed by the authentication server 340.
  • the WLAN 500 is a public network operated by the base station 510.
  • the communication system of the public network is described as being WLAN, but may be operated according to any other communication system such as Bluetooth.
  • the base station 510 is a device that serves as a contact point when a wireless terminal having a WLAN communication function connects to the WLAN 500.
  • the base station 510 receives a connection from the WLAN terminal 100.
  • the base station 510 corresponds to an access point.
  • the base station 510 can support one or more authentication protocols.
  • a plurality of base stations 510 may exist in the wireless communication system 1.
  • the BSSID Basic Service Set Identifier
  • the operating frequency may be different among the plurality of base stations 510.
  • a certificate authority may exist outside the wireless communication system 1.
  • the certificate authority issues an electronic certificate for EAP-TLS.
  • FIG. 4 is a block diagram illustrating an example of a logical configuration of the WLAN terminal 100 according to the present embodiment.
  • the WLAN terminal 100 includes a wireless communication unit 110, an output unit 120, a storage unit 130, and a processing unit 140.
  • the wireless communication unit 110 is a communication module that transmits / receives data to / from an external device.
  • the wireless communication unit 110 can perform wireless communication using various communication methods.
  • the wireless communication unit 110 includes a WLAN module 112 and can perform wireless communication using Wi-Fi (registered trademark) or WLAN.
  • the wireless communication unit 110 includes a BT (Bluetooth) module 114 and can perform wireless communication using Bluetooth.
  • the wireless communication unit 110 includes an NFC module 116 and can perform wireless communication using NFC.
  • the wireless communication unit 110 can function as a first wireless communication unit that performs pairing and wireless communication with the WWAN terminal 200.
  • the wireless communication unit 110 performs pairing and wireless communication with the WWAN terminal 200 using a near field communication method such as NFC, Bluetooth, Bluetooth Low Energy, Wi-Fi Direct (registered trademark), or WLAN.
  • the wireless communication unit 110 may perform pairing and wireless communication with the WWAN terminal 200 using a short-range wireless communication method such as ZigBee (registered trademark) or IrDA (Infrared Data Association).
  • the wireless communication unit 110 can function as a second wireless communication unit that performs wireless communication by connecting to a public network.
  • the wireless communication unit 110 connects to the WLAN 500 using a wireless communication method such as WLAN.
  • the public network may support any wireless communication method other than WLAN, and in that case, the wireless communication unit 110 can connect to the public network using a wireless communication method according to the public network.
  • the wireless communication unit 110 may perform measurement processing such as measuring RSSI (Received Signal Strength Indicator) from the strength of the signal received from the WLAN 500.
  • RSSI Receiveived Signal Strength Indicator
  • the wireless communication unit 110 may perform wireless communication using the same communication method for wireless communication with the WWAN terminal 200 and wireless communication with the public network.
  • the wireless communication unit 110 may connect to the WLAN 500 while communicating with the WWAN terminal 200 using WLAN.
  • the wireless communication unit 110 includes ZigBee (registered trademark, IEEE 802.15.4), Z-Wave (registered trademark), ANT (registered trademark), ANT + (registered trademark), WiSUN (registered trademark, IEEE 802.15). .4g), wireless communication may be performed using other communication methods such as Wi-Fi Direct (registered trademark). Further, the wireless communication unit 110 may function as a mesh network node, and may perform wireless communication using, for example, IEEE 802.11s. Of course, the mesh network may be formed using other communication methods such as Bluetooth or ZigBee.
  • the output unit 120 has a function of outputting information by video, image, audio, or the like.
  • the output unit 120 is realized by, for example, a CRT (Cathode Ray Tube) display device, a liquid crystal display (Liquid Crystal Display) device, a speaker, or the like.
  • Storage unit 130 is a part that records and reproduces data on a predetermined recording medium.
  • the storage unit 130 may store information received from the WWAN terminal 200 by the wireless communication unit 110.
  • the processing unit 140 functions as an arithmetic processing device and a control device, and controls the overall operation within the WLAN terminal 100 according to various programs. As illustrated in FIG. 4, the processing unit 140 includes an acquisition unit 142, a selection unit 144, a notification unit 146, and an authentication processing unit 148. The processing unit 140 may further include other components other than these components. That is, the processing unit 140 can have functions other than the functions of these components.
  • the functions of the acquisition unit 142, the selection unit 144, the notification unit 146, and the authentication processing unit 148 will be described in detail later.
  • FIG. 5 is a block diagram illustrating an example of a logical configuration of the WWAN terminal 200 according to the present embodiment.
  • the WWAN terminal 200 includes a wireless communication unit 210, a storage unit 220, an authentication information storage unit 230, and a processing unit 240.
  • the wireless communication unit 210 is a communication module that transmits / receives data to / from an external device.
  • the wireless communication unit 210 can perform wireless communication using various communication methods.
  • the wireless communication unit 210 includes a WWAN module 212 and can perform wireless communication using the WWAN 300.
  • the wireless communication unit 210 includes a WLAN module 214 and can perform wireless communication using Wi-Fi or WLAN.
  • the wireless communication unit 210 includes a BT module 216 and can perform wireless communication using Bluetooth.
  • the wireless communication unit 210 includes an NFC module 218 and can perform wireless communication using NFC.
  • the wireless communication unit 210 can function as a fourth wireless communication unit that performs pairing and wireless communication with the WLAN terminal 100.
  • the wireless communication unit 210 performs pairing and wireless communication with the WLAN terminal 100 using a short-range wireless communication method such as NFC, Bluetooth, Bluetooth Low Energy, Wi-Fi Direct, or WLAN.
  • the wireless communication unit 210 may perform pairing and wireless communication with the WLAN terminal 100 using a short-range wireless communication method such as ZigBee or IrDA (Infrared Data Association).
  • the wireless communication unit 210 can function as a third wireless communication unit that performs wireless communication by connecting to the WWAN 300 using the WWAN module 212.
  • the wireless communication unit 210 communicates with the authentication server 340 via the WWAN module 212.
  • the wireless communication unit 210 can function as a fifth wireless communication unit that performs wireless communication by connecting to the WLAN 500 using the WLAN module 214.
  • the wireless communication unit 210 communicates with the base station 510 via the WLAN module 214.
  • the wireless communication unit 210 wirelessly uses other communication methods such as ZigBee (IEEE 802.15.4), Z-Wave, ANT, ANT +, WiSUN (IEEE 802.15.4g), Wi-Fi Direct, and the like. Communication may be performed. Further, the wireless communication unit 210 may function as a mesh network node, and may perform wireless communication using, for example, IEEE 802.11s. Of course, the mesh network may be formed using other communication methods such as Bluetooth or ZigBee.
  • the storage unit 220 is a part that records and reproduces data on a predetermined recording medium.
  • the storage unit 220 may store information received from the WWAN 300 by the wireless communication unit 210.
  • the storage unit 220 may store device information of the WLAN terminal 100 with which pairing has been established, capability information, or information indicating the purpose of wireless communication with the WLAN 500.
  • the authentication information storage unit 230 has a function of storing authentication information for the network.
  • the authentication information storage unit 230 is realized by a SIM card that stores subscriber identification information for the WWAN 300.
  • the authentication information storage unit 230 may be realized as a storage medium that stores an electronic certificate for EAP-TLS or a user name and password for EAP-TTLS.
  • the authentication information storage unit 230 may be realized as a storage medium that stores a pre-shared key (PSK: Phase Shift Keying) or a passphrase for WPA2-PSK or WPA-PSK.
  • PSK Phase Shift Keying
  • the processing unit 240 functions as an arithmetic processing device and a control device, and controls the overall operation within the WWAN terminal 200 according to various programs. As illustrated in FIG. 5, the processing unit 240 includes a selection unit 242, an authentication processing unit 244, and a tethering processing unit 246. Note that the processing unit 240 may further include other components other than these components. That is, the processing unit 240 can have functions other than the functions of these components.
  • the functions of the selection unit 242, the authentication processing unit 244, and the tethering processing unit 246 will be described in detail later.
  • the WLAN terminal 100 acquires network information related to a wireless network operated by the wireless station from each of one or more wireless stations.
  • the WLAN terminal 100 causes the wireless communication unit 110 to receive a notification signal (for example, a beacon) issued by a wireless station and transmit a network information request (for example, a probe request) to the wireless station that is the notification source of the notification signal. Then, network information is acquired based on the result.
  • the network information may include, for example, radio station identification information, channel information, RSSI information, communication method information, authentication method information, and the like.
  • the identification information may be, for example, an SSID (Service Set Identifier), a BSSID (Basic Service Set Identifier), or an ESSID (Extended Service Set Identifier).
  • the communication method information is information indicating a communication method supported by the wireless station, and may include, for example, information indicating whether each of 802.11a, 11b, 11g, 11n, and 11ac is supported.
  • the authentication method information is information indicating an authentication method supported by the wireless station, and may include, for example, information indicating whether or not 802.1X authentication is supported.
  • the wireless station from which network information is acquired as a connection destination candidate may be the base station 510 or the WWAN terminal 200 operable as a tethering AP.
  • the network information may be acquired from the WWAN terminal 200 that is operating as a tethering AP, or may be acquired from the WWAN terminal 200 that is not operating as a tethering AP.
  • the acquisition of network information may be performed by the WWAN terminal 200.
  • the WWAN terminal 200 can acquire information known to itself such as its communication method information.
  • connection destination selection The WLAN terminal 100 (for example, the selection unit 144) selects a connection destination radio station based on one or more acquired networks.
  • the WLAN terminal 100 selects a wireless station based on information indicating the state of the wireless communication environment between the WLAN terminal 100 and the wireless station, such as RSSI information and channel information. Specifically, the WLAN terminal 100 may preferentially select a radio station that has good RSSI and is not congested. As a result, a more suitable connection destination can be selected.
  • the WLAN terminal 100 selects a radio station based on the communication method information. Specifically, the WLAN terminal 100 may preferentially select a radio station that supports a communication method with a higher transmission speed. As a result, a more suitable connection destination can be selected.
  • the WLAN terminal 100 selects a radio station based on the authentication method information. Specifically, the WLAN terminal 100 may preferentially select a radio station that is compatible with an authentication method with higher security and higher usability. As a result, a more suitable connection destination can be selected.
  • the WLAN terminal 100 may select a connection destination radio station based on the connection history of the WWAN terminal 200. Specifically, the WLAN terminal 100 refers to the connection history of the WWAN terminal 200 and prioritizes a wireless station connected in the past or a wireless station connected more recently when there are a plurality of wireless stations connected in the past. May be selected. Based on the connection history, it is possible to select a connection destination with a connection history in the past. In addition, since a connection destination that has generated authentication information in the past is selected, generation of authentication information by the WWAN terminal 200 can be omitted. Note that the WLAN terminal 100 may also be used for selecting a connection-destination radio station with reference to its own connection history.
  • the WLAN terminal 100 may select a connection destination radio station based on a network selection policy.
  • the network selection policy is information including information relating to a network communication method, network priority, and network identification information. Based on the network selection policy, a more appropriate connection destination can be selected.
  • Set_1 includes information regarding the three networks, and the priority order is set by AccessNetworkPriority.
  • the connection destination may be selected by the WWAN terminal 200 (for example, the selection unit 242).
  • the WLAN terminal 100 selects an authentication method based on network information of a connection destination wireless station.
  • the WLAN terminal 100 may select an authentication method based on the strength of security. Specifically, the WLAN terminal 100 preferentially selects an authentication method with high security strength. This makes it possible to connect to a more secure network.
  • the WLAN terminal 100 may select an authentication method based on high usability. Specifically, the WLAN terminal 100 preferentially selects an authentication method that does not require manual operation such as password entry by the user or installation of an electronic certificate. As a result, it is possible to improve convenience related to authentication to the network.
  • EAP-AKA ′ when an authentication method having a higher priority is arranged in the order of lower priority, for example, EAP-AKA ′, EAP-AKA, EAP-SIM, EAP-TLS, EAP-TTLS, WPA2-PSK, and WPA-PSK are obtained.
  • the higher the priority the higher the security strength and the higher usability. Also, the lower the priority, the lower the security strength and the lower the usability.
  • the authentication method is uniquely determined and the selection of the authentication method is omitted.
  • the WLAN terminal 100 may select an authentication method after selecting a connection-destination wireless station, or may select a connection-destination wireless station after selecting an authentication method. For example, for devices with poor input means such as HMD (Head Mounted Display), the latter selection order in which an authentication method such as EAP-AKA that does not require user input is preferentially selected is desirable. In addition, the WLAN terminal 100 may simultaneously select a connection destination wireless station and an authentication method.
  • HMD Head Mounted Display
  • the selection of the authentication method may be performed by the WWAN terminal 200 (for example, the selection unit 242).
  • either the WLAN terminal 100 or the WWAN terminal 200 may perform selection of a connection destination radio station and selection of an authentication method. Therefore, the WLAN terminal 100 (for example, the selection unit 144) determines whether the wireless terminal and the authentication method of the connection destination are selected by the WLAN terminal 100 or the WWAN terminal 200. For example, the WLAN terminal 100 may select a person who has a network selection policy as a selection subject, and if both have a selection subject, may have a more recent one as a selection subject. Further, the WLAN terminal 100 may use the WLAN terminal 100 as a selection subject by default.
  • the WLAN terminal 100 is difficult to acquire network information when the WWAN terminal 200 operates as a tethering AP. Good. As described above, the WLAN terminal 100 can flexibly change the connection-destination radio station and the authentication method selection subject according to the situation.
  • the network information is notified to the selected entity.
  • the WLAN terminal 100 notifies the acquired network information to the WWAN terminal 200. The reverse is also true.
  • the WLAN terminal 100 (for example, the authentication processing unit 148) performs an authentication process using the authentication information of the WWAN terminal 200.
  • the WLAN terminal 100 authenticates to the network by EAP-AKA ′, EAP-AKA, or EAP-SIM using the subscriber identification information of the WWAN terminal 200.
  • the WLAN terminal 100 may authenticate to the network by EAP-TLS using the electronic certificate of the WWAN terminal 200.
  • the WLAN terminal 100 may authenticate to the network by EAP-TTLS using the user name and password of the WWAN terminal 200.
  • the WLAN terminal 100 may authenticate to the network using WPA2-PSK or WPA-PSK using the PSK or passphrase of the WWAN terminal 200.
  • the WLAN terminal 100 can use the authentication information of the WWAN terminal 200 to authenticate to a network that is difficult to authenticate by itself and connect to the Internet.
  • the WWAN terminal 200 (for example, the authentication processing unit 244) provides authentication information used in authentication processing by the WLAN terminal 100. As a result, the WLAN terminal 100 can authenticate to the network. Note that the WWAN terminal 200 may provide authentication information based on a request from the WLAN terminal 100 when the selection subject of the connection destination wireless station is the WLAN terminal 100. Further, when the selection subject of the connection destination wireless station is itself, the WWAN terminal 200 may provide authentication information together with information indicating the connection destination wireless station.
  • the authentication information provided may not be the information itself stored in the authentication information storage unit 230.
  • the WWAN terminal 200 provides authentication information generated based on at least one of subscriber identification information, electronic certificate, user name and password, PSK or passphrase stored in the authentication information storage unit 230. May be. Thereby, the confidential information of the WWAN terminal 200 is prevented from being leaked, and security can be ensured.
  • a short-range wireless communication system such as Bluetooth or NFC can be used.
  • Wi-Fi Direct or the like may be used to provide authentication information.
  • the WWAN terminal 200 may perform processing for functioning as a wireless station. More simply, the WWAN terminal 200 may operate as a tethering AP.
  • the WWAN terminal 200 may perform processing for functioning as a tethering AP with a request from the WLAN terminal 100 as a trigger. Specifically, the WWAN terminal 200 may perform processing for functioning as a tethering AP with the reception of a request for authentication information from the WLAN terminal 100 as a trigger. For example, the WWAN terminal 200 may be triggered by reception of a request for authentication information from the WLAN terminal 100 to the tethering AP (that is, a request for authentication information specifying identification information of the WWAN terminal 200 itself). Further, the WWAN terminal 200 may be triggered by the reception of a request for authentication information related to the base station 510 that does not have authentication information.
  • the WWAN terminal 200 can start (that is, can be activated) as a tethering AP with the reception of a signal from the WLAN terminal 100 as a trigger. This eliminates the need for manual operation such as connection setting to the tethering AP and tethering ON / OFF in the WWAN terminal 200, thereby improving convenience.
  • the WLAN terminal 100 (for example, the acquisition unit 142, the selection unit 144, the notification unit 146, and the authentication processing unit 148) can output information indicating the processing content.
  • 6 and 7 show examples of user interfaces that can be output to the output unit 120.
  • FIG. For example, when obtaining network information or selecting a connection destination, the user interface 11 is displayed.
  • the user interface 12 is displayed. Note that “AP_NAME” in the figure is the name of the wireless station.
  • the user interface 13 is displayed.
  • a user interface 14 is displayed to search for another connection destination and connect again. When the connection (that is, authentication) is successful again, the user interface 13 is displayed. Note that the user can interrupt the connection process at any time by pressing a cancel button.
  • FIG. 8 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 8, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
  • the communication module used for message exchange is illustrated with the word “module” omitted.
  • a message having a WLAN (Wi-Fi) module 112 as a starting point or an ending point indicates that the WLAN module 112 transmits and receives.
  • the WLAN terminal 100 and the WWAN terminal 200 have been previously paired by near field communication (for example, Bluetooth) and a communication path has been established. In the following description, it is omitted which communication module is sending and receiving messages. These points are the same in other sequences after FIG.
  • the WLAN terminal 100 transmits a network information request to the base station 510 (step S102), and receives network information from the base station 510 (step S104).
  • This series of procedures is, for example, a probe process.
  • the WLAN terminal 100 performs a selection process (step S106). For example, the WLAN terminal 100 selects a connection destination radio station based on the acquired network information, connection history, and network selection policy, and selects an authentication method. In this sequence, it is assumed that the base station 510 is selected as the connection destination.
  • the WLAN terminal 100 performs an authentication process (step S108).
  • the WLAN terminal 100 uses the authentication information provided from the WWAN terminal 200 to perform an authentication process for a connection destination wireless station (that is, the base station 510 in this sequence).
  • the authentication process will be described in detail later with reference to FIGS.
  • the WLAN terminal 100 establishes a security session (step S110). For example, the WLAN terminal 100 performs 4-Way Handshake with the connected wireless station. In 4-Way Handshake, the WLAN terminal 100 generates key information by exchanging random numbers and MAC addresses with a connected wireless station, and establishes a security session.
  • the WLAN terminal 100 establishes an IP session with the connection destination wireless station (step S112).
  • the WLAN terminal 100 receives an IP address assignment by DHCP (Dynamic Host Configuration Protocol) or the like and establishes an IP session.
  • DHCP Dynamic Host Configuration Protocol
  • FIG. 9 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment.
  • the WWAN terminal 200, the WLAN terminal 100, and a plurality of base stations 510 that is, 510A, 510B, and 510C are involved in this sequence.
  • the WLAN terminal 100 transmits a network information request to the base station 510A (step S102A) and receives network information from the base station 510A (step S104A). Similarly, the WLAN terminal 100 transmits a network information request to the base station 510B (step S102B) and receives network information from the base station 510B (step S104B). Further, the WLAN terminal 100 transmits a network information request to the base station 510C (step S102C) and receives network information from the base station 510C (step S104C).
  • the WLAN terminal 100 performs a selection process (step S106). For example, the WLAN terminal 100 selects a connection destination wireless station based on the acquired three pieces of network information, and selects an authentication method. In this sequence, it is assumed that the base station 510C is selected as the connection destination. Note that the WLAN terminal 100 may perform the selection process after the network information from all the base stations 510 (that is, 510A, 510B, and 510C) that requested the network information has been prepared, or each time it is received. A selection process may be performed.
  • the WLAN terminal 100 performs an authentication process for the base station 510C (step S108), establishes a security session with the base station 510C (step S110), and establishes an IP session (step S112).
  • FIG. 10 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment.
  • the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence. It is assumed that the WWAN terminal 200 is not operating as a tethering AP at the start of this sequence.
  • the WLAN terminal 100 transmits a network information request to the base station 510 (step S202), and receives network information from the base station 510 (step S204).
  • the WLAN terminal 100 performs a selection process (step S206). In this sequence, it is assumed that the WWAN terminal 200 is selected as the connection destination.
  • the WLAN terminal 100 performs an authentication process (step S208).
  • the WLAN terminal 100 activates the WWAN terminal 200 as a tethering AP by transmitting a request for authentication information to the tethering AP to the WWAN terminal 200.
  • the WLAN terminal 100 establishes a security session with the WWAN terminal 200 (step S210) and establishes an IP session (step S212).
  • the WWAN terminal 200 is activated as a tethering AP when the WWAN terminal 200 is selected as a connection destination in step S208.
  • the WWAN terminal 200 can be activated as a tethering AP even when a base station 510 to which the WWAN terminal 200 does not have authentication information is selected as a connection destination in step S208. This point will be described in detail later with reference to FIG.
  • the WLAN terminal 100 may once activate the WWAN terminal 200 as a tethering AP, acquire network information, perform a selection process, and select a connection destination.
  • FIG. 11 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 11, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence. It is assumed that the WWAN terminal 200 is operating as a tethering AP at the start of this sequence.
  • the WLAN terminal 100 transmits a network information request to the base station 510 (step S202A) and receives network information from the base station 510 (step S204A). Similarly, the WLAN terminal 100 transmits a network information request to the WWAN terminal 200 that operates as a tethering AP (step S202B), and receives network information from the WWAN terminal 200 (step S204B).
  • the WLAN terminal 100 performs a selection process (step S206). In this sequence, it is assumed that the WWAN terminal 200 is selected as the connection destination.
  • the WLAN terminal 100 performs an authentication process for the WWAN terminal 200 (step S208), establishes a security session with the WWAN terminal 200 (step S210), and establishes an IP session (step S212).
  • FIG. 12 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 12, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
  • the WLAN terminal 100 transmits a network information request to the base station 510 (step S302), and receives network information from the base station 510 (step S304).
  • the WLAN terminal 100 notifies the WWAN terminal 200 of the network information acquired from the base station 510 (step S306). Specifically, the WLAN terminal 100 determines that the connection-target radio station and authentication method selection entity is the WWAN terminal 200 and notifies the WWAN terminal 200 of network information.
  • the WWAN terminal 200 performs a selection process (step S308). For example, the WWAN terminal 200 selects a connection-destination radio station based on the acquired network information, connection history, and network selection policy, and selects an authentication method. In this sequence, it is assumed that the base station 510 is selected as the connection destination.
  • the WWAN terminal 200 notifies the WLAN terminal 100 of information indicating the selection result (step S310). For example, the WWAN terminal 200 notifies the WLAN terminal 100 of identification information of the selected base station 510, information indicating the selected communication method, information indicating the selected authentication method, and the like.
  • the WLAN terminal 100 performs an authentication process (step S312). For example, the WLAN terminal 100 performs an authentication process to the base station 510 according to information indicating the selection result notified from the WWAN terminal 200.
  • the WLAN terminal 100 establishes a security session with the base station 510C (step S314) and establishes an IP session (step S316).
  • FIG. 13 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment.
  • the WWAN terminal 200, the WLAN terminal 100, and a plurality of base stations 510 that is, 510A, 510B, and 510C are involved in this sequence.
  • the WLAN terminal 100 transmits a network information request to the base station 510A (step S302A) and receives network information from the base station 510A (step S304A). Similarly, the WLAN terminal 100 transmits a network information request to the base station 510B (step S302B) and receives network information from the base station 510B (step S304B). Also, the WLAN terminal 100 transmits a network information request to the base station 510C (step S302C) and receives network information from the base station 510C (step S304C).
  • the WLAN terminal 100 notifies the WWAN terminal 200 of the network information acquired from the base stations 510A, 510B and 510C (step S306).
  • the WWAN terminal 200 performs a selection process (step S308). In this sequence, it is assumed that the base station 510A is selected as the connection destination.
  • the WWAN terminal 200 notifies the WLAN terminal 100 of information indicating the selection result (step S310).
  • the WLAN terminal 100 performs an authentication process for the base station 510A (step S312), establishes a security session with the base station 510A (step S314), and establishes an IP session (step S316).
  • FIG. 14 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 14, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
  • a mesh network using a WLAN is formed between the WLAN terminal 100 and the WWAN terminal 200.
  • the WLAN module 214 of the WWAN terminal 200 and the WLAN module 112A of the WLAN terminal 100 function as a mesh station and can communicate with each other via a mesh network.
  • the WLAN module 112B of the WLAN terminal 100 also functions as a station that performs communication with an AP (for example, the base station 510).
  • the WLAN terminal 100 transmits a network information request to the base station 510 (step S402) and receives network information from the base station 510 (step S404).
  • the WLAN terminal 100 performs a selection process (step S406). In this sequence, it is assumed that the base station 510 is selected as the connection destination.
  • the WLAN terminal 100 performs an authentication process for the base station 510 (step S408), establishes a security session with the base station 510 (step S410), and establishes an IP session (step S412).
  • the authentication process will be described in detail later with reference to FIGS. 15 to 22, communication between the WWAN terminal 200 and the WLAN terminal 100 is performed by a mesh network instead of Bluetooth.
  • the selection main body may be the WWAN terminal 200 and the WWAN terminal 200 itself which operate
  • the authentication process will be described in detail with reference to FIGS.
  • FIG. 15 is an example in the case where the authentication destination is the base station 510
  • FIG. 16 is an example in the case where the authentication destination is the WWAN terminal 200.
  • FIG. 15 is a sequence diagram showing an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 15, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
  • the WLAN terminal 100 transmits a request for authentication information to the WWAN terminal 200 (step S502).
  • the WLAN terminal 100 designates identification information of the connection destination base station 510 and transmits a request for authentication information.
  • the WLAN terminal 100 receives authentication information from the WWAN terminal 200 (step S504).
  • the WLAN terminal 100 receives a PSK or a passphrase as authentication information.
  • the WLAN terminal 100 performs association with the base station 510 using the received PSK or passphrase (step S506).
  • Wi-Fi operation is started between the WLAN terminal 100 and the base station 510 (step S508).
  • FIG. 16 is a sequence diagram showing an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 16, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
  • the WLAN terminal 100 transmits a request for authentication information to the WWAN terminal 200 (step S602).
  • the WLAN terminal 100 designates identification information of the connection destination base station 510 and transmits a request for authentication information.
  • the WWAN terminal 200 starts tethering processing and starts up as a tethering AP (step S604).
  • the WWAN terminal 200 may be activated as a tethering AP when it does not have authentication information of the designated base station 510. Further, even if the WWAN terminal 200 has the authentication information of the designated base station 510, the WWAN terminal 200 may be activated as a tethering AP when it is determined that tethering is effective based on communication quality or the like. Further, the WWAN terminal 200 may be activated as a tethering AP when the WWAN terminal 200 itself is designated in the request for authentication information.
  • the WLAN terminal 100 receives authentication information from the WWAN terminal 200 (step S606).
  • the WLAN terminal 100 receives a PSK or a passphrase as authentication information.
  • the WLAN terminal 100 performs association with the WWAN terminal 200 using the received PSK or passphrase (step S608).
  • Wi-Fi operation is started between the WLAN terminal 100 and the WWAN terminal 200 (step S610).
  • FIGS. 17 and 18 are sequence diagrams showing an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIGS. 17 and 18, the WWAN terminal 200, the WLAN terminal 100, the base station 510, the authentication server 340, and the subscriber information server 330 are involved in this sequence.
  • the WLAN terminal 100 performs association with the base station 510 (step S702).
  • the WLAN terminal 100 establishes a logical connection for authentication processing by association.
  • the WLAN terminal 100 cannot perform data communication other than authentication processing, for example.
  • the WLAN terminal 100 transmits EAPoL-Start to the base station 510 (step S704).
  • the base station 510 transmits EAP-Request / Identity to the WLAN terminal 100 (step S706).
  • the WLAN terminal 100 transmits the EAP-Request / Identity received in step S706 to the WWAN terminal 200 (step S708).
  • This message is a message requesting the WWAN terminal 200 to generate an Identity required for EAP-AKA.
  • the WWAN terminal 200 refers to the subscriber identification module 230 that the WWAN terminal 200 has and generates Identity (step S710).
  • the control unit 240 generates Identity based on information recorded on a SIM card that is the subscriber identification module 230.
  • the authentication protocol is EAP-AKA
  • Identity is generated based on IMSI.
  • the IMSI format is as follows. ⁇ MCC: 3 digits> ⁇ MNC: 2 or 3 digits> ⁇ MSIN: Maximum 10 digits>
  • MCC Mobile Country Code
  • MNC Mobile Network Code
  • MSIN Mobile Subscriber Identification Number
  • the WWAN terminal 200 returns EAP-Response / Identity to the WLAN terminal 100 (step S712). This message stores the Identity generated in step S710.
  • the WLAN terminal 100 transfers the received EAP-Response / Identity to the base station 510 (step S714).
  • the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S716).
  • the Identity generated by the WWAN terminal 200 is stored.
  • the authentication server 340 transmits a Retrieval-Authentication-Vector to the subscriber information server 330 and requests an authentication vector for Identity (step S718).
  • the Identity generated by the WWAN terminal 200 is stored.
  • An authentication vector is a set of information required for authenticating a connected terminal. In the case of EAP-AKA, the authentication vector includes the following information.
  • RAND random value. Used as a challenge.
  • AUTN A value for the terminal to authenticate the network.
  • XRES expected response value for challenge.
  • IK Message integrity verification key.
  • CK Key for message encryption.
  • the subscriber information server 330 executes the AKA algorithm and generates an authentication vector corresponding to the Identity stored in the received message (step S720).
  • the subscriber information server 330 transmits the generated authentication vector to the authentication server 340 (step S722).
  • the authentication server 340 transmits RADIUS-Access-Challenge to the base station 510 (step S724).
  • the authentication vector generated by the subscriber information server 330 is stored.
  • the authentication server 340 newly calculates a MAC (Message Authentication Code) and adds it to the message. This MAC is used by the WLAN terminal 100 to verify the integrity of this message.
  • MAC Message Authentication Code
  • the base station 510 transmits EAP-Request / AKA-Challenge to the WLAN terminal 100 (step S726).
  • This message includes authentication vectors RAND and AUTN, and MAC.
  • the authentication vectors XRES, IK, and CK are held by the base station 510 and are not transmitted to the WLAN terminal 100.
  • the WLAN terminal 100 transmits EAP-Request / AKA-Challenge to the WWAN terminal 200 (step S728).
  • This message is a message requesting the WWAN terminal 200 to generate a response value (RES) and a session key (IK, CK).
  • the WWAN terminal 200 executes the AKA algorithm to generate the RES, MAC, and session key (IK, CK) corresponding to the received EAP-Request / AKA-Challenge (step S730).
  • the WWAN terminal 200 transmits EAP-Response / AKA-Challenge to the WLAN terminal 100 (step S732).
  • the RES, MAC, and session key generated by the WWAN terminal 200 are stored.
  • the WLAN terminal 100 transfers the received EAP-Response / AKA-Challenge to the base station 510 (step S734).
  • the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S736).
  • This message stores the RES, MAC, and session keys (IK, CK) generated by the WWAN terminal 200.
  • the authentication server 340 verifies the received RES (step S738). Specifically, the authentication server 340 verifies that the RES generated by the WWAN terminal 200 matches the XRES generated by the subscriber information server 330 and the integrity of the message by MAC.
  • the authentication server 340 transmits RADIUS-Access-Accept to the base station 510 (step S740). This message indicates that the connection is permitted.
  • the base station 510 transmits EAP-Success to the WLAN terminal 100 (step S742). This message indicates that the authentication process has been successful for the WLAN terminal 100.
  • the base station 510 transmits EAPoL-Key to the WLAN terminal 100 (step S744).
  • This message sends a key for encrypted communication used between the WLAN terminal 100 and the base station 510.
  • connection for WLAN communication is completed between the WLAN terminal 100 and the base station 510 (step S746).
  • data communication using Wi-Fi is started between the WLAN terminal 100 and the base station 510.
  • FIG. 19 and 20 are sequence diagrams showing an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 19 and FIG. 20, the WWAN terminal 200, the WLAN terminal 100, the base station 510, and the authentication server 340 are involved in this sequence.
  • the WLAN terminal 100 performs association with the base station 510 (step S802).
  • the WLAN terminal 100 establishes a logical connection for authentication processing by association.
  • the WLAN terminal 100 cannot perform data communication other than authentication processing, for example.
  • the WLAN terminal 100 transmits EAPoL-Start to the base station 510 (step S804).
  • the base station 510 transmits EAP-Request / Identity to the WLAN terminal 100 (step S806).
  • the WLAN terminal 100 transmits EAP-Request / Identity to the WWAN terminal 200 (step S808).
  • This message is a message requesting the WWAN terminal 200 to generate an Identity required for EAP-TLS.
  • the WWAN terminal 200 transmits the generated Identity as EAP-Response / Identity to the WLAN terminal 100 (step S810).
  • the WLAN terminal 100 transmits EAP-Response / Identity to the base station 510 (step S812).
  • the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S814).
  • the authentication server 340 transmits RADIUS-Access-Challenge to the base station 510 (step S816). With this message, the authentication server 340 notifies the base station 510 of TLS Start.
  • the base station 510 transmits EAP-Request / TLS Start to the WLAN terminal 100 (step S818).
  • This message includes a notification of TLS Start.
  • the WLAN terminal 100 transmits a Request / TLS Start to the WWAN terminal 200 (step S820).
  • This message is a message for requesting the WWAN terminal 200 to start TLS.
  • the WWAN terminal 200 transmits Response / TLS Client Hello to the WLAN terminal 100 (step S822). Transmission and reception of subsequent messages including this message are performed using the encryption key included in the electronic certificate.
  • the WLAN terminal 100 transfers the message received in step S822 to the base station 510 as EAP-Response / TLS ClientHello (step S824).
  • the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S826).
  • This message includes the TLS Client Hello message received in step S824.
  • the authentication server 340 transmits RADIUS-Access-Challenge to the base station 510 (step S828).
  • This message includes Server Certificate.
  • this message includes messages such as TLS server_hello, TLS certificate, TLS server_key_change, TLS certificate_request, and TLS server_hello_done.
  • the base station 510 transfers the message received in step S828 to the WLAN terminal 100 (step S830).
  • it is illustrated as EAP-Request / passthrough.
  • the WLAN terminal 100 transfers the message received in step S830 to the WWAN terminal 200 (step S832).
  • Request / passthrough it is illustrated as Request / passthrough.
  • This message includes Client Certificate. Specifically, this message includes messages such as TLS certificate, TLS client_key_exchange, TLS_certificate_verity, TLS change_cipher_spec, and TLS finished.
  • the WLAN terminal 100 transmits an EAP-Response to the base station 510 (step S836).
  • This message includes the message received in step S834.
  • the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S838).
  • This message includes the message received in step S836.
  • the authentication server 340 transmits RADIUS-Access-Challenge to the base station 510 (step S840).
  • This message includes messages such as TLS change_cipher_spec and TLS finished.
  • the base station 510 transfers the message received in step S840 to the WLAN terminal 100 (step S842).
  • the message received in step S840 to the WLAN terminal 100 (step S842).
  • it is illustrated as EAP-Request / passthrough.
  • the WLAN terminal 100 transfers the message received in step S842 to the WWAN terminal 200 (step S844).
  • it is illustrated as Request / passthrough.
  • the WWAN terminal 200 transmits a response to the WLAN terminal 100 (step S846).
  • the WLAN terminal 100 transmits an EAP-Response to the base station 510 (step S848).
  • the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S850).
  • the authentication server 340 transmits RADIUS-Access-Accept to the base station 510 (step S852). This message indicates that the authenticating terminal is a valid user and the connection is permitted.
  • the base station 510 transmits EAP-Success to the WLAN terminal 100 (step S854). This message indicates that the authentication process has been successful.
  • the base station 510 transmits EAPoL-Key to the WLAN terminal 100 (step S856).
  • This message sends a key for encrypted communication used between the WLAN terminal 100 and the base station 510.
  • connection for WLAN communication is completed between the WLAN terminal 100 and the base station 510 (step S858).
  • data communication using Wi-Fi is started between the WLAN terminal 100 and the base station 510.
  • EAP-TTLS is selected as the authentication method, and the WLAN terminal 100 authenticates the certificate information, user name, and password of the WWAN terminal 200.
  • the flow of processing when used in the above will be described. 21 and 22, an example in which the authentication destination is the base station 510 will be described.
  • 21 and 22 are sequence diagrams illustrating an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIGS. 21 and 22, the WWAN terminal 200, the WLAN terminal 100, the base station 510, the TLS server 360 and the authentication server 340 are involved in this sequence.
  • the WLAN terminal 100 performs association with the base station 510 (step S902).
  • the WLAN terminal 100 establishes a logical connection for authentication processing by association.
  • the WLAN terminal 100 cannot perform data communication other than authentication processing, for example.
  • the WLAN terminal 100 transmits EAPoL-Start to the base station 510 (step S904).
  • the base station 510 transmits EAP-Request / Identity to the WLAN terminal 100 (step S906).
  • the WLAN terminal 100 transmits EAP-Request / Identity to the WWAN terminal 200 (step S908).
  • This message is a message for requesting the WWAN terminal 200 to generate an Identity required for EAP-TTLS.
  • the WWAN terminal 200 transmits the generated Identity as EAP-Response / Identity to the WLAN terminal 100 (step S910).
  • the WLAN terminal 100 transmits EAP-Response / Identity to the base station 510 (step S912).
  • the base station 510 transmits a RADIUS-Access-Request to the TLS server 360 (step S914).
  • the TLS server 360 transmits RADIUS-Access-Challenge to the base station 510 (step S916). With this message, the authentication server 340 notifies the base station 510 of TLS Start.
  • the base station 510 transfers the message received in step S916 to the WLAN terminal 100 (step S918).
  • it is illustrated as EAP-Request / passthrough.
  • the WLAN terminal 100 transfers the message received in step S918 to the WWAN terminal 200 (step S920).
  • Request / passthrough This message includes a TTL Start notification. That is, this message is a message for requesting the WWAN terminal 200 to start TLS.
  • the WWAN terminal 200 transmits Response / TTL Client Hello to the WLAN terminal 100 (step S922). Transmission and reception of subsequent messages including this message are performed using the encryption key included in the electronic certificate.
  • the WLAN terminal 100 transfers the message received in step S922 to the base station 510 (step S924).
  • EAP-Response / passthrough is illustrated.
  • the base station 510 transmits a RADIUS-Access-Request to the TLS server 360 (step S926).
  • This message includes the TLS Client Hello message received in step S924.
  • the TLS server 360 transmits RADIUS-Access-Challenge to the base station 510 (step S928).
  • This message includes Server Certificate.
  • this message includes messages such as TLS ServerHello, Certificate, ServerKeyExchange, and ServerHelloDone.
  • the base station 510 transfers the message received in step S928 to the WLAN terminal 100 (step S930).
  • it is illustrated as EAP-Request / passthrough.
  • the WLAN terminal 100 transfers the message received in step S930 to the WWAN terminal 200 (step S932).
  • Request / passthrough it is illustrated as Request / passthrough.
  • This message includes Client Key Exchange. Specifically, this message includes messages such as TTL ClientKeyExchange, ChangeCipherSpec, and Finished.
  • the WLAN terminal 100 transfers the message received in step S934 to the base station 510 (step S936).
  • EAP-Response / passthrough is illustrated.
  • the base station 510 transmits a RADIUS-Access-Request to the TLS server 360 (step S938).
  • This message includes the message received in step S936.
  • the TLS server 360 transmits RADIUS-Access-Challenge to the base station 510 (step S940).
  • This message includes messages such as TTL ChangeCipherSpec and Finished.
  • the base station 510 transfers the message received in step S940 to the WLAN terminal 100 (step S942).
  • the message received in step S940 to the WLAN terminal 100 (step S942).
  • it is illustrated as EAP-Request / passthrough.
  • the WLAN terminal 100 transfers the message received in step S942 to the WWAN terminal 200 (step S944).
  • it is illustrated as Request / passthrough.
  • the WWAN terminal 200 transmits a response to the WLAN terminal 100 (step S946).
  • This message includes User-Name, CHAP-Challenge, CHAP-Password, etc. as authentication information for TLS.
  • the WLAN terminal 100 transfers the message received in step S946 to the base station 510 (step S948).
  • EAP-Response / passthrough is illustrated.
  • the base station 510 transmits a RADIUS-Access-Request to the TLS server 360 (step S950).
  • This message includes the message received in step S948.
  • the TLS server 360 transmits RADIUS-Access-Request to the authentication server 340 (step S952).
  • This message includes authentication information for TLS such as User-Name, CHAP-Challenge, and CHAP-Password.
  • the authentication server 340 verifies the authentication information for TLS such as User-Name, CHAP-Challenge, and CHAP-Password received in step S952, and if there is no problem, the authentication server 340 sends the RADIUS-Access- to the TTL server 360. “Accept” is transmitted (step S954). This message indicates that the authenticating terminal is a valid user and the connection is permitted.
  • the TLS server 360 transmits RADIUS-Access-Accept to the base station 510 (step S956).
  • the base station 510 transmits EAP-Success to the WLAN terminal 100 (step S958). This message indicates that the authentication process has been successful.
  • the base station 510 transmits EAPoL-Key to the WLAN terminal 100 (step S960). This message sends a key for encrypted communication used between the WLAN terminal 100 and the base station 510.
  • connection for WLAN communication is completed between the WLAN terminal 100 and the base station 510 (step S962).
  • data communication using Wi-Fi is started between the WLAN terminal 100 and the base station 510.
  • FIG. 23 is a flowchart showing an example of the flow of a connection destination selection process executed in the WLAN terminal 100 according to the present embodiment.
  • the WLAN terminal 100 extracts connection destination candidates (step S1002). For example, the WLAN terminal 100 extracts connection destination candidates based on the acquired network information and the connection history of the WWAN terminal 200. There may be no extracted connection destination candidates or there may be a plurality of connection destination candidates.
  • the WLAN terminal 100 determines whether or not there are unconsidered connection destination candidates (step S1004).
  • the unconsidered connection destination candidates indicate connection destination candidates for which the condition determination according to step S1006 has not been performed.
  • the WLAN terminal 100 determines whether the RSSI of the unconsidered connection destination candidate is higher than a threshold value. judge.
  • the threshold value is arbitrary.
  • the threshold value may be set to, for example, ⁇ 60 dBm, may be set to ⁇ 50 dBm in a situation where there are a plurality of APs in the surrounding area, or ⁇ 70 dBm in a situation in which almost no AP exists in the surrounding area. May be set.
  • the WLAN terminal 100 selects the connection destination candidate as the connection destination (step S1008).
  • the WLAN terminal 100 (for example, the selection unit 144) excludes the connection destination candidate under consideration from the candidates (step S1010). Thereafter, the process returns to step S1004 again.
  • the WLAN terminal 100 selects the tethering AP as the connection destination (step S1012). Then, the WLAN terminal 100 (for example, the authentication processing unit 148 and the wireless communication unit 110) transmits a request for authentication information to the WWAN terminal 200 (step S1014). Thereby, the WWAN terminal 200 is activated as a tethering AP. Next, the WLAN terminal 100 (for example, the authentication processing unit 148 and the wireless communication unit 110) receives the authentication information from the WWAN terminal 200 (step S1016).
  • the WLAN terminal 100 performs an authentication process (step S1018). For example, if a connection destination is selected in step S1008, the WLAN terminal 100 performs an authentication process for the connection destination. If the tethering AP is selected as the connection destination in step S1012, the WLAN terminal 100 performs an authentication process on the WWAN terminal 200 that operates as the tethering AP.
  • the connection destination supports the 802.1X authentication
  • the WLAN terminal 100 can select an optimum authentication method from any one of EAP-AKA ′, EAP-AKA, EAP-SIM, EAP-TLS, and EAP-TTLS. Select. If the connection destination does not support 802.1X authentication, the WLAN terminal 100 selects WPA-PSK or WPA2-PSK.
  • step S1020 / YES If it is determined that the authentication process is successful (step S1020 / YES), the process ends. On the other hand, when it is determined that the authentication process has failed (step S1020 / NO), the process returns to step S1004 again.
  • the WLAN terminal 100 and the WWAN terminal 200 are fixed to a mobile terminal such as a smartphone, a tablet PC (Personal Computer), a notebook PC, a portable game terminal or a digital camera, a television receiver, a printer, a digital scanner, or a network storage. It may be realized as a terminal or an in-vehicle terminal such as a car navigation device.
  • the WLAN terminal 100 and the WWAN terminal 200 are terminals (MTC (Machine Type Communication) terminals that perform M2M (Machine To Machine) communication, such as smart meters, vending machines, remote monitoring devices, or POS (Point Of Sale) terminals). May also be realized.
  • the WLAN terminal 100 and the WWAN terminal 200 may be wireless communication modules (for example, integrated circuit modules configured by one die) mounted on these terminals.
  • FIG. 24 is a block diagram illustrating an example of a schematic configuration of a smartphone 900 to which the technology according to the present disclosure can be applied.
  • the smartphone 900 includes a processor 901, a memory 902, a storage 903, an external connection interface 904, a camera 906, a sensor 907, a microphone 908, an input device 909, a display device 910, a speaker 911, a wireless communication interface 913, an antenna switch 914, an antenna 915, A bus 917, a battery 918, and an auxiliary controller 919 are provided.
  • the processor 901 may be, for example, a CPU (Central Processing Unit) or a SoC (System on Chip), and controls the functions of the application layer and other layers of the smartphone 900.
  • the memory 902 includes a RAM (Random Access Memory) and a ROM (Read Only Memory), and stores programs and data executed by the processor 901.
  • the storage 903 can include a storage medium such as a semiconductor memory or a hard disk.
  • the external connection interface 904 is an interface for connecting an external device such as a memory card or a USB (Universal Serial Bus) device to the smartphone 900.
  • the camera 906 includes, for example, an image sensor such as a CCD (Charge Coupled Device) or a CMOS (Complementary Metal Oxide Semiconductor), and generates a captured image.
  • the sensor 907 may include a sensor group such as a positioning sensor, a gyro sensor, a geomagnetic sensor, and an acceleration sensor.
  • the microphone 908 converts sound input to the smartphone 900 into an audio signal.
  • the input device 909 includes, for example, a touch sensor that detects a touch on the screen of the display device 910, a keypad, a keyboard, a button, or a switch, and receives an operation or information input from a user.
  • the display device 910 has a screen such as a liquid crystal display (LCD) or an organic light emitting diode (OLED) display, and displays an output image of the smartphone 900.
  • the speaker 911 converts an audio signal output from the smartphone 900 into audio.
  • the wireless communication interface 913 supports one or more wireless LAN standards such as IEEE802.11a, 11b, 11g, 11n, 11ac, and 11ad, and performs wireless communication.
  • the wireless communication interface 913 can communicate with other devices via a wireless LAN access point in the infrastructure mode.
  • the wireless communication interface 913 can directly communicate with other devices in an ad hoc mode or a direct communication mode such as Wi-Fi Direct (registered trademark).
  • Wi-Fi Direct unlike the ad hoc mode, one of two terminals operates as an access point, but communication is performed directly between the terminals.
  • the wireless communication interface 913 can typically include a baseband processor, an RF (Radio Frequency) circuit, a power amplifier, and the like.
  • the wireless communication interface 913 may be a one-chip module in which a memory that stores a communication control program, a processor that executes the program, and related circuits are integrated.
  • the wireless communication interface 913 may support other types of wireless communication methods such as a short-range wireless communication method, a proximity wireless communication method, or a cellular communication method in addition to the wireless LAN method.
  • the antenna switch 914 switches the connection destination of the antenna 915 among a plurality of circuits (for example, circuits for different wireless communication schemes) included in the wireless communication interface 913.
  • the antenna 915 includes a single antenna element or a plurality of antenna elements (for example, a plurality of antenna elements constituting a MIMO antenna), and is used for transmission and reception of radio signals by the radio communication interface 913.
  • the smartphone 900 is not limited to the example of FIG. 24, and may include a plurality of antennas (for example, an antenna for a wireless LAN and an antenna for a proximity wireless communication method). In that case, the antenna switch 914 may be omitted from the configuration of the smartphone 900.
  • the bus 917 connects the processor 901, memory 902, storage 903, external connection interface 904, camera 906, sensor 907, microphone 908, input device 909, display device 910, speaker 911, wireless communication interface 913, and auxiliary controller 919 to each other.
  • the battery 918 supplies electric power to each block of the smartphone 900 shown in FIG. 24 through a power supply line partially shown by a broken line in the drawing.
  • the auxiliary controller 919 operates the minimum necessary functions of the smartphone 900 in the sleep mode.
  • the smartphone 900 shown in FIG. 24 at least one of one or more components (for example, the wireless communication unit 110, the output unit 120, the storage unit 130, or the processing unit 140) included in the WLAN terminal 100 described with reference to FIG. ) May be implemented in the wireless communication interface 913.
  • at least some of these components may be implemented in the processor 901 or the auxiliary controller 919.
  • the smartphone 900 may include a module including the wireless communication interface 913, the processor 901, and / or the auxiliary controller 919, and the one or more components may be mounted on the module.
  • the module stores a program for causing the processor to function as the one or more components (in other words, a program for causing the processor to execute the operation of the one or more components), and stores the program. May be executed.
  • a program for causing a processor to function as one or more components may be installed in the smartphone 900, and the wireless communication interface 913, the processor 901, and / or the auxiliary controller 919 may execute the program.
  • the smartphone 900 or the module may be provided as a device including the one or more components, and a program for causing a processor to function as the one or more components may be provided.
  • a readable recording medium in which the program is recorded may be provided.
  • one or more components may be implemented in the wireless communication interface 913.
  • at least some of these components may be implemented in the processor 901 or the auxiliary controller 919.
  • the smartphone 900 may include a module including the wireless communication interface 913, the processor 901, and / or the auxiliary controller 919, and the one or more components may be mounted on the module.
  • the module stores a program for causing the processor to function as the one or more components (in other words, a program for causing the processor to execute the operation of the one or more components), and stores the program. May be executed.
  • a program for causing a processor to function as one or more components may be installed in the smartphone 900, and the wireless communication interface 913, the processor 901, and / or the auxiliary controller 919 may execute the program.
  • the smartphone 900 or the module may be provided as a device including the one or more components, and a program for causing a processor to function as the one or more components may be provided.
  • a readable recording medium in which the program is recorded may be provided.
  • the smartphone 900 may operate as a wireless access point (software AP) when the processor 901 executes the access point function at the application level. Further, the wireless communication interface 913 may have a wireless access point function.
  • FIG. 25 is a block diagram illustrating an example of a schematic configuration of a car navigation device 920 to which the technology according to the present disclosure can be applied.
  • the car navigation device 920 includes a processor 921, a memory 922, a GPS (Global Positioning System) module 924, a sensor 925, a data interface 926, a content player 927, a storage medium interface 928, an input device 929, a display device 930, a speaker 931, and wireless communication.
  • An interface 933, an antenna switch 934, an antenna 935, and a battery 938 are provided.
  • the processor 921 may be a CPU or SoC, for example, and controls the navigation function and other functions of the car navigation device 920.
  • the memory 922 includes RAM and ROM, and stores programs and data executed by the processor 921.
  • the GPS module 924 measures the position (for example, latitude, longitude, and altitude) of the car navigation device 920 using GPS signals received from GPS satellites.
  • the sensor 925 may include a sensor group such as a gyro sensor, a geomagnetic sensor, and an atmospheric pressure sensor.
  • the data interface 926 is connected to the in-vehicle network 941 through a terminal (not shown), for example, and acquires data generated on the vehicle side such as vehicle speed data.
  • the content player 927 reproduces content stored in a storage medium (for example, CD or DVD) inserted into the storage medium interface 928.
  • the input device 929 includes, for example, a touch sensor, a button, or a switch that detects a touch on the screen of the display device 930, and receives an operation or information input from the user.
  • the display device 930 has a screen such as an LCD or an OLED display, and displays a navigation function or an image of content to be reproduced.
  • the speaker 931 outputs the navigation function or the audio of the content to be played back.
  • the wireless communication interface 933 supports one or more wireless LAN standards such as IEEE802.11a, 11b, 11g, 11n, 11ac, and 11ad, and executes wireless communication.
  • the wireless communication interface 933 can communicate with other devices via a wireless LAN access point in the infrastructure mode.
  • the wireless communication interface 933 can directly communicate with other devices in an ad hoc mode or a direct communication mode such as Wi-Fi Direct.
  • the wireless communication interface 933 may typically include a baseband processor, an RF circuit, a power amplifier, and the like.
  • the wireless communication interface 933 may be a one-chip module in which a memory that stores a communication control program, a processor that executes the program, and related circuits are integrated.
  • the wireless communication interface 933 may support other types of wireless communication systems such as a short-range wireless communication system, a proximity wireless communication system, or a cellular communication system.
  • the antenna switch 934 switches the connection destination of the antenna 935 among a plurality of circuits included in the wireless communication interface 933.
  • the antenna 935 includes a single antenna element or a plurality of antenna elements, and is used for transmission and reception of a radio signal by the radio communication interface 933.
  • the car navigation device 920 is not limited to the example of FIG. 25, and may include a plurality of antennas. In that case, the antenna switch 934 may be omitted from the configuration of the car navigation device 920.
  • the battery 938 supplies power to each block of the car navigation apparatus 920 shown in FIG. 25 through a power supply line partially shown by broken lines in the drawing. Further, the battery 938 stores electric power supplied from the vehicle side.
  • the car navigation device 920 shown in FIG. 25 at least one of the one or more components (for example, the wireless communication unit 110, the output unit 120, the storage unit 130, or the processing unit 140) included in the WLAN terminal 100 described with reference to FIG. Either) may be implemented in the wireless communication interface 933. Further, at least a part of these functions may be implemented in the processor 921.
  • the car navigation device 920 may include a module including the wireless communication interface 933 and / or the processor 921, and the one or more components may be mounted on the module. In this case, the module stores a program for causing the processor to function as the one or more components (in other words, a program for causing the processor to execute the operation of the one or more components), and stores the program. May be executed.
  • a program for causing a processor to function as one or more components may be installed in the car navigation device 920, and the wireless communication interface 933 and / or the processor 921 may execute the program.
  • the car navigation apparatus 920 or the module may be provided as an apparatus including the one or more components, and a program for causing a processor to function as the one or more components may be provided.
  • a readable recording medium in which the program is recorded may be provided.
  • one or more components for example, the wireless communication unit 210, the storage unit 220, the authentication information storage unit 230, or the process included in the WWAN terminal 200 described with reference to FIG. 5). At least one of the units 240) may be implemented in the wireless communication interface 933. Further, at least a part of these functions may be implemented in the processor 921. As an example, the car navigation device 920 may include a module including the wireless communication interface 933 and / or the processor 921, and the one or more components may be mounted on the module.
  • the module stores a program for causing the processor to function as the one or more components (in other words, a program for causing the processor to execute the operation of the one or more components), and stores the program. May be executed.
  • a program for causing a processor to function as one or more components may be installed in the car navigation device 920, and the wireless communication interface 933 and / or the processor 921 may execute the program.
  • the car navigation apparatus 920 or the module may be provided as an apparatus including the one or more components, and a program for causing a processor to function as the one or more components may be provided.
  • a readable recording medium in which the program is recorded may be provided.
  • the technology according to the present disclosure may be realized as an in-vehicle system (or vehicle) 940 including one or more blocks of the car navigation device 920 described above, an in-vehicle network 941, and a vehicle side module 942.
  • vehicle-side module 942 generates vehicle-side data such as vehicle speed, engine speed, or failure information, and outputs the generated data to the in-vehicle network 941.
  • the WLAN terminal 100 is a connection-destination radio station selected based on one or more pieces of network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations.
  • the authentication process using the authentication information of the WWAN terminal 200 is performed by the authentication method selected based on the network information of the connection destination wireless station.
  • the WLAN terminal 100 can select a wireless station that can use the authentication information of the WWAN terminal 200 as a connection destination, and can easily perform an authentication process by using the authentication information of the WWAN terminal 200. It becomes possible. Therefore, for example, the WLAN terminal 100 can safely and easily connect to a wireless station that does not have a connection history and a connection right by using the authentication information of the WWAN terminal 200.
  • the WWAN terminal 200 is activated as a tethering AP with the reception of a request for authentication information from the WLAN terminal 100 as a trigger. For this reason, the WLAN terminal 100 can freely activate the WWAN terminal 200 as a tethering AP and connect to the Internet. Furthermore, connection settings to the tethering AP and manual work such as tethering ON / OFF in the WWAN terminal 200 are not required, and convenience can be improved.
  • the WLAN terminal 100 and the WWAN terminal 200 can simultaneously connect to the same wireless station by sharing authentication information.
  • the WLAN terminal 100 and the WWAN terminal 200 can form a mesh network. That is, the present technology can be applied to IoT (Internet of Things) or M2M (Machine to Machine).
  • IoT Internet of Things
  • M2M Machine to Machine
  • connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations
  • a processing unit for performing an authentication process using authentication information of another device according to an authentication method selected based on A device comprising: (2) The device according to (1), wherein the connection destination wireless station is selected based on information indicating a state of a wireless communication environment between the device and the wireless station. (3) The apparatus according to (1) or (2), wherein the wireless station to be connected is selected based on information indicating a communication method supported by the wireless station.
  • the apparatus according to any one of (1) to (3), wherein the wireless station to be connected is selected based on information indicating an authentication method supported by the wireless station.
  • the apparatus according to any one of (1) to (4), wherein the wireless station that is a connection destination is selected based on a connection history of the other apparatus.
  • the apparatus according to any one of (1) to (5), wherein the wireless station to be connected is selected based on a network selection policy.
  • the device according to any one of (1) to (8), wherein the wireless station to be connected is selected by the other device.
  • the device according to any one of (1) to (11), wherein the candidate for the wireless station to be connected to includes the other device operable as the wireless station.
  • the authentication information is generated based on at least one of subscriber identification information, electronic certificate, user name and password, pre-shared key or passphrase stored in the other device.
  • a processing unit that provides authentication information used in the authentication process to another device that performs the authentication process based on the authentication method selected based on A device comprising: (15) The device according to (14), wherein the processing unit performs processing for the device to function as the wireless station. (16) The apparatus according to (15), wherein the processing unit performs processing for functioning as the wireless station triggered by reception of the authentication information request from the other apparatus.
  • the processor performs authentication processing using authentication information of another device according to the authentication method selected based on Including methods.
  • Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations Providing a processor with authentication information used in the authentication process to another device that performs an authentication process based on the authentication method selected based on Including methods.
  • An authentication information providing source terminal and an authentication information providing destination terminal With The authentication information providing destination terminal is connected to the wireless station of the connection destination selected based on one or more network information related to the wireless network operated by the wireless station acquired from each of the one or more wireless stations.
  • the authentication information providing source terminal includes a processing unit that provides the authentication information to the authentication information providing destination terminal.
  • connection destination to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations by the authentication information providing destination terminal Performing authentication processing using authentication information of an authentication information providing source terminal according to an authentication method selected based on network information of the wireless station;
  • the authentication information providing source terminal providing the authentication information to the authentication information providing destination terminal; Including methods.
  • wireless communication system 100 WLAN terminal 110 wireless communication unit 112 WLAN module 114 BT module 116 NFC module 120 output unit 130 storage unit 140 processing unit 142 acquisition unit 144 selection unit 146 notification unit 148 authentication processing unit 200 WWAN terminal 210 wireless communication unit 212 WWAN module 214 WLAN module 216 BT module 218 NFC module 220 storage unit 230 subscriber identification module 240 processing unit 242 selection unit 244 authentication processing unit 246 tethering processing unit 300 WWAN 310 base station 320 gateway 330 subscriber information server 340 authentication server 350 network information providing server 360 TTL server 400 service network 500 WLAN 510 base station

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

[Problem] To provide a mechanism for enabling easy authentication into an appropriate network. [Solution] A device provided with a processing unit that performs a process of authentication, into a wireless station as a connection destination selected on the basis of one or more pieces of network information which is acquired from each of one or more wireless stations and which relates to a wireless network operated by each wireless station, by an authentication method selected on the basis of the network information of the wireless station as the connection destination, and using authentication information of another device.

Description

装置、システム及び方法Apparatus, system and method
 本開示は、装置、システム及び方法に関する。 The present disclosure relates to an apparatus, a system, and a method.
 近年、インターネットを用いた多様なサービスが登場してきており、外出先でも容易にインターネットにアクセスする手段が求められている。例えばスマートフォン及び携帯電話等のWWAN(Wireless Wide Area Network)通信機能を有する端末は、外出先であっても、移動体通信網を介してインターネットにアクセスすることが可能である。一方、WWAN通信機能を有さない端末は、無線LAN(WLAN:Wireless Local Area Network)等の他の通信方式を用いてインターネットにアクセスすることが要されていた。WLAN等のネットワークへ接続する際は、アクセスポイントの検索、ID(identifier)及びパスワードの入力等の処理が要される場合があり、このような処理をより容易にするための技術が求められている。 In recent years, various services using the Internet have appeared, and there is a demand for means for easily accessing the Internet even when away from home. For example, a terminal having a WWAN (Wireless Wide Area Network) communication function, such as a smartphone and a mobile phone, can access the Internet via a mobile communication network even when the user is away from home. On the other hand, a terminal that does not have a WWAN communication function is required to access the Internet by using another communication method such as a wireless LAN (WLAN). When connecting to a network such as a WLAN, processing such as searching for an access point, inputting an ID (identifier) and a password may be required, and a technique for making such processing easier is required. Yes.
 例えば、下記特許文献1では、サービスを提供するサービス提供装置との間で、他の通信端末を介して間接的に通信する通信端末が、サービス提供装置において提供されるサービスをシームレスに受けることを可能にするための技術が開示されている。 For example, in Patent Document 1 below, a communication terminal that indirectly communicates with a service providing apparatus that provides a service via another communication terminal seamlessly receives a service provided by the service providing apparatus. Techniques for enabling are disclosed.
 また、下記特許文献2では、移動体通信サービスでの移動体通信を行わない装置が、移動体通信サービスでの移動体通信を行う他の装置から認証情報を取得して、移動体通信とは異なる無線通信を通じてネットワークに接続する技術が開示されている。 Moreover, in the following Patent Document 2, a device that does not perform mobile communication using a mobile communication service acquires authentication information from another device that performs mobile communication using a mobile communication service. A technique for connecting to a network through different wireless communication is disclosed.
特開2009-253752号公報JP 2009-253752 A 特開2014-143632号公報JP 2014-143632 A
 しかし、この技術分野では、さらなる性能向上が望まれている。例えば、ネットワークへの認証に関する利便性の向上は、望まれていることのひとつである。また、複数のネットワークの中からより適切なネットワークを接続先として選択することも、望まれていることのひとつである。そこで、本開示では、適切なネットワークへの容易な認証を可能にする仕組みを提案する。 However, further performance improvement is desired in this technical field. For example, an improvement in convenience related to network authentication is one of the demands. In addition, it is also desired to select a more appropriate network as a connection destination from a plurality of networks. Therefore, the present disclosure proposes a mechanism that enables easy authentication to an appropriate network.
 本開示によれば、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、他の装置の認証情報を用いた認証処理を行う処理部、を備える装置が提供される。 According to the present disclosure, the connection destination to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations. An apparatus is provided that includes a processing unit that performs an authentication process using authentication information of another apparatus according to an authentication method selected based on network information of the wireless station.
 また、本開示によれば、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による認証処理を行う他の装置への、前記認証処理において用いられる認証情報の提供を行う処理部、を備える装置が提供される。 Further, according to the present disclosure, the connection to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations An apparatus is provided that includes a processing unit that provides authentication information used in the authentication process to another apparatus that performs an authentication process using an authentication method selected based on the network information of the wireless station.
 また、本開示によれば、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、他の装置の認証情報を用いた認証処理をプロセッサにより行うこと、を含む方法が提供される。 Further, according to the present disclosure, the connection to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations There is provided a method including performing an authentication process using authentication information of another device by a processor according to an authentication method selected based on network information of the wireless station.
 また、本開示によれば、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による認証処理を行う他の装置への、前記認証処理において用いられる認証情報の提供をプロセッサにより行うこと、を含む方法が提供される。 Further, according to the present disclosure, the connection to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations Providing the authentication information used in the authentication process to another device that performs the authentication process by the authentication method selected based on the network information of the wireless station is provided by the processor. .
 また、本開示によれば、認証情報提供元端末と認証情報提供先端末と、を備え、前記認証情報提供先端末は、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、前記認証情報提供元端末の認証情報を用いた認証処理を行う処理部を有し、前記認証情報提供元端末は、前記認証情報提供先端末への前記認証情報の提供を行う処理部を有する、システムが提供される。 In addition, according to the present disclosure, an authentication information providing source terminal and an authentication information providing destination terminal are provided, and the authentication information providing destination terminal is operated by the radio station acquired from each of one or more radio stations. Authentication of the authentication information providing source terminal by the authentication method selected based on the network information of the wireless station of the connection destination to the wireless station of the connection destination selected based on one or more network information related to the wireless network A system is provided that includes a processing unit that performs authentication processing using information, and wherein the authentication information providing source terminal includes a processing unit that provides the authentication information to the authentication information providing destination terminal.
 また、本開示によれば、認証情報提供先端末が、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、認証情報提供元端末の認証情報を用いた認証処理を行うことと、前記認証情報提供元端末が、前記認証情報提供先端末への前記認証情報の提供を行うことと、を含む方法が提供される。 Further, according to the present disclosure, the authentication information providing destination terminal is a connection destination selected based on one or more network information about the wireless network operated by the wireless station, acquired from each of the one or more wireless stations. Performing an authentication process using authentication information of an authentication information providing source terminal according to an authentication method selected based on network information of the wireless station to which the wireless station is connected to the wireless station; and Providing the authentication information to the authentication information providing destination terminal.
 以上説明したように本開示によれば、適切なネットワークへの容易な認証を可能にする仕組みが提供される。なお、上記の効果は必ずしも限定的なものではなく、上記の効果とともに、または上記の効果に代えて、本明細書に示されたいずれかの効果、または本明細書から把握され得る他の効果が奏されてもよい。 As described above, according to the present disclosure, a mechanism that enables easy authentication to an appropriate network is provided. Note that the above effects are not necessarily limited, and any of the effects shown in the present specification, or other effects that can be grasped from the present specification, together with or in place of the above effects. May be played.
本開示の一実施形態に係る無線通信システムの概要について説明するための図である。1 is a diagram for describing an overview of a wireless communication system according to an embodiment of the present disclosure. FIG. 同実施形態に係る無線通信システムの概要について説明するための図である。It is a figure for demonstrating the outline | summary of the radio | wireless communications system which concerns on the embodiment. 同実施形態に係る無線通信システムの構成の一例を示すブロック図である。It is a block diagram showing an example of composition of a radio communications system concerning the embodiment. 同実施形態に係るWLAN端末の論理的な構成の一例を示すブロック図である。It is a block diagram which shows an example of a logical structure of the WLAN terminal which concerns on the same embodiment. 同実施形態に係るWWAN端末の論理的な構成の一例を示すブロック図である。It is a block diagram which shows an example of a logical structure of the WWAN terminal which concerns on the embodiment. 同実施形態に係るユーザインタフェースの一例を示す図である。It is a figure which shows an example of the user interface which concerns on the embodiment. 同実施形態に係るユーザインタフェースの一例を示す図である。It is a figure which shows an example of the user interface which concerns on the embodiment. 第1の実施形態に係る無線通信システムにおいて実行される接続処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the connection process performed in the radio | wireless communications system which concerns on 1st Embodiment. 同実施形態に係る無線通信システムにおいて実行される接続処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the connection process performed in the radio | wireless communications system which concerns on the same embodiment. 同実施形態に係る無線通信システムにおいて実行される接続処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the connection process performed in the radio | wireless communications system which concerns on the same embodiment. 同実施形態に係る無線通信システムにおいて実行される接続処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the connection process performed in the radio | wireless communications system which concerns on the same embodiment. 同実施形態に係る無線通信システムにおいて実行される接続処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the connection process performed in the radio | wireless communications system which concerns on the same embodiment. 同実施形態に係る無線通信システムにおいて実行される接続処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the connection process performed in the radio | wireless communications system which concerns on the same embodiment. 同実施形態に係る無線通信システムにおいて実行される接続処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the connection process performed in the radio | wireless communications system which concerns on the same embodiment. 同実施形態に係る無線通信システムにおいて実行される認証処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the authentication process performed in the radio | wireless communications system which concerns on the embodiment. 同実施形態に係る無線通信システムにおいて実行される認証処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the authentication process performed in the radio | wireless communications system which concerns on the embodiment. 同実施形態に係る無線通信システムにおいて実行される認証処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the authentication process performed in the radio | wireless communications system which concerns on the embodiment. 同実施形態に係る無線通信システムにおいて実行される認証処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the authentication process performed in the radio | wireless communications system which concerns on the embodiment. 同実施形態に係る無線通信システムにおいて実行される認証処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the authentication process performed in the radio | wireless communications system which concerns on the embodiment. 同実施形態に係る無線通信システムにおいて実行される認証処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the authentication process performed in the radio | wireless communications system which concerns on the embodiment. 同実施形態に係る無線通信システムにおいて実行される認証処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the authentication process performed in the radio | wireless communications system which concerns on the embodiment. 同実施形態に係る無線通信システムにおいて実行される認証処理の流れの一例を示すシーケンス図である。It is a sequence diagram which shows an example of the flow of the authentication process performed in the radio | wireless communications system which concerns on the embodiment. 同実施形態に係るWLAN端末において実行される接続先選択処理の流れの一例を示すフローチャートである。It is a flowchart which shows an example of the flow of the connection destination selection process performed in the WLAN terminal which concerns on the same embodiment. スマートフォンの概略的な構成の一例を示すブロック図である。It is a block diagram which shows an example of a schematic structure of a smart phone. カーナビゲーション装置の概略的な構成の一例を示すブロック図である。It is a block diagram which shows an example of a schematic structure of a car navigation apparatus.
 以下に添付図面を参照しながら、本開示の好適な実施の形態について詳細に説明する。なお、本明細書及び図面において、実質的に同一の機能構成を有する構成要素については、同一の符号を付することにより重複説明を省略する。 Hereinafter, preferred embodiments of the present disclosure will be described in detail with reference to the accompanying drawings. In addition, in this specification and drawing, about the component which has the substantially same function structure, duplication description is abbreviate | omitted by attaching | subjecting the same code | symbol.
 また、本明細書及び図面において、実質的に同一の機能構成を有する要素を、同一の符号の後に異なるアルファベットを付して区別する場合もある。例えば、実質的に同一の機能構成を有する複数の要素を、必要に応じて基地局510A、510B及び510Cのように区別する。ただし、実質的に同一の機能構成を有する複数の要素の各々を特に区別する必要がない場合、同一符号のみを付する。例えば、基地局510A、510B及び510Cを特に区別する必要が無い場合には、単に基地局510と称する。 In the present specification and drawings, elements having substantially the same functional configuration may be distinguished by adding different alphabets after the same reference numerals. For example, a plurality of elements having substantially the same functional configuration are distinguished as the base stations 510A, 510B, and 510C as necessary. However, when there is no need to particularly distinguish each of a plurality of elements having substantially the same functional configuration, only the same reference numerals are given. For example, the base stations 510A, 510B, and 510C are simply referred to as the base station 510 when it is not necessary to distinguish them.
 なお、説明は以下の順序で行うものとする。
  1.概要
  2.構成例
   2.1.無線通信システムの構成例
   2.2.WLAN端末の構成例
   2.3.WWAN端末の構成例
  3.第1の実施形態
   3.1.技術的特徴
   3.2.処理の流れ
  4.応用例
  5.まとめ
The description will be made in the following order.
1. Overview 2. Configuration example 2.1. Configuration example of wireless communication system 2.2. Configuration example of WLAN terminal 2.3. 2. Configuration example of WWAN terminal First embodiment 3.1. Technical features 3.2. Flow of processing Application example 5. Summary
 <<1.概要>>
 まず、図1、図2を参照して、本開示の一実施形態に係る無線通信システム1の概要について説明する。
<< 1. Overview >>
First, an overview of a wireless communication system 1 according to an embodiment of the present disclosure will be described with reference to FIGS. 1 and 2.
 図1及び図2は、本開示の一実施形態に係る無線通信システム1の概要について説明するための図である。図1に示す例では、無線通信システム1は、無線通信装置100を含む。また、図2に示す例では、無線通信システム1は、無線通信装置100及び無線通信装置200を含む。 FIG.1 and FIG.2 is a figure for demonstrating the outline | summary of the radio | wireless communications system 1 which concerns on one Embodiment of this indication. In the example illustrated in FIG. 1, the wireless communication system 1 includes a wireless communication device 100. In the example illustrated in FIG. 2, the wireless communication system 1 includes a wireless communication device 100 and a wireless communication device 200.
 無線通信装置100は、他の装置との無線通信が可能な無線端末である。図1の例では、無線通信装置100は、ノートPCである。無線通信装置100は、例えばIEEE(Institute of Electrical and Electronics Engineers)802.11a、11b、11g、11n、11ac又は11adなどの通信方式に従って、WLANに接続することができるWLAN端末である。図1に示すように、WLAN端末100は、基地局510を介して無線ネットワーク500に接続し、サービスネットワーク400により提供されるサービスを利用可能である。また、WLAN端末100は、無線通信装置200との無線接続を形成することができる。この無線接続は、例えばBluetooth(登録商標)、NFC(Near field communication)等の任意の通信方式に従って形成され得る。WLAN端末100は、例えばユーザの自宅等で運用されるWLANなどのネットワーク情報が既知のWLANとの接続は可能であるが、外出先等のネットワーク情報が未知のWLANとの接続は困難である。なお、無線通信装置100は、ノートPC以外にも、PC、タブレット端末、PDA(Personal Digital Assistants)、HMD(Head Mounted Display)、ヘッドセット、デジタルカメラ、デジタルビデオカメラ、スマートフォン、携帯電話端末、携帯用音楽再生装置、携帯用映像処理装置または携帯用ゲーム機器等として実現されてもよい。 The wireless communication device 100 is a wireless terminal capable of wireless communication with other devices. In the example of FIG. 1, the wireless communication device 100 is a notebook PC. The wireless communication device 100 is a WLAN terminal that can be connected to a WLAN according to a communication method such as IEEE (Institute of Electrical and Electronics Engineers) 802.11a, 11b, 11g, 11n, 11ac, or 11ad. As shown in FIG. 1, the WLAN terminal 100 can connect to a wireless network 500 via a base station 510 and use a service provided by the service network 400. Further, the WLAN terminal 100 can form a wireless connection with the wireless communication device 200. This wireless connection can be formed according to an arbitrary communication method such as Bluetooth (registered trademark) or NFC (Near field communication). The WLAN terminal 100 can be connected to a WLAN whose network information is known, such as a WLAN that is operated at the user's home, for example, but is difficult to connect to a WLAN whose network information such as whereabouts is unknown. In addition to the notebook PC, the wireless communication device 100 includes a PC, a tablet terminal, a PDA (Personal Digital Assistant), an HMD (Head Mounted Display), a headset, a digital camera, a digital video camera, a smartphone, a mobile phone terminal, a mobile phone, and the like. It may be realized as a music playback device, a portable video processing device, a portable game device, or the like.
 無線通信装置200は、他の装置との無線通信が可能な無線端末である。無線通信装置200は、ネットワークへの認証を行うための認証情報を有し、単独でネットワークに接続することが可能である。図2の例では、無線通信装置200は、スマートフォンである。無線通信装置200は、例えばWLAN端末100との無線接続を形成することができる。また、無線通信装置200は、WWAN通信機能を有し、WWANに接続することができるWWAN端末である。WWAN端末200は、移動体通信網に接続するための加入者識別情報を有しており、加入者識別情報を用いた認証処理を行って、移動体通信網等の無線ネットワーク300との無線接続を形成することができる。加入者識別情報は、例えばSIMカード(Subscriber Identity Module Card)に格納されるIMSI(International Mobile Subscriber Identity)である。WWAN端末200は、WWAN通信機能を用いて無線ネットワーク300に接続し、サービスネットワーク400により提供されるサービスを利用可能である。ここで、加入者識別情報は、WWAN端末200が有する認証情報の一例であり、WWAN端末200は他の任意の情報を認証情報として有していてもよい。なお、無線通信装置200は、スマートフォン以外にも、ノートPC、PC、タブレット端末、PDA、HMD、ヘッドセット、デジタルカメラ、デジタルビデオカメラ、携帯電話端末、携帯用音楽再生装置、携帯用映像処理装置または携帯用ゲーム機器等として実現されてもよい。 The wireless communication device 200 is a wireless terminal capable of wireless communication with other devices. The wireless communication apparatus 200 has authentication information for performing authentication to the network, and can be connected to the network independently. In the example of FIG. 2, the wireless communication device 200 is a smartphone. The wireless communication apparatus 200 can form a wireless connection with the WLAN terminal 100, for example. The wireless communication apparatus 200 is a WWAN terminal that has a WWAN communication function and can be connected to the WWAN. The WWAN terminal 200 has subscriber identification information for connecting to a mobile communication network, performs authentication processing using the subscriber identification information, and establishes wireless connection with a wireless network 300 such as a mobile communication network. Can be formed. The subscriber identification information is, for example, an IMSI (International Mobile Subscriber Identity) stored in a SIM card (Subscriber Identity Module Card). The WWAN terminal 200 can use the service provided by the service network 400 by connecting to the wireless network 300 using the WWAN communication function. Here, the subscriber identification information is an example of authentication information that the WWAN terminal 200 has, and the WWAN terminal 200 may have other arbitrary information as the authentication information. The wireless communication device 200 is not only a smartphone but also a notebook PC, PC, tablet terminal, PDA, HMD, headset, digital camera, digital video camera, mobile phone terminal, portable music player, portable video processing device. Alternatively, it may be realized as a portable game device or the like.
 無線ネットワーク300は、移動体通信網等のWWAN(第1のネットワーク)である。例えば、WWAN300は、LTE(Long Term Evolution)、LTE-A(LTE-Advanced)、GSM(登録商標)、UMTS、W-CDMA、又はCDMA2000などの任意の無線通信方式に従って運用される。例えば、WWAN300は、基地局310により運用されるセルの範囲内に位置する無線通信装置200から接続される。 The wireless network 300 is a WWAN (first network) such as a mobile communication network. For example, the WWAN 300 is operated according to an arbitrary wireless communication system such as LTE (Long Term Evolution), LTE-A (LTE-Advanced), GSM (registered trademark), UMTS, W-CDMA, or CDMA2000. For example, the WWAN 300 is connected from the wireless communication device 200 located within the range of the cell operated by the base station 310.
 サービスネットワーク400は、インターネットなどの公衆ネットワークである。WWAN端末200は、WWAN300を介してサービスネットワーク400にアクセスすることができる。 The service network 400 is a public network such as the Internet. The WWAN terminal 200 can access the service network 400 via the WWAN 300.
 ここで、WWAN通信機能を有さない端末は、WWAN300を介したインターネットへのアクセスは困難である。このような場合であっても、外出先等でのインターネットへのアクセスを実現するための手段として、例えばWWAN通信可能な端末によるテザリング、又は公衆WLANの利用が挙げられる。 Here, it is difficult for a terminal having no WWAN communication function to access the Internet via the WWAN 300. Even in such a case, examples of means for realizing access to the Internet while away from home include tethering by a terminal capable of WWAN communication or use of a public WLAN.
 テザリングとは、スマートフォン等のWWAN通信機能を有する端末を介して、他の通信端末がWWAN300に接続する技術である。例えば、WWAN端末200は、WWAN300及びWLAN端末100と接続可能であるので、WWAN300とWLAN端末100との通信を中継するアクセスポイントとして機能して、テザリングを実現することができる。これにより、WLAN端末100は、サービスネットワーク400により提供されるサービスを利用可能となる。 Tethering is a technology for connecting other communication terminals to the WWAN 300 via a terminal having a WWAN communication function such as a smartphone. For example, since the WWAN terminal 200 can be connected to the WWAN 300 and the WLAN terminal 100, the WWAN terminal 200 can function as an access point that relays communication between the WWAN 300 and the WLAN terminal 100, and can realize tethering. As a result, the WLAN terminal 100 can use the service provided by the service network 400.
 テザリングは、WWAN端末200がWWAN通信可能なエリアのどこに位置していても利用可能である。しかし、テザリング利用のための端末設定を、WWAN端末200及びWLAN端末100の両方で行うことが要されるため、ユーザの利便性が損なわれていた。また、テザリング中はアクセスポイントとして機能するWWAN端末200の電力消費が大きい。 Tethering can be used wherever the WWAN terminal 200 is located in an area where WWAN communication is possible. However, since it is necessary to perform terminal setting for tethering use in both the WWAN terminal 200 and the WLAN terminal 100, the convenience of the user is impaired. Further, during tethering, the power consumption of the WWAN terminal 200 functioning as an access point is large.
 他方、公衆WLANとは、WLANを利用したインターネットへの接続を提供するサービスである。以下、図2を参照して、公衆WLANを用いた通信について説明する。図2に示す無線ネットワーク500は、例えばWLANにより運用される公衆ネットワーク(第2のネットワーク)である。WLAN端末100は、WLAN500へ接続して、サービスネットワーク400に、又はWWAN300をさらに介してサービスネットワーク400にアクセスすることができる。これにより、WLAN端末100は、サービスネットワーク400により提供されるサービスを利用可能となる。 On the other hand, a public WLAN is a service that provides a connection to the Internet using a WLAN. Hereinafter, communication using a public WLAN will be described with reference to FIG. A wireless network 500 shown in FIG. 2 is a public network (second network) operated by a WLAN, for example. The WLAN terminal 100 can connect to the WLAN 500 to access the service network 400 or further access the service network 400 via the WWAN 300. As a result, the WLAN terminal 100 can use the service provided by the service network 400.
 ここで、スマートフォンのようなWWAN通信機能を有する無線端末は、3GPP(Third Generation Partnership Project)によって提案されたANDSF(Access Network Discovery and Selection Function)、又はWi-Fi Allianceによって提案されたWi-Fi CERTIFIED Passpointの技術を用いて、周囲の公衆WLANへ接続し自身が有する加入者識別情報を用いてユーザ認証を実施することが可能である。しかし、ノートPCの様にWWAN通信機能を持たず、加入者識別情報を有さない無線端末では、ユーザ自ら利用可能な公衆WLANを選択し、認証手続きを実施することが要される場合があり、利便性が損なわれていた。 Here, a wireless terminal having a WWAN communication function such as a smartphone is an ANDSF (Access Network Discovery and Selection Function) proposed by 3GPP (Third Generation Partnership Project), or Wi-Fi CERTIFIED proposed by Wi-Fi Alliance. Using Passpoint technology, it is possible to connect to the surrounding public WLAN and perform user authentication using the subscriber identification information possessed by itself. However, in a wireless terminal that does not have a WWAN communication function and does not have subscriber identification information like a notebook PC, it may be necessary to select a public WLAN that can be used by the user and perform an authentication procedure. Convenience was impaired.
 また、WLAN端末100が接続可能な公衆WLANが周囲に存在しない場合、WWAN端末200をテザリングAP(Access Point)として動作させることで、WLAN端末100はインターネットに接続することが可能となる。しかしながら、テザリングAPへの接続設定、及びWWAN端末200におけるテザリングON/OFF等の手作業が発生しており、利便性が損なわれていた。 Further, when there is no public WLAN that can be connected to the WLAN terminal 100 in the vicinity, the WLAN terminal 100 can be connected to the Internet by operating the WWAN terminal 200 as a tethering AP (Access Point). However, manual settings such as connection setting to the tethering AP and tethering ON / OFF in the WWAN terminal 200 have occurred, and convenience has been impaired.
 さらに、WLAN端末100は、Wi-Fi CERTIFIED Passpointに対応していない場合、WLAN500の安全性を確認しないまま接続することとなり、セキュリティリスクが高いWLAN500に接続してしまうリスクや、盗聴等の被害に遭うリスクがあった。 Furthermore, if the WLAN terminal 100 is not compatible with Wi-Fi CERTIFIED Passpoint, it will connect without confirming the safety of the WLAN 500, which may lead to the risk of connecting to the WLAN 500 with a high security risk and damage such as eavesdropping. There was a risk of encounter.
 そこで、上記事情を一着眼点にして本開示の一実施形態に係る無線通信システムを創作するに至った。本開示の一実施形態に係る無線通信システムは、WLAN端末100が適切なネットワークへの容易な認証を行うことを可能にする。以下、図3~図25を参照して、本開示の一実施形態に係る無線通信装置を含む無線通信システムについて詳細に説明する。 Accordingly, the wireless communication system according to an embodiment of the present disclosure has been created with the above circumstances in mind. The wireless communication system according to an embodiment of the present disclosure enables the WLAN terminal 100 to perform easy authentication to an appropriate network. Hereinafter, a wireless communication system including the wireless communication device according to an embodiment of the present disclosure will be described in detail with reference to FIGS.
 なお、WWAN端末200は、認証情報の提供元として機能する端末の一例である。認証情報提供元端末200は、必ずしもWWAN通信可能でなくてもよく、ネットワークへの認証情報を有していればよい。同様に、WLAN端末100は、認証情報の提供先として機能する端末の一例である。認証情報提供先端末100は、必ずしもWLAN通信可能でなくてもよく、認証情報提供元端末200から提供された認証情報を用いて、任意の通信方式のネットワークに接続してもよい。 The WWAN terminal 200 is an example of a terminal that functions as a provider of authentication information. The authentication information providing source terminal 200 does not necessarily have to be capable of WWAN communication, and may have authentication information for the network. Similarly, the WLAN terminal 100 is an example of a terminal that functions as a provision destination of authentication information. The authentication information providing destination terminal 100 may not necessarily be capable of WLAN communication, and may be connected to a network of an arbitrary communication method using the authentication information provided from the authentication information providing source terminal 200.
 <<2.構成例>>
  <2.1.無線通信システムの構成例>
 図3は、本実施形態に係る無線通信システム1の構成の一例を示すブロック図である。図3に示すように、無線通信システム1は、WLAN端末100及びWWAN端末200を含み、WWAN300、WLAN500、及びサービスネットワーク400への無線接続を提供する。
<< 2. Configuration example >>
<2.1. Configuration example of wireless communication system>
FIG. 3 is a block diagram illustrating an example of a configuration of the wireless communication system 1 according to the present embodiment. As shown in FIG. 3, the wireless communication system 1 includes a WLAN terminal 100 and a WWAN terminal 200, and provides wireless connection to the WWAN 300, the WLAN 500, and the service network 400.
  (1)WWAN300
 図3に示すように、WWAN300は、基地局310、ゲートウェイ320、加入者情報サーバ330、認証サーバ340、及びネットワーク情報提供サーバ350により運用される。
(1) WWAN300
As shown in FIG. 3, the WWAN 300 is operated by a base station 310, a gateway 320, a subscriber information server 330, an authentication server 340, and a network information providing server 350.
  (1-1)基地局310
 基地局310は、WWAN通信機能を有する無線端末が、WWAN300に接続する際の接点となる装置である。例えば、基地局310は、WWAN端末200からの接続を受け付ける。LTEにおいては、基地局310はeNBに相当する。
(1-1) Base station 310
The base station 310 is a device that serves as a contact point when a wireless terminal having a WWAN communication function is connected to the WWAN 300. For example, the base station 310 accepts a connection from the WWAN terminal 200. In LTE, the base station 310 corresponds to an eNB.
  (1-2)ゲートウェイ320
 ゲートウェイ320は、WWAN300と他のネットワークとの通信を中継する装置である。例えば、ゲートウェイ320は、WWAN300とサービスネットワーク400との通信、及びWWAN300とWLAN500との通信を中継する。LTEにおいては、ゲートウェイ320はP-GW(Packet Data Network Gateway)に相当する。
(1-2) Gateway 320
The gateway 320 is a device that relays communication between the WWAN 300 and another network. For example, the gateway 320 relays communication between the WWAN 300 and the service network 400 and communication between the WWAN 300 and the WLAN 500. In LTE, the gateway 320 corresponds to a P-GW (Packet Data Network Gateway).
  (1-3)加入者情報サーバ330
 加入者情報サーバ330は、WWAN300への加入者情報を保持する装置である。加入者情報サーバ330は、無線端末がWWAN300へ接続する際の認証処理に利用される情報も保持する。LTEにおいては、加入者情報サーバ330はHSS(Home Subscriber Server)に相当する。
(1-3) Subscriber information server 330
The subscriber information server 330 is a device that holds subscriber information for the WWAN 300. The subscriber information server 330 also holds information used for authentication processing when a wireless terminal connects to the WWAN 300. In LTE, the subscriber information server 330 corresponds to an HSS (Home Subscriber Server).
  (1-4)認証サーバ340
 認証サーバ340は、WWAN300への接続がWWAN300の加入者による接続であることを認証する装置である。認証サーバ340は、加入者情報サーバ330を参照してこの認証処理を行い得る。LTEにおいては、認証サーバ340はAAA(Authentication, Authorization and Accounting)サーバに相当する。
(1-4) Authentication server 340
The authentication server 340 is a device that authenticates that the connection to the WWAN 300 is a connection by a WWAN 300 subscriber. The authentication server 340 can perform this authentication process with reference to the subscriber information server 330. In LTE, the authentication server 340 corresponds to an AAA (Authentication, Authorization and Accounting) server.
 また、認証サーバ340は、WLAN500への接続を認証する機能を有する。例えば、WLAN500への認証プロトコルとして、EAP(Extensible Authentication Protocol)-TLS(Transport Layer Security)又はEAP-TTLS(Tunneled Transport Layer Security)等の証明書を用いた認証プロトコルが採用され得る。その場合、認証サーバ340は、電子証明書、ID、パスワード等を発行して、WLAN500への接続を行う端末に係る認証処理を行う。また、WLAN500への認証プロトコルとして、EAP-AKA(EAP Method for UMTS Authentication and Key Agreement)、EAP-SIM(EAP Method for GSM Subscriber Identity Modules)、又はEAP-AKA´等の、WWAN300への加入者識別情報を用いた認証プロトコルが採用され得る。その場合、認証サーバ340は、加入者情報サーバ330を参照して認証処理を行う。なお、WWAN通信機能を有し、加入者識別情報を用いた認証処理を経てWWAN300への接続が可能な端末は、同じく加入者識別情報を用いた認証処理を経てWLAN500への接続が可能である。他にも、WLAN500への認証プロトコルとして、IMS-AKA、Security Token、電子証明書(Credential, Certificate)、公開鍵などが用いられてもよい。 The authentication server 340 has a function of authenticating connection to the WLAN 500. For example, as an authentication protocol for the WLAN 500, an authentication protocol using a certificate such as EAP (Extensible Authentication Protocol) -TLS (Transport Layer Security) or EAP-TTLS (Tunneled Transport Layer Security) can be adopted. In that case, the authentication server 340 issues an electronic certificate, an ID, a password, and the like, and performs an authentication process related to a terminal that connects to the WLAN 500. In addition, as an authentication protocol for the WLAN 500, EAP-AKA (EAP Method for UMTS Authentication and Key Agreement), EAP-SIM (EAP Method for GSM Subscriber Identity Modules), or EAP-AKA 'and other subscriber identification to WWAN300 An authentication protocol using information may be employed. In that case, the authentication server 340 performs authentication processing with reference to the subscriber information server 330. A terminal that has a WWAN communication function and can be connected to the WWAN 300 through authentication processing using subscriber identification information can be connected to the WLAN 500 through authentication processing using subscriber identification information. . In addition, IMS-AKA, Security Token, a digital certificate (Credential, Certificate), a public key, or the like may be used as an authentication protocol for the WLAN 500.
  (1-5)ネットワーク情報提供サーバ350
 ネットワーク情報提供サーバ350は、無線端末が現在接続されている無線ネットワークから他の無線ネットワークへ接続先を切り替える際に必要となる、接続先の無線ネットワークの情報を提供する装置である。例えば、ネットワーク情報提供サーバ350は、WWAN端末200に対して、WLAN500に接続するためのネットワーク情報を提供し得る。LTEにおいては、ネットワーク情報提供サーバ350はANDSFサーバに相当する。
(1-5) Network information providing server 350
The network information providing server 350 is a device that provides information on a connection destination wireless network, which is necessary when the connection destination is switched from the wireless network to which the wireless terminal is currently connected to another wireless network. For example, the network information providing server 350 can provide network information for connecting to the WLAN 500 to the WWAN terminal 200. In LTE, the network information providing server 350 corresponds to an ANDSF server.
  (1-6)TTLSサーバ360
 TTLSサーバ360は、EAP認証プロトコルの1つであるTLSのうちEAP-TTLSによる認証を行うサーバである。具体的には、TTLSサーバ360は、鍵暗号によって保護されたユーザ名及びパスワードによって認証を行う。なお、ユーザ名及びパスワードの照合は、認証サーバ340により行われる。
(1-6) TLS server 360
The TLS server 360 is a server that performs authentication by EAP-TTLS among TLS that is one of EAP authentication protocols. Specifically, the TLS server 360 performs authentication using a user name and password protected by key encryption. Note that the verification of the user name and password is performed by the authentication server 340.
  (2)WLAN500
 図3に示すように、WLAN500は、基地局510により運用される公衆ネットワークである。本明細書では、公衆ネットワークの通信方式はWLANであるものとして説明するが、Bluetooth等の他の任意の通信方式に従って運用されてもよい。
(2) WLAN500
As shown in FIG. 3, the WLAN 500 is a public network operated by the base station 510. In the present specification, the communication system of the public network is described as being WLAN, but may be operated according to any other communication system such as Bluetooth.
 基地局510は、WLAN通信機能を有する無線端末が、WLAN500に接続する際の接点となる装置である。例えば、基地局510は、WLAN端末100からの接続を受け付ける。公衆ネットワークの通信方式がWLANの場合、基地局510はアクセスポイントに相当する。なお、基地局510は、ひとつ以上の認証プロトコルをサポートし得る。図3では省略されているが、無線通信システム1には、複数の基地局510が存在し得る。複数の基地局510の間では、例えばBSSID(Basic Service Set Identifier)及びオペレーティング周波数が異なり得る。 The base station 510 is a device that serves as a contact point when a wireless terminal having a WLAN communication function connects to the WLAN 500. For example, the base station 510 receives a connection from the WLAN terminal 100. When the communication method of the public network is WLAN, the base station 510 corresponds to an access point. Note that the base station 510 can support one or more authentication protocols. Although omitted in FIG. 3, a plurality of base stations 510 may exist in the wireless communication system 1. For example, the BSSID (Basic Service Set Identifier) and the operating frequency may be different among the plurality of base stations 510.
  (3)補足
 図3では図示していないが、無線通信システム1の外部に認証局が存在し得る。認証局では、EAP-TLSのための電子証明書が発行される。
(3) Supplement Although not shown in FIG. 3, a certificate authority may exist outside the wireless communication system 1. The certificate authority issues an electronic certificate for EAP-TLS.
  <2.2.WLAN端末の構成例>
 図4は、本実施形態に係るWLAN端末100の論理的な構成の一例を示すブロック図である。図4に示すように、WLAN端末100は、無線通信部110、出力部120、記憶部130、及び処理部140を有する。
<2.2. Configuration example of WLAN terminal>
FIG. 4 is a block diagram illustrating an example of a logical configuration of the WLAN terminal 100 according to the present embodiment. As illustrated in FIG. 4, the WLAN terminal 100 includes a wireless communication unit 110, an output unit 120, a storage unit 130, and a processing unit 140.
  (1)無線通信部110
 無線通信部110は、外部機器との間でのデータの送受信を行う通信モジュールである。無線通信部110は、多様な通信方式を用いて無線通信を行うことができる。例えば、無線通信部110は、WLANモジュール112を有し、Wi-Fi(登録商標)、WLANを用いて無線通信可能である。また、無線通信部110は、BT(Bluetooth)モジュール114を有し、Bluetoothを用いて無線通信可能である。また、無線通信部110は、NFCモジュール116を有し、NFCを用いて無線通信可能である。
(1) Wireless communication unit 110
The wireless communication unit 110 is a communication module that transmits / receives data to / from an external device. The wireless communication unit 110 can perform wireless communication using various communication methods. For example, the wireless communication unit 110 includes a WLAN module 112 and can perform wireless communication using Wi-Fi (registered trademark) or WLAN. The wireless communication unit 110 includes a BT (Bluetooth) module 114 and can perform wireless communication using Bluetooth. The wireless communication unit 110 includes an NFC module 116 and can perform wireless communication using NFC.
 例えば、無線通信部110は、WWAN端末200とのペアリング及び無線通信を行う第1の無線通信部として機能し得る。例えば、無線通信部110は、NFC、Bluetooth、Bluetooth Low Energy、Wi-Fi Direct(登録商標)又はWLAN等の近距離無線通信方式を用いて、WWAN端末200とのペアリング及び無線通信を行う。他にも、無線通信部110は、ZigBee(登録商標)、IrDA(Infrared Data Association)等の近距離無線通信方式を用いて、WWAN端末200とのペアリング及び無線通信を行ってもよい。 For example, the wireless communication unit 110 can function as a first wireless communication unit that performs pairing and wireless communication with the WWAN terminal 200. For example, the wireless communication unit 110 performs pairing and wireless communication with the WWAN terminal 200 using a near field communication method such as NFC, Bluetooth, Bluetooth Low Energy, Wi-Fi Direct (registered trademark), or WLAN. In addition, the wireless communication unit 110 may perform pairing and wireless communication with the WWAN terminal 200 using a short-range wireless communication method such as ZigBee (registered trademark) or IrDA (Infrared Data Association).
 例えば、無線通信部110は、公衆ネットワークに接続して無線通信を行う第2の無線通信部として機能し得る。例えば、無線通信部110は、WLAN等の無線通信方式を用いて、WLAN500に接続する。公衆ネットワークは、WLAN以外の任意の無線通信方式をサポートしていてもよく、その場合、無線通信部110は公衆ネットワークに応じた無線通信方式を用いて公衆ネットワークに接続し得る。また、無線通信部110は、WLAN500から受信される信号の強度からRSSI(Received Signal Strength Indicator)を測定する等の測定処理を行ってもよい。 For example, the wireless communication unit 110 can function as a second wireless communication unit that performs wireless communication by connecting to a public network. For example, the wireless communication unit 110 connects to the WLAN 500 using a wireless communication method such as WLAN. The public network may support any wireless communication method other than WLAN, and in that case, the wireless communication unit 110 can connect to the public network using a wireless communication method according to the public network. Further, the wireless communication unit 110 may perform measurement processing such as measuring RSSI (Received Signal Strength Indicator) from the strength of the signal received from the WLAN 500.
 無線通信部110は、WWAN端末200との無線通信及び公衆ネットワークとの無線通信について、同一の通信方式を用いて無線通信を行ってもよい。例えば、無線通信部110は、WLANを用いてWWAN端末200と通信しつつ、WLAN500に接続してもよい。 The wireless communication unit 110 may perform wireless communication using the same communication method for wireless communication with the WWAN terminal 200 and wireless communication with the public network. For example, the wireless communication unit 110 may connect to the WLAN 500 while communicating with the WWAN terminal 200 using WLAN.
 なお、無線通信部110は、ZigBee(登録商標、IEEE 802.15.4)、Z-Wave(登録商標)、ANT(登録商標)、ANT+(登録商標)、WiSUN(登録商標、IEEE 802.15.4g)、Wi-Fi Direct(登録商標)等の他の通信方式を用いて無線通信を行ってもよい。さらに、無線通信部110は、メッシュネットワークのノードとして機能してもよく、例えば、IEEE 802.11sを用いて無線通信を行い得る。もちろん、メッシュネットワークは、Bluetooth又はZigBee等の他の通信方式を用いて形成されてもよい。 The wireless communication unit 110 includes ZigBee (registered trademark, IEEE 802.15.4), Z-Wave (registered trademark), ANT (registered trademark), ANT + (registered trademark), WiSUN (registered trademark, IEEE 802.15). .4g), wireless communication may be performed using other communication methods such as Wi-Fi Direct (registered trademark). Further, the wireless communication unit 110 may function as a mesh network node, and may perform wireless communication using, for example, IEEE 802.11s. Of course, the mesh network may be formed using other communication methods such as Bluetooth or ZigBee.
  (2)出力部120
 出力部120は、映像、画像、音声などによって、情報を出力する機能を有する。出力部120は、例えばCRT(Cathode Ray Tube)ディスプレイ装置、液晶ディスプレイ(Liquid Crystal Display)装置、スピーカ等により実現される。
(2) Output unit 120
The output unit 120 has a function of outputting information by video, image, audio, or the like. The output unit 120 is realized by, for example, a CRT (Cathode Ray Tube) display device, a liquid crystal display (Liquid Crystal Display) device, a speaker, or the like.
  (3)記憶部130
 記憶部130は、所定の記録媒体に対してデータの記録再生を行う部位である。例えば、記憶部130は、無線通信部110によりWWAN端末200から受信された情報を記憶してもよい。
(3) Storage unit 130
The storage unit 130 is a part that records and reproduces data on a predetermined recording medium. For example, the storage unit 130 may store information received from the WWAN terminal 200 by the wireless communication unit 110.
  (4)処理部140
 処理部140は、演算処理装置および制御装置として機能し、各種プログラムに従ってWLAN端末100内の動作全般を制御する。図4に示すように、処理部140は、取得部142、選択部144、通知部146及び認証処理部148を含む。なお、処理部140は、これらの構成要素以外の他の構成要素をさらに含み得る。即ち、処理部140は、これらの構成要素の機能以外の機能も有し得る。
(4) Processing unit 140
The processing unit 140 functions as an arithmetic processing device and a control device, and controls the overall operation within the WLAN terminal 100 according to various programs. As illustrated in FIG. 4, the processing unit 140 includes an acquisition unit 142, a selection unit 144, a notification unit 146, and an authentication processing unit 148. The processing unit 140 may further include other components other than these components. That is, the processing unit 140 can have functions other than the functions of these components.
 取得部142、選択部144、通知部146及び認証処理部148の機能は、後に詳細に説明する。 The functions of the acquisition unit 142, the selection unit 144, the notification unit 146, and the authentication processing unit 148 will be described in detail later.
  <2.3.WWAN端末の構成例>
 図5は、本実施形態に係るWWAN端末200の論理的な構成の一例を示すブロック図である。図5に示すように、WWAN端末200は、無線通信部210、記憶部220、認証情報格納部230、及び処理部240を有する。
<2.3. Configuration example of WWAN terminal>
FIG. 5 is a block diagram illustrating an example of a logical configuration of the WWAN terminal 200 according to the present embodiment. As illustrated in FIG. 5, the WWAN terminal 200 includes a wireless communication unit 210, a storage unit 220, an authentication information storage unit 230, and a processing unit 240.
  (1)無線通信部210
 無線通信部210は、外部機器との間でのデータの送受信を行う通信モジュールである。無線通信部210は、多様な通信方式を用いて無線通信を行うことができる。例えば、無線通信部210は、WWANモジュール212を有し、WWAN300を用いて無線通信可能である。また、無線通信部210は、WLANモジュール214を有し、Wi-Fi、WLANを用いて無線通信可能である。また、無線通信部210は、BTモジュール216を有し、Bluetoothを用いて無線通信可能である。また、無線通信部210は、NFCモジュール218を有し、NFCを用いて無線通信可能である。
(1) Wireless communication unit 210
The wireless communication unit 210 is a communication module that transmits / receives data to / from an external device. The wireless communication unit 210 can perform wireless communication using various communication methods. For example, the wireless communication unit 210 includes a WWAN module 212 and can perform wireless communication using the WWAN 300. The wireless communication unit 210 includes a WLAN module 214 and can perform wireless communication using Wi-Fi or WLAN. The wireless communication unit 210 includes a BT module 216 and can perform wireless communication using Bluetooth. The wireless communication unit 210 includes an NFC module 218 and can perform wireless communication using NFC.
 例えば、無線通信部210は、WLAN端末100とのペアリング及び無線通信を行う第4の無線通信部として機能し得る。例えば、無線通信部210は、NFC、Bluetooth、Bluetooth Low Energy、Wi-Fi Direct又はWLAN等の近距離無線通信方式を用いて、WLAN端末100とのペアリング及び無線通信を行う。他にも、無線通信部210は、ZigBee、IrDA(Infrared Data Association)等の近距離無線通信方式を用いて、WLAN端末100とのペアリング及び無線通信を行ってもよい。また、無線通信部210は、WWANモジュール212により、WWAN300に接続して無線通信を行う第3の無線通信部として機能し得る。例えば、無線通信部210は、WWANモジュール212を介して認証サーバ340との間で通信を行う。また、無線通信部210は、WLANモジュール214により、WLAN500に接続して無線通信を行う第5の無線通信部として機能し得る。例えば、無線通信部210は、WLANモジュール214を介して基地局510との間で通信を行う。 For example, the wireless communication unit 210 can function as a fourth wireless communication unit that performs pairing and wireless communication with the WLAN terminal 100. For example, the wireless communication unit 210 performs pairing and wireless communication with the WLAN terminal 100 using a short-range wireless communication method such as NFC, Bluetooth, Bluetooth Low Energy, Wi-Fi Direct, or WLAN. In addition, the wireless communication unit 210 may perform pairing and wireless communication with the WLAN terminal 100 using a short-range wireless communication method such as ZigBee or IrDA (Infrared Data Association). Further, the wireless communication unit 210 can function as a third wireless communication unit that performs wireless communication by connecting to the WWAN 300 using the WWAN module 212. For example, the wireless communication unit 210 communicates with the authentication server 340 via the WWAN module 212. In addition, the wireless communication unit 210 can function as a fifth wireless communication unit that performs wireless communication by connecting to the WLAN 500 using the WLAN module 214. For example, the wireless communication unit 210 communicates with the base station 510 via the WLAN module 214.
 なお、無線通信部210は、ZigBee(IEEE 802.15.4)、Z-Wave、ANT、ANT+、WiSUN(IEEE 802.15.4g)、Wi-Fi Direct等の他の通信方式を用いて無線通信を行ってもよい。さらに、無線通信部210は、メッシュネットワークのノードとして機能してもよく、例えば、IEEE 802.11sを用いて無線通信を行い得る。もちろん、メッシュネットワークは、Bluetooth又はZigBee等の他の通信方式を用いて形成されてもよい。 The wireless communication unit 210 wirelessly uses other communication methods such as ZigBee (IEEE 802.15.4), Z-Wave, ANT, ANT +, WiSUN (IEEE 802.15.4g), Wi-Fi Direct, and the like. Communication may be performed. Further, the wireless communication unit 210 may function as a mesh network node, and may perform wireless communication using, for example, IEEE 802.11s. Of course, the mesh network may be formed using other communication methods such as Bluetooth or ZigBee.
  (2)記憶部220
 記憶部220は、所定の記録媒体に対してデータの記録再生を行う部位である。例えば、記憶部220は、無線通信部210によりWWAN300から受信された情報を記憶してもよい。例えば、記憶部220は、ペアリングが確立されたWLAN端末100の機器情報、ケイパビリティ情報、又はWLAN500との無線通信の用途を示す情報を記憶してもよい。
(2) Storage unit 220
The storage unit 220 is a part that records and reproduces data on a predetermined recording medium. For example, the storage unit 220 may store information received from the WWAN 300 by the wireless communication unit 210. For example, the storage unit 220 may store device information of the WLAN terminal 100 with which pairing has been established, capability information, or information indicating the purpose of wireless communication with the WLAN 500.
  (3)認証情報格納部230
 認証情報格納部230は、ネットワークへの認証情報を格納する機能を有する。例えば、認証情報格納部230は、WWAN300への加入者識別情報を格納したSIMカードにより実現される。他にも、認証情報格納部230は、EAP-TLSのための電子証明書、又はEAP-TTLSのためのユーザ名及びパスワードを格納する記憶媒体として実現されてもよい。また、認証情報格納部230は、WPA2-PSK又はWPA-PSKのための事前共有鍵(PSK:Phase Shift Keying)又はパスフレーズを格納する記憶媒体として実現されてもよい。
(3) Authentication information storage unit 230
The authentication information storage unit 230 has a function of storing authentication information for the network. For example, the authentication information storage unit 230 is realized by a SIM card that stores subscriber identification information for the WWAN 300. In addition, the authentication information storage unit 230 may be realized as a storage medium that stores an electronic certificate for EAP-TLS or a user name and password for EAP-TTLS. Further, the authentication information storage unit 230 may be realized as a storage medium that stores a pre-shared key (PSK: Phase Shift Keying) or a passphrase for WPA2-PSK or WPA-PSK.
  (4)処理部240
 処理部240は、演算処理装置および制御装置として機能し、各種プログラムに従ってWWAN端末200内の動作全般を制御する。図5に示すように、処理部240は、選択部242、認証処理部244及びテザリング処理部246を含む。なお、処理部240は、これらの構成要素以外の他の構成要素をさらに含み得る。即ち、処理部240は、これらの構成要素の機能以外の機能も有し得る。
(4) Processing unit 240
The processing unit 240 functions as an arithmetic processing device and a control device, and controls the overall operation within the WWAN terminal 200 according to various programs. As illustrated in FIG. 5, the processing unit 240 includes a selection unit 242, an authentication processing unit 244, and a tethering processing unit 246. Note that the processing unit 240 may further include other components other than these components. That is, the processing unit 240 can have functions other than the functions of these components.
 選択部242、認証処理部244及びテザリング処理部246の機能は、後に詳細に説明する。 The functions of the selection unit 242, the authentication processing unit 244, and the tethering processing unit 246 will be described in detail later.
 <<3.第1の実施形態>>
  <3.1.技術的特徴>
  (1)ネットワーク情報の取得
 WLAN端末100(例えば、取得部142)は、ひとつ以上の無線局の各々から、当該無線局が運用する無線ネットワークに関するネットワーク情報を取得する。例えば、WLAN端末100は、無線局が発する報知信号(例えば、ビーコン)の受信、報知信号の報知元の無線局へのネットワーク情報要求(例えば、プローブリクエスト)の送信を無線通信部110に行わせ、その結果に基づいてネットワーク情報を取得する。ネットワーク情報には、例えば無線局の識別情報、チャネル情報、RSSI情報、通信方式情報、及び認証方式情報等が含まれ得る。なお、識別情報は、例えばSSID(Service Set Identifier)、BSSID(Basic Service Set Identifier)、又はESSID(Extended Service Set Identifier)であってもよい。通信方式情報は、無線局が対応する通信方式を示す情報であり、例えば、802.11a、11b、11g、11n、及び11acの各々に対応するか否かを示す情報を含み得る。認証方式情報は、無線局が対応する認証方式を示す情報であり、例えば、802.1X認証に対応するか否かを示す情報を含み得る。
<< 3. First Embodiment >>
<3.1. Technical features>
(1) Acquisition of Network Information The WLAN terminal 100 (for example, the acquisition unit 142) acquires network information related to a wireless network operated by the wireless station from each of one or more wireless stations. For example, the WLAN terminal 100 causes the wireless communication unit 110 to receive a notification signal (for example, a beacon) issued by a wireless station and transmit a network information request (for example, a probe request) to the wireless station that is the notification source of the notification signal. Then, network information is acquired based on the result. The network information may include, for example, radio station identification information, channel information, RSSI information, communication method information, authentication method information, and the like. The identification information may be, for example, an SSID (Service Set Identifier), a BSSID (Basic Service Set Identifier), or an ESSID (Extended Service Set Identifier). The communication method information is information indicating a communication method supported by the wireless station, and may include, for example, information indicating whether each of 802.11a, 11b, 11g, 11n, and 11ac is supported. The authentication method information is information indicating an authentication method supported by the wireless station, and may include, for example, information indicating whether or not 802.1X authentication is supported.
 接続先の候補となる、ネットワーク情報の取得元の無線局は、基地局510であってもよいし、テザリングAPとして動作可能なWWAN端末200であってもよい。後者の場合、ネットワーク情報は、テザリングAPとして動作中のWWAN端末200から取得されてもよいし、テザリングAPとして動作していないWWAN端末200から取得されてもよい。 The wireless station from which network information is acquired as a connection destination candidate may be the base station 510 or the WWAN terminal 200 operable as a tethering AP. In the latter case, the network information may be acquired from the WWAN terminal 200 that is operating as a tethering AP, or may be acquired from the WWAN terminal 200 that is not operating as a tethering AP.
 また、ネットワーク情報の取得は、WWAN端末200により行われてもよい。その場合、WWAN端末200は、自身がテザリングAPとして動作していない場合であっても、自身の通信方式情報等の自身にとって既知な情報を取得可能である。 Further, the acquisition of network information may be performed by the WWAN terminal 200. In that case, even if the WWAN terminal 200 is not operating as a tethering AP, the WWAN terminal 200 can acquire information known to itself such as its communication method information.
  (2)接続先選択
 WLAN端末100(例えば、選択部144)は、取得されたひとつ以上のネットワークに基づいて接続先の無線局を選択する。
(2) Connection destination selection The WLAN terminal 100 (for example, the selection unit 144) selects a connection destination radio station based on one or more acquired networks.
 例えば、WLAN端末100は、RSSI情報及びチャネル情報といったWLAN端末100と無線局との間の無線通信環境の状態を示す情報に基づいて無線局を選択する。具体的には、WLAN端末100は、RSSIが良い、及びチャネルが混雑していない無線局を、優先的に選択してもよい。これにより、より適した接続先の選択が可能となる。 For example, the WLAN terminal 100 selects a wireless station based on information indicating the state of the wireless communication environment between the WLAN terminal 100 and the wireless station, such as RSSI information and channel information. Specifically, the WLAN terminal 100 may preferentially select a radio station that has good RSSI and is not congested. As a result, a more suitable connection destination can be selected.
 例えば、WLAN端末100は、通信方式情報に基づいて無線局を選択する。具体的には、WLAN端末100は、より伝送速度が速い通信方式に対応している無線局を、優先的に選択してもよい。これにより、より適した接続先の選択が可能となる。 For example, the WLAN terminal 100 selects a radio station based on the communication method information. Specifically, the WLAN terminal 100 may preferentially select a radio station that supports a communication method with a higher transmission speed. As a result, a more suitable connection destination can be selected.
 例えば、WLAN端末100は、認証方式情報に基づいて無線局を選択する。具体的には、WLAN端末100は、よりセキュリティが高く且つユーザビリティが高い認証方式に対応している無線局を、優先的に選択してもよい。これにより、より適した接続先の選択が可能となる。 For example, the WLAN terminal 100 selects a radio station based on the authentication method information. Specifically, the WLAN terminal 100 may preferentially select a radio station that is compatible with an authentication method with higher security and higher usability. As a result, a more suitable connection destination can be selected.
 例えば、WLAN端末100は、WWAN端末200の接続履歴に基づいて接続先の無線局を選択してもよい。具体的には、WLAN端末100は、WWAN端末200の接続履歴を参照して、過去に接続した無線局、又は過去に接続した無線局が複数ある場合はより直近に接続した無線局を、優先的に選択してもよい。接続履歴に基づくことで、過去に接続実績のある接続先を選択することが可能となる。また、過去に認証情報を生成したことのある接続先が選択されるので、WWAN端末200による認証情報の生成を省略することができる。なお、WLAN端末100は、自身の接続履歴を参照して、同様に接続先の無線局の選択のために用いてもよい。 For example, the WLAN terminal 100 may select a connection destination radio station based on the connection history of the WWAN terminal 200. Specifically, the WLAN terminal 100 refers to the connection history of the WWAN terminal 200 and prioritizes a wireless station connected in the past or a wireless station connected more recently when there are a plurality of wireless stations connected in the past. May be selected. Based on the connection history, it is possible to select a connection destination with a connection history in the past. In addition, since a connection destination that has generated authentication information in the past is selected, generation of authentication information by the WWAN terminal 200 can be omitted. Note that the WLAN terminal 100 may also be used for selecting a connection-destination radio station with reference to its own connection history.
 例えば、WLAN端末100は、ネットワーク選択ポリシーに基づいて接続先の無線局を選択してもよい。ネットワーク選択ポリシーとは、ネットワークの通信方式、ネットワークの優先順位及びネットワークの識別情報に関する情報を含む情報である。ネットワーク選択ポリシーに基づくことで、より適切な接続先を選択することが可能となる。 For example, the WLAN terminal 100 may select a connection destination radio station based on a network selection policy. The network selection policy is information including information relating to a network communication method, network priority, and network identification information. Based on the network selection policy, a more appropriate connection destination can be selected.
 一例として、NetworkSelectionPolicyという名前を持ったANDSF Management Objectについて、PolicyがSet_1とSet_2の2種類あり、優先順位がRulePriorityで定められている例を下記に示す。なお、Set_1には3つのネットワークに関する情報が含まれており、それぞれ優先順位がAccessNetworkPriorityで設定されている。 As an example, for an ANDSF Management Object with the name NetworkSelectionPolicy, there are two types of Policy, Set_1 and Set_2, and the priority is defined by Rule Priority. Note that Set_1 includes information regarding the three networks, and the priority order is set by AccessNetworkPriority.
  ./ANDSF/Name=NetworkSelectionPolicy
  ./ANDSF/Policy/Set_1/RulePriority=1
  ./ANDSF/Policy/Set_1/PrioritizedAccess/1/AccessTechnology=WLAN
  ./ANDSF/Policy/Set_1/PrioritizedAccess/1/AccessID=HotSpotSSID1
  ./ANDSF/Policy/Set_1/PrioritizedAccess/1/AccessNetworkPriority=10
  ./ANDSF/Policy/Set_1/PrioritizedAccess/2/AccessTechnology=WLAN
  ./ANDSF/Policy/Set_1/PrioritizedAccess/2/AccessID=HotSpotSSID2
  ./ANDSF/Policy/Set_1/PrioritizedAccess/2/AccessNetworkPriority=20
  ./ANDSF/Policy/Set_1/PrioritizedAccess/3/AccessTechnology=WLAN
  ./ANDSF/Policy/Set_1/PrioritizedAccess/3/AccessID=HotSpotSSID3
  ./ANDSF/Policy/Set_1/PrioritizedAccess/3/AccessNetworkPriority=30
  ./ANDSF/Policy/Set_2/RulePriority=2
  ./ANDSF/Policy/Set_2/PrioritizedAccess/1/AccessTechnology=WLAN
  ./ANDSF/Policy/Set_2/PrioritizedAccess/1/AccessID=HomeSSID
  ./ANDSF/Policy/Set_2/PrioritizedAccess/1/AccessNetworkPriority=10
./ANDSF/Name=NetworkSelectionPolicy
./ANDSF/Policy/Set_1/RulePriority=1
./ANDSF/Policy/Set_1/PrioritizedAccess/1/AccessTechnology=WLAN
./ANDSF/Policy/Set_1/PrioritizedAccess/1/AccessID=HotSpotSSID1
./ANDSF/Policy/Set_1/PrioritizedAccess/1/AccessNetworkPriority=10
./ANDSF/Policy/Set_1/PrioritizedAccess/2/AccessTechnology=WLAN
./ANDSF/Policy/Set_1/PrioritizedAccess/2/AccessID=HotSpotSSID2
./ANDSF/Policy/Set_1/PrioritizedAccess/2/AccessNetworkPriority=20
./ANDSF/Policy/Set_1/PrioritizedAccess/3/AccessTechnology=WLAN
./ANDSF/Policy/Set_1/PrioritizedAccess/3/AccessID=HotSpotSSID3
./ANDSF/Policy/Set_1/PrioritizedAccess/3/AccessNetworkPriority=30
./ANDSF/Policy/Set_2/RulePriority=2
./ANDSF/Policy/Set_2/PrioritizedAccess/1/AccessTechnology=WLAN
./ANDSF/Policy/Set_2/PrioritizedAccess/1/AccessID=HomeSSID
./ANDSF/Policy/Set_2/PrioritizedAccess/1/AccessNetworkPriority=10
 なお、接続先の選択は、WWAN端末200(例えば、選択部242)により行われてもよい。 The connection destination may be selected by the WWAN terminal 200 (for example, the selection unit 242).
  (3)認証方式選択
 WLAN端末100(例えば、選択部144)は、接続先の無線局のネットワーク情報に基づいて認証方式を選択する。
(3) Authentication Method Selection The WLAN terminal 100 (for example, the selection unit 144) selects an authentication method based on network information of a connection destination wireless station.
 例えば、WLAN端末100は、セキュリティの強度に基づいて認証方式を選択してもよい。具体的には、WLAN端末100は、セキュリティの強度が高い認証方式を優先的に選択する。これにより、より安全性の高いネットワークに接続することが可能となる。 For example, the WLAN terminal 100 may select an authentication method based on the strength of security. Specifically, the WLAN terminal 100 preferentially selects an authentication method with high security strength. This makes it possible to connect to a more secure network.
 例えば、WLAN端末100は、ユーザビリティの高さに基づいて認証方式を選択してもよい。具体的には、WLAN端末100は、ユーザによるパスワードの入力等の手作業、又は電子証明書のインストール作業等が発生しない認証方式を優先的に選択する。これにより、ネットワークへの認証に関する利便性を向上させることが可能となる。 For example, the WLAN terminal 100 may select an authentication method based on high usability. Specifically, the WLAN terminal 100 preferentially selects an authentication method that does not require manual operation such as password entry by the user or installation of an electronic certificate. As a result, it is possible to improve convenience related to authentication to the network.
 具体的に、優先順位の高い認証方式から低い優先順位の順に並べると、例えばEAP-AKA’、EAP-AKA、EAP-SIM、EAP-TLS、EAP-TTLS、WPA2-PSK、WPA-PSKとなる。優先順位が高いほど、セキュリティ強度が高く、及びユーザビリティが高い。また、優先順位が低いほど、セキュリティ強度が低く、及びユーザビリティが低い。 Specifically, when an authentication method having a higher priority is arranged in the order of lower priority, for example, EAP-AKA ′, EAP-AKA, EAP-SIM, EAP-TLS, EAP-TTLS, WPA2-PSK, and WPA-PSK are obtained. . The higher the priority, the higher the security strength and the higher usability. Also, the lower the priority, the lower the security strength and the lower the usability.
 ここで、接続先として選択された無線局が対応する認証方式がひとつしかない場合、認証方式は一意に定まり、認証方式の選択は省略される。 Here, if there is only one authentication method supported by the wireless station selected as the connection destination, the authentication method is uniquely determined and the selection of the authentication method is omitted.
 また、WLAN端末100は、接続先の無線局を選択した後に認証方式を選択してもよいし、認証方式を選択した後に接続先の無線局を選択してもよい。例えば、HMD(Head Mounted Display)等の入力手段が貧弱な装置に関しては、ユーザ入力が不要なEAP-AKA等の認証方式を優先的に選択する、後者の選択順序が望ましい。他にも、WLAN端末100は、接続先の無線局と認証方式とを、同時に選択してもよい。 Further, the WLAN terminal 100 may select an authentication method after selecting a connection-destination wireless station, or may select a connection-destination wireless station after selecting an authentication method. For example, for devices with poor input means such as HMD (Head Mounted Display), the latter selection order in which an authentication method such as EAP-AKA that does not require user input is preferentially selected is desirable. In addition, the WLAN terminal 100 may simultaneously select a connection destination wireless station and an authentication method.
 なお、認証方式の選択は、WWAN端末200(例えば、選択部242)により行われてもよい。 Note that the selection of the authentication method may be performed by the WWAN terminal 200 (for example, the selection unit 242).
  (4)選択主体の判定
 上記説明したように、接続先の無線局の選択、及び認証方式の選択は、WLAN端末100又はWWAN端末200のいずれが行ってもよい。そのため、WLAN端末100(例えば、選択部144)は、接続先の無線局及び認証方式を自身が選択するか、WWAN端末200が選択するかを判定する。例えば、WLAN端末100は、ネットワーク選択ポリシーを有している方を選択主体としてもよいし、双方が有している場合はより最新のものを有している方を選択主体としてもよい。また、WLAN端末100は、デフォルトでWLAN端末100を選択主体としてもよい。また、WWAN端末200がテザリングAPとして動作する前は、WLAN端末100は、WWAN端末200がテザリングAPとして動作した場合のネットワーク情報を取得することが困難であるため、WWAN端末200を選択主体としてもよい。このように、WLAN端末100は、接続先の無線局及び認証方式の選択主体を、状況に合わせて柔軟に変えることが可能である。
(4) Determination of selection subject As described above, either the WLAN terminal 100 or the WWAN terminal 200 may perform selection of a connection destination radio station and selection of an authentication method. Therefore, the WLAN terminal 100 (for example, the selection unit 144) determines whether the wireless terminal and the authentication method of the connection destination are selected by the WLAN terminal 100 or the WWAN terminal 200. For example, the WLAN terminal 100 may select a person who has a network selection policy as a selection subject, and if both have a selection subject, may have a more recent one as a selection subject. Further, the WLAN terminal 100 may use the WLAN terminal 100 as a selection subject by default. In addition, before the WWAN terminal 200 operates as a tethering AP, the WLAN terminal 100 is difficult to acquire network information when the WWAN terminal 200 operates as a tethering AP. Good. As described above, the WLAN terminal 100 can flexibly change the connection-destination radio station and the authentication method selection subject according to the situation.
 なお、ネットワーク情報を取得した装置と選択主体とが異なる場合、ネットワーク情報は選択主体へ通知される。例えば、WLAN端末100(通知部146)は、選択主体がWWAN端末200となった場合、取得したネットワーク情報をWWAN端末200へ通知する。その逆も同様である。 Note that if the device that acquired the network information is different from the selected entity, the network information is notified to the selected entity. For example, when the selection subject is the WWAN terminal 200, the WLAN terminal 100 (notification unit 146) notifies the acquired network information to the WWAN terminal 200. The reverse is also true.
  (5)認証処理
 WLAN端末100(例えば、認証処理部148)は、WWAN端末200の認証情報を用いた認証処理を行う。例えば、WLAN端末100は、WWAN端末200の加入者識別情報を用いて、EAP-AKA’、EAP-AKA、又はEAP-SIMによりネットワークへの認証を行う。また、WLAN端末100は、WWAN端末200の電子証明書を用いて、EAP-TLSによりネットワークへの認証を行ってもよい。また、WLAN端末100は、WWAN端末200のユーザ名及びパスワードを用いて、EAP-TTLSによりネットワークへの認証を行ってもよい。また、WLAN端末100は、WWAN端末200のPSK又はパスフレーズを用いて、WPA2-PSK又はWPA-PSKによりネットワークへの認証を行ってもよい。このように、WLAN端末100は、WWAN端末200の認証情報を用いることで、単独では認証することが困難なネットワークへの認証を行い、インターネットに接続することが可能となる。
(5) Authentication Process The WLAN terminal 100 (for example, the authentication processing unit 148) performs an authentication process using the authentication information of the WWAN terminal 200. For example, the WLAN terminal 100 authenticates to the network by EAP-AKA ′, EAP-AKA, or EAP-SIM using the subscriber identification information of the WWAN terminal 200. Further, the WLAN terminal 100 may authenticate to the network by EAP-TLS using the electronic certificate of the WWAN terminal 200. Also, the WLAN terminal 100 may authenticate to the network by EAP-TTLS using the user name and password of the WWAN terminal 200. Further, the WLAN terminal 100 may authenticate to the network using WPA2-PSK or WPA-PSK using the PSK or passphrase of the WWAN terminal 200. As described above, the WLAN terminal 100 can use the authentication information of the WWAN terminal 200 to authenticate to a network that is difficult to authenticate by itself and connect to the Internet.
 WWAN端末200(例えば、認証処理部244)は、WLAN端末100による認証処理において用いられる認証情報の提供を行う。これにより、WLAN端末100によるネットワークへの認証が可能となる。なお、WWAN端末200は、接続先の無線局の選択主体がWLAN端末100である場合、WLAN端末100からの要求に基づき認証情報の提供を行ってもよい。また、WWAN端末200は、接続先の無線局の選択主体が自身である場合、接続先の無線局を指示する情報と共に認証情報の提供を行ってもよい。 The WWAN terminal 200 (for example, the authentication processing unit 244) provides authentication information used in authentication processing by the WLAN terminal 100. As a result, the WLAN terminal 100 can authenticate to the network. Note that the WWAN terminal 200 may provide authentication information based on a request from the WLAN terminal 100 when the selection subject of the connection destination wireless station is the WLAN terminal 100. Further, when the selection subject of the connection destination wireless station is itself, the WWAN terminal 200 may provide authentication information together with information indicating the connection destination wireless station.
 ここで、提供される認証情報は、認証情報格納部230に格納された情報そのものでなくてもよい。例えば、WWAN端末200は、認証情報格納部230に格納された、加入者識別情報、電子証明書、ユーザ名及びパスワード、PSK又はパスフレーズの少なくともいずれかに基づいて生成した認証情報を、提供してもよい。これにより、WWAN端末200の機密情報が流出することが防止され、セキュリティを担保することが可能となる。 Here, the authentication information provided may not be the information itself stored in the authentication information storage unit 230. For example, the WWAN terminal 200 provides authentication information generated based on at least one of subscriber identification information, electronic certificate, user name and password, PSK or passphrase stored in the authentication information storage unit 230. May be. Thereby, the confidential information of the WWAN terminal 200 is prevented from being leaked, and security can be ensured.
 認証情報の提供は、例えばBluetooth又はNFC等の近距離無線通信方式が用いられ得る。もちろん、認証情報の提供にWi-Fi Direct等が用いられてもよい。いずれの通信規格が用いられるにしろ、WLAN端末100とWWAN端末200との間で直接的な通信経路が確立されることが望ましい。 For providing authentication information, a short-range wireless communication system such as Bluetooth or NFC can be used. Of course, Wi-Fi Direct or the like may be used to provide authentication information. Regardless of which communication standard is used, it is desirable that a direct communication path be established between the WLAN terminal 100 and the WWAN terminal 200.
  (6)テザリング
 WWAN端末200(例えば、テザリング処理部246)は、無線局として機能するための処理を行ってもよい。より簡易には、WWAN端末200は、テザリングAPとして動作してもよい。
(6) Tethering The WWAN terminal 200 (for example, the tethering processing unit 246) may perform processing for functioning as a wireless station. More simply, the WWAN terminal 200 may operate as a tethering AP.
 WWAN端末200(例えば、テザリング処理部246)は、WLAN端末100からの要求をトリガとして、テザリングAPとして機能するための処理を行ってもよい。具体的には、WWAN端末200は、WLAN端末100からの認証情報の要求の受信をトリガとして、テザリングAPとして機能するための処理を行ってもよい。例えば、WWAN端末200は、WLAN端末100からテザリングAPへの認証情報の要求(即ち、WWAN端末200自身の識別情報が指定された認証情報の要求)が受信されたことをトリガとしてもよい。また、WWAN端末200は、認証情報を有していない基地局510に関する認証情報の要求が受信されたことをトリガとしてもよい。このように、WWAN端末200は、WLAN端末100からの信号受信をトリガとしてテザリングAPとして動作開始可能(即ち、起動可能)である。このため、テザリングAPへの接続設定、及びWWAN端末200におけるテザリングON/OFF等の手作業が不要となり、利便性を向上させることが可能となる。 The WWAN terminal 200 (for example, the tethering processing unit 246) may perform processing for functioning as a tethering AP with a request from the WLAN terminal 100 as a trigger. Specifically, the WWAN terminal 200 may perform processing for functioning as a tethering AP with the reception of a request for authentication information from the WLAN terminal 100 as a trigger. For example, the WWAN terminal 200 may be triggered by reception of a request for authentication information from the WLAN terminal 100 to the tethering AP (that is, a request for authentication information specifying identification information of the WWAN terminal 200 itself). Further, the WWAN terminal 200 may be triggered by the reception of a request for authentication information related to the base station 510 that does not have authentication information. In this way, the WWAN terminal 200 can start (that is, can be activated) as a tethering AP with the reception of a signal from the WLAN terminal 100 as a trigger. This eliminates the need for manual operation such as connection setting to the tethering AP and tethering ON / OFF in the WWAN terminal 200, thereby improving convenience.
  (7)ユーザインタフェース
 WLAN端末100(例えば、取得部142、選択部144、通知部146、及び認証処理部148)は、処理内容を示す情報を出力し得る。図6及び図7に、出力部120に出力され得るユーザインタフェースの一例を示した。例えば、ネットワーク情報の取得又は接続先の選択が行われている場合には、ユーザインタフェース11が表示される。また、特定の無線局への認証処理が行われている場合には、ユーザインタフェース12が表示される。なお、図中の「AP_NAME」は、無線局の名称である。また、無線局への認証に成功し、無線接続が確立された場合には、ユーザインタフェース13が表示される。一方で、無線局への認証に失敗した場合、別の接続先を探索して、再度接続を行う旨のユーザインタフェース14が表示される。そして、再度の接続(即ち、認証)に成功した場合には、ユーザインタフェース13が表示される。なお、ユーザは、キャンセルボタンを押下することにより、いつでも接続処理を中断することが可能である。
(7) User Interface The WLAN terminal 100 (for example, the acquisition unit 142, the selection unit 144, the notification unit 146, and the authentication processing unit 148) can output information indicating the processing content. 6 and 7 show examples of user interfaces that can be output to the output unit 120. FIG. For example, when obtaining network information or selecting a connection destination, the user interface 11 is displayed. In addition, when an authentication process for a specific wireless station is performed, the user interface 12 is displayed. Note that “AP_NAME” in the figure is the name of the wireless station. Further, when the authentication to the wireless station is successful and the wireless connection is established, the user interface 13 is displayed. On the other hand, if the authentication to the wireless station fails, a user interface 14 is displayed to search for another connection destination and connect again. When the connection (that is, authentication) is successful again, the user interface 13 is displayed. Note that the user can interrupt the connection process at any time by pressing a cancel button.
 以上、本実施形態に係る無線通信システム1の技術的特徴を説明した。続いて、図8~図23を参照して、本実施形態に係る無線通信システム1における処理の流れの一例を説明する。 The technical features of the wireless communication system 1 according to this embodiment have been described above. Next, an example of a processing flow in the wireless communication system 1 according to the present embodiment will be described with reference to FIGS.
  <3.2.処理の流れ>
 (1)第1の接続処理例
 まず、図8及び図9を参照して、選択主体がWLAN端末100であり、接続先が基地局510であるケースについて説明する。
<3.2. Flow of processing>
(1) First Connection Processing Example First, a case where the selection subject is the WLAN terminal 100 and the connection destination is the base station 510 will be described with reference to FIGS.
 図8は、本実施形態に係る無線通信システム1において実行される接続処理の流れの一例を示すシーケンス図である。図8に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び基地局510が関与する。 FIG. 8 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 8, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
 なお、WLAN端末100及びWWAN端末200に関しては、メッセージのやり取りに用いられる通信モジュールを、「モジュール」という文言を省略して図示している。例えば、WLAN(Wi-Fi)モジュール112を起点又は終点とするメッセージは、WLANモジュール112により送受信されることを示している。BTモジュール114、WWANモジュール212、及びBTモジュール216についても同様である。また、WLAN端末100とWWAN端末200とは、予め近距離無線通信(例えば、Bluetooth)によりペアリング済みであり、通信路が確立されているものとする。以下の説明においては、どの通信モジュールによりメッセージが送受信されているかは省略する。これらの点は、図9以降の他のシーケンスにおいても同様である。 In addition, regarding the WLAN terminal 100 and the WWAN terminal 200, the communication module used for message exchange is illustrated with the word “module” omitted. For example, a message having a WLAN (Wi-Fi) module 112 as a starting point or an ending point indicates that the WLAN module 112 transmits and receives. The same applies to the BT module 114, the WWAN module 212, and the BT module 216. In addition, it is assumed that the WLAN terminal 100 and the WWAN terminal 200 have been previously paired by near field communication (for example, Bluetooth) and a communication path has been established. In the following description, it is omitted which communication module is sending and receiving messages. These points are the same in other sequences after FIG.
 図8に示すように、まず、WLAN端末100は、ネットワーク情報要求を基地局510へ送信して(ステップS102)、基地局510からネットワーク情報を受信する(ステップS104)。この一連の手続きは、例えばプローブプロセスである。 As shown in FIG. 8, first, the WLAN terminal 100 transmits a network information request to the base station 510 (step S102), and receives network information from the base station 510 (step S104). This series of procedures is, for example, a probe process.
 次いで、WLAN端末100は、選択処理を行う(ステップS106)。例えば、WLAN端末100は、取得したネットワーク情報、接続履歴及びネットワーク選択ポリシーに基づいて、接続先の無線局を選択し、認証方式を選択する。本シーケンスでは、接続先として基地局510が選択されたものとする。 Next, the WLAN terminal 100 performs a selection process (step S106). For example, the WLAN terminal 100 selects a connection destination radio station based on the acquired network information, connection history, and network selection policy, and selects an authentication method. In this sequence, it is assumed that the base station 510 is selected as the connection destination.
 次に、WLAN端末100は、認証処理を行う(ステップS108)。例えば、WLAN端末100は、WWAN端末200から提供された認証情報を用いて、接続先の無線局(即ち、本シーケンスにおいては基地局510)への認証処理を行う。認証処理については、図15~図22を参照して後に詳しく説明する。 Next, the WLAN terminal 100 performs an authentication process (step S108). For example, the WLAN terminal 100 uses the authentication information provided from the WWAN terminal 200 to perform an authentication process for a connection destination wireless station (that is, the base station 510 in this sequence). The authentication process will be described in detail later with reference to FIGS.
 次いで、WLAN端末100は、セキュリティセッションを確立する(ステップS110)。例えば、WLAN端末100は、接続先の無線局との間で4-Way Handshakeを行う。4-Way Handshakeにおいては、WLAN端末100は、接続先の無線局との間で乱数及びMACアドレスを交換して鍵情報を生成し、セキュリティセッションを確立する。 Next, the WLAN terminal 100 establishes a security session (step S110). For example, the WLAN terminal 100 performs 4-Way Handshake with the connected wireless station. In 4-Way Handshake, the WLAN terminal 100 generates key information by exchanging random numbers and MAC addresses with a connected wireless station, and establishes a security session.
 そして、WLAN端末100は、接続先の無線局との間でIPセッションを確立する(ステップS112)。例えば、WLAN端末100は、DHCP(Dynamic Host Configuration Protocol)等によりIPアドレスの割り当てを受けて、IPセッションを確立する。 Then, the WLAN terminal 100 establishes an IP session with the connection destination wireless station (step S112). For example, the WLAN terminal 100 receives an IP address assignment by DHCP (Dynamic Host Configuration Protocol) or the like and establishes an IP session.
 以上により、処理は終了する。 This completes the process.
 図9は、本実施形態に係る無線通信システム1において実行される接続処理の流れの一例を示すシーケンス図である。図9に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び複数の基地局510(即ち、510A、510B及び510C)が関与する。 FIG. 9 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 9, the WWAN terminal 200, the WLAN terminal 100, and a plurality of base stations 510 (that is, 510A, 510B, and 510C) are involved in this sequence.
 図9に示すように、まず、WLAN端末100は、ネットワーク情報要求を基地局510Aへ送信して(ステップS102A)、基地局510Aからネットワーク情報を受信する(ステップS104A)。同様に、WLAN端末100は、ネットワーク情報要求を基地局510Bへ送信して(ステップS102B)、基地局510Bからネットワーク情報を受信する(ステップS104B)。また、WLAN端末100は、ネットワーク情報要求を基地局510Cへ送信して(ステップS102C)、基地局510Cからネットワーク情報を受信する(ステップS104C)。 As shown in FIG. 9, first, the WLAN terminal 100 transmits a network information request to the base station 510A (step S102A) and receives network information from the base station 510A (step S104A). Similarly, the WLAN terminal 100 transmits a network information request to the base station 510B (step S102B) and receives network information from the base station 510B (step S104B). Further, the WLAN terminal 100 transmits a network information request to the base station 510C (step S102C) and receives network information from the base station 510C (step S104C).
 次いで、WLAN端末100は、選択処理を行う(ステップS106)。例えば、WLAN端末100は、取得した3つのネットワーク情報に基づいて、接続先の無線局を選択し、認証方式を選択する。本シーケンスでは、接続先として基地局510Cが選択されたものとする。なお、WLAN端末100は、ネットワーク情報要求を行った全ての基地局510(即ち、510A、510B及び510C)からのネットワーク情報が揃ってから選択処理を行ってもよいし、受信する度に逐次的に選択処理を行ってもよい。 Next, the WLAN terminal 100 performs a selection process (step S106). For example, the WLAN terminal 100 selects a connection destination wireless station based on the acquired three pieces of network information, and selects an authentication method. In this sequence, it is assumed that the base station 510C is selected as the connection destination. Note that the WLAN terminal 100 may perform the selection process after the network information from all the base stations 510 (that is, 510A, 510B, and 510C) that requested the network information has been prepared, or each time it is received. A selection process may be performed.
 次に、WLAN端末100は、基地局510Cへの認証処理を行い(ステップS108)、基地局510Cとの間でセキュリティセッションを確立し(ステップS110)、IPセッションを確立する(ステップS112)。 Next, the WLAN terminal 100 performs an authentication process for the base station 510C (step S108), establishes a security session with the base station 510C (step S110), and establishes an IP session (step S112).
 以上により、処理は終了する。 This completes the process.
 (2)第2の接続処理例
 続いて、図10及び図11を参照して、選択主体がWLAN端末100であり、接続先がテザリングAPとして動作するWWAN端末200であるケースについて説明する。
(2) Second Connection Processing Example Next, a case where the selection subject is the WLAN terminal 100 and the connection destination is the WWAN terminal 200 operating as a tethering AP will be described with reference to FIGS. 10 and 11.
 図10は、本実施形態に係る無線通信システム1において実行される接続処理の流れの一例を示すシーケンス図である。図10に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び基地局510が関与する。本シーケンスの開始時点においては、WWAN端末200は、テザリングAPとして動作していないものとする。 FIG. 10 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 10, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence. It is assumed that the WWAN terminal 200 is not operating as a tethering AP at the start of this sequence.
 図10に示すように、まず、WLAN端末100は、ネットワーク情報要求を基地局510へ送信して(ステップS202)、基地局510からネットワーク情報を受信する(ステップS204)。 As shown in FIG. 10, first, the WLAN terminal 100 transmits a network information request to the base station 510 (step S202), and receives network information from the base station 510 (step S204).
 次いで、WLAN端末100は、選択処理を行う(ステップS206)。本シーケンスでは、接続先としてWWAN端末200が選択されたものとする。 Next, the WLAN terminal 100 performs a selection process (step S206). In this sequence, it is assumed that the WWAN terminal 200 is selected as the connection destination.
 次に、WLAN端末100は、認証処理を行う(ステップS208)。この認証処理において、WLAN端末100は、テザリングAPへの認証情報の要求をWWAN端末200に送信することで、WWAN端末200をテザリングAPとして起動させる。 Next, the WLAN terminal 100 performs an authentication process (step S208). In this authentication process, the WLAN terminal 100 activates the WWAN terminal 200 as a tethering AP by transmitting a request for authentication information to the tethering AP to the WWAN terminal 200.
 次いで、WLAN端末100は、WWAN端末200との間でセキュリティセッションを確立し(ステップS210)、IPセッションを確立する(ステップS212)。 Next, the WLAN terminal 100 establishes a security session with the WWAN terminal 200 (step S210) and establishes an IP session (step S212).
 以上により、処理は終了する。 This completes the process.
 なお、上記では、一例として、ステップS208において接続先としてWWAN端末200が選択されることで、WWAN端末200がテザリングAPとして起動する例を説明した。他の例として、ステップS208において、WWAN端末200が認証情報を有していない基地局510が接続先として選択された場合にも、WWAN端末200はテザリングAPとして起動し得る。この点については、図16を参照して後に詳しく説明する。 In the above description, as an example, an example has been described in which the WWAN terminal 200 is activated as a tethering AP when the WWAN terminal 200 is selected as a connection destination in step S208. As another example, the WWAN terminal 200 can be activated as a tethering AP even when a base station 510 to which the WWAN terminal 200 does not have authentication information is selected as a connection destination in step S208. This point will be described in detail later with reference to FIG.
 また、上記では、一例として、ステップS206において、テザリングAPとして動作していない状態のWWAN端末200が接続先として選択された例を説明した。他の例として、ステップS206において、WLAN端末100は、WWAN端末200をテザリングAPとして一旦起動させて、ネットワーク情報を取得した上で選択処理を行い、接続先として選択してもよい。 In the above description, as an example, the example in which the WWAN terminal 200 not operating as the tethering AP is selected as the connection destination in step S206 has been described. As another example, in step S206, the WLAN terminal 100 may once activate the WWAN terminal 200 as a tethering AP, acquire network information, perform a selection process, and select a connection destination.
 図11は、本実施形態に係る無線通信システム1において実行される接続処理の流れの一例を示すシーケンス図である。図11に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び基地局510が関与する。本シーケンスの開始時点において、WWAN端末200は、テザリングAPとして動作しているものとする。 FIG. 11 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 11, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence. It is assumed that the WWAN terminal 200 is operating as a tethering AP at the start of this sequence.
 図11に示すように、まず、WLAN端末100は、ネットワーク情報要求を基地局510へ送信して(ステップS202A)、基地局510からネットワーク情報を受信する(ステップS204A)。同様に、WLAN端末100は、ネットワーク情報要求をテザリングAPとして動作するWWAN端末200へ送信して(ステップS202B)、WWAN端末200からネットワーク情報を受信する(ステップS204B)。 As shown in FIG. 11, first, the WLAN terminal 100 transmits a network information request to the base station 510 (step S202A) and receives network information from the base station 510 (step S204A). Similarly, the WLAN terminal 100 transmits a network information request to the WWAN terminal 200 that operates as a tethering AP (step S202B), and receives network information from the WWAN terminal 200 (step S204B).
 次いで、WLAN端末100は、選択処理を行う(ステップS206)。本シーケンスでは、接続先としてWWAN端末200が選択されたものとする。 Next, the WLAN terminal 100 performs a selection process (step S206). In this sequence, it is assumed that the WWAN terminal 200 is selected as the connection destination.
 次に、WLAN端末100は、WWAN端末200への認証処理を行い(ステップS208)、WWAN端末200との間でセキュリティセッションを確立し(ステップS210)、IPセッションを確立する(ステップS212)。 Next, the WLAN terminal 100 performs an authentication process for the WWAN terminal 200 (step S208), establishes a security session with the WWAN terminal 200 (step S210), and establishes an IP session (step S212).
 以上により、処理は終了する。 This completes the process.
 (3)第3の接続処理例
 続いて、図12及び図13を参照して、選択主体がWWAN端末200であり、接続先が基地局510であるケースについて説明する。
(3) Third Connection Processing Example Next, a case where the selection subject is the WWAN terminal 200 and the connection destination is the base station 510 will be described with reference to FIGS. 12 and 13.
 図12は、本実施形態に係る無線通信システム1において実行される接続処理の流れの一例を示すシーケンス図である。図12に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び基地局510が関与する。 FIG. 12 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 12, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
 図12に示すように、まず、WLAN端末100は、ネットワーク情報要求を基地局510へ送信して(ステップS302)、基地局510からネットワーク情報を受信する(ステップS304)。 As shown in FIG. 12, first, the WLAN terminal 100 transmits a network information request to the base station 510 (step S302), and receives network information from the base station 510 (step S304).
 次いで、WLAN端末100は、基地局510から取得したネットワーク情報を、WWAN端末200へ通知する(ステップS306)。詳しくは、WLAN端末100は、接続先の無線局及び認証方式の選択主体をWWAN端末200にすると判定し、WWAN端末200へネットワーク情報を通知する。 Next, the WLAN terminal 100 notifies the WWAN terminal 200 of the network information acquired from the base station 510 (step S306). Specifically, the WLAN terminal 100 determines that the connection-target radio station and authentication method selection entity is the WWAN terminal 200 and notifies the WWAN terminal 200 of network information.
 次に、WWAN端末200は、選択処理を行う(ステップS308)。例えば、WWAN端末200は、取得したネットワーク情報、接続履歴及びネットワーク選択ポリシーに基づいて、接続先の無線局を選択し、認証方式を選択する。本シーケンスでは、接続先として基地局510が選択されたものとする。 Next, the WWAN terminal 200 performs a selection process (step S308). For example, the WWAN terminal 200 selects a connection-destination radio station based on the acquired network information, connection history, and network selection policy, and selects an authentication method. In this sequence, it is assumed that the base station 510 is selected as the connection destination.
 次いで、WWAN端末200は、選択結果を示す情報をWLAN端末100へ通知する(ステップS310)。例えば、WWAN端末200は、選択した基地局510の識別情報、選択した通信方式を示す情報、及び選択した認証方式を示す情報等をWLAN端末100へ通知する。 Next, the WWAN terminal 200 notifies the WLAN terminal 100 of information indicating the selection result (step S310). For example, the WWAN terminal 200 notifies the WLAN terminal 100 of identification information of the selected base station 510, information indicating the selected communication method, information indicating the selected authentication method, and the like.
 次に、WLAN端末100は、認証処理を行う(ステップS312)。例えば、WLAN端末100は、WWAN端末200から通知された選択結果を示す情報に従って、基地局510への認証処理を行う。 Next, the WLAN terminal 100 performs an authentication process (step S312). For example, the WLAN terminal 100 performs an authentication process to the base station 510 according to information indicating the selection result notified from the WWAN terminal 200.
 次いで、WLAN端末100は、基地局510Cとの間でセキュリティセッションを確立し(ステップS314)、IPセッションを確立する(ステップS316)。 Next, the WLAN terminal 100 establishes a security session with the base station 510C (step S314) and establishes an IP session (step S316).
 以上により、処理は終了する。 This completes the process.
 図13は、本実施形態に係る無線通信システム1において実行される接続処理の流れの一例を示すシーケンス図である。図13に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び複数の基地局510(即ち、510A、510B及び510C)が関与する。 FIG. 13 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 13, the WWAN terminal 200, the WLAN terminal 100, and a plurality of base stations 510 (that is, 510A, 510B, and 510C) are involved in this sequence.
 図13に示すように、まず、WLAN端末100は、ネットワーク情報要求を基地局510Aへ送信して(ステップS302A)、基地局510Aからネットワーク情報を受信する(ステップS304A)。同様に、WLAN端末100は、ネットワーク情報要求を基地局510Bへ送信して(ステップS302B)、基地局510Bからネットワーク情報を受信する(ステップS304B)。また、WLAN端末100は、ネットワーク情報要求を基地局510Cへ送信して(ステップS302C)、基地局510Cからネットワーク情報を受信する(ステップS304C)。 As shown in FIG. 13, first, the WLAN terminal 100 transmits a network information request to the base station 510A (step S302A) and receives network information from the base station 510A (step S304A). Similarly, the WLAN terminal 100 transmits a network information request to the base station 510B (step S302B) and receives network information from the base station 510B (step S304B). Also, the WLAN terminal 100 transmits a network information request to the base station 510C (step S302C) and receives network information from the base station 510C (step S304C).
 次いで、WLAN端末100は、基地局510A、510B及び510Cから取得したネットワーク情報を、WWAN端末200へ通知する(ステップS306)。 Next, the WLAN terminal 100 notifies the WWAN terminal 200 of the network information acquired from the base stations 510A, 510B and 510C (step S306).
 次に、WWAN端末200は、選択処理を行う(ステップS308)。本シーケンスでは、接続先として基地局510Aが選択されたものとする。 Next, the WWAN terminal 200 performs a selection process (step S308). In this sequence, it is assumed that the base station 510A is selected as the connection destination.
 次いで、WWAN端末200は、選択結果を示す情報をWLAN端末100へ通知する(ステップS310)。 Next, the WWAN terminal 200 notifies the WLAN terminal 100 of information indicating the selection result (step S310).
 次に、WLAN端末100は、基地局510Aへの認証処理を行い(ステップS312)、基地局510Aとの間でセキュリティセッションを確立し(ステップS314)、IPセッションを確立する(ステップS316)。 Next, the WLAN terminal 100 performs an authentication process for the base station 510A (step S312), establishes a security session with the base station 510A (step S314), and establishes an IP session (step S316).
 以上により、処理は終了する。 This completes the process.
 (4)第4の接続処理例
 続いて、図14を参照して、WLAN端末100とWWAN端末200との間にメッシュネットワークが形成されているケースについて説明する。本接続処理例では、選択主体がWLAN端末100であり、接続先が基地局510であるものとする。
(4) Fourth Connection Processing Example Next, a case where a mesh network is formed between the WLAN terminal 100 and the WWAN terminal 200 will be described with reference to FIG. In this connection processing example, it is assumed that the selection subject is the WLAN terminal 100 and the connection destination is the base station 510.
 図14は、本実施形態に係る無線通信システム1において実行される接続処理の流れの一例を示すシーケンス図である。図14に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び基地局510が関与する。 FIG. 14 is a sequence diagram showing an example of the flow of connection processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 14, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
 なお、本接続処理例では、WLAN端末100とWWAN端末200との間に、WLAN(例えば、802.11s)を用いたメッシュネットワークが形成されているものとする。例えば、WWAN端末200のWLANモジュール214及びWLAN端末100のWLANモジュール112Aは、メッシュステーションとして機能し、メッシュネットワークを介して互いに通信可能である。他方、WLAN端末100のWLANモジュール112Bは、AP(例えば、基地局510)との通信を行う、ステーションとしても機能する。 In this connection processing example, it is assumed that a mesh network using a WLAN (for example, 802.11s) is formed between the WLAN terminal 100 and the WWAN terminal 200. For example, the WLAN module 214 of the WWAN terminal 200 and the WLAN module 112A of the WLAN terminal 100 function as a mesh station and can communicate with each other via a mesh network. On the other hand, the WLAN module 112B of the WLAN terminal 100 also functions as a station that performs communication with an AP (for example, the base station 510).
 図14に示すように、まず、WLAN端末100は、ネットワーク情報要求を基地局510へ送信して(ステップS402)、基地局510からネットワーク情報を受信する(ステップS404)。 As shown in FIG. 14, first, the WLAN terminal 100 transmits a network information request to the base station 510 (step S402) and receives network information from the base station 510 (step S404).
 次いで、WLAN端末100は、選択処理を行う(ステップS406)。本シーケンスでは、接続先として基地局510が選択されたものとする。 Next, the WLAN terminal 100 performs a selection process (step S406). In this sequence, it is assumed that the base station 510 is selected as the connection destination.
 次に、WLAN端末100は、基地局510への認証処理を行い(ステップS408)、基地局510との間でセキュリティセッションを確立し(ステップS410)、IPセッションを確立する(ステップS412)。なお、認証処理については、図15~図22を参照して後に詳しく説明するが、WWAN端末200とWLAN端末100との間の通信は、Bluetoothではなくメッシュネットワークにより行われる。 Next, the WLAN terminal 100 performs an authentication process for the base station 510 (step S408), establishes a security session with the base station 510 (step S410), and establishes an IP session (step S412). Although the authentication process will be described in detail later with reference to FIGS. 15 to 22, communication between the WWAN terminal 200 and the WLAN terminal 100 is performed by a mesh network instead of Bluetooth.
 以上により、処理は終了する。 This completes the process.
 以上、第1~第4の接続処理例を説明した。なお、本明細書では説明を省略するが、選択主体がWWAN端末200であり、接続先がテザリングAPとして動作するWWAN端末200自身であってもよい。続いて、図15~図22を参照して、認証処理を詳細に説明する。 The first to fourth connection processing examples have been described above. In addition, although description is abbreviate | omitted in this specification, the selection main body may be the WWAN terminal 200 and the WWAN terminal 200 itself which operate | moves as a tethering AP may be sufficient as a connecting point. Next, the authentication process will be described in detail with reference to FIGS.
 (4)第1の認証処理例
 まず、図15及び図16を参照して、WPA2-PSKが認証方式として選択され、WLAN端末100がWWAN端末200のPSK又はパスフレーズを認証に用いる場合の処理の流れを説明する。なお、図15は、認証先が基地局510である場合の例であり、図16は、認証先がWWAN端末200である場合の例である。
(4) First Authentication Processing Example First, referring to FIG. 15 and FIG. 16, processing when WPA2-PSK is selected as an authentication method and the WLAN terminal 100 uses the PSK or passphrase of the WWAN terminal 200 for authentication. The flow of will be described. 15 is an example in the case where the authentication destination is the base station 510, and FIG. 16 is an example in the case where the authentication destination is the WWAN terminal 200.
 図15は、本実施形態に係る無線通信システム1において実行される認証処理の流れの一例を示すシーケンス図である。図15に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び基地局510が関与する。 FIG. 15 is a sequence diagram showing an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 15, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
 図15に示すように、まず、WLAN端末100は、WWAN端末200へ認証情報の要求を送信する(ステップS502)。例えば、WLAN端末100は、接続先の基地局510の識別情報を指定して、認証情報の要求を送信する。 As shown in FIG. 15, first, the WLAN terminal 100 transmits a request for authentication information to the WWAN terminal 200 (step S502). For example, the WLAN terminal 100 designates identification information of the connection destination base station 510 and transmits a request for authentication information.
 次いで、WLAN端末100は、WWAN端末200から認証情報を受信する(ステップS504)。例えば、WLAN端末100は、認証情報として、PSK又はパスフレーズを受信する。 Next, the WLAN terminal 100 receives authentication information from the WWAN terminal 200 (step S504). For example, the WLAN terminal 100 receives a PSK or a passphrase as authentication information.
 次に、WLAN端末100は、受信したPSK又はパスフレーズを用いて、基地局510へアソシエーションを実施する(ステップS506)。基地局510とのアソシエーションが完了すると、WLAN端末100と基地局510との間でWi-Fiの運用が開始される(ステップS508)。 Next, the WLAN terminal 100 performs association with the base station 510 using the received PSK or passphrase (step S506). When the association with the base station 510 is completed, Wi-Fi operation is started between the WLAN terminal 100 and the base station 510 (step S508).
 以上により、処理は終了する。 This completes the process.
 図16は、本実施形態に係る無線通信システム1において実行される認証処理の流れの一例を示すシーケンス図である。図16に示すように、本シーケンスには、WWAN端末200、WLAN端末100及び基地局510が関与する。 FIG. 16 is a sequence diagram showing an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 16, the WWAN terminal 200, the WLAN terminal 100, and the base station 510 are involved in this sequence.
 図16に示すように、まず、WLAN端末100は、WWAN端末200へ認証情報の要求を送信する(ステップS602)。例えば、WLAN端末100は、接続先の基地局510の識別情報を指定して、認証情報の要求を送信する。 As shown in FIG. 16, first, the WLAN terminal 100 transmits a request for authentication information to the WWAN terminal 200 (step S602). For example, the WLAN terminal 100 designates identification information of the connection destination base station 510 and transmits a request for authentication information.
 次いで、WWAN端末200は、テザリング処理を開始し、テザリングAPとして起動する(ステップS604)。例えば、WWAN端末200は、指定された基地局510の認証情報を有していない場合に、テザリングAPとして起動してもよい。また、WWAN端末200は、指定された基地局510の認証情報を有していたとしても、通信品質等に基づきテザリングが有効であると判断した場合に、テザリングAPとして起動してもよい。また、WWAN端末200は、認証情報の要求においてWWAN端末200自身が指定された場合に、テザリングAPとして起動してもよい。 Next, the WWAN terminal 200 starts tethering processing and starts up as a tethering AP (step S604). For example, the WWAN terminal 200 may be activated as a tethering AP when it does not have authentication information of the designated base station 510. Further, even if the WWAN terminal 200 has the authentication information of the designated base station 510, the WWAN terminal 200 may be activated as a tethering AP when it is determined that tethering is effective based on communication quality or the like. Further, the WWAN terminal 200 may be activated as a tethering AP when the WWAN terminal 200 itself is designated in the request for authentication information.
 次に、WLAN端末100は、WWAN端末200から認証情報を受信する(ステップS606)。例えば、WLAN端末100は、認証情報として、PSK又はパスフレーズを受信する。 Next, the WLAN terminal 100 receives authentication information from the WWAN terminal 200 (step S606). For example, the WLAN terminal 100 receives a PSK or a passphrase as authentication information.
 次に、WLAN端末100は、受信したPSK又はパスフレーズを用いて、WWAN端末200へアソシエーションを実施する(ステップS608)。WWAN端末200とのアソシエーションが完了すると、WLAN端末100とWWAN端末200との間でWi-Fiの運用が開始される(ステップS610)。 Next, the WLAN terminal 100 performs association with the WWAN terminal 200 using the received PSK or passphrase (step S608). When the association with the WWAN terminal 200 is completed, Wi-Fi operation is started between the WLAN terminal 100 and the WWAN terminal 200 (step S610).
 以上により、処理は終了する。 This completes the process.
 (5)第2の認証処理例
 続いて、図17及び図18を参照して、SIM情報を用いた認証方式(例えば、EAP-AKA)が選択され、WLAN端末100がWWAN端末200のSIM情報を認証に用いる場合の処理の流れを説明する。なお、図17及び図18では、認証先が基地局510である場合の例を説明する。
(5) Second Authentication Processing Example Next, with reference to FIG. 17 and FIG. 18, an authentication method using SIM information (for example, EAP-AKA) is selected, and the WLAN terminal 100 uses the SIM information of the WWAN terminal 200. The flow of processing when using the method for authentication will be described. 17 and 18, an example in which the authentication destination is the base station 510 will be described.
 図17及び図18は、本実施形態に係る無線通信システム1において実行される認証処理の流れの一例を示すシーケンス図である。図17及び図18に示すように、本シーケンスには、WWAN端末200、WLAN端末100、基地局510、認証サーバ340、及び加入者情報サーバ330が関与する。 17 and 18 are sequence diagrams showing an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIGS. 17 and 18, the WWAN terminal 200, the WLAN terminal 100, the base station 510, the authentication server 340, and the subscriber information server 330 are involved in this sequence.
 図17に示すように、まず、WLAN端末100は、基地局510へAssociationを行う(ステップS702)。WLAN端末100は、Associationにより、認証処理のための論理的な接続を確立する。WLAN端末100は、認証処理以外の、例えばデータ通信を行うことはまだできない。 As shown in FIG. 17, first, the WLAN terminal 100 performs association with the base station 510 (step S702). The WLAN terminal 100 establishes a logical connection for authentication processing by association. The WLAN terminal 100 cannot perform data communication other than authentication processing, for example.
 次いで、WLAN端末100は、基地局510へ、EAPoL-Startを送信する(ステップS704)。 Next, the WLAN terminal 100 transmits EAPoL-Start to the base station 510 (step S704).
 次いで、基地局510は、WLAN端末100へEAP-Request/Identityを送信する(ステップS706)。 Next, the base station 510 transmits EAP-Request / Identity to the WLAN terminal 100 (step S706).
 次に、WLAN端末100は、WWAN端末200へ、ステップS706で受信したEAP-Request/Identityを送信する(ステップS708)。このメッセージは、WWAN端末200に対して、EAP-AKAで必要となるIdentityを生成するよう要求するメッセージである。 Next, the WLAN terminal 100 transmits the EAP-Request / Identity received in step S706 to the WWAN terminal 200 (step S708). This message is a message requesting the WWAN terminal 200 to generate an Identity required for EAP-AKA.
 次いで、WWAN端末200は、自身が有する加入者識別モジュール230を参照して、Identityを生成する(ステップS710)。例えば、制御部240は、加入者識別モジュール230であるSIMカードに記録された情報に基づいて、Identityを生成する。認証プロトコルがEAP-AKAの場合、IMSIをもとにIdentityが生成される。 Next, the WWAN terminal 200 refers to the subscriber identification module 230 that the WWAN terminal 200 has and generates Identity (step S710). For example, the control unit 240 generates Identity based on information recorded on a SIM card that is the subscriber identification module 230. When the authentication protocol is EAP-AKA, Identity is generated based on IMSI.
 なお、IMSIのフォーマットは以下の通りである。
  <MCC:3桁><MNC:2又は3桁><MSIN:最大10桁>
The IMSI format is as follows.
<MCC: 3 digits><MNC: 2 or 3 digits><MSIN: Maximum 10 digits>
 ここで、MCC(Mobile Country Code)は、国を示す情報であり、MNC(Mobile Network Code)は、事業者を示す情報であり、MSIN(Mobile Subscriber Identification Number)は、加入者識別コードを示す情報である。 Here, MCC (Mobile Country Code) is information indicating the country, MNC (Mobile Network Code) is information indicating the operator, and MSIN (Mobile Subscriber Identification Number) is information indicating the subscriber identification code. It is.
 また、Identityのフォーマットは以下の通りである。
  0<IMSI>@wlan.mnc<MNC>.mcc<MCC>.3gppnetwork.org
Also, the format of Identity is as follows.
0 <IMSI> @wlan. mnc <MNC>. mcc <MCC>. 3gppnetwork. org
 例えば、MNCが3桁であり、IMSIが「123456012345678」であった場合を想定する。この場合、Identityは、「0123456012345678@wlan.mnc456.mcc123.3gppnetwork.org」となる。以上、ステップS710におけるIdentityの生成処理について説明した。 For example, it is assumed that the MNC is 3 digits and the IMSI is “1234560125345678”. In this case, Identity is “01234560125345678@wlan.mnc456.mcc123.3gppnetwork.org”. The identity generation processing in step S710 has been described above.
 次に、WWAN端末200は、EAP-Response/Identityを、WLAN端末100へ返信する(ステップS712)。このメッセージには、ステップS710において生成されたIdentitiyが格納されている。 Next, the WWAN terminal 200 returns EAP-Response / Identity to the WLAN terminal 100 (step S712). This message stores the Identity generated in step S710.
 次いで、WLAN端末100は、受信したEAP-Response/Identityを、基地局510へ転送する(ステップS714)。 Next, the WLAN terminal 100 transfers the received EAP-Response / Identity to the base station 510 (step S714).
 次に、基地局510は、RADIUS-Access-Requestを認証サーバ340へ送信する(ステップS716)。このメッセージには、WWAN端末200により生成されたIdentityが格納される。 Next, the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S716). In this message, the Identity generated by the WWAN terminal 200 is stored.
 次いで、認証サーバ340は、Retreive-Authentication-Vectorを加入者情報サーバ330へ送信して、Identitiyに対する認証ベクタを要求する(ステップS718)。このメッセージには、WWAN端末200により生成されたIdentityが格納される。認証ベクタとは、接続してきた端末を認証する際に必要とされる情報の集合であり、EAP-AKAの場合は以下の情報から構成される。 Next, the authentication server 340 transmits a Retrieval-Authentication-Vector to the subscriber information server 330 and requests an authentication vector for Identity (step S718). In this message, the Identity generated by the WWAN terminal 200 is stored. An authentication vector is a set of information required for authenticating a connected terminal. In the case of EAP-AKA, the authentication vector includes the following information.
  RAND:ランダム値。チャレンジとして利用される。
  AUTN:端末がネットワークを認証するための値。
  XRES:チャレンジに対して期待される応答値。
  IK  :メッセージ完全性検証用鍵。
  CK  :メッセージ暗号化用鍵。
RAND: random value. Used as a challenge.
AUTN: A value for the terminal to authenticate the network.
XRES: expected response value for challenge.
IK: Message integrity verification key.
CK: Key for message encryption.
 次に、加入者情報サーバ330は、AKAアルゴリズムを実行して、受信したメッセージに格納されたIdentitiyに対応する認証ベクタを生成する(ステップS720)。 Next, the subscriber information server 330 executes the AKA algorithm and generates an authentication vector corresponding to the Identity stored in the received message (step S720).
 次いで、図18に示すように、加入者情報サーバ330は、生成した認証ベクタを認証サーバ340へ送信する(ステップS722)。 Next, as shown in FIG. 18, the subscriber information server 330 transmits the generated authentication vector to the authentication server 340 (step S722).
 次に、認証サーバ340は、RADIUS-Access-Challengeを基地局510へ送信する(ステップS724)。このメッセージには、加入者情報サーバ330により生成された認証ベクタが格納される。ここで、認証サーバ340は、新たにMAC(Message Authentication Code)を算出して、メッセージに追加する。このMACは、WLAN端末100がこのメッセージの完全性(Integrity)を検証するために用いられる。 Next, the authentication server 340 transmits RADIUS-Access-Challenge to the base station 510 (step S724). In this message, the authentication vector generated by the subscriber information server 330 is stored. Here, the authentication server 340 newly calculates a MAC (Message Authentication Code) and adds it to the message. This MAC is used by the WLAN terminal 100 to verify the integrity of this message.
 次いで、基地局510は、EAP-Request/AKA-ChallengeをWLAN端末100へ送信する(ステップS726)。このメッセージには、認証ベクタのRAND及びAUTN、並びにMACが含まれる。認証ベクタのXRES、IK及びCKは基地局510により保持され、WLAN端末100へは送信されない。 Next, the base station 510 transmits EAP-Request / AKA-Challenge to the WLAN terminal 100 (step S726). This message includes authentication vectors RAND and AUTN, and MAC. The authentication vectors XRES, IK, and CK are held by the base station 510 and are not transmitted to the WLAN terminal 100.
 次に、WLAN端末100は、EAP-Request/AKA-ChallengeをWWAN端末200へ送信する(ステップS728)。このメッセージは、WWAN端末200に対して、応答値(RES)及びセッション鍵(IK,CK)を生成するよう要求するメッセージである。 Next, the WLAN terminal 100 transmits EAP-Request / AKA-Challenge to the WWAN terminal 200 (step S728). This message is a message requesting the WWAN terminal 200 to generate a response value (RES) and a session key (IK, CK).
 次いで、WWAN端末200は、AKAアルゴリズムを実行して、受信したEAP-Request/AKA-Challengeに対応するRES、MAC、及びセッション鍵(IK、CK)を生成する(ステップS730)。 Next, the WWAN terminal 200 executes the AKA algorithm to generate the RES, MAC, and session key (IK, CK) corresponding to the received EAP-Request / AKA-Challenge (step S730).
 次に、WWAN端末200は、EAP-Response/AKA-ChallengeをWLAN端末100へ送信する(ステップS732)。このメッセージには、WWAN端末200が生成したRES、MAC、及びセッション鍵が格納される。 Next, the WWAN terminal 200 transmits EAP-Response / AKA-Challenge to the WLAN terminal 100 (step S732). In this message, the RES, MAC, and session key generated by the WWAN terminal 200 are stored.
 次いで、WLAN端末100は、受信したEAP-Response/AKA-Challengeを基地局510へ転送する(ステップS734)。 Next, the WLAN terminal 100 transfers the received EAP-Response / AKA-Challenge to the base station 510 (step S734).
 次に、基地局510は、RADIUS-Access-Requestを認証サーバ340へ送信する(ステップS736)。このメッセージには、WWAN端末200により生成されたRES、MAC、及びセッション鍵(IK、CK)が格納される。 Next, the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S736). This message stores the RES, MAC, and session keys (IK, CK) generated by the WWAN terminal 200.
 次いで、認証サーバ340は、受信したRESを検証する(ステップS738)。詳しくは、認証サーバ340は、WWAN端末200により生成されたRESと加入者情報サーバ330により生成されたXRESとが一致すること、及びMACによりメッセージの完全性を検証する。 Next, the authentication server 340 verifies the received RES (step S738). Specifically, the authentication server 340 verifies that the RES generated by the WWAN terminal 200 matches the XRES generated by the subscriber information server 330 and the integrity of the message by MAC.
 次に、認証サーバ340は、RADIUS-Access-Acceptを基地局510へ送信する(ステップS740)。このメッセージは、接続を許可することを示すものである。 Next, the authentication server 340 transmits RADIUS-Access-Accept to the base station 510 (step S740). This message indicates that the connection is permitted.
 次いで、基地局510は、EAP-SuccessをWLAN端末100へ送信する(ステップS742)。このメッセージは、WLAN端末100に対して、認証処理が成功したことを示すものである。 Next, the base station 510 transmits EAP-Success to the WLAN terminal 100 (step S742). This message indicates that the authentication process has been successful for the WLAN terminal 100.
 次に、基地局510は、EAPoL-KeyをWLAN端末100へ送信する(ステップS744)。このメッセージは、WLAN端末100と基地局510との間で使用される暗号化通信用の鍵を送付するものである。 Next, the base station 510 transmits EAPoL-Key to the WLAN terminal 100 (step S744). This message sends a key for encrypted communication used between the WLAN terminal 100 and the base station 510.
 以上説明した認証処理を経て、WLAN端末100と基地局510との間で、WLAN通信のための接続が完了する(ステップS746)。これにより、WLAN端末100と基地局510との間で、例えばWi-Fiを用いたデータ通信が開始される。 Through the authentication process described above, the connection for WLAN communication is completed between the WLAN terminal 100 and the base station 510 (step S746). Thereby, for example, data communication using Wi-Fi is started between the WLAN terminal 100 and the base station 510.
 以上により、処理は終了する。 This completes the process.
 (6)第3の認証処理例
 続いて、図19及び図20を参照して、EAP-TLSが認証方式として選択され、WLAN端末100がWWAN端末200のTLS情報を認証に用いる場合の処理の流れを説明する。なお、図19及び図20では、認証先が基地局510である場合の例を説明する。
(6) Third Authentication Processing Example Next, with reference to FIG. 19 and FIG. 20, the processing when EAP-TLS is selected as the authentication method and the WLAN terminal 100 uses the TLS information of the WWAN terminal 200 for authentication. The flow will be described. 19 and 20, an example in which the authentication destination is the base station 510 will be described.
 図19及び図20は、本実施形態に係る無線通信システム1において実行される認証処理の流れの一例を示すシーケンス図である。図19及び図20に示すように、本シーケンスには、WWAN端末200、WLAN端末100、基地局510及び認証サーバ340が関与する。 19 and 20 are sequence diagrams showing an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIG. 19 and FIG. 20, the WWAN terminal 200, the WLAN terminal 100, the base station 510, and the authentication server 340 are involved in this sequence.
 図19に示すように、まず、WLAN端末100は、基地局510へAssociationを行う(ステップS802)。WLAN端末100は、Associationにより、認証処理のための論理的な接続を確立する。WLAN端末100は、認証処理以外の、例えばデータ通信を行うことはまだできない。 As shown in FIG. 19, first, the WLAN terminal 100 performs association with the base station 510 (step S802). The WLAN terminal 100 establishes a logical connection for authentication processing by association. The WLAN terminal 100 cannot perform data communication other than authentication processing, for example.
 次いで、WLAN端末100は、基地局510へ、EAPoL-Startを送信する(ステップS804)。 Next, the WLAN terminal 100 transmits EAPoL-Start to the base station 510 (step S804).
 次に、基地局510は、WLAN端末100へEAP-Request/Identityを送信する(ステップS806)。 Next, the base station 510 transmits EAP-Request / Identity to the WLAN terminal 100 (step S806).
 次いで、WLAN端末100は、WWAN端末200へEAP-Request/Identityを送信する(ステップS808)。このメッセージは、WWAN端末200に対して、EAP-TLSで必要となるIdentityを生成するよう要求するメッセージである。 Next, the WLAN terminal 100 transmits EAP-Request / Identity to the WWAN terminal 200 (step S808). This message is a message requesting the WWAN terminal 200 to generate an Identity required for EAP-TLS.
 次に、WWAN端末200は、WLAN端末100へ、生成したIdentityをEAP-Response/Identityとして送信する(ステップS810)。 Next, the WWAN terminal 200 transmits the generated Identity as EAP-Response / Identity to the WLAN terminal 100 (step S810).
 次いで、WLAN端末100は、基地局510へ、EAP-Response/Identityを送信する(ステップS812)。 Next, the WLAN terminal 100 transmits EAP-Response / Identity to the base station 510 (step S812).
 次に、基地局510は、認証サーバ340へ、RADIUS-Access-Requestを送信する(ステップS814)。 Next, the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S814).
 次いで、認証サーバ340は、基地局510へ、RADIUS-Access-Challengeを送信する(ステップS816)。本メッセージにより、認証サーバ340は、基地局510へTLS Startを通知する。 Next, the authentication server 340 transmits RADIUS-Access-Challenge to the base station 510 (step S816). With this message, the authentication server 340 notifies the base station 510 of TLS Start.
 次に、基地局510は、WLAN端末100へ、EAP-Request/TLS Startを送信する(ステップS818)。本メッセージには、TLS Startの通知が含まれている。 Next, the base station 510 transmits EAP-Request / TLS Start to the WLAN terminal 100 (step S818). This message includes a notification of TLS Start.
 次いで、WLAN端末100は、WWAN端末200へ、Request/TLS Startを送信する(ステップS820)。本メッセージは、WWAN端末200に対して、TLSの開始を要求するメッセージである。 Next, the WLAN terminal 100 transmits a Request / TLS Start to the WWAN terminal 200 (step S820). This message is a message for requesting the WWAN terminal 200 to start TLS.
 次に、WWAN端末200は、WLAN端末100へ、Response/TLS Client Helloを送信する(ステップS822)。本メッセージも含めて、これ以降のメッセージの送受信は、電子証明書に含まれる暗号化鍵を用いた暗号化が行われる。 Next, the WWAN terminal 200 transmits Response / TLS Client Hello to the WLAN terminal 100 (step S822). Transmission and reception of subsequent messages including this message are performed using the encryption key included in the electronic certificate.
 次いで、WLAN端末100は、基地局510へ、ステップS822で受信したメッセージを、EAP-Response/TLS ClientHelloとして転送する(ステップS824)。 Next, the WLAN terminal 100 transfers the message received in step S822 to the base station 510 as EAP-Response / TLS ClientHello (step S824).
 次に、基地局510は、認証サーバ340へ、RADIUS-Access-Requestを送信する(ステップS826)。本メッセージには、上記ステップS824で受信したTLS Client Helloのメッセージが含まれている。 Next, the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S826). This message includes the TLS Client Hello message received in step S824.
 次いで、図20に示すように、認証サーバ340は、基地局510へ、RADIUS-Access-Challengeを送信する(ステップS828)。本メッセージには、Server Certificateが含まれる。具体的には、本メッセージには、TLS server_hello、TLS certificate、TLS server_key_exchange、TLS certificate_request、及びTLS server_hello_done等のメッセージが含まれる。 Next, as shown in FIG. 20, the authentication server 340 transmits RADIUS-Access-Challenge to the base station 510 (step S828). This message includes Server Certificate. Specifically, this message includes messages such as TLS server_hello, TLS certificate, TLS server_key_change, TLS certificate_request, and TLS server_hello_done.
 次に、基地局510は、WLAN端末100へ、ステップS828で受信したメッセージを転送する(ステップS830)。ここでは、簡単のためEAP-Request/passthroughと図示している。 Next, the base station 510 transfers the message received in step S828 to the WLAN terminal 100 (step S830). Here, for simplicity, it is illustrated as EAP-Request / passthrough.
 次いで、WLAN端末100は、WWAN端末200へ、ステップS830で受信したメッセージを転送する(ステップS832)。ここでは、簡単のためRequest/passthroughと図示している。 Next, the WLAN terminal 100 transfers the message received in step S830 to the WWAN terminal 200 (step S832). Here, for simplicity, it is illustrated as Request / passthrough.
 次に、WWAN端末200は、WLAN端末100へ、Responseを送信する(ステップS834)。本メッセージには、Client Certificateが含まれる。具体的には、本メッセージには、TLS certificate、TLS client_key_exchange、TLS_certificate_verity、TLS change_cipher_spec、及びTLS finished等のメッセージが含まれる。 Next, the WWAN terminal 200 transmits a response to the WLAN terminal 100 (step S834). This message includes Client Certificate. Specifically, this message includes messages such as TLS certificate, TLS client_key_exchange, TLS_certificate_verity, TLS change_cipher_spec, and TLS finished.
 次いで、WLAN端末100は、基地局510へ、EAP-Responseを送信する(ステップS836)。本メッセージには、ステップS834で受信したメッセージが含まれる。 Next, the WLAN terminal 100 transmits an EAP-Response to the base station 510 (step S836). This message includes the message received in step S834.
 次に、基地局510は、認証サーバ340へ、RADIUS-Access-Requestを送信する(ステップS838)。本メッセージには、ステップS836で受信したメッセージが含まれる。 Next, the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S838). This message includes the message received in step S836.
 次いで、認証サーバ340は、基地局510へ、RADIUS-Access-Challengeを送信する(ステップS840)。本メッセージには、TLS change_cipher_spec、及びTLS finished等のメッセージが含まれる。 Next, the authentication server 340 transmits RADIUS-Access-Challenge to the base station 510 (step S840). This message includes messages such as TLS change_cipher_spec and TLS finished.
 次に、基地局510は、WLAN端末100へ、ステップS840で受信したメッセージを転送する(ステップS842)。ここでは、簡単のためEAP-Request/passthroughと図示している。 Next, the base station 510 transfers the message received in step S840 to the WLAN terminal 100 (step S842). Here, for simplicity, it is illustrated as EAP-Request / passthrough.
 次いで、WLAN端末100は、WWAN端末200へ、ステップS842で受信したメッセージを転送する(ステップS844)。ここでは、簡単のためにRequest/passthroughと図示している。 Next, the WLAN terminal 100 transfers the message received in step S842 to the WWAN terminal 200 (step S844). Here, for simplicity, it is illustrated as Request / passthrough.
 次に、WWAN端末200は、WLAN端末100へ、Responseを送信する(ステップS846)。 Next, the WWAN terminal 200 transmits a response to the WLAN terminal 100 (step S846).
 次いで、WLAN端末100は、基地局510へ、EAP-Responseを送信する(ステップS848)。 Next, the WLAN terminal 100 transmits an EAP-Response to the base station 510 (step S848).
 次に、基地局510は、認証サーバ340へ、RADIUS-Access-Requestを送信する(ステップS850)。 Next, the base station 510 transmits RADIUS-Access-Request to the authentication server 340 (step S850).
 次いで、認証サーバ340は、基地局510へ、RADIUS-Access-Acceptを送信する(ステップS852)。本メッセージは、認証を行っている端末が正当なユーザであり、接続を許可することを示すものである。 Next, the authentication server 340 transmits RADIUS-Access-Accept to the base station 510 (step S852). This message indicates that the authenticating terminal is a valid user and the connection is permitted.
 次に、基地局510は、WLAN端末100へ、EAP-Successを送信する(ステップS854)。本メッセージは、認証処理が成功したことを示すものである。 Next, the base station 510 transmits EAP-Success to the WLAN terminal 100 (step S854). This message indicates that the authentication process has been successful.
 次いで、基地局510は、WLAN端末100へ、EAPoL-Keyを送信する(ステップS856)。本メッセージは、WLAN端末100と基地局510との間で使用される暗号化通信用の鍵を送付するものである。 Next, the base station 510 transmits EAPoL-Key to the WLAN terminal 100 (step S856). This message sends a key for encrypted communication used between the WLAN terminal 100 and the base station 510.
 以上説明した認証処理を経て、WLAN端末100と基地局510との間で、WLAN通信のための接続が完了する(ステップS858)。これにより、WLAN端末100と基地局510との間で、例えばWi-Fiを用いたデータ通信が開始される。 Through the authentication process described above, the connection for WLAN communication is completed between the WLAN terminal 100 and the base station 510 (step S858). Thereby, for example, data communication using Wi-Fi is started between the WLAN terminal 100 and the base station 510.
 以上により、処理は終了する。 This completes the process.
 (7)第4の認証処理例
 続いて、図21及び図22を参照して、EAP-TTLSが認証方式として選択され、WLAN端末100がWWAN端末200の証明書情報、ユーザ名及びパスワードを認証に用いる場合の処理の流れを説明する。なお、図21及び図22では、認証先が基地局510である場合の例を説明する。
(7) Fourth Authentication Processing Example Next, referring to FIGS. 21 and 22, EAP-TTLS is selected as the authentication method, and the WLAN terminal 100 authenticates the certificate information, user name, and password of the WWAN terminal 200. The flow of processing when used in the above will be described. 21 and 22, an example in which the authentication destination is the base station 510 will be described.
 図21及び図22は、本実施形態に係る無線通信システム1において実行される認証処理の流れの一例を示すシーケンス図である。図21及び図22に示すように、本シーケンスには、WWAN端末200、WLAN端末100、基地局510、TTLSサーバ360及び認証サーバ340が関与する。 21 and 22 are sequence diagrams illustrating an example of the flow of authentication processing executed in the wireless communication system 1 according to the present embodiment. As shown in FIGS. 21 and 22, the WWAN terminal 200, the WLAN terminal 100, the base station 510, the TLS server 360 and the authentication server 340 are involved in this sequence.
 図21に示すように、まず、WLAN端末100は、基地局510へAssociationを行う(ステップS902)。WLAN端末100は、Associationにより、認証処理のための論理的な接続を確立する。WLAN端末100は、認証処理以外の、例えばデータ通信を行うことはまだできない。 As shown in FIG. 21, first, the WLAN terminal 100 performs association with the base station 510 (step S902). The WLAN terminal 100 establishes a logical connection for authentication processing by association. The WLAN terminal 100 cannot perform data communication other than authentication processing, for example.
 次いで、WLAN端末100は、基地局510へ、EAPoL-Startを送信する(ステップS904)。 Next, the WLAN terminal 100 transmits EAPoL-Start to the base station 510 (step S904).
 次に、基地局510は、WLAN端末100へEAP-Request/Identityを送信する(ステップS906)。 Next, the base station 510 transmits EAP-Request / Identity to the WLAN terminal 100 (step S906).
 次いで、WLAN端末100は、WWAN端末200へEAP-Request/Identityを送信する(ステップS908)。このメッセージは、WWAN端末200に対して、EAP-TTLSで必要となるIdentityを生成するよう要求するメッセージである。 Next, the WLAN terminal 100 transmits EAP-Request / Identity to the WWAN terminal 200 (step S908). This message is a message for requesting the WWAN terminal 200 to generate an Identity required for EAP-TTLS.
 次に、WWAN端末200は、WLAN端末100へ、生成したIdentityをEAP-Response/Identityとして送信する(ステップS910)。 Next, the WWAN terminal 200 transmits the generated Identity as EAP-Response / Identity to the WLAN terminal 100 (step S910).
 次いで、WLAN端末100は、基地局510へ、EAP-Response/Identityを送信する(ステップS912)。 Next, the WLAN terminal 100 transmits EAP-Response / Identity to the base station 510 (step S912).
 次に、基地局510は、TTLSサーバ360へ、RADIUS-Access-Requestを送信する(ステップS914)。 Next, the base station 510 transmits a RADIUS-Access-Request to the TLS server 360 (step S914).
 次いで、TTLSサーバ360は、基地局510へ、RADIUS-Access-Challengeを送信する(ステップS916)。本メッセージにより、認証サーバ340は、基地局510へTTLS Startを通知する。 Next, the TLS server 360 transmits RADIUS-Access-Challenge to the base station 510 (step S916). With this message, the authentication server 340 notifies the base station 510 of TLS Start.
 次いで、基地局510は、WLAN端末100へ、ステップS916で受信したメッセージを転送する(ステップS918)。ここでは、簡単のためEAP-Request/passthroughと図示している。 Next, the base station 510 transfers the message received in step S916 to the WLAN terminal 100 (step S918). Here, for simplicity, it is illustrated as EAP-Request / passthrough.
 次に、WLAN端末100は、WWAN端末200へ、ステップS918で受信したメッセージを転送する(ステップS920)。ここでは、簡単のためRequest/passthroughと図示している。本メッセージには、TTLS Startの通知が含まれる。即ち、本メッセージは、WWAN端末200に対して、TTLSの開始を要求するメッセージである。 Next, the WLAN terminal 100 transfers the message received in step S918 to the WWAN terminal 200 (step S920). Here, for simplicity, it is illustrated as Request / passthrough. This message includes a TTL Start notification. That is, this message is a message for requesting the WWAN terminal 200 to start TLS.
 次に、WWAN端末200は、WLAN端末100へ、Response/TTLS Client Helloを送信する(ステップS922)。本メッセージも含めて、これ以降のメッセージの送受信は、電子証明書に含まれる暗号化鍵を用いた暗号化が行われる。 Next, the WWAN terminal 200 transmits Response / TTL Client Hello to the WLAN terminal 100 (step S922). Transmission and reception of subsequent messages including this message are performed using the encryption key included in the electronic certificate.
 次いで、WLAN端末100は、基地局510へ、ステップS922で受信したメッセージを転送する(ステップS924)。ここでは、簡単のためEAP-Response/passthroughと図示している。 Next, the WLAN terminal 100 transfers the message received in step S922 to the base station 510 (step S924). Here, for simplicity, EAP-Response / passthrough is illustrated.
 次に、基地局510は、TTLSサーバ360へ、RADIUS-Access-Requestを送信する(ステップS926)。本メッセージには、上記ステップS924で受信したTTLS Client Helloのメッセージが含まれている。 Next, the base station 510 transmits a RADIUS-Access-Request to the TLS server 360 (step S926). This message includes the TLS Client Hello message received in step S924.
 次いで、図22に示すように、TTLSサーバ360は、基地局510へ、RADIUS-Access-Challengeを送信する(ステップS928)。本メッセージには、Server Certificateが含まれる。具体的には、本メッセージには、TTLS ServerHello、Certificate、ServerKeyExchange、及びServerHelloDone等のメッセージが含まれる。 Next, as shown in FIG. 22, the TLS server 360 transmits RADIUS-Access-Challenge to the base station 510 (step S928). This message includes Server Certificate. Specifically, this message includes messages such as TLS ServerHello, Certificate, ServerKeyExchange, and ServerHelloDone.
 次に、基地局510は、WLAN端末100へ、ステップS928で受信したメッセージを転送する(ステップS930)。ここでは、簡単のためEAP-Request/passthroughと図示している。 Next, the base station 510 transfers the message received in step S928 to the WLAN terminal 100 (step S930). Here, for simplicity, it is illustrated as EAP-Request / passthrough.
 次いで、WLAN端末100は、WWAN端末200へ、ステップS930で受信したメッセージを転送する(ステップS932)。ここでは、簡単のためRequest/passthroughと図示している。 Next, the WLAN terminal 100 transfers the message received in step S930 to the WWAN terminal 200 (step S932). Here, for simplicity, it is illustrated as Request / passthrough.
 次に、WWAN端末200は、WLAN端末100へ、Responseを送信する(ステップS934)。本メッセージには、Client Key Exchangeが含まれる。具体的には、本メッセージには、TTLS ClientKeyExchange、ChangeCipherSpec、及びFinished等のメッセージが含まれる。 Next, the WWAN terminal 200 transmits a response to the WLAN terminal 100 (step S934). This message includes Client Key Exchange. Specifically, this message includes messages such as TTL ClientKeyExchange, ChangeCipherSpec, and Finished.
 次いで、WLAN端末100は、基地局510へ、ステップS934で受信したメッセージを転送する(ステップS936)。ここでは、簡単のためEAP-Response/passthroughと図示している。 Next, the WLAN terminal 100 transfers the message received in step S934 to the base station 510 (step S936). Here, for simplicity, EAP-Response / passthrough is illustrated.
 次に、基地局510は、TTLSサーバ360へ、RADIUS-Access-Requestを送信する(ステップS938)。本メッセージには、ステップS936で受信したメッセージが含まれる。 Next, the base station 510 transmits a RADIUS-Access-Request to the TLS server 360 (step S938). This message includes the message received in step S936.
 次いで、TTLSサーバ360は、基地局510へ、RADIUS-Access-Challengeを送信する(ステップS940)。本メッセージには、TTLS ChangeCipherSpec、及びFinished等のメッセージが含まれる。 Next, the TLS server 360 transmits RADIUS-Access-Challenge to the base station 510 (step S940). This message includes messages such as TTL ChangeCipherSpec and Finished.
 次に、基地局510は、WLAN端末100へ、ステップS940で受信したメッセージを転送する(ステップS942)。ここでは、簡単のためEAP-Request/passthroughと図示している。 Next, the base station 510 transfers the message received in step S940 to the WLAN terminal 100 (step S942). Here, for simplicity, it is illustrated as EAP-Request / passthrough.
 次いで、WLAN端末100は、WWAN端末200へ、ステップS942で受信したメッセージを転送する(ステップS944)。ここでは、簡単のためRequest/passthroughと図示している。 Next, the WLAN terminal 100 transfers the message received in step S942 to the WWAN terminal 200 (step S944). Here, for simplicity, it is illustrated as Request / passthrough.
 次に、WWAN端末200は、WLAN端末100へ、Responseを送信する(ステップS946)。本メッセージには、TTLSのための認証情報として、User-Name、CHAP-Challenge、及びCHAP-Password等が含まれる。 Next, the WWAN terminal 200 transmits a response to the WLAN terminal 100 (step S946). This message includes User-Name, CHAP-Challenge, CHAP-Password, etc. as authentication information for TLS.
 次いで、WLAN端末100は、基地局510へ、ステップS946で受信したメッセージを転送する(ステップS948)。ここでは、簡単のためEAP-Response/passthroughと図示している。 Next, the WLAN terminal 100 transfers the message received in step S946 to the base station 510 (step S948). Here, for simplicity, EAP-Response / passthrough is illustrated.
 次に、基地局510は、TTLSサーバ360へ、RADIUS-Access-Requestを送信する(ステップS950)。本メッセージには、ステップS948で受信したメッセージが含まれる。 Next, the base station 510 transmits a RADIUS-Access-Request to the TLS server 360 (step S950). This message includes the message received in step S948.
 次いで、TTLSサーバ360は、認証サーバ340へ、RADIUS-Access-Requestを送信する(ステップS952)。本メッセージには、User-Name、CHAP-Challenge、及びCHAP-Password等のTTLSのための認証情報が含まれる。 Next, the TLS server 360 transmits RADIUS-Access-Request to the authentication server 340 (step S952). This message includes authentication information for TLS such as User-Name, CHAP-Challenge, and CHAP-Password.
 次に、認証サーバ340は、ステップS952で受信したUser-Name、CHAP-Challenge、及びCHAP-Password等のTTLSのための認証情報を検証し、問題なければ、TTLSサーバ360へ、RADIUS-Access-Acceptを送信する(ステップS954)。本メッセージは、認証を行っている端末が正当なユーザであり、接続を許可することを示すものである。 Next, the authentication server 340 verifies the authentication information for TLS such as User-Name, CHAP-Challenge, and CHAP-Password received in step S952, and if there is no problem, the authentication server 340 sends the RADIUS-Access- to the TTL server 360. “Accept” is transmitted (step S954). This message indicates that the authenticating terminal is a valid user and the connection is permitted.
 次いで、TTLSサーバ360は、基地局510へ、RADIUS-Access-Acceptを送信する(ステップS956)。 Next, the TLS server 360 transmits RADIUS-Access-Accept to the base station 510 (step S956).
 次に、基地局510は、WLAN端末100へ、EAP-Successを送信する(ステップS958)。本メッセージは、認証処理が成功したことを示すものである。 Next, the base station 510 transmits EAP-Success to the WLAN terminal 100 (step S958). This message indicates that the authentication process has been successful.
 次いで、基地局510は、WLAN端末100へ、EAPoL-Keyを送信する(ステップS960)。本メッセージは、WLAN端末100と基地局510との間で使用される暗号化通信用の鍵を送付するものである。 Next, the base station 510 transmits EAPoL-Key to the WLAN terminal 100 (step S960). This message sends a key for encrypted communication used between the WLAN terminal 100 and the base station 510.
 以上説明した認証処理を経て、WLAN端末100と基地局510との間で、WLAN通信のための接続が完了する(ステップS962)。これにより、WLAN端末100と基地局510との間で、例えばWi-Fiを用いたデータ通信が開始される。 Through the authentication process described above, the connection for WLAN communication is completed between the WLAN terminal 100 and the base station 510 (step S962). Thereby, for example, data communication using Wi-Fi is started between the WLAN terminal 100 and the base station 510.
 以上により、処理は終了する。 This completes the process.
 (8)接続先選択処理例
 続いて、図23を参照して、ネットワーク情報に基づいて接続先の無線局を選択する処理の流れを説明する。図23は、本実施形態に係るWLAN端末100において実行される接続先選択処理の流れの一例を示すフローチャートである。
(8) Connection Destination Selection Processing Example Next, with reference to FIG. 23, a flow of processing for selecting a connection destination radio station based on network information will be described. FIG. 23 is a flowchart showing an example of the flow of a connection destination selection process executed in the WLAN terminal 100 according to the present embodiment.
 図23に示すように、まず、WLAN端末100(例えば、選択部144)は、接続先候補を抽出する(ステップS1002)。例えば、WLAN端末100は、取得したネットワーク情報、及びWWAN端末200の接続履歴に基づいて、接続先候補を抽出する。抽出した接続先候補は、無い場合もあるし複数の場合もある。 23, first, the WLAN terminal 100 (for example, the selection unit 144) extracts connection destination candidates (step S1002). For example, the WLAN terminal 100 extracts connection destination candidates based on the acquired network information and the connection history of the WWAN terminal 200. There may be no extracted connection destination candidates or there may be a plurality of connection destination candidates.
 次いで、WLAN端末100(例えば、選択部144)は、未検討の接続先候補があるか否かを判定する(ステップS1004)。未検討の接続先候補とは、ステップS1006に係る条件判定が行われていない接続先候補を指す。 Next, the WLAN terminal 100 (for example, the selection unit 144) determines whether or not there are unconsidered connection destination candidates (step S1004). The unconsidered connection destination candidates indicate connection destination candidates for which the condition determination according to step S1006 has not been performed.
 未検討の接続先候補があると判定された場合(ステップS1004/YES)、WLAN端末100(例えば、選択部144)は、当該未検討の接続先候補のRSSIが閾値よりも高いか否かを判定する。閾値の値は任意である。閾値は、例えば-60dBmに設定されてもよいし、周囲にAPが複数存在している状況下では-50dBmに設定されてもよいし、周囲にAPがほとんど存在していない状況下では-70dBmに設定されてもよい。 When it is determined that there is an unconsidered connection destination candidate (step S1004 / YES), the WLAN terminal 100 (for example, the selection unit 144) determines whether the RSSI of the unconsidered connection destination candidate is higher than a threshold value. judge. The threshold value is arbitrary. The threshold value may be set to, for example, −60 dBm, may be set to −50 dBm in a situation where there are a plurality of APs in the surrounding area, or −70 dBm in a situation in which almost no AP exists in the surrounding area. May be set.
 RSSIが閾値よりも高いと判定された場合(ステップS1006/YES)、WLAN端末100(例えば、選択部144)は、当該接続先候補を接続先として選択する(ステップS1008)。 When it is determined that the RSSI is higher than the threshold (step S1006 / YES), the WLAN terminal 100 (for example, the selection unit 144) selects the connection destination candidate as the connection destination (step S1008).
 一方で、RSSIが閾値よりも低いと判定された場合(ステップS1006/NO)、WLAN端末100(例えば、選択部144)は、検討中の接続先候補を候補から除外する(ステップS1010)。その後、処理は再度ステップS1004へ戻る。 On the other hand, if it is determined that the RSSI is lower than the threshold (step S1006 / NO), the WLAN terminal 100 (for example, the selection unit 144) excludes the connection destination candidate under consideration from the candidates (step S1010). Thereafter, the process returns to step S1004 again.
 また、未検討の接続先候補がないと判定された場合(ステップS1004/NO)、WLAN端末100(例えば、選択部144)は、テザリングAPを接続先として選択する(ステップS1012)。そして、WLAN端末100(例えば、認証処理部148及び無線通信部110)は、WWAN端末200へ認証情報の要求を送信する(ステップS1014)。これにより、WWAN端末200は、テザリングAPとして起動する。次いで、WLAN端末100(例えば、認証処理部148及び無線通信部110)は、WWAN端末200から認証情報を受信する(ステップS1016)。 Further, when it is determined that there is no unconsidered connection destination candidate (step S1004 / NO), the WLAN terminal 100 (for example, the selection unit 144) selects the tethering AP as the connection destination (step S1012). Then, the WLAN terminal 100 (for example, the authentication processing unit 148 and the wireless communication unit 110) transmits a request for authentication information to the WWAN terminal 200 (step S1014). Thereby, the WWAN terminal 200 is activated as a tethering AP. Next, the WLAN terminal 100 (for example, the authentication processing unit 148 and the wireless communication unit 110) receives the authentication information from the WWAN terminal 200 (step S1016).
 そして、WLAN端末100(例えば、認証処理部148)は、認証処理を実施する(ステップS1018)。例えば、ステップS1008において接続先が選択されている場合、WLAN端末100は、当該接続先への認証処理を実施する。また、ステップS1012においてテザリングAPが接続先として選択されている場合、WLAN端末100は、テザリングAPとして動作するWWAN端末200への認証処理を実施する。ここで、WLAN端末100は、接続先が802.1X認証に対応している場合、EAP-AKA´、EAP-AKA、EAP-SIM、EAP-TLS又はEAP-TTLSのいずれかから最適な認証方式を選択する。また、WLAN端末100は、接続先が802.1X認証に対応していない場合、WPA-PSK又はWPA2-PSKを選択する。 Then, the WLAN terminal 100 (for example, the authentication processing unit 148) performs an authentication process (step S1018). For example, if a connection destination is selected in step S1008, the WLAN terminal 100 performs an authentication process for the connection destination. If the tethering AP is selected as the connection destination in step S1012, the WLAN terminal 100 performs an authentication process on the WWAN terminal 200 that operates as the tethering AP. Here, when the connection destination supports the 802.1X authentication, the WLAN terminal 100 can select an optimum authentication method from any one of EAP-AKA ′, EAP-AKA, EAP-SIM, EAP-TLS, and EAP-TTLS. Select. If the connection destination does not support 802.1X authentication, the WLAN terminal 100 selects WPA-PSK or WPA2-PSK.
 認証処理に成功したと判定された場合(ステップS1020/YES)、処理は終了する。一方で、認証処理に失敗したと判定された場合(ステップS1020/NO)、処理は再度ステップS1004へ戻る。 If it is determined that the authentication process is successful (step S1020 / YES), the process ends. On the other hand, when it is determined that the authentication process has failed (step S1020 / NO), the process returns to step S1004 again.
 以上により、処理は終了する。 This completes the process.
 <<4.応用例>>
 本開示に係る技術は、様々な製品へ応用可能である。例えば、WLAN端末100及びWWAN端末200は、スマートフォン、タブレットPC(Personal Computer)、ノートPC、携帯型ゲーム端末若しくはデジタルカメラなどのモバイル端末、テレビジョン受像機、プリンタ、デジタルスキャナ若しくはネットワークストレージなどの固定端末、又はカーナビゲーション装置などの車載端末として実現されてもよい。また、WLAN端末100及びWWAN端末200は、スマートメータ、自動販売機、遠隔監視装置又はPOS(Point Of Sale)端末などの、M2M(Machine To Machine)通信を行う端末(MTC(Machine Type Communication)端末ともいう)として実現されてもよい。さらに、WLAN端末100及びWWAN端末200は、これら端末に搭載される無線通信モジュール(例えば、1つのダイで構成される集積回路モジュール)であってもよい。
<< 4. Application example >>
The technology according to the present disclosure can be applied to various products. For example, the WLAN terminal 100 and the WWAN terminal 200 are fixed to a mobile terminal such as a smartphone, a tablet PC (Personal Computer), a notebook PC, a portable game terminal or a digital camera, a television receiver, a printer, a digital scanner, or a network storage. It may be realized as a terminal or an in-vehicle terminal such as a car navigation device. The WLAN terminal 100 and the WWAN terminal 200 are terminals (MTC (Machine Type Communication) terminals that perform M2M (Machine To Machine) communication, such as smart meters, vending machines, remote monitoring devices, or POS (Point Of Sale) terminals). May also be realized. Further, the WLAN terminal 100 and the WWAN terminal 200 may be wireless communication modules (for example, integrated circuit modules configured by one die) mounted on these terminals.
  <4.1.第1の応用例>
 図24は、本開示に係る技術が適用され得るスマートフォン900の概略的な構成の一例を示すブロック図である。スマートフォン900は、プロセッサ901、メモリ902、ストレージ903、外部接続インタフェース904、カメラ906、センサ907、マイクロフォン908、入力デバイス909、表示デバイス910、スピーカ911、無線通信インタフェース913、アンテナスイッチ914、アンテナ915、バス917、バッテリー918及び補助コントローラ919を備える。
<4.1. First application example>
FIG. 24 is a block diagram illustrating an example of a schematic configuration of a smartphone 900 to which the technology according to the present disclosure can be applied. The smartphone 900 includes a processor 901, a memory 902, a storage 903, an external connection interface 904, a camera 906, a sensor 907, a microphone 908, an input device 909, a display device 910, a speaker 911, a wireless communication interface 913, an antenna switch 914, an antenna 915, A bus 917, a battery 918, and an auxiliary controller 919 are provided.
 プロセッサ901は、例えばCPU(Central Processing Unit)又はSoC(System on Chip)であってよく、スマートフォン900のアプリケーションレイヤ及びその他のレイヤの機能を制御する。メモリ902は、RAM(Random Access Memory)及びROM(Read Only Memory)を含み、プロセッサ901により実行されるプログラム及びデータを記憶する。ストレージ903は、半導体メモリ又はハードディスクなどの記憶媒体を含み得る。外部接続インタフェース904は、メモリーカード又はUSB(Universal Serial Bus)デバイスなどの外付けデバイスをスマートフォン900へ接続するためのインタフェースである。 The processor 901 may be, for example, a CPU (Central Processing Unit) or a SoC (System on Chip), and controls the functions of the application layer and other layers of the smartphone 900. The memory 902 includes a RAM (Random Access Memory) and a ROM (Read Only Memory), and stores programs and data executed by the processor 901. The storage 903 can include a storage medium such as a semiconductor memory or a hard disk. The external connection interface 904 is an interface for connecting an external device such as a memory card or a USB (Universal Serial Bus) device to the smartphone 900.
 カメラ906は、例えば、CCD(Charge Coupled Device)又はCMOS(Complementary Metal Oxide Semiconductor)などの撮像素子を有し、撮像画像を生成する。センサ907は、例えば、測位センサ、ジャイロセンサ、地磁気センサ及び加速度センサなどのセンサ群を含み得る。マイクロフォン908は、スマートフォン900へ入力される音声を音声信号へ変換する。入力デバイス909は、例えば、表示デバイス910の画面上へのタッチを検出するタッチセンサ、キーパッド、キーボード、ボタン又はスイッチなどを含み、ユーザからの操作又は情報入力を受け付ける。表示デバイス910は、液晶ディスプレイ(LCD)又は有機発光ダイオード(OLED)ディスプレイなどの画面を有し、スマートフォン900の出力画像を表示する。スピーカ911は、スマートフォン900から出力される音声信号を音声に変換する。 The camera 906 includes, for example, an image sensor such as a CCD (Charge Coupled Device) or a CMOS (Complementary Metal Oxide Semiconductor), and generates a captured image. The sensor 907 may include a sensor group such as a positioning sensor, a gyro sensor, a geomagnetic sensor, and an acceleration sensor. The microphone 908 converts sound input to the smartphone 900 into an audio signal. The input device 909 includes, for example, a touch sensor that detects a touch on the screen of the display device 910, a keypad, a keyboard, a button, or a switch, and receives an operation or information input from a user. The display device 910 has a screen such as a liquid crystal display (LCD) or an organic light emitting diode (OLED) display, and displays an output image of the smartphone 900. The speaker 911 converts an audio signal output from the smartphone 900 into audio.
 無線通信インタフェース913は、IEEE802.11a、11b、11g、11n、11ac及び11adなどの無線LAN標準のうちの1つ以上をサポートし、無線通信を実行する。無線通信インタフェース913は、インフラストラクチャーモードにおいては、他の装置と無線LANアクセスポイントを介して通信し得る。また、無線通信インタフェース913は、アドホックモード又はWi-Fi Direct(登録商標)等のダイレクト通信モードにおいては、他の装置と直接的に通信し得る。なお、Wi-Fi Directでは、アドホックモードとは異なり2つの端末の一方がアクセスポイントとして動作するが、通信はそれら端末間で直接的に行われる。無線通信インタフェース913は、典型的には、ベースバンドプロセッサ、RF(Radio Frequency)回路及びパワーアンプなどを含み得る。無線通信インタフェース913は、通信制御プログラムを記憶するメモリ、当該プログラムを実行するプロセッサ及び関連する回路を集積したワンチップのモジュールであってもよい。無線通信インタフェース913は、無線LAN方式に加えて、近距離無線通信方式、近接無線通信方式又はセルラ通信方式などの他の種類の無線通信方式をサポートしてもよい。アンテナスイッチ914は、無線通信インタフェース913に含まれる複数の回路(例えば、異なる無線通信方式のための回路)の間でアンテナ915の接続先を切り替える。アンテナ915は、単一の又は複数のアンテナ素子(例えば、MIMOアンテナを構成する複数のアンテナ素子)を有し、無線通信インタフェース913による無線信号の送信及び受信のために使用される。 The wireless communication interface 913 supports one or more wireless LAN standards such as IEEE802.11a, 11b, 11g, 11n, 11ac, and 11ad, and performs wireless communication. The wireless communication interface 913 can communicate with other devices via a wireless LAN access point in the infrastructure mode. In addition, the wireless communication interface 913 can directly communicate with other devices in an ad hoc mode or a direct communication mode such as Wi-Fi Direct (registered trademark). In Wi-Fi Direct, unlike the ad hoc mode, one of two terminals operates as an access point, but communication is performed directly between the terminals. The wireless communication interface 913 can typically include a baseband processor, an RF (Radio Frequency) circuit, a power amplifier, and the like. The wireless communication interface 913 may be a one-chip module in which a memory that stores a communication control program, a processor that executes the program, and related circuits are integrated. The wireless communication interface 913 may support other types of wireless communication methods such as a short-range wireless communication method, a proximity wireless communication method, or a cellular communication method in addition to the wireless LAN method. The antenna switch 914 switches the connection destination of the antenna 915 among a plurality of circuits (for example, circuits for different wireless communication schemes) included in the wireless communication interface 913. The antenna 915 includes a single antenna element or a plurality of antenna elements (for example, a plurality of antenna elements constituting a MIMO antenna), and is used for transmission and reception of radio signals by the radio communication interface 913.
 なお、図24の例に限定されず、スマートフォン900は、複数のアンテナ(例えば、無線LAN用のアンテナ及び近接無線通信方式用のアンテナ、など)を備えてもよい。その場合に、アンテナスイッチ914は、スマートフォン900の構成から省略されてもよい。 Note that the smartphone 900 is not limited to the example of FIG. 24, and may include a plurality of antennas (for example, an antenna for a wireless LAN and an antenna for a proximity wireless communication method). In that case, the antenna switch 914 may be omitted from the configuration of the smartphone 900.
 バス917は、プロセッサ901、メモリ902、ストレージ903、外部接続インタフェース904、カメラ906、センサ907、マイクロフォン908、入力デバイス909、表示デバイス910、スピーカ911、無線通信インタフェース913及び補助コントローラ919を互いに接続する。バッテリー918は、図中に破線で部分的に示した給電ラインを介して、図24に示したスマートフォン900の各ブロックへ電力を供給する。補助コントローラ919は、例えば、スリープモードにおいて、スマートフォン900の必要最低限の機能を動作させる。 The bus 917 connects the processor 901, memory 902, storage 903, external connection interface 904, camera 906, sensor 907, microphone 908, input device 909, display device 910, speaker 911, wireless communication interface 913, and auxiliary controller 919 to each other. . The battery 918 supplies electric power to each block of the smartphone 900 shown in FIG. 24 through a power supply line partially shown by a broken line in the drawing. For example, the auxiliary controller 919 operates the minimum necessary functions of the smartphone 900 in the sleep mode.
 図24に示したスマートフォン900において、図4を用いて説明したWLAN端末100に含まれるひとつ以上の構成要素(例えば、無線通信部110、出力部120、記憶部130又は処理部140の少なくともいずれか)は、無線通信インタフェース913において実装されてもよい。また、これら構成要素の少なくとも一部は、プロセッサ901又は補助コントローラ919において実装されてもよい。一例として、スマートフォン900は、無線通信インタフェース913、プロセッサ901、及び/又は補助コントローラ919を含むモジュールを搭載し、当該モジュールにおいて上記ひとつ以上の構成要素が実装されてもよい。この場合に、上記モジュールは、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラム(換言すると、プロセッサに上記ひとつ以上の構成要素の動作を実行させるためのプログラム)を記憶し、当該プログラムを実行してもよい。別の例として、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラムがスマートフォン900にインストールされ、無線通信インタフェース913、プロセッサ901、及び/又は補助コントローラ919が当該プログラムを実行してもよい。以上のように、上記ひとつ以上の構成要素を備える装置としてスマートフォン900又は上記モジュールが提供されてもよく、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラムが提供されてもよい。また、上記プログラムを記録した読み取り可能な記録媒体が提供されてもよい。 In the smartphone 900 shown in FIG. 24, at least one of one or more components (for example, the wireless communication unit 110, the output unit 120, the storage unit 130, or the processing unit 140) included in the WLAN terminal 100 described with reference to FIG. ) May be implemented in the wireless communication interface 913. In addition, at least some of these components may be implemented in the processor 901 or the auxiliary controller 919. As an example, the smartphone 900 may include a module including the wireless communication interface 913, the processor 901, and / or the auxiliary controller 919, and the one or more components may be mounted on the module. In this case, the module stores a program for causing the processor to function as the one or more components (in other words, a program for causing the processor to execute the operation of the one or more components), and stores the program. May be executed. As another example, a program for causing a processor to function as one or more components may be installed in the smartphone 900, and the wireless communication interface 913, the processor 901, and / or the auxiliary controller 919 may execute the program. As described above, the smartphone 900 or the module may be provided as a device including the one or more components, and a program for causing a processor to function as the one or more components may be provided. In addition, a readable recording medium in which the program is recorded may be provided.
 また、図24に示したスマートフォン900において、図5を用いて説明したWWAN端末200に含まれるひとつ以上の構成要素(例えば、無線通信部210、記憶部220、認証情報格納部230又は処理部240の少なくともいずれか)は、無線通信インタフェース913において実装されてもよい。また、これら構成要素の少なくとも一部は、プロセッサ901又は補助コントローラ919において実装されてもよい。一例として、スマートフォン900は、無線通信インタフェース913、プロセッサ901、及び/又は補助コントローラ919を含むモジュールを搭載し、当該モジュールにおいて上記ひとつ以上の構成要素が実装されてもよい。この場合に、上記モジュールは、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラム(換言すると、プロセッサに上記ひとつ以上の構成要素の動作を実行させるためのプログラム)を記憶し、当該プログラムを実行してもよい。別の例として、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラムがスマートフォン900にインストールされ、無線通信インタフェース913、プロセッサ901、及び/又は補助コントローラ919が当該プログラムを実行してもよい。以上のように、上記ひとつ以上の構成要素を備える装置としてスマートフォン900又は上記モジュールが提供されてもよく、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラムが提供されてもよい。また、上記プログラムを記録した読み取り可能な記録媒体が提供されてもよい。 Further, in the smartphone 900 shown in FIG. 24, one or more components (for example, the wireless communication unit 210, the storage unit 220, the authentication information storage unit 230, or the processing unit 240) included in the WWAN terminal 200 described with reference to FIG. At least one of them) may be implemented in the wireless communication interface 913. In addition, at least some of these components may be implemented in the processor 901 or the auxiliary controller 919. As an example, the smartphone 900 may include a module including the wireless communication interface 913, the processor 901, and / or the auxiliary controller 919, and the one or more components may be mounted on the module. In this case, the module stores a program for causing the processor to function as the one or more components (in other words, a program for causing the processor to execute the operation of the one or more components), and stores the program. May be executed. As another example, a program for causing a processor to function as one or more components may be installed in the smartphone 900, and the wireless communication interface 913, the processor 901, and / or the auxiliary controller 919 may execute the program. As described above, the smartphone 900 or the module may be provided as a device including the one or more components, and a program for causing a processor to function as the one or more components may be provided. In addition, a readable recording medium in which the program is recorded may be provided.
 なお、スマートフォン900は、プロセッサ901がアプリケーションレベルでアクセスポイント機能を実行することにより、無線アクセスポイント(ソフトウェアAP)として動作してもよい。また、無線通信インタフェース913が無線アクセスポイント機能を有していてもよい。 Note that the smartphone 900 may operate as a wireless access point (software AP) when the processor 901 executes the access point function at the application level. Further, the wireless communication interface 913 may have a wireless access point function.
  <4.2.第2の応用例>
 図25は、本開示に係る技術が適用され得るカーナビゲーション装置920の概略的な構成の一例を示すブロック図である。カーナビゲーション装置920は、プロセッサ921、メモリ922、GPS(Global Positioning System)モジュール924、センサ925、データインタフェース926、コンテンツプレーヤ927、記憶媒体インタフェース928、入力デバイス929、表示デバイス930、スピーカ931、無線通信インタフェース933、アンテナスイッチ934、アンテナ935及びバッテリー938を備える。
<4.2. Second application example>
FIG. 25 is a block diagram illustrating an example of a schematic configuration of a car navigation device 920 to which the technology according to the present disclosure can be applied. The car navigation device 920 includes a processor 921, a memory 922, a GPS (Global Positioning System) module 924, a sensor 925, a data interface 926, a content player 927, a storage medium interface 928, an input device 929, a display device 930, a speaker 931, and wireless communication. An interface 933, an antenna switch 934, an antenna 935, and a battery 938 are provided.
 プロセッサ921は、例えばCPU又はSoCであってよく、カーナビゲーション装置920のナビゲーション機能及びその他の機能を制御する。メモリ922は、RAM及びROMを含み、プロセッサ921により実行されるプログラム及びデータを記憶する。 The processor 921 may be a CPU or SoC, for example, and controls the navigation function and other functions of the car navigation device 920. The memory 922 includes RAM and ROM, and stores programs and data executed by the processor 921.
 GPSモジュール924は、GPS衛星から受信されるGPS信号を用いて、カーナビゲーション装置920の位置(例えば、緯度、経度及び高度)を測定する。センサ925は、例えば、ジャイロセンサ、地磁気センサ及び気圧センサなどのセンサ群を含み得る。データインタフェース926は、例えば、図示しない端子を介して車載ネットワーク941に接続され、車速データなどの車両側で生成されるデータを取得する。 The GPS module 924 measures the position (for example, latitude, longitude, and altitude) of the car navigation device 920 using GPS signals received from GPS satellites. The sensor 925 may include a sensor group such as a gyro sensor, a geomagnetic sensor, and an atmospheric pressure sensor. The data interface 926 is connected to the in-vehicle network 941 through a terminal (not shown), for example, and acquires data generated on the vehicle side such as vehicle speed data.
 コンテンツプレーヤ927は、記憶媒体インタフェース928に挿入される記憶媒体(例えば、CD又はDVD)に記憶されているコンテンツを再生する。入力デバイス929は、例えば、表示デバイス930の画面上へのタッチを検出するタッチセンサ、ボタン又はスイッチなどを含み、ユーザからの操作又は情報入力を受け付ける。表示デバイス930は、LCD又はOLEDディスプレイなどの画面を有し、ナビゲーション機能又は再生されるコンテンツの画像を表示する。スピーカ931は、ナビゲーション機能又は再生されるコンテンツの音声を出力する。 The content player 927 reproduces content stored in a storage medium (for example, CD or DVD) inserted into the storage medium interface 928. The input device 929 includes, for example, a touch sensor, a button, or a switch that detects a touch on the screen of the display device 930, and receives an operation or information input from the user. The display device 930 has a screen such as an LCD or an OLED display, and displays a navigation function or an image of content to be reproduced. The speaker 931 outputs the navigation function or the audio of the content to be played back.
 無線通信インタフェース933は、IEEE802.11a、11b、11g、11n、11ac及び11adなどの無線LAN標準のうちの1つ以上をサポートし、無線通信を実行する。無線通信インタフェース933は、インフラストラクチャーモードにおいては、他の装置と無線LANアクセスポイントを介して通信し得る。また、無線通信インタフェース933は、アドホックモード又はWi-Fi Direct等のダイレクト通信モードにおいては、他の装置と直接的に通信し得る。無線通信インタフェース933は、典型的には、ベースバンドプロセッサ、RF回路及びパワーアンプなどを含み得る。無線通信インタフェース933は、通信制御プログラムを記憶するメモリ、当該プログラムを実行するプロセッサ及び関連する回路を集積したワンチップのモジュールであってもよい。無線通信インタフェース933は、無線LAN方式に加えて、近距離無線通信方式、近接無線通信方式又はセルラ通信方式などの他の種類の無線通信方式をサポートしてもよい。アンテナスイッチ934は、無線通信インタフェース933に含まれる複数の回路の間でアンテナ935の接続先を切り替える。アンテナ935は、単一の又は複数のアンテナ素子を有し、無線通信インタフェース933による無線信号の送信及び受信のために使用される。 The wireless communication interface 933 supports one or more wireless LAN standards such as IEEE802.11a, 11b, 11g, 11n, 11ac, and 11ad, and executes wireless communication. The wireless communication interface 933 can communicate with other devices via a wireless LAN access point in the infrastructure mode. In addition, the wireless communication interface 933 can directly communicate with other devices in an ad hoc mode or a direct communication mode such as Wi-Fi Direct. The wireless communication interface 933 may typically include a baseband processor, an RF circuit, a power amplifier, and the like. The wireless communication interface 933 may be a one-chip module in which a memory that stores a communication control program, a processor that executes the program, and related circuits are integrated. In addition to the wireless LAN system, the wireless communication interface 933 may support other types of wireless communication systems such as a short-range wireless communication system, a proximity wireless communication system, or a cellular communication system. The antenna switch 934 switches the connection destination of the antenna 935 among a plurality of circuits included in the wireless communication interface 933. The antenna 935 includes a single antenna element or a plurality of antenna elements, and is used for transmission and reception of a radio signal by the radio communication interface 933.
 なお、図25の例に限定されず、カーナビゲーション装置920は、複数のアンテナを備えてもよい。その場合に、アンテナスイッチ934は、カーナビゲーション装置920の構成から省略されてもよい。 Note that the car navigation device 920 is not limited to the example of FIG. 25, and may include a plurality of antennas. In that case, the antenna switch 934 may be omitted from the configuration of the car navigation device 920.
 バッテリー938は、図中に破線で部分的に示した給電ラインを介して、図25に示したカーナビゲーション装置920の各ブロックへ電力を供給する。また、バッテリー938は、車両側から給電される電力を蓄積する。 The battery 938 supplies power to each block of the car navigation apparatus 920 shown in FIG. 25 through a power supply line partially shown by broken lines in the drawing. Further, the battery 938 stores electric power supplied from the vehicle side.
 図25に示したカーナビゲーション装置920において、図4を用いて説明したWLAN端末100に含まれるひとつ以上の構成要素(例えば、無線通信部110、出力部120、記憶部130又は処理部140の少なくともいずれか)は、無線通信インタフェース933において実装されてもよい。また、これら機能の少なくとも一部は、プロセッサ921において実装されてもよい。一例として、カーナビゲーション装置920は、無線通信インタフェース933、及び/又はプロセッサ921を含むモジュールを搭載し、当該モジュールにおいて上記ひとつ以上の構成要素が実装されてもよい。この場合に、上記モジュールは、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラム(換言すると、プロセッサに上記ひとつ以上の構成要素の動作を実行させるためのプログラム)を記憶し、当該プログラムを実行してもよい。別の例として、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラムがカーナビゲーション装置920にインストールされ、無線通信インタフェース933、及び/又はプロセッサ921が当該プログラムを実行してもよい。以上のように、上記ひとつ以上の構成要素を備える装置としてカーナビゲーション装置920又は上記モジュールが提供されてもよく、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラムが提供されてもよい。また、上記プログラムを記録した読み取り可能な記録媒体が提供されてもよい。 In the car navigation device 920 shown in FIG. 25, at least one of the one or more components (for example, the wireless communication unit 110, the output unit 120, the storage unit 130, or the processing unit 140) included in the WLAN terminal 100 described with reference to FIG. Either) may be implemented in the wireless communication interface 933. Further, at least a part of these functions may be implemented in the processor 921. As an example, the car navigation device 920 may include a module including the wireless communication interface 933 and / or the processor 921, and the one or more components may be mounted on the module. In this case, the module stores a program for causing the processor to function as the one or more components (in other words, a program for causing the processor to execute the operation of the one or more components), and stores the program. May be executed. As another example, a program for causing a processor to function as one or more components may be installed in the car navigation device 920, and the wireless communication interface 933 and / or the processor 921 may execute the program. As described above, the car navigation apparatus 920 or the module may be provided as an apparatus including the one or more components, and a program for causing a processor to function as the one or more components may be provided. In addition, a readable recording medium in which the program is recorded may be provided.
 また、図25に示したカーナビゲーション装置920において、図5を用いて説明したWWAN端末200に含まれるひとつ以上の構成要素(例えば、無線通信部210、記憶部220、認証情報格納部230又は処理部240の少なくともいずれか)は、無線通信インタフェース933において実装されてもよい。また、これら機能の少なくとも一部は、プロセッサ921において実装されてもよい。一例として、カーナビゲーション装置920は、無線通信インタフェース933、及び/又はプロセッサ921を含むモジュールを搭載し、当該モジュールにおいて上記ひとつ以上の構成要素が実装されてもよい。この場合に、上記モジュールは、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラム(換言すると、プロセッサに上記ひとつ以上の構成要素の動作を実行させるためのプログラム)を記憶し、当該プログラムを実行してもよい。別の例として、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラムがカーナビゲーション装置920にインストールされ、無線通信インタフェース933、及び/又はプロセッサ921が当該プログラムを実行してもよい。以上のように、上記ひとつ以上の構成要素を備える装置としてカーナビゲーション装置920又は上記モジュールが提供されてもよく、プロセッサを上記ひとつ以上の構成要素として機能させるためのプログラムが提供されてもよい。また、上記プログラムを記録した読み取り可能な記録媒体が提供されてもよい。 Further, in the car navigation device 920 shown in FIG. 25, one or more components (for example, the wireless communication unit 210, the storage unit 220, the authentication information storage unit 230, or the process included in the WWAN terminal 200 described with reference to FIG. 5). At least one of the units 240) may be implemented in the wireless communication interface 933. Further, at least a part of these functions may be implemented in the processor 921. As an example, the car navigation device 920 may include a module including the wireless communication interface 933 and / or the processor 921, and the one or more components may be mounted on the module. In this case, the module stores a program for causing the processor to function as the one or more components (in other words, a program for causing the processor to execute the operation of the one or more components), and stores the program. May be executed. As another example, a program for causing a processor to function as one or more components may be installed in the car navigation device 920, and the wireless communication interface 933 and / or the processor 921 may execute the program. As described above, the car navigation apparatus 920 or the module may be provided as an apparatus including the one or more components, and a program for causing a processor to function as the one or more components may be provided. In addition, a readable recording medium in which the program is recorded may be provided.
 また、本開示に係る技術は、上述したカーナビゲーション装置920の1つ以上のブロックと、車載ネットワーク941と、車両側モジュール942とを含む車載システム(又は車両)940として実現されてもよい。車両側モジュール942は、車速、エンジン回転数又は故障情報などの車両側データを生成し、生成したデータを車載ネットワーク941へ出力する。 Also, the technology according to the present disclosure may be realized as an in-vehicle system (or vehicle) 940 including one or more blocks of the car navigation device 920 described above, an in-vehicle network 941, and a vehicle side module 942. The vehicle-side module 942 generates vehicle-side data such as vehicle speed, engine speed, or failure information, and outputs the generated data to the in-vehicle network 941.
 <<5.まとめ>>
 以上、図1~図25を参照して、本開示の一実施形態について詳細に説明した。上述した実施形態によれば、WLAN端末100は、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の無線局への、接続先の無線局のネットワーク情報に基づいて選択された認証方式による、WWAN端末200の認証情報を用いた認証処理を行う。WLAN端末100は、WWAN端末200の認証情報を利用可能な無線局を接続先として選択することが可能となる上に、WWAN端末200の認証情報を利用することで容易に認証処理を行うことが可能となる。そのため、例えば、WLAN端末100は、接続履歴及び接続権を有さない無線局についても、WWAN端末200の認証情報を用いることで、安全且つ容易に接続することが可能となる。
<< 5. Summary >>
The embodiment of the present disclosure has been described in detail above with reference to FIGS. According to the embodiment described above, the WLAN terminal 100 is a connection-destination radio station selected based on one or more pieces of network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations. The authentication process using the authentication information of the WWAN terminal 200 is performed by the authentication method selected based on the network information of the connection destination wireless station. The WLAN terminal 100 can select a wireless station that can use the authentication information of the WWAN terminal 200 as a connection destination, and can easily perform an authentication process by using the authentication information of the WWAN terminal 200. It becomes possible. Therefore, for example, the WLAN terminal 100 can safely and easily connect to a wireless station that does not have a connection history and a connection right by using the authentication information of the WWAN terminal 200.
 また、WWAN端末200は、WLAN端末100からの認証情報の要求の受信をトリガとしてテザリングAPとして起動する。このため、WLAN端末100は、自由にWWAN端末200をテザリングAPとして起動させて、インターネットへ接続することが可能となる。さらに、テザリングAPへの接続設定、及びWWAN端末200におけるテザリングON/OFF等の手作業が不要となり、利便性を向上させることが可能となる。 In addition, the WWAN terminal 200 is activated as a tethering AP with the reception of a request for authentication information from the WLAN terminal 100 as a trigger. For this reason, the WLAN terminal 100 can freely activate the WWAN terminal 200 as a tethering AP and connect to the Internet. Furthermore, connection settings to the tethering AP and manual work such as tethering ON / OFF in the WWAN terminal 200 are not required, and convenience can be improved.
 また、WLAN端末100とWWAN端末200とは、認証情報を共有することで、同時に同じ無線局へ接続することも可能である。 Further, the WLAN terminal 100 and the WWAN terminal 200 can simultaneously connect to the same wireless station by sharing authentication information.
 さらに、WLAN端末100とWWAN端末200とは、メッシュネットワークを形成し得る。即ち、本技術は、IoT(Internet of Things)又はM2M(Machine to Machine)にも適用可能である。 Furthermore, the WLAN terminal 100 and the WWAN terminal 200 can form a mesh network. That is, the present technology can be applied to IoT (Internet of Things) or M2M (Machine to Machine).
 以上、添付図面を参照しながら本開示の好適な実施形態について詳細に説明したが、本開示の技術的範囲はかかる例に限定されない。本開示の技術分野における通常の知識を有する者であれば、請求の範囲に記載された技術的思想の範疇内において、各種の変更例または修正例に想到し得ることは明らかであり、これらについても、当然に本開示の技術的範囲に属するものと了解される。 The preferred embodiments of the present disclosure have been described in detail above with reference to the accompanying drawings, but the technical scope of the present disclosure is not limited to such examples. It is obvious that a person having ordinary knowledge in the technical field of the present disclosure can come up with various changes or modifications within the scope of the technical idea described in the claims. Of course, it is understood that it belongs to the technical scope of the present disclosure.
 また、本明細書においてフローチャート及びシーケンス図を用いて説明した処理は、必ずしも図示された順序で実行されなくてもよい。いくつかの処理ステップは、並列的に実行されてもよい。また、追加的な処理ステップが採用されてもよく、一部の処理ステップが省略されてもよい。 In addition, the processes described using the flowcharts and sequence diagrams in this specification do not necessarily have to be executed in the order shown. Some processing steps may be performed in parallel. Further, additional processing steps may be employed, and some processing steps may be omitted.
 また、本明細書に記載された効果は、あくまで説明的または例示的なものであって限定的ではない。つまり、本開示に係る技術は、上記の効果とともに、または上記の効果に代えて、本明細書の記載から当業者には明らかな他の効果を奏しうる。 In addition, the effects described in this specification are merely illustrative or illustrative, and are not limited. That is, the technology according to the present disclosure can exhibit other effects that are apparent to those skilled in the art from the description of the present specification in addition to or instead of the above effects.
 なお、以下のような構成も本開示の技術的範囲に属する。
(1)
 ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、他の装置の認証情報を用いた認証処理を行う処理部、
を備える装置。
(2)
 接続先の前記無線局は、前記装置と前記無線局との間の無線通信環境の状態を示す情報に基づいて選択される、前記(1)に記載の装置。
(3)
 接続先の前記無線局は、前記無線局が対応する通信方式を示す情報に基づいて選択される、前記(1)又は(2)に記載の装置。
(4)
 接続先の前記無線局は前記無線局が対応する認証方式を示す情報に基づいて選択される、前記(1)~(3)のいずれか一項に記載の装置。
(5)
 接続先の前記無線局は、前記他の装置の接続履歴に基づいて選択される、前記(1)~(4)のいずれか一項に記載の装置。
(6)
 接続先の前記無線局は、ネットワーク選択ポリシーに基づいて選択される、前記(1)~(5)のいずれか一項に記載の装置。
(7)
 前記認証方式は、セキュリティの強度に基づいて選択される、前記(1)~(6)のいずれか一項に記載の装置。
(8)
 前記認証方式は、ユーザビリティの高さに基づいて選択される、前記(1)~(7)のいずれか一項に記載の装置。
(9)
 前記処理部は、接続先の前記無線局を選択する、前記(1)~(8)のいずれか一項に記載の装置。
(10)
 接続先の前記無線局は、前記他の装置により選択される、前記(1)~(8)のいずれか一項に記載の装置。
(11)
 前記処理部は、接続先の前記無線局及び認証方式を自身が選択するか、前記他の装置が選択するかを判定する、前記(1)~(10)のいずれか一項に記載の装置。
(12)
 接続先の前記無線局の候補は、前記無線局として動作可能な前記他の装置を含む、前記(1)~(11)のいずれか一項に記載の装置。
(13)
 前記認証情報は、前記他の装置に格納された加入者識別情報、電子証明書、ユーザ名及びパスワード、事前共有鍵又はパスフレーズの少なくともいずれかに基づいて生成される、前記(1)~(12)のいずれか一項に記載の装置。
(14)
 ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による認証処理を行う他の装置への、前記認証処理において用いられる認証情報の提供を行う処理部、
を備える装置。
(15)
 前記処理部は、前記装置が前記無線局として機能するための処理を行う、前記(14)に記載の装置。
(16)
 前記処理部は、前記他の装置からの前記認証情報の要求の受信をトリガとして前記無線局として機能するための処理を行う、前記(15)に記載の装置。
(17)
 ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、他の装置の認証情報を用いた認証処理をプロセッサにより行うこと、
を含む方法。
(18)
 ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による認証処理を行う他の装置への、前記認証処理において用いられる認証情報の提供をプロセッサにより行うこと、
を含む方法。
(19)
 認証情報提供元端末と認証情報提供先端末と、
を備え、
 前記認証情報提供先端末は、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、前記認証情報提供元端末の認証情報を用いた認証処理を行う処理部を有し、
 前記認証情報提供元端末は、前記認証情報提供先端末への前記認証情報の提供を行う処理部を有する、システム。
(20)
 認証情報提供先端末が、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、認証情報提供元端末の認証情報を用いた認証処理を行うことと、
 前記認証情報提供元端末が、前記認証情報提供先端末への前記認証情報の提供を行うことと、
を含む方法。
The following configurations also belong to the technical scope of the present disclosure.
(1)
Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations A processing unit for performing an authentication process using authentication information of another device according to an authentication method selected based on
A device comprising:
(2)
The device according to (1), wherein the connection destination wireless station is selected based on information indicating a state of a wireless communication environment between the device and the wireless station.
(3)
The apparatus according to (1) or (2), wherein the wireless station to be connected is selected based on information indicating a communication method supported by the wireless station.
(4)
The apparatus according to any one of (1) to (3), wherein the wireless station to be connected is selected based on information indicating an authentication method supported by the wireless station.
(5)
The apparatus according to any one of (1) to (4), wherein the wireless station that is a connection destination is selected based on a connection history of the other apparatus.
(6)
The apparatus according to any one of (1) to (5), wherein the wireless station to be connected is selected based on a network selection policy.
(7)
The apparatus according to any one of (1) to (6), wherein the authentication method is selected based on security strength.
(8)
The apparatus according to any one of (1) to (7), wherein the authentication method is selected based on high usability.
(9)
The apparatus according to any one of (1) to (8), wherein the processing unit selects the wireless station as a connection destination.
(10)
The device according to any one of (1) to (8), wherein the wireless station to be connected is selected by the other device.
(11)
The apparatus according to any one of (1) to (10), wherein the processing unit determines whether the wireless station and the authentication method to be connected are selected by the processing unit or by the other apparatus. .
(12)
The device according to any one of (1) to (11), wherein the candidate for the wireless station to be connected to includes the other device operable as the wireless station.
(13)
The authentication information is generated based on at least one of subscriber identification information, electronic certificate, user name and password, pre-shared key or passphrase stored in the other device. The apparatus according to any one of 12).
(14)
Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations A processing unit that provides authentication information used in the authentication process to another device that performs the authentication process based on the authentication method selected based on
A device comprising:
(15)
The device according to (14), wherein the processing unit performs processing for the device to function as the wireless station.
(16)
The apparatus according to (15), wherein the processing unit performs processing for functioning as the wireless station triggered by reception of the authentication information request from the other apparatus.
(17)
Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations The processor performs authentication processing using authentication information of another device according to the authentication method selected based on
Including methods.
(18)
Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations Providing a processor with authentication information used in the authentication process to another device that performs an authentication process based on the authentication method selected based on
Including methods.
(19)
An authentication information providing source terminal and an authentication information providing destination terminal;
With
The authentication information providing destination terminal is connected to the wireless station of the connection destination selected based on one or more network information related to the wireless network operated by the wireless station acquired from each of the one or more wireless stations. A processing unit that performs an authentication process using the authentication information of the authentication information providing source terminal according to the authentication method selected based on the network information of the previous wireless station;
The authentication information providing source terminal includes a processing unit that provides the authentication information to the authentication information providing destination terminal.
(20)
Connection destination to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations by the authentication information providing destination terminal Performing authentication processing using authentication information of an authentication information providing source terminal according to an authentication method selected based on network information of the wireless station;
The authentication information providing source terminal providing the authentication information to the authentication information providing destination terminal;
Including methods.
 1   無線通信システム
 100 WLAN端末
 110  無線通信部
 112  WLANモジュール
 114  BTモジュール
 116  NFCモジュール
 120  出力部
 130  記憶部
 140  処理部
 142  取得部
 144  選択部
 146  通知部
 148  認証処理部
 200 WWAN端末
 210  無線通信部
 212  WWANモジュール
 214  WLANモジュール
 216  BTモジュール
 218  NFCモジュール
 220  記憶部
 230  加入者識別モジュール
 240  処理部
 242  選択部
 244  認証処理部
 246  テザリング処理部
 300 WWAN
 310 基地局
 320 ゲートウェイ
 330 加入者情報サーバ
 340 認証サーバ
 350 ネットワーク情報提供サーバ
 360 TTLSサーバ
 400 サービスネットワーク
 500 WLAN
 510 基地局
1 wireless communication system 100 WLAN terminal 110 wireless communication unit 112 WLAN module 114 BT module 116 NFC module 120 output unit 130 storage unit 140 processing unit 142 acquisition unit 144 selection unit 146 notification unit 148 authentication processing unit 200 WWAN terminal 210 wireless communication unit 212 WWAN module 214 WLAN module 216 BT module 218 NFC module 220 storage unit 230 subscriber identification module 240 processing unit 242 selection unit 244 authentication processing unit 246 tethering processing unit 300 WWAN
310 base station 320 gateway 330 subscriber information server 340 authentication server 350 network information providing server 360 TTL server 400 service network 500 WLAN
510 base station

Claims (20)

  1.  ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、他の装置の認証情報を用いた認証処理を行う処理部、
    を備える装置。
    Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations A processing unit for performing an authentication process using authentication information of another device according to an authentication method selected based on
    A device comprising:
  2.  接続先の前記無線局は、前記装置と前記無線局との間の無線通信環境の状態を示す情報に基づいて選択される、請求項1に記載の装置。 The apparatus according to claim 1, wherein the wireless station to be connected is selected based on information indicating a state of a wireless communication environment between the apparatus and the wireless station.
  3.  接続先の前記無線局は、前記無線局が対応する通信方式を示す情報に基づいて選択される、請求項1に記載の装置。 The apparatus according to claim 1, wherein the wireless station to be connected is selected based on information indicating a communication method supported by the wireless station.
  4.  接続先の前記無線局は前記無線局が対応する認証方式を示す情報に基づいて選択される、請求項1に記載の装置。 The apparatus according to claim 1, wherein the wireless station to be connected is selected based on information indicating an authentication method supported by the wireless station.
  5.  接続先の前記無線局は、前記他の装置の接続履歴に基づいて選択される、請求項1に記載の装置。 2. The apparatus according to claim 1, wherein the wireless station as a connection destination is selected based on a connection history of the other apparatus.
  6.  接続先の前記無線局は、ネットワーク選択ポリシーに基づいて選択される、請求項1に記載の装置。 The apparatus according to claim 1, wherein the wireless station to be connected is selected based on a network selection policy.
  7.  前記認証方式は、セキュリティの強度に基づいて選択される、請求項1に記載の装置。 The apparatus according to claim 1, wherein the authentication method is selected based on security strength.
  8.  前記認証方式は、ユーザビリティの高さに基づいて選択される、請求項1に記載の装置。 The apparatus according to claim 1, wherein the authentication method is selected based on high usability.
  9.  前記処理部は、接続先の前記無線局を選択する、請求項1に記載の装置。 The apparatus according to claim 1, wherein the processing unit selects the wireless station as a connection destination.
  10.  接続先の前記無線局は、前記他の装置により選択される、請求項1に記載の装置。 The apparatus according to claim 1, wherein the wireless station to be connected is selected by the other apparatus.
  11.  前記処理部は、接続先の前記無線局及び認証方式を自身が選択するか、前記他の装置が選択するかを判定する、請求項1に記載の装置。 The apparatus according to claim 1, wherein the processing unit determines whether the wireless station and the authentication method of the connection destination are selected by itself or the other apparatus is selected.
  12.  接続先の前記無線局の候補は、前記無線局として動作可能な前記他の装置を含む、請求項1に記載の装置。 The apparatus according to claim 1, wherein the candidate of the wireless station as a connection destination includes the other apparatus operable as the wireless station.
  13.  前記認証情報は、前記他の装置に格納された加入者識別情報、電子証明書、ユーザ名及びパスワード、事前共有鍵又はパスフレーズの少なくともいずれかに基づいて生成される、請求項1に記載の装置。 2. The authentication information according to claim 1, wherein the authentication information is generated based on at least one of subscriber identification information, an electronic certificate, a user name and password, a pre-shared key, or a passphrase stored in the other device. apparatus.
  14.  ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による認証処理を行う他の装置への、前記認証処理において用いられる認証情報の提供を行う処理部、
    を備える装置。
    Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations A processing unit that provides authentication information used in the authentication process to another device that performs the authentication process based on the authentication method selected based on
    A device comprising:
  15.  前記処理部は、前記装置が前記無線局として機能するための処理を行う、請求項14に記載の装置。 The apparatus according to claim 14, wherein the processing unit performs processing for the apparatus to function as the wireless station.
  16.  前記処理部は、前記他の装置からの前記認証情報の要求の受信をトリガとして前記無線局として機能するための処理を行う、請求項15に記載の装置。 The apparatus according to claim 15, wherein the processing unit performs a process for functioning as the wireless station by receiving a request for the authentication information from the other apparatus as a trigger.
  17.  ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、他の装置の認証情報を用いた認証処理をプロセッサにより行うこと、
    を含む方法。
    Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations The processor performs authentication processing using authentication information of another device according to the authentication method selected based on
    Including methods.
  18.  ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による認証処理を行う他の装置への、前記認証処理において用いられる認証情報の提供をプロセッサにより行うこと、
    を含む方法。
    Network information of the connection-destination radio station to the connection-destination radio station selected based on one or more network information related to the radio network operated by the radio station, acquired from each of the one or more radio stations Providing a processor with authentication information used in the authentication process to another device that performs an authentication process based on the authentication method selected based on
    Including methods.
  19.  認証情報提供元端末と認証情報提供先端末と、
    を備え、
     前記認証情報提供先端末は、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、前記認証情報提供元端末の認証情報を用いた認証処理を行う処理部を有し、
     前記認証情報提供元端末は、前記認証情報提供先端末への前記認証情報の提供を行う処理部を有する、システム。
    An authentication information providing source terminal and an authentication information providing destination terminal;
    With
    The authentication information providing destination terminal is connected to the wireless station of the connection destination selected based on one or more network information related to the wireless network operated by the wireless station acquired from each of the one or more wireless stations. A processing unit that performs an authentication process using the authentication information of the authentication information providing source terminal according to the authentication method selected based on the network information of the previous wireless station;
    The authentication information providing source terminal includes a processing unit that provides the authentication information to the authentication information providing destination terminal.
  20.  認証情報提供先端末が、ひとつ以上の無線局の各々から取得された、当該無線局が運用する無線ネットワークに関するひとつ以上のネットワーク情報に基づいて選択された接続先の前記無線局への、接続先の前記無線局のネットワーク情報に基づいて選択された認証方式による、認証情報提供元端末の認証情報を用いた認証処理を行うことと、
     前記認証情報提供元端末が、前記認証情報提供先端末への前記認証情報の提供を行うことと、
    を含む方法。
    Connection destination to the wireless station of the connection destination selected based on one or more network information about the wireless network operated by the wireless station acquired from each of the one or more wireless stations by the authentication information providing destination terminal Performing authentication processing using authentication information of an authentication information providing source terminal according to an authentication method selected based on network information of the wireless station;
    The authentication information providing source terminal providing the authentication information to the authentication information providing destination terminal;
    Including methods.
PCT/JP2016/066292 2015-09-03 2016-06-01 Device, system and method WO2017038179A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015173715A JP2017050764A (en) 2015-09-03 2015-09-03 Device, system and method
JP2015-173715 2015-09-03

Publications (1)

Publication Number Publication Date
WO2017038179A1 true WO2017038179A1 (en) 2017-03-09

Family

ID=58187385

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2016/066292 WO2017038179A1 (en) 2015-09-03 2016-06-01 Device, system and method

Country Status (2)

Country Link
JP (1) JP2017050764A (en)
WO (1) WO2017038179A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220104017A1 (en) * 2020-09-26 2022-03-31 Mcafee, Llc Wireless access point with multiple security modes
JP7467724B1 (en) 2023-03-30 2024-04-15 Kddi株式会社 Information processing device, information processing system, and information processing method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7204714B2 (en) * 2020-09-18 2023-01-16 Necプラットフォームズ株式会社 Wireless repeater, communication system, method and program
WO2022234677A1 (en) * 2021-05-07 2022-11-10 三菱電機株式会社 Communication device, communication system, and communication method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009194823A (en) * 2008-02-18 2009-08-27 Hitachi Ltd Mobile radio communication control apparatus and radio communication control method
JP2010177757A (en) * 2009-01-27 2010-08-12 Panasonic Corp Wireless communication device and connection destination searching method
JP2010287123A (en) * 2009-06-12 2010-12-24 Toshiba Corp Radio communication apparatus and radio communication method
JP2013235342A (en) * 2012-05-07 2013-11-21 Canon Inc Communication device and control method of the same
JP2014143632A (en) * 2013-01-25 2014-08-07 Sony Corp Terminal device, program, and communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009194823A (en) * 2008-02-18 2009-08-27 Hitachi Ltd Mobile radio communication control apparatus and radio communication control method
JP2010177757A (en) * 2009-01-27 2010-08-12 Panasonic Corp Wireless communication device and connection destination searching method
JP2010287123A (en) * 2009-06-12 2010-12-24 Toshiba Corp Radio communication apparatus and radio communication method
JP2013235342A (en) * 2012-05-07 2013-11-21 Canon Inc Communication device and control method of the same
JP2014143632A (en) * 2013-01-25 2014-08-07 Sony Corp Terminal device, program, and communication system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220104017A1 (en) * 2020-09-26 2022-03-31 Mcafee, Llc Wireless access point with multiple security modes
US11930359B2 (en) * 2020-09-26 2024-03-12 Mcafee, Llc Wireless access point with multiple security modes
JP7467724B1 (en) 2023-03-30 2024-04-15 Kddi株式会社 Information processing device, information processing system, and information processing method

Also Published As

Publication number Publication date
JP2017050764A (en) 2017-03-09

Similar Documents

Publication Publication Date Title
EP2936876B1 (en) Methods and apparatus for differencitating security configurations in a radio local area network
US10164967B2 (en) Terminal device and information processing device
JP6904446B2 (en) Wireless communication equipment, wireless communication methods and programs
CN111869261A (en) Discovery and Security in LWA Communications
CN113873492B (en) Communication method and related device
WO2017038179A1 (en) Device, system and method
JP6465108B2 (en) Wireless communication device
US10225794B2 (en) Terminal device, information processing device, and information providing device
US10292187B2 (en) Wireless communication apparatus, server, payment apparatus, wireless communication method, and program
US10051671B2 (en) Terminal device and information processing device
WO2016027545A1 (en) Wireless communication device and wireless communication method
WO2016117211A1 (en) Wireless communication device, wireless communication method and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16841211

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16841211

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载